Next Article in Journal
Existence and Mittag–Leffler Stability for the Solution of a Fuzzy Fractional System with Application of Laplace Transforms to Solve Fractional Differential Systems
Previous Article in Journal
Spiking Neural Networks Optimized by Improved Cuckoo Search Algorithm: A Model for Financial Time Series Forecasting
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection

1
College of Mechanical Engineering, Chongqing University of Technology, Chongqing 400054, China
2
School of French Studies, Sichuan International Studies University, Chongqing 400031, China
3
James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK
4
Faculty of Science and Technology, Hong Kong Baptist University, Hong Kong 999077, China
5
Department of Engineering Science and Mechanics, Shibaura Institute of Technology, 3-7-5 Toyosu, Koto-ku, Tokyo 135-8548, Japan
6
Magnesium Research Center, Kumamoto University, Kumamoto 860-8555, Japan
*
Author to whom correspondence should be addressed.
Algorithms 2025, 18(5), 263; https://doi.org/10.3390/a18050263
Submission received: 1 April 2025 / Revised: 28 April 2025 / Accepted: 29 April 2025 / Published: 2 May 2025
(This article belongs to the Special Issue Blockchain and Big Data Analytics: AI-Driven Data Science)

Abstract

:
With the continuous development of technology, blockchain has been widely used in various fields by virtue of its decentralization, data integrity, traceability, and anonymity. However, blockchain still faces many challenges, such as scalability and security issues. Artificial intelligence, with its powerful data processing capability, pattern recognition ability, and adaptive optimization algorithms, can improve the transaction processing efficiency of blockchain, enhance the security mechanism, and optimize the privacy protection strategy, thus effectively alleviating the limitations of blockchain in terms of scalability and security. Most of the existing related reviews explore the application of AI in blockchain as a whole but lack in-depth classification and discussion on how AI can empower the core aspects of blockchain. This paper explores the application of artificial intelligence technologies in addressing core challenges of blockchain systems, specifically in terms of scalability, security, and privacy protection. Instead of claiming a deep theoretical integration, we focus on how AI methods, such as machine learning and deep learning, have been effectively adopted to optimize blockchain consensus algorithms, improve smart contract vulnerability detection, and enhance privacy-preserving mechanisms like federated learning and differential privacy. Through comprehensive classification and discussion, this paper provides a structured overview of the current research landscape and identifies potential directions for further technical collaboration between AI and blockchain technologies.

1. Introduction

Since its inception in 2008, the concept of blockchain has evolved from merely serving as the foundational technology for cryptocurrencies to enabling innovative applications across various industries [1]. In 2016, Bitcoin’s market capitalization surpassed USD 10 billion for the first time, marking a critical milestone that elevated public attention towards blockchain technology beyond its association with cryptocurrencies [2]. This financial threshold catalyzed a shift in perception, positioning blockchain as a decentralized peer-to-peer infrastructure capable of maintaining transparent, tamper-resistant ledgers across various domains. Consequently, the concept of “Blockchain+” emerged, promoting blockchain’s integration into industries such as finance, supply chain management, healthcare, and public services [3,4,5]. This evolution highlights blockchain’s transition from a niche technology to a cornerstone of global digital innovation and competition.
Blockchain is an integrated innovation that combines key technological components such as peer-to-peer networks, Byzantine fault tolerance, smart contracts, and distributed consensus algorithms [6]. By leveraging these technologies, blockchain establishes a decentralized system that enables trust formation in the digital space. Its core mechanism relies on nodes within a peer-to-peer network reaching consensus through a consensus protocol and sequentially linking data blocks into an immutable chain. Each block employs cryptographic techniques, such as digital signatures, to ensure data integrity and prevent forgery or tampering, thereby realizing a decentralized shared ledger. Compared to traditional centralized systems, this innovative paradigm reduces reliance on central authorities, lowers the cost of trust and consensus, and enhances system security and reliability. As a result, blockchain presents profound transformations and challenges to conventional social structures and operational models [7].
The general-purpose architecture of blockchain enables its flexible expansion across various application domains. Although no official standard exists, the development of blockchain technology is commonly described as progressing through three generational trends, as shown in Figure 1:
  • Blockchain 1.0 is generally associated with programmable digital cryptocurrencies, with a primary focus on value transfer, such as Bitcoin, digital assets, and online payments. However, this early phase faced limitations in scalability and offered relatively limited functionality [8].
  • Blockchain 2.0 is characterized by the introduction of smart contracts, enabling blockchain not only to store and execute computer programs but also to facilitate trusted digital contract management. This trend expanded blockchain applications into the financial sector, supporting stock trading, clearing, private equity, and other services, thereby promoting the digital collaboration of real-world business systems [9].
  • Blockchain 3.0 further extends blockchain use beyond the financial sector into broader industries, such as the Internet of Things, mining, electric transport management [10], industrial process optimization [11], privacy protection, and product traceability. By leveraging its decentralized and trustless architecture, blockchain in this phase aims to reduce inter-organizational friction, enhance large-scale collaboration, and drive higher productivity for individuals and enterprises [12].
Nowadays, blockchain has been applied across various fields, including finance [13], agriculture [14], food [15], supply chain management [16], and healthcare. For instance, in food safety traceability, consortium blockchain enables real-time data sharing and collaborative mechanisms, addressing challenges such as information asymmetry and the complexity of traditional traceability processes. This not only enhances the efficiency of food safety traceability but also reduces labor and time costs. Despite the promising prospects of blockchain technology, it still faces numerous challenges.
  • Scalability Issues: Due to the inherent limitations of block size and the time-consuming consensus process, blockchain networks struggle with transaction throughput and data storage constraints. These factors significantly limit the efficiency and feasibility of large-scale applications. The scalability challenges faced by common consensus algorithms in blockchain are shown in Table 1.
  • Security Risks: The widely used PoW consensus mechanism requires multiple block confirmations—typically at least six—to probabilistically ensure transaction security, leading to delays in finalizing transactions. Moreover, if a single entity gains control of more than 51% of the total network computing power, it could launch a double-spending attack or maliciously fork the blockchain, posing severe threats to the integrity and security of the system. The security issues faced by common consensus algorithms in blockchain are shown in Table 2.
  • Privacy Protection Challenges: While blockchain provides a certain degree of anonymity, it is not immune to privacy risks. For instance, attackers can analyze transaction histories and trace network node IP addresses to infer users’ identities. Additionally, improper implementation of decentralized applications (DApps) may lead to unintended exposure of sensitive data, exacerbating privacy concerns and further complicating regulatory compliance.
Table 1. Scalability issues of common consensus algorithms.
Table 1. Scalability issues of common consensus algorithms.
Consensus AlgorithmMain Scalability IssuesDescription
PoWLow Throughput, High Energy ConsumptionBlock creation is limited by difficulty; TPS is low and hard to scale
PoSNode Centralization, Sync DependencyRequires up-to-date state sync; less suitable for large distributed systems
DPoSLimited by SupernodesFaster than PoW/PoS, but scalability is constrained by limited node participation
PBFTO(n⌃2) Message ComplexityHigh communication overhead; performance degrades with increasing node count
RAFTPoor State Sync for Many NodesSuitable for small-scale systems only; does not scale well
PaxosComplex Implementation, Performance BottleneckMulti-phase protocol has high latency and poor scalability
Table 2. Security issues of common consensus algorithms.
Table 2. Security issues of common consensus algorithms.
Consensus AlgorithmMain Security IssuesDescription
PoW51% Attack, Selfish MiningA single entity controlling 51% of total hash power can manipulate the blockchain; selfish mining leads to temporary forks
PoSRich-get-richer, Long-range Attack, Nothing at StakeStake centralization increases over time; easy to rewrite chain history; validators may vote on multiple forks
DPoSCentralization Risk, Vote ManipulationA few supernodes control consensus; voting power can be bought or manipulated
PBFTNode Exposure, DoS AttacksSmall node sets are vulnerable to targeted DoS; limited fault tolerance (up to f faulty nodes)
RAFTNot Byzantine Fault TolerantCannot defend against malicious nodes; only tolerates crash faults in trusted environments
PaxosWeak Byzantine ResistanceAssumes honest behavior; not suitable against data forgery or malicious attacks
With its efficient data processing, autonomous learning, and advanced pattern recognition capabilities, AI has become a key driving force in the advancement of blockchain technology, with applications spanning edge computing, big data monitoring, supply chains, digital twins, and metaverse exploration. He et al. [17] emphasize that blockchain, due to its decentralized, trustless, and immutable nature, is well suited for edge-centric IoT scenarios while also highlighting the integration of AI into edge computing. Islam et al. [18] propose a blockchain-based AI-driven initiative that utilizes drones for pandemic surveillance, demonstrating the feasibility of autonomous monitoring. D’Souza et al. [19] introduce a secure pharmaceutical supply chain management system that leverages blockchain and AI, incorporating the Rasa chatbot to enhance functionality. Suhail et al. [20] conduct a comprehensive survey on blockchain-based digital twins, discussing research trends, advantages, and challenges in this field. Guergov et al. [21] analyze the convergence of IoT, AI, and blockchain, underscoring the necessity of hybrid models for seamless integration. Yang et al. [22] explore the intersection of blockchain, AI, and the metaverse, highlighting the potential for interdisciplinary research and collaboration. Furthermore, Kumar et al. [23] examine the applications and benefits of integrated AI and blockchain platforms across various business verticals, identifying ten key areas with significant potential advantages. Junaid et al. [24] investigate advancements in emerging technologies, including IoT, AI, and blockchain, with a particular focus on healthcare, emphasizing their critical role in healthcare management systems. Finally, Xu et al. [25] highlight the role of key enabling technologies, such as digital twins, AI, and blockchain, in the development of digital twin-driven Industrial Internet of Things applications.
In this survey, we conduct a comprehensive analysis of existing research, providing insights into how machine learning and artificial intelligence are generally integrated with blockchain technology and their specific applications. Our study focuses on four key aspects: optimizing consensus algorithm efficiency through AI, enabling automated vulnerability detection and remediation in smart contracts, constructing verifiable data architectures, and enhancing privacy protection using federated learning. Table 3 presents a comparison between our survey and existing survey studies.

2. Introduction to Related Technologies

This section provides an in-depth introduction to blockchain and AI technologies, with a particular focus on the four core technologies of blockchain: distributed ledger, consensus mechanism, smart contracts, and cryptographic security. Additionally, it elaborates on key AI technologies, including machine learning, deep learning, and reinforcement learning, exploring their roles and development trends across various application scenarios.

2.1. Blockchain

Blockchain technology, as a distributed database, stores data in an encrypted manner and ensures data security and immutability through its chain structure [33]. Its decentralized nature enables distributed data sharing and management, ensuring reliability without the need for trusted intermediaries [34]. Consensus algorithms facilitate agreement among multiple nodes, safeguarding data security, while smart contracts, as self-executing code, automatically execute when predefined conditions are met, further enhancing the application value of blockchain [35].

2.1.1. Block Structure

A blockchain block is composed of two primary elements: the Block Header and the Block Body. Its cryptographic design, combined with a layered architecture, establishes the fundamental technical basis for data immutability [36]. This structure ensures secure data storage through the following three layers:
(1)
The information encapsulation layer of the block header
The block header serves as the core verification unit of the blockchain, encapsulating six key fields: version number, timestamp, previous block hash, Merkle root, nonce, and target hash. Among them, the Merkle root—computed via a layered binary hash tree—ensures transaction integrity by uniquely summarizing all transactions within the block [37].
(2)
The data storage layer of the block structure
The block body organizes verified transactions using a Merkle tree structure, where leaf nodes represent hashed transactions and non-leaf nodes result from recursive hash combinations. This design enables efficient O(log n) transaction verification and supports lightweight node validation. All transactions must pass digital signature and input–output checks before inclusion [38].
(3)
The collaborative layer of the security mechanism
The block header and body are cryptographically linked, ensuring immutability. Any modification in transaction data alters the Merkle root, invalidating subsequent blocks. Combined with timestamps and hash chaining, this layered architecture preserves data integrity while enabling scalable storage and efficient validation.The structure of a block is illustrated in Figure 2.

2.1.2. Consensus Algorithm

The reliability of the blockchain system is highly dependent on the design of the consensus mechanism [39], a technology that realizes efficient transaction verification by coordinating the protocols among network nodes and is decisive for maintaining data consistency and operational integrity.
Currently, blockchain can be categorized into public, private, and consortium chains based on permission scope and access control mechanisms [40]. Each type exhibits distinct characteristics and serves different application scenarios. Public chains, known for their high level of decentralization, transparency, and censorship resistance, allow any participant to join, validate transactions, and contribute to the consensus process. They are widely utilized in areas such as cryptocurrency transactions, decentralized finance, and non-fungible tokens [41]. However, the open nature of public chains often leads to scalability and energy consumption challenges.
In contrast, private chains operate under restricted access where only authorized participants can read, write, or audit the blockchain. They prioritize data security, privacy protection, and efficient management, operating with a significantly lower degree of decentralization. This model is particularly suitable for industries such as finance, healthcare, and supply chain management, where regulatory compliance, sensitive data handling, and operational efficiency are critical.
Consortium chains, also known as federated blockchains, integrate features from both public and private chains. They are governed by a group of pre-selected nodes or organizations, achieving a balance between multiparty cooperation, transparency, and controlled decentralization [42]. Consortium chains offer enhanced performance, scalability, and trust through partial decentralization while maintaining higher privacy standards compared to public chains. Their strengths in traceability, auditability, and governance mechanisms facilitate transaction tracking, cross-organizational collaboration, and comprehensive historical record management, making them ideal for applications in interbank clearing, supply chain traceability, and cross-border payments. Table 4 presents a detailed comparison of blockchain categories in terms of decentralization level, security, scalability, transparency, and typical application scenarios [43].
Consensus algorithms play a crucial role in distributed systems [44], particularly in blockchain technology, where they ensure that all nodes in the network agree on the validity of transactions [45]. Different consensus mechanisms exhibit various strengths and weaknesses, influencing aspects such as security, energy consumption, throughput, and decentralization. The following Table 5 provide a detailed discussion of several mainstream consensus algorithms.
(1)
PoW
PoW achieves consensus through competitive computation of cryptographic hash puzzles, ensuring transaction security and immutability. It is widely used in public blockchains such as Bitcoin. The primary advantage of PoW is its high security, effectively preventing Sybil attacks and maintaining network decentralization. However, PoW requires significant computational resources, leading to high energy consumption. According to the Cambridge Bitcoin Electricity Consumption Index (2024), the Bitcoin network consumes approximately 120 TWh of electricity annually, with each transaction consuming around 707 kWh, categorizing PoW as a high-energy consensus mechanism. Additionally, the limited block production speed results in low transaction throughput, making it challenging to support large-scale applications.
(2)
PoS
PoS determines block validation rights based on the amount and duration of cryptocurrency holdings, avoiding the energy-intensive computations of PoW. Ethereum 2.0 adopts this mechanism. The main advantages of PoS include low energy consumption and high efficiency, which enhance transaction processing speed and reduce environmental impact. After Ethereum’s transition from PoW to PoS in 2022 (“The Merge”), its energy consumption decreased by over 99.95%, dropping to approximately 0.0026 TWh per year, with each transaction consuming only about 0.03 kWh, making PoS a low-energy consensus mechanism. However, PoS may lead to wealth centralization, as large token holders gain greater control over the network, potentially undermining decentralization [46].
(3)
DPoS
DPoS relies on community voting to elect delegate nodes that execute consensus, significantly improving transaction processing efficiency. It is widely adopted by blockchains such as EOS and TRON. The key advantages of DPoS include high efficiency and low energy consumption, enabling rapid processing of large-scale transactions and enhancing system throughput. Energy studies estimate the EOS blockchain consumes only about 0.001 TWh annually, significantly lower than PoW-based systems, confirming that DPoS is a low-energy consensus approach. However, the delegate selection mechanism may result in power centralization, and there is a risk of collusion among delegates, which can weaken decentralization.
As Algorithm 1 shows, the DPoS consensus mechanism operates through four main phases. Initially, all stakeholders (S) vote to select a small group of delegates (D), typically much fewer in number than the stakeholders, who are entrusted with the task of block production. During each round, delegates take turns to collect transactions, produce blocks, sign them, and broadcast them to the network. Each received block is validated by other nodes to ensure integrity and correctness. If any delegate misbehaves, such as missing blocks or producing invalid data, stakeholders have the right to revoke their delegation through a new voting process. This approach ensures efficient, scalable, and democratic block validation while significantly reducing the number of nodes involved in the consensus process compared to traditional proof-of-work mechanisms.
(4)
PBFT
PBFT achieves consensus through multiple rounds of voting among a limited number of nodes, making it suitable for high-trust private blockchain environments such as Hyperledger Fabric. Its main advantages are low latency and high throughput, making it particularly well suited for financial blockchain applications.
PBFT does not involve mining or computational races. As a result, its energy consumption is extremely low, typically less than 0.0001 TWh annually, especially in enterprise deployments (IBM Blockchain Whitepaper, 2022). However, PBFT lacks economic incentives and relies on the honesty of participating nodes. If a significant number of malicious nodes are present, the consensus process may be compromised.
Algorithm 1 DPoS Consensus Process
1:
System Parameters:
2:
S = { s 1 , s 2 , , s N }                      ▹ Set of all stakeholders
3:
D = { d 1 , d 2 , , d M } where M N             ▹ Set of elected delegates
4:
r o u n d _ l e n g t h = M          ▹ Each delegate produces one block per round
5:
procedure Voting Phase
6:
    Each stakeholder votes for trusted delegates.
7:
    Top M candidates with most votes are selected as delegates.
8:
end procedure
9:
procedure Block Production Phase
10:
    for each round do
11:
        for each delegate d i in scheduled order do
12:
           Collect valid transactions into a block.
13:
           Sign the block with private key.
14:
           Broadcast the block to the network.
15:
        end for
16:
    end for
17:
end procedure
18:
procedure Block Validation Phase
19:
    for each received block do
20:
        if block is valid (signature and transactions) then
21:
           Append the block to the local blockchain.
22:
        else
23:
           Report delegate misbehavior (e.g., missed block, invalid block).
24:
        end if
25:
    end for
26:
end procedure
27:
procedure Delegate Replacement
28:
    if a delegate misbehaves or misses blocks then
29:
        Stakeholders can vote to remove and replace the delegate.
30:
    end if
31:
end procedure
The PBFT consensus process is illustrated in Algorithm  2. Initially, the system defines N = 3 f + 1 nodes to tolerate up to f faulty nodes. The primary node is selected based on the current view number. The consensus proceeds through several phases:
(1)
Client Request: A client initiates the process by signing and sending a transaction request to the primary node.
(2)
Pre-Prepare Phase: Upon verifying the client’s request, the primary node broadcasts a PRE-PREPARE message containing a digest of the request.
(3)
Prepare Phase: Replica nodes validate the PRE-PREPARE message and broadcast PREPARE messages to all other nodes.
(4)
Commit Phase: When a node receives 2 f matching PREPARE messages, it broadcasts a COMMIT message.
(5)
Reply Phase: After collecting 2 f + 1 matching COMMIT messages, the node executes the operation and sends a reply to the client.
(6)
View Change: If a timeout occurs or the primary is suspected to be faulty, nodes initiate a VIEW-CHANGE protocol to select a new primary node. This multi-phase voting ensures consensus integrity even in the presence of faulty or malicious participants.
Algorithm 2 PBFT Consensus Process
1:
System Parameters:
2:
N = 3 f + 1 , V = { v 1 , v 2 , . . . , v N } , p r i m a r y = v k , where k = v i e w mod | V |
3:
Initialize s e q _ n u m = 0
4:
procedure ClientRequest( c , m )
5:
     σ = Sign ( c , REQUEST , m , t )
6:
    Send REQUEST , m , t , c , σ to primary
7:
end procedure
8:
procedure PrePrepare( m , t , c , σ )
9:
    if  verify ( σ ) and s e q _ n u m = n  then
10:
        Broadcast PRE - PREPARE , v , n , d = H ( m )
11:
    end if
12:
end procedure
13:
procedure Prepare( v i )
14:
    if received valid PRE - PREPARE , v , n , d  then
15:
        Broadcast PREPARE , v i , n , d
16:
    end if
17:
end procedure
18:
procedure Commit( v i )
19:
    if received 2 f PREPARE , v j , n , d  then
20:
        Broadcast COMMIT , v i , n , d
21:
    end if
22:
end procedure
23:
procedure Reply
24:
    if received 2 f + 1 COMMIT , v j , n , d  then
25:
        Send REPLY , v , t , r to client
26:
    end if
27:
end procedure
28:
procedure ViewChange( v i )
29:
    if timeout or primary fault detected then
30:
        Broadcast VIEW - CHANGE , v i , v + 1 , P , Q
31:
    end if
32:
end procedure
(5)
Kafka
The Kafka consensus mechanism is based on a reliable message queue and is commonly used in enterprise blockchain architectures, such as the ordering service in Hyperledger Fabric. Kafka offers high throughput, making it ideal for private blockchain applications with demanding performance requirements. Kafka-based systems rely on server-based message queues with minimal computational complexity, resulting in very low energy consumption, often far below 0.0001 TWh annually, particularly in controlled enterprise environments. However, it depends on centralized ordering nodes, introducing a single point of failure risk, which makes it unsuitable for decentralized blockchain networks [47].
(6)
Raft
Raft employs a leader election mechanism for log replication, making it suitable for small-scale distributed systems such as enterprise private blockchains. Its advantages include simple implementation and easy deployment while maintaining a high level of consistency. Raft-based consensus typically operates within private server clusters with modest computational loads, and its overall energy footprint is minimal, making it a low-energy consensus protocol. However, Raft’s applicability is limited to small-scale environments, and its performance is influenced by the leader node. If the leader fails, consensus delays may occur.
As Algorithm  3 shows, the Raft consensus algorithm is designed to achieve strong consistency across a distributed system in an intuitive and structured manner. It operates through several coordinated phases. First, leader election is initiated when a follower node does not receive a heartbeat signal within a timeout period, transitioning to a candidate and requesting votes from other nodes. A node becomes the leader if it secures a majority vote (at least N / 2 ). Once elected, the leader is responsible for accepting client requests, appending them to its log, and replicating these entries to follower nodes via AppendEntries Remote Procedure Calls. Followers validate and append these entries, responding with acknowledgments. Upon receiving acknowledgments from the majority, the leader commits the entries and informs followers of the commitment. Raft ensures safety through leader exclusivity and log consistency and guarantees system termination under stable network conditions.
(7)
Paxos
Paxos achieves consensus through multiple rounds of message passing, emphasizing data consistency. It is widely used in strong consistency databases such as Google Chubby and AWS DynamoDB.
Paxos excels in high-fault-tolerance environments, ensuring stable consensus and maintaining data integrity. Despite its theoretical soundness, Paxos is considered energy-efficient in practice due to its use in tightly controlled data center environments. However, its high communication overhead limits its scalability in blockchain applications, and real-world energy consumption remains low compared to PoW, generally under 0.0001 TWh annually. However, the algorithm is computationally complex and requires substantial communication overhead, which constrains system performance. The Paxos consensus process is shown in Figure 3 below. Compared to other consensus mechanisms, Paxos is less suitable for blockchain applications in terms of throughput and efficiency [48].
Algorithm 3 Raft Consensus Process
1:
System Parameters:
2:
N o d e s = { n 1 , n 2 , . . . , n N }                   ▹ Set of all nodes
3:
Each node is in one of three states: Follower, Candidate, or Leader
4:
procedure Leader Election
5:
    if Follower does not receive heartbeat within timeout then
6:
        Convert to Candidate and increment term number.
7:
        Vote for self and request votes from other nodes.
8:
    end if
9:
    if Candidate receives majority votes N 2  then
10:
        Become new Leader.
11:
    end if
12:
end procedure
13:
procedure Log Replication
14:
    if Leader then
15:
        Accept client requests.
16:
        Append entries to own log.
17:
        Send AppendEntries RPCs to followers.
18:
    end if
19:
    for each Follower do
20:
        if received AppendEntries RPC from Leader then
21:
           Verify and append new entries to log.
22:
           Send acknowledgment to Leader.
23:
        end if
24:
    end for
25:
end procedure
26:
procedure Commit Entries
27:
    if Leader receives acknowledgments from majority nodes then
28:
        Mark entries as committed.
29:
        Inform followers of the commit.
30:
    end if
31:
end procedure
32:
procedure Safety and Termination
33:
    Only entries from a Leader that has majority support are committed.
34:
    Election safety and log matching properties are guaranteed.
35:
end procedure

2.1.3. Smart Contract

Smart contracts are essentially programs stored on a blockchain that automatically execute specific actions when predefined conditions are met. Typically, smart contracts are used to automate the execution of agreements, allowing all participants to quickly verify transaction outcomes without the need for intermediaries. This enhances efficiency and eliminates unnecessary delays. Additionally, smart contracts can streamline business processes by automatically triggering subsequent actions once certain conditions are fulfilled [49].
Smart contracts operate on an “if/when…then…” logic, with conditions encoded on the blockchain. Once triggered and verified, the network automatically executes actions such as fund transfers or asset registration, with outcomes immutably recorded and accessible only to authorized parties [50]. Contract terms are defined by specifying transaction rules, encoding logic conditions, handling exceptions, and establishing dispute resolution mechanisms to ensure reliability and protect participants’ interests [51].
The smart contract execution process involves a series of automated steps designed to leverage the inherent technical features of blockchain. As Algorithm 4 shows, initially, the contract is deployed onto the blockchain, with its code and initial state stored immutably in the distributed ledger. Upon receiving an input event, the contract autonomously checks if predefined conditions are satisfied. If so, the corresponding function is executed; otherwise, the input is ignored. During execution, the contract validates input data and blockchain state to ensure correctness. Successful validation results in the state update and event emission, while failure leads to transaction rejection. The immutability of the deployed contract guarantees that neither its code nor its rules can be altered post-deployment, ensuring transparency and trustworthiness. Additionally, contract execution and enforcement are decentralized, with all blockchain nodes independently verifying and applying the contract logic, thus eliminating single points of failure and promoting a trustless operational environment.
Algorithm 4 Smart Contract Execution Process
1:
Initialization:
2:
Deploy contract C onto the blockchain.
3:
Store contract code and initial state in distributed ledger.
4:
procedure Trigger Event( i n p u t _ e v e n t )
5:
    if predefined condition C o n d is satisfied then
6:
        Execute corresponding contract function f ( C o n d )
7:
    else
8:
        Ignore input; no execution occurs.
9:
    end if
10:
end procedure
11:
procedure Contract Execution( f ( C o n d ) )
12:
    Validate input data and current blockchain state.
13:
    if Validation succeeds then
14:
        Update the state variables according to f’s logic.
15:
        Emit events or update outputs transparently.
16:
    else
17:
        Reject transaction.
18:
    end if
19:
end procedure
20:
procedure Immutability and Verification
21:
    Once deployed, C cannot be modified.
22:
    Every transaction involving C is cryptographically verifiable.
23:
end procedure
24:
procedure Decentralized Enforcement
25:
    All blockchain nodes independently validate and enforce contract execution.
26:
    No single point of failure or centralized control exists.
27:
end procedure
As shown in Table 6, a smart contract is an automated protocol based on blockchain technology that executes predefined operations immediately when specified conditions are met, without the need for human intervention. As shown in Figure 4 below, its core advantages are primarily reflected in the following four aspects: (1) Execution Efficiency and Accuracy: Smart contracts leverage digitalization and automation to significantly reduce human involvement, minimize errors, prevent transaction delays, and enhance overall operational efficiency. (2) Trust and Transparency: The execution records of smart contracts are stored on the blockchain, allowing all participants to access the same data. This ensures transparency, reduces the risk of manipulation or data tampering, and enhances system credibility. (3) Security: Smart contracts rely on blockchain encryption algorithms and a chain-based structure, making data extremely difficult to alter or forge. This ensures the integrity and reliability of transactions. (4) Cost Reduction: By minimizing dependence on traditional intermediaries, smart contracts streamline transaction processes, lower management and operational costs, and optimize contract execution efficiency, ultimately improving economic benefits.

