Abstract
With the continuous development of technology, blockchain has been widely used in various fields by virtue of its decentralization, data integrity, traceability, and anonymity. However, blockchain still faces many challenges, such as scalability and security issues. Artificial intelligence, with its powerful data processing capability, pattern recognition ability, and adaptive optimization algorithms, can improve the transaction processing efficiency of blockchain, enhance the security mechanism, and optimize the privacy protection strategy, thus effectively alleviating the limitations of blockchain in terms of scalability and security. Most of the existing related reviews explore the application of AI in blockchain as a whole but lack in-depth classification and discussion on how AI can empower the core aspects of blockchain. This paper explores the application of artificial intelligence technologies in addressing core challenges of blockchain systems, specifically in terms of scalability, security, and privacy protection. Instead of claiming a deep theoretical integration, we focus on how AI methods, such as machine learning and deep learning, have been effectively adopted to optimize blockchain consensus algorithms, improve smart contract vulnerability detection, and enhance privacy-preserving mechanisms like federated learning and differential privacy. Through comprehensive classification and discussion, this paper provides a structured overview of the current research landscape and identifies potential directions for further technical collaboration between AI and blockchain technologies.
1. Introduction
Since its inception in 2008, the concept of blockchain has evolved from merely serving as the foundational technology for cryptocurrencies to enabling innovative applications across various industries [1]. In 2016, Bitcoin’s market capitalization surpassed USD 10 billion for the first time, marking a critical milestone that elevated public attention towards blockchain technology beyond its association with cryptocurrencies [2]. This financial threshold catalyzed a shift in perception, positioning blockchain as a decentralized peer-to-peer infrastructure capable of maintaining transparent, tamper-resistant ledgers across various domains. Consequently, the concept of “Blockchain+” emerged, promoting blockchain’s integration into industries such as finance, supply chain management, healthcare, and public services [3,4,5]. This evolution highlights blockchain’s transition from a niche technology to a cornerstone of global digital innovation and competition.
Blockchain is an integrated innovation that combines key technological components such as peer-to-peer networks, Byzantine fault tolerance, smart contracts, and distributed consensus algorithms [6]. By leveraging these technologies, blockchain establishes a decentralized system that enables trust formation in the digital space. Its core mechanism relies on nodes within a peer-to-peer network reaching consensus through a consensus protocol and sequentially linking data blocks into an immutable chain. Each block employs cryptographic techniques, such as digital signatures, to ensure data integrity and prevent forgery or tampering, thereby realizing a decentralized shared ledger. Compared to traditional centralized systems, this innovative paradigm reduces reliance on central authorities, lowers the cost of trust and consensus, and enhances system security and reliability. As a result, blockchain presents profound transformations and challenges to conventional social structures and operational models [7].
The general-purpose architecture of blockchain enables its flexible expansion across various application domains. Although no official standard exists, the development of blockchain technology is commonly described as progressing through three generational trends, as shown in Figure 1:
Figure 1.
Blockchain development trends.
- Blockchain 1.0 is generally associated with programmable digital cryptocurrencies, with a primary focus on value transfer, such as Bitcoin, digital assets, and online payments. However, this early phase faced limitations in scalability and offered relatively limited functionality [8].
- Blockchain 2.0 is characterized by the introduction of smart contracts, enabling blockchain not only to store and execute computer programs but also to facilitate trusted digital contract management. This trend expanded blockchain applications into the financial sector, supporting stock trading, clearing, private equity, and other services, thereby promoting the digital collaboration of real-world business systems [9].
- Blockchain 3.0 further extends blockchain use beyond the financial sector into broader industries, such as the Internet of Things, mining, electric transport management [10], industrial process optimization [11], privacy protection, and product traceability. By leveraging its decentralized and trustless architecture, blockchain in this phase aims to reduce inter-organizational friction, enhance large-scale collaboration, and drive higher productivity for individuals and enterprises [12].
Nowadays, blockchain has been applied across various fields, including finance [13], agriculture [14], food [15], supply chain management [16], and healthcare. For instance, in food safety traceability, consortium blockchain enables real-time data sharing and collaborative mechanisms, addressing challenges such as information asymmetry and the complexity of traditional traceability processes. This not only enhances the efficiency of food safety traceability but also reduces labor and time costs. Despite the promising prospects of blockchain technology, it still faces numerous challenges.
- Scalability Issues: Due to the inherent limitations of block size and the time-consuming consensus process, blockchain networks struggle with transaction throughput and data storage constraints. These factors significantly limit the efficiency and feasibility of large-scale applications. The scalability challenges faced by common consensus algorithms in blockchain are shown in Table 1.
- Security Risks: The widely used PoW consensus mechanism requires multiple block confirmations—typically at least six—to probabilistically ensure transaction security, leading to delays in finalizing transactions. Moreover, if a single entity gains control of more than 51% of the total network computing power, it could launch a double-spending attack or maliciously fork the blockchain, posing severe threats to the integrity and security of the system. The security issues faced by common consensus algorithms in blockchain are shown in Table 2.
- Privacy Protection Challenges: While blockchain provides a certain degree of anonymity, it is not immune to privacy risks. For instance, attackers can analyze transaction histories and trace network node IP addresses to infer users’ identities. Additionally, improper implementation of decentralized applications (DApps) may lead to unintended exposure of sensitive data, exacerbating privacy concerns and further complicating regulatory compliance.
Table 1.
Scalability issues of common consensus algorithms.
Table 1.
Scalability issues of common consensus algorithms.
| Consensus Algorithm | Main Scalability Issues | Description |
|---|---|---|
| PoW | Low Throughput, High Energy Consumption | Block creation is limited by difficulty; TPS is low and hard to scale |
| PoS | Node Centralization, Sync Dependency | Requires up-to-date state sync; less suitable for large distributed systems |
| DPoS | Limited by Supernodes | Faster than PoW/PoS, but scalability is constrained by limited node participation |
| PBFT | O(n⌃2) Message Complexity | High communication overhead; performance degrades with increasing node count |
| RAFT | Poor State Sync for Many Nodes | Suitable for small-scale systems only; does not scale well |
| Paxos | Complex Implementation, Performance Bottleneck | Multi-phase protocol has high latency and poor scalability |
Table 2.
Security issues of common consensus algorithms.
Table 2.
Security issues of common consensus algorithms.
| Consensus Algorithm | Main Security Issues | Description |
|---|---|---|
| PoW | 51% Attack, Selfish Mining | A single entity controlling 51% of total hash power can manipulate the blockchain; selfish mining leads to temporary forks |
| PoS | Rich-get-richer, Long-range Attack, Nothing at Stake | Stake centralization increases over time; easy to rewrite chain history; validators may vote on multiple forks |
| DPoS | Centralization Risk, Vote Manipulation | A few supernodes control consensus; voting power can be bought or manipulated |
| PBFT | Node Exposure, DoS Attacks | Small node sets are vulnerable to targeted DoS; limited fault tolerance (up to f faulty nodes) |
| RAFT | Not Byzantine Fault Tolerant | Cannot defend against malicious nodes; only tolerates crash faults in trusted environments |
| Paxos | Weak Byzantine Resistance | Assumes honest behavior; not suitable against data forgery or malicious attacks |
With its efficient data processing, autonomous learning, and advanced pattern recognition capabilities, AI has become a key driving force in the advancement of blockchain technology, with applications spanning edge computing, big data monitoring, supply chains, digital twins, and metaverse exploration. He et al. [17] emphasize that blockchain, due to its decentralized, trustless, and immutable nature, is well suited for edge-centric IoT scenarios while also highlighting the integration of AI into edge computing. Islam et al. [18] propose a blockchain-based AI-driven initiative that utilizes drones for pandemic surveillance, demonstrating the feasibility of autonomous monitoring. D’Souza et al. [19] introduce a secure pharmaceutical supply chain management system that leverages blockchain and AI, incorporating the Rasa chatbot to enhance functionality. Suhail et al. [20] conduct a comprehensive survey on blockchain-based digital twins, discussing research trends, advantages, and challenges in this field. Guergov et al. [21] analyze the convergence of IoT, AI, and blockchain, underscoring the necessity of hybrid models for seamless integration. Yang et al. [22] explore the intersection of blockchain, AI, and the metaverse, highlighting the potential for interdisciplinary research and collaboration. Furthermore, Kumar et al. [23] examine the applications and benefits of integrated AI and blockchain platforms across various business verticals, identifying ten key areas with significant potential advantages. Junaid et al. [24] investigate advancements in emerging technologies, including IoT, AI, and blockchain, with a particular focus on healthcare, emphasizing their critical role in healthcare management systems. Finally, Xu et al. [25] highlight the role of key enabling technologies, such as digital twins, AI, and blockchain, in the development of digital twin-driven Industrial Internet of Things applications.
In this survey, we conduct a comprehensive analysis of existing research, providing insights into how machine learning and artificial intelligence are generally integrated with blockchain technology and their specific applications. Our study focuses on four key aspects: optimizing consensus algorithm efficiency through AI, enabling automated vulnerability detection and remediation in smart contracts, constructing verifiable data architectures, and enhancing privacy protection using federated learning. Table 3 presents a comparison between our survey and existing survey studies.
Table 3.
Comparison of existing reviews on AI-driven blockchain optimization.
2. Introduction to Related Technologies
This section provides an in-depth introduction to blockchain and AI technologies, with a particular focus on the four core technologies of blockchain: distributed ledger, consensus mechanism, smart contracts, and cryptographic security. Additionally, it elaborates on key AI technologies, including machine learning, deep learning, and reinforcement learning, exploring their roles and development trends across various application scenarios.
2.1. Blockchain
Blockchain technology, as a distributed database, stores data in an encrypted manner and ensures data security and immutability through its chain structure [33]. Its decentralized nature enables distributed data sharing and management, ensuring reliability without the need for trusted intermediaries [34]. Consensus algorithms facilitate agreement among multiple nodes, safeguarding data security, while smart contracts, as self-executing code, automatically execute when predefined conditions are met, further enhancing the application value of blockchain [35].
2.1.1. Block Structure
A blockchain block is composed of two primary elements: the Block Header and the Block Body. Its cryptographic design, combined with a layered architecture, establishes the fundamental technical basis for data immutability [36]. This structure ensures secure data storage through the following three layers:
- (1)
- The information encapsulation layer of the block header
The block header serves as the core verification unit of the blockchain, encapsulating six key fields: version number, timestamp, previous block hash, Merkle root, nonce, and target hash. Among them, the Merkle root—computed via a layered binary hash tree—ensures transaction integrity by uniquely summarizing all transactions within the block [37].
- (2)
- The data storage layer of the block structure
The block body organizes verified transactions using a Merkle tree structure, where leaf nodes represent hashed transactions and non-leaf nodes result from recursive hash combinations. This design enables efficient O(log n) transaction verification and supports lightweight node validation. All transactions must pass digital signature and input–output checks before inclusion [38].
- (3)
- The collaborative layer of the security mechanism
The block header and body are cryptographically linked, ensuring immutability. Any modification in transaction data alters the Merkle root, invalidating subsequent blocks. Combined with timestamps and hash chaining, this layered architecture preserves data integrity while enabling scalable storage and efficient validation.The structure of a block is illustrated in Figure 2.
Figure 2.
Block structure diagram.
2.1.2. Consensus Algorithm
The reliability of the blockchain system is highly dependent on the design of the consensus mechanism [39], a technology that realizes efficient transaction verification by coordinating the protocols among network nodes and is decisive for maintaining data consistency and operational integrity.
Currently, blockchain can be categorized into public, private, and consortium chains based on permission scope and access control mechanisms [40]. Each type exhibits distinct characteristics and serves different application scenarios. Public chains, known for their high level of decentralization, transparency, and censorship resistance, allow any participant to join, validate transactions, and contribute to the consensus process. They are widely utilized in areas such as cryptocurrency transactions, decentralized finance, and non-fungible tokens [41]. However, the open nature of public chains often leads to scalability and energy consumption challenges.
In contrast, private chains operate under restricted access where only authorized participants can read, write, or audit the blockchain. They prioritize data security, privacy protection, and efficient management, operating with a significantly lower degree of decentralization. This model is particularly suitable for industries such as finance, healthcare, and supply chain management, where regulatory compliance, sensitive data handling, and operational efficiency are critical.
Consortium chains, also known as federated blockchains, integrate features from both public and private chains. They are governed by a group of pre-selected nodes or organizations, achieving a balance between multiparty cooperation, transparency, and controlled decentralization [42]. Consortium chains offer enhanced performance, scalability, and trust through partial decentralization while maintaining higher privacy standards compared to public chains. Their strengths in traceability, auditability, and governance mechanisms facilitate transaction tracking, cross-organizational collaboration, and comprehensive historical record management, making them ideal for applications in interbank clearing, supply chain traceability, and cross-border payments. Table 4 presents a detailed comparison of blockchain categories in terms of decentralization level, security, scalability, transparency, and typical application scenarios [43].
Table 4.
Comparison of blockchain categories.
Consensus algorithms play a crucial role in distributed systems [44], particularly in blockchain technology, where they ensure that all nodes in the network agree on the validity of transactions [45]. Different consensus mechanisms exhibit various strengths and weaknesses, influencing aspects such as security, energy consumption, throughput, and decentralization. The following Table 5 provide a detailed discussion of several mainstream consensus algorithms.
Table 5.
Comparison of consensus algorithms.
- (1)
- PoW
PoW achieves consensus through competitive computation of cryptographic hash puzzles, ensuring transaction security and immutability. It is widely used in public blockchains such as Bitcoin. The primary advantage of PoW is its high security, effectively preventing Sybil attacks and maintaining network decentralization. However, PoW requires significant computational resources, leading to high energy consumption. According to the Cambridge Bitcoin Electricity Consumption Index (2024), the Bitcoin network consumes approximately 120 TWh of electricity annually, with each transaction consuming around 707 kWh, categorizing PoW as a high-energy consensus mechanism. Additionally, the limited block production speed results in low transaction throughput, making it challenging to support large-scale applications.
- (2)
- PoS
PoS determines block validation rights based on the amount and duration of cryptocurrency holdings, avoiding the energy-intensive computations of PoW. Ethereum 2.0 adopts this mechanism. The main advantages of PoS include low energy consumption and high efficiency, which enhance transaction processing speed and reduce environmental impact. After Ethereum’s transition from PoW to PoS in 2022 (“The Merge”), its energy consumption decreased by over 99.95%, dropping to approximately 0.0026 TWh per year, with each transaction consuming only about 0.03 kWh, making PoS a low-energy consensus mechanism. However, PoS may lead to wealth centralization, as large token holders gain greater control over the network, potentially undermining decentralization [46].
- (3)
- DPoS
DPoS relies on community voting to elect delegate nodes that execute consensus, significantly improving transaction processing efficiency. It is widely adopted by blockchains such as EOS and TRON. The key advantages of DPoS include high efficiency and low energy consumption, enabling rapid processing of large-scale transactions and enhancing system throughput. Energy studies estimate the EOS blockchain consumes only about 0.001 TWh annually, significantly lower than PoW-based systems, confirming that DPoS is a low-energy consensus approach. However, the delegate selection mechanism may result in power centralization, and there is a risk of collusion among delegates, which can weaken decentralization.
As Algorithm 1 shows, the DPoS consensus mechanism operates through four main phases. Initially, all stakeholders (S) vote to select a small group of delegates (D), typically much fewer in number than the stakeholders, who are entrusted with the task of block production. During each round, delegates take turns to collect transactions, produce blocks, sign them, and broadcast them to the network. Each received block is validated by other nodes to ensure integrity and correctness. If any delegate misbehaves, such as missing blocks or producing invalid data, stakeholders have the right to revoke their delegation through a new voting process. This approach ensures efficient, scalable, and democratic block validation while significantly reducing the number of nodes involved in the consensus process compared to traditional proof-of-work mechanisms.
- (4)
- PBFT
PBFT achieves consensus through multiple rounds of voting among a limited number of nodes, making it suitable for high-trust private blockchain environments such as Hyperledger Fabric. Its main advantages are low latency and high throughput, making it particularly well suited for financial blockchain applications.
PBFT does not involve mining or computational races. As a result, its energy consumption is extremely low, typically less than 0.0001 TWh annually, especially in enterprise deployments (IBM Blockchain Whitepaper, 2022). However, PBFT lacks economic incentives and relies on the honesty of participating nodes. If a significant number of malicious nodes are present, the consensus process may be compromised.
| Algorithm 1 DPoS Consensus Process |
|
The PBFT consensus process is illustrated in Algorithm 2. Initially, the system defines nodes to tolerate up to f faulty nodes. The primary node is selected based on the current view number. The consensus proceeds through several phases:
- (1)
- Client Request: A client initiates the process by signing and sending a transaction request to the primary node.
- (2)
- Pre-Prepare Phase: Upon verifying the client’s request, the primary node broadcasts a PRE-PREPARE message containing a digest of the request.
- (3)
- Prepare Phase: Replica nodes validate the PRE-PREPARE message and broadcast PREPARE messages to all other nodes.
- (4)
- Commit Phase: When a node receives matching PREPARE messages, it broadcasts a COMMIT message.
- (5)
- Reply Phase: After collecting matching COMMIT messages, the node executes the operation and sends a reply to the client.
- (6)
- View Change: If a timeout occurs or the primary is suspected to be faulty, nodes initiate a VIEW-CHANGE protocol to select a new primary node. This multi-phase voting ensures consensus integrity even in the presence of faulty or malicious participants.
| Algorithm 2 PBFT Consensus Process |
|
- (5)
- Kafka
The Kafka consensus mechanism is based on a reliable message queue and is commonly used in enterprise blockchain architectures, such as the ordering service in Hyperledger Fabric. Kafka offers high throughput, making it ideal for private blockchain applications with demanding performance requirements. Kafka-based systems rely on server-based message queues with minimal computational complexity, resulting in very low energy consumption, often far below 0.0001 TWh annually, particularly in controlled enterprise environments. However, it depends on centralized ordering nodes, introducing a single point of failure risk, which makes it unsuitable for decentralized blockchain networks [47].
- (6)
- Raft
Raft employs a leader election mechanism for log replication, making it suitable for small-scale distributed systems such as enterprise private blockchains. Its advantages include simple implementation and easy deployment while maintaining a high level of consistency. Raft-based consensus typically operates within private server clusters with modest computational loads, and its overall energy footprint is minimal, making it a low-energy consensus protocol. However, Raft’s applicability is limited to small-scale environments, and its performance is influenced by the leader node. If the leader fails, consensus delays may occur.
As Algorithm 3 shows, the Raft consensus algorithm is designed to achieve strong consistency across a distributed system in an intuitive and structured manner. It operates through several coordinated phases. First, leader election is initiated when a follower node does not receive a heartbeat signal within a timeout period, transitioning to a candidate and requesting votes from other nodes. A node becomes the leader if it secures a majority vote (at least ). Once elected, the leader is responsible for accepting client requests, appending them to its log, and replicating these entries to follower nodes via AppendEntries Remote Procedure Calls. Followers validate and append these entries, responding with acknowledgments. Upon receiving acknowledgments from the majority, the leader commits the entries and informs followers of the commitment. Raft ensures safety through leader exclusivity and log consistency and guarantees system termination under stable network conditions.
- (7)
- Paxos
Paxos achieves consensus through multiple rounds of message passing, emphasizing data consistency. It is widely used in strong consistency databases such as Google Chubby and AWS DynamoDB.
Paxos excels in high-fault-tolerance environments, ensuring stable consensus and maintaining data integrity. Despite its theoretical soundness, Paxos is considered energy-efficient in practice due to its use in tightly controlled data center environments. However, its high communication overhead limits its scalability in blockchain applications, and real-world energy consumption remains low compared to PoW, generally under 0.0001 TWh annually. However, the algorithm is computationally complex and requires substantial communication overhead, which constrains system performance. The Paxos consensus process is shown in Figure 3 below. Compared to other consensus mechanisms, Paxos is less suitable for blockchain applications in terms of throughput and efficiency [48].
| Algorithm 3 Raft Consensus Process |
|
Figure 3.
