pith. machine review for the scientific record. sign in

arxiv: 2605.10515 · v1 · submitted 2026-05-11 · 💻 cs.CR · cs.AI· cs.DC

Recognition: 1 theorem link

· Lean Theorem

SoK: A Systematic Bidirectional Literature Review of AI & DLT Convergence

Authors on Pith no claims yet

Pith reviewed 2026-05-12 04:57 UTC · model grok-4.3

classification 💻 cs.CR cs.AIcs.DC
keywords layersapplicationdataexecutionmodelacrossai-enhancedaround
0
0 comments X

The pith

A systematic review of AI-DLT convergence finds research clustered on execution/consensus layers for AI-to-DLT and data/model layers for DLT-to-AI, with no demonstrated production-scale deployments and calls for cross-layer co-design.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The authors split the topic into two directions. First, how AI can make blockchains and similar ledgers better at handling data, networks, reaching agreement, running code, and applications. Second, how ledgers can help AI systems with their infrastructure, data handling, model training, running inferences, and applications, including federated learning and multi-agent setups. They reviewed papers from 2020 to 2025 and mapped them onto these layers. The mapping showed most effort goes into only a few layers on each side, while others get little attention. Even where improvements are reported, they come from controlled tests rather than real large-scale use. The review concludes that the field still lacks solid answers on scaling, making different systems work together, and proving that code ran correctly.

Core claim

The analysis reveals that most works concentrate on a small subset of layers: execution and consensus for AI-enhanced DLT, data and model for DLT-enhanced AI. Other layers remain comparatively neglected. Despite reported improvements in controlled settings, no study demonstrates deployment at production scale, and the field has not yet offered satisfying answers to fundamental questions around scalability, interoperability, and verifiable execution.

Load-bearing premise

That the chosen time window (2020-2025), peer-reviewed sources, and the five-layer taxonomies for each direction sufficiently capture the architectural interplay without missing major contributions or imposing an artificial structure that distorts the literature.

Figures

Figures reproduced from arXiv: 2605.10515 by Abylay Satybaldy, Ali Irzam Kathia, Marco Alberto Javarone, Nikhil Vadgama, Paolo Tasca, Yimika Erinle.

Figure 1
Figure 1. Figure 1: Distribution of reviewed studies by enhanced layer across the two directions of AI–DLT [PITH_FULL_IMAGE:figures/full_fig_p012_1.png] view at source ↗
read the original abstract

The integration of Artificial Intelligence (AI) with Distributed Ledger Technology (DLT) has become a growing research area, yet contributions tend to cluster around specific application domains or examine only one direction of the integration, leaving the broader architectural interplay between the two technologies poorly understood. This work addresses that gap through a structured, bidirectional review of peer-reviewed studies published between 2020 and 2025. We classify contributions along two directions: AI-enhanced DLT, and DLT-enhanced AI. In the first case, we examine how AI techniques improve DLT systems across five layers: data, network, consensus, execution, and application layers. In the second case, we analyse how DLT supports AI systems across five layers: infrastructure, data, model, inference, and application layers, with particular attention to federated learning, model evaluation, and multi-agent coordination. The analysis reveals that most works concentrate on a small subset of layers: execution and consensus for AI-enhanced DLT, data and model for DLT-enhanced AI. Other layers remain comparatively neglected. Despite reported improvements in controlled settings, no study demonstrates deployment at production scale, and the field has not yet offered satisfying answers to fundamental questions around scalability, interoperability, and verifiable execution. We argue that progress will require cross-layer co-design and empirical validation in real-world settings.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

3 major / 0 minor

Summary. The manuscript presents a systematization of knowledge (SoK) via a bidirectional structured literature review of peer-reviewed AI-DLT papers from 2020-2025. It classifies contributions into AI-enhanced DLT (five layers: data, network, consensus, execution, application) and DLT-enhanced AI (five layers: infrastructure, data, model, inference, application), with emphasis on federated learning and multi-agent systems. The central claims are that works concentrate on execution/consensus and data/model layers respectively, other layers are neglected, no studies show production-scale deployment despite controlled-setting gains, and the field lacks answers on scalability, interoperability, and verifiable execution, calling for cross-layer co-design.