2.1.4. Cryptography Technology

Blockchain can essentially be understood as a distributed ledger or a decentralized database [52]. As its unique technological advantages continue to drive research and adoption across various industries, blockchain primarily relies on cryptographic techniques to manage and secure vast amounts of data [53].
Cryptography employs advanced mathematical principles and algorithms to ensure the secure storage and transmission of data [54], allowing only authorized recipients to access and process the information [55]. Among its core components, encryption plays a crucial role by encoding data in a manner that renders it unintelligible to unauthorized parties, thereby protecting it from potential attacks and unauthorized modifications.
In blockchain systems, encryption techniques are generally classified into two main categories: symmetric encryption and asymmetric encryption. Symmetric encryption utilizes a single key for both encryption and decryption, whereas asymmetric encryption employs a pair of keys—a public key for encryption and a private key for decryption—enhancing security and data integrity during transmission. These cryptographic techniques serve as the foundation of blockchain security, safeguarding data privacy and ensuring the reliability of transactions [56]. The comparison table between symmetric and asymmetric encryption is shown in Table 7.
(1)
Symmetric encryption
Symmetric encryption is one of the earliest encryption techniques, where both the sender and the receiver use the same set of rules for encrypting and decrypting data. In simple terms, the encryption key and the decryption key are identical [57]. A well-known example of symmetric encryption is the Caesar cipher, which applies a basic substitution technique to encode messages. Some widely used symmetric encryption algorithms include DES, 3DES, Blowfish, IDEA, RC4, RC5, RC6, and AES. These algorithms vary in terms of security strength, performance, and application scenarios, with AES (Advanced Encryption Standard) being one of the most commonly adopted due to its strong security and efficiency [58]. Compared to public-key (asymmetric) encryption, symmetric encryption generally offers faster processing speeds, making it more suitable for scenarios requiring high-speed data encryption. However, symmetric encryption also presents certain challenges. Since the same key is used for both encryption and decryption, the security of symmetric encryption depends not only on the strength of the encryption algorithm but also on the secure management of the key itself. When using symmetric encryption for secure data transmission, the encryption key must be shared with the recipient, which introduces the issue of key transmission security [59]. In real-world applications, such secure transmissions typically take place over modern wireless communication infrastructures, such as Wi-Fi or 5G networks [60]. These environments provide high-speed connectivity, which complements the low-latency nature of symmetric encryption. Nevertheless, they also introduce additional risks such as signal interception, unauthorized access points, or man-in-the-middle attacks, all of which further underscore the importance of robust encryption and secure key exchange mechanisms.
(2)
Asymmetric encryption
Asymmetric encryption is a cryptographic technique integrated into blockchain to meet security and ownership verification requirements. The key distinction between asymmetric and symmetric encryption lies in the use of keys: symmetric encryption relies on a shared key for both encryption and decryption, whereas asymmetric encryption uses a “key pair” consisting of a public key and a private key for these operations [61].
The advantage of asymmetric encryption is that it effectively addresses security challenges related to key transmission. The public key can be openly shared, while the private key remains confidential, ensuring the security of the encryption process. However, while asymmetric encryption offers higher security, it does not directly verify the identity of the sender, which introduces the potential risk of sender impersonation.
Common algorithms in asymmetric encryption include RSA and ECC (Elliptic Curve Cryptography). Asymmetric encryption is typically classified into three main types: the Integer Factorization Problem, where encryption relies on the product of two large prime numbers, the Discrete Logarithm Problem, which exploits the computational difficulty of solving discrete logarithms and uses strong one-way hash functions for asymmetric distributed encryption, and Elliptic Curve Cryptography, which uses elliptic curves on a plane to generate specific asymmetric encryption values [62].
As Algorithm 5 shows, asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption. It begins by generating two large primes p and q, computing n = p × q and Euler’s totient φ ( n ) = ( p 1 ) ( q 1 ) . A public exponent e is selected such that gcd ( e , φ ( n ) ) = 1 , and the private exponent d satisfies e × d 1 ( mod φ ( n ) ) . Encryption transforms plaintext into ciphertext via c = m e mod n , while decryption recovers the original message with m = c d mod n . The security relies on the computational difficulty of factoring n.
Algorithm 5 Asymmetric Encryption Process
1:
Initialization:
2:
Select two large prime numbers p and q.
3:
Compute modulus n = p × q and Euler’s totient φ ( n ) = ( p 1 ) ( q 1 ) .
4:
procedure Key Generation
5:
    Choose public exponent e such that 1 < e < φ ( n ) and gcd ( e , φ ( n ) ) = 1 .
6:
    Compute private exponent d such that e × d 1 mod φ ( n ) .
7:
    Output public key ( e , n ) and private key ( d , n ) .
8:
end procedure
9:
procedure Encryption( p l a i n t e x t )
10:
    Convert p l a i n t e x t to an integer m.
11:
    Compute ciphertext c = m e mod n .
12:
    Output c.
13:
end procedure
14:
procedure Decryption( c i p h e r t e x t )
15:
    Compute message m = c d mod n using private key.
16:
    Convert integer m back to p l a i n t e x t .
17:
    Output p l a i n t e x t .
18:
end procedure
19:
procedure Security Assurance
20:
    The security relies on the computational difficulty of factoring n into p and q.
21:
    Only the private key holder can efficiently decrypt the ciphertext.
22:
end procedure

2.2. Artificial Intelligence

Artificial Intelligence [63] encompasses multiple core technological domains, including machine learning (ML) [64], deep learning (DL) [65], natural language processing (NLP) [66], and computer vision (CV). Within machine learning, supervised learning is primarily used for classification and prediction, unsupervised learning facilitates clustering and anomaly detection, and semi-supervised learning enhances model performance by leveraging a small amount of labeled data. Reinforcement learning (RL), on the other hand, is widely applied in game AI and autonomous driving [67].
In the early days of its birth, AI was mainly used for basic data analysis and pattern recognition, such as natural language processing, speech recognition, face recognition, logistics analysis, and intelligent investment. AI at this stage is mainly used to improve data processing efficiency, business decision-making, and interactive experience. With the advancement of AI technology, AI begins to penetrate industry scenarios to support more complex automation tasks, such as intelligent energy saving [68], agricultural product inspection, intelligent robots [69], intelligent water tanks [70], etc. AI at this stage gradually moves from data processing to intelligent services and automated systems, improving the operational efficiency of various industries.
Nowadays, AI has entered the era of high intelligence, with stronger autonomous learning and decision-making capabilities, such as GPT-4o [71], unmanned driving, genetic testing, deep search (Deepseek) [72], adaptive learning [73], and so on. In the future, AI will be widely used in the fields of healthcare, transportation, education, etc., to achieve a highly intelligent society, and the development trend of AI-driven applications is shown in Figure 5 below.
Deep learning a significant subfield of machine learning, leverages Convolutional Neural Networks (CNNs) for image processing, Recurrent Neural Networks (RNNs) for sequential data analysis, and Generative Adversarial Networks (GANs) for data generation. In natural language processing, advancements in text analysis, machine translation, and speech recognition drive the development of intelligent interactions [74]. Similarly, computer vision powers applications such as object detection and image segmentation, these technologies define the mainstream directions of modern AI, driving the widespread development and application of intelligent systems. Below, we primarily introduce machine learning, deep learning, as these AI technologies are widely applied in blockchain to address its various challenges.

2.2.1. Machine Learning

Machine learning [75] is a discipline that explores how computers can simulate human learning to acquire knowledge, enhance skills, and optimize system performance [76]. Based on different learning paradigms, ML can be categorized into four main types: supervised learning, which relies on labeled data to train models for predicting unknown data; unsupervised learning, which processes unlabeled data for pattern recognition and data clustering; semi-supervised learning, which leverages a small amount of labeled data alongside a large volume of unlabeled data to reduce annotation costs and improve model performance [77]; and reinforcement learning, which enables an agent to interact with its environment through a reward mechanism to learn optimal decision-making strategies [78].
As shown in Table 8, supervised learning relies on labeled data for classification and regression tasks, ensuring high accuracy but requiring extensive data annotation. Unsupervised learning uncovers hidden patterns in unlabeled data, commonly used for clustering and dimensionality reduction, though its results may lack interpretability. Semi-supervised learning combines labeled and unlabeled data to improve performance while reducing labeling costs [79]. Reinforcement learning, driven by interaction with the environment, excels in sequential decision-making but demands high computational resources and extensive training. These paradigms are applied across various domains, from image recognition and anomaly detection to autonomous systems and robotics. We will briefly introduce several commonly used machine learning models and algorithms in blockchain applications.
(1)
Decision Tree Model
The decision tree model [80] is an intuitive and efficient data mining tool widely used in classification and regression problems. This method constructs a tree-like structure that decomposes complex decision processes into a series of simple judgments, thereby enabling effective data partitioning and prediction.
The basic components of the model include the root node, internal decision nodes, and terminal nodes (leaf nodes), which correspond to the overall dataset, splitting conditions, and final decision outcomes, respectively [81].
This Figure 6a shows the boosting algorithm of ensemble learning. It starts with training the first weak learner with the original dataset D1. Then, the sample weights are iteratively updated based on the prediction results of each weak learner to increase the weight of the misclassified samples. The new dataset Dn is used to train new weak learners. Finally, the results of multiple weak learners are integrated into a strong learner to give the final prediction. The model performance is improved by focusing on difficult-to-classify samples and iterative integration.
During the construction process, commonly used evaluation metrics include information entropy, information gain, and the Gini coefficient, which measure the change in data purity before and after partitioning. For example, information entropy can be expressed as follows:
E n t r o p y ( S ) = i = 1 n p i log 2 p i
where S represents the current dataset, and p i represents the proportion of samples belonging to class i is denoted. Information gain reflects the reduction in uncertainty brought about by a particular feature in the dataset partitioning, and its formula is given by the following:
G a i n ( S , A ) = E n t r o p y ( S ) v V a l u e s ( A ) | S v | | S | E n t r o p y ( S v )
Here, A is the candidate feature, S v is the feature, and the subset corresponding to the value v of feature A is denoted.
(2)
Support Vector Machine Model
The Support Vector Machine (SVM) [82] is a powerful algorithm widely used in machine learning for both classification and regression tasks. As a supervised learning method, its primary objective is to identify an optimal hyperplane in the feature space that effectively separates different classes of data points while maximizing the margin between them. The fundamental principle of SVM is to determine the hyperplane that best divides the dataset, which, in a d-dimensional feature space, corresponds to a (d-1)-dimensional subspace.
Figure 6b shows the core concept of SVM. In the feature space, SVM looks for an optimal hyperplane (Maximum Margin Hyperplane) to separate samples of different categories. Sample points on the boundary are called support vectors. The distance between the positive hyperplane (Positive Hyperplane) and the negative hyperplane (Negative Hyperplane) is maximized to improve the generalization ability of the model.
To achieve this, SVM leverages support vectors—data points that are closest to the hyperplane—which play a crucial role in defining its position and orientation [83]. One of the key advantages of SVM is its ability to handle high-dimensional datasets while maintaining strong generalization capabilities. Furthermore, SVM is applicable to both linear and nonlinear classification problems, with the latter being addressed through the use of various kernel functions that map input features into a higher-dimensional space, allowing for more complex decision boundaries.
(3)
Random Forest Model
The Random Forest model [84] is an ensemble learning method. Its basic idea is to construct a large number of randomly generated decision trees and combine the predictions from each tree to improve the overall model’s stability and generalization ability. During the construction process, the model reduces the risk of overfitting commonly associated with individual decision trees by performing Bootstrap sampling on the original data and randomly selecting a subset of features at each node. This approach effectively captures the underlying complex relationships within the data. To illustrate the prediction mechanism of Random Forest, the following formula is used. For regression problems, the final prediction result of the Random Forest is the average of the outputs from all the decision trees, and its mathematical expression is as follows:
y ^ = 1 T t = 1 T h t ( x )
where T represents the total number of decision trees, and h t ( x ) is the prediction output of the t-th tree for the input x. This formula reflects the basic idea of reducing prediction variance through mean aggregation.
(4)
XGBoost Model
XGBoost [85] is an efficient and scalable gradient boosting framework. Its core idea is to build decision trees incrementally using an additive model, minimizing prediction errors by optimizing the objective function while also constraining model complexity to improve generalization ability and stability [86]. The XGBoost model incremental construction of the decision tree is shown in Figure 6e. In each iteration, XGBoost uses a second-order Taylor expansion to approximate the loss function, thereby capturing the variation in the objective function more accurately and accelerating the convergence rate. The objective function of XGBoost combines training error and a regularization term, and its expression is given by
O b j = i = 1 n l ( y i , y ^ ( t ) ) + k = 1 t Ω ( f k ) ι
Ω ( f k ) = γ T + 1 2 λ | | ω | | 2
where l ( y i , y ^ ( t ) ) represents the loss value for the i-th sample, and y ^ ( t ) is the prediction result of the model after the t-th iteration. The regularization term Ω ( f k ) is used to penalize model complexity, and γ and λ are the tuning parameters for the number of leaf nodes and the weights of the leaf nodes, respectively.
In each iteration, the model updates the overall output by adding the prediction contribution of the new tree, and its mathematical expression is
y ^ ( t ) = y ^ ( t 1 ) + f t ( x i )
where f t ( x i ) represents the prediction contribution of the t-th tree for the sample x i . This formula reflects the detailed process of how XGBoost approximates the model by progressively accumulating the outputs of decision trees [87].

2.2.2. Deep Learning

Machine learning methods can be broadly categorized into two major types: supervised learning and unsupervised learning. Supervised learning primarily encompasses classification and regression tasks, while unsupervised learning focuses on problems such as clustering and association analysis. Deep learning falls under the domain of supervised learning and is based on neural network technology, which traces its origins back to the 1950s and 1960s, when it was known as the perceptron. The perceptron consisted of an input layer, an output layer, and a single hidden layer. The input feature vectors were transformed through the hidden layer to produce classification results at the output layer [88].
Deep learning involves learning the intrinsic patterns and hierarchical representations of sample data. The knowledge acquired during this learning process significantly enhances the interpretation of data such as text, images, and audio. The ultimate goal of deep learning is to enable machines to develop human-like analytical and learning capabilities, allowing them to recognize and process textual, visual, and auditory information effectively [89].
As a sophisticated machine learning algorithm, deep learning has achieved remarkable breakthroughs, particularly in speech and image recognition, far surpassing previous technologies in these domains. It has also made significant advancements in various fields, including search technology, data mining, machine learning, machine translation, natural language processing, multimedia learning [90], speech processing, recommendation systems, and personalized technology. By enabling machines to emulate human sensory perception and cognitive processes, deep learning has addressed numerous complex pattern recognition challenges, thereby driving substantial progress in artificial-intelligence-related technologies [91].
The fundamental models in deep learning can be broadly classified into three categories: multilayer perceptron models, deep neural network models, and recurrent neural network models. Representative architectures for these categories include Deep Belief Networks for MLP models, Convolutional Neural Networks for DNN models, and Recurrent Neural Networks for sequential data processing [92].
Table 9 compares several mainstream deep learning algorithms in recent years, including CNNs, RNNs, LSTM, GRU, Transformer, GANs, and Variational Autoencoders. CNNs are primarily used for computer vision tasks, leveraging convolutional operations to extract features while improving computational efficiency through parameter sharing. RNNs and their variants, LSTM and GRU, are designed for sequential data processing, with LSTM mitigating the vanishing gradient problem via gating mechanisms, whereas GRU achieves similar performance with reduced computational complexity [93]. Transformers employ self-attention mechanisms to enhance long-range dependency modeling, making them highly effective in natural language processing tasks. GANs utilize adversarial training to generate high-quality data but are prone to mode collapse during training. VAEs, based on probabilistic modeling, produce coherent data distributions with stable training, though the generated samples may lack fine details compared to GANs [94].
(1)
MLP Model
In recent years, the advancement of deep learning has brought renewed attention to the Multilayer Perceptron (MLP), making it a prominent research focus. MLP has been widely applied across various domains, including image processing, speech recognition, and natural language processing, demonstrating exceptional performance in tasks such as object detection, image classification, semantic segmentation, and machine translation [95].
MLP is a type of feedforward neural network capable of mapping input vectors to output vectors. Its architecture typically comprises multiple fully connected layers of neurons, where each neuron (except those in the input layer) employs a nonlinear activation function and is trained using the backpropagation algorithm [96]. During model training, network weights are first initialized. The input data then undergo forward propagation, where the weighted sum is computed in the hidden layers and transformed through an activation function to produce intermediate representations. The output layer subsequently generates prediction results, and a loss function—such as Mean Squared Error (MSE) or Cross-Entropy—is computed based on the ground truth labels. The backpropagation algorithm is then employed to compute gradients and optimize the network parameters. The MLP model architecture is illustrated in Figure 6d.
(2)
CNN Model
CNN is a deep feedforward neural network characterized by local connectivity and weight sharing, specifically designed to process grid-structured data such as images and audio [97]. Its fundamental architecture consists of three primary layers: the convolutional layer, the pooling layer, and the fully connected layer. The CNN grid structure is shown in Figure 6f.
  • Convolutional Layer: As the core component of CNNs, the convolutional layer applies convolutional filters (kernels) that slide over the input data (e.g., image pixel matrices) to perform convolution operations. Different kernels can extract distinct features, such as edges, textures, or higher-level semantic information [98]. Furthermore, convolution operations exhibit weight sharing, meaning that the same kernel is applied across different regions of the input data using identical parameters. This significantly reduces the number of trainable parameters and enhances computational efficiency [99].
  • Pooling Layer: The pooling layer is responsible for dimensionality reduction while preserving essential features, thereby reducing computational complexity and improving model robustness. The most common pooling techniques are max pooling and average pooling. Max pooling retains the maximum value in a local region, whereas average pooling computes the mean value. This operation not only enhances computational efficiency but also increases the model’s tolerance to minor spatial transformations [100].
  • Fully Connected Layer: The fully connected layer integrates the features extracted from previous layers and is primarily used for classification or regression tasks. In this layer, each neuron is connected to all neurons in the preceding layer, resembling hidden layers in traditional neural networks. Through weighted summation and activation functions, the fully connected layer produces the final classification output or task-specific predictions [101].
(3)
LSTM Model
LSTM is a specialized type of Recurrent Neural Network (RNN) designed to process and predict time-series or sequential data with long-term dependencies [102]. It effectively mitigates the vanishing and exploding gradient problems present in traditional RNNs. The fundamental unit of an LSTM consists of three gating mechanisms—the forget gate, input gate, and output gate—along with a cell state [103]. These three gates regulate the flow of information using the sigmoid activation function and element-wise multiplication, ensuring that the strength of the information flow is controlled without introducing additional information. The LSTM unit structure diagram is illustrated in Figure 6c.
In the figure, C t 1 represents the cell state (memory state) at time X t is the current input, and h t 1 denotes the output of the neural unit at time t 1 . The forget gate’s output at time t is f t , the input gate’s output is i t , and the output gate’s output is o t . The function σ represents the sigmoid activation, while C t is the cell state at time t, and h t is the neural unit’s output at time t.
To prevent excessive memory retention from interfering with the processing of new inputs, the forget gate determines how much information from the previous cell state should be preserved. It computes a weight based on x t and h t 1 , processed through a sigmoid activation function to produce a vector with values between 0 and 1—where 0 signifies forgetting and 1 indicates full retention. The forget gate is mathematically expressed as follows:
f t = σ W f · [ h t 1 , X t ] + b f
In Equation (7), W f represents the forget gate weight, b f denotes the bias, and σ is the sigmoid function. The input gate determines how much of the current input information should be retained in the state of the neural unit at the current time step, thereby controlling the information that needs to be updated [104]. The input X t and h t 1 output values pass through the input gate and are then combined with the input and output values processed by a tanh function to generate new control parameters. The mathematical expression for the input gate is as follows:
i t = σ ( W i · [ h t 1 , X t ] + b i )
C ˜ t = tanh ( W c · [ h t 1 , X t ] + b c )
C t = f t C t 1 + i t C ˜ t
In Equation (10), the cell state is updated as C t , and W i represents the input gate weight. The output gate determines which information from the current cell state is transmitted to h t . Both X t and h t 1 first pass through the output gate to define the scope of the output information. Then, in combination with the tanh function, a selected C t portion of the memory information is processed, and the final neural network output value h t is determined. The mathematical expression for the output gate is as follows:
o t = σ ( W o · [ h t 1 , X t ] + b o )
h t = o t tanh ( C t )
In Equations (8) and (9), W o represents the output gate weight.

3. AI-Driven Blockchain Solutions

In recent years, blockchain technology has gained widespread adoption across various sectors, including finance, supply chain management, the Internet of Things, healthcare, and government administration, owing to its decentralized, secure, transparent, and tamper-resistant characteristics [105]. For instance, in the financial sector, blockchain supports digital currencies, smart contracts, and decentralized finance; in supply chain management, it provides reliable product traceability; and in healthcare, it enhances the security of electronic health records, ensuring data privacy and secure sharing. A notable application of blockchain is in the energy and transportation sector. The Mobility Open Blockchain Initiative, in collaboration with Honda, General Motors, PGE, and others, introduced the first blockchain-based Electric Vehicle Grid Integration standard. This standard facilitates secure, decentralized communication and transaction recording between electric vehicles, charging infrastructure, and grid operators. By incorporating AI techniques, such as real-time optimization of charging schedules and predictive energy demand modeling, the EVGI framework enables use cases like vehicle-to-grid integration, tokenized carbon credits, and peer-to-peer energy exchange. These innovations promote a decentralized, low-carbon, and intelligent energy ecosystem, showcasing the synergy of AI and blockchain in addressing energy sustainability and climate challenges [106].
Despite its increasing adoption, blockchain technology is still evolving, with continuous improvements in four key areas: consensus mechanisms, smart contracts, privacy protection, and data retrieval. As a fundamental component of blockchain, consensus mechanisms ensure data consistency across distributed networks and enhance system resilience against attacks [107]. Smart contracts, serving as a trusted intermediary, enable the automated execution of agreements within decentralized networks, reducing human intervention while enhancing transaction transparency and efficiency. Moreover, blockchain offers a high degree of anonymity, as all stored transactions are encrypted, effectively safeguarding user privacy. Additionally, blockchain-based query systems typically incorporate data and hash indexing, organizing information to facilitate efficient data retrieval.
However, blockchain technology still faces several challenges. Consensus mechanisms may suffer from performance bottlenecks and centralization risks; smart contracts are prone to vulnerabilities and upgrade difficulties; privacy-preserving techniques often entail high computational complexity; and data retrieval still encounters issues related to efficiency, cost, and usability. These limitations necessitate further research and improvement, as illustrated in Table 10.
Dividing AI-driven blockchain research into four categories—consensus algorithms, smart contracts, privacy protection, and data retrieval—helps clearly present the core issues and challenges within each research direction, enhancing the structural coherence and readability of the paper. This classification facilitates targeted analysis, allowing for a comparison of the strengths and weaknesses of different approaches, while also highlighting the comprehensive impact of AI technologies across various blockchain domains [114]. Additionally, it promotes interdisciplinary integration and provides clear direction and insights for future research. The existing challenges of AI-powered blockchain are shown in Figure 7 below. The diagram shows multiple applications of AI in blockchain, including smart contract vulnerability detection, consensus algorithm optimization, data privacy protection, and efficient data storage. The security, scalability, and privacy protection of blockchain are improved by techniques such as deep learning, decision trees, federated learning, and optimized Merkle trees [115].