Paxos consensus flow diagram.
2.1.3. Smart Contract
Smart contracts are essentially programs stored on a blockchain that automatically execute specific actions when predefined conditions are met. Typically, smart contracts are used to automate the execution of agreements, allowing all participants to quickly verify transaction outcomes without the need for intermediaries. This enhances efficiency and eliminates unnecessary delays. Additionally, smart contracts can streamline business processes by automatically triggering subsequent actions once certain conditions are fulfilled [49].
Smart contracts operate on an “if/when…then…” logic, with conditions encoded on the blockchain. Once triggered and verified, the network automatically executes actions such as fund transfers or asset registration, with outcomes immutably recorded and accessible only to authorized parties [50]. Contract terms are defined by specifying transaction rules, encoding logic conditions, handling exceptions, and establishing dispute resolution mechanisms to ensure reliability and protect participants’ interests [51].
The smart contract execution process involves a series of automated steps designed to leverage the inherent technical features of blockchain. As Algorithm 4 shows, initially, the contract is deployed onto the blockchain, with its code and initial state stored immutably in the distributed ledger. Upon receiving an input event, the contract autonomously checks if predefined conditions are satisfied. If so, the corresponding function is executed; otherwise, the input is ignored. During execution, the contract validates input data and blockchain state to ensure correctness. Successful validation results in the state update and event emission, while failure leads to transaction rejection. The immutability of the deployed contract guarantees that neither its code nor its rules can be altered post-deployment, ensuring transparency and trustworthiness. Additionally, contract execution and enforcement are decentralized, with all blockchain nodes independently verifying and applying the contract logic, thus eliminating single points of failure and promoting a trustless operational environment.
| Algorithm 4 Smart Contract Execution Process |
|
As shown in Table 6, a smart contract is an automated protocol based on blockchain technology that executes predefined operations immediately when specified conditions are met, without the need for human intervention. As shown in Figure 4 below, its core advantages are primarily reflected in the following four aspects: (1) Execution Efficiency and Accuracy: Smart contracts leverage digitalization and automation to significantly reduce human involvement, minimize errors, prevent transaction delays, and enhance overall operational efficiency. (2) Trust and Transparency: The execution records of smart contracts are stored on the blockchain, allowing all participants to access the same data. This ensures transparency, reduces the risk of manipulation or data tampering, and enhances system credibility. (3) Security: Smart contracts rely on blockchain encryption algorithms and a chain-based structure, making data extremely difficult to alter or forge. This ensures the integrity and reliability of transactions. (4) Cost Reduction: By minimizing dependence on traditional intermediaries, smart contracts streamline transaction processes, lower management and operational costs, and optimize contract execution efficiency, ultimately improving economic benefits.
Table 6.
Advantages of smart contracts.
Figure 4.
Blockchain smart contract schematic.
2.1.4. Cryptography Technology
Blockchain can essentially be understood as a distributed ledger or a decentralized database [52]. As its unique technological advantages continue to drive research and adoption across various industries, blockchain primarily relies on cryptographic techniques to manage and secure vast amounts of data [53].
Cryptography employs advanced mathematical principles and algorithms to ensure the secure storage and transmission of data [54], allowing only authorized recipients to access and process the information [55]. Among its core components, encryption plays a crucial role by encoding data in a manner that renders it unintelligible to unauthorized parties, thereby protecting it from potential attacks and unauthorized modifications.
In blockchain systems, encryption techniques are generally classified into two main categories: symmetric encryption and asymmetric encryption. Symmetric encryption utilizes a single key for both encryption and decryption, whereas asymmetric encryption employs a pair of keys—a public key for encryption and a private key for decryption—enhancing security and data integrity during transmission. These cryptographic techniques serve as the foundation of blockchain security, safeguarding data privacy and ensuring the reliability of transactions [56]. The comparison table between symmetric and asymmetric encryption is shown in Table 7.
Table 7.
Comparison of symmetric and asymmetric encryption.
- (1)
- Symmetric encryption
Symmetric encryption is one of the earliest encryption techniques, where both the sender and the receiver use the same set of rules for encrypting and decrypting data. In simple terms, the encryption key and the decryption key are identical [57]. A well-known example of symmetric encryption is the Caesar cipher, which applies a basic substitution technique to encode messages. Some widely used symmetric encryption algorithms include DES, 3DES, Blowfish, IDEA, RC4, RC5, RC6, and AES. These algorithms vary in terms of security strength, performance, and application scenarios, with AES (Advanced Encryption Standard) being one of the most commonly adopted due to its strong security and efficiency [58]. Compared to public-key (asymmetric) encryption, symmetric encryption generally offers faster processing speeds, making it more suitable for scenarios requiring high-speed data encryption. However, symmetric encryption also presents certain challenges. Since the same key is used for both encryption and decryption, the security of symmetric encryption depends not only on the strength of the encryption algorithm but also on the secure management of the key itself. When using symmetric encryption for secure data transmission, the encryption key must be shared with the recipient, which introduces the issue of key transmission security [59]. In real-world applications, such secure transmissions typically take place over modern wireless communication infrastructures, such as Wi-Fi or 5G networks [60]. These environments provide high-speed connectivity, which complements the low-latency nature of symmetric encryption. Nevertheless, they also introduce additional risks such as signal interception, unauthorized access points, or man-in-the-middle attacks, all of which further underscore the importance of robust encryption and secure key exchange mechanisms.
- (2)
- Asymmetric encryption
Asymmetric encryption is a cryptographic technique integrated into blockchain to meet security and ownership verification requirements. The key distinction between asymmetric and symmetric encryption lies in the use of keys: symmetric encryption relies on a shared key for both encryption and decryption, whereas asymmetric encryption uses a “key pair” consisting of a public key and a private key for these operations [61].
The advantage of asymmetric encryption is that it effectively addresses security challenges related to key transmission. The public key can be openly shared, while the private key remains confidential, ensuring the security of the encryption process. However, while asymmetric encryption offers higher security, it does not directly verify the identity of the sender, which introduces the potential risk of sender impersonation.
Common algorithms in asymmetric encryption include RSA and ECC (Elliptic Curve Cryptography). Asymmetric encryption is typically classified into three main types: the Integer Factorization Problem, where encryption relies on the product of two large prime numbers, the Discrete Logarithm Problem, which exploits the computational difficulty of solving discrete logarithms and uses strong one-way hash functions for asymmetric distributed encryption, and Elliptic Curve Cryptography, which uses elliptic curves on a plane to generate specific asymmetric encryption values [62].
As Algorithm 5 shows, asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. It begins by generating two large primes p and q, computing and Euler’s totient . A public exponent e is selected such that , and the private exponent d satisfies . Encryption transforms plaintext into ciphertext via , while decryption recovers the original message with . The security relies on the computational difficulty of factoring n.
| Algorithm 5 Asymmetric Encryption Process |
|
2.2. Artificial Intelligence
Artificial Intelligence [63] encompasses multiple core technological domains, including machine learning (ML) [64], deep learning (DL) [65], natural language processing (NLP) [66], and computer vision (CV). Within machine learning, supervised learning is primarily used for classification and prediction, unsupervised learning facilitates clustering and anomaly detection, and semi-supervised learning enhances model performance by leveraging a small amount of labeled data. Reinforcement learning (RL), on the other hand, is widely applied in game AI and autonomous driving [67].
In the early days of its birth, AI was mainly used for basic data analysis and pattern recognition, such as natural language processing, speech recognition, face recognition, logistics analysis, and intelligent investment. AI at this stage is mainly used to improve data processing efficiency, business decision-making, and interactive experience. With the advancement of AI technology, AI begins to penetrate industry scenarios to support more complex automation tasks, such as intelligent energy saving [68], agricultural product inspection, intelligent robots [69], intelligent water tanks [70], etc. AI at this stage gradually moves from data processing to intelligent services and automated systems, improving the operational efficiency of various industries.
Nowadays, AI has entered the era of high intelligence, with stronger autonomous learning and decision-making capabilities, such as GPT-4o [71], unmanned driving, genetic testing, deep search (Deepseek) [72], adaptive learning [73], and so on. In the future, AI will be widely used in the fields of healthcare, transportation, education, etc., to achieve a highly intelligent society, and the development trend of AI-driven applications is shown in Figure 5 below.
Figure 5.
AI-driven application trends schematic.
Deep learning a significant subfield of machine learning, leverages Convolutional Neural Networks (CNNs) for image processing, Recurrent Neural Networks (RNNs) for sequential data analysis, and Generative Adversarial Networks (GANs) for data generation. In natural language processing, advancements in text analysis, machine translation, and speech recognition drive the development of intelligent interactions [74]. Similarly, computer vision powers applications such as object detection and image segmentation, these technologies define the mainstream directions of modern AI, driving the widespread development and application of intelligent systems. Below, we primarily introduce machine learning, deep learning, as these AI technologies are widely applied in blockchain to address its various challenges.
2.2.1. Machine Learning
Machine learning [75] is a discipline that explores how computers can simulate human learning to acquire knowledge, enhance skills, and optimize system performance [76]. Based on different learning paradigms, ML can be categorized into four main types: supervised learning, which relies on labeled data to train models for predicting unknown data; unsupervised learning, which processes unlabeled data for pattern recognition and data clustering; semi-supervised learning, which leverages a small amount of labeled data alongside a large volume of unlabeled data to reduce annotation costs and improve model performance [77]; and reinforcement learning, which enables an agent to interact with its environment through a reward mechanism to learn optimal decision-making strategies [78].
As shown in Table 8, supervised learning relies on labeled data for classification and regression tasks, ensuring high accuracy but requiring extensive data annotation. Unsupervised learning uncovers hidden patterns in unlabeled data, commonly used for clustering and dimensionality reduction, though its results may lack interpretability. Semi-supervised learning combines labeled and unlabeled data to improve performance while reducing labeling costs [79]. Reinforcement learning, driven by interaction with the environment, excels in sequential decision-making but demands high computational resources and extensive training. These paradigms are applied across various domains, from image recognition and anomaly detection to autonomous systems and robotics. We will briefly introduce several commonly used machine learning models and algorithms in blockchain applications.
Table 8.
Comparative analysis of the four major machine learning paradigms.
- (1)
- Decision Tree Model
The decision tree model [80] is an intuitive and efficient data mining tool widely used in classification and regression problems. This method constructs a tree-like structure that decomposes complex decision processes into a series of simple judgments, thereby enabling effective data partitioning and prediction.
The basic components of the model include the root node, internal decision nodes, and terminal nodes (leaf nodes), which correspond to the overall dataset, splitting conditions, and final decision outcomes, respectively [81].
This Figure 6a shows the boosting algorithm of ensemble learning. It starts with training the first weak learner with the original dataset D1. Then, the sample weights are iteratively updated based on the prediction results of each weak learner to increase the weight of the misclassified samples. The new dataset Dn is used to train new weak learners. Finally, the results of multiple weak learners are integrated into a strong learner to give the final prediction. The model performance is improved by focusing on difficult-to-classify samples and iterative integration.
Figure 6.
(a) Schematic diagram of the decision tree boosting model. (b) SVM core concept diagram. (c) LSTM unit structure diagram. (d) MLP feedforward neural network structure diagram. (e) Schematic diagram of XGBoost model for incremental construction of decision tree. (f) CNN network architecture diagram.
During the construction process, commonly used evaluation metrics include information entropy, information gain, and the Gini coefficient, which measure the change in data purity before and after partitioning. For example, information entropy can be expressed as follows:
where S represents the current dataset, and represents the proportion of samples belonging to class i is denoted. Information gain reflects the reduction in uncertainty brought about by a particular feature in the dataset partitioning, and its formula is given by the following:
Here, A is the candidate feature, is the feature, and the subset corresponding to the value v of feature A is denoted.
- (2)
- Support Vector Machine Model
The Support Vector Machine (SVM) [82] is a powerful algorithm widely used in machine learning for both classification and regression tasks. As a supervised learning method, its primary objective is to identify an optimal hyperplane in the feature space that effectively separates different classes of data points while maximizing the margin between them. The fundamental principle of SVM is to determine the hyperplane that best divides the dataset, which, in a d-dimensional feature space, corresponds to a (d-1)-dimensional subspace.
Figure 6b shows the core concept of SVM. In the feature space, SVM looks for an optimal hyperplane (Maximum Margin Hyperplane) to separate samples of different categories. Sample points on the boundary are called support vectors. The distance between the positive hyperplane (Positive Hyperplane) and the negative hyperplane (Negative Hyperplane) is maximized to improve the generalization ability of the model.
To achieve this, SVM leverages support vectors—data points that are closest to the hyperplane—which play a crucial role in defining its position and orientation [83]. One of the key advantages of SVM is its ability to handle high-dimensional datasets while maintaining strong generalization capabilities. Furthermore, SVM is applicable to both linear and nonlinear classification problems, with the latter being addressed through the use of various kernel functions that map input features into a higher-dimensional space, allowing for more complex decision boundaries.
- (3)
- Random Forest Model
The Random Forest model [84] is an ensemble learning method. Its basic idea is to construct a large number of randomly generated decision trees and combine the predictions from each tree to improve the overall model’s stability and generalization ability. During the construction process, the model reduces the risk of overfitting commonly associated with individual decision trees by performing Bootstrap sampling on the original data and randomly selecting a subset of features at each node. This approach effectively captures the underlying complex relationships within the data. To illustrate the prediction mechanism of Random Forest, the following formula is used. For regression problems, the final prediction result of the Random Forest is the average of the outputs from all the decision trees, and its mathematical expression is as follows:
where T represents the total number of decision trees, and is the prediction output of the t-th tree for the input x. This formula reflects the basic idea of reducing prediction variance through mean aggregation.
- (4)
- XGBoost Model
XGBoost [85] is an efficient and scalable gradient boosting framework. Its core idea is to build decision trees incrementally using an additive model, minimizing prediction errors by optimizing the objective function while also constraining model complexity to improve generalization ability and stability [86]. The XGBoost model incremental construction of the decision tree is shown in Figure 6e. In each iteration, XGBoost uses a second-order Taylor expansion to approximate the loss function, thereby capturing the variation in the objective function more accurately and accelerating the convergence rate. The objective function of XGBoost combines training error and a regularization term, and its expression is given by
where represents the loss value for the i-th sample, and is the prediction result of the model after the t-th iteration. The regularization term is used to penalize model complexity, and and are the tuning parameters for the number of leaf nodes and the weights of the leaf nodes, respectively.
In each iteration, the model updates the overall output by adding the prediction contribution of the new tree, and its mathematical expression is
where represents the prediction contribution of the t-th tree for the sample . This formula reflects the detailed process of how XGBoost approximates the model by progressively accumulating the outputs of decision trees [87].
2.2.2. Deep Learning
Machine learning methods can be broadly categorized into two major types: supervised learning and unsupervised learning. Supervised learning primarily encompasses classification and regression tasks, while unsupervised learning focuses on problems such as clustering and association analysis. Deep learning falls under the domain of supervised learning and is based on neural network technology, which traces its origins back to the 1950s and 1960s, when it was known as the perceptron. The perceptron consisted of an input layer, an output layer, and a single hidden layer. The input feature vectors were transformed through the hidden layer to produce classification results at the output layer [88].
Deep learning involves learning the intrinsic patterns and hierarchical representations of sample data. The knowledge acquired during this learning process significantly enhances the interpretation of data such as text, images, and audio. The ultimate goal of deep learning is to enable machines to develop human-like analytical and learning capabilities, allowing them to recognize and process textual, visual, and auditory information effectively [89].
As a sophisticated machine learning algorithm, deep learning has achieved remarkable breakthroughs, particularly in speech and image recognition, far surpassing previous technologies in these domains. It has also made significant advancements in various fields, including search technology, data mining, machine learning, machine translation, natural language processing, multimedia learning [90], speech processing, recommendation systems, and personalized technology. By enabling machines to emulate human sensory perception and cognitive processes, deep learning has addressed numerous complex pattern recognition challenges, thereby driving substantial progress in artificial-intelligence-related technologies [91].
The fundamental models in deep learning can be broadly classified into three categories: multilayer perceptron models, deep neural network models, and recurrent neural network models. Representative architectures for these categories include Deep Belief Networks for MLP models, Convolutional Neural Networks for DNN models, and Recurrent Neural Networks for sequential data processing [92].
Table 9 compares several mainstream deep learning algorithms in recent years, including CNNs, RNNs, LSTM, GRU, Transformer, GANs, and Variational Autoencoders. CNNs are primarily used for computer vision tasks, leveraging convolutional operations to extract features while improving computational efficiency through parameter sharing. RNNs and their variants, LSTM and GRU, are designed for sequential data processing, with LSTM mitigating the vanishing gradient problem via gating mechanisms, whereas GRU achieves similar performance with reduced computational complexity [93]. Transformers employ self-attention mechanisms to enhance long-range dependency modeling, making them highly effective in natural language processing tasks. GANs utilize adversarial training to generate high-quality data but are prone to mode collapse during training. VAEs, based on probabilistic modeling, produce coherent data distributions with stable training, though the generated samples may lack fine details compared to GANs [94].
Table 9.
Comparison of deep learning algorithms.
- (1)
- MLP Model
In recent years, the advancement of deep learning has brought renewed attention to the Multilayer Perceptron (MLP), making it a prominent research focus. MLP has been widely applied across various domains, including image processing, speech recognition, and natural language processing, demonstrating exceptional performance in tasks such as object detection, image classification, semantic segmentation, and machine translation [95].
MLP is a type of feedforward neural network capable of mapping input vectors to output vectors. Its architecture typically comprises multiple fully connected layers of neurons, where each neuron (except those in the input layer) employs a nonlinear activation function and is trained using the backpropagation algorithm [96]. During model training, network weights are first initialized. The input data then undergo forward propagation, where the weighted sum is computed in the hidden layers and transformed through an activation function to produce intermediate representations. The output layer subsequently generates prediction results, and a loss function—such as Mean Squared Error (MSE) or Cross-Entropy—is computed based on the ground truth labels. The backpropagation algorithm is then employed to compute gradients and optimize the network parameters. The MLP model architecture is illustrated in Figure 6d.
- (2)
- CNN Model
CNN is a deep feedforward neural network characterized by local connectivity and weight sharing, specifically designed to process grid-structured data such as images and audio [97]. Its fundamental architecture consists of three primary layers: the convolutional layer, the pooling layer, and the fully connected layer. The CNN grid structure is shown in Figure 6f.
- Convolutional Layer: As the core component of CNNs, the convolutional layer applies convolutional filters (kernels) that slide over the input data (e.g., image pixel matrices) to perform convolution operations. Different kernels can extract distinct features, such as edges, textures, or higher-level semantic information [98]. Furthermore, convolution operations exhibit weight sharing, meaning that the same kernel is applied across different regions of the input data using identical parameters. This significantly reduces the number of trainable parameters and enhances computational efficiency [99].
- Pooling Layer: The pooling layer is responsible for dimensionality reduction while preserving essential features, thereby reducing computational complexity and improving model robustness. The most common pooling techniques are max pooling and average pooling. Max pooling retains the maximum value in a local region, whereas average pooling computes the mean value. This operation not only enhances computational efficiency but also increases the model’s tolerance to minor spatial transformations [100].
- Fully Connected Layer: The fully connected layer integrates the features extracted from previous layers and is primarily used for classification or regression tasks. In this layer, each neuron is connected to all neurons in the preceding layer, resembling hidden layers in traditional neural networks. Through weighted summation and activation functions, the fully connected layer produces the final classification output or task-specific predictions [101].
- (3)
- LSTM Model
LSTM is a specialized type of Recurrent Neural Network (RNN) designed to process and predict time-series or sequential data with long-term dependencies [102]. It effectively mitigates the vanishing and exploding gradient problems present in traditional RNNs. The fundamental unit of an LSTM consists of three gating mechanisms—the forget gate, input gate, and output gate—along with a cell state [103]. These three gates regulate the flow of information using the sigmoid activation function and element-wise multiplication, ensuring that the strength of the information flow is controlled without introducing additional information. The LSTM unit structure diagram is illustrated in Figure 6c.
In the figure, represents the cell state (memory state) at time is the current input, and denotes the output of the neural unit at time . The forget gate’s output at time t is , the input gate’s output is , and the output gate’s output is . The function represents the sigmoid activation, while is the cell state at time t, and is the neural unit’s output at time t.
To prevent excessive memory retention from interfering with the processing of new inputs, the forget gate determines how much information from the previous cell state should be preserved. It computes a weight based on and , processed through a sigmoid activation function to produce a vector with values between 0 and 1—where 0 signifies forgetting and 1 indicates full retention. The forget gate is mathematically expressed as follows:
In Equation (7), represents the forget gate weight, denotes the bias, and is the sigmoid function. The input gate determines how much of the current input information should be retained in the state of the neural unit at the current time step, thereby controlling the information that needs to be updated [104]. The input and output values pass through the input gate and are then combined with the input and output values processed by a tanh function to generate new control parameters. The mathematical expression for the input gate is as follows:
In Equation (10), the cell state is updated as , and represents the input gate weight. The output gate determines which information from the current cell state is transmitted to . Both and first pass through the output gate to define the scope of the output information. Then, in combination with the tanh function, a selected portion of the memory information is processed, and the final neural network output value is determined. The mathematical expression for the output gate is as follows:
3. AI-Driven Blockchain Solutions
In recent years, blockchain technology has gained widespread adoption across various sectors, including finance, supply chain management, the Internet of Things, healthcare, and government administration, owing to its decentralized, secure, transparent, and tamper-resistant characteristics [105]. For instance, in the financial sector, blockchain supports digital currencies, smart contracts, and decentralized finance; in supply chain management, it provides reliable product traceability; and in healthcare, it enhances the security of electronic health records, ensuring data privacy and secure sharing. A notable application of blockchain is in the energy and transportation sector. The Mobility Open Blockchain Initiative, in collaboration with Honda, General Motors, PGE, and others, introduced the first blockchain-based Electric Vehicle Grid Integration standard. This standard facilitates secure, decentralized communication and transaction recording between electric vehicles, charging infrastructure, and grid operators. By incorporating AI techniques, such as real-time optimization of charging schedules and predictive energy demand modeling, the EVGI framework enables use cases like vehicle-to-grid integration, tokenized carbon credits, and peer-to-peer energy exchange. These innovations promote a decentralized, low-carbon, and intelligent energy ecosystem, showcasing the synergy of AI and blockchain in addressing energy sustainability and climate challenges [106].
Despite its increasing adoption, blockchain technology is still evolving, with continuous improvements in four key areas: consensus mechanisms, smart contracts, privacy protection, and data retrieval. As a fundamental component of blockchain, consensus mechanisms ensure data consistency across distributed networks and enhance system resilience against attacks [107]. Smart contracts, serving as a trusted intermediary, enable the automated execution of agreements within decentralized networks, reducing human intervention while enhancing transaction transparency and efficiency. Moreover, blockchain offers a high degree of anonymity, as all stored transactions are encrypted, effectively safeguarding user privacy. Additionally, blockchain-based query systems typically incorporate data and hash indexing, organizing information to facilitate efficient data retrieval.
However, blockchain technology still faces several challenges. Consensus mechanisms may suffer from performance bottlenecks and centralization risks; smart contracts are prone to vulnerabilities and upgrade difficulties; privacy-preserving techniques often entail high computational complexity; and data retrieval still encounters issues related to efficiency, cost, and usability. These limitations necessitate further research and improvement, as illustrated in Table 10.
Table 10.
Comparison of blockchain core technologies.
Dividing AI-driven blockchain research into four categories—consensus algorithms, smart contracts, privacy protection, and data retrieval—helps clearly present the core issues and challenges within each research direction, enhancing the structural coherence and readability of the paper. This classification facilitates targeted analysis, allowing for a comparison of the strengths and weaknesses of different approaches, while also highlighting the comprehensive impact of AI technologies across various blockchain domains [114]. Additionally, it promotes interdisciplinary integration and provides clear direction and insights for future research. The existing challenges of AI-powered blockchain are shown in Figure 7 below. The diagram shows multiple applications of AI in blockchain, including smart contract vulnerability detection, consensus algorithm optimization, data privacy protection, and efficient data storage. The security, scalability, and privacy protection of blockchain are improved by techniques such as deep learning, decision trees, federated learning, and optimized Merkle trees [115].
Figure 7.
Schematic of the existing challenges of AI-driven blockchain.
3.1. AI-Driven Consensus Algorithm
AI-driven consensus algorithms are emerging as a core driving force in the intelligent evolution of blockchain systems, aiming to enhance security, efficiency, and scalability through advanced machine learning techniques. These algorithms primarily focus on three key optimization areas: dynamic node selection, malicious behavior detection, and resource allocation prediction. In dynamic adaptive consensus mechanisms, reinforcement learning can adjust PoW or PoS parameters in real time—such as dynamically modifying block generation intervals or probabilities—to improve system throughput and responsiveness. A notable example is XG-PBFT, which utilizes graph neural networks to optimize communication paths between nodes, reducing the communication complexity of traditional PBFT from O(n2) to O(n).
In terms of security, deep learning models such as LSTM are employed to analyze historical behavior of nodes and identify abnormal patterns, including selfish mining, sybil attacks, or 51% attacks. These detection mechanisms are often integrated with reputation-based systems (e.g., CE-PBFT) to effectively filter out malicious nodes and reduce the risk of consensus centralization. For resource optimization, federated learning (FL) and distributed edge intelligence frameworks enable efficient task allocation across edge nodes, thereby minimizing energy consumption and network latency while preserving data privacy. Systems like FGADL-DEVCA have demonstrated the ability to save up to 30% of energy costs in multi-node environments.
Based on a comprehensive analysis of existing research, current optimizations in AI-driven blockchain consensus primarily focus on improvements in POW and POS consensus mechanisms. These AI-driven consensus algorithms can be categorized according to the main challenges they address, such as resource-constrained environments, security and privacy concerns, economic incentives, and resource optimization. Broadly, these can be classified into four categories: AI-driven IoT/Edge computing consensus mechanisms, AI-powered security and privacy protection consensus, AI-driven economic incentives and resource optimization consensus, and AI-driven intelligent computing and deep learning consensus.
3.1.1. AI-Powered Authentication and IoT Consensus Optimization Algorithms
In the IoT environment, authentication is crucial due to the vast number of connected devices and the highly sensitive nature of the data they handle, such as those in medical devices, smart homes, and industrial control systems. Therefore, achieving efficient consensus in large-scale IoT networks while minimizing authentication consensus latency has become a pressing challenge that requires urgent resolution. These challenges are primarily characterized by resource constraints, high heterogeneity, frequent node mobility, and the need for ultra-low latency, which traditional consensus mechanisms often fail to address effectively. To address these challenges, Dutta et al. [116] introduced a significant advancement in the Proof of Authentication (PoAh) consensus algorithm, specifically designed for resource-constrained IoT devices. Building upon the original PoAh consensus, this enhanced iteration, referred to as PoAh 2.0, integrates AI at the block creator node level. This novel approach enables the generation of blockchain transactions embedded with AI-determined sensitivity and other relevant metadata, representing a pioneering concept in the field. Sun et al. [117] proposed an AI-assisted consensus algorithm tailored for vehicular networks, integrating vehicle-based metrics with neural networks. The approach incorporates key indicators such as vehicle online duration, performance, and behavior. A comprehensive model and a hierarchical classification method, combined with a BP neural network, are utilized to optimize interconnectivity. Additionally, the Informer model is employed to predict future vehicle online durations, effectively mitigating the issue of primary node vehicle dropout in collaborative IoV networks. Alruwaili et al. [118] also developed a deep-learning-based data edge verification and consensus method (FGADL-DEVCA) for IoT-cloud platforms. The primary objective of FGADL-DEVCA is to integrate blockchain technology to enhance security in IoT-cloud environments while leveraging deep learning models for efficient fault detection. Furthermore, Sasikumar et al. [119] developed a novel blockchain-assisted data edge validation and machine learning consensus algorithm (BDEV-CAML) for the purpose of IoT fault detection. The proposed BDEV-CAML technique integrates the advantages of blockchain, IoT, and machine learning models to enhance the credibility, efficiency, and security of IoT networks. However, current research still faces several gaps. Firstly, there is a lack of unified AI-driven lightweight consensus frameworks that are adaptable to a wide range of IoT scenarios, particularly in ultra-dense or rapidly changing environments. Secondly, most existing works focus on static or semi-dynamic network topologies, which limits their applicability to mobile or highly dynamic IoT networks such as UAV swarms or autonomous vehicular systems. Moreover, the integration of privacy-preserving AI techniques with blockchain-based consensus remains underexplored, particularly in scenarios involving federated or split learning across distributed IoT devices.
Potential solutions include the design of adaptive, modular AI consensus layers that can dynamically switch consensus modes based on real-time network metrics; the development of federated reinforcement learning models to allow collaborative learning without compromising data privacy; and the integration of privacy-preserving computation (e.g., homomorphic encryption and differential privacy) with consensus validation to address privacy and scalability trade-offs. Future research should also explore multi-objective optimization frameworks, balancing security, latency, energy consumption, and trustworthiness in heterogeneous IoT environments.
As shown in Table 11, this category of consensus mechanisms is primarily designed for IoT devices and edge computing environments, where computational resources are often constrained. These approaches enhance consensus efficiency by improving device authentication and optimizing online status management, thereby reducing latency and communication overhead. Moreover, they enable resource-limited devices to participate in the consensus process more reliably while ensuring data integrity. However, some solutions still require substantial computational power, making them less suitable for low-capacity devices.
Table 11.
Comparison of AI-powered authentication and IoT consensus optimization algorithms.
3.1.2. AI-Driven Security and Privacy-Preserving Consensus
Security and privacy protection are fundamental concerns in blockchain systems as they ensure the integrity, confidentiality, and trustworthiness of distributed data. In various applications, such as financial transactions, healthcare, and decentralized identity management, safeguarding sensitive information against cyber threats, unauthorized access, and data breaches is crucial. To address these challenges, AI-driven consensus mechanisms for security and privacy protection have emerged as a promising solution. By integrating AI with blockchain consensus, these mechanisms enhance anomaly detection, prevent malicious node behavior, and improve data protection through techniques such as differential privacy, federated learning, and deep-learning-based intrusion detection.
Zhang et al. [120] proposed an architecture in which devices (also referred to as nodes) can reach consensus on task results using off-chain smart contracts and private data. The proposed distributed computing architecture accelerates compute-intensive and data-intensive supervised classification algorithms, even in resource-constrained environments. This architecture significantly enhances privacy protection, preventing the leakage of distributed data. Sasikumar et al. [121] aimed to design and implement a consensus mechanism that combines blockchain and AI to enable successful big data analytics. This work presents an improved IIoT network based on the DPoS algorithm, which integrates blockchain and AI for real-time data transmission. To accelerate block generation in the IIoT network, nodes use the improved DPoS to reach consensus, select representatives, and store block information in transaction nodes. Kumar et al. [122] proposed a blockchain-supported eXplainable AI (XAI) to enhance decision-making capabilities in network threat detection within intelligent healthcare systems. Specifically, the proposed method first implements the Clique Proof of Authority (C-PoA) consensus to verify and store data across multiple cloud providers using blockchain. Secondly, a novel deep-learning-based threat tracking model is constructed by combining parallel stacked long short-term memory (PSLSTM) networks with multi-head attention mechanisms to improve attack detection. Extensive experiments confirm that it has the potential to be used by cybersecurity analysts as an enhanced decision support system. Kim et al. [123] investigated vulnerabilities in automotive safety committees and standards, using AI-based LSTM and blockchain consensus algorithms for anomaly detection in geo-tagged train carriage hacking attacks. Additionally, in the context of automotive safety, an algorithm was explored that uses LSTM-based anomaly detection techniques to predict normal and abnormal values in automotive communication networks, which are primarily divided into internal and external networks.
As shown in Table 12, the above research has made multi-dimensional optimizations in terms of privacy protection, consensus efficiency, threat detection, and system interpretability by integrating blockchain and artificial intelligence technologies, such as off-chain smart contracts to improve computing performance in resource-constrained environments, improved DPoS to achieve efficient data transmission in IIoT networks, XAI to enhance medical network security decisions, and LSTM-based anomaly detection to optimize the security of Internet of Vehicles systems. However, these works still face many challenges, including the balance between privacy protection and computing efficiency, the difficulty of model deployment on resource-constrained devices, the centralization risk of representative node elections, the lack of interpretability of deep models, and the lack of cross-platform collaboration mechanisms. Existing research has not fully solved the problem of trusted consensus and task collaboration in heterogeneous IoT environments and lacks systematic performance evaluation and incentive mechanism design for the “on-chain + off-chain” architecture. In the future, the practicality and security of blockchain in intelligent IoT systems can be further improved through technical paths such as lightweight AI models and federated learning, verifiable off-chain computing, incentive-enhanced consensus mechanisms, multimodal XAI fusion, and multi-chain collaboration protocols.
Table 12.
AI-driven blockchain security consensus.
3.1.3. AI-Driven Federated Learning and Privacy-Preserving Consensus
While blockchain technology provides decentralization and transparency, privacy protection has become an increasingly critical issue. As blockchain applications expand, particularly in sectors like finance, healthcare, and identity management, ensuring the security of sensitive information and preventing unauthorized access and data breaches have become urgent challenges. In this context, AI offers new solutions to optimize blockchain privacy protection. AI-driven consensus mechanisms for security and privacy protection, using techniques such as anomaly detection, differential privacy, and data integrity protection, can significantly enhance the privacy capabilities of the system. By integrating AI with blockchain, AI can optimize data privacy protection in the consensus process, for example, by using federated learning and deep learning techniques to strengthen data analysis and privacy computation. Additionally, nodes can deploy computational models internally, assigning incentive scores based on their computational capabilities to enhance node participation and activity. Moreover, performance-based metrics can be used to promptly identify and eliminate malicious nodes, thereby improving overall consensus efficiency and enhancing privacy protection. Cui et al. [124] proposed a novel blockchain-enabled federated learning (BCFL) scheme tailored for the IoV and incorporating differential privacy mechanisms. To meet the stringent performance requirements of IoV environments, the approach integrates a federation chain with PBFT consensus, which improves efficiency compared to traditional public blockchains. In addition, the method employs the Differential Privacy Stochastic Gradient Descent (DP-SGD) algorithm in the local training process of Federation Learning to enhance privacy preservation. Wang et al. [125] designed an innovative block structure, novel transaction types, and credit-based incentives. The proposed PF-PoFL scheme supports fully decentralized AI task outsourcing, joint mining, model evaluation and reward distribution while being resistant to fraud and Sybil attacks. In addition, PF-PoFL employs a user-level differential privacy mechanism to prevent implicit privacy leakage during federated learning model training. Deng et al. [126] developed an innovative economic model to manage monetary, trade, and supply and demand policies in AIBC. The study proposed an upper-layer DPoEV incentive consensus algorithm for economic policy implementation and introduced an underlying DABFT distributed consensus algorithm that adaptively enforces the DPoEV. In addition, the results of the study showed that the economic model can be efficiently implemented by the DPoEV-DABFT dual consensus architecture of AIBC. Alrubei et al. [127] proposed a decentralized and distributed architecture to implement Distributed Artificial Intelligence (DAI) using IoT hardware platform. The trained DAI system is deployed via IoT devices, where each IoT device acts as one or more neurons in the DAI layer. The approach relies on decentralized, self-managed blockchain technology to facilitate trusted interaction and information exchange between distributed neurons. The platform is built and customized for IoT systems to efficiently handle DAI-related tasks. In addition, the study designs and implements a novel consensus mechanism combining PoA and PoW. Zhi et al. [128] combined distributed deep learning with blockchain technology and proposed a blockchain consensus mechanism based on distributed deep learning proof-of-workload (BCDDL) to reduce the waste of computational resources in blockchain networks. Jogunola et al. [129] proposed a framework and explored perspectives related to achieving an effective integration of blockchain and artificial intelligence (BC-AI) in a carbon emissions trading system (ETS). Goh et al. [130] proposed a secure Trust Delegated Consensus Blockchain (TDCB-D3P) scheme based on the Priority Experience Replay (D3P) mechanism to address scalability and security issues simultaneously. The scheme utilizes Deep Reinforcement Learning techniques to optimize the blockchain performance.
As shown in Table 13, the aforementioned consensus optimization schemes focus on improving computational resource utilization, optimizing resource scheduling, reducing energy consumption, and minimizing unnecessary computational overhead. According to References [124,127,129], AI-driven optimization reduced consensus latency by approximately 25%, decreased transaction processing costs by about 15%, and lowered energy consumption by around 20% compared to traditional blockchain systems. The unit of energy consumption reduction is measured in kilowatt-hours (kWh), and cost reductions are calculated based on transaction fees in USD. For instance, some approaches enhance task allocation in PoW consensus to make the computation process more efficient, or, based on the PBFT model, deploy computational models within nodes where the better the node’s computational performance, the more incentives it receives. This encourages higher participation from nodes in the consensus network, thereby improving overall efficiency and reducing communication overhead. Although the above methods have achieved positive results, they still face many challenges, such as the trade-off between differential privacy and model performance, system stability under multi-consensus mechanisms, fairness of task incentive mechanisms, and on-chain compatibility of AI computing. Future research can further promote the integration and implementation of blockchain and AI in the field of privacy computing by introducing multi-level privacy protection strategies, establishing a unified and reliable AI incentive and evaluation system, developing lightweight models and asynchronous update mechanisms, and exploring cross-chain privacy collaboration protocols.
Table 13.
AI-driven economic incentives and resource optimization consensus.
3.1.4. AI-Driven Blockchain Consensus Others
Some studies primarily focus on computationally intensive tasks, such as deep learning training and smart contract execution, leveraging AI to enhance consensus computation efficiency. Kim et al. [131] proposed a series of blockchain algorithms based on natural language processing. The primary function of the Multi-Layer ANN for Blockchain Consensus Algorithm is not merely to use given data as-is to form a classifier but rather to train transformations optimized for the given data by incorporating structures known as hidden layers while simultaneously forming a classifier. Depending on the number of neurons in the hidden layers, the model can also perform dimensionality reduction or expansion on the given data. A multi-layer ANN, consisting of two layers of neurons, can be meticulously designed for enhanced performance. This structure also represents the architecture of the Multi-Layer ANN blockchain consensus algorithm, where all layers—except for the output and input layers—are designed as hidden layers that operate in conjunction with the consensus algorithm during the protocol process. Chen et al. [132] proposed a novel framework based on Deep Reinforcement Learning (DRL) to offload the computationally intensive tasks of PoW to edge servers within a blockchain-based Mobile Crowd Sensing (MCS) system. The proposed framework enables the derivation of an optimal PoW task offloading strategy in complex and dynamic MCS environments.
