{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:51:25Z","timestamp":1763344285379,"version":"3.45.0"},"reference-count":106,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064028","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T03:15:10Z","timestamp":1749438910000},"page":"1981-2013","source":"Crossref","is-referenced-by-count":0,"title":["A Survey on Artificial Intelligence and Blockchain Clustering for Enhanced Security in 6G Wireless Networks"],"prefix":"10.32604","volume":"84","author":[{"given":"A. F. M. Shahen","family":"Shah","sequence":"first","affiliation":[]},{"given":"Muhammet Ali","family":"Karabulut","sequence":"additional","affiliation":[]},{"given":"Abu","family":"Kamruzzaman","sequence":"additional","affiliation":[]},{"given":"Dalal","family":"Alharthi","sequence":"additional","affiliation":[]},{"given":"Phillip G.","family":"Bradford","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"113428","DOI":"10.1109\/ACCESS.2021.3104509","article-title":"Survey and performance evaluation of multiple access schemes for next-generation wireless communication systems","volume":"9","author":"Shah","year":"2021","journal-title":"IEEE Access"},{"key":"ref2","series-title":"Proceedings of the IEEE 12th Annual Computing and Communication Workshop and Conference","article-title":"A survey from 1G to 5G including the advent of 6G: architectures, multiple access techniques, and emerging technologies","author":"Shah","year":"2022 Jan 26\u201329"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2384","DOI":"10.1109\/COMST.2021.3108618","article-title":"Security and privacy for 6G: a survey on prospective technologies and challenges","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MVT.2019.2921208","article-title":"6G wireless networks: vision, requirements, architecture, and key technologies","volume":"14","author":"Zhang","year":"2019","journal-title":"IEEE Veh Technol Mag"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.dcan.2020.07.003","article-title":"Security and privacy in 6G networks: new areas and new challenges","volume":"6","author":"Wang","year":"2020","journal-title":"Digit Commun Netw"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MCOM.001.1900411","article-title":"Toward 6G networks: use cases and technologies","volume":"58","author":"Giordani","year":"2020","journal-title":"IEEE Commun Mag"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"e4329","DOI":"10.1002\/ett.4329","article-title":"Blockchain and artificial intelligence for 5G-enabled Internet of Things: challenges, opportunities, and solutions","volume":"35","author":"Dhar Dwivedi","year":"2024","journal-title":"Trans Emerg Tel Tech"},{"key":"ref8","first-page":"30","article-title":"AI and blockchain enabled future wireless networks: a survey and outlook","volume":"3","author":"Ziyi","year":"2024","journal-title":"Distrib Ledger Technol"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2494","DOI":"10.1109\/COMST.2023.3315374","article-title":"A survey of blockchain and artificial intelligence for 6G wireless communications","volume":"25","author":"Zuo","year":"2023","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"7145","DOI":"10.1109\/TII.2021.3052531","article-title":"A survey of computational intelligence for 6G: key technologies, applications and trends","volume":"17","author":"Ji","year":"2021","journal-title":"IEEE Trans Ind Inform"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"105935","DOI":"10.1109\/ACCESS.2023.3319083","article-title":"Qualitative survey on artificial intelligence integrated blockchain approach for 6G and beyond","volume":"11","author":"Pathak","year":"2023","journal-title":"IEEE Access"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"4868","DOI":"10.1109\/TII.2021.3107556","article-title":"Blockchain based privacy preserving framework for emerging 6G wireless communications","volume":"18","author":"Velliangiri","year":"2022","journal-title":"IEEE Trans Ind Inf"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"244","DOI":"10.23919\/ICN.2021.0017","article-title":"An intelligent wireless transmission toward 6G","volume":"2","author":"Zhang","year":"2021","journal-title":"Intell Converg Netw"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/COMST.2021.3130901","article-title":"AI models for green communications towards 6G","volume":"24","author":"Mao","year":"2022","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"e0302052","DOI":"10.1371\/journal.pone.0302052","article-title":"Towards secure and efficient integration of blockchain and 6G networks","volume":"19","author":"Liu","year":"2024","journal-title":"PLoS One"},{"key":"ref16","first-page":"979371","article-title":"A