3.1. AI-Driven Consensus Algorithm

AI-driven consensus algorithms are emerging as a core driving force in the intelligent evolution of blockchain systems, aiming to enhance security, efficiency, and scalability through advanced machine learning techniques. These algorithms primarily focus on three key optimization areas: dynamic node selection, malicious behavior detection, and resource allocation prediction. In dynamic adaptive consensus mechanisms, reinforcement learning can adjust PoW or PoS parameters in real time—such as dynamically modifying block generation intervals or probabilities—to improve system throughput and responsiveness. A notable example is XG-PBFT, which utilizes graph neural networks to optimize communication paths between nodes, reducing the communication complexity of traditional PBFT from O(n2) to O(n).
In terms of security, deep learning models such as LSTM are employed to analyze historical behavior of nodes and identify abnormal patterns, including selfish mining, sybil attacks, or 51% attacks. These detection mechanisms are often integrated with reputation-based systems (e.g., CE-PBFT) to effectively filter out malicious nodes and reduce the risk of consensus centralization. For resource optimization, federated learning (FL) and distributed edge intelligence frameworks enable efficient task allocation across edge nodes, thereby minimizing energy consumption and network latency while preserving data privacy. Systems like FGADL-DEVCA have demonstrated the ability to save up to 30% of energy costs in multi-node environments.
Based on a comprehensive analysis of existing research, current optimizations in AI-driven blockchain consensus primarily focus on improvements in POW and POS consensus mechanisms. These AI-driven consensus algorithms can be categorized according to the main challenges they address, such as resource-constrained environments, security and privacy concerns, economic incentives, and resource optimization. Broadly, these can be classified into four categories: AI-driven IoT/Edge computing consensus mechanisms, AI-powered security and privacy protection consensus, AI-driven economic incentives and resource optimization consensus, and AI-driven intelligent computing and deep learning consensus.

3.1.1. AI-Powered Authentication and IoT Consensus Optimization Algorithms

In the IoT environment, authentication is crucial due to the vast number of connected devices and the highly sensitive nature of the data they handle, such as those in medical devices, smart homes, and industrial control systems. Therefore, achieving efficient consensus in large-scale IoT networks while minimizing authentication consensus latency has become a pressing challenge that requires urgent resolution. These challenges are primarily characterized by resource constraints, high heterogeneity, frequent node mobility, and the need for ultra-low latency, which traditional consensus mechanisms often fail to address effectively. To address these challenges, Dutta et al. [116] introduced a significant advancement in the Proof of Authentication (PoAh) consensus algorithm, specifically designed for resource-constrained IoT devices. Building upon the original PoAh consensus, this enhanced iteration, referred to as PoAh 2.0, integrates AI at the block creator node level. This novel approach enables the generation of blockchain transactions embedded with AI-determined sensitivity and other relevant metadata, representing a pioneering concept in the field. Sun et al. [117] proposed an AI-assisted consensus algorithm tailored for vehicular networks, integrating vehicle-based metrics with neural networks. The approach incorporates key indicators such as vehicle online duration, performance, and behavior. A comprehensive model and a hierarchical classification method, combined with a BP neural network, are utilized to optimize interconnectivity. Additionally, the Informer model is employed to predict future vehicle online durations, effectively mitigating the issue of primary node vehicle dropout in collaborative IoV networks. Alruwaili et al. [118] also developed a deep-learning-based data edge verification and consensus method (FGADL-DEVCA) for IoT-cloud platforms. The primary objective of FGADL-DEVCA is to integrate blockchain technology to enhance security in IoT-cloud environments while leveraging deep learning models for efficient fault detection. Furthermore, Sasikumar et al. [119] developed a novel blockchain-assisted data edge validation and machine learning consensus algorithm (BDEV-CAML) for the purpose of IoT fault detection. The proposed BDEV-CAML technique integrates the advantages of blockchain, IoT, and machine learning models to enhance the credibility, efficiency, and security of IoT networks. However, current research still faces several gaps. Firstly, there is a lack of unified AI-driven lightweight consensus frameworks that are adaptable to a wide range of IoT scenarios, particularly in ultra-dense or rapidly changing environments. Secondly, most existing works focus on static or semi-dynamic network topologies, which limits their applicability to mobile or highly dynamic IoT networks such as UAV swarms or autonomous vehicular systems. Moreover, the integration of privacy-preserving AI techniques with blockchain-based consensus remains underexplored, particularly in scenarios involving federated or split learning across distributed IoT devices.
Potential solutions include the design of adaptive, modular AI consensus layers that can dynamically switch consensus modes based on real-time network metrics; the development of federated reinforcement learning models to allow collaborative learning without compromising data privacy; and the integration of privacy-preserving computation (e.g., homomorphic encryption and differential privacy) with consensus validation to address privacy and scalability trade-offs. Future research should also explore multi-objective optimization frameworks, balancing security, latency, energy consumption, and trustworthiness in heterogeneous IoT environments.
As shown in Table 11, this category of consensus mechanisms is primarily designed for IoT devices and edge computing environments, where computational resources are often constrained. These approaches enhance consensus efficiency by improving device authentication and optimizing online status management, thereby reducing latency and communication overhead. Moreover, they enable resource-limited devices to participate in the consensus process more reliably while ensuring data integrity. However, some solutions still require substantial computational power, making them less suitable for low-capacity devices.

3.1.2. AI-Driven Security and Privacy-Preserving Consensus

Security and privacy protection are fundamental concerns in blockchain systems as they ensure the integrity, confidentiality, and trustworthiness of distributed data. In various applications, such as financial transactions, healthcare, and decentralized identity management, safeguarding sensitive information against cyber threats, unauthorized access, and data breaches is crucial. To address these challenges, AI-driven consensus mechanisms for security and privacy protection have emerged as a promising solution. By integrating AI with blockchain consensus, these mechanisms enhance anomaly detection, prevent malicious node behavior, and improve data protection through techniques such as differential privacy, federated learning, and deep-learning-based intrusion detection.
Zhang et al. [120] proposed an architecture in which devices (also referred to as nodes) can reach consensus on task results using off-chain smart contracts and private data. The proposed distributed computing architecture accelerates compute-intensive and data-intensive supervised classification algorithms, even in resource-constrained environments. This architecture significantly enhances privacy protection, preventing the leakage of distributed data. Sasikumar et al. [121] aimed to design and implement a consensus mechanism that combines blockchain and AI to enable successful big data analytics. This work presents an improved IIoT network based on the DPoS algorithm, which integrates blockchain and AI for real-time data transmission. To accelerate block generation in the IIoT network, nodes use the improved DPoS to reach consensus, select representatives, and store block information in transaction nodes. Kumar et al. [122] proposed a blockchain-supported eXplainable AI (XAI) to enhance decision-making capabilities in network threat detection within intelligent healthcare systems. Specifically, the proposed method first implements the Clique Proof of Authority (C-PoA) consensus to verify and store data across multiple cloud providers using blockchain. Secondly, a novel deep-learning-based threat tracking model is constructed by combining parallel stacked long short-term memory (PSLSTM) networks with multi-head attention mechanisms to improve attack detection. Extensive experiments confirm that it has the potential to be used by cybersecurity analysts as an enhanced decision support system. Kim et al. [123] investigated vulnerabilities in automotive safety committees and standards, using AI-based LSTM and blockchain consensus algorithms for anomaly detection in geo-tagged train carriage hacking attacks. Additionally, in the context of automotive safety, an algorithm was explored that uses LSTM-based anomaly detection techniques to predict normal and abnormal values in automotive communication networks, which are primarily divided into internal and external networks.
As shown in Table 12, the above research has made multi-dimensional optimizations in terms of privacy protection, consensus efficiency, threat detection, and system interpretability by integrating blockchain and artificial intelligence technologies, such as off-chain smart contracts to improve computing performance in resource-constrained environments, improved DPoS to achieve efficient data transmission in IIoT networks, XAI to enhance medical network security decisions, and LSTM-based anomaly detection to optimize the security of Internet of Vehicles systems. However, these works still face many challenges, including the balance between privacy protection and computing efficiency, the difficulty of model deployment on resource-constrained devices, the centralization risk of representative node elections, the lack of interpretability of deep models, and the lack of cross-platform collaboration mechanisms. Existing research has not fully solved the problem of trusted consensus and task collaboration in heterogeneous IoT environments and lacks systematic performance evaluation and incentive mechanism design for the “on-chain + off-chain” architecture. In the future, the practicality and security of blockchain in intelligent IoT systems can be further improved through technical paths such as lightweight AI models and federated learning, verifiable off-chain computing, incentive-enhanced consensus mechanisms, multimodal XAI fusion, and multi-chain collaboration protocols.

3.1.3. AI-Driven Federated Learning and Privacy-Preserving Consensus

While blockchain technology provides decentralization and transparency, privacy protection has become an increasingly critical issue. As blockchain applications expand, particularly in sectors like finance, healthcare, and identity management, ensuring the security of sensitive information and preventing unauthorized access and data breaches have become urgent challenges. In this context, AI offers new solutions to optimize blockchain privacy protection. AI-driven consensus mechanisms for security and privacy protection, using techniques such as anomaly detection, differential privacy, and data integrity protection, can significantly enhance the privacy capabilities of the system. By integrating AI with blockchain, AI can optimize data privacy protection in the consensus process, for example, by using federated learning and deep learning techniques to strengthen data analysis and privacy computation. Additionally, nodes can deploy computational models internally, assigning incentive scores based on their computational capabilities to enhance node participation and activity. Moreover, performance-based metrics can be used to promptly identify and eliminate malicious nodes, thereby improving overall consensus efficiency and enhancing privacy protection. Cui et al. [124] proposed a novel blockchain-enabled federated learning (BCFL) scheme tailored for the IoV and incorporating differential privacy mechanisms. To meet the stringent performance requirements of IoV environments, the approach integrates a federation chain with PBFT consensus, which improves efficiency compared to traditional public blockchains. In addition, the method employs the Differential Privacy Stochastic Gradient Descent (DP-SGD) algorithm in the local training process of Federation Learning to enhance privacy preservation. Wang et al. [125] designed an innovative block structure, novel transaction types, and credit-based incentives. The proposed PF-PoFL scheme supports fully decentralized AI task outsourcing, joint mining, model evaluation and reward distribution while being resistant to fraud and Sybil attacks. In addition, PF-PoFL employs a user-level differential privacy mechanism to prevent implicit privacy leakage during federated learning model training. Deng et al. [126] developed an innovative economic model to manage monetary, trade, and supply and demand policies in AIBC. The study proposed an upper-layer DPoEV incentive consensus algorithm for economic policy implementation and introduced an underlying DABFT distributed consensus algorithm that adaptively enforces the DPoEV. In addition, the results of the study showed that the economic model can be efficiently implemented by the DPoEV-DABFT dual consensus architecture of AIBC. Alrubei et al. [127] proposed a decentralized and distributed architecture to implement Distributed Artificial Intelligence (DAI) using IoT hardware platform. The trained DAI system is deployed via IoT devices, where each IoT device acts as one or more neurons in the DAI layer. The approach relies on decentralized, self-managed blockchain technology to facilitate trusted interaction and information exchange between distributed neurons. The platform is built and customized for IoT systems to efficiently handle DAI-related tasks. In addition, the study designs and implements a novel consensus mechanism combining PoA and PoW. Zhi et al. [128] combined distributed deep learning with blockchain technology and proposed a blockchain consensus mechanism based on distributed deep learning proof-of-workload (BCDDL) to reduce the waste of computational resources in blockchain networks. Jogunola et al. [129] proposed a framework and explored perspectives related to achieving an effective integration of blockchain and artificial intelligence (BC-AI) in a carbon emissions trading system (ETS). Goh et al. [130] proposed a secure Trust Delegated Consensus Blockchain (TDCB-D3P) scheme based on the Priority Experience Replay (D3P) mechanism to address scalability and security issues simultaneously. The scheme utilizes Deep Reinforcement Learning techniques to optimize the blockchain performance.
As shown in Table 13, the aforementioned consensus optimization schemes focus on improving computational resource utilization, optimizing resource scheduling, reducing energy consumption, and minimizing unnecessary computational overhead. According to References [124,127,129], AI-driven optimization reduced consensus latency by approximately 25%, decreased transaction processing costs by about 15%, and lowered energy consumption by around 20% compared to traditional blockchain systems. The unit of energy consumption reduction is measured in kilowatt-hours (kWh), and cost reductions are calculated based on transaction fees in USD. For instance, some approaches enhance task allocation in PoW consensus to make the computation process more efficient, or, based on the PBFT model, deploy computational models within nodes where the better the node’s computational performance, the more incentives it receives. This encourages higher participation from nodes in the consensus network, thereby improving overall efficiency and reducing communication overhead. Although the above methods have achieved positive results, they still face many challenges, such as the trade-off between differential privacy and model performance, system stability under multi-consensus mechanisms, fairness of task incentive mechanisms, and on-chain compatibility of AI computing. Future research can further promote the integration and implementation of blockchain and AI in the field of privacy computing by introducing multi-level privacy protection strategies, establishing a unified and reliable AI incentive and evaluation system, developing lightweight models and asynchronous update mechanisms, and exploring cross-chain privacy collaboration protocols.

3.1.4. AI-Driven Blockchain Consensus Others

Some studies primarily focus on computationally intensive tasks, such as deep learning training and smart contract execution, leveraging AI to enhance consensus computation efficiency. Kim et al. [131] proposed a series of blockchain algorithms based on natural language processing. The primary function of the Multi-Layer ANN for Blockchain Consensus Algorithm is not merely to use given data as-is to form a classifier but rather to train transformations optimized for the given data by incorporating structures known as hidden layers while simultaneously forming a classifier. Depending on the number of neurons in the hidden layers, the model can also perform dimensionality reduction or expansion on the given data. A multi-layer ANN, consisting of two layers of neurons, can be meticulously designed for enhanced performance. This structure also represents the architecture of the Multi-Layer ANN blockchain consensus algorithm, where all layers—except for the output and input layers—are designed as hidden layers that operate in conjunction with the consensus algorithm during the protocol process. Chen et al. [132] proposed a novel framework based on Deep Reinforcement Learning (DRL) to offload the computationally intensive tasks of PoW to edge servers within a blockchain-based Mobile Crowd Sensing (MCS) system. The proposed framework enables the derivation of an optimal PoW task offloading strategy in complex and dynamic MCS environments.
In addition, some researchers have introduced machine learning methods into consensus node classification, which can be divided into unsupervised nodes according to their performance, and select good nodes to participate in the consensus to reduce the communication overhead and delay of malicious nodes, and the schematic diagram of AI algorithm-driven consensus classification is shown in Figure 8 below. This figure shows the application of AI in blockchain consensus mechanism, using AI grouping algorithm to intelligently group network nodes, generate candidate blocks, and select the final block to be written into the blockchain through the consensus group so as to optimize the consensus efficiency and improve the system performance. This type of research is also the future development direction of AI-driven blockchain consensus now. For example, Xiaowei et al. [133] proposed an improved PBFT algorithm based on XGBoost grouping called XG-PBFT. The method first trains the dataset by learning important parameters that affect the performance of nodes, which are used as node classification criteria. Subsequently, the dataset is trained using the XGBoost algorithm, and the nodes newly added to the system are grouped according to the trained model. In addition, XG-PBFT assigns reputation values to nodes based on their performance, and nodes with higher reputation values are more likely to become master nodes, thus enhancing the efficiency and security of the consensus process. Xiao et al. [134] proposed a novel consensus algorithm called Credit Evaluation-based Practical Byzantine Fault Tolerance (CE-PBFT). This algorithm introduces an improved node credit evaluation model that comprehensively considers node completion rate, consensus attenuation, and historical behavior to quantify the reliability status of nodes during system operation. Through this mechanism, CE-PBFT effectively enhances the overall reliability and security of the system. Additionally, this study innovatively applies the decision tree algorithm to analyze network node behavior, thereby optimizing the consensus decision-making process and simplifying existing consensus protocols.
As shown in Table 14, these consensus mechanisms are primarily applied in specialized industries or domains, such as academic credential verification and distributed computing, to ensure data integrity and reliability [135]. For instance, blockchain-based diploma authentication systems can effectively prevent certificate forgery. While these solutions demonstrate high effectiveness within their respective fields, their applicability is limited due to their lack of generalizability across broader use cases.

3.2. AI-Driven Smart Contract

With the rapid development of blockchain technology, smart contracts, as its core component, have shown great potential in achieving automatic execution and decentralized collaboration. However, current smart contracts still face many challenges in terms of security, execution efficiency, domain adaptability, and resource management. AI, as a technical means with strong learning and pattern recognition capabilities, has been widely used in various life cycle links of smart contracts and has become an important engine to promote their performance improvement and security.
At present, the research focus of the integration of artificial intelligence and blockchain is on smart contract vulnerability detection and the construction of trust mechanisms in specific scenarios, and it has also expanded to multiple directions such as code optimization, automatic generation, and access control. In order to sort out the existing research results and clearly distinguish different technical paths and application scenarios, this paper divides the research on smart contracts driven by artificial intelligence into four categories: smart contract security and vulnerability detection, smart contract optimization and generation, smart contract applications in specific fields, and smart contract access control and resource management. A detailed classification and comparison of these studies are presented in Table 15.
In terms of smart contract security, AI is widely used for vulnerability detection and repair suggestion generation. Through GNN, deep learning models, and natural language processing technology, automatic identification and classification of contract logic defects can be achieved, significantly improving the security assurance before contract deployment. Especially in the identification of classic vulnerabilities such as reentrancy attacks and integer overflows, AI models show higher detection accuracy and scalability than traditional tools.
For the optimization and generation of smart contracts, AI promotes the automatic reconstruction and code generation of contract structures through reinforcement learning, neural architecture search, and pre-trained language models, thereby reducing redundant logic, reducing gas fees, and improving contract execution efficiency. Related research also combines machine learning with contract bytecode analysis to achieve automatic slimming and efficient execution path reasoning.
In specific industry scenarios, such as finance, medical care, logistics, etc., AI technology is used to build knowledge graphs, multi-agent interaction models, and cross-chain semantic adaptation mechanisms to improve the understanding and response capabilities of smart contracts to complex business rules. This makes smart contracts easier to adapt to multi-chain deployment and dynamic business needs.
In addition, AI optimization solutions are gradually being introduced into smart contract access control and resource management. Researchers use graph learning, federated learning, and reinforcement learning methods to model user permissions and conduct behavioral analysis, achieving dynamic allocation of resources and adaptive management of security boundaries. At the same time, explainable AI technology has also begun to be applied to the permission decision-making process to improve its compliance and regulatory compliance.

3.2.1. AI-Driven Smart Contract Security and Vulnerability Detections

Blockchain smart contract vulnerabilities can lead to irreversible economic losses, while traditional detection methods suffer from high false positives, omissions, and difficulty in dealing with complex attacks. As the complexity of smart contracts increases, code concealment, and new attack methods make detection more difficult, AI-driven vulnerability detection improves detection accuracy and reduces false positives and omissions through deep learning and graph neural networks and also has adaptive learning capabilities to identify variant attacks and provide intelligent remediation solutions. Compared with traditional methods, AI has significant advantages in efficiency, accuracy, and adaptability and can more effectively protect smart contract security.
Smart contracts, as a crucial application of blockchain technology, are susceptible to a variety of potential vulnerabilities during execution. As shown in Table 16, these flaws may pose serious threats to the security and reliability of smart contracts. Below is a detailed overview of several key categories of smart contract vulnerabilities:
(1)
Arithmetic Vulnerabilities
Arithmetic vulnerabilities primarily arise from errors in mathematical operations within smart contracts, most notably overflow and underflow. In programming, data types typically have fixed value ranges. When the result of an operation exceeds these limits, overflow or underflow occurs. The root causes often include a lack of boundary checking and the absence of secure math libraries. Such libraries can detect and prevent abnormal results during computation. For instance, in ERC20 token contracts, overflow may occur during token increment or decrement operations. This could lead to incorrect token calculations—such as unintentionally increasing or decreasing token balances—ultimately allowing attackers to mint tokens illegitimately. Exploiting such a flaw, a malicious user could inflate their token balance and transfer the excess tokens to another address, resulting in financial loss.
(2)
Re-entrancy Attacks
Re-entrancy attacks exploit the recursive nature of function calls in smart contracts. Specifically, the attack occurs when a contract makes an external call (e.g., to another contract or function) and, before the contract’s state is updated, an attacker re-enters the contract through a fallback or recursive function. This is possible due to the lack of appropriate safeguards or function locking mechanisms. A well-known example is the infamous DAO attack, where the attacker repeatedly invoked the withdrawal function before the contract updated the balance. This allowed multiple unauthorized withdrawals, eventually draining a significant amount of funds and triggering a hard fork of the Ethereum blockchain.
(3)
Unchecked Calls
Unchecked call vulnerabilities stem from the failure to verify the return values of low-level function calls. In Solidity, functions like call() and delegatecall() may fail due to network issues, contract state problems, or unexpected behaviors. If the developer does not explicitly check whether the call was successful, it may lead to hidden execution failures or undesired behavior. One notable incident is the Parity Wallet vulnerability, where critical contract operations were carried out based on unverified return values. As a result, users might assume that operations such as fund transfers were successfully completed, while in reality, the funds remained in the original address or were misdirected, causing unintended financial consequences.
(4)
Inconsistent Access Control
Inconsistent access control issues are mainly due to improper or missing configuration of role-based permissions in smart contracts. Ideally, different roles (e.g., administrator, user) should have clearly defined privileges, ensuring that only authorized entities can perform sensitive actions. However, if these mechanisms are misconfigured—such as assigning administrative rights to regular users or failing to enforce restrictions—the contract becomes vulnerable. Such flaws may allow unauthorized users to perform critical actions like modifying contract parameters or transferring funds, thereby compromising the integrity and security of the entire contract system.
Lyu et al. [136] first introduced the Contract Dependency Graph (CDG) to analyze vulnerabilities in Ethereum smart contracts. The CDG characterizes inter-contract dependencies formed by DELEGATECALL-type internal transactions in Ethereum. They then proposed three general definitions of security violations related to the CDG to identify potential victim contracts affected by different types of vulnerable contracts. To validate these security violations, they constructed a CDG using 195,247 active smart contracts from the latest Ethereum blocks and successfully detected three representative known vulnerabilities. Yang et al. [137] proposed CrossFuzz, a fuzzing-based approach for cross-contract vulnerability detection. Their method leverages data flow information to optimize mutation strategies, significantly improving the efficiency of fuzz testing in identifying cross-contract vulnerabilities. Gao et al. [138] introduced an automated approach to learning the characteristics of Solidity-based smart contracts, which is particularly beneficial for clone detection, error detection, and contract verification. Wei et al. [139] conducted a comprehensive survey on smart contract quality assurance, covering vulnerability identification, the evaluation of detection tools, and dataset development. They developed an annotated dataset as a benchmark, including ten common vulnerability types, serving as a critical resource for future research. Additionally, they conducted extensive experiments evaluating 14 vulnerability detection tools, providing comparative analyses that highlight their strengths and limitations. Vidal et al. [140] proposed OpenSCV, a novel open and hierarchical classification system for smart contract vulnerabilities. OpenSCV is designed to be community-driven, aligning with current industry practices while remaining adaptable to future modifications and advancements. Wang et al. [141] introduced HomoDec, a timestamp vulnerability detection technique for smart contracts based on code homogeneity analysis. The core idea is to compare the tested smart contract’s code against a database of known vulnerability patterns, assessing similarities to determine whether the tested contract exhibits timestamp-related vulnerabilities. Fei et al. [142] developed MSmart, a novel tool that transforms smart contract source code into an intermediate representation and detects vulnerabilities based on XPath rules. They extended SmartCheck’s intermediate representation rules to identify a broader range of vulnerabilities and optimized existing rules to accommodate the increasing complexity of smart contracts. Chen et al. [143] introduced DefectChecker, a symbolic execution-based method and tool designed to detect eight types of contract defects that may lead to undesirable behaviors on the Ethereum blockchain. DefectChecker identifies these defects directly from smart contract bytecode. Lin et al. [144] developed CRPWarner (contract-related Rug Pull Risk Warner) to identify malicious functionalities within smart contracts and issue warnings about potential rug pull risks. Wu et al. [145] proposed a Hybrid Attention Mechanism (HAM) model for detecting security vulnerabilities in smart contracts. Their approach extracts code snippets from source code, focusing on critical areas where vulnerabilities are likely to occur. Zhang et al. [146] introduced CBGRU, a hybrid deep learning model that strategically integrates various word embeddings (Word2Vec and FastText) with multiple deep learning architectures (LSTM, GRU, BiLSTM, CNN, and BiGRU). The model extracts features using different deep learning methods and combines them to enhance smart contract vulnerability detection. Hwang et al. [147] proposed CodeNet, a code-oriented CNN architecture designed to detect vulnerable smart contracts while preserving semantic and contextual information. To further improve CodeNet’s performance, they developed a data preprocessing module that transforms smart contracts into images while maintaining local structural integrity. Gao et al. [148] explored the use of graph neural networks (GNNs) combined with expert knowledge for smart contract vulnerability detection. Their approach transforms the rich control and data flow semantics of source code into a contract graph and introduces a novel temporal message propagation network to extract graph features from a normalized graph. These extracted features are then integrated with expert-designed patterns to develop a comprehensive detection system. Ivanov et al. [149] proposed a novel smart contract security testing method called Transaction Encapsulation. The core idea involves executing transactions locally on fully synchronized yet isolated Ethereum nodes, allowing for a preview of transaction sequence outcomes in the blockchain’s current state. To ensure testing accuracy, their system, TxT, deterministically verifies whether a given transaction sequence follows the same execution path within the blockchain’s current state.
Yu et al. [150] introduced TxMirror, an innovative data-driven framework that detects bytecode-level smart contract vulnerabilities by symmetrically simulating transactions. Beyond logical analysis, TxMirror customizes the Ethereum Virtual Machine (EVM) for vulnerability detection and stores stack data and logical dependencies in a bi-linked forest structure, enabling efficient indexing of logical relationships. This approach allows TxMirror to directly examine custom EVM stack data within transactions without requiring repeated transaction replays or EVM bytecode-level tracing. Li et al. [151] presented a multimodal feature fusion-based approach for smart contract vulnerability detection. Their method extracts three types of modal features from the smart contract lifecycle, leveraging both static and dynamic characteristics. By integrating Graph Convolutional Networks (GCN) and Bidirectional Long Short-Term Memory (Bi-LSTM) networks, the system effectively detects various vulnerabilities in smart contracts. Pasqua et al. [152] proposed a new method based on symbolic execution of the EVM operand stack, enabling precise jump address parsing within EVM bytecode and constructing an accurate Control Flow Graph (CFG) of compiled smart contracts. Additionally, they extended EtherSolve with two specialized detectors for identifying Ethereum’s two most prominent vulnerabilities—Re-entrancy and Tx.origin misuse. Qian et al. [153] introduced a hybrid approach combining Bi-LSTM and an attention mechanism for multi-label vulnerability detection in smart contract opcode sequences. The process begins with preprocessing opcode data, transforming it into a feature matrix suitable for neural network input. The system then employs an attention-enhanced Bi-LSTM model to classify smart contracts with multiple vulnerabilities. Peng et al. [154] developed RNVulDet, a tool that integrates taint analysis techniques to automatically identify poor randomness vulnerabilities and detect corresponding exploit transactions. Le et al. [155] proposed a comprehensive approach leveraging pre-trained Large Language Models (LLMs) for Ethereum smart contract vulnerability detection. By applying transformer-based LLMs, their method utilizes the models’ ability to understand and analyze Solidity code, effectively identifying potential security vulnerabilities. Wang et al. [156] introduced a metric learning and Bi-LSTM-based vulnerability detection framework for Ethereum smart contracts, optimizing the model’s feature space. Their approach was evaluated on a large-scale dataset containing four major types of vulnerabilities: arithmetic vulnerabilities, re-entrancy attacks, unchecked calls, and inconsistent access control mechanisms.
As shown in Table 17 and Table 18, in the domain of smart contract security and vulnerability detection, research primarily centers on enhancing detection accuracy and efficiency through techniques such as graph analysis, symbolic execution, machine learning, and deep learning. Studies demonstrate high efficacy in identifying prevalent vulnerabilities like re-entry attacks, integer overflows, and timestamp dependencies, with significantly reduced false-positive rates. However, existing approaches exhibit notable limitations, including substantial computational costs, reliance on frequent rule updates, and diminished performance in detecting complex vulnerabilities. Notably, AI-driven methods, while adept at recognizing known threats, often lack generalizability to emerging attack vectors such as cross-chain exploits and compositional vulnerabilities. Furthermore, current methodologies infrequently integrate multi-modal analyses that correlate code behavior with transactional patterns, thereby constraining system robustness and threat coverage. Future advancements may lie in exploring self-supervised learning frameworks and multi-modal neural architectures to bolster defensive capabilities against unknown adversarial strategies.

