AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection
Abstract
:1. Introduction
- Blockchain 1.0 is generally associated with programmable digital cryptocurrencies, with a primary focus on value transfer, such as Bitcoin, digital assets, and online payments. However, this early phase faced limitations in scalability and offered relatively limited functionality [8].
- Blockchain 2.0 is characterized by the introduction of smart contracts, enabling blockchain not only to store and execute computer programs but also to facilitate trusted digital contract management. This trend expanded blockchain applications into the financial sector, supporting stock trading, clearing, private equity, and other services, thereby promoting the digital collaboration of real-world business systems [9].
- Blockchain 3.0 further extends blockchain use beyond the financial sector into broader industries, such as the Internet of Things, mining, electric transport management [10], industrial process optimization [11], privacy protection, and product traceability. By leveraging its decentralized and trustless architecture, blockchain in this phase aims to reduce inter-organizational friction, enhance large-scale collaboration, and drive higher productivity for individuals and enterprises [12].
- Scalability Issues: Due to the inherent limitations of block size and the time-consuming consensus process, blockchain networks struggle with transaction throughput and data storage constraints. These factors significantly limit the efficiency and feasibility of large-scale applications. The scalability challenges faced by common consensus algorithms in blockchain are shown in Table 1.
- Security Risks: The widely used PoW consensus mechanism requires multiple block confirmations—typically at least six—to probabilistically ensure transaction security, leading to delays in finalizing transactions. Moreover, if a single entity gains control of more than 51% of the total network computing power, it could launch a double-spending attack or maliciously fork the blockchain, posing severe threats to the integrity and security of the system. The security issues faced by common consensus algorithms in blockchain are shown in Table 2.
- Privacy Protection Challenges: While blockchain provides a certain degree of anonymity, it is not immune to privacy risks. For instance, attackers can analyze transaction histories and trace network node IP addresses to infer users’ identities. Additionally, improper implementation of decentralized applications (DApps) may lead to unintended exposure of sensitive data, exacerbating privacy concerns and further complicating regulatory compliance.
Consensus Algorithm | Main Scalability Issues | Description |
---|---|---|
PoW | Low Throughput, High Energy Consumption | Block creation is limited by difficulty; TPS is low and hard to scale |
PoS | Node Centralization, Sync Dependency | Requires up-to-date state sync; less suitable for large distributed systems |
DPoS | Limited by Supernodes | Faster than PoW/PoS, but scalability is constrained by limited node participation |
PBFT | O(n⌃2) Message Complexity | High communication overhead; performance degrades with increasing node count |
RAFT | Poor State Sync for Many Nodes | Suitable for small-scale systems only; does not scale well |
Paxos | Complex Implementation, Performance Bottleneck | Multi-phase protocol has high latency and poor scalability |
Consensus Algorithm | Main Security Issues | Description |
---|---|---|
PoW | 51% Attack, Selfish Mining | A single entity controlling 51% of total hash power can manipulate the blockchain; selfish mining leads to temporary forks |
PoS | Rich-get-richer, Long-range Attack, Nothing at Stake | Stake centralization increases over time; easy to rewrite chain history; validators may vote on multiple forks |
DPoS | Centralization Risk, Vote Manipulation | A few supernodes control consensus; voting power can be bought or manipulated |
PBFT | Node Exposure, DoS Attacks | Small node sets are vulnerable to targeted DoS; limited fault tolerance (up to f faulty nodes) |
RAFT | Not Byzantine Fault Tolerant | Cannot defend against malicious nodes; only tolerates crash faults in trusted environments |
Paxos | Weak Byzantine Resistance | Assumes honest behavior; not suitable against data forgery or malicious attacks |
2. Introduction to Related Technologies
2.1. Blockchain
2.1.1. Block Structure
- (1)
- The information encapsulation layer of the block header
- (2)
- The data storage layer of the block structure
- (3)
- The collaborative layer of the security mechanism
2.1.2. Consensus Algorithm
- (1)
- PoW
- (2)
- PoS
- (3)
- DPoS
- (4)
- PBFT
Algorithm 1 DPoS Consensus Process |
|
- (1)
- Client Request: A client initiates the process by signing and sending a transaction request to the primary node.
- (2)
- Pre-Prepare Phase: Upon verifying the client’s request, the primary node broadcasts a PRE-PREPARE message containing a digest of the request.
- (3)
- Prepare Phase: Replica nodes validate the PRE-PREPARE message and broadcast PREPARE messages to all other nodes.
- (4)
- Commit Phase: When a node receives matching PREPARE messages, it broadcasts a COMMIT message.
- (5)
- Reply Phase: After collecting matching COMMIT messages, the node executes the operation and sends a reply to the client.
- (6)
- View Change: If a timeout occurs or the primary is suspected to be faulty, nodes initiate a VIEW-CHANGE protocol to select a new primary node. This multi-phase voting ensures consensus integrity even in the presence of faulty or malicious participants.