systematic review of blockchain technology assisted with artificial intelligence technology for networks and communication systems","volume":"2024","author":"Kamal","year":"2024","journal-title":"J Comput Netw Commun"},{"key":"ref17","series-title":"Proceedings of the 2024 International Conference on Optimization Computing and Wireless Communication (ICOCWC)","article-title":"Exploring the integration of blockchain in 6G networks for improved security and efficiency","author":"Bargavi","year":"2024 Jan 29\u201330"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"28684","DOI":"10.1109\/ACCESS.2024.3367118","article-title":"A survey on integrating edge computing with AI and blockchain in maritime domain, aerial systems, IoT, and Industry 4.0","volume":"12","author":"Alanhdi","year":"2024","journal-title":"IEEE Access"},{"key":"ref19","series-title":"Proceedings of the 2024 7th International Balkan Conference on Communications and Networking (BalkanCom)","article-title":"Enhancing academic credentials: the synergy of blockchain and artificial intelligence","author":"Rustemi","year":"2024 Jun 3\u20136"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"205340","DOI":"10.1109\/ACCESS.2020.3037108","article-title":"Edge computing and its convergence with blockchain in 5G and beyond: security, challenges, and opportunities","volume":"8","author":"Bhat","year":"2020","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.future.2024.04.024","article-title":"Blockchain-based secure communication of internet of things in space-air\u2013ground integrated network","volume":"158","author":"Zhang","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"9459","DOI":"10.3390\/app14209459","article-title":"Blockchain-based federated learning: a survey and new perspectives","volume":"14","author":"Ning","year":"2024","journal-title":"Appl Sci"},{"key":"ref23","first-page":"3041","article-title":"A novel 6G scalable blockchain clustering-based computer vision character detection for mobile images","volume":"78","author":"Li","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"109","DOI":"10.3390\/inventions7040109","article-title":"Blockchain and 6G-enabled IoT","volume":"7","author":"Pajooh","year":"2022","journal-title":"Inventions"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"103371","DOI":"10.1016\/j.jnca.2022.103371","article-title":"Blockchain for IoT access control: recent trends and future research directions","volume":"203","author":"Pal","year":"2022","journal-title":"J Netw Comput Appl"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"102882","DOI":"10.1016\/j.adhoc.2022.102882","article-title":"Vericom: a verification and communication architecture for IoT-based blockchain","volume":"133","author":"Dorri","year":"2022","journal-title":"Ad Hoc Netw"},{"key":"ref27","series-title":"Proceedings of the Thirteenth EuroSys Conference","article-title":"Hyperledger fabric: a distributed operating system for permissioned blockchains","author":"Elli","year":"2018 Apr 23\u201326"},{"key":"ref28","unstructured":"Liquid Network [Online]. [cited 2025 Jan 25]. Available from: https:\/\/blockstream.com\/liquid\/."},{"key":"ref29","unstructured":"Stacks foundation. Level 2 Stacks chain on the Bitcoin Blockchain [Online]. [cited 2025 Mar 18]. Available from: https:\/\/stacks.org\/."},{"key":"ref30","unstructured":"Secure A. The zilliqa project: a secure, scalable blockchain platform [Online]. [cited 2025 Jan 25]. Available from: https:\/\/docs.zilliqa.com\/positionpaper.pdf."},{"key":"ref31","unstructured":"Kwon J, Buchman E. Cosmos whitepaper, a network of distributed ledgers [Online]. [cited 2025 Jan 25]. Available from: https:\/\/wikibitimg.fx994.com\/attach\/2020\/12\/16623142020\/WBE16623142020_55300.pdf."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"100193","DOI":"10.1016\/j.bcra.2024.100193","article-title":"Blockchain for secure and decentralized artificial intelligence in cybersecurity: a comprehensive review","volume":"5","author":"Shamsan","year":"2024","journal-title":"Blockchain Res Appl"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"103884","DOI":"10.1016\/j.jnca.2024.103884","article-title":"Exploring the integration of edge computing and blockchain IoT: principles, architectures, security, and applications","volume":"226","author":"Nguyen","year":"2024","journal-title":"J Netw Comput Appl"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2024\/8845070","article-title":"Artificial intelligence in 6G wireless networks: opportunities, applications, and challenges","volume":"2024","author":"Alhammadi","year":"2024","journal-title":"Int J Intell Syst"},{"key":"ref35","doi-asserted-by":"crossref","unstructured":"Patil A, Iyer S, Pandya RJ. A survey of machine learning algorithms for 6G wireless networks. arXiv:2203.08429v1. 