3.2.2. AI-Driven Smart Contract Optimization and Generation

Blockchain smart contracts effectively solve the centralized trust problem in several specific scenarios, such as decentralized finance (DeFi), supply chain management, and e-government. In order to further boost the efficiency and adaptability of smart contracts, scholars at home and abroad have attempted to introduce AI into smart-contract-related research.
Table 19 summarizes key approaches to smart contract optimization, highlighting that while these methods enhance automation, efficiency, and maintainability, many are limited by platform dependence or additional metadata requirements. Park et al. [157] proposed a smart contract proxy to enhance the reusability of smart contracts in blockchain environments. Their approach provides a framework for comparing and reusing smart contracts, with the proposed proxy serving as a reference model to improve the flexibility and reusability of smart contract management in blockchain ecosystems. Sanchez-Gomez et al. [158] presented the first overview of a UML-based smart contract metamodel, which enables the implementation of these objectives. This metamodel is expected to be further refined in future work to represent blockchain environments and facilitate automated testing. Gec et al. [159] introduced a novel recommendation system designed to support the low-cost development and deployment of EVM-based smart contracts. The system’s algorithm assists developers by suggesting smart contract templates that align with their requirements and are compatible with fog computing architectures.
Chen et al. [160] proposed an Annotation-Assisted Smart Contract Generation Method. To evaluate its effectiveness, the method was tested using BLEU scores for bilingual quality assessment, along with security analysis tools such as Mythril and VaaS. The results were then compared with those of existing approaches. Tong et al. [161] introduced a new SLA management model that leverages SDN-enabled WSNs composed of wireless nodes to interact with smart contracts in a simplified manner. The proposed model ensures the persistence of network metrics and SLA compliance through smart contracts, eliminating the need for third-party audits in payment and compensation procedures.
Table 20 presents five representative approaches to smart contract optimization, each enhancing reusability, automation, or compatibility, while facing limitations such as metadata dependence, ecosystem constraints, or implementation immaturity.

3.2.3. AI-Driven Smart Contract Applications in Specific Domains

Nowadays, blockchain smart contracts have been widely used. For an AI-driven implementation of smart contracts in specific applications, relevant scholars have done the following research: Margret et al. [162] proposed a tamper-proof framework for storing and retrieving data. The framework leverages AI techniques to evaluate the mathematical computations of smart contracts, including overhead, execution time, average computational cost, standard deviation, throughput, and resource utilization.
To address the issues of widespread fake restaurant reviews, unreliable rating authenticity, and low customer satisfaction with recommended dishes, Zhang et al. [163] introduced a peer-to-peer architecture based on blockchain smart contracts. Additionally, AI-powered predictive analytics were employed to enhance data analysis and improve recommendation accuracy. Xiao et al. [164] proposed a plastic-credit-driven incentive system composed of a recyclability index (RI) and plastic credits to promote plastic recycling and enhance the quality of recyclable plastics. This system relies on a market self-regulation mechanism to guide industry participants in self-regulating and optimizing plastic production and trading processes. Wang et al. [165] proposed a consortium blockchain and smart-contract-based framework for tracking and tracing agricultural supply chain workflows. This approach enhances traceability and data sharing while mitigating information silos among enterprises, reducing the reliance on centralized institutions. Moreover, it improves the integrity, reliability, and security of transaction records. Garcia et al. [166] explored the potential of leveraging smart contracts in Byzantine Fault Tolerant (BFT) blockchain platforms. Specifically, they examined the BFT blockchain platforms Tendermint and Hyperledger Besu and applied them to a decentralized e-prescription management case study to evaluate their effectiveness and feasibility. Agrawal et al. [167] investigated the design of a blockchain-based resource-sharing collaborative framework, leveraging smart contracts to facilitate decentralized resource allocation. This framework is particularly well suited for broader networks or ecosystems beyond conventional supply chains, where established collaboration mechanisms and hierarchical structures exist to enhance resource management transparency and data authenticity.
As shown in Table 21, the research on smart contract applications in specific domains such as smart cities, food supply chains, agriculture, and healthcare has primarily focused on leveraging their capabilities in data management, trust mechanisms, and traceability. Studies demonstrate that smart contracts can enhance data integrity, reduce reliance on intermediaries, and improve supply chain transparency. However, many of these solutions exhibit high computational resource consumption, raising concerns about their scalability and applicability in large-system deployments. This is primarily because AI-assisted smart contracts require complex data preprocessing, feature extraction, and model inference, all of which involve intensive computations. Additionally, maintaining security and trust often necessitates mechanisms such as Trusted Execution Environments (TEEs) or zero-knowledge proofs (ZKPs), further increasing the computational load. Frequent on-chain and off-chain interactions for model verification and the potential need for continuous model updates or retraining exacerbate resource demands. Furthermore, while AI-enhanced smart contract studies show promise, they predominantly remain at the proof-of-concept stage, lacking comprehensive validation in real-world, large-scale scenarios. Critical performance bottlenecks, including transaction throughput and latency under high-load conditions, are often overlooked. Addressing these challenges requires advancing modular and reusable smart contract architectures, alongside integrating AI techniques to predict and optimize performance in high-frequency, resource-constrained transaction environments.

3.2.4. AI-Driven Smart Contract Access Control and Resource Management

With the increasing adoption of blockchain technology across industries, smart contracts have become a key component in automating and securing digital transactions. However, traditional smart contracts face several limitations in access control and resource management, especially in large-scale decentralized environments. Traditional access control models, such as Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), often struggle with flexibility, adaptability, and computational efficiency when deployed in dynamic and heterogeneous blockchain ecosystems. AI-driven mechanisms have been introduced into smart contract systems. AI enhances access control by making real-time, context-aware decisions and optimizes resource management through predictive analytics and automated allocation policies. Zhang et al. [168] integrated blockchain-based smart contracts with the ABAC model, proposing a distributed and reliable access control framework for smart cities. Karakoc et al. [169] proposed a novel SLA (Service Level Agreement) management model that utilizes SDN (Software Defined Networking)-enabled WSNs (Wireless Sensor Networks) composed of wireless nodes to facilitate seamless interaction with smart contracts. The proposed model ensures the persistence of network performance metrics and SLA specifications through smart contracts, thus eliminating the need for intermediaries to audit payment and compensation procedures. Guo et al. [170] address the above challenges by introducing a privacy-preserving decentralized database system in a parallel smart contract model. The proposed system implements oblivious access interactions, which are inherently asymmetric and require significant computational effort on the smart contract side. By slightly reducing the overhead of oblivious memory (ORAM) and mitigating the problems associated with centralized servers, the system enhances privacy and decentralization in blockchain-based applications.
As shown in Table 22, the research on access control and resource management in blockchain systems highlights significant limitations in existing solutions. Current approaches predominantly rely on static ABAC strategies, which prove inadequate for the highly dynamic and decentralized nature of blockchain environments. Additionally, decentralized data access mechanisms such as Oblivious RAM introduce substantial computational overheads and demonstrate poor compatibility with smart contract execution. To address these challenges, future research should explore two key avenues: first, developing AI-driven dynamic access control systems capable of real-time adaptation to contextual changes, and second, innovating lightweight secure storage models to enable efficient and scalable resource management within blockchain ecosystems. These advancements aim to overcome performance bottlenecks while enhancing security and adaptability in decentralized architectures.

3.3. AI-Driven Privacy Protection

In today’s data-driven era, privacy protection has become a crucial issue. With the rapid development of artificial intelligence, the IoT, and Big Data technologies, huge amounts of sensitive data are being collected, stored, and analyzed, such as medical records, financial transactions, and user behavior data. However, there is an increasing risk of data leakage, unauthorized access, and malicious attacks, which not only threaten users’ personal privacy but may also lead to the leakage of confidential corporate information.
FL is an emerging decentralized machine learning approach that allows multiple clients to train models locally and share only the model update parameters, not the raw data, thus enabling federated modeling without exposing private data. The core idea of FL is to perform collaborative learning across multiple devices or organizations while minimizing the risk of data leakage, reducing the risk of data leakage. FL mainly consists of horizontal federated learning (for data with the same features but different users), vertical federated learning (for data with shared users but different features), and federated migration learning (for the case of uneven data distribution), which is widely used in finance, healthcare, and IoT. Privacy protection is a key challenge in blockchain systems. Traditional blockchain architectures make users’ private information vulnerable to attacks due to the openness and transparency of data. Federated learning combined with blockchain technology enables decentralized model training without sharing raw data while relying on blockchain’s distributed ledger, immutability, and smart contracts to enhance data security and transparency. Compared with traditional centralized privacy protection mechanisms, federated-learning-based blockchain privacy protection schemes can reduce the risk of data leakage, reduce computation and communication costs, and improve data trustworthiness and thus have become a hot direction in privacy protection research in recent years. The blockchain and federated learning schematic is shown in Figure 9 below. This figure shows the blockchain and AI-based connected car architecture. The lower layer is the On-Board Unit (OBU) interacting with the roadside base station through wireless communication, and the upper layer uses the combination of blockchain and AI federated learning for data processing and privacy protection to ensure data security and uploading efficiency of the Telematics system.
At present, privacy-protection-related research has made extensive progress in which blockchain technology plays an important role in data security and privacy protection. We classify the research on blockchain privacy protection into the following two categories: (1) federated-learning-based blockchain privacy protection, i.e., the use of federated learning to train distributed models and the combination of blockchain technology in order to improve data security and privacy protection; and (2) other blockchain-based privacy protection mechanisms, such as zero-knowledge proofs, ring signatures, homomorphic encryption, differential privacy, and other methods. These methods ensure data privacy through cryptographic techniques while combining the tamperability and decentralized nature of blockchain to provide stronger privacy protection.
(1)
Federated-Learning-Based Blockchain Privacy Protection
Despite its advantages in decentralized model training, federated learning faces several pressing challenges when applied to blockchain privacy protection. These include potential privacy leakage through model updates, heterogeneous data distributions affecting model accuracy, high communication overhead, and vulnerability to poisoning attacks from malicious nodes. To address these issues, recent studies have introduced AI-driven enhancements such as differential privacy mechanisms for noise injection, knowledge distillation techniques to reduce communication costs, and graph neural network-based aggregation to improve robustness. Moreover, blockchain-based logging and verification can be employed to trace model contributions, while smart contracts automate model update validation and access control. These integrated strategies significantly enhance the trustworthiness, scalability, and privacy-preserving capabilities of federated learning in blockchain systems.
(2)
Other Blockchain-Based Privacy Protection Mechanisms
Traditional privacy-preserving mechanisms in blockchain, including zero-knowledge proofs (ZKPs), ring signatures, homomorphic encryption, and differential privacy, are often constrained by high computational complexity, limited scalability, and inadequate adaptability to dynamic blockchain environments. These limitations may lead to increased transaction latency, degraded system performance, and greater vulnerability to side-channel attacks or misuse. To mitigate these drawbacks, artificial intelligence has been increasingly applied to optimize these techniques. For example, deep learning models are used to accelerate ZKP generation and verification processes, reinforcement learning enables dynamic tuning of noise levels in differential privacy, and graph neural networks facilitate efficient ring signature routing. Additionally, intelligent schedulers operating within trusted execution environments (TEEs) can allocate privacy-preserving resources adaptively based on contextual data sensitivity. Collectively, these AI-driven solutions offer a promising direction to enhance the efficiency, flexibility, and resilience of privacy protection in blockchain systems.

3.3.1. Other Blockchain-Based Privacy Protection Mechanisms

Traditional blockchain-based privacy protection mainly uses encryption and zero-knowledge proofs to encrypt user data without incorporating federated learning, and many scholars have carried out related research. Selvarajan et al. proposed [171] an Artificial-Intelligence-based Lightweight Blockchain Security Model (AILBSM) for ensuring privacy and security of IIoT systems. This novel model aims to address security and privacy issues that may arise when dealing with cloud-based IIoT systems that process data in the cloud or at the edge of the network (on devices). Wang et al. [172] proposed a novel solution called Hierarchical Blockchain-Enabled Cloud Edge Choreography Federated Learning (HBCE-FL) to address these challenges. HBCE-FL aims to provide secure, intelligent, and distributed data analysis for IoT users. Miao et al. [173] studied how data sharing is achieved through model sharing, and, based on this, a secure data sharing mechanism called BP2P-FL was proposed, which employs peer-to-peer federated learning and protects the privacy of data providers. Smahi et al. [174] proposed BV-ICV, a blockchain-enabled and privacy-preserving FL framework for ICVs in edge-envisioned V2X environments, to alleviate these concerns. The system uses zero-knowledge succinct non-interactive knowledge argument (zkSNARK) validation compiled into smart contracts to prevent malicious, compromised, or even justified ICVs from uploading unreliable, incorrect, or low-quality model updates. Yang et al. [175] proposed an interpretable federated learning approach with controlled machine learning efficiency and controlled credit model decision-making, leading to controlled credit model complexity and transparently traceable credit decision-making mechanisms. They then proposed an interpretable federated learning training mechanism for credit data to prevent model gradient leakage trained by a single node throughout the model training period. Firdaus et al. [176] introduced the concept of distributed edge intelligence that combines the advantages of FL, differential privacy (DP), and blockchain to address the previously posed problem. Li et al. [177] proposed a blockchain-enabled federated learning (BeFL) for distributed cybersecurity malicious behaviour knowledge base architecture to ensure the security of knowledge transfer.
As shown in Table 23, the research on integrating FL with blockchain technology aims to enhance data privacy and security in decentralized data processing across domains like healthcare, IoT, IoV, finance, and supply chains. Blockchain enables decentralized governance, secure data storage, and model validation, while FL facilitates collaborative model training without raw data sharing, mitigating leakage risks. Techniques such as differential privacy, homomorphic encryption (HE), and trusted execution environments (TEEs) are widely employed to strengthen privacy, complemented by smart contracts and reputation mechanisms to ensure system fairness and trustworthiness. However, current approaches often overlook the threat of malicious nodes injecting poisoned models, compromising collaborative learning integrity, and suffer from communication overheads that hinder performance in bandwidth- or latency-constrained environments. Moreover, the applicability of these methods remains limited to data-sensitive distributed scenarios, with algorithmic research facing challenges in scalability and accuracy. Future advancements should prioritize robust anomaly detection mechanisms to filter malicious updates and leverage reinforcement learning to dynamically optimize model synchronization intervals, thereby improving system resilience, communication efficiency, and broader applicability.

3.3.2. Federated-Learning-Based Privacy Protection for Blockchain

Nowadays, the blockchain privacy protection scheme combined with federated learning can reduce the risk of data leakage and improve the security and trustworthiness of data at the same time, and many scholars at home and abroad pay attention to this aspect of learning. Wan et al. [178] proposed a federated learning privacy protection method that integrates distillation defense technology with a blockchain architecture. This approach leverages distillation defense to reduce the sensitivity of federated learning client devices to perturbations and enhances their ability to resist adversarial sample attacks. Liu et al. [179] designed a decentralized FL privacy protection framework based on blockchain, differential privacy, and generative adversarial networks (GANs). This framework effectively mitigates single points of failure and enhances resistance to inference attacks. Ma et al. [180] proposed a blockchain-based privacy-preserving federated learning (BPFL) framework that integrates FL, pairwise additive masking, and the Chinese Remainder Theorem. This framework enables mobile participants to collaborate on crowdsourced machine learning tasks while preserving privacy. Wang et al. [181] proposed a blockchain-based privacy-preserving federated learning scheme, BPFL, which utilizes blockchain as the underlying distributed framework for FL. By improving Multi-Krum technology and integrating homomorphic encryption, the scheme achieves ciphertext-level model aggregation and filtering, ensuring local model authenticity while preserving privacy. Zhao et al. [182] designed a FL-based smart home system that leverages a reputation mechanism to assist home appliance manufacturers in training machine learning models based on customer data, optimizing smart home services. Zhu et al. [183] proposed UBFL, an innovative privacy-preserving federated learning mechanism that integrates blockchain technology for secure and efficient data sharing. Unlike traditional methods relying on differential privacy, UBFL employs adaptive nonlinear encryption to safeguard the privacy of UAV model updates while ensuring data integrity and accuracy. Mo et al. [184] proposed a consortium blockchain (CB) and FL-based data management framework for medical network communities, enabling secure data sharing between medical institutions and research organizations. Wang et al. [185] proposed a blockchain-based federated learning approach for privacy-preserving sharing of non-IID data in the industrial internet. This approach dynamically updates local models to mitigate the accuracy degradation caused by non-IID data. Zhang et al. [186] proposed a blockchain-based hierarchical federated learning framework designed to enhance the training of non-IID data, improve data privacy protection, and optimize federated learning performance.
Myrzashova et al. [187] introduced an innovative framework leveraging blockchain-based federated learning to identify 15 different lung diseases while ensuring data privacy and security. Rabbani et al. [188] proposed an FL framework integrating multiple machine learning models to prevent fraudulent transactions in blockchain systems while preserving customer privacy, eliminating the need for private customer data exchange between institutions. Meng et al. [189] proposed a blockchain-based machine learning scheme for secure data sharing in distributed energy storage networks, incorporating secure federated learning to formulate data sharing as a machine learning problem. Zhu et al. [190] proposed an innovative framework that integrates Trusted Execution Environment and blockchain technology to address data security and privacy challenges in IoT supply chain management. Jia et al. [191] proposed a multi-task privacy-preserving FL framework using partitioned blockchain, enabling multiple requesters to execute different FL tasks concurrently. Zhang et al. [192] proposed a blockchain-based pseudorandom number generation (BPNG) protocol using verifiable random functions (VRFs) to ensure fairness in federated learning schemes. Dong et al. [193] proposed a benchmark evaluation approach to optimize federated person re-identification performance in blockchain-powered edge-intelligent UAV delivery systems. Dhasaratha et al. [194] integrated blockchain-reinforced federated learning for post-COVID-19 patient data in IoMT applications to enhance data privacy and security. Li et al. [195] modeled multi-source devices using federated learning and stored model parameters and reputation values on the blockchain to enhance training accuracy and ensure data privacy security.
As shown in Table 24 and Table 25, this research area explores blockchain-native privacy-preserving mechanisms that leverage zero-knowledge proofs, access control encryption, and knowledge graphs to enable decentralized data sharing, financial credit modeling, and secure transactions without relying on federated learning. These techniques emphasize decentralization, tamper-proof transparency, and verifiable transactions while addressing data privacy through cryptographic methods. However, practical deployment faces challenges due to high computational and storage overheads, particularly requiring strong computing power nodes. Complementary AI-driven approaches integrating zero-knowledge proofs, homomorphic encryption, and ring signatures aim to enhance privacy in blockchain systems yet suffer from increased computational complexity that limits applicability on resource-constrained devices. The current integration of AI with these privacy mechanisms often remains loosely coupled, missing deeper synergistic optimizations. Future directions focus on developing lightweight AI models specifically optimized for accelerating ZKP/FHE computations and leveraging AI-generated constraints within zero-knowledge proof systems. Such advancements could potentially reconcile computational efficiency with robust privacy guarantees in decentralized blockchain environments, addressing both the technical limitations of existing cryptographic methods and the underexplored potential of tighter AI-privacy mechanism integration.

