Blockchain and AI: Securing Intelligent Networks for the Future
Pith reviewed 2026-05-10 18:48 UTC · model grok-4.3
The pith
Blockchain and AI strengthen network security through verifiable provenance and adaptive detection, though real-world use stays mostly at the prototype stage.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Blockchain contributes provenance, trust, and auditability while AI contributes detection, adaptation, and orchestration in security for intelligent networks; the authors supply a taxonomy of approaches, integration patterns for verifiable and adaptive workflows, and the Blockchain-AI Security Evaluation Blueprint (BASE) checklist covering AI quality, ledger behavior, service levels, privacy, energy, and reproducibility, with evidence mapping showing strong conceptual alignment but predominantly prototype-stage implementations across domains.
What carries the argument
The Blockchain-AI Security Evaluation Blueprint (BASE) is the central mechanism, serving as a reporting checklist that standardizes evaluation of combined systems across AI quality, ledger behavior, end-to-end service levels, privacy, energy, and reproducibility.
If this is right
- Designers can assign blockchain to supply data provenance and audit trails while using AI for threat detection and response adaptation in network architectures.
- The integration patterns support security workflows that combine ledger verification with machine-learning orchestration for improved resilience.
- Applications in IoT, smart grids, transportation, and healthcare become comparable through consistent use of the BASE checklist on privacy, energy, and service metrics.
- Future development should prioritize interoperable interfaces between the technologies and creation of open cross-domain benchmarks.
- Attention to privacy-preserving analytics and bounded agentic automation reduces exposure in automated security systems.
Where Pith is reading between the lines
- The taxonomy could be extended to emerging settings such as edge computing security to identify integration challenges early.
- Inclusion of energy metrics in the checklist suggests efficiency will limit scaling on resource-constrained devices without further advances.
- Proposed open benchmarks could enable head-to-head testing of different blockchain-AI combinations in standardized environments.
- The patterns might guide construction of systems that record AI decisions on ledgers for auditability in regulated sectors.
Load-bearing premise
The fragmented literature across ledger design, AI-driven detection, cyber-physical applications, and agentic workflows can be synthesized into a complete, reusable taxonomy, patterns, and checklist without significant domain omissions.
What would settle it
A survey documenting multiple production-grade blockchain-AI security deployments in critical infrastructure with measured gains in resilience and transparency beyond lab prototypes would challenge the assessment of uneven, prototype-heavy evidence.
Figures
read the original abstract
Blockchain and artificial intelligence (AI) are increasingly proposed together for securing intelligent networks, but the literature remains fragmented across ledger design, AI-driven detection, cyber-physical applications, and emerging agentic workflows. This paper synthesizes the area through three reusable contributions: (i) a taxonomy of blockchain-AI security for intelligent networks, (ii) integration patterns for verifiable and adaptive security workflows, and (iii) the Blockchain-AI Security Evaluation Blueprint (BASE), a reporting checklist spanning AI quality, ledger behavior, end-to-end service levels, privacy, energy, and reproducibility. The paper also maps the evidence landscape across IoT, critical infrastructure, smart grids, transportation, and healthcare, showing that the conceptual fit is strong but real-world evidence remains uneven and often prototype-heavy. The synthesis clarifies where blockchain contributes provenance, trust, and auditability, where AI contributes detection, adaptation, and orchestration, and where future work should focus on interoperable interfaces, privacy-preserving analytics, bounded agentic automation, and open cross-domain benchmarks. The paper is intended as a reference for researchers and practitioners designing secure, transparent, and resilient intelligent networks.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript synthesizes the fragmented literature on blockchain and AI for securing intelligent networks. It offers three main contributions: (i) a taxonomy of blockchain-AI security approaches for intelligent networks, (ii) reusable integration patterns for verifiable and adaptive security workflows, and (iii) the Blockchain-AI Security Evaluation Blueprint (BASE), a multi-aspect reporting checklist covering AI quality, ledger behavior, end-to-end service levels, privacy, energy, and reproducibility. The paper maps evidence across domains including IoT, critical infrastructure, smart grids, transportation, and healthcare, concluding that the conceptual fit is strong—blockchain supplying provenance, trust, and auditability while AI supplies detection, adaptation, and orchestration—but that real-world evidence remains uneven and predominantly prototype-heavy. It identifies future priorities such as interoperable interfaces, privacy-preserving analytics, bounded agentic automation, and open cross-domain benchmarks.