Algorithm 2 PBFT Consensus Process |
|
- (5)
- Kafka
- (6)
- Raft
- (7)
- Paxos
Algorithm 3 Raft Consensus Process |
|
2.1.3. Smart Contract
Algorithm 4 Smart Contract Execution Process |
|
2.1.4. Cryptography Technology
- (1)
- Symmetric encryption
- (2)
- Asymmetric encryption
Algorithm 5 Asymmetric Encryption Process |
|
2.2. Artificial Intelligence
2.2.1. Machine Learning
- (1)
- Decision Tree Model
- (2)
- Support Vector Machine Model
- (3)
- Random Forest Model
- (4)
- XGBoost Model
2.2.2. Deep Learning
- (1)
- MLP Model
- (2)
- CNN Model
- Convolutional Layer: As the core component of CNNs, the convolutional layer applies convolutional filters (kernels) that slide over the input data (e.g., image pixel matrices) to perform convolution operations. Different kernels can extract distinct features, such as edges, textures, or higher-level semantic information [98]. Furthermore, convolution operations exhibit weight sharing, meaning that the same kernel is applied across different regions of the input data using identical parameters. This significantly reduces the number of trainable parameters and enhances computational efficiency [99].
- Pooling Layer: The pooling layer is responsible for dimensionality reduction while preserving essential features, thereby reducing computational complexity and improving model robustness. The most common pooling techniques are max pooling and average pooling. Max pooling retains the maximum value in a local region, whereas average pooling computes the mean value. This operation not only enhances computational efficiency but also increases the model’s tolerance to minor spatial transformations [100].
- Fully Connected Layer: The fully connected layer integrates the features extracted from previous layers and is primarily used for classification or regression tasks. In this layer, each neuron is connected to all neurons in the preceding layer, resembling hidden layers in traditional neural networks. Through weighted summation and activation functions, the fully connected layer produces the final classification output or task-specific predictions [101].
- (3)
- LSTM Model
3. AI-Driven Blockchain Solutions
3.1. AI-Driven Consensus Algorithm
3.1.1. AI-Powered Authentication and IoT Consensus Optimization Algorithms
3.1.2. AI-Driven Security and Privacy-Preserving Consensus
3.1.3. AI-Driven Federated Learning and Privacy-Preserving Consensus
3.1.4. AI-Driven Blockchain Consensus Others
3.2. AI-Driven Smart Contract
3.2.1. AI-Driven Smart Contract Security and Vulnerability Detections
- (1)
- Arithmetic Vulnerabilities
- (2)
- Re-entrancy Attacks
- (3)
- Unchecked Calls
- (4)
- Inconsistent Access Control
3.2.2. AI-Driven Smart Contract Optimization and Generation
3.2.3. AI-Driven Smart Contract Applications in Specific Domains
3.2.4. AI-Driven Smart Contract Access Control and Resource Management
3.3. AI-Driven Privacy Protection
- (1)
- Federated-Learning-Based Blockchain Privacy Protection
- (2)
- Other Blockchain-Based Privacy Protection Mechanisms
3.3.1. Other Blockchain-Based Privacy Protection Mechanisms
3.3.2. Federated-Learning-Based Privacy Protection for Blockchain
3.4. AI-Driven Data Storage and Retrieval
4. Discussion and Future Directions
4.1. General Discussion and Future Prospects
- (1)
- Consensus algorithms
- (2)
- Smart Contracts
- (3)
- Privacy protection
- (4)
- Data Retrieval
4.2. Discussion of Open Issues and Future Prospects
5. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Yi, J.; Wang, J.; Tan, L.; Yuan, T. HMM-Based Blockchain Visual Automatic Deployment System. Appl. Sci. 2024, 14, 5722. [Google Scholar] [CrossRef]
- Bouoiyour, J.; Selmi, R. Bitcoin: A beginning of a new phase. Econ. Bull. 2016, 36, 1430–1440. [Google Scholar]
- Nakamoto, S. Bitcoin Technology: A Peer-to-Peer Digital Cash Transaction. Int. J. 2016, 6. [Google Scholar]
- Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015. [Google Scholar]
- Ciaian, P.; Rajcaniova, M.; Kancs, D. The economics of BitCoin price formation. Appl. Econ. 2016, 48, 1799–1815. [Google Scholar] [CrossRef]