3.4. AI-Driven Data Storage and Retrieval

In the face of the growing challenge of massive data, traditional blockchain systems have obvious deficiencies in storage efficiency and retrieval performance, especially when processing large-scale, unstructured data, which is costly, and slow to write, and has large query latency, limiting its practical application in the fields of IoT, medical care, and supply chain. To address this problem, the current mainstream solution is to combine blockchain with IPFS (Interplanetary File System) to build a hybrid architecture of “on-chain index + off-chain storage”: blockchain is responsible for recording key business process data (such as production, processing, warehousing, sales, etc.) to ensure data traceability and transparency, while IPFS is dedicated to storing large files (such as quality inspection reports, medical images, etc.) and establishes a mapping link with the blockchain through hash values to ensure data integrity and immutability. The schematic diagram of combining blockchain and IPFS to store traceability data is shown in Figure 10. AI technology further improves the intelligence and efficiency of this system: in terms of storage, AI can predict data popularity and realize intelligent scheduling and dynamic hierarchical management of node resources; in terms of retrieval, with the help of deep learning, NLP, multimodal recognition and other technologies, it supports more efficient semantic retrieval and multi-source information query; at the same time, it also introduces quantum-resistant hashing and privacy protection algorithms to enhance security and sustainability. Overall, the integration of AI with blockchain and IPFS not only solves the performance bottleneck but also promotes the construction of a decentralized, highly reliable and highly collaborative data system, providing strong support for the digital transformation of multiple industries.
With the upgraded iteration of AI technology, the combination of AI and blockchain technology promotes the efficiency of data retrieval and storage on blockchain. Research has been carried out in this area both domestically and internationally. Cai et al. [196] introduced EncELC, a framework designed for ethereum light clients to enhance client-side protection and support rich queries on the ethereum blockchain [197]. This approach aims to improve the security and functionality of light clients accessing blockchain data [198]. Khan et al. [199] proposed TREAD, a system for storing and retrieving vehicle-generated sensitive mobile data on the blockchain. By utilizing the Interplanetary File System (IPFS), TREAD addresses scalability challenges while protecting user privacy when handling large amounts of data. In the context of supply chain management, Yiu et al. [200] developed a decentralized anti-counterfeiting system using blockchain technology to ensure authenticity and traceability of physical goods. The system facilitates the retrieval and validation of trusted data sources, thereby improving the security of supply chain operations. Almaiah et al. [201] proposed a hybrid digital healthcare authentication model integrating artificial intelligence and blockchain technologies. This model addresses the authentication and data privacy challenges in smart healthcare systems, emphasizing on security and privacy in data management [202]. Singh et al. [203] introduced a smart enterprise trust management scheme using blockchain technology. By leveraging enhanced intelligence, the scheme improves trust and security in enterprise operations, demonstrating better performance than existing approaches. Wang et al. [204] introduced a hierarchical trust evaluation strategy for 5G-enabled Intelligent Transport Systems (ITS) using a heterogeneous blockchain approach. This strategy employs joint deep learning techniques to ensure reliable and low-latency communication in ITS applications. Finally, Khan et al. [205] developed a secure searchable cryptographic framework for medical IoT systems using blockchain technology. The framework integrates Binary Spring Search techniques with a hybrid deep neural network approach to enhance the security and reliability of medical data storage and retrieval.
As shown in Table 26, a comparative analysis of AI-driven blockchain-based data retrieval and storage approaches covering areas such as healthcare, smart transportation, and enterprise trust management found that technologies such as federated deep learning, augmented intelligence, and hybrid neural networks are highly integrated, thereby enhancing security, privacy, and efficiency. These systems have leveraged various blockchain platforms, including heterogeneous architectures and IoT-integrated architectures, but still face persistent challenges. Scalability remains a key constraint due to the computational requirements of AI models and blockchain storage overhead, while interoperability issues hinder seamless data exchange. Notably, current solutions mainly deal with structured data, while semantic indexing for unstructured data types such as images, audio, and video is still imperfect. There are also gaps in IPFS integration, lacking intelligent mechanisms for hot spot prediction and dynamic data scheduling, resulting in storage redundancy. To advance the field, future research should focus on multimodal frameworks that combine large language models with CLIP for cross-modal semantic indexing, AI-driven algorithms to optimize hot spot data placement in decentralized storage, and knowledge graph-enhanced, context-aware retrieval systems to improve efficiency and user experience.

4. Discussion and Future Directions

With the continuous development of technology, blockchain is widely used in various fields due to its decentralization, data integrity, traceability, and anonymity. However, blockchain still faces many challenges: (1) consensus algorithms have scalability bottlenecks (e.g., PoW low throughput and high energy consumption) and centralization risks (e.g., PoS node monopoly); (2) smart contracts have frequent security vulnerabilities due to untamperable code (e.g., re-entry attacks) and high development thresholds and upgrading difficulties; (3) privacy protection is limited by the conflict between transparency and privacy (e.g., public chain data exposure), insufficient technical performance (e.g., high ZKP latency), and facing compliance conflicts; (4) data retrieval is limited by high on-chain storage costs, inefficient querying (requiring full-chain scanning), and weak unstructured data processing capabilities. This paper discusses and looks at each of the following four modules.
This paper summarizes the research on the core modules of AI-driven blockchain. Specifically, the machine learning or deep learning used drives the blockchain consensus algorithm, smart contracts, privacy protection, and data upload and retrieval. Table 27 shows the models in AI used by the relevant researchers summarized in this article to improve and apply different modules of blockchain. From the two major categories of machine learning and deep learning, the training types, algorithms/architectures and their application scenarios in blockchain are sorted out. In the field of machine learning: supervised learning uses algorithms such as decision trees and Support Vector Machines for smart contract vulnerability detection and node classification; unsupervised learning uses methods such as K-Means to achieve blockchain data clustering and transaction pattern mining; semi-supervised learning uses self-training and other methods to help privacy medical data sharing and other analysis tasks with limited labeled data; reinforcement learning uses algorithms such as Q-Learning to optimize consensus mechanisms and miner task offloading. In the field of deep learning, Convolutional Neural Networks such as LeNet can detect smart contract vulnerabilities and process image/video data stored on the chain; Recurrent Neural Networks and their variants (LSTM, etc.) are used for contract multi-label vulnerability prediction and transaction time series analysis; Transformer-based models (BERT, etc.) can perform tasks such as smart contract language modeling that combine blockchain and natural language processing; generative adversarial networks (DCGAN, etc.) play a role in privacy protection, data generation, etc.

4.1. General Discussion and Future Prospects

Although the related studies summarized in this article have achieved good results in different application fields, there are still some challenges. This article discusses and studies the following four modules, respectively.
(1)
Consensus algorithms
Existing research focuses on AI optimization of traditional consensus mechanisms (e.g., PoW and PoS) to classify nodes, detect malicious behaviours through machine learning (e.g., XG-PBFT and LSTM secure consensus), and enable low-latency authentication in IoT and edge computing (e.g., PoAh 2.0). However, existing schemes are not versatile enough and partially rely on high computing power. Future directions include dynamic adaptive consensus (RL adjusts parameters in real time), cross-chain AI co-optimization, green energy-saving consensus (AI-optimized PoS/PoW hybrid mechanism), and AI-enhanced cryptography design for quantum attack resistance.
(2)
Smart Contracts
Existing research mainly uses AI for vulnerability detection (static/dynamic analysis, deep learning models such as CBGRU), automated generation (NLP-assisted development), and scenario-based applications (e.g., supply chain traceability). However, complex logic vulnerability detection is still insufficient, and code interpretability is limited. Future directions cover full lifecycle AI (LLM generation of secure contracts and federated learning to protect training data), formal validation enhancement (AI generation of mathematical proofs), and AI-coordinated execution of cross-chain smart contracts to ensure atomicity and consistency.
(3)
Privacy protection
Existing research combines FL with blockchain (e.g., the BPFL framework), zero-knowledge proofs, and TEEs to achieve data privacy, but suffers from loss of precision (DP noise) and hardware dependency. Future directions include lightweight privacy computing (edge FL + hybrid cryptography), verifiable privacy (AI-optimized zero-knowledge proof generation), and data sovereignty management (NFTed ownership + dynamic access control) to balance privacy and utility.
In addition, in the context of data privacy, compliance with the General Data Protection Regulation (GDPR) is a critical requirement, particularly for systems involving the processing of personal data in the European Union. GDPR enforces principles such as data minimization, user consent, the right to access and erase data (“right to be forgotten”), and accountability in automated decision-making. While blockchain provides strong data integrity and transparency, its immutable nature presents challenges in achieving GDPR compliance, especially with respect to data erasure and modification. However, the integration of AI with privacy-preserving techniques such as differential privacy, federated learning, and zero-knowledge proofs can mitigate these risks. Furthermore, hybrid blockchain architectures—where sensitive data are stored off-chain while hashes are stored on-chain—can help reconcile the tension between immutability and data protection rights. Thus, the design of AI-powered blockchain systems must carefully balance innovation with regulatory compliance to ensure lawful and ethical data usage.
(4)
Data Retrieval
Existing research relies on blockchain + IPFS storage (e.g., TREAD system) with AI-optimized indexing (Merkle tree improvement) and semantic search (NLP parsed query), but unstructured data retrieval is inefficient. Future directions involve multimodal retrieval (CNN processing of image/video data and LLM natural language interaction), distributed storage optimization (AI prediction of data heat to adjust IPFS nodes), and quantum-safe retrieval (AI-assisted anti-quantum hash algorithms) to improve large-scale data query performance.

4.2. Discussion of Open Issues and Future Prospects

Despite the progress achieved, AI-driven blockchain systems face several unresolved challenges, including the lack of AI transparency and explainability, deployment difficulties due to resource constraints, and new security vulnerabilities such as adversarial attacks and data poisoning. Furthermore, standardization and interoperability across platforms remain insufficient, while privacy protection must carefully balance compliance with data regulations like GDPR. Ethical and governance issues, such as accountability for AI decisions in decentralized environments, also remain open. Addressing these challenges is crucial to ensuring that AI-empowered blockchain systems are robust, trustworthy, and widely adoptable.
Looking ahead, promising future research directions include developing trustworthy and explainable AI models tailored for blockchain applications, integrating federated learning with verifiable privacy techniques, and leveraging large language models for smart contract generation and auditing. Advances in generative AI can enhance blockchain security through synthetic adversarial testing, while AI-optimized post-quantum cryptography and green, energy-efficient consensus mechanisms will be vital for long-term sustainability. Additionally, cross-modal AI systems capable of processing multimodal data streams can open new possibilities for autonomous, intelligent decentralized applications across diverse industries.

5. Conclusions

Blockchain still faces numerous challenges in terms of scalability, security, and privacy protection. AI, with its powerful data processing capabilities, pattern recognition, and adaptive optimization algorithms, has the potential to enhance blockchain transaction processing efficiency, strengthen security mechanisms, and optimize privacy protection strategies. Consequently, AI can effectively mitigate the limitations of blockchain in scalability and security. However, existing reviews on AI and blockchain integration primarily focus on macro-level discussions, lacking in-depth analysis and classification. Therefore, this paper focuses on the application of AI in blockchain, providing a comprehensive review of its optimization potential in scalability, security, and privacy protection.
This study examines the current state and key challenges of four core modules: consensus algorithms, smart contracts, privacy protection, and data retrieval. Furthermore, it categorizes and discusses the progress of AI-driven blockchain research in scalability, security, and privacy protection. Findings indicate that AI can enhance consensus efficiency by dynamically optimizing the selection of optimal nodes for participation. Additionally, AI can be leveraged for resource allocation prediction, malicious behavior detection, and vulnerability identification, thereby improving blockchain security. Moreover, the integration of AI-driven federated learning with blockchain facilitates decentralized data collaboration, while AI-optimized Merkle tree indexing and distributed query techniques significantly enhance data retrieval efficiency. Finally, this paper explores future research directions for AI-driven blockchain advancements. Energy consumption and security remain core issues in this field. Future studies should focus on optimizing consensus algorithms, enhancing smart contract security, improving privacy protection mechanisms, and increasing data retrieval efficiency. Additionally, further exploration is needed in decentralized AI training, privacy-preserving computation, and computing power sharing to enhance blockchain’s scalability, security, and energy efficiency.

Author Contributions

F.Y.: Writing—Original Draft, Conceptualization, and Writing—Review and Editing; Z.Z.: Conceptualization and Methodology; Y.J.: Methodology and Data Curation; W.S.: Investigation and Formal Analysis; Z.T.: Formal Analysis and Visualization; C.Y.: Resources and Visualization; J.Y.: Formal Analysis and Data Curation; Z.M.: Writing—Review and Editing; X.H.: Funding Acquisition and Methodology; S.G.: Investigation and Data Curation; Y.P.: Supervision, Project Administration, and Funding Acquisition. All authors have read and agreed to the published version of the manuscript.

Funding

This paper was supported by the Innovative Research Group of Chongqing Municipal Education Commission (CXQT19026) and the Cooperative Project between Chinese Academy of Sciences and University in Chongqing (HZ2021011). Moreover, this work was supported by the Research Startup Fund of Chongqing University of Technology (0119240197).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The authors declare that the article is a review article and does not relate to the dataset.