In addition, some researchers have introduced machine learning methods into consensus node classification, which can be divided into unsupervised nodes according to their performance, and select good nodes to participate in the consensus to reduce the communication overhead and delay of malicious nodes, and the schematic diagram of AI algorithm-driven consensus classification is shown in Figure 8 below. This figure shows the application of AI in blockchain consensus mechanism, using AI grouping algorithm to intelligently group network nodes, generate candidate blocks, and select the final block to be written into the blockchain through the consensus group so as to optimize the consensus efficiency and improve the system performance. This type of research is also the future development direction of AI-driven blockchain consensus now. For example, Xiaowei et al. [133] proposed an improved PBFT algorithm based on XGBoost grouping called XG-PBFT. The method first trains the dataset by learning important parameters that affect the performance of nodes, which are used as node classification criteria. Subsequently, the dataset is trained using the XGBoost algorithm, and the nodes newly added to the system are grouped according to the trained model. In addition, XG-PBFT assigns reputation values to nodes based on their performance, and nodes with higher reputation values are more likely to become master nodes, thus enhancing the efficiency and security of the consensus process. Xiao et al. [134] proposed a novel consensus algorithm called Credit Evaluation-based Practical Byzantine Fault Tolerance (CE-PBFT). This algorithm introduces an improved node credit evaluation model that comprehensively considers node completion rate, consensus attenuation, and historical behavior to quantify the reliability status of nodes during system operation. Through this mechanism, CE-PBFT effectively enhances the overall reliability and security of the system. Additionally, this study innovatively applies the decision tree algorithm to analyze network node behavior, thereby optimizing the consensus decision-making process and simplifying existing consensus protocols.
Figure 8.
AI algorithms drive blockchain consensus node classification.
As shown in Table 14, these consensus mechanisms are primarily applied in specialized industries or domains, such as academic credential verification and distributed computing, to ensure data integrity and reliability [135]. For instance, blockchain-based diploma authentication systems can effectively prevent certificate forgery. While these solutions demonstrate high effectiveness within their respective fields, their applicability is limited due to their lack of generalizability across broader use cases.
Table 14.
AI-Integrated blockchain for specialized applications.
3.2. AI-Driven Smart Contract
With the rapid development of blockchain technology, smart contracts, as its core component, have shown great potential in achieving automatic execution and decentralized collaboration. However, current smart contracts still face many challenges in terms of security, execution efficiency, domain adaptability, and resource management. AI, as a technical means with strong learning and pattern recognition capabilities, has been widely used in various life cycle links of smart contracts and has become an important engine to promote their performance improvement and security.
At present, the research focus of the integration of artificial intelligence and blockchain is on smart contract vulnerability detection and the construction of trust mechanisms in specific scenarios, and it has also expanded to multiple directions such as code optimization, automatic generation, and access control. In order to sort out the existing research results and clearly distinguish different technical paths and application scenarios, this paper divides the research on smart contracts driven by artificial intelligence into four categories: smart contract security and vulnerability detection, smart contract optimization and generation, smart contract applications in specific fields, and smart contract access control and resource management. A detailed classification and comparison of these studies are presented in Table 15.
Table 15.
Classification and comparison of AI-driven smart contract research.
In terms of smart contract security, AI is widely used for vulnerability detection and repair suggestion generation. Through GNN, deep learning models, and natural language processing technology, automatic identification and classification of contract logic defects can be achieved, significantly improving the security assurance before contract deployment. Especially in the identification of classic vulnerabilities such as reentrancy attacks and integer overflows, AI models show higher detection accuracy and scalability than traditional tools.
For the optimization and generation of smart contracts, AI promotes the automatic reconstruction and code generation of contract structures through reinforcement learning, neural architecture search, and pre-trained language models, thereby reducing redundant logic, reducing gas fees, and improving contract execution efficiency. Related research also combines machine learning with contract bytecode analysis to achieve automatic slimming and efficient execution path reasoning.
In specific industry scenarios, such as finance, medical care, logistics, etc., AI technology is used to build knowledge graphs, multi-agent interaction models, and cross-chain semantic adaptation mechanisms to improve the understanding and response capabilities of smart contracts to complex business rules. This makes smart contracts easier to adapt to multi-chain deployment and dynamic business needs.
In addition, AI optimization solutions are gradually being introduced into smart contract access control and resource management. Researchers use graph learning, federated learning, and reinforcement learning methods to model user permissions and conduct behavioral analysis, achieving dynamic allocation of resources and adaptive management of security boundaries. At the same time, explainable AI technology has also begun to be applied to the permission decision-making process to improve its compliance and regulatory compliance.
3.2.1. AI-Driven Smart Contract Security and Vulnerability Detections
Blockchain smart contract vulnerabilities can lead to irreversible economic losses, while traditional detection methods suffer from high false positives, omissions, and difficulty in dealing with complex attacks. As the complexity of smart contracts increases, code concealment, and new attack methods make detection more difficult, AI-driven vulnerability detection improves detection accuracy and reduces false positives and omissions through deep learning and graph neural networks and also has adaptive learning capabilities to identify variant attacks and provide intelligent remediation solutions. Compared with traditional methods, AI has significant advantages in efficiency, accuracy, and adaptability and can more effectively protect smart contract security.
Smart contracts, as a crucial application of blockchain technology, are susceptible to a variety of potential vulnerabilities during execution. As shown in Table 16, these flaws may pose serious threats to the security and reliability of smart contracts. Below is a detailed overview of several key categories of smart contract vulnerabilities:
Table 16.
Comparison of key categories of smart contract vulnerabilities.
- (1)
- Arithmetic Vulnerabilities
Arithmetic vulnerabilities primarily arise from errors in mathematical operations within smart contracts, most notably overflow and underflow. In programming, data types typically have fixed value ranges. When the result of an operation exceeds these limits, overflow or underflow occurs. The root causes often include a lack of boundary checking and the absence of secure math libraries. Such libraries can detect and prevent abnormal results during computation. For instance, in ERC20 token contracts, overflow may occur during token increment or decrement operations. This could lead to incorrect token calculations—such as unintentionally increasing or decreasing token balances—ultimately allowing attackers to mint tokens illegitimately. Exploiting such a flaw, a malicious user could inflate their token balance and transfer the excess tokens to another address, resulting in financial loss.
- (2)
- Re-entrancy Attacks
Re-entrancy attacks exploit the recursive nature of function calls in smart contracts. Specifically, the attack occurs when a contract makes an external call (e.g., to another contract or function) and, before the contract’s state is updated, an attacker re-enters the contract through a fallback or recursive function. This is possible due to the lack of appropriate safeguards or function locking mechanisms. A well-known example is the infamous DAO attack, where the attacker repeatedly invoked the withdrawal function before the contract updated the balance. This allowed multiple unauthorized withdrawals, eventually draining a significant amount of funds and triggering a hard fork of the Ethereum blockchain.
- (3)
- Unchecked Calls
Unchecked call vulnerabilities stem from the failure to verify the return values of low-level function calls. In Solidity, functions like call() and delegatecall() may fail due to network issues, contract state problems, or unexpected behaviors. If the developer does not explicitly check whether the call was successful, it may lead to hidden execution failures or undesired behavior. One notable incident is the Parity Wallet vulnerability, where critical contract operations were carried out based on unverified return values. As a result, users might assume that operations such as fund transfers were successfully completed, while in reality, the funds remained in the original address or were misdirected, causing unintended financial consequences.
- (4)
- Inconsistent Access Control
Inconsistent access control issues are mainly due to improper or missing configuration of role-based permissions in smart contracts. Ideally, different roles (e.g., administrator, user) should have clearly defined privileges, ensuring that only authorized entities can perform sensitive actions. However, if these mechanisms are misconfigured—such as assigning administrative rights to regular users or failing to enforce restrictions—the contract becomes vulnerable. Such flaws may allow unauthorized users to perform critical actions like modifying contract parameters or transferring funds, thereby compromising the integrity and security of the entire contract system.
Lyu et al. [136] first introduced the Contract Dependency Graph (CDG) to analyze vulnerabilities in Ethereum smart contracts. The CDG characterizes inter-contract dependencies formed by DELEGATECALL-type internal transactions in Ethereum. They then proposed three general definitions of security violations related to the CDG to identify potential victim contracts affected by different types of vulnerable contracts. To validate these security violations, they constructed a CDG using 195,247 active smart contracts from the latest Ethereum blocks and successfully detected three representative known vulnerabilities. Yang et al. [137] proposed CrossFuzz, a fuzzing-based approach for cross-contract vulnerability detection. Their method leverages data flow information to optimize mutation strategies, significantly improving the efficiency of fuzz testing in identifying cross-contract vulnerabilities. Gao et al. [138] introduced an automated approach to learning the characteristics of Solidity-based smart contracts, which is particularly beneficial for clone detection, error detection, and contract verification. Wei et al. [139] conducted a comprehensive survey on smart contract quality assurance, covering vulnerability identification, the evaluation of detection tools, and dataset development. They developed an annotated dataset as a benchmark, including ten common vulnerability types, serving as a critical resource for future research. Additionally, they conducted extensive experiments evaluating 14 vulnerability detection tools, providing comparative analyses that highlight their strengths and limitations. Vidal et al. [140] proposed OpenSCV, a novel open and hierarchical classification system for smart contract vulnerabilities. OpenSCV is designed to be community-driven, aligning with current industry practices while remaining adaptable to future modifications and advancements. Wang et al. [141] introduced HomoDec, a timestamp vulnerability detection technique for smart contracts based on code homogeneity analysis. The core idea is to compare the tested smart contract’s code against a database of known vulnerability patterns, assessing similarities to determine whether the tested contract exhibits timestamp-related vulnerabilities. Fei et al. [142] developed MSmart, a novel tool that transforms smart contract source code into an intermediate representation and detects vulnerabilities based on XPath rules. They extended SmartCheck’s intermediate representation rules to identify a broader range of vulnerabilities and optimized existing rules to accommodate the increasing complexity of smart contracts. Chen et al. [143] introduced DefectChecker, a symbolic execution-based method and tool designed to detect eight types of contract defects that may lead to undesirable behaviors on the Ethereum blockchain. DefectChecker identifies these defects directly from smart contract bytecode. Lin et al. [144] developed CRPWarner (contract-related Rug Pull Risk Warner) to identify malicious functionalities within smart contracts and issue warnings about potential rug pull risks. Wu et al. [145] proposed a Hybrid Attention Mechanism (HAM) model for detecting security vulnerabilities in smart contracts. Their approach extracts code snippets from source code, focusing on critical areas where vulnerabilities are likely to occur. Zhang et al. [146] introduced CBGRU, a hybrid deep learning model that strategically integrates various word embeddings (Word2Vec and FastText) with multiple deep learning architectures (LSTM, GRU, BiLSTM, CNN, and BiGRU). The model extracts features using different deep learning methods and combines them to enhance smart contract vulnerability detection. Hwang et al. [147] proposed CodeNet, a code-oriented CNN architecture designed to detect vulnerable smart contracts while preserving semantic and contextual information. To further improve CodeNet’s performance, they developed a data preprocessing module that transforms smart contracts into images while maintaining local structural integrity. Gao et al. [148] explored the use of graph neural networks (GNNs) combined with expert knowledge for smart contract vulnerability detection. Their approach transforms the rich control and data flow semantics of source code into a contract graph and introduces a novel temporal message propagation network to extract graph features from a normalized graph. These extracted features are then integrated with expert-designed patterns to develop a comprehensive detection system. Ivanov et al. [149] proposed a novel smart contract security testing method called Transaction Encapsulation. The core idea involves executing transactions locally on fully synchronized yet isolated Ethereum nodes, allowing for a preview of transaction sequence outcomes in the blockchain’s current state. To ensure testing accuracy, their system, TxT, deterministically verifies whether a given transaction sequence follows the same execution path within the blockchain’s current state.
Yu et al. [150] introduced TxMirror, an innovative data-driven framework that detects bytecode-level smart contract vulnerabilities by symmetrically simulating transactions. Beyond logical analysis, TxMirror customizes the Ethereum Virtual Machine (EVM) for vulnerability detection and stores stack data and logical dependencies in a bi-linked forest structure, enabling efficient indexing of logical relationships. This approach allows TxMirror to directly examine custom EVM stack data within transactions without requiring repeated transaction replays or EVM bytecode-level tracing. Li et al. [151] presented a multimodal feature fusion-based approach for smart contract vulnerability detection. Their method extracts three types of modal features from the smart contract lifecycle, leveraging both static and dynamic characteristics. By integrating Graph Convolutional Networks (GCN) and Bidirectional Long Short-Term Memory (Bi-LSTM) networks, the system effectively detects various vulnerabilities in smart contracts. Pasqua et al. [152] proposed a new method based on symbolic execution of the EVM operand stack, enabling precise jump address parsing within EVM bytecode and constructing an accurate Control Flow Graph (CFG) of compiled smart contracts. Additionally, they extended EtherSolve with two specialized detectors for identifying Ethereum’s two most prominent vulnerabilities—Re-entrancy and Tx.origin misuse. Qian et al. [153] introduced a hybrid approach combining Bi-LSTM and an attention mechanism for multi-label vulnerability detection in smart contract opcode sequences. The process begins with preprocessing opcode data, transforming it into a feature matrix suitable for neural network input. The system then employs an attention-enhanced Bi-LSTM model to classify smart contracts with multiple vulnerabilities. Peng et al. [154] developed RNVulDet, a tool that integrates taint analysis techniques to automatically identify poor randomness vulnerabilities and detect corresponding exploit transactions. Le et al. [155] proposed a comprehensive approach leveraging pre-trained Large Language Models (LLMs) for Ethereum smart contract vulnerability detection. By applying transformer-based LLMs, their method utilizes the models’ ability to understand and analyze Solidity code, effectively identifying potential security vulnerabilities. Wang et al. [156] introduced a metric learning and Bi-LSTM-based vulnerability detection framework for Ethereum smart contracts, optimizing the model’s feature space. Their approach was evaluated on a large-scale dataset containing four major types of vulnerabilities: arithmetic vulnerabilities, re-entrancy attacks, unchecked calls, and inconsistent access control mechanisms.
As shown in Table 17 and Table 18, in the domain of smart contract security and vulnerability detection, research primarily centers on enhancing detection accuracy and efficiency through techniques such as graph analysis, symbolic execution, machine learning, and deep learning. Studies demonstrate high efficacy in identifying prevalent vulnerabilities like re-entry attacks, integer overflows, and timestamp dependencies, with significantly reduced false-positive rates. However, existing approaches exhibit notable limitations, including substantial computational costs, reliance on frequent rule updates, and diminished performance in detecting complex vulnerabilities. Notably, AI-driven methods, while adept at recognizing known threats, often lack generalizability to emerging attack vectors such as cross-chain exploits and compositional vulnerabilities. Furthermore, current methodologies infrequently integrate multi-modal analyses that correlate code behavior with transactional patterns, thereby constraining system robustness and threat coverage. Future advancements may lie in exploring self-supervised learning frameworks and multi-modal neural architectures to bolster defensive capabilities against unknown adversarial strategies.
Table 17.
Comparison of smart contract security and vulnerability detection research.
Table 18.
Comparison of smart contract security and vulnerability detection research.
3.2.2. AI-Driven Smart Contract Optimization and Generation
Blockchain smart contracts effectively solve the centralized trust problem in several specific scenarios, such as decentralized finance (DeFi), supply chain management, and e-government. In order to further boost the efficiency and adaptability of smart contracts, scholars at home and abroad have attempted to introduce AI into smart-contract-related research.
Table 19 summarizes key approaches to smart contract optimization, highlighting that while these methods enhance automation, efficiency, and maintainability, many are limited by platform dependence or additional metadata requirements. Park et al. [157] proposed a smart contract proxy to enhance the reusability of smart contracts in blockchain environments. Their approach provides a framework for comparing and reusing smart contracts, with the proposed proxy serving as a reference model to improve the flexibility and reusability of smart contract management in blockchain ecosystems. Sanchez-Gomez et al. [158] presented the first overview of a UML-based smart contract metamodel, which enables the implementation of these objectives. This metamodel is expected to be further refined in future work to represent blockchain environments and facilitate automated testing. Gec et al. [159] introduced a novel recommendation system designed to support the low-cost development and deployment of EVM-based smart contracts. The system’s algorithm assists developers by suggesting smart contract templates that align with their requirements and are compatible with fog computing architectures.
Table 19.
Summary of smart contract optimization and generation approaches.
Chen et al. [160] proposed an Annotation-Assisted Smart Contract Generation Method. To evaluate its effectiveness, the method was tested using BLEU scores for bilingual quality assessment, along with security analysis tools such as Mythril and VaaS. The results were then compared with those of existing approaches. Tong et al. [161] introduced a new SLA management model that leverages SDN-enabled WSNs composed of wireless nodes to interact with smart contracts in a simplified manner. The proposed model ensures the persistence of network metrics and SLA compliance through smart contracts, eliminating the need for third-party audits in payment and compensation procedures.
Table 20 presents five representative approaches to smart contract optimization, each enhancing reusability, automation, or compatibility, while facing limitations such as metadata dependence, ecosystem constraints, or implementation immaturity.
Table 20.
Comparison of smart contract optimization and generation research.
3.2.3. AI-Driven Smart Contract Applications in Specific Domains
Nowadays, blockchain smart contracts have been widely used. For an AI-driven implementation of smart contracts in specific applications, relevant scholars have done the following research: Margret et al. [162] proposed a tamper-proof framework for storing and retrieving data. The framework leverages AI techniques to evaluate the mathematical computations of smart contracts, including overhead, execution time, average computational cost, standard deviation, throughput, and resource utilization.
To address the issues of widespread fake restaurant reviews, unreliable rating authenticity, and low customer satisfaction with recommended dishes, Zhang et al. [163] introduced a peer-to-peer architecture based on blockchain smart contracts. Additionally, AI-powered predictive analytics were employed to enhance data analysis and improve recommendation accuracy. Xiao et al. [164] proposed a plastic-credit-driven incentive system composed of a recyclability index (RI) and plastic credits to promote plastic recycling and enhance the quality of recyclable plastics. This system relies on a market self-regulation mechanism to guide industry participants in self-regulating and optimizing plastic production and trading processes. Wang et al. [165] proposed a consortium blockchain and smart-contract-based framework for tracking and tracing agricultural supply chain workflows. This approach enhances traceability and data sharing while mitigating information silos among enterprises, reducing the reliance on centralized institutions. Moreover, it improves the integrity, reliability, and security of transaction records. Garcia et al. [166] explored the potential of leveraging smart contracts in Byzantine Fault Tolerant (BFT) blockchain platforms. Specifically, they examined the BFT blockchain platforms Tendermint and Hyperledger Besu and applied them to a decentralized e-prescription management case study to evaluate their effectiveness and feasibility. Agrawal et al. [167] investigated the design of a blockchain-based resource-sharing collaborative framework, leveraging smart contracts to facilitate decentralized resource allocation. This framework is particularly well suited for broader networks or ecosystems beyond conventional supply chains, where established collaboration mechanisms and hierarchical structures exist to enhance resource management transparency and data authenticity.
As shown in Table 21, the research on smart contract applications in specific domains such as smart cities, food supply chains, agriculture, and healthcare has primarily focused on leveraging their capabilities in data management, trust mechanisms, and traceability. Studies demonstrate that smart contracts can enhance data integrity, reduce reliance on intermediaries, and improve supply chain transparency. However, many of these solutions exhibit high computational resource consumption, raising concerns about their scalability and applicability in large-system deployments. This is primarily because AI-assisted smart contracts require complex data preprocessing, feature extraction, and model inference, all of which involve intensive computations. Additionally, maintaining security and trust often necessitates mechanisms such as Trusted Execution Environments (TEEs) or zero-knowledge proofs (ZKPs), further increasing the computational load. Frequent on-chain and off-chain interactions for model verification and the potential need for continuous model updates or retraining exacerbate resource demands. Furthermore, while AI-enhanced smart contract studies show promise, they predominantly remain at the proof-of-concept stage, lacking comprehensive validation in real-world, large-scale scenarios. Critical performance bottlenecks, including transaction throughput and latency under high-load conditions, are often overlooked. Addressing these challenges requires advancing modular and reusable smart contract architectures, alongside integrating AI techniques to predict and optimize performance in high-frequency, resource-constrained transaction environments.
Table 21.
Comparison of smart contract implementations in specific applications.
3.2.4. AI-Driven Smart Contract Access Control and Resource Management
With the increasing adoption of blockchain technology across industries, smart contracts have become a key component in automating and securing digital transactions. However, traditional smart contracts face several limitations in access control and resource management, especially in large-scale decentralized environments. Traditional access control models, such as Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), often struggle with flexibility, adaptability, and computational efficiency when deployed in dynamic and heterogeneous blockchain ecosystems. AI-driven mechanisms have been introduced into smart contract systems. AI enhances access control by making real-time, context-aware decisions and optimizes resource management through predictive analytics and automated allocation policies. Zhang et al. [168] integrated blockchain-based smart contracts with the ABAC model, proposing a distributed and reliable access control framework for smart cities. Karakoc et al. [169] proposed a novel SLA (Service Level Agreement) management model that utilizes SDN (Software Defined Networking)-enabled WSNs (Wireless Sensor Networks) composed of wireless nodes to facilitate seamless interaction with smart contracts. The proposed model ensures the persistence of network performance metrics and SLA specifications through smart contracts, thus eliminating the need for intermediaries to audit payment and compensation procedures. Guo et al. [170] address the above challenges by introducing a privacy-preserving decentralized database system in a parallel smart contract model. The proposed system implements oblivious access interactions, which are inherently asymmetric and require significant computational effort on the smart contract side. By slightly reducing the overhead of oblivious memory (ORAM) and mitigating the problems associated with centralized servers, the system enhances privacy and decentralization in blockchain-based applications.
As shown in Table 22, the research on access control and resource management in blockchain systems highlights significant limitations in existing solutions. Current approaches predominantly rely on static ABAC strategies, which prove inadequate for the highly dynamic and decentralized nature of blockchain environments. Additionally, decentralized data access mechanisms such as Oblivious RAM introduce substantial computational overheads and demonstrate poor compatibility with smart contract execution. To address these challenges, future research should explore two key avenues: first, developing AI-driven dynamic access control systems capable of real-time adaptation to contextual changes, and second, innovating lightweight secure storage models to enable efficient and scalable resource management within blockchain ecosystems. These advancements aim to overcome performance bottlenecks while enhancing security and adaptability in decentralized architectures.
Table 22.
Comparison of smart contract access control and resource management research.
3.3. AI-Driven Privacy Protection
In today’s data-driven era, privacy protection has become a crucial issue. With the rapid development of artificial intelligence, the IoT, and Big Data technologies, huge amounts of sensitive data are being collected, stored, and analyzed, such as medical records, financial transactions, and user behavior data. However, there is an increasing risk of data leakage, unauthorized access, and malicious attacks, which not only threaten users’ personal privacy but may also lead to the leakage of confidential corporate information.
FL is an emerging decentralized machine learning approach that allows multiple clients to train models locally and share only the model update parameters, not the raw data, thus enabling federated modeling without exposing private data. The core idea of FL is to perform collaborative learning across multiple devices or organizations while minimizing the risk of data leakage, reducing the risk of data leakage. FL mainly consists of horizontal federated learning (for data with the same features but different users), vertical federated learning (for data with shared users but different features), and federated migration learning (for the case of uneven data distribution), which is widely used in finance, healthcare, and IoT. Privacy protection is a key challenge in blockchain systems. Traditional blockchain architectures make users’ private information vulnerable to attacks due to the openness and transparency of data. Federated learning combined with blockchain technology enables decentralized model training without sharing raw data while relying on blockchain’s distributed ledger, immutability, and smart contracts to enhance data security and transparency. Compared with traditional centralized privacy protection mechanisms, federated-learning-based blockchain privacy protection schemes can reduce the risk of data leakage, reduce computation and communication costs, and improve data trustworthiness and thus have become a hot direction in privacy protection research in recent years. The blockchain and federated learning schematic is shown in Figure 9 below. This figure shows the blockchain and AI-based connected car architecture. The lower layer is the On-Board Unit (OBU) interacting with the roadside base station through wireless communication, and the upper layer uses the combination of blockchain and AI federated learning for data processing and privacy protection to ensure data security and uploading efficiency of the Telematics system.
Figure 9.
Schematic of federated learning combined with blockchain.
At present, privacy-protection-related research has made extensive progress in which blockchain technology plays an important role in data security and privacy protection. We classify the research on blockchain privacy protection into the following two categories: (1) federated-learning-based blockchain privacy protection, i.e., the use of federated learning to train distributed models and the combination of blockchain technology in order to improve data security and privacy protection; and (2) other blockchain-based privacy protection mechanisms, such as zero-knowledge proofs, ring signatures, homomorphic encryption, differential privacy, and other methods. These methods ensure data privacy through cryptographic techniques while combining the tamperability and decentralized nature of blockchain to provide stronger privacy protection.
- (1)
- Federated-Learning-Based Blockchain Privacy Protection
Despite its advantages in decentralized model training, federated learning faces several pressing challenges when applied to blockchain privacy protection. These include potential privacy leakage through model updates, heterogeneous data distributions affecting model accuracy, high communication overhead, and vulnerability to poisoning attacks from malicious nodes. To address these issues, recent studies have introduced AI-driven enhancements such as differential privacy mechanisms for noise injection, knowledge distillation techniques to reduce communication costs, and graph neural network-based aggregation to improve robustness. Moreover, blockchain-based logging and verification can be employed to trace model contributions, while smart contracts automate model update validation and access control. These integrated strategies significantly enhance the trustworthiness, scalability, and privacy-preserving capabilities of federated learning in blockchain systems.
- (2)
- Other Blockchain-Based Privacy Protection Mechanisms
Traditional privacy-preserving mechanisms in blockchain, including zero-knowledge proofs (ZKPs), ring signatures, homomorphic encryption, and differential privacy, are often constrained by high computational complexity, limited scalability, and inadequate adaptability to dynamic blockchain environments. These limitations may lead to increased transaction latency, degraded system performance, and greater vulnerability to side-channel attacks or misuse. To mitigate these drawbacks, artificial intelligence has been increasingly applied to optimize these techniques. For example, deep learning models are used to accelerate ZKP generation and verification processes, reinforcement learning enables dynamic tuning of noise levels in differential privacy, and graph neural networks facilitate efficient ring signature routing. Additionally, intelligent schedulers operating within trusted execution environments (TEEs) can allocate privacy-preserving resources adaptively based on contextual data sensitivity. Collectively, these AI-driven solutions offer a promising direction to enhance the efficiency, flexibility, and resilience of privacy protection in blockchain systems.
3.3.1. Other Blockchain-Based Privacy Protection Mechanisms
Traditional blockchain-based privacy protection mainly uses encryption and zero-knowledge proofs to encrypt user data without incorporating federated learning, and many scholars have carried out related research. Selvarajan et al. proposed [171] an Artificial-Intelligence-based Lightweight Blockchain Security Model (AILBSM) for ensuring privacy and security of IIoT systems. This novel model aims to address security and privacy issues that may arise when dealing with cloud-based IIoT systems that process data in the cloud or at the edge of the network (on devices). Wang et al. [172] proposed a novel solution called Hierarchical Blockchain-Enabled Cloud Edge Choreography Federated Learning (HBCE-FL) to address these challenges. HBCE-FL aims to provide secure, intelligent, and distributed data analysis for IoT users. Miao et al. [173] studied how data sharing is achieved through model sharing, and, based on this, a secure data sharing mechanism called BP2P-FL was proposed, which employs peer-to-peer federated learning and protects the privacy of data providers. Smahi et al. [174] proposed BV-ICV, a blockchain-enabled and privacy-preserving FL framework for ICVs in edge-envisioned V2X environments, to alleviate these concerns. The system uses zero-knowledge succinct non-interactive knowledge argument (zkSNARK) validation compiled into smart contracts to prevent malicious, compromised, or even justified ICVs from uploading unreliable, incorrect, or low-quality model updates. Yang et al. [175] proposed an interpretable federated learning approach with controlled machine learning efficiency and controlled credit model decision-making, leading to controlled credit model complexity and transparently traceable credit decision-making mechanisms. They then proposed an interpretable federated learning training mechanism for credit data to prevent model gradient leakage trained by a single node throughout the model training period. Firdaus et al. [176] introduced the concept of distributed edge intelligence that combines the advantages of FL, differential privacy (DP), and blockchain to address the previously posed problem. Li et al. [177] proposed a blockchain-enabled federated learning (BeFL) for distributed cybersecurity malicious behaviour knowledge base architecture to ensure the security of knowledge transfer.
As shown in Table 23, the research on integrating FL with blockchain technology aims to enhance data privacy and security in decentralized data processing across domains like healthcare, IoT, IoV, finance, and supply chains. Blockchain enables decentralized governance, secure data storage, and model validation, while FL facilitates collaborative model training without raw data sharing, mitigating leakage risks. Techniques such as differential privacy, homomorphic encryption (HE), and trusted execution environments (TEEs) are widely employed to strengthen privacy, complemented by smart contracts and reputation mechanisms to ensure system fairness and trustworthiness. However, current approaches often overlook the threat of malicious nodes injecting poisoned models, compromising collaborative learning integrity, and suffer from communication overheads that hinder performance in bandwidth- or latency-constrained environments. Moreover, the applicability of these methods remains limited to data-sensitive distributed scenarios, with algorithmic research facing challenges in scalability and accuracy. Future advancements should prioritize robust anomaly detection mechanisms to filter malicious updates and leverage reinforcement learning to dynamically optimize model synchronization intervals, thereby improving system resilience, communication efficiency, and broader applicability.
Table 23.
Other blockchain-based privacy protection mechanisms.
3.3.2. Federated-Learning-Based Privacy Protection for Blockchain
Nowadays, the blockchain privacy protection scheme combined with federated learning can reduce the risk of data leakage and improve the security and trustworthiness of data at the same time, and many scholars at home and abroad pay attention to this aspect of learning. Wan et al. [178] proposed a federated learning privacy protection method that integrates distillation defense technology with a blockchain architecture. This approach leverages distillation defense to reduce the sensitivity of federated learning client devices to perturbations and enhances their ability to resist adversarial sample attacks. Liu et al. [179] designed a decentralized FL privacy protection framework based on blockchain, differential privacy, and generative adversarial networks (GANs). This framework effectively mitigates single points of failure and enhances resistance to inference attacks. Ma et al. [180] proposed a blockchain-based privacy-preserving federated learning (BPFL) framework that integrates FL, pairwise additive masking, and the Chinese Remainder Theorem. This framework enables mobile participants to collaborate on crowdsourced machine learning tasks while preserving privacy. Wang et al. [181] proposed a blockchain-based privacy-preserving federated learning scheme, BPFL, which utilizes blockchain as the underlying distributed framework for FL. By improving Multi-Krum technology and integrating homomorphic encryption, the scheme achieves ciphertext-level model aggregation and filtering, ensuring local model authenticity while preserving privacy. Zhao et al. [182] designed a FL-based smart home system that leverages a reputation mechanism to assist home appliance manufacturers in training machine learning models based on customer data, optimizing smart home services. Zhu et al. [183] proposed UBFL, an innovative privacy-preserving federated learning mechanism that integrates blockchain technology for secure and efficient data sharing. Unlike traditional methods relying on differential privacy, UBFL employs adaptive nonlinear encryption to safeguard the privacy of UAV model updates while ensuring data integrity and accuracy. Mo et al. [184] proposed a consortium blockchain (CB) and FL-based data management framework for medical network communities, enabling secure data sharing between medical institutions and research organizations. Wang et al. [185] proposed a blockchain-based federated learning approach for privacy-preserving sharing of non-IID data in the industrial internet. This approach dynamically updates local models to mitigate the accuracy degradation caused by non-IID data. Zhang et al. [186] proposed a blockchain-based hierarchical federated learning framework designed to enhance the training of non-IID data, improve data privacy protection, and optimize federated learning performance.
Myrzashova et al. [187] introduced an innovative framework leveraging blockchain-based federated learning to identify 15 different lung diseases while ensuring data privacy and security. Rabbani et al. [188] proposed an FL framework integrating multiple machine learning models to prevent fraudulent transactions in blockchain systems while preserving customer privacy, eliminating the need for private customer data exchange between institutions. Meng et al. [189] proposed a blockchain-based machine learning scheme for secure data sharing in distributed energy storage networks, incorporating secure federated learning to formulate data sharing as a machine learning problem. Zhu et al. [190] proposed an innovative framework that integrates Trusted Execution Environment and blockchain technology to address data security and privacy challenges in IoT supply chain management. Jia et al. [191] proposed a multi-task privacy-preserving FL framework using partitioned blockchain, enabling multiple requesters to execute different FL tasks concurrently. Zhang et al. [192] proposed a blockchain-based pseudorandom number generation (BPNG) protocol using verifiable random functions (VRFs) to ensure fairness in federated learning schemes. Dong et al. [193] proposed a benchmark evaluation approach to optimize federated person re-identification performance in blockchain-powered edge-intelligent UAV delivery systems. Dhasaratha et al. [194] integrated blockchain-reinforced federated learning for post-COVID-19 patient data in IoMT applications to enhance data privacy and security. Li et al. [195] modeled multi-source devices using federated learning and stored model parameters and reputation values on the blockchain to enhance training accuracy and ensure data privacy security.
As shown in Table 24 and Table 25, this research area explores blockchain-native privacy-preserving mechanisms that leverage zero-knowledge proofs, access control encryption, and knowledge graphs to enable decentralized data sharing, financial credit modeling, and secure transactions without relying on federated learning. These techniques emphasize decentralization, tamper-proof transparency, and verifiable transactions while addressing data privacy through cryptographic methods. However, practical deployment faces challenges due to high computational and storage overheads, particularly requiring strong computing power nodes. Complementary AI-driven approaches integrating zero-knowledge proofs, homomorphic encryption, and ring signatures aim to enhance privacy in blockchain systems yet suffer from increased computational complexity that limits applicability on resource-constrained devices. The current integration of AI with these privacy mechanisms often remains loosely coupled, missing deeper synergistic optimizations. Future directions focus on developing lightweight AI models specifically optimized for accelerating ZKP/FHE computations and leveraging AI-generated constraints within zero-knowledge proof systems. Such advancements could potentially reconcile computational efficiency with robust privacy guarantees in decentralized blockchain environments, addressing both the technical limitations of existing cryptographic methods and the underexplored potential of tighter AI-privacy mechanism integration.
Table 24.
Blockchain-integrated FL for privacy protection.
Table 25.
Blockchain-integrated federated learning for privacy protection.
3.4. AI-Driven Data Storage and Retrieval
In the face of the growing challenge of massive data, traditional blockchain systems have obvious deficiencies in storage efficiency and retrieval performance, especially when processing large-scale, unstructured data, which is costly, and slow to write, and has large query latency, limiting its practical application in the fields of IoT, medical care, and supply chain. To address this problem, the current mainstream solution is to combine blockchain with IPFS (Interplanetary File System) to build a hybrid architecture of “on-chain index + off-chain storage”: blockchain is responsible for recording key business process data (such as production, processing, warehousing, sales, etc.) to ensure data traceability and transparency, while IPFS is dedicated to storing large files (such as quality inspection reports, medical images, etc.) and establishes a mapping link with the blockchain through hash values to ensure data integrity and immutability. The schematic diagram of combining blockchain and IPFS to store traceability data is shown in Figure 10. AI technology further improves the intelligence and efficiency of this system: in terms of storage, AI can predict data popularity and realize intelligent scheduling and dynamic hierarchical management of node resources; in terms of retrieval, with the help of deep learning, NLP, multimodal recognition and other technologies, it supports more efficient semantic retrieval and multi-source information query; at the same time, it also introduces quantum-resistant hashing and privacy protection algorithms to enhance security and sustainability. Overall, the integration of AI with blockchain and IPFS not only solves the performance bottleneck but also promotes the construction of a decentralized, highly reliable and highly collaborative data system, providing strong support for the digital transformation of multiple industries.
Figure 10.
Blockchain and IPFS combine to solve storage burden.
With the upgraded iteration of AI technology, the combination of AI and blockchain technology promotes the efficiency of data retrieval and storage on blockchain. Research has been carried out in this area both domestically and internationally. Cai et al. [196] introduced EncELC, a framework designed for ethereum light clients to enhance client-side protection and support rich queries on the ethereum blockchain [197]. This approach aims to improve the security and functionality of light clients accessing blockchain data [198]. Khan et al. [199] proposed TREAD, a system for storing and retrieving vehicle-generated sensitive mobile data on the blockchain. By utilizing the Interplanetary File System (IPFS), TREAD addresses scalability challenges while protecting user privacy when handling large amounts of data. In the context of supply chain management, Yiu et al. [200] developed a decentralized anti-counterfeiting system using blockchain technology to ensure authenticity and traceability of physical goods. The system facilitates the retrieval and validation of trusted data sources, thereby improving the security of supply chain operations. Almaiah et al. [201] proposed a hybrid digital healthcare authentication model integrating artificial intelligence and blockchain technologies. This model addresses the authentication and data privacy challenges in smart healthcare systems, emphasizing on security and privacy in data management [202]. Singh et al. [203] introduced a smart enterprise trust management scheme using blockchain technology. By leveraging enhanced intelligence, the scheme improves trust and security in enterprise operations, demonstrating better performance than existing approaches. Wang et al. [204] introduced a hierarchical trust evaluation strategy for 5G-enabled Intelligent Transport Systems (ITS) using a heterogeneous blockchain approach. This strategy employs joint deep learning techniques to ensure reliable and low-latency communication in ITS applications. Finally, Khan et al. [205] developed a secure searchable cryptographic framework for medical IoT systems using blockchain technology. The framework integrates Binary Spring Search techniques with a hybrid deep neural network approach to enhance the security and reliability of medical data storage and retrieval.
As shown in Table 26, a comparative analysis of AI-driven blockchain-based data retrieval and storage approaches covering areas such as healthcare, smart transportation, and enterprise trust management found that technologies such as federated deep learning, augmented intelligence, and hybrid neural networks are highly integrated, thereby enhancing security, privacy, and efficiency. These systems have leveraged various blockchain platforms, including heterogeneous architectures and IoT-integrated architectures, but still face persistent challenges. Scalability remains a key constraint due to the computational requirements of AI models and blockchain storage overhead, while interoperability issues hinder seamless data exchange. Notably, current solutions mainly deal with structured data, while semantic indexing for unstructured data types such as images, audio, and video is still imperfect. There are also gaps in IPFS integration, lacking intelligent mechanisms for hot spot prediction and dynamic data scheduling, resulting in storage redundancy. To advance the field, future research should focus on multimodal frameworks that combine large language models with CLIP for cross-modal semantic indexing, AI-driven algorithms to optimize hot spot data placement in decentralized storage, and knowledge graph-enhanced, context-aware retrieval systems to improve efficiency and user experience.
Table 26.
Comparison of AI-driven blockchain-based data retrieval and storage approaches.
4. Discussion and Future Directions
With the continuous development of technology, blockchain is widely used in various fields due to its decentralization, data integrity, traceability, and anonymity. However, blockchain still faces many challenges: (1) consensus algorithms have scalability bottlenecks (e.g., PoW low throughput and high energy consumption) and centralization risks (e.g., PoS node monopoly); (2) smart contracts have frequent security vulnerabilities due to untamperable code (e.g., re-entry attacks) and high development thresholds and upgrading difficulties; (3) privacy protection is limited by the conflict between transparency and privacy (e.g., public chain data exposure), insufficient technical performance (e.g., high ZKP latency), and facing compliance conflicts; (4) data retrieval is limited by high on-chain storage costs, inefficient querying (requiring full-chain scanning), and weak unstructured data processing capabilities. This paper discusses and looks at each of the following four modules.
This paper summarizes the research on the core modules of AI-driven blockchain. Specifically, the machine learning or deep learning used drives the blockchain consensus algorithm, smart contracts, privacy protection, and data upload and retrieval. Table 27 shows the models in AI used by the relevant researchers summarized in this article to improve and apply different modules of blockchain. From the two major categories of machine learning and deep learning, the training types, algorithms/architectures and their application scenarios in blockchain are sorted out. In the field of machine learning: supervised learning uses algorithms such as decision trees and Support Vector Machines for smart contract vulnerability detection and node classification; unsupervised learning uses methods such as K-Means to achieve blockchain data clustering and transaction pattern mining; semi-supervised learning uses self-training and other methods to help privacy medical data sharing and other analysis tasks with limited labeled data; reinforcement learning uses algorithms such as Q-Learning to optimize consensus mechanisms and miner task offloading. In the field of deep learning, Convolutional Neural Networks such as LeNet can detect smart contract vulnerabilities and process image/video data stored on the chain; Recurrent Neural Networks and their variants (LSTM, etc.) are used for contract multi-label vulnerability prediction and transaction time series analysis; Transformer-based models (BERT, etc.) can perform tasks such as smart contract language modeling that combine blockchain and natural language processing; generative adversarial networks (DCGAN, etc.) play a role in privacy protection, data generation, etc.
Table 27.
Classification of training methods and their application scenarios in blockchain systems.
4.1. General Discussion and Future Prospects
Although the related studies summarized in this article have achieved good results in different application fields, there are still some challenges. This article discusses and studies the following four modules, respectively.
- (1)
- Consensus algorithms
Existing research focuses on AI optimization of traditional consensus mechanisms (e.g., PoW and PoS) to classify nodes, detect malicious behaviours through machine learning (e.g., XG-PBFT and LSTM secure consensus), and enable low-latency authentication in IoT and edge computing (e.g., PoAh 2.0). However, existing schemes are not versatile enough and partially rely on high computing power. Future directions include dynamic adaptive consensus (RL adjusts parameters in real time), cross-chain AI co-optimization, green energy-saving consensus (AI-optimized PoS/PoW hybrid mechanism), and AI-enhanced cryptography design for quantum attack resistance.
- (2)
- Smart Contracts
Existing research mainly uses AI for vulnerability detection (static/dynamic analysis, deep learning models such as CBGRU), automated generation (NLP-assisted development), and scenario-based applications (e.g., supply chain traceability). However, complex logic vulnerability detection is still insufficient, and code interpretability is limited. Future directions cover full lifecycle AI (LLM generation of secure contracts and federated learning to protect training data), formal validation enhancement (AI generation of mathematical proofs), and AI-coordinated execution of cross-chain smart contracts to ensure atomicity and consistency.
- (3)
- Privacy protection
Existing research combines FL with blockchain (e.g., the BPFL framework), zero-knowledge proofs, and TEEs to achieve data privacy, but suffers from loss of precision (DP noise) and hardware dependency. Future directions include lightweight privacy computing (edge FL + hybrid cryptography), verifiable privacy (AI-optimized zero-knowledge proof generation), and data sovereignty management (NFTed ownership + dynamic access control) to balance privacy and utility.
In addition, in the context of data privacy, compliance with the General Data Protection Regulation (GDPR) is a critical requirement, particularly for systems involving the processing of personal data in the European Union. GDPR enforces principles such as data minimization, user consent, the right to access and erase data (“right to be forgotten”), and accountability in automated decision-making. While blockchain provides strong data integrity and transparency, its immutable nature presents challenges in achieving GDPR compliance, especially with respect to data erasure and modification. However, the integration of AI with privacy-preserving techniques such as differential privacy, federated learning, and zero-knowledge proofs can mitigate these risks. Furthermore, hybrid blockchain architectures—where sensitive data are stored off-chain while hashes are stored on-chain—can help reconcile the tension between immutability and data protection rights. Thus, the design of AI-powered blockchain systems must carefully balance innovation with regulatory compliance to ensure lawful and ethical data usage.
- (4)
- Data Retrieval
Existing research relies on blockchain + IPFS storage (e.g., TREAD system) with AI-optimized indexing (Merkle tree improvement) and semantic search (NLP parsed query), but unstructured data retrieval is inefficient. Future directions involve multimodal retrieval (CNN processing of image/video data and LLM natural language interaction), distributed storage optimization (AI prediction of data heat to adjust IPFS nodes), and quantum-safe retrieval (AI-assisted anti-quantum hash algorithms) to improve large-scale data query performance.
4.2. Discussion of Open Issues and Future Prospects
Despite the progress achieved, AI-driven blockchain systems face several unresolved challenges, including the lack of AI transparency and explainability, deployment difficulties due to resource constraints, and new security vulnerabilities such as adversarial attacks and data poisoning. Furthermore, standardization and interoperability across platforms remain insufficient, while privacy protection must carefully balance compliance with data regulations like GDPR. Ethical and governance issues, such as accountability for AI decisions in decentralized environments, also remain open. Addressing these challenges is crucial to ensuring that AI-empowered blockchain systems are robust, trustworthy, and widely adoptable.
Looking ahead, promising future research directions include developing trustworthy and explainable AI models tailored for blockchain applications, integrating federated learning with verifiable privacy techniques, and leveraging large language models for smart contract generation and auditing. Advances in generative AI can enhance blockchain security through synthetic adversarial testing, while AI-optimized post-quantum cryptography and green, energy-efficient consensus mechanisms will be vital for long-term sustainability. Additionally, cross-modal AI systems capable of processing multimodal data streams can open new possibilities for autonomous, intelligent decentralized applications across diverse industries.
5. Conclusions
Blockchain still faces numerous challenges in terms of scalability, security, and privacy protection. AI, with its powerful data processing capabilities, pattern recognition, and adaptive optimization algorithms, has the potential to enhance blockchain transaction processing efficiency, strengthen security mechanisms, and optimize privacy protection strategies. Consequently, AI can effectively mitigate the limitations of blockchain in scalability and security. However, existing reviews on AI and blockchain integration primarily focus on macro-level discussions, lacking in-depth analysis and classification. Therefore, this paper focuses on the application of AI in blockchain, providing a comprehensive review of its optimization potential in scalability, security, and privacy protection.
This study examines the current state and key challenges of four core modules: consensus algorithms, smart contracts, privacy protection, and data retrieval. Furthermore, it categorizes and discusses the progress of AI-driven blockchain research in scalability, security, and privacy protection. Findings indicate that AI can enhance consensus efficiency by dynamically optimizing the selection of optimal nodes for participation. Additionally, AI can be leveraged for resource allocation prediction, malicious behavior detection, and vulnerability identification, thereby improving blockchain security. Moreover, the integration of AI-driven federated learning with blockchain facilitates decentralized data collaboration, while AI-optimized Merkle tree indexing and distributed query techniques significantly enhance data retrieval efficiency. Finally, this paper explores future research directions for AI-driven blockchain advancements. Energy consumption and security remain core issues in this field. Future studies should focus on optimizing consensus algorithms, enhancing smart contract security, improving privacy protection mechanisms, and increasing data retrieval efficiency. Additionally, further exploration is needed in decentralized AI training, privacy-preserving computation, and computing power sharing to enhance blockchain’s scalability, security, and energy efficiency.
Author Contributions
F.Y.: Writing—Original Draft, Conceptualization, and Writing—Review and Editing; Z.Z.: Conceptualization and Methodology; Y.J.: Methodology and Data Curation; W.S.: Investigation and Formal Analysis; Z.T.: Formal Analysis and Visualization; C.Y.: Resources and Visualization; J.Y.: Formal Analysis and Data Curation; Z.M.: Writing—Review and Editing; X.H.: Funding Acquisition and Methodology; S.G.: Investigation and Data Curation; Y.P.: Supervision, Project Administration, and Funding Acquisition. All authors have read and agreed to the published version of the manuscript.
Funding
This paper was supported by the Innovative Research Group of Chongqing Municipal Education Commission (CXQT19026) and the Cooperative Project between Chinese Academy of Sciences and University in Chongqing (HZ2021011). Moreover, this work was supported by the Research Startup Fund of Chongqing University of Technology (0119240197).
Informed Consent Statement
Informed consent was obtained from all subjects involved in the study.
Data Availability Statement
The authors declare that the article is a review article and does not relate to the dataset.
Acknowledgments
This work was supported by equipment funded through the “Intelligent Connected New Energy Vehicle Teaching System” project of Chongqing University of Technology, under the national initiative “Promote large-scale equipment renewals and trade-ins of consumer goods”.
Conflicts of Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
References
- Yi, J.; Wang, J.; Tan, L.; Yuan, T. HMM-Based Blockchain Visual Automatic Deployment System. Appl. Sci. 2024, 14, 5722. [Google Scholar] [CrossRef]
- Bouoiyour, J.; Selmi, R. Bitcoin: A beginning of a new phase. Econ. Bull. 2016, 36, 1430–1440. [Google Scholar]
- Nakamoto, S. Bitcoin Technology: A Peer-to-Peer Digital Cash Transaction. Int. J. 2016, 6. [Google Scholar]
- Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015. [Google Scholar]
- Ciaian, P.; Rajcaniova, M.; Kancs, D. The economics of BitCoin price formation. Appl. Econ. 2016, 48, 1799–1815. [Google Scholar] [CrossRef]
- Al-Breiki, H.; Rehman, M.H.U.; Salah, K.; Svetinovic, D. Trustworthy blockchain oracles: Review, comparison, and open research challenges. IEEE Access 2020, 8, 85675–85685. [Google Scholar] [CrossRef]
- Kotey, S.D.; Tchao, E.T.; Ahmed, A.R.; Agbemenu, A.S.; Nunoo-Mensah, H.; Sikora, A.; Welte, D.; Keelson, E. Blockchain interoperability: The state of heterogenous blockchain-to-blockchain communication. IET Commun. 2023, 17, 891–914. [Google Scholar] [CrossRef]
- Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
- Anagnostakis, A.G.; Giannakeas, N.; Tsipouras, M.G.; Glavas, E.; Tzallas, A.T. IoT Micro-Blockchain Fundamentals. Sensors 2021, 21, 2784. [Google Scholar] [CrossRef]
- Hristova, T. Tracking mining company electric vehicles for sustainable development optimization using Distributed Ledger Technologies. J. Sustain. Min. 2024, 23, 299–314. [Google Scholar] [CrossRef]
- Hristova, T.; Mitev, I.; Balev, V. Monitoring of Geotechnical Facilities Through DLT Solution; IOP Conference Series: Earth and Environmental Science; IOP Publishing: Bristol, UK, 2022; Volume 970, p. 012011. [Google Scholar]
- Li, X.; Zheng, Z.; Dai, H.N. When services computing meets blockchain: Challenges and opportunities. J. Parallel Distrib. Comput. 2021, 150, 1–14. [Google Scholar] [CrossRef]
- Treleaven, P.; Brown, R.G.; Yang, D. Blockchain technology in finance. Computer 2017, 55, 14–17. [Google Scholar] [CrossRef]
- Johar, S.; Ahmad, N.; Asher, W.; Cruickshank, H.; Durrani, A. Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey. Appl. Sci. 2021, 11, 6252. [Google Scholar] [CrossRef]
- Wang, X.; Ni, W.; Zha, X.; Yu, G.; Liu, R.P.; Georgalas, N.; Reeves, A. Capacity analysis of public blockchain. Comput. Commun. 2021, 177, 112–124. [Google Scholar] [CrossRef]
- Iqbal, M.; Matulevicius, R. Exploring Sybil and Double-Spending Risks in Blockchain Systems. IEEE Access 2021, 9, 76153–76177. [Google Scholar] [CrossRef]
- He, Y.; Wang, Y.; Qiu, C.; Lin, Q.; Li, J.; Ming, Z. Blockchain-based edge computing resource allocation in IoT: A deep reinforcement learning approach. IEEE Internet Things J. 2020, 8, 2226–2237. [Google Scholar] [CrossRef]
- Islam, A.; Rahim, T.; Masuduzzaman, M.; Shin, S.Y. A blockchain-based artificial intelligence-empowered contagious pandemic situation supervision scheme using internet of drone things. IEEE Wirel. Commun. 2021, 28, 166–173. [Google Scholar] [CrossRef]
- D’souza, S.; Nazareth, D.; Vaz, C.; Shetty, M. Blockchain and AI in pharmaceutical supply chain. In Proceedings of the International Conference on Smart Data Intelligence (ICSMDI 2021), Tamil Nadu, India, 29–30 April 2021. [Google Scholar]
- Suhail, S.; Hussain, R.; Jurdak, R.; Oracevic, A.; Salah, K.; Hong, C.S.; Matulevičius, R. Blockchain-based digital twins: Research trends, issues, and future challenges. ACM Comput. Surv. (CSUR) 2022, 54, 1–34. [Google Scholar] [CrossRef]
- Guergov, S.; Radwan, N. Blockchain convergence: Analysis of issues affecting IoT, AI and blockchain. Int. J. Comput. Inf. Manuf. (IJCIM) 2021, 1, 1–17. [Google Scholar] [CrossRef]
- Yang, Q.; Zhao, Y.; Huang, H.; Xiong, Z.; Kang, J.; Zheng, Z. Fusing blockchain and AI with metaverse: A survey. IEEE Open J. Comput. Soc. 2022, 3, 122–136. [Google Scholar] [CrossRef]
- Kumar, S.; Lim, W.M.; Sivarajah, U.; Kaur, J. Artificial intelligence and blockchain integration in business: Trends from a bibliometric-content analysis. Inf. Syst. Front. 2023, 25, 871–896. [Google Scholar] [CrossRef]
- Junaid, S.B.; Imam, A.A.; Balogun, A.O.; De Silva, L.C.; Surakat, Y.A.; Kumar, G.; Abdulkarim, M.; Shuaibu, A.N.; Garba, A.; Sahalu, Y.; et al. Recent advancements in emerging technologies for healthcare management systems: A survey. Healthcare 2022, 10, 1940. [Google Scholar] [CrossRef] [PubMed]
- Xu, H.; Wu, J.; Pan, Q.; Guan, X.; Guizani, M. A survey on digital twin for industrial internet of things: Applications, technologies and tools. IEEE Commun. Surv. Tutor. 2023, 25, 2569–2598. [Google Scholar] [CrossRef]
- Verma, D.; Okhawilai, M.; Dalapati, G.K.; Ramakrishna, S.; Sharma, A.; Sonar, P.; Krishnamurthy, S.; Biring, S.; Sharma, M. Blockchain technology and AI-facilitated polymers recycling: Utilization, realities, and sustainability. Polym. Compos. 2022, 43, 8587–8601. [Google Scholar] [CrossRef]
- Badidi, E. Edge AI and Blockchain for Smart Sustainable Cities: Promise and Potential. Sustainability 2022, 14, 7609. [Google Scholar] [CrossRef]
- Haddad, A.; Habaebi, M.H.; Islam, M.R.; Hasbullah, N.F.; Zabidi, S.A. Systematic Review on AI-Blockchain Based E-Healthcare Records Management Systems. IEEE Access 2022, 10, 94583–94615. [Google Scholar] [CrossRef]
- Kumar, R.; Singh, D.; Srinivasan, K.; Hu, Y.C. AI-Powered Blockchain Technology for Public Health: A Contemporary Review, Open Challenges, and Future Research Directions. Healthcare 2023, 11, 81. [Google Scholar] [CrossRef]
- Uddin, M.; Obaidat, M.; Manickam, S.; Laghari, S.U.A.; Dandoush, A.; Ullah, H.; Ullah, S.S. Exploring the convergence of Metaverse, Blockchain, and AI: A comprehensive survey of enabling technologies, applications, challenges, and future directions. Wiley Interdiscip. Rev.-Data Min. Knowl. Discov. 2024, 14, e1556. [Google Scholar] [CrossRef]
- Omidian, H. Synergizing blockchain and artificial intelligence to enhance healthcare. Drug Discov. Today 2024, 29, 104111. [Google Scholar] [CrossRef]
- Zhou, Q.; Zhang, H.; Wang, S. Artificial intelligence, big data, and blockchain in food safety. Int. J. Food Eng. 2022, 18, 1–14. [Google Scholar] [CrossRef]
- Yao, Y.; Shi, Y.; Tian, G.; Miao, M.; Susilo, W. PSCBO: A provably secure consensus-based blockchain Oracle. Comput. Stand. Interfaces 2025, 91, 103892. [Google Scholar] [CrossRef]
- Maldonado-Ruiz, D.; Pulval-Dady, A.; Shi, Y.; Wang, Z.; El Madhoun, N.; Torres, J. NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype. Ann. Telecommun. 2024, 79, 881–899. [Google Scholar] [CrossRef]
- Pasdar, A.; Lee, Y.C.; Dong, Z. Connect API with Blockchain: A Survey on Blockchain Oracle Implementation. ACM Comput. Surv. 2023, 55, 1–39. [Google Scholar] [CrossRef]
- Wang, X.; Jiang, X.; Liu, Y.; Wang, J.; Sun, Y. Data Propagation for Low Latency Blockchain Systems. IEEE J. Sel. Areas Commun. 2022, 40, 3631–3644. [Google Scholar] [CrossRef]
- Aki. Digital signatures: A tutorial survey. Computer 1983, 16, 15–24. [Google Scholar]
- Aruna, S.; Maheswari, M.; Saranya, A. Highly Secured Blockchain Based Electronic Voting System Using sha3 and Merkle Root; IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2020; Volume 993, p. 012103. [Google Scholar]
- Mahmud, M.; Sohan, M.S.H.; Reno, S.; Sikder, M.A.B.; Hossain, F.S. Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology. J. Supercomput. 2024, 80, 8383–8405. [Google Scholar] [CrossRef]
- Iyengar, G.; Saleh, F.; Sethuraman, J.; Wang, W. Economics of Permissioned Blockchain Adoption. Manag. Sci. 2023, 69, 3415–3436. [Google Scholar] [CrossRef]
- Liu, Y.; Jia, L.; Wang, X.; Huang, H.; Zhao, Q.; Li, Z.; Sun, Y. CORAL: A blockchain protocol for handling transactions with deadline constraints. Comput. Netw. 2024, 251, 110620. [Google Scholar] [CrossRef]
- Heo, J.W.; Ramachandran, G.S.; Dorri, A.; Jurdak, R. Blockchain Data Storage Optimisations: A Comprehensive Survey. ACM Comput. Surv. 2024, 56, 1–27. [Google Scholar] [CrossRef]
- Hong, L.; Hales, D.N. Blockchain performance in supply chain management: Application in blockchain integration companies. Ind. Manag. Data Syst. 2021, 121, 1969–1996. [Google Scholar] [CrossRef]
- Duan, C.; Jiang, R.; Zhang, Y.; Wu, B.; Li, F.; Duan, Y. Distributed medical data storage model based on blockchain technology. Clust. Comput. 2024, 27, 4757–4777. [Google Scholar] [CrossRef]
- Song, J.; Zhang, P.; Qu, Q.; Bai, Y.; Gu, Y.; Yu, G. Why blockchain needs graph: A survey on studies, scenarios, and solutions. J. Parallel Distrib. Comput. 2023, 180, 104730. [Google Scholar] [CrossRef]
- Liang, W.; Zhang, D.; Lei, X.; Tang, M.; Li, K.C.; Zomaya, A.Y. Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1410–1420. [Google Scholar] [CrossRef]
- Duan, J.; Gu, L.; Wang, W.; Wang, L. Chainknot: Redactable Blockchain Protocol with Forced Synchronization. IEEE Trans. Netw. Sci. Eng. 2024, 11, 3091–3104. [Google Scholar] [CrossRef]
- Rajendra, Y.; Sahu, S.; Subramanian, V.; Shukla, S.K. Storage efficient blockchain models for constrained applications. Clust. Comput. 2023, 26, 2163–2181. [Google Scholar] [CrossRef]
- Connors, C.; Sarkar, D. Survey of prominent blockchain development platforms. J. Netw. Comput. Appl. 2023, 216, 103650. [Google Scholar] [CrossRef]
- Choi, T.M.; Siqin, T. Blockchain in logistics and production from Blockchain 1.0 to Blockchain 5.0: An intra-inter-organizational framework. Transp. Res. Part E-Logist. Transp. Rev. 2022, 160, 102653. [Google Scholar] [CrossRef]
- Rakshit, S.; Jeyaraj, A.; Paul, T. SME Performance Through Blockchain Technologies. J. Comput. Inf. Syst. 2024, 64, 204–218. [Google Scholar] [CrossRef]
- Wang, Y.; Wang, W.; Zeng, Y.; Yang, T. GradingShard: A new sharding protocol to improve blockchain throughput. Peer-to-Peer Netw. Appl. 2023, 16, 1327–1339. [Google Scholar] [CrossRef]
- Xu, S.; Ning, J.; Ma, J.; Huang, X.; Deng, R.H. K-Time Modifiable and Epoch-Based Redactable Blockchain. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4507–4520. [Google Scholar] [CrossRef]
- Qi, N.; Yuan, Y.; Wang, F.Y. DAG-BLOCK: A Novel Architecture for Scaling Blockchain-Enabled Cryptocurrencies. IEEE Trans. Comput. Soc. Syst. 2024, 11, 378–388. [Google Scholar] [CrossRef]
- Noam, O.; Rottenstreich, O. Realizing privacy aspects in blockchain networks. Ann. Telecommun. 2022, 77, 3–12. [Google Scholar] [CrossRef]
- Wang, Y.X.; Hsueh, Y.L. A low-storage synchronization framework for blockchain systems. J. Netw. Comput. Appl. 2024, 231, 103977. [Google Scholar] [CrossRef]
- Wan, J.; Hu, K.; Li, J.; Su, H. AnonymousFox: An Efficient and Scalable Blockchain Consensus Algorithm. IEEE Internet Things J. 2022, 9, 24236–24252. [Google Scholar] [CrossRef]
- Stoyanov, I.; Iliev, T.; Mihaylov, G.; Evstatiev, B.; Sokolov, S. Analysis of the cybersecurity threats in smart grid University of telecommunications and post, Sofia, Bulgaria. In Proceedings of the 2018 IEEE 24th International Symposium for Design and Technology in Electronic Packaging(SIITME), Iasi, Romania, 25–28 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 90–93. [Google Scholar]
- Bikov, T.D.; Iliev, T.B.; Mihaylov, G.Y.; Stoyanov, I.S. Phishing in depth—Modern methods of detection and risk mitigation. In Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 447–450. [Google Scholar]
- Valchanov, H.; Edikyan, J.; Aleksieva, V. A Study of Wi-Fi Security in City Environment; IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2019; Volume 618, p. 012031. [Google Scholar]
- Alam, S.; Shuaib, M.; Khan, W.Z.; Garg, S.; Kaddoum, G.; Hossain, M.S.; Bin Zikria, Y. Blockchain-based Initiatives: Current state and challenges. Comput. Netw. 2021, 198, 108395. [Google Scholar] [CrossRef]
- Xu, L.; Tian, T. Blockchain-enabled enterprise bleaching green regulation banking evolution game analysis. Environ. Dev. Sustain. 2024, 26, 27457–27483. [Google Scholar] [CrossRef]
- Khossravi, A.S.; Chen, Q.; Adelman, R.A. Artificial intelligence in ophthalmology. Curr. Opin. Ophthalmol. 2025, 36, 35–38. [Google Scholar] [CrossRef]
- Galiana, I.; Gudino, L.C.; Gonzalez, P.M. Ethics and artificial intelligence. Rev. Clin. Esp. 2024, 224, 178–186. [Google Scholar] [CrossRef]
- Tsang, Y.P.; Lee, C.K.M. Artificial intelligence in industrial design: A semi-automated literature survey. Eng. Appl. Artif. Intell. 2022, 112, 104884. [Google Scholar] [CrossRef]
- Diaz, B.; Nussbaum, M. Artificial intelligence for teaching and learning in schools: The need for pedagogical intelligence. Comput. Educ. 2024, 217, 105071. [Google Scholar] [CrossRef]
- Khanam, S.; Tanweer, S.; Khalid, S. Artificial Intelligence Surpassing Human Intelligence: Factual or Hoax. Comput. J. 2021, 64, 1832–1839. [Google Scholar] [CrossRef]
- Guo, Y.; Zhang, W.; Qin, Q.; Chen, K.; Wei, Y. Intelligent manufacturing management system based on data mining in artificial intelligence energy-saving resources. Soft Comput. 2023, 27, 4061–4076. [Google Scholar] [CrossRef]
- Carabin, G.; Wehrle, E.; Vidoni, R. A review on energy-saving optimization methods for robotic and automatic systems. Robotics 2017, 6, 39. [Google Scholar] [CrossRef]
- Paryanto; Brossog, M.; Bornschlegl, M.; Franke, J. Reducing the energy consumption of industrial robots in manufacturing systems. Int. J. Adv. Manuf. Technol. 2015, 78, 1315–1328. [Google Scholar] [CrossRef]
- Achiam, J.; Adler, S.; Agarwal, S.; Ahmad, L.; Akkaya, I.; Aleman, F.L.; Almeida, D.; Altenschmidt, J.; Altman, S.; Anadkat, S.; et al. Gpt-4 technical report. arXiv 2023, arXiv:2303.08774. [Google Scholar]
- Liu, A.; Feng, B.; Xue, B.; Wang, B.; Wu, B.; Lu, C.; Zhao, C.; Deng, C.; Zhang, C.; Ruan, C.; et al. Deepseek-v3 technical report. arXiv 2024, arXiv:2412.19437. [Google Scholar]
- Gligorea, I.; Cioca, M.; Oancea, R.; Gorski, A.T.; Gorski, H.; Tudorache, P. Adaptive learning using artificial intelligence in e-learning: A literature review. Educ. Sci. 2023, 13, 1216. [Google Scholar] [CrossRef]
- Turdakov, D.Y.; Avetisyan, A.I.; Arkhipenko, K.V.; Antsiferova, A.V.; Vatolin, D.S.; Volkov, S.S.; Gasnikov, A.V.; Devyatkin, D.A.; Drobyshevsky, M.D.; Kovalenko, A.P.; et al. Trusted Artificial Intelligence: Challenges and Promising Solutions. Dokl. Math. 2022, 106, S9–S13. [Google Scholar] [CrossRef]
- Thai, Q.M.; Nguyen, T.H.; Lenon, G.B.; Phung, H.T.T.; Horng, J.T.; Tran, P.T.; Ngo, S.T. Estimating AChE inhibitors from MCE database by machine learning and atomistic calculations. J. Mol. Graph. Model. 2025, 134, 108906. [Google Scholar] [CrossRef]
- Deb, D.; Arunachalam, V.; Raju, K.S. Daily reservoir inflow prediction using stacking ensemble of machine learning algorithms. J. Hydroinform. 2024, 26, 972–997. [Google Scholar] [CrossRef]
- Ouyang, J.; Wu, M.; Li, X.; Deng, H.; Jin, Z.; Wu, D. NeuroBCI: Multi-Brain to Multi-Robot Interaction Through EEG-Adaptive Neural Networks and Semantic Communications. IEEE Trans. Mob. Comput. 2024, 23, 14622–14637. [Google Scholar] [CrossRef]
- Ning, D.S.; Zhou, Z.Q.; Zhou, S.H.; Chen, J.M. Identification of macrophage differentiation related genes and subtypes linking atherosclerosis plaque processing and metabolic syndrome via integrated bulk and single-cell sequence analysis. Heliyon 2024, 10, 34295. [Google Scholar] [CrossRef] [PubMed]
- Zhou, Y.; Narsilio, G.; Makasis, N.; Soga, K.; Chen, P.; Aye, L. Artificial neural networks for predicting the performance of heat pumps with horizontal ground heat exchangers. Front. Energy Res. 2024, 12, 1423695. [Google Scholar] [CrossRef]
- Zhang, S.; Chen, X.; Ran, X.; Li, Z.; Cao, W. Prioritizing Causation in Decision Trees: A Framework for Interpretable Modeling. Eng. Appl. Artif. Intell. 2024, 133, 108224. [Google Scholar] [CrossRef]
- Cohen-Shapira, N.; Rokach, L. PnT: Born-again tree-based model via fused decision path encoding. Inf. Fusion 2024, 112, 102545. [Google Scholar] [CrossRef]
- Que, Z.; Lin, C.J. One-Class SVM Probabilistic Outputs. IEEE Trans. Neural Netw. Learn. Syst. 2024, 36, 6244–6256. [Google Scholar] [CrossRef]
- Han, C.; Zou, G.; Yeh, H.G.; Gong, F.; Shi, S.; Chen, H. Intelligent fault prediction with wavelet-SVM fusion in coal mine. Comput. Geosci. 2025, 194, 105744. [Google Scholar] [CrossRef]
- Noroozi, F.; Ghanbarian, G.; Safaeian, R.; Pourghasemi, H.R. Forest fire mapping: A comparison between GIS-based random forest and Bayesian models. Nat. Hazards 2024, 120, 6569–6592. [Google Scholar] [CrossRef]
- Xu, Y.; Li, J.; Wu, A. An XGboost Algorithm Based Model for Financial Risk Prediction. Teh. Vjesn.-Tech. Gaz. 2024, 31, 1898–1907. [Google Scholar] [CrossRef]
- Shua, Q.; Peng, H.; Li, J. Landslide susceptibility prediction modelling based on semi-supervised XGBoost model. Geol. J. 2024, 59, 2655–2667. [Google Scholar] [CrossRef]
- Zhang, C.; Chen, J.; Li, J.; Peng, Y.; Mao, Z. Large language models for human–robot interaction: A review. Biomim. Intell. Robot. 2023, 3, 100131. [Google Scholar] [CrossRef]
- Gao, Y.; Jiang, Y.; Peng, Y.; Yuan, F.; Zhang, X.; Wang, J. Medical Image Segmentation: A Comprehensive Review of Deep Learning-Based Methods. Tomography 2025, 11, 52. [Google Scholar] [CrossRef]
- Bai, X.; Peng, Y.; Li, D.; Liu, Z.; Mao, Z. Novel soft robotic finger model driven by electrohydrodynamic (EHD) pump. J. Zhejiang Univ.-Sci. A 2024, 25, 596–604. [Google Scholar] [CrossRef]
- Mao, Z.; Bai, X.; Peng, Y.; Shen, Y. Design, modeling, and characteristics of ring-shaped robot actuated by functional fluid. J. Intell. Mater. Syst. Struct. 2024, 35, 1459–1470. [Google Scholar] [CrossRef]
- Peng, Y.; Wang, Y.; Hu, F.; He, M.; Mao, Z.; Huang, X.; Ding, J. Predictive modeling of flexible EHD pumps using Kolmogorov–Arnold Networks. Biomim. Intell. Robot. 2024, 4, 100184. [Google Scholar] [CrossRef]
- Mao, Z.; Peng, Y.; Hu, C.; Ding, R.; Yamada, Y.; Maeda, S. Soft computing-based predictive modeling of flexible electrohydrodynamic pumps. Biomim. Intell. Robot. 2023, 3, 100114. [Google Scholar] [CrossRef]
- Peng, Y.; Sakai, Y.; Funabora, Y.; Yokoe, K.; Aoyama, T.; Doki, S. Funabot-Sleeve: A Wearable Device Employing McKibben Artificial Muscles for Haptic Sensation in the Forearm. IEEE Robot. Autom. Lett. 2025, 1–8. [Google Scholar] [CrossRef]
- Mao, Z.; Kobayashi, R.; Nabae, H.; Suzumori, K. Multimodal strain sensing system for shape recognition of tensegrity structures by combining traditional regression and deep learning approaches. IEEE Robot. Autom. Lett. 2024, 9, 10050–10056. [Google Scholar] [CrossRef]
- Mao, Z.; Hosoya, N.; Maeda, S. Flexible electrohydrodynamic fluid-driven valveless water pump via immiscible interface. Cyborg Bionic Syst. 2024, 5, 0091. [Google Scholar] [CrossRef]
- Lau, S.L.; Lim, J.; Chong, E.K.; Wang, X. Single-pixel image reconstruction based on block compressive sensing and convolutional neural network. Int. J. Hydromechatron. 2023, 6, 258–273. [Google Scholar] [CrossRef]
- Verma, H.; Siruvuri, S.V.; Budarapu, P. A machine learning-based image classification of silicon solar cells. Int. J. Hydromechatron. 2024, 7, 49–66. [Google Scholar] [CrossRef]
- Alawi, O.A.; Kamar, H.M.; Shawkat, M.M.; Al-Ani, M.M.; Mohammed, H.A.; Homod, R.Z.; Wahid, M.A. Artificial intelligence-based viscosity prediction of polyalphaolefin-boron nitride nanofluids. Int. J. Hydromechatron. 2024, 7, 89–112. [Google Scholar] [CrossRef]
- Tian, Z.; Zhao, D.; Lin, Z.; Flynn, D.; Zhao, W.; Tian, D. Balanced reward-inspired reinforcement learning for autonomous vehicle racing. In Proceedings of the 6th Annual Learning for Dynamics & Control Conference, PMLR, Oxford, UK, 15–17 July 2024; pp. 628–640. [Google Scholar]
- Tian, Z.; Zhao, D.; Lin, Z.; Zhao, W.; Flynn, D.; Jiang, Y.; Tian, D.; Zhang, Y.; Sun, Y. Efficient and balanced exploration-driven decision making for autonomous racing using local information. IEEE Trans. Intell. Veh. 2024, 1–17. [Google Scholar] [CrossRef]
- Lin, Z.; Tian, Z.; Zhang, Q.; Ye, Z.; Zhuang, H.; Lan, J. A conflicts-free, speed-lossless KAN-based reinforcement learning decision system for interactive driving in roundabouts. arXiv 2024, arXiv:2408.08242. [Google Scholar]
- Tian, Z.; Lin, Z.; Zhao, D.; Zhao, W.; Flynn, D.; Ansari, S.; Wei, C. Evaluating Scenario-based Decision-making for Interactive Autonomous Driving Using Rational Criteria: A Survey. arXiv 2025, arXiv:2501.01886. [Google Scholar]
- Lin, Z.; Tian, Z.; Zhang, Q.; Zhuang, H.; Lan, J. Enhanced visual slam for collision-free driving with lightweight autonomous cars. Sensors 2024, 24, 6258. [Google Scholar] [CrossRef] [PubMed]
- Lin, Z.; Zhang, Q.; Tian, Z.; Yu, P.; Lan, J. DPL-SLAM: Enhancing dynamic point-line SLAM through dense semantic methods. IEEE Sens. J. 2024, 24, 14596–14607. [Google Scholar] [CrossRef]
- Radanliev, P. Cyber diplomacy: Defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. J. Cyber Secur. Technol. 2025, 9, 28–78. [Google Scholar] [CrossRef]
- Yun, D.; Wu, X.; Chen, X.; Yang, Y.; Shang, Y.; Liu, S.; Gunasekeran, D.V.; Lin, D.; Liu, L.; Zhao, L.; et al. An Artificial Intelligence and Blockchain technology-based data management framework for multicenter randomized controlled trials. Sci. Bull. 2025, 70, 856–860. [Google Scholar] [CrossRef]
- Kwangmuang, P.; Somabut, A.; Duangngern, P.; Changpetch, S.; Dhithjaroen, C.; Techapornpong, O.; Sarakan, P.; Chaijaroen, S.; Samat, C. Designing an AI-enhanced blockchain and FinTech curriculum for youth: A case study of educational and industrial collaboration. Educ. Inf. Technol. 2025, 1–37. [Google Scholar] [CrossRef]
- Zheng, J.; Zhang, Y. TRBFT: An Efficient Blockchain Consensus for Edge Computing-Enabled IoT Systems. IEEE Internet Things J. 2025. [Google Scholar] [CrossRef]
- Zhao, C.; Zhou, Y.; Zhang, S.; Sheng, Q.Z.; Zhang, Y.; Wen, S. ExClique: An Express Consensus Algorithm for High-Speed Transaction Process in Blockchains. arXiv 2025, arXiv:2501.15289. [Google Scholar]
- Sahraoui, S.; Bachir, A. Lightweight Consensus Mechanisms in the Internet of Blockchained Things: Thorough Analysis and Research Directions. Digit. Commun. Netw. 2025, in press. [Google Scholar] [CrossRef]
- Xing, Z.; Zhang, Z.; Zhang, Z.; Li, Z.; Li, M.; Liu, J.; Zhang, Z.; Zhao, Y.; Sun, Q.; Zhu, L.; et al. Zero-Knowledge Proof-Based Verifiable Decentralized Machine Learning in Communication Network: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2025, 1. [Google Scholar] [CrossRef]
- Verma, S.; Chandra, G.; Yadav, D. LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security. Peer-to-Peer Netw. Appl. 2025, 18, 1–19. [Google Scholar] [CrossRef]
- St-Laurent, G.P.; Le Billon, P. Staking claims and shaking hands: Impact and benefit agreements as a technology of government in the mining sector. Extr. Ind. Soc. 2015, 2, 590–602. [Google Scholar] [CrossRef]
- Naeem, M.; Khan, A.; Rehman, A.; Farooq, S.; Mehboob, A.; Abdali, A.S.; Ahmad, B. Does Artificial Intelligence with Blockchain Reduce the Costs of the Financial Sector? In Generative AI for Web Engineering Models; IGI Global: Hershey, PA, USA, 2025; pp. 147–160. [Google Scholar]
- Villegas-Ch, W.; Govea, J.; Gurierrez, R.; Mera-Navarrete, A. Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and Blockchain Models: A Scalable and Efficient Approach for Threat Detection. IEEE Access 2025, 13, 16933–16958. [Google Scholar] [CrossRef]
- Dutta, J.; Puthal, D. PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow. Future Gener. Comput. Syst.-Int. J. Escience 2024, 161, 655–672. [Google Scholar] [CrossRef]
- Sun, C.; Li, D.; Wang, B.; Song, J. AI-Enabled Consensus Algorithm in Human-Centric Collaborative Computing for Internet of Vehicle. Symmetry 2023, 15, 1264. [Google Scholar] [CrossRef]
- Alruwaili, F.F. Ensuring data integrity in deep learning-assisted IoT-Cloud environments: Blockchain-assisted data edge verification with consensus algorithms. AIMS Math. 2024, 9, 8868–8884. [Google Scholar] [CrossRef]