- Al-Breiki, H.; Rehman, M.H.U.; Salah, K.; Svetinovic, D. Trustworthy blockchain oracles: Review, comparison, and open research challenges. IEEE Access 2020, 8, 85675–85685. [Google Scholar] [CrossRef]
- Kotey, S.D.; Tchao, E.T.; Ahmed, A.R.; Agbemenu, A.S.; Nunoo-Mensah, H.; Sikora, A.; Welte, D.; Keelson, E. Blockchain interoperability: The state of heterogenous blockchain-to-blockchain communication. IET Commun. 2023, 17, 891–914. [Google Scholar] [CrossRef]
- Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
- Anagnostakis, A.G.; Giannakeas, N.; Tsipouras, M.G.; Glavas, E.; Tzallas, A.T. IoT Micro-Blockchain Fundamentals. Sensors 2021, 21, 2784. [Google Scholar] [CrossRef]
- Hristova, T. Tracking mining company electric vehicles for sustainable development optimization using Distributed Ledger Technologies. J. Sustain. Min. 2024, 23, 299–314. [Google Scholar] [CrossRef]
- Hristova, T.; Mitev, I.; Balev, V. Monitoring of Geotechnical Facilities Through DLT Solution; IOP Conference Series: Earth and Environmental Science; IOP Publishing: Bristol, UK, 2022; Volume 970, p. 012011. [Google Scholar]
- Li, X.; Zheng, Z.; Dai, H.N. When services computing meets blockchain: Challenges and opportunities. J. Parallel Distrib. Comput. 2021, 150, 1–14. [Google Scholar] [CrossRef]
- Treleaven, P.; Brown, R.G.; Yang, D. Blockchain technology in finance. Computer 2017, 55, 14–17. [Google Scholar] [CrossRef]
- Johar, S.; Ahmad, N.; Asher, W.; Cruickshank, H.; Durrani, A. Research and Applied Perspective to Blockchain Technology: A Comprehensive Survey. Appl. Sci. 2021, 11, 6252. [Google Scholar] [CrossRef]
- Wang, X.; Ni, W.; Zha, X.; Yu, G.; Liu, R.P.; Georgalas, N.; Reeves, A. Capacity analysis of public blockchain. Comput. Commun. 2021, 177, 112–124. [Google Scholar] [CrossRef]
- Iqbal, M.; Matulevicius, R. Exploring Sybil and Double-Spending Risks in Blockchain Systems. IEEE Access 2021, 9, 76153–76177. [Google Scholar] [CrossRef]
- He, Y.; Wang, Y.; Qiu, C.; Lin, Q.; Li, J.; Ming, Z. Blockchain-based edge computing resource allocation in IoT: A deep reinforcement learning approach. IEEE Internet Things J. 2020, 8, 2226–2237. [Google Scholar] [CrossRef]
- Islam, A.; Rahim, T.; Masuduzzaman, M.; Shin, S.Y. A blockchain-based artificial intelligence-empowered contagious pandemic situation supervision scheme using internet of drone things. IEEE Wirel. Commun. 2021, 28, 166–173. [Google Scholar] [CrossRef]
- D’souza, S.; Nazareth, D.; Vaz, C.; Shetty, M. Blockchain and AI in pharmaceutical supply chain. In Proceedings of the International Conference on Smart Data Intelligence (ICSMDI 2021), Tamil Nadu, India, 29–30 April 2021. [Google Scholar]
- Suhail, S.; Hussain, R.; Jurdak, R.; Oracevic, A.; Salah, K.; Hong, C.S.; Matulevičius, R. Blockchain-based digital twins: Research trends, issues, and future challenges. ACM Comput. Surv. (CSUR) 2022, 54, 1–34. [Google Scholar] [CrossRef]
- Guergov, S.; Radwan, N. Blockchain convergence: Analysis of issues affecting IoT, AI and blockchain. Int. J. Comput. Inf. Manuf. (IJCIM) 2021, 1, 1–17. [Google Scholar] [CrossRef]
- Yang, Q.; Zhao, Y.; Huang, H.; Xiong, Z.; Kang, J.; Zheng, Z. Fusing blockchain and AI with metaverse: A survey. IEEE Open J. Comput. Soc. 2022, 3, 122–136. [Google Scholar] [CrossRef]
- Kumar, S.; Lim, W.M.; Sivarajah, U.; Kaur, J. Artificial intelligence and blockchain integration in business: Trends from a bibliometric-content analysis. Inf. Syst. Front. 2023, 25, 871–896. [Google Scholar] [CrossRef]
- Junaid, S.B.; Imam, A.A.; Balogun, A.O.; De Silva, L.C.; Surakat, Y.A.; Kumar, G.; Abdulkarim, M.; Shuaibu, A.N.; Garba, A.; Sahalu, Y.; et al. Recent advancements in emerging technologies for healthcare management systems: A survey. Healthcare 2022, 10, 1940. [Google Scholar] [CrossRef] [PubMed]
- Xu, H.; Wu, J.; Pan, Q.; Guan, X.; Guizani, M. A survey on digital twin for industrial internet of things: Applications, technologies and tools. IEEE Commun. Surv. Tutor. 2023, 25, 2569–2598. [Google Scholar] [CrossRef]