Acknowledgments

This work was supported by equipment funded through the “Intelligent Connected New Energy Vehicle Teaching System” project of Chongqing University of Technology, under the national initiative “Promote large-scale equipment renewals and trade-ins of consumer goods”.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Yi, J.; Wang, J.; Tan, L.; Yuan, T. HMM-Based Blockchain Visual Automatic Deployment System. Appl. Sci. 2024, 14, 5722. [Google Scholar] [CrossRef]
  2. Bouoiyour, J.; Selmi, R. Bitcoin: A beginning of a new phase. Econ. Bull. 2016, 36, 1430–1440. [Google Scholar]
  3. Nakamoto, S. Bitcoin Technology: A Peer-to-Peer Digital Cash Transaction. Int. J. 2016, 6. [Google Scholar]
  4. Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015. [Google Scholar]
  5. Ciaian, P.; Rajcaniova, M.; Kancs, D. The economics of BitCoin price formation. Appl. Econ. 2016, 48, 1799–1815. [Google Scholar] [CrossRef]
  6. Al-Breiki, H.; Rehman, M.H.U.; Salah, K.; Svetinovic, D. Trustworthy blockchain oracles: Review, comparison, and open research challenges. IEEE Access 2020, 8, 85675–85685. [Google Scholar] [CrossRef]
  7. Kotey, S.D.; Tchao, E.T.; Ahmed, A.R.; Agbemenu, A.S.; Nunoo-Mensah, H.; Sikora, A.; Welte, D.; Keelson, E. Blockchain interoperability: The state of heterogenous blockchain-to-blockchain communication. IET Commun. 2023, 17, 891–914. [Google Scholar] [CrossRef]
  8. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
  9. Anagnostakis, A.G.; Giannakeas, N.; Tsipouras, M.G.; Glavas, E.; Tzallas, A.T. IoT Micro-Blockchain Fundamentals. Sensors 2021, 21, 2784. [Google Scholar] [CrossRef]
  10. Hristova, T. Tracking mining company electric vehicles for sustainable development optimization using Distributed Ledger Technologies. J. Sustain. Min. 2024, 23, 299–314. [Google Scholar] [CrossRef]
  11. Hristova, T.; Mitev, I.; Balev, V. Monitoring of Geotechnical Facilities Through DLT Solution; IOP Conference Series: Earth and Environmental Science; IOP Publishing: Bristol, UK, 2022; Volume 970, p. 012011. [Google Scholar]
  12. Li, X.; Zheng, Z.; Dai, H.N. When services computing meets blockchain: Challenges and opportunities. J. Parallel Distrib. Comput. 2021, 150, 1–14. [Google Scholar] [CrossRef]
  13. Treleaven, P.; Brown, R.G.; Yang, D. Blockchain technology in finance. Computer 2017, 55, 14–17. [Google Scholar] [CrossRef]
  14. Johar, S.; Ahmad, N.; Asher, W.; Cruickshank, H.; Durrani, A. Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey. Appl. Sci. 2021, 11, 6252. [Google Scholar] [CrossRef]
  15. Wang, X.; Ni, W.; Zha, X.; Yu, G.; Liu, R.P.; Georgalas, N.; Reeves, A. Capacity analysis of public blockchain. Comput. Commun. 2021, 177, 112–124. [Google Scholar] [CrossRef]
  16. Iqbal, M.; Matulevicius, R. Exploring Sybil and Double-Spending Risks in Blockchain Systems. IEEE Access 2021, 9, 76153–76177. [Google Scholar] [CrossRef]
  17. He, Y.; Wang, Y.; Qiu, C.; Lin, Q.; Li, J.; Ming, Z. Blockchain-based edge computing resource allocation in IoT: A deep reinforcement learning approach. IEEE Internet Things J. 2020, 8, 2226–2237. [Google Scholar] [CrossRef]
  18. Islam, A.; Rahim, T.; Masuduzzaman, M.; Shin, S.Y. A blockchain-based artificial intelligence-empowered contagious pandemic situation supervision scheme using internet of drone things. IEEE Wirel. Commun. 2021, 28, 166–173. [Google Scholar] [CrossRef]
  19. D’souza, S.; Nazareth, D.; Vaz, C.; Shetty, M. Blockchain and AI in pharmaceutical supply chain. In Proceedings of the International Conference on Smart Data Intelligence (ICSMDI 2021), Tamil Nadu, India, 29–30 April 2021. [Google Scholar]
  20. Suhail, S.; Hussain, R.; Jurdak, R.; Oracevic, A.; Salah, K.; Hong, C.S.; Matulevičius, R. Blockchain-based digital twins: Research trends, issues, and future challenges. ACM Comput. Surv. (CSUR) 2022, 54, 1–34. [Google Scholar] [CrossRef]
  21. Guergov, S.; Radwan, N. Blockchain convergence: Analysis of issues affecting IoT, AI and blockchain. Int. J. Comput. Inf. Manuf. (IJCIM) 2021, 1, 1–17. [Google Scholar] [CrossRef]
  22. Yang, Q.; Zhao, Y.; Huang, H.; Xiong, Z.; Kang, J.; Zheng, Z. Fusing blockchain and AI with metaverse: A survey. IEEE Open J. Comput. Soc. 2022, 3, 122–136. [Google Scholar] [CrossRef]
  23. Kumar, S.; Lim, W.M.; Sivarajah, U.; Kaur, J. Artificial intelligence and blockchain integration in business: Trends from a bibliometric-content analysis. Inf. Syst. Front. 2023, 25, 871–896. [Google Scholar] [CrossRef]
  24. Junaid, S.B.; Imam, A.A.; Balogun, A.O.; De Silva, L.C.; Surakat, Y.A.; Kumar, G.; Abdulkarim, M.; Shuaibu, A.N.; Garba, A.; Sahalu, Y.; et al. Recent advancements in emerging technologies for healthcare management systems: A survey. Healthcare 2022, 10, 1940. [Google Scholar] [CrossRef] [PubMed]
  25. Xu, H.; Wu, J.; Pan, Q.; Guan, X.; Guizani, M. A survey on digital twin for industrial internet of things: Applications, technologies and tools. IEEE Commun. Surv. Tutor. 2023, 25, 2569–2598. [Google Scholar] [CrossRef]
  26. Verma, D.; Okhawilai, M.; Dalapati, G.K.; Ramakrishna, S.; Sharma, A.; Sonar, P.; Krishnamurthy, S.; Biring, S.; Sharma, M. Blockchain technology and AI-facilitated polymers recycling: Utilization, realities, and sustainability. Polym. Compos. 2022, 43, 8587–8601. [Google Scholar] [CrossRef]
  27. Badidi, E. Edge AI and Blockchain for Smart Sustainable Cities: Promise and Potential. Sustainability 2022, 14, 7609. [Google Scholar] [CrossRef]
  28. Haddad, A.; Habaebi, M.H.; Islam, M.R.; Hasbullah, N.F.; Zabidi, S.A. Systematic Review on AI-Blockchain Based E-Healthcare Records Management Systems. IEEE Access 2022, 10, 94583–94615. [Google Scholar] [CrossRef]
  29. Kumar, R.; Singh, D.; Srinivasan, K.; Hu, Y.C. AI-Powered Blockchain Technology for Public Health: A Contemporary Review, Open Challenges, and Future Research Directions. Healthcare 2023, 11, 81. [Google Scholar] [CrossRef]
  30. Uddin, M.; Obaidat, M.; Manickam, S.; Laghari, S.U.A.; Dandoush, A.; Ullah, H.; Ullah, S.S. Exploring the convergence of Metaverse, Blockchain, and AI: A comprehensive survey of enabling technologies, applications, challenges, and future directions. Wiley Interdiscip. Rev.-Data Min. Knowl. Discov. 2024, 14, e1556. [Google Scholar] [CrossRef]
  31. Omidian, H. Synergizing blockchain and artificial intelligence to enhance healthcare. Drug Discov. Today 2024, 29, 104111. [Google Scholar] [CrossRef]
  32. Zhou, Q.; Zhang, H.; Wang, S. Artificial intelligence, big data, and blockchain in food safety. Int. J. Food Eng. 2022, 18, 1–14. [Google Scholar] [CrossRef]
  33. Yao, Y.; Shi, Y.; Tian, G.; Miao, M.; Susilo, W. PSCBO: A provably secure consensus-based blockchain Oracle. Comput. Stand. Interfaces 2025, 91, 103892. [Google Scholar] [CrossRef]
  34. Maldonado-Ruiz, D.; Pulval-Dady, A.; Shi, Y.; Wang, Z.; El Madhoun, N.; Torres, J. NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype. Ann. Telecommun. 2024, 79, 881–899. [Google Scholar] [CrossRef]
  35. Pasdar, A.; Lee, Y.C.; Dong, Z. Connect API with Blockchain: A Survey on Blockchain Oracle Implementation. ACM Comput. Surv. 2023, 55, 1–39. [Google Scholar] [CrossRef]
  36. Wang, X.; Jiang, X.; Liu, Y.; Wang, J.; Sun, Y. Data Propagation for Low Latency Blockchain Systems. IEEE J. Sel. Areas Commun. 2022, 40, 3631–3644. [Google Scholar] [CrossRef]
  37. Aki. Digital signatures: A tutorial survey. Computer 1983, 16, 15–24. [Google Scholar]
  38. Aruna, S.; Maheswari, M.; Saranya, A. Highly Secured Blockchain Based Electronic Voting System Using sha3 and Merkle Root; IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2020; Volume 993, p. 012103. [Google Scholar]
  39. Mahmud, M.; Sohan, M.S.H.; Reno, S.; Sikder, M.A.B.; Hossain, F.S. Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology. J. Supercomput. 2024, 80, 8383–8405. [Google Scholar] [CrossRef]
  40. Iyengar, G.; Saleh, F.; Sethuraman, J.; Wang, W. Economics of Permissioned Blockchain Adoption. Manag. Sci. 2023, 69, 3415–3436. [Google Scholar] [CrossRef]
  41. Liu, Y.; Jia, L.; Wang, X.; Huang, H.; Zhao, Q.; Li, Z.; Sun, Y. CORAL: A blockchain protocol for handling transactions with deadline constraints. Comput. Netw. 2024, 251, 110620. [Google Scholar] [CrossRef]
  42. Heo, J.W.; Ramachandran, G.S.; Dorri, A.; Jurdak, R. Blockchain Data Storage Optimisations: A Comprehensive Survey. ACM Comput. Surv. 2024, 56, 1–27. [Google Scholar] [CrossRef]
  43. Hong, L.; Hales, D.N. Blockchain performance in supply chain management: Application in blockchain integration companies. Ind. Manag. Data Syst. 2021, 121, 1969–1996. [Google Scholar] [CrossRef]
  44. Duan, C.; Jiang, R.; Zhang, Y.; Wu, B.; Li, F.; Duan, Y. Distributed medical data storage model based on blockchain technology. Clust. Comput. 2024, 27, 4757–4777. [Google Scholar] [CrossRef]
  45. Song, J.; Zhang, P.; Qu, Q.; Bai, Y.; Gu, Y.; Yu, G. Why blockchain needs graph: A survey on studies, scenarios, and solutions. J. Parallel Distrib. Comput. 2023, 180, 104730. [Google Scholar] [CrossRef]
  46. Liang, W.; Zhang, D.; Lei, X.; Tang, M.; Li, K.C.; Zomaya, A.Y. Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1410–1420. [Google Scholar] [CrossRef]
  47. Duan, J.; Gu, L.; Wang, W.; Wang, L. Chainknot: Redactable Blockchain Protocol with Forced Synchronization. IEEE Trans. Netw. Sci. Eng. 2024, 11, 3091–3104. [Google Scholar] [CrossRef]
  48. Rajendra, Y.; Sahu, S.; Subramanian, V.; Shukla, S.K. Storage efficient blockchain models for constrained applications. Clust. Comput. 2023, 26, 2163–2181. [Google Scholar] [CrossRef]
  49. Connors, C.; Sarkar, D. Survey of prominent blockchain development platforms. J. Netw. Comput. Appl. 2023, 216, 103650. [Google Scholar] [CrossRef]
  50. Choi, T.M.; Siqin, T. Blockchain in logistics and production from Blockchain 1.0 to Blockchain 5.0: An intra-inter-organizational framework. Transp. Res. Part E-Logist. Transp. Rev. 2022, 160, 102653. [Google Scholar] [CrossRef]
  51. Rakshit, S.; Jeyaraj, A.; Paul, T. SME Performance Through Blockchain Technologies. J. Comput. Inf. Syst. 2024, 64, 204–218. [Google Scholar] [CrossRef]
  52. Wang, Y.; Wang, W.; Zeng, Y.; Yang, T. GradingShard: A new sharding protocol to improve blockchain throughput. Peer-to-Peer Netw. Appl. 2023, 16, 1327–1339. [Google Scholar] [CrossRef]
  53. Xu, S.; Ning, J.; Ma, J.; Huang, X.; Deng, R.H. K-Time Modifiable and Epoch-Based Redactable Blockchain. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4507–4520. [Google Scholar] [CrossRef]
  54. Qi, N.; Yuan, Y.; Wang, F.Y. DAG-BLOCK: A Novel Architecture for Scaling Blockchain-Enabled Cryptocurrencies. IEEE Trans. Comput. Soc. Syst. 2024, 11, 378–388. [Google Scholar] [CrossRef]
  55. Noam, O.; Rottenstreich, O. Realizing privacy aspects in blockchain networks. Ann. Telecommun. 2022, 77, 3–12. [Google Scholar] [CrossRef]
  56. Wang, Y.X.; Hsueh, Y.L. A low-storage synchronization framework for blockchain systems. J. Netw. Comput. Appl. 2024, 231, 103977. [Google Scholar] [CrossRef]
  57. Wan, J.; Hu, K.; Li, J.; Su, H. AnonymousFox: An Efficient and Scalable Blockchain Consensus Algorithm. IEEE Internet Things J. 2022, 9, 24236–24252. [Google Scholar] [CrossRef]
  58. Stoyanov, I.; Iliev, T.; Mihaylov, G.; Evstatiev, B.; Sokolov, S. Analysis of the cybersecurity threats in smart grid University of telecommunications and post, Sofia, Bulgaria. In Proceedings of the 2018 IEEE 24th International Symposium for Design and Technology in Electronic Packaging(SIITME), Iasi, Romania, 25–28 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 90–93. [Google Scholar]
  59. Bikov, T.D.; Iliev, T.B.; Mihaylov, G.Y.; Stoyanov, I.S. Phishing in depth—Modern methods of detection and risk mitigation. In Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 447–450. [Google Scholar]
  60. Valchanov, H.; Edikyan, J.; Aleksieva, V. A Study of Wi-Fi Security in City Environment; IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2019; Volume 618, p. 012031. [Google Scholar]
  61. Alam, S.; Shuaib, M.; Khan, W.Z.; Garg, S.; Kaddoum, G.; Hossain, M.S.; Bin Zikria, Y. Blockchain-based Initiatives: Current state and challenges. Comput. Netw. 2021, 198, 108395. [Google Scholar] [CrossRef]
  62. Xu, L.; Tian, T. Blockchain-enabled enterprise bleaching green regulation banking evolution game analysis. Environ. Dev. Sustain. 2024, 26, 27457–27483. [Google Scholar] [CrossRef]
  63. Khossravi, A.S.; Chen, Q.; Adelman, R.A. Artificial intelligence in ophthalmology. Curr. Opin. Ophthalmol. 2025, 36, 35–38. [Google Scholar] [CrossRef]
  64. Galiana, I.; Gudino, L.C.; Gonzalez, P.M. Ethics and artificial intelligence. Rev. Clin. Esp. 2024, 224, 178–186. [Google Scholar] [CrossRef]
  65. Tsang, Y.P.; Lee, C.K.M. Artificial intelligence in industrial design: A semi-automated literature survey. Eng. Appl. Artif. Intell. 2022, 112, 104884. [Google Scholar] [CrossRef]
  66. Diaz, B.; Nussbaum, M. Artificial intelligence for teaching and learning in schools: The need for pedagogical intelligence. Comput. Educ. 2024, 217, 105071. [Google Scholar] [CrossRef]
  67. Khanam, S.; Tanweer, S.; Khalid, S. Artificial Intelligence Surpassing Human Intelligence: Factual or Hoax. Comput. J. 2021, 64, 1832–1839. [Google Scholar] [CrossRef]
  68. Guo, Y.; Zhang, W.; Qin, Q.; Chen, K.; Wei, Y. Intelligent manufacturing management system based on data mining in artificial intelligence energy-saving resources. Soft Comput. 2023, 27, 4061–4076. [Google Scholar] [CrossRef]
  69. Carabin, G.; Wehrle, E.; Vidoni, R. A review on energy-saving optimization methods for robotic and automatic systems. Robotics 2017, 6, 39. [Google Scholar] [CrossRef]
  70. Paryanto; Brossog, M.; Bornschlegl, M.; Franke, J. Reducing the energy consumption of industrial robots in manufacturing systems. Int. J. Adv. Manuf. Technol. 2015, 78, 1315–1328. [Google Scholar] [CrossRef]
  71. Achiam, J.; Adler, S.; Agarwal, S.; Ahmad, L.; Akkaya, I.; Aleman, F.L.; Almeida, D.; Altenschmidt, J.; Altman, S.; Anadkat, S.; et al. Gpt-4 technical report. arXiv 2023, arXiv:2303.08774. [Google Scholar]
  72. Liu, A.; Feng, B.; Xue, B.; Wang, B.; Wu, B.; Lu, C.; Zhao, C.; Deng, C.; Zhang, C.; Ruan, C.; et al. Deepseek-v3 technical report. arXiv 2024, arXiv:2412.19437. [Google Scholar]
  73. Gligorea, I.; Cioca, M.; Oancea, R.; Gorski, A.T.; Gorski, H.; Tudorache, P. Adaptive learning using artificial intelligence in e-learning: A literature review. Educ. Sci. 2023, 13, 1216. [Google Scholar] [CrossRef]
  74. Turdakov, D.Y.; Avetisyan, A.I.; Arkhipenko, K.V.; Antsiferova, A.V.; Vatolin, D.S.; Volkov, S.S.; Gasnikov, A.V.; Devyatkin, D.A.; Drobyshevsky, M.D.; Kovalenko, A.P.; et al. Trusted Artificial Intelligence: Challenges and Promising Solutions. Dokl. Math. 2022, 106, S9–S13. [Google Scholar] [CrossRef]
  75. Thai, Q.M.; Nguyen, T.H.; Lenon, G.B.; Phung, H.T.T.; Horng, J.T.; Tran, P.T.; Ngo, S.T. Estimating AChE inhibitors from MCE database by machine learning and atomistic calculations. J. Mol. Graph. Model. 2025, 134, 108906. [Google Scholar] [CrossRef]
  76. Deb, D.; Arunachalam, V.; Raju, K.S. Daily reservoir inflow prediction using stacking ensemble of machine learning algorithms. J. Hydroinform. 2024, 26, 972–997. [Google Scholar] [CrossRef]
  77. Ouyang, J.; Wu, M.; Li, X.; Deng, H.; Jin, Z.; Wu, D. NeuroBCI: Multi-Brain to Multi-Robot Interaction Through EEG-Adaptive Neural Networks and Semantic Communications. IEEE Trans. Mob. Comput. 2024, 23, 14622–14637. [Google Scholar] [CrossRef]
  78. Ning, D.S.; Zhou, Z.Q.; Zhou, S.H.; Chen, J.M. Identification of macrophage differentiation related genes and subtypes linking atherosclerosis plaque processing and metabolic syndrome via integrated bulk and single-cell sequence analysis. Heliyon 2024, 10, 34295. [Google Scholar] [CrossRef] [PubMed]
  79. Zhou, Y.; Narsilio, G.; Makasis, N.; Soga, K.; Chen, P.; Aye, L. Artificial neural networks for predicting the performance of heat pumps with horizontal ground heat exchangers. Front. Energy Res. 2024, 12, 1423695. [Google Scholar] [CrossRef]
  80. Zhang, S.; Chen, X.; Ran, X.; Li, Z.; Cao, W. Prioritizing Causation in Decision Trees: A Framework for Interpretable Modeling. Eng. Appl. Artif. Intell. 2024, 133, 108224. [Google Scholar] [CrossRef]
  81. Cohen-Shapira, N.; Rokach, L. PnT: Born-again tree-based model via fused decision path encoding. Inf. Fusion 2024, 112, 102545. [Google Scholar] [CrossRef]
  82. Que, Z.; Lin, C.J. One-Class SVM Probabilistic Outputs. IEEE Trans. Neural Netw. Learn. Syst. 2024, 36, 6244–6256. [Google Scholar] [CrossRef]
  83. Han, C.; Zou, G.; Yeh, H.G.; Gong, F.; Shi, S.; Chen, H. Intelligent fault prediction with wavelet-SVM fusion in coal mine. Comput. Geosci. 2025, 194, 105744. [Google Scholar] [CrossRef]
  84. Noroozi, F.; Ghanbarian, G.; Safaeian, R.; Pourghasemi, H.R. Forest fire mapping: A comparison between GIS-based random forest and Bayesian models. Nat. Hazards 2024, 120, 6569–6592. [Google Scholar] [CrossRef]
  85. Xu, Y.; Li, J.; Wu, A. An XGboost Algorithm Based Model for Financial Risk Prediction. Teh. Vjesn.-Tech. Gaz. 2024, 31, 1898–1907. [Google Scholar] [CrossRef]
  86. Shua, Q.; Peng, H.; Li, J. Landslide susceptibility prediction modelling based on semi-supervised XGBoost model. Geol. J. 2024, 59, 2655–2667. [Google Scholar] [CrossRef]
  87. Zhang, C.; Chen, J.; Li, J.; Peng, Y.; Mao, Z. Large language models for human–robot interaction: A review. Biomim. Intell. Robot. 2023, 3, 100131. [Google Scholar] [CrossRef]
  88. Gao, Y.; Jiang, Y.; Peng, Y.; Yuan, F.; Zhang, X.; Wang, J. Medical Image Segmentation: A Comprehensive Review of Deep Learning-Based Methods. Tomography 2025, 11, 52. [Google Scholar] [CrossRef]
  89. Bai, X.; Peng, Y.; Li, D.; Liu, Z.; Mao, Z. Novel soft robotic finger model driven by electrohydrodynamic (EHD) pump. J. Zhejiang Univ.-Sci. A 2024, 25, 596–604. [Google Scholar] [CrossRef]
  90. Mao, Z.; Bai, X.; Peng, Y.; Shen, Y. Design, modeling, and characteristics of ring-shaped robot actuated by functional fluid. J. Intell. Mater. Syst. Struct. 2024, 35, 1459–1470. [Google Scholar] [CrossRef]
  91. Peng, Y.; Wang, Y.; Hu, F.; He, M.; Mao, Z.; Huang, X.; Ding, J. Predictive modeling of flexible EHD pumps using Kolmogorov–Arnold Networks. Biomim. Intell. Robot. 2024, 4, 100184. [Google Scholar] [CrossRef]
  92. Mao, Z.; Peng, Y.; Hu, C.; Ding, R.; Yamada, Y.; Maeda, S. Soft computing-based predictive modeling of flexible electrohydrodynamic pumps. Biomim. Intell. Robot. 2023, 3, 100114. [Google Scholar] [CrossRef]
  93. Peng, Y.; Sakai, Y.; Funabora, Y.; Yokoe, K.; Aoyama, T.; Doki, S. Funabot-Sleeve: A Wearable Device Employing McKibben Artificial Muscles for Haptic Sensation in the Forearm. IEEE Robot. Autom. Lett. 2025, 1–8. [Google Scholar] [CrossRef]
  94. Mao, Z.; Kobayashi, R.; Nabae, H.; Suzumori, K. Multimodal strain sensing system for shape recognition of tensegrity structures by combining traditional regression and deep learning approaches. IEEE Robot. Autom. Lett. 2024, 9, 10050–10056. [Google Scholar] [CrossRef]
  95. Mao, Z.; Hosoya, N.; Maeda, S. Flexible electrohydrodynamic fluid-driven valveless water pump via immiscible interface. Cyborg Bionic Syst. 2024, 5, 0091. [Google Scholar] [CrossRef]
  96. Lau, S.L.; Lim, J.; Chong, E.K.; Wang, X. Single-pixel image reconstruction based on block compressive sensing and convolutional neural network. Int. J. Hydromechatron. 2023, 6, 258–273. [Google Scholar] [CrossRef]
  97. Verma, H.; Siruvuri, S.V.; Budarapu, P. A machine learning-based image classification of silicon solar cells. Int. J. Hydromechatron. 2024, 7, 49–66. [Google Scholar] [CrossRef]
  98. Alawi, O.A.; Kamar, H.M.; Shawkat, M.M.; Al-Ani, M.M.; Mohammed, H.A.; Homod, R.Z.; Wahid, M.A. Artificial intelligence-based viscosity prediction of polyalphaolefin-boron nitride nanofluids. Int. J. Hydromechatron. 2024, 7, 89–112. [Google Scholar] [CrossRef]
  99. Tian, Z.; Zhao, D.; Lin, Z.; Flynn, D.; Zhao, W.; Tian, D. Balanced reward-inspired reinforcement learning for autonomous vehicle racing. In Proceedings of the 6th Annual Learning for Dynamics & Control Conference, PMLR, Oxford, UK, 15–17 July 2024; pp. 628–640. [Google Scholar]
  100. Tian, Z.; Zhao, D.; Lin, Z.; Zhao, W.; Flynn, D.; Jiang, Y.; Tian, D.; Zhang, Y.; Sun, Y. Efficient and balanced exploration-driven decision making for autonomous racing using local information. IEEE Trans. Intell. Veh. 2024, 1–17. [Google Scholar] [CrossRef]
  101. Lin, Z.; Tian, Z.; Zhang, Q.; Ye, Z.; Zhuang, H.; Lan, J. A conflicts-free, speed-lossless KAN-based reinforcement learning decision system for interactive driving in roundabouts. arXiv 2024, arXiv:2408.08242. [Google Scholar]
  102. Tian, Z.; Lin, Z.; Zhao, D.; Zhao, W.; Flynn, D.; Ansari, S.; Wei, C. Evaluating Scenario-based Decision-making for Interactive Autonomous Driving Using Rational Criteria: A Survey. arXiv 2025, arXiv:2501.01886. [Google Scholar]
  103. Lin, Z.; Tian, Z.; Zhang, Q.; Zhuang, H.; Lan, J. Enhanced visual slam for collision-free driving with lightweight autonomous cars. Sensors 2024, 24, 6258. [Google Scholar] [CrossRef] [PubMed]
  104. Lin, Z.; Zhang, Q.; Tian, Z.; Yu, P.; Lan, J. DPL-SLAM: Enhancing dynamic point-line SLAM through dense semantic methods. IEEE Sens. J. 2024, 24, 14596–14607. [Google Scholar] [CrossRef]
  105. Radanliev, P. Cyber diplomacy: Defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. J. Cyber Secur. Technol. 2025, 9, 28–78. [Google Scholar] [CrossRef]
  106. Yun, D.; Wu, X.; Chen, X.; Yang, Y.; Shang, Y.; Liu, S.; Gunasekeran, D.V.; Lin, D.; Liu, L.; Zhao, L.; et al. An Artificial Intelligence and Blockchain technology-based data management framework for multicenter randomized controlled trials. Sci. Bull. 2025, 70, 856–860. [Google Scholar] [CrossRef]
  107. Kwangmuang, P.; Somabut, A.; Duangngern, P.; Changpetch, S.; Dhithjaroen, C.; Techapornpong, O.; Sarakan, P.; Chaijaroen, S.; Samat, C. Designing an AI-enhanced blockchain and FinTech curriculum for youth: A case study of educational and industrial collaboration. Educ. Inf. Technol. 2025, 1–37. [Google Scholar] [CrossRef]
  108. Zheng, J.; Zhang, Y. TRBFT: An Efficient Blockchain Consensus for Edge Computing-Enabled IoT Systems. IEEE Internet Things J. 2025. [Google Scholar] [CrossRef]
  109. Zhao, C.; Zhou, Y.; Zhang, S.; Sheng, Q.Z.; Zhang, Y.; Wen, S. ExClique: An Express Consensus Algorithm for High-Speed Transaction Process in Blockchains. arXiv 2025, arXiv:2501.15289. [Google Scholar]
  110. Sahraoui, S.; Bachir, A. Lightweight Consensus Mechanisms in the Internet of Blockchained Things: Thorough Analysis and Research Directions. Digit. Commun. Netw. 2025, in press. [Google Scholar] [CrossRef]
  111. Xing, Z.; Zhang, Z.; Zhang, Z.; Li, Z.; Li, M.; Liu, J.; Zhang, Z.; Zhao, Y.; Sun, Q.; Zhu, L.; et al. Zero-Knowledge Proof-Based Verifiable Decentralized Machine Learning in Communication Network: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2025, 1. [Google Scholar] [CrossRef]
  112. Verma, S.; Chandra, G.; Yadav, D. LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security. Peer-to-Peer Netw. Appl. 2025, 18, 1–19. [Google Scholar] [CrossRef]
  113. St-Laurent, G.P.; Le Billon, P. Staking claims and shaking hands: Impact and benefit agreements as a technology of government in the mining sector. Extr. Ind. Soc. 2015, 2, 590–602. [Google Scholar] [CrossRef]
  114. Naeem, M.; Khan, A.; Rehman, A.; Farooq, S.; Mehboob, A.; Abdali, A.S.; Ahmad, B. Does Artificial Intelligence with Blockchain Reduce the Costs of the Financial Sector? In Generative AI for Web Engineering Models; IGI Global: Hershey, PA, USA, 2025; pp. 147–160. [Google Scholar]
  115. Villegas-Ch, W.; Govea, J.; Gurierrez, R.; Mera-Navarrete, A. Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and Blockchain Models: A Scalable and Efficient Approach for Threat Detection. IEEE Access 2025, 13, 16933–16958. [Google Scholar] [CrossRef]
  116. Dutta, J.; Puthal, D. PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow. Future Gener. Comput. Syst.-Int. J. Escience 2024, 161, 655–672. [Google Scholar] [CrossRef]
  117. Sun, C.; Li, D.; Wang, B.; Song, J. AI-Enabled Consensus Algorithm in Human-Centric Collaborative Computing for Internet of Vehicle. Symmetry 2023, 15, 1264. [Google Scholar] [CrossRef]
  118. Alruwaili, F.F. Ensuring data integrity in deep learning-assisted IoT-Cloud environments: Blockchain-assisted data edge verification with consensus algorithms. AIMS Math. 2024, 9, 8868–8884. [Google Scholar] [CrossRef]
  119. Vaiyapuri, T.; Shankar, K.; Rajendran, S.; Kumar, S.; Acharya, S.; Kim, H. Blockchain Assisted Data Edge Verification With Consensus Algorithm for Machine Learning Assisted IoT. IEEE Access 2023, 11, 55370–55379. [Google Scholar] [CrossRef]
  120. Zhang, Z.; Guo, B.; Shen, Y.; Li, C.; Suo, X.; Su, H. Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing. Secur. Commun. Netw. 2021, 2021, 6629433. [Google Scholar] [CrossRef]
  121. Sasikumar, A.; Ravi, L.; Kotecha, K.; Saini, J.R.R.; Varadarajan, V.; Subramaniyaswamy, V. Sustainable Smart Industry: A Secure and Energy Efficient Consensus Mechanism for Artificial Intelligence Enabled Industrial Internet of Things. Comput. Intell. Neurosci. 2022, 2022, 1419360. [Google Scholar] [CrossRef] [PubMed]
  122. Kumar, P.; Javeed, D.; Kumar, R.; Islam, A.K.M.N. Blockchain and explainable AI for enhanced decision making in cyber threat detection. Softw.-Pract. Exp. 2024, 54, 1337–1360. [Google Scholar] [CrossRef]
  123. Kim, S.K. Automotive Vulnerability Analysis for Deep Learning Blockchain Consensus Algorithm. Electronics 2022, 11, 119. [Google Scholar] [CrossRef]
  124. Cui, C.; Du, H.; Jia, Z.; He, Y.; Wang, L. Blockchain-Enabled Federated Learning with Differential Privacy for Internet of Vehicles. CMC-Comput. Mater. Contin. 2024, 81, 1581–1593. [Google Scholar] [CrossRef]
  125. Wang, Y.; Peng, H.; Su, Z.; Luan, T.H.; Benslimane, A.; Wu, Y. A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains. IEEE J. Sel. Areas Commun. 2022, 40, 3305–3324. [Google Scholar] [CrossRef]
  126. Deng, Q. Blockchain Economical Models, Delegated Proof of Economic Value and Delegated Adaptive Byzantine Fault Tolerance and their implementation in Artificial Intelligence BlockCloud. J. Risk Financ. Manag. 2019, 12, 177. [Google Scholar] [CrossRef]
  127. Alrubei, S.M.; Ball, E.; Rigelsford, J.M. The Use of Blockchain to Support Distributed AI Implementation in IoT Systems. IEEE Internet Things J. 2022, 9, 14790–14802. [Google Scholar] [CrossRef]
  128. Zhi, H.; Wu, H.; Huang, Y.; Tian, C.; Wang, S. Blockchain Consensus Scheme Based on the Proof of Distributed Deep Learning Work. IET Softw. 2025, 2025, 3378383. [Google Scholar] [CrossRef]
  129. Jogunola, O.; Adebisi, B.; Ikpehai, A.; Popoola, I.S.; Gui, G.; Gacanin, H.; Ci, S. Consensus Algorithms and Deep Reinforcement Learning in Energy Market: A Review. IEEE Internet Things J. 2021, 8, 4211–4227. [Google Scholar] [CrossRef]
  130. Goh, Y.; Yun, J.; Jung, D.; Chung, J.M. Secure Trust-Based Delegated Consensus for Blockchain Frameworks Using Deep Reinforcement Learning. IEEE Access 2022, 10, 118498–118511. [Google Scholar] [CrossRef]
  131. Kim, S.K. Blockchain Smart Contract to Prevent Forgery of Degree Certificates: Artificial Intelligence Consensus Algorithm. Electronics 2022, 11, 2112. [Google Scholar] [CrossRef]