2022.","DOI":"10.4018\/978-1-6684-3921-0.ch003"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"6143","DOI":"10.3390\/s24186143","article-title":"Blockchain 6G-based wireless network security management with optimization using machine learning techniques","volume":"24","author":"Chinnasamy","year":"2024","journal-title":"Sensors"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"100540","DOI":"10.1016\/j.eij.2024.100540","article-title":"Machine learning-based detection of DDoS attacks on IoT devices in multi-energy systems","volume":"28","author":"Sakr","year":"2024","journal-title":"Egypt Inform J"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.iotcps.2023.12.003","article-title":"Machine learning techniques for IoT security: current research and future vision with generative AI and large language models","volume":"4","author":"Alwahedi","year":"2024","journal-title":"Internet Things Cyber-Phys Syst"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/OJVT.2022.3219898","article-title":"Data-driven malware detection for 6G networks: a survey from the perspective of continuous learning and explainability via visualisation","volume":"4","author":"Uysal","year":"2023","journal-title":"IEEE Open J Veh Technol"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"105116","DOI":"10.1016\/j.engappai.2022.105116","article-title":"Cyber-security and reinforcement learning\u2014a brief survey","volume":"114","author":"Adawadkar","year":"2022","journal-title":"Eng Appl Artif Intell"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"7709","DOI":"10.3390\/s23187709","article-title":"Emerging technologies for 6G communication networks: machine learning approaches","volume":"23","author":"Puspitasari","year":"2023","journal-title":"Sensors"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1969","DOI":"10.3390\/s22051969","article-title":"Security requirements and challenges of 6G technologies and applications","volume":"22","author":"Abdel Hakeem","year":"2022","journal-title":"Sensors"},{"key":"ref43","series-title":"Proceedings of the 7th International Conference on Intelligent Computing and Control Systems (ICICCS)","article-title":"Blockchain integration with artificial intelligence and Internet of Things technologies","author":"Aruna","year":"2023 May 17\u201319"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"2446","DOI":"10.55730\/1300-0632.3950","article-title":"Blockchain and federated learning-based security solutions for telesurgery system: a comprehensive review","volume":"30","author":"Chaudjary","year":"2022","journal-title":"Turk J Electr Eng Comput Sci"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"31235","DOI":"10.1038\/s41598-024-82585-3","article-title":"A secure and efficient blockchain enabled federated Q-learning model for vehicular Ad-hoc networks","volume":"14","author":"Ahmed","year":"2024","journal-title":"Sci Rep"},{"key":"ref46","first-page":"122","article-title":"A study and future challenges in 6G networks: aeronautical network, AI and blockchain","volume":"17","author":"Karabulut","year":"2024","journal-title":"JAST"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"77990","DOI":"10.1109\/ACCESS.2023.3298048","article-title":"A smart contract vulnerability detection mechanism based on deep learning and expert rules","volume":"11","author":"Liu","year":"2023","journal-title":"IEEE Access"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"3618","DOI":"10.3390\/electronics12173618","article-title":"A new blockchain-based authentication framework for secure IoT networks","volume":"12","author":"Al Hwaitat","year":"2023","journal-title":"Electronics"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"133281","DOI":"10.1109\/ACCESS.2023.3336399","article-title":"A secure data sharing system for 6G networks","volume":"11","author":"Gao","year":"2023","journal-title":"IEEE Access"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/s10462-024-10873-5","article-title":"Blockchain, artificial intelligence, and healthcare: the tripod of future\u2014a narrative review","volume":"57","author":"Bathula","year":"2024","journal-title":"Artif Intell Rev"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2021.3126076","article-title":"Edge artificial intelligence for 6G: vision, enabling technologies, and applications","volume":"40","author":"Letaief","year":"2022","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"5750","DOI":"10.3390\/s22155750","article-title":"Artificial intelligence applications and self-learning 6G networks for smart cities