Significance. If the taxonomy, patterns, and BASE checklist accurately organize the cited literature without major omissions, the paper provides a useful reference framework that could help researchers and practitioners design secure intelligent networks. The explicit mapping of prototype-heavy evidence and the constructive BASE artifact are strengths that promote more systematic evaluation and reporting; the paper's acknowledgment of open challenges (rather than overclaiming coverage) enhances its value as an organizational synthesis in the cs.CR domain.
minor comments (2)
- [Abstract and Introduction] Abstract and §1: the synthesis claim would be strengthened by briefly describing the literature search strategy, databases queried, and inclusion/exclusion criteria used to select the mapped studies and avoid selection bias.
- [BASE Checklist] BASE checklist section: the checklist items are listed but lack concrete scoring rubrics, example applications to a published prototype, or guidance on weighting the six aspects; adding these would improve usability without altering the central claim.
Simulated Author's Rebuttal
We thank the referee for their positive and constructive review. We are pleased that the taxonomy, integration patterns, and BASE checklist are viewed as useful organizational contributions that can help researchers and practitioners, and that the paper's honest mapping of prototype-heavy evidence is noted as a strength.
Circularity Check
No significant circularity
full rationale
The paper is a literature review synthesizing fragmented work on blockchain-AI security applications. It offers a taxonomy, integration patterns, and the BASE checklist as organizational tools rather than results derived from equations, fitted parameters, or deductive chains. No self-definitional steps, predictions that reduce to inputs, or load-bearing self-citations appear; the central claims are observational mappings of existing evidence with explicit flags for gaps, rendering the synthesis self-contained against external literature.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption The literature on blockchain-AI security for intelligent networks is fragmented across ledger design, AI-driven detection, cyber-physical applications, and agentic workflows.
- ad hoc to paper A taxonomy, reusable integration patterns, and a multi-aspect evaluation checklist can usefully organize the field and guide future work.
invented entities (1)
-
Blockchain-AI Security Evaluation Blueprint (BASE)
no independent evidence
Reference graph
Works this paper leans on
-
[1]
Mostafa Shokry, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, and Ashraf AM Khalaf. Systematic survey of advanced metering infrastructure security: Vulnera- bilities, attacks, countermeasures, and future vision.Future Generation Computer Systems, 136:358–377, 2022
work page 2022
-
[2]
Lizzy Ofusori, Tebogo Bokaba, and Siyabonga Mhlongo. Artificial intelligence in cybersecurity: A comprehensive review and future direction.Applied Artificial Intelligence, 38(1):2439609, 2024
work page 2024
-
[3]
Joy Dutta, Hossien B. Eldeeb, and Tu Dac Ho. Empowering v2x security: In- tegration of poah 2.0 and edge llm in context-aware blockchain ecosystems. In 2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring), pages 1–6, 2025
work page 2025
-
[4]
Blockchain in internet-of-things: Architecture, applications and research directions
Farhan Ahmad, Zeeshan Ahmad, Chaker Abdelaziz Kerrache, Fatih Kurugollu, Asma Adnane, and Ezedin Barka. Blockchain in internet-of-things: Architecture, applications and research directions. In2019 International Conference on Com- puter and Information Sciences (ICCIS), pages 1–6, 2019
work page 2019
-
[5]
Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, and Heba M. Khater. Empowering security operation center with artificial intelligence and machine learning—a systematic literature review.IEEE Access, 13:19162–19197, 2025
work page 2025
-
[6]
Habib Ur Rehman, Nishara Nizamuddin, and Ala Al-Fuqaha
Khaled Salah, M. Habib Ur Rehman, Nishara Nizamuddin, and Ala Al-Fuqaha. Blockchain for ai: Review and open research challenges.IEEE Access, 7:10127– 10149, 2019
work page 2019
-
[7]
Joy Dutta, Hossien Eldeeb, and Tu Dac Ho. Advanced ehealth with explainable ai: Secured by blockchain with ai-empowered block sensitivity for adaptive au- thentication. In2024 IEEE 35th Annual International Symposium on Personal, 44 J. Dutta et al. Indoor and Mobile Radio Communications (PIMRC), pages 1–7, Valencia, Spain,
-
[8]
Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, and Heba M. Khater. Blockchain-powered secure and scalable threat intel- ligence system with graph convolutional autoencoder and reinforcement learning feedback loop.IEEE Access, 13:24736–24748, 2025
work page 2025
-
[9]
Adedoyin A. Hussain and Fadi Al-Turjman. Artificial intelligence and blockchain: A review.Transactions on Emerging Telecommunications Technolo- gies, 32(9):e4268, 2021
work page 2021
-
[10]
Next generation healthcare with explainable ai: Iomt-edge-cloud based advanced ehealth
Joy Dutta, Deepak Puthal, and Chan Yeob Yeun. Next generation healthcare with explainable ai: Iomt-edge-cloud based advanced ehealth. InIEEE GLOBECOM 2023, Kuala Lumpur, Malaysia, 2023. IEEE
work page 2023
-
[11]
Abir Raza, Elarbi Badidi, Mohammad Hayajneh, Ezedin Barka, and Omar El Harrouss. Blockchain-based reputation and trust management for smart grids, healthcare, and transportation: A review.IEEE Access, 12:196887–196913, 2024
work page 2024
-
[12]
Eldeeb, Shimaa Naser, Lina Bariah, Sami Muhaidat, and Murat Uysal
Hossien B. Eldeeb, Shimaa Naser, Lina Bariah, Sami Muhaidat, and Murat Uysal. Digital twin-assisted OWC: Toward smart and autonomous 6G networks.IEEE Network, 38(6):153–162, 2024
work page 2024
-
[13]
Yanjun Zuo. Exploring the synergy: Ai enhancing blockchain, blockchain empow- ering ai, and their convergence across iot applications and beyond.IEEE Internet of Things Journal, 12(6):6171–6195, 2025
work page 2025
-
[14]
Dalila Ressi, Riccardo Romanello, Carla Piazza, and Sabina Rossi. Ai-enhanced blockchain technology: A review of advancements and opportunities.Journal of Network and Computer Applications, 225:103858, 2024
work page 2024
-
[15]
A survey of blockchain consensus protocols
Jie Xu, Cong Wang, and Xiaohua Jia. A survey of blockchain consensus protocols. ACM Comput. Surv., 55(13s), July 2023
work page 2023
-
[16]
Joy Dutta and Deepak Puthal. Poah 2.0: Ai-empowered dynamic authentication based adaptive blockchain consensus for iomt-edge workflow.Future Generation Computer Systems, 160:129–142, 2024
work page 2024
-
[17]
Richard Yu, Peng Zhang, Zhiwei Sun, Weixin Xie, and Xiang Peng
Xiaoqiang Sun, F. Richard Yu, Peng Zhang, Zhiwei Sun, Weixin Xie, and Xiang Peng. A survey on zero-knowledge proof in blockchain.IEEE Network, 35(4):198– 205, 2021
work page 2021
-
[18]
Worrall, Ben Merriman, Jonathan Gilmore, Nick Kitchener, and Salvador E
Marcos Allende, Diego L´ opez Le´ on, Sergio Cer´ on, Adri´ an Pareja, Erick Pacheco, Antonio Leal, Marcelo Da Silva, Alejandro Pardo, Duncan Jones, David J. Worrall, Ben Merriman, Jonathan Gilmore, Nick Kitchener, and Salvador E. Venegas-Andraca. Quantum-resistance in blockchain networks.Scientific Re- ports, 13(1):5664, 2023
work page 2023
-
[19]
Brandon Liew Yi Quan, Nur Haliza Abdul Wahab, Arafat Al-Dhaqm, Ahmad Al- shammari, Ali Aqarni, Shukor Abd Razak, and Koh Tieng Wei. Recent advances in sharding techniques for scalable blockchain networks: A review.IEEE Access, 13:21335–21366, 2025