  132. Chen, Z.; Yu, Z. Intelligent Offloading in Blockchain-Based Mobile Crowdsensing Using Deep Reinforcement Learning. IEEE Commun. Mag. 2023, 61, 118–123. [Google Scholar] [CrossRef]
  133. Wang, X.; Zhang, H.; Zhang, J.; Ge, Y.; Cui, K.; Peng, Z.; Li, Z.; Wang, L. An Improved Practical Byzantine Fault-Tolerant Algorithm Based on XGBoost Grouping for Consortium Chains. Comput. Mater. Contin. 2025, 82, 1295–1311. [Google Scholar] [CrossRef]
  134. Xiao, J.; Luo, T.; Li, C.; Zhou, J.; Li, Z. CE-PBFT: A high availability consensus algorithm for large-scale consortium blockchain. J. King Saud Univ.-Comput. Inf. Sci. 2024, 36, 101957. [Google Scholar] [CrossRef]
  135. Yuan, F.; Huang, X.; Zheng, L.; Wang, L.; Wang, Y.; Yan, X.; Gu, S.; Peng, Y. The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains. Information 2025, 16, 268. [Google Scholar] [CrossRef]
  136. Lyu, Q.; Ma, C.; Shen, Y.; Jiao, S.; Sun, Y.; Hu, L. Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency. CMES-Comput. Model. Eng. Sci. 2023, 135, 1625–1647. [Google Scholar] [CrossRef]
  137. Yang, H.; Gu, X.; Chen, X.; Zheng, L.; Cui, Z. CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection. Sci. Comput. Program. 2024, 234, 103076. [Google Scholar] [CrossRef]
  138. Gao, Z.; Jiang, L.; Xia, X.; Lo, D.; Grundy, J. Checking Smart Contracts with Structural Code Embedding. IEEE Trans. Softw. Eng. 2021, 47, 2874–2891. [Google Scholar] [CrossRef]
  139. Wei, Z.; Sun, J.; Zhang, Z.; Zhang, X.; Yang, X.; Zhu, L. Survey on Quality Assurance of Smart Contracts. ACM Comput. Surv. 2025, 57, 1–36. [Google Scholar] [CrossRef]
  140. Vidal, F.R.; Ivaki, N.; Laranjeiro, N. OpenSCV: An open hierarchical taxonomy for smart contract vulnerabilities. Empir. Softw. Eng. 2024, 29, 101. [Google Scholar] [CrossRef]
  141. Wang, W.; Xia, L.; Zhang, Z.; Meng, X. Smart Contract Timestamp Vulnerability Detection Based on Code Homogeneity. IEICE Trans. Inf. Syst. 2024, E107D, 1362–1366. [Google Scholar] [CrossRef]
  142. Fei, J.; Chen, X.; Zhao, X. MSmart: Smart Contract Vulnerability Analysis and Improved Strategies Based on Smartcheck. Appl. Sci. 2023, 13, 1733. [Google Scholar] [CrossRef]
  143. Chen, J.; Xia, X.; Lo, D.; Grundy, J.; Luo, X.; Chen, T. DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. IEEE Trans. Softw. Eng. 2021, 48, 2189–2207. [Google Scholar] [CrossRef]
  144. Lin, Z.; Chen, J.; Wu, J.; Zhang, W.; Wang, Y.; Zheng, Z. CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts. IEEE Trans. Softw. Eng. 2024, 50, 1534–1547. [Google Scholar] [CrossRef]
  145. Wu, H.; Dong, H.; He, Y.; Duan, Q. Smart Contract Vulnerability Detection Based on Hybrid Attention Mechanism Model. Appl. Sci. 2023, 13, 770. [Google Scholar] [CrossRef]
  146. Zhang, L.; Chen, W.; Wang, W.; Jin, Z.; Zhao, C.; Cai, Z.; Chen, H. CBGRU: A Detection Method of Smart Contract Vulnerability Based on a Hybrid Model. Sensors 2022, 22, 3577. [Google Scholar] [CrossRef] [PubMed]
  147. Hwang, S.J.; Choi, S.H.; Shin, J.; Choi, Y.H. CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability Detection. IEEE Access 2022, 10, 32595–32607. [Google Scholar] [CrossRef]
  148. Gao, C.; Yang, W.; Ye, J.; Xue, Y.; Sun, J. sGUARD plus: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts. ACM Trans. Softw. Eng. Methodol. 2024, 33, 114. [Google Scholar] [CrossRef]
  149. Ivanov, N.; Yan, Q.; Kompalli, A. TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1141–1155. [Google Scholar] [CrossRef]
  150. Yu, R.; Zhang, Y.; Wang, Y.; Liu, C. TxMirror: When the Dynamic EVM Stack Meets Transactions for Smart Contract Vulnerability Detection. Symmetry 2023, 15, 1345. [Google Scholar] [CrossRef]
  151. Li, J.; Lu, G.; Gao, Y.; Gao, F. A Smart Contract Vulnerability Detection Method Based on Multimodal Feature Fusion and Deep Learning. Mathematics 2023, 11, 4823. [Google Scholar] [CrossRef]
  152. Pasqua, M.; Benini, A.; Contro, F.; Crosara, M.; Dalla Preda, M.; Ceccato, M. Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode. J. Syst. Softw. 2023, 200, 111653. [Google Scholar] [CrossRef]
  153. Qian, S.; Ning, H.; He, Y.; Chen, M. Multi-Label Vulnerability Detection of Smart Contracts Based on Bi-LSTM and Attention Mechanism. Electronics 2022, 11, 3260. [Google Scholar] [CrossRef]
  154. Qian, P.; He, J.; Lu, L.; Wu, S.; Lu, Z.; Wu, L.; Zhou, Y.; He, Q. Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. IEEE Trans. Softw. Eng. 2023, 49, 3793–3810. [Google Scholar] [CrossRef]
  155. Le, T.T.H.; Kim, J.; Lee, S.; Kim, H. Robust Vulnerability Detection in Solidity-Based Ethereum Smart Contracts Using Fine-Tuned Transformer Encoder Models. IEEE Access 2024, 12, 154700–154717. [Google Scholar] [CrossRef]
  156. Wang, M.; Xie, Z.; Wen, X.; Li, J.; Zhou, K. Ethereum Smart Contract Vulnerability Detection Model Based on Triplet Loss and BiLSTM. Electronics 2023, 12, 2327. [Google Scholar] [CrossRef]
  157. Park, J.; Jeong, S.; Yeom, K. Smart Contract Broker: Improving Smart Contract Reusability in a Blockchain Environment. Sensors 2023, 23, 6149. [Google Scholar] [CrossRef]
  158. Sanchez-Gomez, N.; Torres-Valderrama, J.; Mejias Risoto, M.; Garrido, A. Blockchain Smart Contract Meta-modeling. J. Web Eng. 2021, 20, 2059–2079. [Google Scholar] [CrossRef]
  159. Gec, S.; Stankovski, V.; Lavbic, D.; Kochovski, P. A Recommender System for Robust Smart Contract Template Classification. Sensors 2023, 23, 639. [Google Scholar] [CrossRef]
  160. Chen, Y.; Hu, D.; Xu, C.; Chen, N. An Annotation Assisted Smart Contracts Generation Method. IEEE Access 2024, 12, 51485–51499. [Google Scholar] [CrossRef]
  161. Tong, Y.; Tan, W.; Guo, J.; Shen, B.; Qin, P.; Zhuo, S. Smart Contract Generation Assisted by AI-Based Word Segmentation. Appl. Sci. 2022, 12, 4773. [Google Scholar] [CrossRef]
  162. Margret, M.K.; Julie, E.G. Smarter and resilient smart contracts applications for smart cities environment using blockchain technology. Automatika 2024, 65, 572–583. [Google Scholar] [CrossRef]
  163. Zhang, L.; Kim, D. A Peer-to-Peer Smart Food Delivery Platform Based on Smart Contract. Electronics 2022, 11, 1806. [Google Scholar] [CrossRef]
  164. Zhang, X.; Liu, C.; Medda, F. A Smart-Contract-Aided Plastic Credit Scheme. IEEE Syst. J. 2023, 17, 1703–1713. [Google Scholar] [CrossRef]
  165. Wang, L.; Xu, L.; Zheng, Z.; Liu, S.; Li, X.; Cao, L.; Li, J.; Sun, C. Smart Contract-Based Agricultural Food Supply Chain Traceability. IEEE Access 2021, 9, 9296–9307. [Google Scholar] [CrossRef]
  166. Garcia, R.D.; Ramachandran, G.; Ueyama, J. Exploiting smart contracts in PBFT-based blockchains: A case study in medical prescription system. Comput. Netw. 2022, 211, 109003. [Google Scholar] [CrossRef]
  167. Agrawal, T.K.; Angelis, J.; Khilji, W.A.; Kalaiarasan, R.; Wiktorsson, M. Demonstration of a blockchain-based framework using smart contracts for supply chain collaboration. Int. J. Prod. Res. 2023, 61, 1497–1516. [Google Scholar] [CrossRef]
  168. Zhang, Y.; Yutaka, M.; Sasabe, M.; Kasahara, S. Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework. IEEE Internet Things J. 2021, 8, 6372–6384. [Google Scholar] [CrossRef]
  169. Karakoc, E.; Ceken, C. Secure SLA Management Using Smart Contracts for SDN-Enabled WSN. KSII Trans. Internet Inf. Syst. 2023, 17, 3003–3029. [Google Scholar] [CrossRef]
  170. Guo, Z.Y.; Chen, Y.C.; Lin, H.P. Oblivious Access for Decentralized Database Systems: A New Asymmetric Framework from Smart Contracts. Symmetry 2022, 14, 680. [Google Scholar] [CrossRef]
  171. Selvarajan, S.; Srivastava, G.; Khadidos, A.O.; Khadidos, A.O.; Baza, M.; Alshehri, A.; Lin, J.C.W. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud-Comput.-Adv. Syst. Appl. 2023, 12, 38. [Google Scholar] [CrossRef]
  172. Wang, J.; Li, J. Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated Personalized Privacy-Preserving Federated Learning. Appl. Sci. 2024, 14, 1743. [Google Scholar] [CrossRef]
  173. Miao, Q.; Lin, H.; Hu, J.; Wang, X. An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things. Digit. Commun. Netw. 2022, 8, 636–643. [Google Scholar] [CrossRef]
  174. Smahi, A.; Li, H.; Yang, Y.; Yang, X.; Lu, P.; Zhong, Y.; Liu, C. BV-ICVs: A privacy-preserving and verifiable federated learning framework for V2X environments using blockchain and zkSNARKs. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101542. [Google Scholar] [CrossRef]
  175. Yang, F.; Abedin, m.Z.; Hajek, P. An explainable federated learning and blockchain-based secure credit modeling method. Eur. J. Oper. Res. 2024, 317, 449–467. [Google Scholar] [CrossRef]
  176. Firdaus, M.; Larasati, H.T.; Rhee, K.H. A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks. CMC-Comput. Mater. Contin. 2023, 76, 2959–2978. [Google Scholar] [CrossRef]
  177. Li, K.; Zhou, H.; Tu, Z.; Liu, F.; Zhang, H. Blockchain Empowered Federated Learning for Distributed Network Security Behaviour Knowledge Base in 6G. Secur. Commun. Netw. 2022, 2022, 4233238. [Google Scholar] [CrossRef]
  178. Wan, C.; Wang, Y.; Xu, J.; Wu, J.; Zhang, T.; Wang, Y. Research on Privacy Protection in Federated Learning Combining Distillation Defense and Blockchain. Electronics 2024, 13, 679. [Google Scholar] [CrossRef]
  179. Liu, W.; He, Y.; Wang, X.; Duan, Z.; Liang, W.; Liu, Y. BFG: Privacy protection framework for internet of medical things based on blockchain and federated learning. Connect. Sci. 2023, 35. [Google Scholar] [CrossRef]
  180. Ma, H.; Huang, S.; Guo, J.; Lam, K.Y.; Yang, T. Blockchain-Based Privacy-Preserving Federated Learning for Mobile Crowdsourcing. IEEE Internet Things J. 2024, 11, 13884–13899. [Google Scholar] [CrossRef]
  181. Wang, N.; Yang, W.; Wang, X.; Wu, L.; Guan, Z.; Du, X.; Guizani, M. A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. Digit. Commun. Netw. 2024, 10, 126–134. [Google Scholar] [CrossRef]
  182. Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D.; Li, Z.; Lyu, L.; Liu, Y. Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices. IEEE Internet Things J. 2021, 8, 1817–1829. [Google Scholar] [CrossRef]
  183. Zhu, C.; Zhu, X.; Qin, T. An Efficient Privacy Protection Mechanism for Blockchain-Based Federated Learning System in UAV-MEC Networks. Sensors 2024, 24, 1364. [Google Scholar] [CrossRef]
  184. Mo, M.; Ji, S.; Wang, X.; Mohiuddin, G.; Ren, Y. Privacy Data Management Mechanism Based on Blockchain and Federated Learning. CMC-Comput. Mater. Contin. 2023, 74, 37–53. [Google Scholar] [CrossRef]
  185. Wang, Q.; Dong, H.; Huang, Y.; Liu, Z.; Gou, Y. Blockchain-Enabled Federated Learning for Privacy-Preserving Non-IID Data Sharing in Industrial Internet. CMC-Comput. Mater. Contin. 2024, 80, 1967–1983. [Google Scholar] [CrossRef]
  186. Zhang, F.; Zhang, Y.; Ji, S.; Han, Z. Secure and decentralized federated learning framework with non-IID data based on blockchain. Heliyon 2024, 10, e27176. [Google Scholar] [CrossRef]
  187. Myrzashova, R.; Alsamhi, S.H.; Hawbani, A.; Curry, E.; Guizani, M.; Wei, X. Safeguarding Patient Data-Sharing: Blockchain-Enabled Federated Learning in Medical Diagnostics. IEEE Trans. Sustain. Comput. 2025, 10, 176–189. [Google Scholar] [CrossRef]
  188. Rabbani, H.; Shahid, M.F.; Khanzada, T.J.S.; Siddiqui, S.; Jamjoom, M.M.; Ashari, R.B.; Ullah, Z.; Mukati, M.U.; Nooruddin, M. Enhancing security in financial transactions: A novel blockchain-based federated learning framework for detecting counterfeit data in fintech. PeerJ Comput. Sci. 2024, 10, e2280. [Google Scholar] [CrossRef]
  189. Meng, M.; Li, Y. SFedChain: Blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks. PeerJ Comput. Sci. 2022, 8, e1027. [Google Scholar] [CrossRef]
  190. Zhu, L.; Hu, S.; Zhu, X.; Meng, C.; Huang, M. Enhancing the Security and Privacy in the IoT Supply Chain Using Blockchain and Federated Learning with Trusted Execution Environment. Mathematics 2023, 11, 3759. [Google Scholar] [CrossRef]
  191. Jia, Y.; Xiong, L.; Fan, Y.; Liang, W.; Xiong, N.; Xiao, F. Blockchain-based privacy-preserving multi-tasks federated learning framework. Connect. Sci. 2024, 36. [Google Scholar] [CrossRef]
  192. Zhang, Y.; Tang, Y.; Zhang, Z.; Li, M.; Li, Z.; Khan, S.; Chen, H.; Cheng, G. Blockchain-Based Practical and Privacy-Preserving Federated Learning with Verifiable Fairness. Mathematics 2023, 11, 1091. [Google Scholar] [CrossRef]
  193. Dong, C.; Zhou, J.; An, Q.; Jiang, F.; Chen, S.; Pan, L.; Liu, X. Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems. Drones 2023, 7, 413. [Google Scholar] [CrossRef]
  194. Dhasaratha, C.; Hasan, M.K.; Islam, S.; Khapre, S.; Abdullah, S.; Ghazal, T.M.; Alzahrani, A.I.; Alalwan, N.; Vo, N.; Akhtaruzzaman, M. Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. CAAI Trans. Intell. Technol. 2024. [Google Scholar] [CrossRef]
  195. Li, K. A Blockchain-Integrated Federated Learning Approach for Secure Data Sharing and Privacy Protection in Multi-Device Communication. Appl. Artif. Intell. 2025, 39. [Google Scholar] [CrossRef]
  196. Cai, C.; Xu, L.; Zhou, A.; Wang, R.; Wang, C.; Wang, Q. EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 1887–1896. [Google Scholar] [CrossRef]
  197. Shen, H.; Wang, T.; Chen, J.; Tao, Y.; Chen, F. Blockchain-Based Batch Authentication Scheme for Internet of Vehicles. IEEE Trans. Veh. Technol. 2024, 73, 7866–7879. [Google Scholar] [CrossRef]
  198. Shinde, R.; Patil, S.; Kotecha, K.; Ruikar, K. Blockchain for Securing AI Applications and Open Innovations. J. Open Innov. Technol. Mark. Complex. 2021, 7, 189. [Google Scholar] [CrossRef]
  199. Khan, J.A.; Bangalore, K.U.; Kurkcu, A.; Ozbay, K. TREAD: Privacy Preserving Incentivized Connected Vehicle Mobility Data Storage on InterPlanetary-File-System-Enabled Blockchain. Transp. Res. Rec. 2021, 2676, 680–691. [Google Scholar] [CrossRef]
  200. Yiu, N.C.K. Decentralizing Supply Chain Anti-Counterfeiting and Traceability Systems Using Blockchain Technology. Future Internet 2021, 13, 84. [Google Scholar] [CrossRef]
  201. Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. An AI—Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber-Physical Systems. Sensors 2022, 22, 1448. [Google Scholar] [CrossRef] [PubMed]
  202. Bouachir, O.; Aloqaily, M.; Karray, F.; Saddik, A.E. AI-based Blockchain for the Metaverse: Approaches and Challenges. In Proceedings of the 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), San Antonio, TX, USA, 5–7 September 2022; pp. 231–236. [Google Scholar]
  203. Singh, S.K.; Park, J.H. TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence. IEEE Trans. Ind. Inform. 2023, 19, 626–634. [Google Scholar] [CrossRef]
  204. Wang, X.; Garg, S.; Lin, H.; Kaddoum, G.; Hu, J.; Hassan, M.M. Heterogeneous Blockchain and AI-Driven Hierarchical Trust Evaluation for 5G-Enabled Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2023, 24, 2074–2083. [Google Scholar] [CrossRef]
  205. Khan, S.; Khan, M.; Khan, M.A.; Khan, M.A.; Wang, L.; Wu, K. A Blockchain-Enabled AI-Driven Secure Searchable Encryption Framework for Medical IoT Systems. IEEE J. Biomed. Health Inform. 2025, 1–14. [Google Scholar] [CrossRef]
Figure 1. Blockchain development trends.
Figure 1. Blockchain development trends.
Algorithms 18 00263 g001
Figure 2. Block structure diagram.
Figure 2. Block structure diagram.
Algorithms 18 00263 g002
Figure 3. Paxos consensus flow diagram.
Figure 3. Paxos consensus flow diagram.
Algorithms 18 00263 g003
Figure 4. Blockchain smart contract schematic.
Figure 4. Blockchain smart contract schematic.
Algorithms 18 00263 g004
Figure 5. AI-driven application trends schematic.
Figure 5. AI-driven application trends schematic.
Algorithms 18 00263 g005
Figure 6. (a) Schematic diagram of the decision tree boosting model. (b) SVM core concept diagram. (c) LSTM unit structure diagram. (d) MLP feedforward neural network structure diagram. (e) Schematic diagram of XGBoost model for incremental construction of decision tree. (f) CNN network architecture diagram.
Figure 6. (a) Schematic diagram of the decision tree boosting model. (b) SVM core concept diagram. (c) LSTM unit structure diagram. (d) MLP feedforward neural network structure diagram. (e) Schematic diagram of XGBoost model for incremental construction of decision tree. (f) CNN network architecture diagram.
Algorithms 18 00263 g006
Figure 7. Schematic of the existing challenges of AI-driven blockchain.
Figure 7. Schematic of the existing challenges of AI-driven blockchain.
Algorithms 18 00263 g007
Figure 8. AI algorithms drive blockchain consensus node classification.
Figure 8. AI algorithms drive blockchain consensus node classification.
Algorithms 18 00263 g008
Figure 9. Schematic of federated learning combined with blockchain.
Figure 9. Schematic of federated learning combined with blockchain.
Algorithms 18 00263 g009
Figure 10. Blockchain and IPFS combine to solve storage burden.
Figure 10. Blockchain and IPFS combine to solve storage burden.
Algorithms 18 00263 g010
Table 3. Comparison of existing reviews on AI-driven blockchain optimization.
Table 3. Comparison of existing reviews on AI-driven blockchain optimization.
AuthorYearCore MechanicsProsCons
Verma, D. et al. [26]2022Application of blockchain and AI in plastic recycling.Improve recycling efficiency and support environmental protection.Data privacy and security issues not involved; lack of practical cases.
Badidi, E. et al. [27]2022Edge AI and blockchain for smart sustainable cities.Provide smart city application cases to improve infrastructure management.Lack of blockchain performance optimization and privacy protection solutions.
Haddad, A. et al. [28]2022Blockchain + AI for electronic health records.Solve privacy issues of electronic health records and improve data management efficiency.Scalability optimization of blockchain not discussed.
Kumar, R. et al. [29]2023AI-driven blockchain applications in public health.Covers multiple public health applications and provides real-world examples.Lacks adequate discussion on technical challenges and deployment scenarios.
Uddin, M. et al. [30]2024Integration of Metaverse, blockchain, and AI.Innovative analysis emphasizing digital currency and data security.Lack of factual industry application cases and insufficient in-depth analysis.
Omidian, H. et al. [31]2024Synergy of blockchain and AI in healthcare.Emphasis on data privacy, security, and innovative solutions.Lack of technical implementation steps and practical issues.
Zhou, Q. et al. [32]2022Application of AI, big data, and blockchain in food safety.Emphasis on data traceability with practical application value.Lack of in-depth discussion on privacy protection and blockchain optimization.
Our Survey2025Comprehensively summarize the optimization role of AI in the four core modules of blockchain (consensus algorithm, smart contract, privacy protection, data retrieval).Clearly point out the systematic challenges of the four core modules of blockchain (consensus algorithm, smart contract, privacy protection, data retrieval) in scalability, security, and privacy, and analyze them in detail.Lack of actual case demonstrations in each category.
Table 4. Comparison of blockchain categories.
Table 4. Comparison of blockchain categories.
TypePublic BlockchainConsortium BlockchainPrivate Blockchain
ParticipantsAnyoneConsortium membersInternal to an organization
Consensus MechanismPoW/PoS/DPoSPBFT/Kafka/BFTRaft/Paxos
Incentive MechanismRequiredOptionalNot required
Degree of DecentralizationDecentralizedPartially decentralized(Partially) centralized
Data Consistency(weak) consistency(strong) consistency(strong) consistency
Network ScaleLargeRelatively largeSmall
Typical ApplicationsCryptocurrenciesPaymentsAuditing
Table 5. Comparison of consensus algorithms.
Table 5. Comparison of consensus algorithms.
Consensus AlgorithmCore DescriptionApplication ExamplesReward MechanismAdvantagesDisadvantages
PoWConsensus is achieved through competitive cryptographic puzzlesBitcoinRewards miners with block rewards and transaction fees, but computationally expensiveHigh security, resistant to Sybil attacksHigh energy consumption, low throughput
PoSNodes gain block validation rights based on the amount and duration of cryptocurrency heldEthereum 2.0Holders receive block rewards, malicious actors may be penalizedLow energy consumption, efficientMay lead to wealth centralization
DPoSRepresentatives are elected to validate and confirm transactionsEOS, TRONDelegates receive rewards, malicious representatives can be voted outHigh efficiency, low energy consumptionPotential centralization, risk of delegate collusion
PBFTConsensus is reached through multiple rounds of voting, suitable for a small number of nodesHyperledger Fabric, financial blockchainNo economic incentives, relies on node trustLow latency, high throughputNo cryptocurrency incentives, malicious nodes may impact consensus
KafkaConsensus is achieved based on a reliable message queue, commonly used in enterprise architecturesHyperledger Fabric (ordering service)No economic incentives, relies on access controlHigh throughput, suitable for private chainsRelies on centralized nodes, single point of failure risk
RaftLeader-based replication for log consistency, suitable for small-scale distributed systemsEnterprise private blockchainsNo economic incentivesSimple implementation, easy deploymentLimited application scope, performance affected by leader
PaxosAchieves consensus in distributed systems through message passingGoogle Chubby, AWS DynamoDBNo economic incentivesSuitable for strong consistency databasesHigh algorithmic complexity, significant communication overhead
Table 6. Advantages of smart contracts.
Table 6. Advantages of smart contracts.
AdvantageDescriptionApplicable ScenariosPotential ChallengesTypical Application
Speed, Efficiency, and AccuracyAutomatically executes without human intervention, reducing errors and improving transaction efficiency.Supply chain, payment settlementHigh computational costs, slow execution for complex contractsSupply chain settlement, insurance claims
Trust and TransparencyPublic and transparent data reduces information asymmetry and enhances trust.DeFi, government record-keepingPotential privacy leakage, requires privacy protection technologiesTransparent charity, decentralized exchanges
SecurityEncryption and consensus mechanisms ensure transaction security and immutability.Identity verification, medical data storageCode vulnerabilities may be exploited by hackersDigital identity, electronic health records
Cost SavingsReduces reliance on intermediaries, lowering transaction and operational costs.Finance, real estateHigh development and computational costsSecurities clearing, P2P lending
Automation and AutonomyAutomatically executes when predefined conditions are met, minimizing human intervention.Logistics, enterprise automationImmutable code requires rigorous testingSupply chain payments, smart insurance
Table 7. Comparison of symmetric and asymmetric encryption.
Table 7. Comparison of symmetric and asymmetric encryption.
FeatureSymmetric EncryptionAsymmetric Encryption
Key UsageSame key for encryption and decryptionPublic key for encryption, private key for decryption
SecurityVulnerable to key interceptionMore secure due to separate keys, reducing risk of compromise
SpeedEncryption and decryption are efficientSlower due to complex mathematical operations
Key DistributionRequires secure key exchangeOnly the public key is shared, ensuring security
ScalabilityDifficult to manage as user numbers increaseMore scalable as no pre-shared keys are needed
Usage ScenariosBulk data encryption and secure storageDigital signatures, key exchange, secure communication
Common AlgorithmsDES, 3DES, AES, RC4, RC5, BlowfishRSA, ECC, DSA, ElGamal
Table 8. Comparative analysis of the four major machine learning paradigms.
Table 8. Comparative analysis of the four major machine learning paradigms.
Comparison CriteriaSupervised LearningUnsupervised LearningSemi-Supervised LearningReinforcement Learning
DefinitionUtilizes labeled data to train models for predicting outputs of new input data.Employs unlabeled data to discover inherent structures or patterns within the data.Combines a small amount of labeled data with a large volume of unlabeled data to enhance learning performance.Involves an agent interacting with the environment to learn strategies that maximize cumulative rewards.
Data RequirementsRequires a substantial amount of high-quality labeled data.Needs a large quantity of unlabeled data.Uses a combination of a small set of labeled data and a large set of unlabeled data.Gathers data through interactions with the environment, eliminating the need for pre-labeled data.
Primary TasksClassification, regression.Clustering, dimensionality reduction, association rule learning.Classification, regression, semi-supervised clustering.Sequential decision-making, policy optimization.
Common AlgorithmsLinear Regression, Logistic Regression, Support Vector Machine (SVM), Decision Tree, Random Forest, Neural Networks.K-Means Clustering, Hierarchical Clustering, Principal Component Analysis (PCA), Autoencoders.Self-training, Autoencoders, Graph-based Semi-Supervised Learning.Q-Learning, Deep Q Network (DQN), Policy Gradient Methods, Actor-Critic Methods.
AdvantagesHigh predictive accuracy with interpretable results.Capable of uncovering hidden patterns in data without the need for labeled data.Enhances model performance by leveraging unlabeled data, reducing labeling costs.Effective in learning optimal strategies within complex and uncertain environments.
DisadvantagesDependence on large amounts of labeled data, leading to high labeling costs.Results may lack clear interpretability and are challenging to evaluate.Increased model complexity and potential instability during training.Learning processes may require extensive interactions, resulting in long training times and high computational resource demands.
Application AreasImage recognition, speech recognition, spam detection, stock price prediction.Customer segmentation, anomaly detection, gene data analysis, market basket analysis.Medical image analysis, text classification, web content categorization.Game AI, robotic control, autonomous driving, resource management.
Table 9. Comparison of deep learning algorithms.
Table 9. Comparison of deep learning algorithms.
AlgorithmCore PrincipleMain ApplicationsAdvantagesDisadvantages
CNNExtracts spatial features through convolutional layers, reduces dimensionality with pooling layers, and classifies using fully connected layersComputer vision (image classification, object detection, semantic segmentation)Spatial invariance, parameter sharing reduces computationRequires large datasets, struggles with sequential data
RNNMaintains sequential dependencies through recurrent connectionsNatural language processing, time-series forecastingSuitable for sequential data, capable of learning long-term dependenciesTraining difficulty (vanishing/exploding gradient), inefficient parallelization
LSTMIntroduces gating mechanisms (forget, input, and output gates) to improve RNNsMachine translation, speech recognitionSolves vanishing gradient issue, retains long-term dependenciesHigh computational complexity, slower training compared to RNNs