- Verma, D.; Okhawilai, M.; Dalapati, G.K.; Ramakrishna, S.; Sharma, A.; Sonar, P.; Krishnamurthy, S.; Biring, S.; Sharma, M. Blockchain technology and AI-facilitated polymers recycling: Utilization, realities, and sustainability. Polym. Compos. 2022, 43, 8587–8601. [Google Scholar] [CrossRef]
- Badidi, E. Edge AI and Blockchain for Smart Sustainable Cities: Promise and Potential. Sustainability 2022, 14, 7609. [Google Scholar] [CrossRef]
- Haddad, A.; Habaebi, M.H.; Islam, M.R.; Hasbullah, N.F.; Zabidi, S.A. Systematic Review on AI-Blockchain Based E-Healthcare Records Management Systems. IEEE Access 2022, 10, 94583–94615. [Google Scholar] [CrossRef]
- Kumar, R.; Singh, D.; Srinivasan, K.; Hu, Y.C. AI-Powered Blockchain Technology for Public Health: A Contemporary Review, Open Challenges, and Future Research Directions. Healthcare 2023, 11, 81. [Google Scholar] [CrossRef]
- Uddin, M.; Obaidat, M.; Manickam, S.; Laghari, S.U.A.; Dandoush, A.; Ullah, H.; Ullah, S.S. Exploring the convergence of Metaverse, Blockchain, and AI: A comprehensive survey of enabling technologies, applications, challenges, and future directions. Wiley Interdiscip. Rev.-Data Min. Knowl. Discov. 2024, 14, e1556. [Google Scholar] [CrossRef]
- Omidian, H. Synergizing blockchain and artificial intelligence to enhance healthcare. Drug Discov. Today 2024, 29, 104111. [Google Scholar] [CrossRef]
- Zhou, Q.; Zhang, H.; Wang, S. Artificial intelligence, big data, and blockchain in food safety. Int. J. Food Eng. 2022, 18, 1–14. [Google Scholar] [CrossRef]
- Yao, Y.; Shi, Y.; Tian, G.; Miao, M.; Susilo, W. PSCBO: A provably secure consensus-based blockchain Oracle. Comput. Stand. Interfaces 2025, 91, 103892. [Google Scholar] [CrossRef]
- Maldonado-Ruiz, D.; Pulval-Dady, A.; Shi, Y.; Wang, Z.; El Madhoun, N.; Torres, J. NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype. Ann. Telecommun. 2024, 79, 881–899. [Google Scholar] [CrossRef]
- Pasdar, A.; Lee, Y.C.; Dong, Z. Connect API with Blockchain: A Survey on Blockchain Oracle Implementation. ACM Comput. Surv. 2023, 55, 1–39. [Google Scholar] [CrossRef]
- Wang, X.; Jiang, X.; Liu, Y.; Wang, J.; Sun, Y. Data Propagation for Low Latency Blockchain Systems. IEEE J. Sel. Areas Commun. 2022, 40, 3631–3644. [Google Scholar] [CrossRef]
- Aki. Digital signatures: A tutorial survey. Computer 1983, 16, 15–24. [Google Scholar]
- Aruna, S.; Maheswari, M.; Saranya, A. Highly Secured Blockchain Based Electronic Voting System Using sha3 and Merkle Root; IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2020; Volume 993, p. 012103. [Google Scholar]
- Mahmud, M.; Sohan, M.S.H.; Reno, S.; Sikder, M.A.B.; Hossain, F.S. Advancements in scalability of blockchain infrastructure through IPFS and dual blockchain methodology. J. Supercomput. 2024, 80, 8383–8405. [Google Scholar] [CrossRef]
- Iyengar, G.; Saleh, F.; Sethuraman, J.; Wang, W. Economics of Permissioned Blockchain Adoption. Manag. Sci. 2023, 69, 3415–3436. [Google Scholar] [CrossRef]
- Liu, Y.; Jia, L.; Wang, X.; Huang, H.; Zhao, Q.; Li, Z.; Sun, Y. CORAL: A blockchain protocol for handling transactions with deadline constraints. Comput. Netw. 2024, 251, 110620. [Google Scholar] [CrossRef]
- Heo, J.W.; Ramachandran, G.S.; Dorri, A.; Jurdak, R. Blockchain Data Storage Optimisations: A Comprehensive Survey. ACM Comput. Surv. 2024, 56, 1–27. [Google Scholar] [CrossRef]
- Hong, L.; Hales, D.N. Blockchain performance in supply chain management: Application in blockchain integration companies. Ind. Manag. Data Syst. 2021, 121, 1969–1996. [Google Scholar] [CrossRef]
- Duan, C.; Jiang, R.; Zhang, Y.; Wu, B.; Li, F.; Duan, Y. Distributed medical data storage model based on blockchain technology. Clust. Comput. 2024, 27, 4757–4777. [Google Scholar] [CrossRef]
- Song, J.; Zhang, P.; Qu, Q.; Bai, Y.; Gu, Y.; Yu, G. Why blockchain needs graph: A survey on studies, scenarios, and solutions. J. Parallel Distrib. Comput. 2023, 180, 104730. [Google Scholar] [CrossRef]
- Liang, W.; Zhang, D.; Lei, X.; Tang, M.; Li, K.C.; Zomaya, A.Y. Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1410–1420. [Google Scholar] [CrossRef]