Significance. If the methodological foundations hold, the review would usefully map the AI-DLT landscape, identify under-explored architectural layers, and underscore the controlled-vs-real-world gap. This could steer the community toward empirical validation and integrated designs rather than isolated layer improvements.

major comments (3)
  1. [Abstract and layer taxonomy descriptions] The concentration claims and 'neglected layers' conclusion rest on the five-layer taxonomies for each direction. The manuscript does not indicate whether these partitions are taken from prior standards or defined ad hoc, nor does it specify disambiguation rules for papers that span multiple layers or how subjective assignment was mitigated. This renders the reported distributions sensitive to the chosen structure and potentially artifactual.
  2. [Abstract (methodology description)] The abstract states a 'structured, bidirectional review' with a time-bounded search (2020-2025) on peer-reviewed sources, yet supplies no search strings, queried databases, inclusion/exclusion criteria, or inter-rater reliability statistics. These omissions directly undermine the reliability of the layer-concentration statistics and the assertion that other layers remain comparatively neglected.
  3. [Abstract and conclusions] The claim that 'no study demonstrates deployment at production scale' is load-bearing for the maturity assessment but lacks an explicit, reproducible definition of 'production scale' versus 'controlled settings.' Without stated criteria (e.g., user base, transaction volume, or deployment duration thresholds), the conclusion cannot be independently verified.

Simulated Author's Rebuttal

3 responses · 0 unresolved

We thank the referee for the constructive and detailed feedback. The comments highlight important areas for improving transparency and rigor in our SoK. We address each major comment point by point below, with plans for revisions where appropriate.

read point-by-point responses
  1. Referee: [Abstract and layer taxonomy descriptions] The concentration claims and 'neglected layers' conclusion rest on the five-layer taxonomies for each direction. The manuscript does not indicate whether these partitions are taken from prior standards or defined ad hoc, nor does it specify disambiguation rules for papers that span multiple layers or how subjective assignment was mitigated. This renders the reported distributions sensitive to the chosen structure and potentially artifactual.

    Authors: The taxonomies synthesize standard architectural models from the DLT literature (data, network, consensus, execution, and application layers, as commonly referenced in blockchain surveys) and AI systems (infrastructure, data, model, inference, and application). They are not taken verbatim from any single prior standard but adapted to support the bidirectional analysis. We will add a dedicated subsection in the revised manuscript that (1) traces the rationale for each layer to established references, (2) states explicit disambiguation rules (primary contribution determines the layer; multi-layer papers are flagged and counted separately with discussion), and (3) describes the mitigation of subjectivity (independent classification by two authors on a 20% sample, followed by consensus discussion for the full set). These additions will make the layer distributions and 'neglected layers' conclusion more robust and reproducible. revision: yes

  2. Referee: [Abstract (methodology description)] The abstract states a 'structured, bidirectional review' with a time-bounded search (2020-2025) on peer-reviewed sources, yet supplies no search strings, queried databases, inclusion/exclusion criteria, or inter-rater reliability statistics. These omissions directly undermine the reliability of the layer-concentration statistics and the assertion that other layers remain comparatively neglected.

    Authors: We acknowledge that the submitted manuscript does not fully document these elements. The review was performed with a structured protocol, but the details were not included in the text. In the revision we will add a methodology subsection that lists the search strings (combinations such as 'artificial intelligence' AND 'distributed ledger' OR 'blockchain' with layer-specific terms), the databases queried (IEEE Xplore, ACM Digital Library, SpringerLink, ScienceDirect, and arXiv cross-checked against peer-reviewed versions), explicit inclusion/exclusion criteria (peer-reviewed English-language papers 2020-2025 focused on AI-DLT integration), and inter-rater reliability (Cohen's kappa for layer assignments). A brief summary of the protocol will also be added to the abstract. This will directly strengthen the reliability of the reported distributions. revision: yes

  3. Referee: [Abstract and conclusions] The claim that 'no study demonstrates deployment at production scale' is load-bearing for the maturity assessment but lacks an explicit, reproducible definition of 'production scale' versus 'controlled settings.' Without stated criteria (e.g., user base, transaction volume, or deployment duration thresholds), the conclusion cannot be independently verified.

    Authors: We agree that an explicit definition is necessary. In the revised manuscript we will define 'production scale' operationally as a live deployment meeting all three thresholds: (i) at least 500 distinct real-world users, (ii) sustained average daily volume of 1,000+ transactions or model inferences, and (iii) continuous operation for at least three months outside testnets or simulations. We will re-evaluate the surveyed papers against these criteria, report any borderline cases, and confirm that none satisfy the definition. This will make the maturity assessment verifiable while preserving the original observation. revision: yes

Circularity Check

0 steps flagged

No circularity: observational synthesis from external literature

full rationale

The paper is a systematization of knowledge review that classifies peer-reviewed external studies (2020-2025) according to explicitly stated five-layer taxonomies for AI-enhanced DLT and DLT-enhanced AI. Central claims about layer concentration, absence of production-scale deployments, and open questions on scalability are direct observational aggregates drawn from the reviewed corpus, with no equations, fitted parameters, predictions, or derivations present. No load-bearing self-citations, self-definitional loops, or reductions of results to inputs by construction occur; the methodology is self-contained against the external literature base.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 0 invented entities

As a literature review the central claims rest on the completeness of the paper selection process and the appropriateness of the chosen layer taxonomies; no free parameters or invented entities are introduced.

axioms (2)
  • domain assumption The five layers defined for AI-enhanced DLT (data, network, consensus, execution, application) and for DLT-enhanced AI (infrastructure, data, model, inference, application) form a valid and exhaustive classification scheme.
    Invoked throughout the abstract to structure the analysis and identify neglected layers.
  • domain assumption Peer-reviewed publications from 2020-2025 provide a representative sample of the AI-DLT research landscape.
    Basis for the time-bounded systematic review and the claims about concentration and scale.

pith-pipeline@v0.9.0 · 5568 in / 1546 out tokens · 62569 ms · 2026-05-12T04:57:44.150157+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

102 extracted references · 102 canonical work pages

  1. [1]

    Proof- of-learning: A blockchain consensus mechanism based on machine learning competitions,

    F. Bravo-Marquez, S. Reeves, and M. Ugarte, “Proof- of-learning: A blockchain consensus mechanism based on machine learning competitions,” inProc. IEEE Int’l Conf. on Decentralized Applications and Infrastructures (DAPPCON). IEEE, 2019, pp. 119–124

  2. [2]

    A survey on zero-knowledge machine learning,

    Z. Liet al., “A survey on zero-knowledge machine learning,”arXiv preprint arXiv:2501.01234, 2025

  3. [3]

    Ai verification on blockchain: Conver- gence of zero-knowledge proofs and oracles,

    N. Jagannath, “Ai verification on blockchain: Conver- gence of zero-knowledge proofs and oracles,” 2025

  4. [4]

    Blockchain-enabled federated learning: A comprehensive survey,

    Y . Quet al., “Blockchain-enabled federated learning: A comprehensive survey,”IEEE Access, 2022

  5. [5]

    Blockchain-based federated learning for securing inter- net of things: A comprehensive survey,

    W. Issa, N. Moustafa, B. Turnbull, N. Sohrabi, and Z. Tari, “Blockchain-based federated learning for securing inter- net of things: A comprehensive survey,”ACM Computing Surveys, vol. 55, no. 9, pp. 191:1–191:37, 2023

  6. [6]

    Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions,

    J. Zhu, J. Cao, D. Saxena, S. Jiang, and H. Ferradi, “Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions,”ACM Computing Surveys, vol. 55, no. 11, 11 2023. [Online]. Available: https://dl.acm.org/doi/pdf/10.1145/3570953

  7. [7]

    Ai agents meet blockchain: A survey on secure and scalable collaboration for multi-agents,

    M. M. Karim, D. H. Van, S. Khan, Q. Qu, and Y . Kholodov, “Ai agents meet blockchain: A survey on secure and scalable collaboration for multi-agents,” Future Internet, vol. 17, no. 2, p. 57, 2025

  8. [8]

    Architecture of automated crypto-finance agent,

    A. Raheman, A. Kolonin, B. Goertzel, G. Hegykozi, and I. Ansari, “Architecture of automated crypto-finance agent,” inInt’l Symposium on Knowledge, Ontology and Theory (KNOTH), 2021, pp. 10–14

  9. [9]

    (2024) Bittensor: A peer-to- peer intelligence market

    Bittensor Foundation. (2024) Bittensor: A peer-to- peer intelligence market. [Online]. Available: https: //bittensor.com/whitepaper

  10. [10]

    The evolution and design of digital economies,

    F. Foundation, “The evolution and design of digital economies,” https://fetch.ai/blog/ fetch-ai-economics-white-paper, 2018, accessed August 2025

  11. [11]

    Singularitynet: A decentralized ai net- work (whitepaper),

    S. Foundation, “Singularitynet: A decentralized ai net- work (whitepaper),” whitepaper, 2018

  12. [12]

    BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence,

    S. K. Singh, S. Rathore, and J. H. Park, “BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence,”Future Generation Computer Systems, vol. 110, pp. 721–743, 9 2020. [Online]. Available: https://www.sciencedirect. com/science/article/pii/S0167739X19316474

  13. [13]