GRUA simplified version of LSTM with merged forget and input gatesSpeech recognition, text generationLower computational cost than LSTM, similar performanceSlightly less expressive power than LSTM
TransformerUtilizes self-attention mechanisms and feedforward networks, independent of sequential orderMachine translation, conversational AI, large models (e.g., GPT, BERT)Highly parallelizable, strong long-range dependency learningHigh computational complexity, resource-intensive for long sequences
GANComposed of a generator and a discriminator in an adversarial setup, learning to generate realistic dataImage generation, data augmentation, super-resolutionStrong generative capability, useful for data augmentationUnstable training, prone to mode collapse
VAEUses probabilistic modeling to generate data, with a latent variable controlling the generatorImage generation, anomaly detectionSmooth latent space, stable trainingGenerated images may be blurry, lacks fine details compared to GANs
Table 10. Comparison of blockchain core technologies.
Table 10. Comparison of blockchain core technologies.
AspectConsensus MechanismsSmart ContractsPrivacy ProtectionData Retrieval
PerformanceLow TPS, high latency [108]Execution inefficiency [109], high gas costs [110]High computational overhead (e.g., ZKP, FHE) [111]Slow query speed, limited scalability
Security51% attack risk, PoS centralizationVulnerabilities, irreversible deploymentTEE vulnerabilities, MPC security concernsData integrity risks, potential manipulation
DecentralizationValidator oligopoly riskPlatform dependence (e.g., Ethereum)Requires trusted third parties (e.g., MPC and FHE)Often relies on centralized indexing
ScalabilityLimited node expansion, slow finalityHigh on-chain storage and computation costsZKP and MPC scalability issuesHigh storage costs, inefficiency in large datasets
PrivacyTransparent transactions, weak financial privacyCode and execution transparencyHigh cost for privacy-preserving computationsPublicly accessible data may expose user behavior
Energy ConsumptionHigh in PoW, moderate in PoS [112]Gas fees fluctuate, inefficient executionCryptographic computations are energy-intensiveStorage and verification require significant resources
UsabilityHigh confirmation time, node reliability requiredDifficult to upgrade and fix vulnerabilitiesComplex deployment, high technical thresholdSlower than traditional databases
Regulatory ComplianceDifficult to regulate, irreversible transactionsHard to modify contracts per legal requirementsPotential restrictions on privacy technologiesCross-chain data access challenges, regulatory concerns
CostHigh mining and staking costs [113]High gas fees, expensive auditsExpensive cryptographic computationsHigh storage and retrieval costs
Table 11. Comparison of AI-powered authentication and IoT consensus optimization algorithms.
Table 11. Comparison of AI-powered authentication and IoT consensus optimization algorithms.
AlgorithmCore MechanismCommunication ComplexityKey AdvantagesExisting Limitations
PoAh 2.0 [116]AI-powered dynamic authentication O ( N ) Suitable for IoT devices, enhanced securityDependence on AI computational capacity
IoV Consensus [117]Vehicle prediction + BP neural network O ( N log N ) Reduces leader node dropoutsLimited accuracy in vehicle time prediction
FGADL-DEVCA [118]Deep learning for transaction verification O ( N 2 ) Improves data integrityHigh computational cost
BDEV-CAM [119]Machine-learning-enhanced blockchain verification O ( N log N ) Enhance IoT securityHigh computational demands
Table 12. AI-driven blockchain security consensus.
Table 12. AI-driven blockchain security consensus.
AlgorithmCore MechanismCommunication ComplexityKey AdvantagesExisting Limitations
Nakamoto + AI [120]Off-chain validation + AI data analysis O ( N log N ) Suitable for high computational tasksHigh resource consumption
DPoS for IIoT [121]AI-optimized DPoS election O ( k log N ) Lower energy use, improved efficiencyDependence on delegates
C-PoA [122]PoA with LSTM for threat detection O ( N ) Improves blockchain securityLimited by PoA governance
LSTM Security Consensus [123]LSTM-based malicious node detection O ( N 2 ) Suitable for automotive securityHigh computational overhead
Table 13. AI-driven economic incentives and resource optimization consensus.
Table 13. AI-driven economic incentives and resource optimization consensus.
AlgorithmCore MechanismCommunication ComplexityKey AdvantagesExisting Limitations
BCFL [124]PBFT + Federated Learning O ( N 2 ) Enhanced data privacyHigh resource consumption
PF-PoFL [125]Credit-based federated consensus O ( N log N ) Privacy-preserving, secureSlower training time
DABFT [126]AI-based Byzantine fault tolerance O ( N log N ) Improved fault resilienceData quality dependent
PoA + PoW for IoT [127]AI-enhanced PoA and PoW O ( N log N ) Optimized for IoT devicesHigh PoW computational cost
DPoEV [128]Economic incentive with AI evaluation O ( k log N ) Suitable for blockchain economyData dependency
DRL + PoW [129]DRL for PoW task offloading O ( N 2 ) Reduces computational overheadRequires stable network
D3P [130]Double DQN + trusted delegate consensus O ( N log N ) Improved efficiency, securityLong training process
Table 14. AI-Integrated blockchain for specialized applications.
Table 14. AI-Integrated blockchain for specialized applications.
AlgorithmCore MechanismCommunication ComplexityKey AdvantagesExisting Limitations
XG-PBFT [133]Using XGBoost for node grouping and reputation score allocation O ( N ) Suitable for edge devicesRequires additional computational overhead
Degree Certificate Verification [131]NLP + Blockchain for credential validation O ( N log N ) Prevents academic fraudDependence on NLP accuracy
Multi-Party Consensus [132]AI-enhanced Nakamoto consensus O ( N 2 ) Suitable for privacy-preserving computingHigh computational cost
CE-PBFT [134]Using decision tree algorithms for node grouping and reputation score allocation O ( N ) Suitable for edge devicesRequires additional computational overhead
Table 15. Classification and comparison of AI-driven smart contract research.
Table 15. Classification and comparison of AI-driven smart contract research.
CategoryMain Research FocusCore TechniquesApplication ScenariosMajor Contributions
Smart Contract Security and Vulnerability DetectionIdentifying and detecting security vulnerabilities such as re-entrancy attacks, integer overflows, and timestamp dependencies.Static/Dynamic Analysis, GNN, Transformer, LSTM, Fuzzing.Ethereum, DeFi, Supply Chain.Improving vulnerability detection accuracy and reducing false positives/negatives.
Smart Contract Optimization and GenerationEnhancing smart contract reusability, automation, classification, and efficiency.NLP, AI-based recommendation systems, meta-modeling (UML), Code Annotation.Blockchain Development, EVM Contracts, Smart Contract Libraries.Reducing development time, improving contract code quality.
Smart Contract Applications in Specific DomainsUtilizing smart contracts in real-world applications such as smart cities, supply chain management, and healthcare.Blockchain + Smart Contracts, Decentralized Storage (IPFS), Attribute-Based Access Control.Smart Cities, Agriculture, Food Supply Chain, Healthcare.Demonstrating the feasibility of smart contract applications and improving data reliability and traceability.
Smart Contract Access Control and Resource ManagementResearch on access control mechanisms, privacy protection, and computational resource optimization in smart contracts.SDN + Smart Contracts, Decentralized Databases, ABAC Mechanism.IoT, Distributed Systems, Security Management.Enhancing smart contract scalability, security, and efficient resource utilization.
Table 16. Comparison of key categories of smart contract vulnerabilities.
Table 16. Comparison of key categories of smart contract vulnerabilities.
TypeDefinitionCausesTypical ExamplePotential Impact
Arithmetic VulnerabilitiesErrors in mathematical operations such as overflow and underflow.Lack of boundary checks and absence of safe math libraries.Overflow in ERC20 tokens.Incorrect calculations, unauthorized fund transfers.
Re-entrancy AttacksExploiting recursive calls to re-enter the contract before state updates.State changes occur after external calls; absence of function locks.The DAO attack.Repeated fund withdrawals, total asset drain.
Unchecked CallsFailure to verify the return value of low-level function calls.Ignoring success/failure checks for call(), delegatecall(), etc.Parity Wallet bug.Logic errors, silent failures, potential loss of funds.
Inconsistent Access ControlImproper or missing role-based restrictions for function access.Misconfigured or absent access control mechanisms.Governance function override.Unauthorized users gain control of sensitive operations.
Table 17. Comparison of smart contract security and vulnerability detection research.
Table 17. Comparison of smart contract security and vulnerability detection research.
AuthorCore InnovationAlgorithmPerformance ComparisonAdvantagesLimitations
Lyu et al. [136]Contract Dependency Graph (CDG) for vulnerability propagationGraph analysis14.7% victim contract detectionIdentifies vulnerability chainsRelies on CDG quality
Yang et al. [137]Cross-contract fuzzing-based vulnerability detectionFuzzing, data flow analysisImproved detection efficiencyEffective for multi-contract scenariosHigh computation cost
Gao et al. [138]Structural code embedding for clone/error detectionCode embedding90% clone detection rateEnhances vulnerability detectionRequires existing vulnerability databases
Wei et al. [139]Comprehensive survey of 40 vulnerabilitiesSurvey studyBenchmarked 14 detection toolsProvides classification frameworkCannot detect new vulnerabilities
Vidal et al. [140]OpenSCV hierarchical taxonomyMachine learning classificationImproved classification clarityOpen-source and extendableSubjective expert-based classification
Wang et al. [141]Timestamp vulnerability detection using code homogeneityHomogeneity-based similarity matchingIdentified vulnerable contracts efficientlyEffective for timestamp-related vulnerabilitiesLimited to specific vulnerability types
Fei et al. [142]Improved SmartCheck-based vulnerability analysis tool (MSmart)Intermediate representation and XPath rulesReduced false positives and false negativesDetects more vulnerability types than SmartCheckComplexity in rule optimization
Chen et al. [143]Symbolic execution for defect detection (DefectChecker)Bytecode-level symbolic execution88.8% F-score, 0.15s per contractFast and accurate detectionLimited to EVM bytecode
Lin et al. [144]Rug pull risk detection for DeFi smart contracts (CRPWarner)Analyzing contract functionality91.8% precision, 85.9% recallHigh detection rate for rug pull risksRequires labeled datasets
Wu et al. [145]Hybrid Attention Mechanism (HAM) for security vulnerabilitiesAttention mechanism93.36% re-entrancy detectionCombines static and dynamic analysisHigh computational overhead
Zhang et al. [146]CBGRU hybrid deep learning model for vulnerability detectionCombination of CNN, LSTM, BiGRUImproved performance on SmartBugs datasetHigh detection accuracyRequires significant computational resources
Hwang et al. [147]CodeNet: CNN-based vulnerability detectionCode transformation to imagesCompetitive detection performanceNovel approach using deep learningPotential loss of semantic information
Table 18. Comparison of smart contract security and vulnerability detection research.
Table 18. Comparison of smart contract security and vulnerability detection research.
AuthorCore InnovationAlgorithmPerformance ComparisonAdvantagesLimitations
Gao et al. [148]GNN with expert knowledgeContract graph representationDetection accuracy: 89.15% re-entrancy, 89.02% timestamp dependencyIncorporates domain knowledge with GNNHigh complexity in graph processing
Gao et al. [149]Transaction encapsulation for security testing (TxT)Local execution of transactions on isolated Ethereum nodes96.5% transactions verified, 83.8% vulnerability coverageHigh accuracy and coverageRequires synchronized node execution
Yu et al. [150]TxMirror: EVM-stack-based vulnerability detectionTransaction simulation and double link forest indexingEffective detection of unknown vulnerabilitiesNovel EVM stack analysis approachLimited applicability beyond Ethereum
Jinggang et al. [151]Multi-modal feature fusion with deep learningGCN and Bi-LSTM integration90.96% accuracy for integer overflow detectionFuses static and dynamic featuresHigh training complexity
Pasqua et al. [152]Control Flow Graph (CFG) reconstruction for smart contractsSymbolic execution-based CFG analysisMore precise CFG extraction than existing methodsEnhances static vulnerability analysisRequires symbolic execution overhead
Qian et al. [153]Multi-label vulnerability detection using Bi-LSTMNeural network classification for multiple vulnerabilitiesOver 85% accuracy for all detected vulnerabilitiesDetects multiple vulnerabilities simultaneouslyPotential overfitting to training data
Peng et al. [154]RNVulDet: Random number vulnerability detectionTaint analysis and attack detection44,264 attack transactions detectedFast detection speed (2.98 s per contract)Requires a large labeled dataset
Le et al. [155]Transformer-based vulnerability detectionFine-tuned LLM for Solidity code analysisEffective detection of security flawsHigh interpretability with transformer modelsRequires high computational resources
Wang et al. [156]Triplet Loss and Bi-LSTM for vulnerability detectionMetric learning-based feature optimization93.25% accuracy for re-entrancy detectionOptimized feature representationLimited to predefined vulnerability categories
Table 19. Summary of smart contract optimization and generation approaches.
Table 19. Summary of smart contract optimization and generation approaches.
CategoryKey TechniquesAdvantagesLimitations
Smart Contract AgentsAutonomous code generation, lifecycle managementHigh automation, reduced human effortMay rely on predefined behaviours or agents
Meta-ModelingContract abstraction and model-driven generationFacilitates reuse, improves modularityOften tied to specific ecosystems
AI Recommendation SystemsCode completion and contract suggestion enginesBoosts efficiency, leverages historical dataRequires large training data and context awareness
Code Annotation OptimizationSemantic tagging and structured metadataEnhances maintainability and readabilityNeeds standardization and metadata consistency
NLP DisambiguationNatural language to code translationLowers entry barrier, enables text-driven developmentProne to ambiguity, may reduce accuracy in complex logic
Table 20. Comparison of smart contract optimization and generation research.
Table 20. Comparison of smart contract optimization and generation research.
AuthorCore InnovationAlgorithmPerformance ComparisonAdvantagesLimitations
Park et al. [157]Smart contract broker for reusabilityBroker mechanismImproved reuseEnhances flexibilityNeeds metadata management
Sanche et al. [158]Smart contract meta-modeling (UML)UML-based modelingStandardized modeling frameworkAids automationNeeds further extension
Gec et al. [159]Smart contract recommender systemOpenZeppelin + MLReduced development timeSupports EVM contractsRelies on OpenZeppelin ecosystem
Chen et al. [160]AI-assisted contract annotation generationCode annotation + AIBLEU score +27%High automationLimited to specific domains
Tong et al. [161]AI-assisted word segmentation for contract generationAI-based segmentationMulti-language supportCompatibleRequires NLP capabilities
Table 21. Comparison of smart contract implementations in specific applications.
Table 21. Comparison of smart contract implementations in specific applications.
AuthorCore InnovationAlgorithmApplication ScenarioAdvantagesLimitations
Margret et al. [162]Smart contract framework for smart citiesBlockchain + Smart ContractsSmart CitiesSolves data managementHigh computational demand
Zhang et al. [163]Peer-to-peer food delivery automationSmart contract automationFood supply chainTrust-enhancing, commission-freeLimited transaction throughput
Xiao et al. [164]Smart contract-aided plastic credit schemeBlockchain + Smart ContractsPlastic recycling governancePromotes self-regulated plastic trading, improves recyclabilityRequires industry-wide adoption
Wang et al. [165]Blockchain-based agricultural product traceabilityIPFS + Smart ContractsAgricultural supply chainImproves data integrityDependent on distributed storage
Garcia et al. [166]Smart contracts in PBFT-based blockchains for medical prescriptionsPBFT Blockchain (Tendermint, Hyperledger Besu) + Smart ContractsDecentralized e-prescription systemEfficient for multi-stakeholder applicationsLimited scalability compared to PoW-based solutions
Agrawal et al. [167]Blockchain-based supply chain collaboration frameworkEthereum + Smart ContractsSupply chain collaborationEnsures data authenticity and quality in supply networksChallenges in integration with existing supply chains
Table 22. Comparison of smart contract access control and resource management research.
Table 22. Comparison of smart contract access control and resource management research.
AuthorCore InnovationMethod/AlgorithmApplication ScenarioAdvantagesLimitations
Zhang et al. [168]ABAC for smart contract access controlABAC modelAccess managementStrong securityHigh computational resources
Karakoc et al. [169]SLA management using SDN-integrated smart contractsSDN + Smart ContractsWireless sensor networksEnergy-efficientSuitable for specific networks
Guo et al. [170]Decentralized database access controlORAM + Parallel ContractsDatabase managementEnhances privacyHigh computational complexity
Table 23. Other blockchain-based privacy protection mechanisms.
Table 23. Other blockchain-based privacy protection mechanisms.
Research IDResearch TitleKey TechnologiesApplication ScenarioMain Contributions
Selvarajan et al. [171]An Artificial Intelligence Lightweight Blockchain Security Model for Security and Privacy in IIoT SystemsBlockchain, AI, AutoencoderIIoTEnhances anomaly detection, optimizes execution time
Wang et al. [172]Blockchain nd Access Control Encryption-Empowered IoT Knowledge SharingBlockchain, Access Control EncryptionIoTAchieves secure and personalized privacy protection
Miao et al. [173]An Intelligent and Privacy-Enhanced Data Sharing Strategy for Blockchain-Empowered IoTBlockchain, BP2PIoTRecords data-sharing processes, improves data quality
Smahi et al. [174]BV-ICVs: A Privacy-Preserving and Verifiable Federated Learning Framework for V2X Environments Using Blockchain and zkSNARKsBlockchain, zkSNARKsVehicular Networks (V2X)Prevents malicious data uploads, enhances privacy protection
Yang et al. [175]An Explainable Federated Learning and Blockchain-Based Secure Credit Modeling MethodBlockchain, Explainable MLFinanceProvides transparent and traceable credit decisions
Firdaus et al. [176]A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular NetworksBlockchain, Differential PrivacyVehicular NetworksImproves privacy protection and traffic prediction
Li et al. [177]Blockchain-Empowered Federated Learning for a 6G Knowledge Base on Distributed Network SecurityBlockchain, Knowledge GraphsNetwork SecuritySecures knowledge transmission, enhances attack tracing
Table 24. Blockchain-integrated FL for privacy protection.
Table 24. Blockchain-integrated FL for privacy protection.
Research IDTitleKey TechnologiesApplication DomainMajor ContributionLimitations
Wan et al. [178]Privacy Protection in Federated Learning Combining Distillation Defense and BlockchainBlockchain, FL, Distillation DefenseGeneralReduces client sensitivity to perturbations, enhances securityHigh computational cost for distillation
Liu et al. [179]BFG: Privacy Protection Framework for Internet of Medical ThingsBlockchain, FL, Differential Privacy, GANHealthcarePrevents poisoning attacks, enhances privacy protectionIncreased storage overhead due to blockchain
Ma et al. proposed [180]Blockchain-Based Privacy-Preserving FL for Mobile CrowdsourcingBlockchain, FL, Chinese Remainder TheoremMobile CrowdsourcingReduces computation and communication costs, improves accuracyVulnerable to model poisoning attacks
Wang et al. [181]Blockchain-Based Privacy-Preserving FL for IoVBlockchain, FL, Multi-Krum, Homomorphic EncryptionIoVEnsures local model authenticity, encourages participationHomomorphic encryption increases computational burden
Zhao et al. [182]Privacy-Preserving Blockchain-Based FL for IoTBlockchain, FL, Reputation MechanismIoTEnhances decentralized privacy protection and secure data sharingScalability issues with reputation mechanism
Zhu et al. [183]Privacy Protection FL for UAV-MEC NetworksBlockchain, FL, Nonlinear Encryption, RCF DetectionUAV CommunicationProtects UAV data privacy, reduces data pollution impactRequires strong computational resources for encryption
Mo et al. [184]Privacy Data Management Mechanism Based on Blockchain and FLBlockchain, FL, Smart ContractsHealthcareEnsures secure data sharing among medical institutionsHigh complexity in managing smart contracts
Wang et al. [185]Blockchain-Enabled FL for Privacy-Preserving Non-IID Data SharingBlockchain, FL, Dynamic Gradient ClippingIndustrial InternetAddresses non-IID data issue, improves training accuracyPotential privacy leakage in gradient sharing
Zhang et al. [186]Secure and Decentralized FL for Non-IID DataBlockchain, FL, Hierarchical Shared PoolDistributed ComputingImproves accuracy of FL with non-IID dataHigh communication cost due to model synchronization
Table 25. Blockchain-integrated federated learning for privacy protection.
Table 25. Blockchain-integrated federated learning for privacy protection.
Research IDResearch TitleKey TechnologiesApplication ScenarioMain ContributionsLimitations
Myrzashova et al. [187]Blockchain-Enabled FL for Medical Data SharingBlockchain, FLHealthcareImproves privacy in medical data sharing, supports disease predictionHigh latency in blockchain transactions
Rabbani et al. [188]Enhancing Security in Financial Transactions with Blockchain-Based FLBlockchain, FL, Multiple ML ModelsFinanceDetects fraudulent transactions, enhances privacyLack of real-world deployment and testing
Meng et al. [189]SFedChain: Secure Data Sharing in Energy Storage NetworksBlockchain, FL, Secure ComputingEnergyProtects distributed energy data privacyIncreased computational and storage demands
Zhu et al. [190]Enhancing IoT Supply Chain Security with Blockchain and FLBlockchain, FL, Trusted Execution EnvironmentSupply ChainEnsures secure computation and tamper-resistant dataLimited scalability due to TEE constraints
Jia et al. [191]Blockchain-Based Multi-Task Privacy-Preserving FL FrameworkBlockchain, FL, Partitioned BlockchainIndustrial ApplicationsSupports multiple FL tasks, improves privacyComplexity in multi-task model coordination
Zhang et al. [192]Practical and Privacy-Preserving FL with Verifiable FairnessBlockchain, FL, VRF, Zero-Knowledge ProofGeneralEnsures fairness in FL training, enhances privacyHigh verification cost in real-world implementation
Dong et al. [193]Optimizing Federated Person Re-ID in Smart UAV Delivery SystemsBlockchain, FL, Decentralized MechanismUAV DeliveryPrevents single points of failure, optimizes data privacyLimited effectiveness in dynamic network environments
Dhasaratha et al. [194]Blockchain-Reinforced FL for Scalable IoMT Privacy ProtectionBlockchain, Reinforcement FLHealthcare IoMTImproves data security and communication efficiencyNeeds further validation in large-scale IoMT systems
Li et al. [195]Blockchain-Integrated FL for Multi-Device Privacy ProtectionBlockchain, FL, Reputation MechanismMulti-Device CommunicationEnhances federated learning trust and privacy securityReputation mechanisms may introduce biases
Table 26. Comparison of AI-driven blockchain-based data retrieval and storage approaches.
Table 26. Comparison of AI-driven blockchain-based data retrieval and storage approaches.
StudyApplication DomainBlockchain PlatformAI Techniques UsedPrivacy/Security MechanismsMain Contributions
Almaiah et al. [201]Digital HealthcareBlockchain + IoTAI-based authenticationLightweight encryption for IoT securityProvides a hybrid authentication model for healthcare.
Singh et al. [203]Smart EnterprisesBlockchainAugmented IntelligenceBlockchain-based trust managementImproves enterprise security and trust management.
Wang et al. [204]Intelligent TransportationHeterogeneous BlockchainFederated Deep LearningHierarchical trust evaluationEnsures low-latency and reliable communication in ITS.
Khan et al. [205]Medical IoT SystemsBlockchainHybrid Deep Neural NetworksSecure Searchable Encryption (Binary Spring Search)Enhances security and reliability in medical data storage and retrieval.
Table 27. Classification of training methods and their application scenarios in blockchain systems.
Table 27. Classification of training methods and their application scenarios in blockchain systems.
CategoryTraining TypeAlgorithms/ArchitecturesBlockchain Application Scenarios
Machine LearningSupervised LearningDecision Tree, SVM, Random Forest, XGBoostSmart contract vulnerability detection, node classification (e.g., XG-PBFT uses XGBoost for node grouping)
Unsupervised LearningK-Means, DBSCAN, PCA, AutoEncoderBlockchain data clustering, address behavior clustering, transaction pattern discovery
Semi-Supervised LearningSelf-training, Co-training, Label PropagationPrivacy-preserving medical data sharing, transaction record analysis, classification with limited labeled data
Reinforcement LearningQ-Learning, DQN, DDPG, PPOConsensus optimization, miner task offloading, block selection strategies, on-chain resource scheduling
Deep LearningCNNLeNet, AlexNet, ResNet, 1D/2D CNNSmart contract vulnerability detection (e.g., CodeNet), image/video pre-processing for on-chain storage, multimodal data indexing
RNN and VariantsLSTM, GRU, Bi-LSTMMulti-label vulnerability prediction in contracts, time-series analysis (e.g., transaction forecasting)
Transformer-based ModelsBERT, GPT, CodeBERT, T5, ViTSmart contract language modeling, code classification, blockchain + NLP (e.g., contract generation, audit tasks)
GANsDCGAN, WGAN, cGAN, CycleGANPrivacy protection, synthetic data generation, adversarial training, identity anonymization in data sharing
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yuan, F.; Zuo, Z.; Jiang, Y.; Shu, W.; Tian, Z.; Ye, C.; Yang, J.; Mao, Z.; Huang, X.; Gu, S.; et al. AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection. Algorithms 2025, 18, 263. https://doi.org/10.3390/a18050263

AMA Style

Yuan F, Zuo Z, Jiang Y, Shu W, Tian Z, Ye C, Yang J, Mao Z, Huang X, Gu S, et al. AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection. Algorithms. 2025; 18(5):263. https://doi.org/10.3390/a18050263

Chicago/Turabian Style

Yuan, Fujiang, Zihao Zuo, Yang Jiang, Wenzhou Shu, Zhen Tian, Chenxi Ye, Junye Yang, Zebing Mao, Xia Huang, Shaojie Gu, and et al. 2025. "AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection" Algorithms 18, no. 5: 263. https://doi.org/10.3390/a18050263

APA Style

Yuan, F., Zuo, Z., Jiang, Y., Shu, W., Tian, Z., Ye, C., Yang, J., Mao, Z., Huang, X., Gu, S., & Peng, Y. (2025). AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection. Algorithms, 18(5), 263. https://doi.org/10.3390/a18050263

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop