{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:45:12Z","timestamp":1774525512540,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000104","name":"National Aeronautics and Space Administration","doi-asserted-by":"publisher","award":["80NSSC17K0530"],"award-info":[{"award-number":["80NSSC17K0530"]}],"id":[{"id":"10.13039\/100000104","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1109\/tetc.2020.2983007","type":"journal-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T03:23:15Z","timestamp":1585624995000},"page":"2201-2222","source":"Crossref","is-referenced-by-count":29,"title":["A Blockchain-Powered Decentralized and Secure Computing Paradigm"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3949-9641","authenticated-orcid":false,"given":"Gihan J.","family":"Mendis","sequence":"first","affiliation":[]},{"given":"Yifu","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6833-6382","authenticated-orcid":false,"given":"Jin","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Moein","family":"Sabounchi","sequence":"additional","affiliation":[]},{"given":"Rigoberto","family":"Roche","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.03.003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2017.102"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435784"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2642182"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2430315"},{"key":"ref30","first-page":"99","article-title":"Transfer of situated learning","author":"greeno","year":"1993","journal-title":"Transfer on Trial Intelligence Cognition and Instruction"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701095"},{"key":"ref36","article-title":"Modelling and simulation of security-aware task scheduling in cloud computing based on blockchain technology","volume":"99","author":"wilczy?ski","year":"2020","journal-title":"Simul Model Practice Theory"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jnca.2019.06.014","article-title":"QoS-aware secure transaction framework for internet of things using blockchain mechanism","volume":"144","author":"roy","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1725-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.04.050"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISCON47742.2019.9036216"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3389\/978-2-88945-401-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12229-8"},{"key":"ref22","author":"masahiro","year":"2015","journal-title":"Fully Homomorphic Encryption Without Bootstrapping"},{"key":"ref21","volume":"20","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2014.6804228"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2015-354"},{"key":"ref25","year":"2019"},{"key":"ref50","article-title":"The mnist database of handwritten digits","author":"lecun","year":"1998"},{"key":"ref10","article-title":"Towards federated learning at scale: System design","author":"bonawitz","year":"2019"},{"key":"ref11","article-title":"A next generation smart contract & decentralized application platform","author":"buterin","year":"2014"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2004.1390734"},{"key":"ref12","author":"diedrich","year":"2016","journal-title":"Ethereum Blockchains digital assets smart contracts decentralized autonomous organizations"},{"key":"ref13","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3143011"},{"key":"ref15","first-page":"543","article-title":"Combining modality specific deep neural networks for emotion recognition in video","author":"kahou","year":"2013","journal-title":"Proc 15th ACM Int Conf Multimodal Interact"},{"key":"ref16","first-page":"3021","article-title":"Robust late fusion with rank minimization","author":"ye","year":"2012","journal-title":"Proc IEEE Conf Comput Vis Pattern Recognit"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2461544"},{"key":"ref18","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computations"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref3","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref5","author":"pandiri","year":"2012","journal-title":"Cloud Computing - Trends and Performance Issues Major Cloud Providers Challenges of Cloud Computing Load Balancing in Clouds LAP LAMBERT Academic Publishing"},{"key":"ref8","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"kone?n?","year":"0"},{"key":"ref7","article-title":"Federated learning: Strategies for improving communication efficiency","author":"konecny","year":"0"},{"key":"ref49","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Int Cnf Neural Inf Process Syst"},{"key":"ref9","article-title":"Federated learning: Collaborative machine learning without centralized training data","author":"mcmahan","year":"0"},{"key":"ref46","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"castro","year":"1999","journal-title":"Proc Symp Oper Syst Des Implementation"},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-78783-9","author":"ethier","year":"2010","journal-title":"The Doctrine of Chances Probabilistic Aspects of Gambling (Probability and Its Applications)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0147"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2641562"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref41","first-page":"4672","article-title":"Safetynets: Verifiable execution of deep neural networks on an untrusted cloud","author":"ghodsi","year":"2017","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref44","first-page":"129","article-title":"Eclipse attacks on bitcoin's peer-to-peer network","author":"heilman","year":"2015","journal-title":"Proc 24th USENIX Secur Symp"},{"key":"ref43","article-title":"c-ipfs: IPFS implementation in C. Why C? Think Bitshares&#x2019; Stealth backups, OpenWrt routers (decentralize the internet\/meshnet!), Android TV, decentralized Media, decentralized websites, decent.","year":"2017"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9635600\/09050459.pdf?arnumber=9050459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T09:06:01Z","timestamp":1695978361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9050459\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":50,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2020.2983007","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]}}}