- Vaiyapuri, T.; Shankar, K.; Rajendran, S.; Kumar, S.; Acharya, S.; Kim, H. Blockchain Assisted Data Edge Verification With Consensus Algorithm for Machine Learning Assisted IoT. IEEE Access 2023, 11, 55370–55379. [Google Scholar] [CrossRef]
- Zhang, Z.; Guo, B.; Shen, Y.; Li, C.; Suo, X.; Su, H. Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing. Secur. Commun. Netw. 2021, 2021, 6629433. [Google Scholar] [CrossRef]
- Sasikumar, A.; Ravi, L.; Kotecha, K.; Saini, J.R.R.; Varadarajan, V.; Subramaniyaswamy, V. Sustainable Smart Industry: A Secure and Energy Efficient Consensus Mechanism for Artificial Intelligence Enabled Industrial Internet of Things. Comput. Intell. Neurosci. 2022, 2022, 1419360. [Google Scholar] [CrossRef] [PubMed]
- Kumar, P.; Javeed, D.; Kumar, R.; Islam, A.K.M.N. Blockchain and explainable AI for enhanced decision making in cyber threat detection. Softw.-Pract. Exp. 2024, 54, 1337–1360. [Google Scholar] [CrossRef]
- Kim, S.K. Automotive Vulnerability Analysis for Deep Learning Blockchain Consensus Algorithm. Electronics 2022, 11, 119. [Google Scholar] [CrossRef]
- Cui, C.; Du, H.; Jia, Z.; He, Y.; Wang, L. Blockchain-Enabled Federated Learning with Differential Privacy for Internet of Vehicles. CMC-Comput. Mater. Contin. 2024, 81, 1581–1593. [Google Scholar] [CrossRef]
- Wang, Y.; Peng, H.; Su, Z.; Luan, T.H.; Benslimane, A.; Wu, Y. A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains. IEEE J. Sel. Areas Commun. 2022, 40, 3305–3324. [Google Scholar] [CrossRef]
- Deng, Q. Blockchain Economical Models, Delegated Proof of Economic Value and Delegated Adaptive Byzantine Fault Tolerance and their implementation in Artificial Intelligence BlockCloud. J. Risk Financ. Manag. 2019, 12, 177. [Google Scholar] [CrossRef]
- Alrubei, S.M.; Ball, E.; Rigelsford, J.M. The Use of Blockchain to Support Distributed AI Implementation in IoT Systems. IEEE Internet Things J. 2022, 9, 14790–14802. [Google Scholar] [CrossRef]
- Zhi, H.; Wu, H.; Huang, Y.; Tian, C.; Wang, S. Blockchain Consensus Scheme Based on the Proof of Distributed Deep Learning Work. IET Softw. 2025, 2025, 3378383. [Google Scholar] [CrossRef]
- Jogunola, O.; Adebisi, B.; Ikpehai, A.; Popoola, I.S.; Gui, G.; Gacanin, H.; Ci, S. Consensus Algorithms and Deep Reinforcement Learning in Energy Market: A Review. IEEE Internet Things J. 2021, 8, 4211–4227. [Google Scholar] [CrossRef]
- Goh, Y.; Yun, J.; Jung, D.; Chung, J.M. Secure Trust-Based Delegated Consensus for Blockchain Frameworks Using Deep Reinforcement Learning. IEEE Access 2022, 10, 118498–118511. [Google Scholar] [CrossRef]
- Kim, S.K. Blockchain Smart Contract to Prevent Forgery of Degree Certificates: Artificial Intelligence Consensus Algorithm. Electronics 2022, 11, 2112. [Google Scholar] [CrossRef]
- Chen, Z.; Yu, Z. Intelligent Offloading in Blockchain-Based Mobile Crowdsensing Using Deep Reinforcement Learning. IEEE Commun. Mag. 2023, 61, 118–123. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, H.; Zhang, J.; Ge, Y.; Cui, K.; Peng, Z.; Li, Z.; Wang, L. An Improved Practical Byzantine Fault-Tolerant Algorithm Based on XGBoost Grouping for Consortium Chains. Comput. Mater. Contin. 2025, 82, 1295–1311. [Google Scholar] [CrossRef]
- Xiao, J.; Luo, T.; Li, C.; Zhou, J.; Li, Z. CE-PBFT: A high availability consensus algorithm for large-scale consortium blockchain. J. King Saud Univ.-Comput. Inf. Sci. 2024, 36, 101957. [Google Scholar] [CrossRef]
- Yuan, F.; Huang, X.; Zheng, L.; Wang, L.; Wang, Y.; Yan, X.; Gu, S.; Peng, Y. The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains. Information 2025, 16, 268. [Google Scholar] [CrossRef]
- Lyu, Q.; Ma, C.; Shen, Y.; Jiao, S.; Sun, Y.; Hu, L. Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency. CMES-Comput. Model. Eng. Sci. 2023, 135, 1625–1647. [Google Scholar] [CrossRef]
- Yang, H.; Gu, X.; Chen, X.; Zheng, L.; Cui, Z. CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection. Sci. Comput. Program. 2024, 234, 103076. [Google Scholar] [CrossRef]
- Gao, Z.; Jiang, L.; Xia, X.; Lo, D.; Grundy, J. Checking Smart Contracts with Structural Code Embedding. IEEE Trans. Softw. Eng. 2021, 47, 2874–2891. [Google Scholar] [CrossRef]
- Wei, Z.; Sun, J.; Zhang, Z.; Zhang, X.; Yang, X.; Zhu, L. Survey on Quality Assurance of Smart Contracts. ACM Comput. Surv. 2025, 57, 1–36. [Google Scholar] [CrossRef]
- Vidal, F.R.; Ivaki, N.; Laranjeiro, N. OpenSCV: An open hierarchical taxonomy for smart contract vulnerabilities. Empir. Softw. Eng. 2024, 29, 101. [Google Scholar] [CrossRef]
- Wang, W.; Xia, L.; Zhang, Z.; Meng, X. Smart Contract Timestamp Vulnerability Detection Based on Code Homogeneity. IEICE Trans. Inf. Syst. 2024, E107D, 1362–1366. [Google Scholar] [CrossRef]
- Fei, J.; Chen, X.; Zhao, X. MSmart: Smart Contract Vulnerability Analysis and Improved Strategies Based on Smartcheck. Appl. Sci. 2023, 13, 1733. [Google Scholar] [CrossRef]
- Chen, J.; Xia, X.; Lo, D.; Grundy, J.; Luo, X.; Chen, T. DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. IEEE Trans. Softw. Eng. 2021, 48, 2189–2207. [Google Scholar] [CrossRef]
- Lin, Z.; Chen, J.; Wu, J.; Zhang, W.; Wang, Y.; Zheng, Z. CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts. IEEE Trans. Softw. Eng. 2024, 50, 1534–1547. [Google Scholar] [CrossRef]
- Wu, H.; Dong, H.; He, Y.; Duan, Q. Smart Contract Vulnerability Detection Based on Hybrid Attention Mechanism Model. Appl. Sci. 2023, 13, 770. [Google Scholar] [CrossRef]
- Zhang, L.; Chen, W.; Wang, W.; Jin, Z.; Zhao, C.; Cai, Z.; Chen, H. CBGRU: A Detection Method of Smart Contract Vulnerability Based on a Hybrid Model. Sensors 2022, 22, 3577. [Google Scholar] [CrossRef] [PubMed]
- Hwang, S.J.; Choi, S.H.; Shin, J.; Choi, Y.H. CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability Detection. IEEE Access 2022, 10, 32595–32607. [Google Scholar] [CrossRef]
- Gao, C.; Yang, W.; Ye, J.; Xue, Y.; Sun, J. sGUARD plus: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts. ACM Trans. Softw. Eng. Methodol. 2024, 33, 114. [Google Scholar] [CrossRef]
- Ivanov, N.; Yan, Q.; Kompalli, A. TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1141–1155. [Google Scholar] [CrossRef]
- Yu, R.; Zhang, Y.; Wang, Y.; Liu, C. TxMirror: When the Dynamic EVM Stack Meets Transactions for Smart Contract Vulnerability Detection. Symmetry 2023, 15, 1345. [Google Scholar] [CrossRef]
- Li, J.; Lu, G.; Gao, Y.; Gao, F. A Smart Contract Vulnerability Detection Method Based on Multimodal Feature Fusion and Deep Learning. Mathematics 2023, 11, 4823. [Google Scholar] [CrossRef]
- Pasqua, M.; Benini, A.; Contro, F.; Crosara, M.; Dalla Preda, M.; Ceccato, M. Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode. J. Syst. Softw. 2023, 200, 111653. [Google Scholar] [CrossRef]
- Qian, S.; Ning, H.; He, Y.; Chen, M. Multi-Label Vulnerability Detection of Smart Contracts Based on Bi-LSTM and Attention Mechanism. Electronics 2022, 11, 3260. [Google Scholar] [CrossRef]
- Qian, P.; He, J.; Lu, L.; Wu, S.; Lu, Z.; Wu, L.; Zhou, Y.; He, Q. Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. IEEE Trans. Softw. Eng. 2023, 49, 3793–3810. [Google Scholar] [CrossRef]
- Le, T.T.H.; Kim, J.; Lee, S.; Kim, H. Robust Vulnerability Detection in Solidity-Based Ethereum Smart Contracts Using Fine-Tuned Transformer Encoder Models. IEEE Access 2024, 12, 154700–154717. [Google Scholar] [CrossRef]
- Wang, M.; Xie, Z.; Wen, X.; Li, J.; Zhou, K. Ethereum Smart Contract Vulnerability Detection Model Based on Triplet Loss and BiLSTM. Electronics 2023, 12, 2327. [Google Scholar] [CrossRef]
- Park, J.; Jeong, S.; Yeom, K. Smart Contract Broker: Improving Smart Contract Reusability in a Blockchain Environment. Sensors 2023, 23, 6149. [Google Scholar] [CrossRef]
- Sanchez-Gomez, N.; Torres-Valderrama, J.; Mejias Risoto, M.; Garrido, A. Blockchain Smart Contract Meta-modeling. J. Web Eng. 2021, 20, 2059–2079. [Google Scholar] [CrossRef]
- Gec, S.; Stankovski, V.; Lavbic, D.; Kochovski, P. A Recommender System for Robust Smart Contract Template Classification. Sensors 2023, 23, 639. [Google Scholar] [CrossRef]
- Chen, Y.; Hu, D.; Xu, C.; Chen, N. An Annotation Assisted Smart Contracts Generation Method. IEEE Access 2024, 12, 51485–51499. [Google Scholar] [CrossRef]
- Tong, Y.; Tan, W.; Guo, J.; Shen, B.; Qin, P.; Zhuo, S. Smart Contract Generation Assisted by AI-Based Word Segmentation. Appl. Sci. 2022, 12, 4773. [Google Scholar] [CrossRef]
- Margret, M.K.; Julie, E.G. Smarter and resilient smart contracts applications for smart cities environment using blockchain technology. Automatika 2024, 65, 572–583. [Google Scholar] [CrossRef]
- Zhang, L.; Kim, D. A Peer-to-Peer Smart Food Delivery Platform Based on Smart Contract. Electronics 2022, 11, 1806. [Google Scholar] [CrossRef]
- Zhang, X.; Liu, C.; Medda, F. A Smart-Contract-Aided Plastic Credit Scheme. IEEE Syst. J. 2023, 17, 1703–1713. [Google Scholar] [CrossRef]
- Wang, L.; Xu, L.; Zheng, Z.; Liu, S.; Li, X.; Cao, L.; Li, J.; Sun, C. Smart Contract-Based Agricultural Food Supply Chain Traceability. IEEE Access 2021, 9, 9296–9307. [Google Scholar] [CrossRef]
- Garcia, R.D.; Ramachandran, G.; Ueyama, J. Exploiting smart contracts in PBFT-based blockchains: A case study in medical prescription system. Comput. Netw. 2022, 211, 109003. [Google Scholar] [CrossRef]
- Agrawal, T.K.; Angelis, J.; Khilji, W.A.; Kalaiarasan, R.; Wiktorsson, M. Demonstration of a blockchain-based framework using smart contracts for supply chain collaboration. Int. J. Prod. Res. 2023, 61, 1497–1516. [Google Scholar] [CrossRef]
- Zhang, Y.; Yutaka, M.; Sasabe, M.; Kasahara, S. Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework. IEEE Internet Things J. 2021, 8, 6372–6384. [Google Scholar] [CrossRef]
- Karakoc, E.; Ceken, C. Secure SLA Management Using Smart Contracts for SDN-Enabled WSN. KSII Trans. Internet Inf. Syst. 2023, 17, 3003–3029. [Google Scholar] [CrossRef]
- Guo, Z.Y.; Chen, Y.C.; Lin, H.P. Oblivious Access for Decentralized Database Systems: A New Asymmetric Framework from Smart Contracts. Symmetry 2022, 14, 680. [Google Scholar] [CrossRef]
- Selvarajan, S.; Srivastava, G.; Khadidos, A.O.; Khadidos, A.O.; Baza, M.; Alshehri, A.; Lin, J.C.W. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud-Comput.-Adv. Syst. Appl. 2023, 12, 38. [Google Scholar] [CrossRef]
- Wang, J.; Li, J. Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated Personalized Privacy-Preserving Federated Learning. Appl. Sci. 2024, 14, 1743. [Google Scholar] [CrossRef]
- Miao, Q.; Lin, H.; Hu, J.; Wang, X. An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things. Digit. Commun. Netw. 2022, 8, 636–643. [Google Scholar] [CrossRef]
- Smahi, A.; Li, H.; Yang, Y.; Yang, X.; Lu, P.; Zhong, Y.; Liu, C. BV-ICVs: A privacy-preserving and verifiable federated learning framework for V2X environments using blockchain and zkSNARKs. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101542. [Google Scholar] [CrossRef]
- Yang, F.; Abedin, m.Z.; Hajek, P. An explainable federated learning and blockchain-based secure credit modeling method. Eur. J. Oper. Res. 2024, 317, 449–467. [Google Scholar] [CrossRef]
- Firdaus, M.; Larasati, H.T.; Rhee, K.H. A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks. CMC-Comput. Mater. Contin. 2023, 76, 2959–2978. [Google Scholar] [CrossRef]
- Li, K.; Zhou, H.; Tu, Z.; Liu, F.; Zhang, H. Blockchain Empowered Federated Learning for Distributed Network Security Behaviour Knowledge Base in 6G. Secur. Commun. Netw. 2022, 2022, 4233238. [Google Scholar] [CrossRef]
- Wan, C.; Wang, Y.; Xu, J.; Wu, J.; Zhang, T.; Wang, Y. Research on Privacy Protection in Federated Learning Combining Distillation Defense and Blockchain. Electronics 2024, 13, 679. [Google Scholar] [CrossRef]
- Liu, W.; He, Y.; Wang, X.; Duan, Z.; Liang, W.; Liu, Y. BFG: Privacy protection framework for internet of medical things based on blockchain and federated learning. Connect. Sci. 2023, 35. [Google Scholar] [CrossRef]
- Ma, H.; Huang, S.; Guo, J.; Lam, K.Y.; Yang, T. Blockchain-Based Privacy-Preserving Federated Learning for Mobile Crowdsourcing. IEEE Internet Things J. 2024, 11, 13884–13899. [Google Scholar] [CrossRef]
- Wang, N.; Yang, W.; Wang, X.; Wu, L.; Guan, Z.; Du, X.; Guizani, M. A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. Digit. Commun. Netw. 2024, 10, 126–134. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D.; Li, Z.; Lyu, L.; Liu, Y. Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices. IEEE Internet Things J. 2021, 8, 1817–1829. [Google Scholar] [CrossRef]
- Zhu, C.; Zhu, X.; Qin, T. An Efficient Privacy Protection Mechanism for Blockchain-Based Federated Learning System in UAV-MEC Networks. Sensors 2024, 24, 1364. [Google Scholar] [CrossRef]
- Mo, M.; Ji, S.; Wang, X.; Mohiuddin, G.; Ren, Y. Privacy Data Management Mechanism Based on Blockchain and Federated Learning. CMC-Comput. Mater. Contin. 2023, 74, 37–53. [Google Scholar] [CrossRef]
- Wang, Q.; Dong, H.; Huang, Y.; Liu, Z.; Gou, Y. Blockchain-Enabled Federated Learning for Privacy-Preserving Non-IID Data Sharing in Industrial Internet. CMC-Comput. Mater. Contin. 2024, 80, 1967–1983. [Google Scholar] [CrossRef]
- Zhang, F.; Zhang, Y.; Ji, S.; Han, Z. Secure and decentralized federated learning framework with non-IID data based on blockchain. Heliyon 2024, 10, e27176. [Google Scholar] [CrossRef]
- Myrzashova, R.; Alsamhi, S.H.; Hawbani, A.; Curry, E.; Guizani, M.; Wei, X. Safeguarding Patient Data-Sharing: Blockchain-Enabled Federated Learning in Medical Diagnostics. IEEE Trans. Sustain. Comput. 2025, 10, 176–189. [Google Scholar] [CrossRef]
- Rabbani, H.; Shahid, M.F.; Khanzada, T.J.S.; Siddiqui, S.; Jamjoom, M.M.; Ashari, R.B.; Ullah, Z.; Mukati, M.U.; Nooruddin, M. Enhancing security in financial transactions: A novel blockchain-based federated learning framework for detecting counterfeit data in fintech. PeerJ Comput. Sci. 2024, 10, e2280. [Google Scholar] [CrossRef]
- Meng, M.; Li, Y. SFedChain: Blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks. PeerJ Comput. Sci. 2022, 8, e1027. [Google Scholar] [CrossRef]
- Zhu, L.; Hu, S.; Zhu, X.; Meng, C.; Huang, M. Enhancing the Security and Privacy in the IoT Supply Chain Using Blockchain and Federated Learning with Trusted Execution Environment. Mathematics 2023, 11, 3759. [Google Scholar] [CrossRef]
- Jia, Y.; Xiong, L.; Fan, Y.; Liang, W.; Xiong, N.; Xiao, F. Blockchain-based privacy-preserving multi-tasks federated learning framework. Connect. Sci. 2024, 36. [Google Scholar] [CrossRef]
- Zhang, Y.; Tang, Y.; Zhang, Z.; Li, M.; Li, Z.; Khan, S.; Chen, H.; Cheng, G. Blockchain-Based Practical and Privacy-Preserving Federated Learning with Verifiable Fairness. Mathematics 2023, 11, 1091. [Google Scholar] [CrossRef]
- Dong, C.; Zhou, J.; An, Q.; Jiang, F.; Chen, S.; Pan, L.; Liu, X. Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems. Drones 2023, 7, 413. [Google Scholar] [CrossRef]
- Dhasaratha, C.; Hasan, M.K.; Islam, S.; Khapre, S.; Abdullah, S.; Ghazal, T.M.; Alzahrani, A.I.; Alalwan, N.; Vo, N.; Akhtaruzzaman, M. Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. CAAI Trans. Intell. Technol. 2024. [Google Scholar] [CrossRef]
- Li, K. A Blockchain-Integrated Federated Learning Approach for Secure Data Sharing and Privacy Protection in Multi-Device Communication. Appl. Artif. Intell. 2025, 39. [Google Scholar] [CrossRef]
- Cai, C.; Xu, L.; Zhou, A.; Wang, R.; Wang, C.; Wang, Q. EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 1887–1896. [Google Scholar] [CrossRef]
- Shen, H.; Wang, T.; Chen, J.; Tao, Y.; Chen, F. Blockchain-Based Batch Authentication Scheme for Internet of Vehicles. IEEE Trans. Veh. Technol. 2024, 73, 7866–7879. [Google Scholar] [CrossRef]
- Shinde, R.; Patil, S.; Kotecha, K.; Ruikar, K. Blockchain for Securing AI Applications and Open Innovations. J. Open Innov. Technol. Mark. Complex. 2021, 7, 189. [Google Scholar] [CrossRef]
- Khan, J.A.; Bangalore, K.U.; Kurkcu, A.; Ozbay, K. TREAD: Privacy Preserving Incentivized Connected Vehicle Mobility Data Storage on InterPlanetary-File-System-Enabled Blockchain. Transp. Res. Rec. 2021, 2676, 680–691. [Google Scholar] [CrossRef]
- Yiu, N.C.K. Decentralizing Supply Chain Anti-Counterfeiting and Traceability Systems Using Blockchain Technology. Future Internet 2021, 13, 84. [Google Scholar] [CrossRef]
- Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. An AI—Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber-Physical Systems. Sensors 2022, 22, 1448. [Google Scholar] [CrossRef] [PubMed]
- Bouachir, O.; Aloqaily, M.; Karray, F.; Saddik, A.E. AI-based Blockchain for the Metaverse: Approaches and Challenges. In Proceedings of the 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), San Antonio, TX, USA, 5–7 September 2022; pp. 231–236. [Google Scholar]
- Singh, S.K.; Park, J.H. TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence. IEEE Trans. Ind. Inform. 2023, 19, 626–634. [Google Scholar] [CrossRef]
- Wang, X.; Garg, S.; Lin, H.; Kaddoum, G.; Hu, J.; Hassan, M.M. Heterogeneous Blockchain and AI-Driven Hierarchical Trust Evaluation for 5G-Enabled Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2023, 24, 2074–2083. [Google Scholar] [CrossRef]
- Khan, S.; Khan, M.; Khan, M.A.; Khan, M.A.; Wang, L.; Wu, K. A Blockchain-Enabled AI-Driven Secure Searchable Encryption Framework for Medical IoT Systems. IEEE J. Biomed. Health Inform. 2025, 1–14. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).