    Blockchain-enabled Federated Learning: A Survey,

    Y . Qu, M. P. Uddin, C. Gan, Y . Xiang, L. Gao, and J. Yearwood, “Blockchain-enabled Federated Learning: A Survey,”ACM Computing Surveys, vol. 55, no. 4, p. 70, 4 2022. [Online]. Available: https://dl.acm.org/doi/ pdf/10.1145/3524104

  14. [14]

    Systematic Review on AI- Blockchain Based E-Healthcare Records Management Systems,

    A. Haddad, M. H. Habaebi, M. R. Islam, N. F. Has- bullah, and S. A. Zabidi, “Systematic Review on AI- Blockchain Based E-Healthcare Records Management Systems,”IEEE Access, vol. 10, pp. 94 583–94 615, 2022

  15. [15]

    Blockchain for AI: Review and open research challenges,

    K. Salah, M. H. U. Rehman, N. Nizamuddin, and A. Al- Fuqaha, “Blockchain for AI: Review and open research challenges,”IEEE Access, vol. 7, pp. 10 127–10 149, 2019

  16. [16]

    Convergence of Distributed Ledger Technologies with Digital Twins, IoT, and AI for fresh food logistics: Challenges and opportunities,

    J. L. Vilas-Boas, J. J. Rodrigues, and A. M. Alberti, “Convergence of Distributed Ledger Technologies with Digital Twins, IoT, and AI for fresh food logistics: Challenges and opportunities,”Journal of Industrial Information Integration, vol. 31, p. 100393, 2 2023. [Online]. Available: https://www.sciencedirect. com/science/article/pii/S2452414X22000607

  17. [17]

    Influences of artificial intelligence and blockchain technology on financial resilience of supply chains,

    S. Gupta, S. Modgil, T. M. Choi, A. Kumar, and J. Antony, “Influences of artificial intelligence and blockchain technology on financial resilience of supply chains,”International Journal of Production Economics, vol. 261, p. 108868, 7 2023. [Online]. Available: https://www.sciencedirect.com/science/article/ pii/S0925527323001007

  18. [18]

    Artificial intelligence for the metaverse: A survey,

    T. Huynh-The, Q. V . Pham, X. Q. Pham, T. T. Nguyen, Z. Han, and D. S. Kim, “Artificial intelligence for the metaverse: A survey,”Engineering Applications of Artificial Intelligence, vol. 117, p. 105581, 1

  19. [19]

    Available: https://www.sciencedirect

    [Online]. Available: https://www.sciencedirect. com/science/article/pii/S0952197622005711

  20. [20]

    AI-enhanced blockchain technology: A review of advancements and opportunities,

    D. Ressi, R. Romanello, C. Piazza, and S. Rossi, “AI-enhanced blockchain technology: A review of advancements and opportunities,”Journal of Network and Computer Applications, vol. 225, p. 103858, 5 2024. [Online]. Available: https://www.sciencedirect. com/science/article/pii/S1084804524000353

  21. [21]

    DLchain: Blockchain with deep learning as proof-of-useful-work,

    X. Chenli, Z. Liu, Z. Zheng, and Y . Zhou, “DLchain: Blockchain with deep learning as proof-of-useful-work,” inProc. IEEE Int’l Conf. on Blockchain. IEEE, 2021, pp. 266–273

  22. [22]

    Skychain: A deep reinforcement learning-empowered dynamic blockchain sharding system,

    J. Zhang, Z. Hong, X. Qiu, Y . Zhan, S. Guo, and W. Chen, “Skychain: A deep reinforcement learning-empowered dynamic blockchain sharding system,” inProc. IEEE ICCCN, 2020, pp. 1–9

  23. [23]

    Auto-tuning with reinforcement learning for permissioned blockchain systems,

    M. Li, Y . Wang, S. Ma, C. Liu, D. Huo, Y . Wang, and Z. Xu, “Auto-tuning with reinforcement learning for permissioned blockchain systems,”Proceedings of the VLDB Endowment, vol. 16, no. 5, pp. 1000–1012, 2023

  24. [24]

    Permissioned blockchain and deep rein- forcement learning enabled security and energy efficient healthcare internet of things,

    L. Liu and Z. Li, “Permissioned blockchain and deep rein- forcement learning enabled security and energy efficient healthcare internet of things,”Ieee Access, vol. 10, pp. 53 640–53 651, 2022

  25. [25]

    Ai-enabled blockchain: An outlier-aware consensus protocol for blockchain-based iot networks,

    M. Salimitari, M. Joneidi, and M. Chatterjee, “Ai-enabled blockchain: An outlier-aware consensus protocol for blockchain-based iot networks,” in2019 IEEE global communications conference (GLOBECOM). IEEE, 2019, pp. 1–6