digital ecosystems: taxonomy, challenges, and future directions","volume":"22","author":"Ismail","year":"2022","journal-title":"Sensors"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"3881","DOI":"10.1109\/ACCESS.2023.3349019","article-title":"On the integration of artificial intelligence and blockchain technology: a perspective about security","volume":"12","author":"Kuznetsov","year":"2024","journal-title":"IEEE Access"},{"key":"ref54","first-page":"11","article-title":"AI and blockchain integration: enhancing security and transparency in financial transactions","volume":"3","author":"Martinez","year":"2024","journal-title":"Int Trans Artif Intell"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"268","DOI":"10.3390\/info15050268","article-title":"The convergence of artificial intelligence and blockchain: the state of play and the road ahead","volume":"15","author":"Bhumichai","year":"2024","journal-title":"Information"},{"key":"ref56","series-title":"Proceedings of the 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","article-title":"AI and blockchain integration","author":"Chavali","year":"2020 Jun 4\u20135"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3700641","article-title":"A review on blockchain technology, current challenges, and AI-driven solutions","volume":"57","author":"Abdelhamid","year":"2025","journal-title":"ACM Comput Surv"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s10479-023-05169-w","article-title":"A critical analysis of the integration of blockchain and artificial intelligence for supply chain","volume":"327","author":"Charles","year":"2023","journal-title":"Ann Oper Res"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"6171","DOI":"10.1109\/JIOT.2024.3507746","article-title":"Exploring the synergy: AI enhancing blockchain, blockchain empowering AI, and their convergence across IoT applications and beyond","volume":"12","author":"Zuo","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref60","unstructured":"6G technologies\u2014security, trust and privacy\u2014Nokia Bell Labs [Internet]. [cited 2025 Jan 25]. Available from: https:\/\/www.bell-labs.com\/research-innovation\/what-is-6g\/6g-technologies\/security-and-trust."},{"key":"ref61","series-title":"Proceedings of the IEEE Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit)","article-title":"AI and 6G security: opportunities and challenges","author":"Siriwardhana","year":"2021 Jun 8\u201311"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"82800","DOI":"10.1109\/ACCESS.2024.3413047","article-title":"Physical layer security for 6G: toward achieving intelligent native security at layer-1","volume":"12","author":"Ara","year":"2024","journal-title":"IEEE Access"},{"key":"ref63","series-title":"2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit)","first-page":"622","article-title":"6G security challenges and potential solutions","author":"Porambage","year":"2021"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"3094","DOI":"10.1109\/OJCOMS.2024.3449563","article-title":"Federated learning for enhanced cybersecurity and trustworthiness in 5G and 6G networks: a comprehensive survey","volume":"6","author":"Blika","year":"2024","journal-title":"IEEE Open J Commun Soc"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"94753","DOI":"10.1109\/ACCESS.2024.3425350","article-title":"A survey on zero trust architecture: applications and challenges of 6G networks","volume":"12","author":"Nahar","year":"2024","journal-title":"IEEE Access"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MNET.021.1900629","article-title":"Blockchain-based data security for artificial intelligence applications in 6G networks","volume":"34","author":"Li","year":"2020","journal-title":"IEEE Netw"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1109\/OJCOMS.2021.3078081","article-title":"The roadmap to 6G security and privacy","volume":"2","author":"Porambage","year":"2021","journal-title":"IEEE Open J Commun Soc"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"3940","DOI":"10.1109\/TCE.2024.3371928","article-title":"Privacy-preserving AI framework for 6G-enabled consumer electronics","volume":"70","author":"Wang","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/OJCOMS.2022.3143098","article-title":"Towards 6G-enabled Internet of vehicles: security and privacy","volume":"3","author":"Moya Osorio","year":"2022","journal-title":"IEEE Open J Commun Soc"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"67","DOI":"10.3390\/fi16030067","article-title":"A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas","volume":"16","author":"Scalise","year":"2024","journal-title":"Future Internet"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/MNET.001.1900287","article-title":"A vision of 6G wireless systems: applications trends technologies and open research problems","volume":"34","author":"Saad","year":"2020","journal-title":"IEEE Netw"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"142314","DOI":"10.1109\/ACCESS.2021.3120143","article-title":"Security and trust in the 6G era","volume":"9","author":"Ziegler","year":"2021","journal-title":"IEEE Access"},{"key":"ref73","series-title":"Proceedings of the International Conference on Forensics, Analytics, Big Data, Security (FABS)","article-title":"A review on privacy and security in 6G networks","author":"Shirwaikar","year":"2021 Dec 21\u201322"},{"key":"ref74","series-title":"Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","article-title":"Uncovering network vulnerabilities and conducting digital forensics analysis for IoT device security in 6G","author":"Siddiqui","year":"2023 Dec 17\u201320"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"10861","DOI":"10.3390\/app131910861","article-title":"Digital communication forensics in 6G and beyond networks","volume":"13","author":"Alqabbani","year":"2023","journal-title":"Appl Sci"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"e1496","DOI":"10.1002\/wfs2.1496","article-title":"Digital forensics challenges and readiness for 6G Internet of Things (IoT) networks","volume":"5","author":"Akinbi","year":"2023","journal-title":"WIREs Forensic Sci"},{"key":"ref77","doi-asserted-by":"crossref","unstructured":"Nguyen T, Nguyen H, Ijaz A, Sheikhi S, Vasilakos AV, Kostakos P. Large language models in 6G security: challenges and opportunities. arXiv:2403.12239v1. 2024.","DOI":"10.1109\/VCRIS63677.2024.10813382"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"133245","DOI":"10.1109\/ACCESS.2024.3418900","article-title":"Advanced deep learning models for 6G: overview, opportunities, and challenges","volume":"12","author":"Jiao","year":"2024","journal-title":"IEEE Access"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"169","DOI":"10.34306\/att.v6i2.407","article-title":"Comparative analysis of NIJ and NIST methods for microsd investigations: a technopreneur approach","volume":"6","author":"Anwar","year":"2024","journal-title":"APTISI Trans Technopreneurship"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"2023","DOI":"10.1145\/3571072","article-title":"Five facets of 6G: research challenges and opportunities","volume":"55","author":"Shen","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"2021","DOI":"10.1145\/3379444","article-title":"A survey of network virtualization techniques for Internet of Things using SDN and NFV","volume":"53","author":"Alam","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref82","first-page":"322","author":"Zimmer","year":"2017","journal-title":"Beyond BIOS: developing with the unified extensible firmware interface"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/bs.adcom.2023.04.005","article-title":"Virtual Raspberry Pi-s with blockchain and cybersecurity applications","volume":"131","author":"Tanque","year":"2023","journal-title":"Adv Comput"},{"key":"ref84","first-page":"240","author":"Bradford","year":"2023 Dec 28","journal-title":"Chains that bind us"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"100304","DOI":"10.1016\/j.cosrev.2020.100304","article-title":"A survey of live virtual machine migration techniques","volume":"38","author":"Le","year":"2018","journal-title":"Comput Sci Rev"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1145\/367701.367728","article-title":"Process migration","volume":"23","author":"Miloji\u010di\u0107","year":"2000","journal-title":"ACM Comput Surv"},{"key":"ref87","doi-asserted-by":"crossref","first-page":"103633","DOI":"10.1016\/j.jnca.2023.103633","article-title":"Blockchain for healthcare systems: architecture, security challenges, trends and future directions","volume":"215","author":"Andrew","year":"2023","journal-title":"J Netw Comput Appl"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"100073","DOI":"10.1016\/j.tbench.2022.100073","article-title":"A review of blockchain technology applications for financial services","volume":"2","author":"Javaid","year":"2022","journal-title":"BenchCouncil Trans Benchmarks Stand Eval"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"697","DOI":"10.3390\/info15110697","article-title":"Privacy-preserving techniques in generative AI and large language models: a narrative review","volume":"15","author":"Feretzakis","year":"2024","journal-title":"Information"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"100974","DOI":"10.1016\/j.patter.2024.100974","article-title":"Privacy preservation for federated learning in health care","volume":"5","author":"Pati","year":"2024","journal-title":"Patterns"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"101626","DOI":"10.1016\/j.phycom.2022.101626","article-title":"Security concerns on machine learning solutions for 6G networks in mmWave beam prediction","volume":"52","author":"Catak","year":"2022","journal-title":"Phys Commun"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"493","DOI":"10.3390\/jcp3030025","article-title":"Autonomous vehicles: sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions","volume":"3","author":"Giannaros","year":"2023","journal-title":"J Cybersecur Priv"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"132972","DOI":"10.1109\/ACCESS.2024.3460656","article-title":"Toward AI-enabled green 6G networks: a resource management perspective","volume":"12","author":"Alhussien","year":"2024","journal-title":"IEEE Access"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"100136","DOI":"10.1016\/j.mtelec.2025.100136","article-title":"Overview of emerging electronics technologies for artificial intelligence: a review","volume":"11","author":"Gao","year":"2025","journal-title":"Mater Today Electron"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"100026","DOI":"10.1016\/j.geomat.2024.100026","article-title":"Investigating the potential of blockchain technology for geospatial data sharing: opportunities, challenges, and solutions","volume":"76","author":"Chafiq","year":"2024","journal-title":"Geomatica"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.future.2024.03.046","article-title":"A survey on blockchain technology in the maritime industry: challenges and future perspectives","volume":"157","author":"Farah","year":"2024","journal-title":"Future Gener Comput Syst"},{"key":"ref97","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1109\/TAI.2022.3194503","article-title":"An overview of artificial intelligence ethics","volume":"4","author":"Huang","year":"2023","journal-title":"IEEE Trans Artif Intell"},{"key":"ref98","first-page":"368","article-title":"Artificial intelligence and intellectual properties: legal and ethical considerations","volume":"12","author":"Abdallah","year":"2023","journal-title":"Int J Intell Syst Appl Eng"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1038\/s41598-024-51578-7","article-title":"Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques","volume":"14","author":"Venkatesan","year":"2024","journal-title":"Sci Rep"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.3390\/electronics12163524","article-title":"Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy","volume":"12","author":"Mishra","year":"2023","journal-title":"Electronics"},{"key":"ref101","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1049\/qtc2.12119","article-title":"Quantum blockchain: trends, technologies, and future directions","volume":"5","author":"Manjula","year":"2024","journal-title":"IET Quantum Commun"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"20729","DOI":"10.1038\/s41598-023-47331-1","article-title":"Post-quantum distributed ledger technology: a systematic survey","volume":"13","author":"Parida","year":"2023","journal-title":"Sci Rep"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"112308","DOI":"10.1016\/j.rser.2022.112308","article-title":"Applications of blockchain and artificial intelligence technologies for enabling prosumers in smart grids: a review","volume":"161","author":"Hua","year":"2022","journal-title":"Renew Sustain Energy Rev"},{"key":"ref104","first-page":"1","article-title":"Recent advances in blockchain and artificial intelligence integration: feasibility analysis, research issues, applications, challenges, and future work","volume":"2021","author":"Zhang","year":"2021","journal-title":"Secur Commun Netw"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.icte.2022.05.005","article-title":"A vision on the artificial intelligence for 6G communication","volume":"9","author":"Ahammed","year":"2023","journal-title":"ICT Express"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"100188","DOI":"10.1016\/j.bcra.2024.100188","article-title":"Implementation of blockchain technology in integrated IoT networks for constructing scalable ITS systems in India","volume":"5","author":"Kharche","year":"2024","journal-title":"Blockchain Res Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_64028\/TSP_CMC_64028.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:49:24Z","timestamp":1763344164000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":106,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064028","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}