work page 2025
-
[20]
Towards blockchain interoperability: A comprehensive survey on cross-chain solutions
Wenqing Li, Zhenguang Liu, Jianhai Chen, Zhe Liu, and Qinming He. Towards blockchain interoperability: A comprehensive survey on cross-chain solutions. Blockchain: Research and Applications, page 100286, 2025
work page 2025
-
[21]
A survey on on- chain-off-chain scalability in blockchain
Chiedu Charles Chiedu, Keke Gai, Yihang Wei, and Kai Ding. A survey on on- chain-off-chain scalability in blockchain. In2025 IEEE 11th Conference on Big Data Security on Cloud (BigDataSecurity), pages 71–82, 2025
work page 2025
-
[22]
Wei Liang, Yaqin Liu, Ce Yang, Songyou Xie, Kuanching Li, and Willy Susilo. On identity, transaction, and smart contract privacy on permissioned and permis- sionless blockchain: A comprehensive survey.ACM Comput. Surv., 56(12), July 2024. Blockchain and AI for Intelligent Network Security 45
work page 2024
-
[23]
Role-based access control in private blockchain for iot integrated smart contract
Darwish Al Neyadi, Deepak Puthal, Joy Dutta, and Ernesto Damiani. Role-based access control in private blockchain for iot integrated smart contract. InIFIP IoT 2023, Texas, USA, 2023. Springer
work page 2023
-
[24]
Zainab Husain, Joy Dutta, Shakti Singh, Rabeb Mizouni, Tarek H.M. El-Fouly, and Hadi Otrok. Context-aware energy auctions on blockchain for mobile ev charging.Sustainable Cities and Society, page 106548, 2025
work page 2025
-
[25]
Sadaf Azimi, Ali Golzari, Naghmeh Ivaki, and Nuno Laranjeiro. A systematic re- view on smart contracts security design patterns.Empirical Software Engineering, 30(4):95, 2025
work page 2025
-
[26]
Fernando Richter Vidal, Naghmeh Ivaki, and Nuno Laranjeiro. Vulnerability detection techniques for smart contracts: A systematic literature review.Journal of Systems and Software, 217:112160, 2024
work page 2024
-
[27]
Self-sovereign identity: A systematic review, mapping and taxonomy.Sensors, 22(15):5641, 2022
Frederico Schardong and Ricardo Cust´ odio. Self-sovereign identity: A systematic review, mapping and taxonomy.Sensors, 22(15):5641, 2022
work page 2022
- [28]
-
[29]
Vincent Charles, Ali Emrouznejad, and Tatiana Gherman. A critical analysis of the integration of blockchain and artificial intelligence for supply chain.Annals of Operations Research, 327(1):7–47, 2023
work page 2023
-
[30]
Ohize, Adeiza James Onumanyi, Buhari U
Henry O. Ohize, Adeiza James Onumanyi, Buhari U. Umar, Lukman A. Ajao, Rabiu O. Isah, Eustace M. Dogo, Bello K. Nuhu, Olayemi M. Olaniyi, James G. Ambafi, Vincent B. Sheidu, and Muhammad M. Ibrahim. Blockchain for secur- ing electronic voting systems: a survey of architectures, trends, solutions, and challenges.Cluster Computing, 28(2):132, 2024
work page 2024
-
[31]
Alrayes, Mohammed Zakariah, Syed Umar Amin, Zafar Iqbal Khan, and Maha Helal
Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, Zafar Iqbal Khan, and Maha Helal. Intrusion detection in iot systems using denoising autoencoder. IEEE Access, 12:122401–122425, 2024
work page 2024
-
[32]
Wael Issa, Nour Moustafa, Benjamin Turnbull, Nasrin Sohrabi, and Zahir Tari. Blockchain-based federated learning for securing internet of things: A comprehen- sive survey.ACM Comput. Surv., 55(9), January 2023
work page 2023
-
[33]
Privacy-aware adaptive collaborative learning approach for distributed edge networks
Saeed Alqubaisi, Deepak Puthal, Joy Dutta, and Ernesto Damiani. Privacy-aware adaptive collaborative learning approach for distributed edge networks. InIEEE DSAA 2023, Thessaloniki, Greece, 2023. IEEE
work page 2023
-
[34]
Sunday Adeola Ajagbe, Joseph Bamidele Awotunde, and Hector Florez. Intru- sion detection: A comparison study of machine learning models using unbalanced dataset.SN Computer Science, 5(8):1028, 2024
work page 2024
-
[35]
Wenjie Liu, Pengfei Lei, Dong Xu, and Xiaorong Zhu. Anomaly recognition, diagnosis and prediction of massive data flow based on time-gan and dbscan for power dispatching automation system.Processes, 11(9), 2023
work page 2023
-
[36]
Zhaoxin Zhang Gang Long. Punet: A semi-supervised anomaly detection model for network anomaly detection based on positive unlabeled data.Computers, Materials & Continua, 81(1):327–343, 2024
work page 2024
-
[37]
Time series analysis and anomaly detection for trustworthy smart homes.Comput
Ishaani Priyadarshini, Ahmed Alkhayyat, Anita Gehlot, and Raghvendra Kumar. Time series analysis and anomaly detection for trustworthy smart homes.Comput. Electr. Eng., 102(C), September 2022
work page 2022
-
[38]
Md. Shadman Wasif, Md. Palash Miah, Md. Shohrab Hossain, Mohammed J.F. Alenazi, and Mohammed Atiquzzaman. Cnn-vit synergy: An efficient android malware detection approach through deep learning.Computers and Electrical Engineering, 123:110039, 2025. 46 J. Dutta et al
work page 2025
-
[39]
Eldeeb, Anshul Pandey, and Sami Muhaidat
Brahim Mefgouda, Raviha Khan, Omar Alhussein, Hani Saleh, Hossien B. Eldeeb, Anshul Pandey, and Sami Muhaidat. LPUF-authnet: A lightweight PUF-based IoT authentication via tandem neural networks and split learning. In2024 IEEE Globecom Workshops (GC Wkshps), pages 1–7, 2024
work page 2024
-
[40]
Nitu Dash, Sujata Chakravarty, Amiya Kumar Rath, Nimay Chandra Giri, Ka- reem M. AboRas, and N. Gowtham. An optimized lstm-based deep learning model for anomaly network intrusion detection.Scientific Reports, 15(1):1554, 2025
work page 2025
-
[41]
Hamza Kheddar. Transformers and large language models for efficient intru- sion detection systems: A comprehensive survey.Information Fusion, 124:103347, 2025
work page 2025
-
[42]
Hasan Torabi, Seyedeh Leili Mirtaheri, and Sergio Greco. Practical autoencoder based anomaly detection by using vector reconstruction error.Cybersecurity, 6(1):1, 2023
work page 2023
-
[43]
Deep q- learning based reinforcement learning approach for network intrusion detection
Hooman Alavizadeh, Hootan Alavizadeh, and Julian Jang-Jaccard. Deep q- learning based reinforcement learning approach for network intrusion detection. Computers, 11(3), 2022
work page 2022
-
[44]
Salvo Finistrella, Stefano Mariani, and Franco Zambonelli. Multi-agent reinforce- ment learning for cybersecurity: Classification and survey.Intelligent Systems with Applications, 26:200495, 2025
work page 2025
-
[45]
Kyriakopoulos, Siˆ an Jenkins, Iain Phillips, and Tim Dudman
Tom Purves, Konstantinos G. Kyriakopoulos, Siˆ an Jenkins, Iain Phillips, and Tim Dudman. Causally aware reinforcement learning agents for autonomous cyber defence.Knowledge-Based Systems, 304:112521, 2024
work page 2024
-
[46]
Zhisheng Hu, Minghui Zhu, Ping Chen, and Peng Liu. On convergence rates of game theoretic reinforcement learning algorithms.Automatica, 104:90–101, 2019
work page 2019
-
[47]
Renato Marinho and Raimir Holanda. Automated emerging cyber threat iden- tification and profiling based on natural language processing.IEEE Access, 11:58915–58936, 2023
work page 2023
-
[48]
Hailiang Tang, Dawei Lin, Wanyu Li, Wenxiao Zhang, and Jun Zhao. Cyber threat indicators extraction based on contextual knowledge prompt.Computer Networks, 254:110839, 2024
work page 2024
-
[49]
Hsinchun Chen, Sagar Samtani, Yidong Zhu, and L-C. Wang. Cross-lingual cy- bersecurity analytics in the international dark web with adversarial deep repre- sentation learning.MIS Quarterly, 45(4):1699–1736, 2021
work page 2021
-
[50]
Fahad Alqurashi and Istiak Ahmad. A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling.Alexandria Engi- neering Journal, 107:374–389, 2024
work page 2024
-
[51]
Wafa Al-khuzaie, Norah Al-harthi, Abeer Al-harthi, Alanoud Al-subaie, and Nora Al-humaid. A survey on sentiment and emotion analysis for dark web and cyber- security applications.Frontiers in Big Data, 4:601529, 2021
work page 2021
-
[52]
Ismayil Hasanov, Seppo Virtanen, Antti Hakkala, and Jouni Isoaho. Application of large language models in cybersecurity: A systematic literature review.IEEE Access, 12:176751–176778, 2024
work page 2024
-
[53]
Asif Shahriar, Syed Jarullah Hisham, K. M. Asifur Rahman, Ruhan Islam, Md. Shohrab Hossain, Ren-Hung Hwang, and Ying-Dar Lin. 5gpt: 5g vulner- ability detection by combining zero-shot capabilities of gpt-4 with domain aware strategies through prompt engineering.IEEE Transactions on Information Foren- sics and Security, 20:7045–7060, 2025
work page 2025
-
[54]
Hamed Meshkin, Joel Zirkle, Ghazal Arabidarrehdor, Anik Chaturbedi, Shilpa Chakravartula, John Mann, Bradlee Thrasher, and Zhihua Li. Harnessing large Blockchain and AI for Intelligent Network Security 47 language models’ zero-shot and few-shot learning capabilities for regulatory re- search.Briefings in Bioinformatics, 25(5):bbae354, 08 2024
work page 2024
-
[55]
Fahad Al-mekhlafi, Bander Ali Saleh Al-rimy, Ishak Bin Aris, N. Z. Jhanjhi, and Mamoona Humayun. Sentiment and emotion analysis from dark web text for cyber threat intelligence: A review, 2025
work page 2025
-
[56]
When llms meet cybersecurity: a systematic literature review.Cybersecurity, 8(1):55, 2025
Jie Zhang, Haoyu Bu, Hui Wen, Yongji Liu, Haiqiang Fei, Rongrong Xi, Lun Li, Yun Yang, Hongsong Zhu, and Dan Meng. When llms meet cybersecurity: a systematic literature review.Cybersecurity, 8(1):55, 2025
work page 2025
-
[57]
Agir: Automating cyber threat intelligence reporting with natural language gen- eration
Filippo Perrina, Francesco Marchiori, Mauro Conti, and Nino Vincenzo Verde. Agir: Automating cyber threat intelligence reporting with natural language gen- eration. In2023 IEEE International Conference on Big Data (BigData), pages 979–984, Sorrento, Italy, 2023. IEEE, IEEE.$31.00©2023 IEEE
work page 2023
-
[58]
Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Ab- dechakour Mechri, Norbert Tihanyi, Tamas Bisztray, and Merouane Debbah. Generative ai in cybersecurity: A comprehensive review of llm applications and vulnerabilities.Internet of Things and Cyber-Physical Systems, 5:1–46, 2025
work page 2025
-
[59]
Actionable Cy- ber Threat Intelligence Using Knowledge Graphs and Large Language Models
Romy Fieblinger, Md Tanvirul Alam, and Nidhi Rastogi. Actionable Cy- ber Threat Intelligence Using Knowledge Graphs and Large Language Models . In2024 IEEE European Symposium on Security and Privacy Workshops (Eu- roS&PW), pages 100–111, Los Alamitos, CA, USA, July 2024. IEEE Computer Society
work page 2024
-
[60]
Prompting large language models for counterfactual generation: An empirical study
Yongqi Li, Mayi Xu, Xin Miao, Shen Zhou, and Tieyun Qian. Prompting large language models for counterfactual generation: An empirical study. arXiv preprint arXiv:2305.14791v2, 2024. Version 2, posted 23 February 2024
-
[61]
Pierre V. Dantas, Lucas C. Cordeiro, and Waldir S. S. Junior. A review of state-of- the-art techniques for large language model compression.Complex & Intelligent Systems, 11(9):407, 2025
work page 2025
-
[62]
Karthick Shankar, Pengcheng Wang, Ran Xu, Ashraf Mahgoub, and Somali Chaterji. Janus: Benchmarking commercial and open-source cloud and edge plat- forms for object and anomaly detection workloads. In2020 IEEE 13th Interna- tional Conference on Cloud Computing (CLOUD), pages 590–599, 2020
work page 2020
-
[63]
Zeju Cai, Jianguo Chen, Yuting Fan, Zibin Zheng, and Keqin Li. Blockchain- empowered federated learning: Benefits, challenges and solutions.IEEE Trans- actions on Big Data, 2025
work page 2025
-
[64]
Federated and edge learning for large language models.Information Fusion, 117:102840, 2025
Francesco Piccialli, Diletta Chiaro, Pian Qi, Valerio Bellandi, and Ernesto Dami- ani. Federated and edge learning for large language models.Information Fusion, 117:102840, 2025
work page 2025
-
[65]
Badr, Mohamed Baza, and Hani Alshahrani
Ali Alshehri, Mahmoud M. Badr, Mohamed Baza, and Hani Alshahrani. Deep anomaly detection framework utilizing federated learning for electricity theft zero- day cyberattacks.Sensors, 24(10), 2024
work page 2024
-
[66]
From llm reasoning to autonomous ai agents: A comprehensive review, 2025
Mohamed Amine Ferrag, Norbert Tihanyi, and Merouane Debbah. From llm reasoning to autonomous ai agents: A comprehensive review, 2025
work page 2025
-
[67]
A survey of agentic ai and cybersecurity: Challenges, opportunities and use-case prototypes, 2026
Sahaya Jestus Lazer, Kshitiz Aryal, Maanak Gupta, and Elisa Bertino. A survey of agentic ai and cybersecurity: Challenges, opportunities and use-case prototypes, 2026
work page 2026
- [68]
-
[69]
A hybrid ai-blockchain security framework for smart grids.Scientific Reports, 15(1):20882, 2025
Yazeed Yasin Ghadi, Tehseen Mazhar, Tariq Shahzad, Ines Hilali Jaghdam, San- war Khan, Muhammad Amir Khan, and Habib Hamam. A hybrid ai-blockchain security framework for smart grids.Scientific Reports, 15(1):20882, 2025
work page 2025
-
[70]
Mahmoud Elkhodr. An ai-driven framework for integrated security and privacy in internet of things using quantum-resistant blockchain.Future Internet, 17(6), 2025
work page 2025
-
[71]
Rajesh Kumar and Rewa Sharma. Ai-driven dynamic trust management and blockchain-based security in industrial iot.Computers and Electrical Engineering, 123:110213, 2025
work page 2025
-
[72]
Lampis Alevizos. Automated cybersecurity compliance and threat response using ai, blockchain and smart contracts.International Journal of Information Tech- nology, 17(2):767–781, 2025
work page 2025
-
[73]
Mohammad Ikbal Hossain, Tanja Steigner, Muhammad Imam Hussain, and Afroja Akther. Enhancing data integrity and traceability in industry cyber phys- ical systems (icps) through blockchain technology: A comprehensive approach. arXiv preprint arXiv:2405.04837, 2024. Cross-listed from cs.CR and eess.SY
- [74]
-
[75]
Yue Yao, Xiaomei Zhang, Haomin Hu, Huibin Liu, Rong Huang, and Zejie Wang. Blockchain-based multistage continuous authentication for smart devices.Applied Sciences, 13(23), 2023
work page 2023
-
[76]
Using blockchain ledgers to record ai decisions in iot.IoT, 6(3), 2025
Vikram Kulothungan. Using blockchain ledgers to record ai decisions in iot.IoT, 6(3), 2025
work page 2025
-
[77]
A Composable Game-Theoretic Framework for Blockchains
Zeta Avarikioti, Georg Fuchsbauer, Pim Keer, Matteo Maffei, and Fabian Re- gen. A composable game-theoretic framework for blockchains. arXiv preprint arXiv:2504.18214, 2025. Submitted 25 April 2025
work page internal anchor Pith review Pith/arXiv arXiv 2025
-
[78]
Jes´ us Rosa-Bilbao, Juan Boubeta-Puig, and Adrian Rutle. Cepedaloco: An event-driven architecture for integrating complex event processing and blockchain through low-code.Internet of Things, 22:100802, 2023
work page 2023
-
[79]
Abir El Akhdar, Chafik Baidada, Ali Kartit, Mohamed Hanine, Carlos Osorio Garc´ ıa, Roberto Garcia Lara, and Imran Ashraf. Exploring the potential of mi- croservices in internet of things: A systematic review of security and prospects. Sensors, 24(20), 2024
work page 2024
-
[80]
Ai for devsecops: A landscape and future opportunities
Michael Fu, Jirat Pasuksmit, and Chakkrit Tantithamthavorn. Ai for devsecops: A landscape and future opportunities. arXiv preprint arXiv:2404.04839v2, 2024. Version 2, last revised September 13, 2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.