  26. [26]

    Predicting blockchain forks with machine learning techniques,

    M. Mohammadi, N. Alikhani, and M. Li, “Predicting blockchain forks with machine learning techniques,”Fu- ture Generation Computer Systems, vol. 137, pp. 12–24, 2022

  27. [27]

    Deep autoencoder ensembles for anomaly detection on blockchain,

    F. Scicchitano, A. Liguori, M. Guarascio, E. Ritacco, and G. Manco, “Deep autoencoder ensembles for anomaly detection on blockchain,” inInternational Symposium on Methodologies for Intelligent Systems. Springer, 2020, pp. 448–456

  28. [28]

    Reinforcement learning- based automated market maker for decentralized ex- changes,

    T. Zhang, B. Li, and X. Wang, “Reinforcement learning- based automated market maker for decentralized ex- changes,”IEEE Transactions on Computational Social Systems, vol. 10, no. 2, pp. 355–367, 2023

  29. [29]

    Blockchain-based federated learning: A survey and new perspectives

    W. Ning, Y . Zhu, C. Song, H. Li, L. Zhu, J. Xie, T. Chen, T. Xu, X. Xu, and J. Gao, “Blockchain-based federated learning: A survey and new perspectives.”Applied Sci- ences (2076-3417), vol. 14, no. 20, 2024

  30. [30]

    A survey on blockchain-based federated learning,

    L. Wu, W. Ruan, J. Hu, and Y . He, “A survey on blockchain-based federated learning,”Future Internet, vol. 15, no. 12, p. 400, 2023

  31. [31]

    Blockchain meets machine learning: a survey,

    S. Kayikci and T. M. Khoshgoftaar, “Blockchain meets machine learning: a survey,”Journal of Big Data, vol. 11, no. 1, p. 9, 2024

  32. [32]

    A survey of blockchain, artificial intelligence, and edge computing for web 3.0,

    J. Zhu, F. Li, and J. Chen, “A survey of blockchain, artificial intelligence, and edge computing for web 3.0,” Computer Science Review, vol. 54, p. 100667, 2024

  33. [33]

    Is your ai truly yours? leveraging blockchain for copyrights, provenance, and lineage,

    Q. Wang, G. Yu, Y . Sai, H. D. Bandara, and S. Chen, “Is your ai truly yours? leveraging blockchain for copyrights, provenance, and lineage,”IEEE Transactions on Services Computing, 2025

  34. [34]

    Toward decentralized intelligence: A systematic literature review of blockchain-enabled ai systems,

    M. S. Al Jasem, T. De Clark, and A. K. Shrestha, “Toward decentralized intelligence: A systematic literature review of blockchain-enabled ai systems,”Information, vol. 16, no. 9, p. 765, 2025

  35. [35]

    Hidden technical debt in machine learn- ing systems,

    D. Sculley, G. Holt, D. Golovin, E. Davydov, T. Phillips, D. Ebner, V . Chaudhary, M. Young, J.-F. Crespo, and D. Dennison, “Hidden technical debt in machine learn- ing systems,”Advances in neural information processing systems, vol. 28, 2015

  36. [36]

    Soft- ware engineering for machine learning: A case study,

    S. Amershi, A. Begel, C. Bird, R. DeLine, H. Gall, E. Ka- mar, N. Nagappan, B. Nushi, and T. Zimmermann, “Soft- ware engineering for machine learning: A case study,” in2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 2019, pp. 291–300

  37. [37]

    In-datacenter performance analysis of a tensor processing unit,

    N. P. Jouppi, C. Young, N. Patil, D. Patterson, G. Agrawal, R. Bajwa, S. Bates, S. Bhatia, N. Boden, A. Borchers et al., “In-datacenter performance analysis of a tensor processing unit,” inProceedings of the 44th annual in- ternational symposium on computer architecture, 2017, pp. 1–12

  38. [38]

    Large scale distributed deep networks,

    J. Dean, G. Corrado, R. Monga, K. Chen, M. Devin, M. Mao, M. Ranzato, A. Senior, P. Tucker, K. Yang et al., “Large scale distributed deep networks,”Advances in neural information processing systems, vol. 25, 2012

  39. [39]

    Why and where: A characterization of data provenance,

    P. Buneman, S. Khanna, and T. Wang-Chiew, “Why and where: A characterization of data provenance,” in International conference on database theory. Springer, 2001, pp. 316–330

  40. [40]

    Automating large-scale data quality verification,

    S. Schelter, D. Lange, P. Schmidt, M. Celikel, F. Biess- mann, and A. Grafberger, “Automating large-scale data quality verification,”Proceedings of the VLDB Endow- ment, vol. 11, no. 12, pp. 1781–1794, 2018

  41. [41]

    Model cards for model reporting,

    M. Mitchell, S. Wu, A. Zaldivar, P. Barnes, L. Vasserman, B. Hutchinson, E. Spitzer, I. D. Raji, and T. Gebru, “Model cards for model reporting,” inProceedings of the conference on fairness, accountability, and transparency, 2019, pp. 220–229

  42. [42]

    Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy,

    R. Gilad-Bachrach, N. Dowlin, K. Laine, K. Lauter, M. Naehrig, and J. Wernsing, “Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy,” inInternational conference on machine learning. PMLR, 2016, pp. 201–210

  43. [43]

    Privacy-preserving deep learning via weight transmission,

    T. T. Phuonget al., “Privacy-preserving deep learning via weight transmission,”IEEE Transactions on Information Forensics and Security, vol. 14, no. 11, pp. 3003–3015, 2019

  44. [44]

    Dignum,Responsible artificial intelligence: how to develop and use AI in a responsible way

    V . Dignum,Responsible artificial intelligence: how to develop and use AI in a responsible way. Springer, 2019, vol. 2156

  45. [45]

    A review on layered architecture and application domains of blockchain technology,

    M. Birje, R. Goudar, C. Rakshitha, and M. T. Tapale, “A review on layered architecture and application domains of blockchain technology,” in2022 International Confer- ence on Electrical, Computer and Energy Technologies (ICECET). IEEE, 2022, pp. 1–5

  46. [46]

    Understanding blockchain: Definitions, architecture, de- sign, and system comparison,

    M. H. Tabatabaei, R. Vitenberg, and N. R. Veeraragavan, “Understanding blockchain: Definitions, architecture, de- sign, and system comparison,”Computer Science Review, vol. 50, p. 100575, 2023

  47. [47]

    A survey on data availability in layer 2 blockchain rollups: Open challenges and future improvements,

    M. B. Saif, S. Migliorini, and F. Spoto, “A survey on data availability in layer 2 blockchain rollups: Open challenges and future improvements,”Future Internet, vol. 16, no. 9, p. 315, 2024

  48. [48]

    A taxonomy of blockchain- based systems for architecture design,

    X. Xu, I. Weber, M. Staples, L. Zhu, J. Bosch, L. Bass, C. Pautasso, and P. Rimba, “A taxonomy of blockchain- based systems for architecture design,” in2017 IEEE international conference on software architecture (ICSA). IEEE, 2017, pp. 243–252

  49. [49]

    Sok: Consensus in the age of blockchains,

    S. Bano, A. Sonnino, M. Al-Bassam, S. Azouvi, P. Mc- Corry, S. Meiklejohn, and G. Danezis, “Sok: Consensus in the age of blockchains,” inProceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019, pp. 183–198

  50. [50]

    A survey of blockchain consensus protocols,

    J. Xu, C. Wang, and X. Jia, “A survey of blockchain consensus protocols,”ACM Computing Surveys, vol. 55, no. 13s, pp. 1–35, 2023

  51. [51]

    A taxonomy for characterizing blockchain systems,

    F. E. Alzhrani, K. A. Saeedi, and L. Zhao, “A taxonomy for characterizing blockchain systems,”IEEE Access, vol. 10, pp. 110 568–110 589, 2022

  52. [52]

    Drawing the boundaries between blockchain and blockchain-like systems: A comprehensive survey on dis- tributed ledger technologies,

    B. Bellaj, A. Ouaddah, E. Bertin, N. Crespi, and A. Mezri- oui, “Drawing the boundaries between blockchain and blockchain-like systems: A comprehensive survey on dis- tributed ledger technologies,”Proceedings of the IEEE, vol. 112, no. 3, pp. 247–299, 2024

  53. [53]

    Taxonomy of blockchain technologies. principles of identification and classifica- tion,

    P. Tasca and C. J. Tessone, “Taxonomy of blockchain technologies. principles of identification and classifica- tion,”arXiv:1708.04872, 2017

  54. [54]

    {COLE}: A column- based learned storage for blockchain systems,

    C. Zhang, C. Xu, H. Hu, and J. Xu, “{COLE}: A column- based learned storage for blockchain systems,” in22nd USENIX Conference on File and Storage Technologies (FAST 24), 2024, pp. 329–345

  55. [55]

    Bcool: A novel blockchain congestion control architecture using dynamic service function chaining and machine learning for next genera- tion vehicular networks,

    S. Maaroufi and S. Pierre, “Bcool: A novel blockchain congestion control architecture using dynamic service function chaining and machine learning for next genera- tion vehicular networks,”IEEE Access, vol. 9, pp. 53 096– 53 122, 2021

  56. [56]

    A machine learning approach to anomaly detection based on traffic monitoring for secure blockchain networking,

    J. Kim, M. Nakashima, W. Fan, S. Wuthier, X. Zhou, I. Kim, and S.-Y . Chang, “A machine learning approach to anomaly detection based on traffic monitoring for secure blockchain networking,”IEEE Transactions on Network and Service Management, vol. 19, no. 3, pp. 3619–3632, 2022

  57. [57]

    De- centralized security and data integrity of blockchain using deep learning techniques,

    S. T. Abdulrazzaq, F. S. Omar, and M. A. Mustafa, “De- centralized security and data integrity of blockchain using deep learning techniques,”Periodicals of Engineering and Natural Sciences (PEN), vol. 8, no. 3, pp. 1911–1923, 2020

  58. [58]

    Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach,

    Z. Ning, S. Sun, X. Wang, L. Guo, G. Wang, X. Gao, and R. Y . Kwok, “Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach,”Science China Information Sciences, vol. 64, no. 6, p. 162303, 2021

  59. [59]

    Adaptive con- sensus optimization in blockchain using reinforcement learning and validation in adversarial environments,

    W. Villegas, R. Guti ´errez, and J. Govea, “Adaptive con- sensus optimization in blockchain using reinforcement learning and validation in adversarial environments,” Frontiers in Artificial Intelligence, vol. 8, p. 1672273, 2025

  60. [60]

    Secure trust- based delegated consensus for blockchain frameworks using deep reinforcement learning,

    Y . Goh, J. Yun, D. Jung, and J.-M. Chung, “Secure trust- based delegated consensus for blockchain frameworks using deep reinforcement learning,”IEEE access, vol. 10, pp. 118 498–118 511, 2022

  61. [61]

    Blockchain secu- rity enhancement: an approach towards hybrid consensus algorithms and machine learning techniques,

    K. Venkatesan and S. B. Rahayu, “Blockchain secu- rity enhancement: an approach towards hybrid consensus algorithms and machine learning techniques,”Scientific Reports, vol. 14, no. 1, p. 1149, 2024

  62. [62]

    Proof of learning (pole): Empowering machine learning with consensus building on blockchains,

    Y . Lan, Y . Liu, B. Li, and C. Miao, “Proof of learning (pole): Empowering machine learning with consensus building on blockchains,” inProceedings of the AAAI Conference on Artificial Intelligence, vol. 35, no. 18, 2021, pp. 16 063–16 066

  63. [63]

    From cryptic to clear-training on llm explanations to detect smart contract vulnerabilities,

    Y . Chen, Z. Sun, G. Wang, Q. Liang, X. Yu, and D. Hao, “From cryptic to clear-training on llm explanations to detect smart contract vulnerabilities,”ACM Transactions on Software Engineering and Methodology, 2025

  64. [64]

    Deep learning-based solution for smart contract vulnerabilities detection,

    X. Tang, Y . Du, A. Lai, Z. Zhang, and L. Shi, “Deep learning-based solution for smart contract vulnerabilities detection,”Scientific Reports, vol. 13, no. 1, p. 20106, 2023

  65. [65]

    Deep learning-based malicious smart contract and intru- sion detection system for iot environment,

    H. Shah, D. Shah, N. K. Jadav, R. Gupta, S. Tanwar, O. Alfarraj, A. Tolba, M. S. Raboaca, and V . Marina, “Deep learning-based malicious smart contract and intru- sion detection system for iot environment,”Mathematics, vol. 11, no. 2, p. 418, 2023

  66. [66]

    Smart contract vulnerability detection based on deep learning and multimodal decision fusion,

    W. Deng, H. Wei, T. Huang, C. Cao, Y . Peng, and X. Hu, “Smart contract vulnerability detection based on deep learning and multimodal decision fusion,”Sensors, vol. 23, no. 16, p. 7246, 2023

  67. [67]

    Evaluating capabilities and perspectives of generative ai tools in smart contract de- velopment,

    S. Khalid and C. Brown, “Evaluating capabilities and perspectives of generative ai tools in smart contract de- velopment,” inProceedings of the 7th ACM International Symposium on Blockchain and Secure Critical Infrastruc- ture, 2025, pp. 1–12

  68. [68]

    Ai-powered blockchain- a decentralized secure multiparty computation protocol for iov,

    G. Raja, Y . Manaswini, G. D. Vivekanandan, H. Sampath, K. Dev, and A. K. Bashir, “Ai-powered blockchain- a decentralized secure multiparty computation protocol for iov,” inIEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2020, pp. 865–870

  69. [69]

    Smart-llama-dpo: Reinforced large language model for explainable smart contract vulnerability detection,

    L. Yu, Z. Huang, H. Yuan, S. Cheng, L. Yang, F. Zhang, C. Shen, J. Ma, J. Zhang, J. Luet al., “Smart-llama-dpo: Reinforced large language model for explainable smart contract vulnerability detection,”Proceedings of the ACM on Software Engineering, vol. 2, no. ISSTA, pp. 182–205, 2025

  70. [70]

    A smart contract vulnerability detection mechanism based on deep learning and expert rules,

    Z. Liu, M. Jiang, S. Zhang, J. Zhang, and Y . Liu, “A smart contract vulnerability detection mechanism based on deep learning and expert rules,”IEEE Access, vol. 11, pp. 77 990–77 999, 2023

  71. [71]

    Suigpt mad: Move ai decompiler to improve transparency and auditability on non-open-source blockchain smart contract,

    E. Chen, X. Tang, Z. Xiao, C. Li, S. Li, T. Wu, S. Wang, and K. K. Chalkias, “Suigpt mad: Move ai decompiler to improve transparency and auditability on non-open-source blockchain smart contract,” inProceedings of the ACM on Web Conference 2025, 2025, pp. 1567–1576

  72. [72]

    Blockchain based electronic educational document management with role-based access control using machine learning model,

    P. Chinnasamy, B. Subashini, R. K. Ayyasamy, A. Kiran, B. K. Pandey, D. Pandey, and M. E. Lelisho, “Blockchain based electronic educational document management with role-based access control using machine learning model,” Scientific Reports, vol. 15, no. 1, p. 18828, 2025

  73. [73]

    Qlammp: A q- learning agent for optimizing fees on automated market making protocols,

    D. Churiwala and B. Krishnamachari, “Qlammp: A q- learning agent for optimizing fees on automated market making protocols,” in2023 Fifth International Confer- ence on Blockchain Computing and Applications (BCCA). IEEE, 2023, pp. 274–281

  74. [74]

    Connecting large language models with blockchain: Making smart contracts smarter,

    X. Zeng, Y . Xian, D. Xuan, D. Yang, C. Li, J. Chen, P. Fan, and P. Liu, “Connecting large language models with blockchain: Making smart contracts smarter,”ACM Transactions on the Web, 2025

  75. [75]

    Leveraging ai and integrated data streams for predictive risk intelligence in decentralized finance markets

    A. Idowu, “Leveraging ai and integrated data streams for predictive risk intelligence in decentralized finance markets.”

  76. [76]

    Aiarena: A blockchain-based decentralized ai training platform,

    Z. Wang, R. Sun, E. Lui, T. Zhou, Y . Wen, and J. Sun, “Aiarena: A blockchain-based decentralized ai training platform,” inCompanion Proceedings of the ACM on Web Conference 2025, 2025, pp. 1375–1379

  77. [77]

    Doctrina: Blockchain 5.0 for artificial intelligence,

    K. Tulkinbekov and D.-H. Kim, “Doctrina: Blockchain 5.0 for artificial intelligence,”Applied Sciences, vol. 15, no. 10, p. 5602, 2025

  78. [78]

    Privacy and trust redefined in fed- erated machine learning,

    P. Papadopoulos, W. Abramson, A. J. Hall, N. Pitropakis, and W. J. Buchanan, “Privacy and trust redefined in fed- erated machine learning,”Machine Learning and Knowl- edge Extraction, vol. 3, no. 2, pp. 333–356, 2021

  79. [79]

    Verifiable blockchain- empowered federated learning for secure data sharing in the internet of medical things,

    P. Guo, S. Xu, and W. Liang, “Verifiable blockchain- empowered federated learning for secure data sharing in the internet of medical things,”Intelligent Computing, vol. 4, p. 0132, 2025

  80. [80]

    Fled-block: Federated learning ensembled deep learning blockchain model for covid-19 prediction,

    R. Durga and E. Poovammal, “Fled-block: Federated learning ensembled deep learning blockchain model for covid-19 prediction,”Frontiers in Public Health, vol. 10, p. 892499, 2022

Showing first 80 references.