- Duan, J.; Gu, L.; Wang, W.; Wang, L. Chainknot: Redactable Blockchain Protocol with Forced Synchronization. IEEE Trans. Netw. Sci. Eng. 2024, 11, 3091–3104. [Google Scholar] [CrossRef]
- Rajendra, Y.; Sahu, S.; Subramanian, V.; Shukla, S.K. Storage efficient blockchain models for constrained applications. Clust. Comput. 2023, 26, 2163–2181. [Google Scholar] [CrossRef]
- Connors, C.; Sarkar, D. Survey of prominent blockchain development platforms. J. Netw. Comput. Appl. 2023, 216, 103650. [Google Scholar] [CrossRef]
- Choi, T.M.; Siqin, T. Blockchain in logistics and production from Blockchain 1.0 to Blockchain 5.0: An intra-inter-organizational framework. Transp. Res. Part E-Logist. Transp. Rev. 2022, 160, 102653. [Google Scholar] [CrossRef]
- Rakshit, S.; Jeyaraj, A.; Paul, T. SME Performance Through Blockchain Technologies. J. Comput. Inf. Syst. 2024, 64, 204–218. [Google Scholar] [CrossRef]
- Wang, Y.; Wang, W.; Zeng, Y.; Yang, T. GradingShard: A new sharding protocol to improve blockchain throughput. Peer-to-Peer Netw. Appl. 2023, 16, 1327–1339. [Google Scholar] [CrossRef]
- Xu, S.; Ning, J.; Ma, J.; Huang, X.; Deng, R.H. K-Time Modifiable and Epoch-Based Redactable Blockchain. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4507–4520. [Google Scholar] [CrossRef]
- Qi, N.; Yuan, Y.; Wang, F.Y. DAG-BLOCK: A Novel Architecture for Scaling Blockchain-Enabled Cryptocurrencies. IEEE Trans. Comput. Soc. Syst. 2024, 11, 378–388. [Google Scholar] [CrossRef]
- Noam, O.; Rottenstreich, O. Realizing privacy aspects in blockchain networks. Ann. Telecommun. 2022, 77, 3–12. [Google Scholar] [CrossRef]
- Wang, Y.X.; Hsueh, Y.L. A low-storage synchronization framework for blockchain systems. J. Netw. Comput. Appl. 2024, 231, 103977. [Google Scholar] [CrossRef]
- Wan, J.; Hu, K.; Li, J.; Su, H. AnonymousFox: An Efficient and Scalable Blockchain Consensus Algorithm. IEEE Internet Things J. 2022, 9, 24236–24252. [Google Scholar] [CrossRef]
- Stoyanov, I.; Iliev, T.; Mihaylov, G.; Evstatiev, B.; Sokolov, S. Analysis of the cybersecurity threats in smart grid University of telecommunications and post, Sofia, Bulgaria. In Proceedings of the 2018 IEEE 24th International Symposium for Design and Technology in Electronic Packaging(SIITME), Iasi, Romania, 25–28 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 90–93. [Google Scholar]
- Bikov, T.D.; Iliev, T.B.; Mihaylov, G.Y.; Stoyanov, I.S. Phishing in depth—Modern methods of detection and risk mitigation. In Proceedings of the 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 447–450. [Google Scholar]
- Valchanov, H.; Edikyan, J.; Aleksieva, V. A Study of Wi-Fi Security in City Environment; IOP Conference Series: Materials Science and Engineering; IOP Publishing: Bristol, UK, 2019; Volume 618, p. 012031. [Google Scholar]
- Alam, S.; Shuaib, M.; Khan, W.Z.; Garg, S.; Kaddoum, G.; Hossain, M.S.; Bin Zikria, Y. Blockchain-based Initiatives: Current state and challenges. Comput. Netw. 2021, 198, 108395. [Google Scholar] [CrossRef]
- Xu, L.; Tian, T. Blockchain-enabled enterprise bleaching green regulation banking evolution game analysis. Environ. Dev. Sustain. 2024, 26, 27457–27483. [Google Scholar] [CrossRef]
- Khossravi, A.S.; Chen, Q.; Adelman, R.A. Artificial intelligence in ophthalmology. Curr. Opin. Ophthalmol. 2025, 36, 35–38. [Google Scholar] [CrossRef]
- Galiana, I.; Gudino, L.C.; Gonzalez, P.M. Ethics and artificial intelligence. Rev. Clin. Esp. 2024, 224, 178–186. [Google Scholar] [CrossRef]
- Tsang, Y.P.; Lee, C.K.M. Artificial intelligence in industrial design: A semi-automated literature survey. Eng. Appl. Artif. Intell. 2022, 112, 104884. [Google Scholar] [CrossRef]
- Diaz, B.; Nussbaum, M. Artificial intelligence for teaching and learning in schools: The need for pedagogical intelligence. Comput. Educ. 2024, 217, 105071. [Google Scholar] [CrossRef]
- Khanam, S.; Tanweer, S.; Khalid, S. Artificial Intelligence Surpassing Human Intelligence: Factual or Hoax. Comput. J. 2021, 64, 1832–1839. [Google Scholar] [CrossRef]
- Guo, Y.; Zhang, W.; Qin, Q.; Chen, K.; Wei, Y. Intelligent manufacturing management system based on data mining in artificial intelligence energy-saving resources. Soft Comput. 2023, 27, 4061–4076. [Google Scholar] [CrossRef]
- Carabin, G.; Wehrle, E.; Vidoni, R. A review on energy-saving optimization methods for robotic and automatic systems. Robotics 2017, 6, 39. [Google Scholar] [CrossRef]
- Paryanto; Brossog, M.; Bornschlegl, M.; Franke, J. Reducing the energy consumption of industrial robots in manufacturing systems. Int. J. Adv. Manuf. Technol. 2015, 78, 1315–1328. [Google Scholar] [CrossRef]
- Achiam, J.; Adler, S.; Agarwal, S.; Ahmad, L.; Akkaya, I.; Aleman, F.L.; Almeida, D.; Altenschmidt, J.; Altman, S.; Anadkat, S.; et al. Gpt-4 technical report. arXiv 2023, arXiv:2303.08774. [Google Scholar]
- Liu, A.; Feng, B.; Xue, B.; Wang, B.; Wu, B.; Lu, C.; Zhao, C.; Deng, C.; Zhang, C.; Ruan, C.; et al. Deepseek-v3 technical report. arXiv 2024, arXiv:2412.19437. [Google Scholar]
- Gligorea, I.; Cioca, M.; Oancea, R.; Gorski, A.T.; Gorski, H.; Tudorache, P. Adaptive learning using artificial intelligence in e-learning: A literature review. Educ. Sci. 2023, 13, 1216. [Google Scholar] [CrossRef]
- Turdakov, D.Y.; Avetisyan, A.I.; Arkhipenko, K.V.; Antsiferova, A.V.; Vatolin, D.S.; Volkov, S.S.; Gasnikov, A.V.; Devyatkin, D.A.; Drobyshevsky, M.D.; Kovalenko, A.P.; et al. Trusted Artificial Intelligence: Challenges and Promising Solutions. Dokl. Math. 2022, 106, S9–S13. [Google Scholar] [CrossRef]
- Thai, Q.M.; Nguyen, T.H.; Lenon, G.B.; Phung, H.T.T.; Horng, J.T.; Tran, P.T.; Ngo, S.T. Estimating AChE inhibitors from MCE database by machine learning and atomistic calculations. J. Mol. Graph. Model. 2025, 134, 108906. [Google Scholar] [CrossRef]
- Deb, D.; Arunachalam, V.; Raju, K.S. Daily reservoir inflow prediction using stacking ensemble of machine learning algorithms. J. Hydroinform. 2024, 26, 972–997. [Google Scholar] [CrossRef]
- Ouyang, J.; Wu, M.; Li, X.; Deng, H.; Jin, Z.; Wu, D. NeuroBCI: Multi-Brain to Multi-Robot Interaction Through EEG-Adaptive Neural Networks and Semantic Communications. IEEE Trans. Mob. Comput. 2024, 23, 14622–14637. [Google Scholar] [CrossRef]
- Ning, D.S.; Zhou, Z.Q.; Zhou, S.H.; Chen, J.M. Identification of macrophage differentiation related genes and subtypes linking atherosclerosis plaque processing and metabolic syndrome via integrated bulk and single-cell sequence analysis. Heliyon 2024, 10, 34295. [Google Scholar] [CrossRef] [PubMed]
- Zhou, Y.; Narsilio, G.; Makasis, N.; Soga, K.; Chen, P.; Aye, L. Artificial neural networks for predicting the performance of heat pumps with horizontal ground heat exchangers. Front. Energy Res. 2024, 12, 1423695. [Google Scholar] [CrossRef]
- Zhang, S.; Chen, X.; Ran, X.; Li, Z.; Cao, W. Prioritizing Causation in Decision Trees: A Framework for Interpretable Modeling. Eng. Appl. Artif. Intell. 2024, 133, 108224. [Google Scholar] [CrossRef]
- Cohen-Shapira, N.; Rokach, L. PnT: Born-again tree-based model via fused decision path encoding. Inf. Fusion 2024, 112, 102545. [Google Scholar] [CrossRef]
- Que, Z.; Lin, C.J. One-Class SVM Probabilistic Outputs. IEEE Trans. Neural Netw. Learn. Syst. 2024, 36, 6244–6256. [Google Scholar] [CrossRef]
- Han, C.; Zou, G.; Yeh, H.G.; Gong, F.; Shi, S.; Chen, H. Intelligent fault prediction with wavelet-SVM fusion in coal mine. Comput. Geosci. 2025, 194, 105744. [Google Scholar] [CrossRef]
- Noroozi, F.; Ghanbarian, G.; Safaeian, R.; Pourghasemi, H.R. Forest fire mapping: A comparison between GIS-based random forest and Bayesian models. Nat. Hazards 2024, 120, 6569–6592. [Google Scholar] [CrossRef]
- Xu, Y.; Li, J.; Wu, A. An XGboost Algorithm Based Model for Financial Risk Prediction. Teh. Vjesn.-Tech. Gaz. 2024, 31, 1898–1907. [Google Scholar] [CrossRef]
- Shua, Q.; Peng, H.; Li, J. Landslide susceptibility prediction modelling based on semi-supervised XGBoost model. Geol. J. 2024, 59, 2655–2667. [Google Scholar] [CrossRef]
- Zhang, C.; Chen, J.; Li, J.; Peng, Y.; Mao, Z. Large language models for human–robot interaction: A review. Biomim. Intell. Robot. 2023, 3, 100131. [Google Scholar] [CrossRef]
- Gao, Y.; Jiang, Y.; Peng, Y.; Yuan, F.; Zhang, X.; Wang, J. Medical Image Segmentation: A Comprehensive Review of Deep Learning-Based Methods. Tomography 2025, 11, 52. [Google Scholar] [CrossRef]
- Bai, X.; Peng, Y.; Li, D.; Liu, Z.; Mao, Z. Novel soft robotic finger model driven by electrohydrodynamic (EHD) pump. J. Zhejiang Univ.-Sci. A 2024, 25, 596–604. [Google Scholar] [CrossRef]
- Mao, Z.; Bai, X.; Peng, Y.; Shen, Y. Design, modeling, and characteristics of ring-shaped robot actuated by functional fluid. J. Intell. Mater. Syst. Struct. 2024, 35, 1459–1470. [Google Scholar] [CrossRef]
- Peng, Y.; Wang, Y.; Hu, F.; He, M.; Mao, Z.; Huang, X.; Ding, J. Predictive modeling of flexible EHD pumps using Kolmogorov–Arnold Networks. Biomim. Intell. Robot. 2024, 4, 100184. [Google Scholar] [CrossRef]
- Mao, Z.; Peng, Y.; Hu, C.; Ding, R.; Yamada, Y.; Maeda, S. Soft computing-based predictive modeling of flexible electrohydrodynamic pumps. Biomim. Intell. Robot. 2023, 3, 100114. [Google Scholar] [CrossRef]
- Peng, Y.; Sakai, Y.; Funabora, Y.; Yokoe, K.; Aoyama, T.; Doki, S. Funabot-Sleeve: A Wearable Device Employing McKibben Artificial Muscles for Haptic Sensation in the Forearm. IEEE Robot. Autom. Lett. 2025, 1–8. [Google Scholar] [CrossRef]
- Mao, Z.; Kobayashi, R.; Nabae, H.; Suzumori, K. Multimodal strain sensing system for shape recognition of tensegrity structures by combining traditional regression and deep learning approaches. IEEE Robot. Autom. Lett. 2024, 9, 10050–10056. [Google Scholar] [CrossRef]
- Mao, Z.; Hosoya, N.; Maeda, S. Flexible electrohydrodynamic fluid-driven valveless water pump via immiscible interface. Cyborg Bionic Syst. 2024, 5, 0091. [Google Scholar] [CrossRef]
- Lau, S.L.; Lim, J.; Chong, E.K.; Wang, X. Single-pixel image reconstruction based on block compressive sensing and convolutional neural network. Int. J. Hydromechatron. 2023, 6, 258–273. [Google Scholar] [CrossRef]
- Verma, H.; Siruvuri, S.V.; Budarapu, P. A machine learning-based image classification of silicon solar cells. Int. J. Hydromechatron. 2024, 7, 49–66. [Google Scholar] [CrossRef]
- Alawi, O.A.; Kamar, H.M.; Shawkat, M.M.; Al-Ani, M.M.; Mohammed, H.A.; Homod, R.Z.; Wahid, M.A. Artificial intelligence-based viscosity prediction of polyalphaolefin-boron nitride nanofluids. Int. J. Hydromechatron. 2024, 7, 89–112. [Google Scholar] [CrossRef]
- Tian, Z.; Zhao, D.; Lin, Z.; Flynn, D.; Zhao, W.; Tian, D. Balanced reward-inspired reinforcement learning for autonomous vehicle racing. In Proceedings of the 6th Annual Learning for Dynamics & Control Conference, PMLR, Oxford, UK, 15–17 July 2024; pp. 628–640. [Google Scholar]
- Tian, Z.; Zhao, D.; Lin, Z.; Zhao, W.; Flynn, D.; Jiang, Y.; Tian, D.; Zhang, Y.; Sun, Y. Efficient and balanced exploration-driven decision making for autonomous racing using local information. IEEE Trans. Intell. Veh. 2024, 1–17. [Google Scholar] [CrossRef]
- Lin, Z.; Tian, Z.; Zhang, Q.; Ye, Z.; Zhuang, H.; Lan, J. A conflicts-free, speed-lossless KAN-based reinforcement learning decision system for interactive driving in roundabouts. arXiv 2024, arXiv:2408.08242. [Google Scholar]
- Tian, Z.; Lin, Z.; Zhao, D.; Zhao, W.; Flynn, D.; Ansari, S.; Wei, C. Evaluating Scenario-based Decision-making for Interactive Autonomous Driving Using Rational Criteria: A Survey. arXiv 2025, arXiv:2501.01886. [Google Scholar]
- Lin, Z.; Tian, Z.; Zhang, Q.; Zhuang, H.; Lan, J. Enhanced visual slam for collision-free driving with lightweight autonomous cars. Sensors 2024, 24, 6258. [Google Scholar] [CrossRef] [PubMed]
- Lin, Z.; Zhang, Q.; Tian, Z.; Yu, P.; Lan, J. DPL-SLAM: Enhancing dynamic point-line SLAM through dense semantic methods. IEEE Sens. J. 2024, 24, 14596–14607. [Google Scholar] [CrossRef]
- Radanliev, P. Cyber diplomacy: Defining the opportunities for cybersecurity and risks from Artificial Intelligence, IoT, Blockchains, and Quantum Computing. J. Cyber Secur. Technol. 2025, 9, 28–78. [Google Scholar] [CrossRef]
- Yun, D.; Wu, X.; Chen, X.; Yang, Y.; Shang, Y.; Liu, S.; Gunasekeran, D.V.; Lin, D.; Liu, L.; Zhao, L.; et al. An Artificial Intelligence and Blockchain technology-based data management framework for multicenter randomized controlled trials. Sci. Bull. 2025, 70, 856–860. [Google Scholar] [CrossRef]
- Kwangmuang, P.; Somabut, A.; Duangngern, P.; Changpetch, S.; Dhithjaroen, C.; Techapornpong, O.; Sarakan, P.; Chaijaroen, S.; Samat, C. Designing an AI-enhanced blockchain and FinTech curriculum for youth: A case study of educational and industrial collaboration. Educ. Inf. Technol. 2025, 1–37. [Google Scholar] [CrossRef]
- Zheng, J.; Zhang, Y. TRBFT: An Efficient Blockchain Consensus for Edge Computing-Enabled IoT Systems. IEEE Internet Things J. 2025. [Google Scholar] [CrossRef]
- Zhao, C.; Zhou, Y.; Zhang, S.; Sheng, Q.Z.; Zhang, Y.; Wen, S. ExClique: An Express Consensus Algorithm for High-Speed Transaction Process in Blockchains. arXiv 2025, arXiv:2501.15289. [Google Scholar]
- Sahraoui, S.; Bachir, A. Lightweight Consensus Mechanisms in the Internet of Blockchained Things: Thorough Analysis and Research Directions. Digit. Commun. Netw. 2025, in press. [Google Scholar] [CrossRef]
- Xing, Z.; Zhang, Z.; Zhang, Z.; Li, Z.; Li, M.; Liu, J.; Zhang, Z.; Zhao, Y.; Sun, Q.; Zhu, L.; et al. Zero-Knowledge Proof-Based Verifiable Decentralized Machine Learning in Communication Network: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2025, 1. [Google Scholar] [CrossRef]
- Verma, S.; Chandra, G.; Yadav, D. LVCA: An efficient voting-based consensus algorithm in private Blockchain for enhancing data security. Peer-to-Peer Netw. Appl. 2025, 18, 1–19. [Google Scholar] [CrossRef]
- St-Laurent, G.P.; Le Billon, P. Staking claims and shaking hands: Impact and benefit agreements as a technology of government in the mining sector. Extr. Ind. Soc. 2015, 2, 590–602. [Google Scholar] [CrossRef]
- Naeem, M.; Khan, A.; Rehman, A.; Farooq, S.; Mehboob, A.; Abdali, A.S.; Ahmad, B. Does Artificial Intelligence with Blockchain Reduce the Costs of the Financial Sector? In Generative AI for Web Engineering Models; IGI Global: Hershey, PA, USA, 2025; pp. 147–160. [Google Scholar]
- Villegas-Ch, W.; Govea, J.; Gurierrez, R.; Mera-Navarrete, A. Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and Blockchain Models: A Scalable and Efficient Approach for Threat Detection. IEEE Access 2025, 13, 16933–16958. [Google Scholar] [CrossRef]
- Dutta, J.; Puthal, D. PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow. Future Gener. Comput. Syst.-Int. J. Escience 2024, 161, 655–672. [Google Scholar] [CrossRef]
- Sun, C.; Li, D.; Wang, B.; Song, J. AI-Enabled Consensus Algorithm in Human-Centric Collaborative Computing for Internet of Vehicle. Symmetry 2023, 15, 1264. [Google Scholar] [CrossRef]
- Alruwaili, F.F. Ensuring data integrity in deep learning-assisted IoT-Cloud environments: Blockchain-assisted data edge verification with consensus algorithms. AIMS Math. 2024, 9, 8868–8884. [Google Scholar] [CrossRef]
- Vaiyapuri, T.; Shankar, K.; Rajendran, S.; Kumar, S.; Acharya, S.; Kim, H. Blockchain Assisted Data Edge Verification With Consensus Algorithm for Machine Learning Assisted IoT. IEEE Access 2023, 11, 55370–55379. [Google Scholar] [CrossRef]
- Zhang, Z.; Guo, B.; Shen, Y.; Li, C.; Suo, X.; Su, H. Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing. Secur. Commun. Netw. 2021, 2021, 6629433. [Google Scholar] [CrossRef]
- Sasikumar, A.; Ravi, L.; Kotecha, K.; Saini, J.R.R.; Varadarajan, V.; Subramaniyaswamy, V. Sustainable Smart Industry: A Secure and Energy Efficient Consensus Mechanism for Artificial Intelligence Enabled Industrial Internet of Things. Comput. Intell. Neurosci. 2022, 2022, 1419360. [Google Scholar] [CrossRef] [PubMed]
- Kumar, P.; Javeed, D.; Kumar, R.; Islam, A.K.M.N. Blockchain and explainable AI for enhanced decision making in cyber threat detection. Softw.-Pract. Exp. 2024, 54, 1337–1360. [Google Scholar] [CrossRef]
- Kim, S.K. Automotive Vulnerability Analysis for Deep Learning Blockchain Consensus Algorithm. Electronics 2022, 11, 119. [Google Scholar] [CrossRef]
- Cui, C.; Du, H.; Jia, Z.; He, Y.; Wang, L. Blockchain-Enabled Federated Learning with Differential Privacy for Internet of Vehicles. CMC-Comput. Mater. Contin. 2024, 81, 1581–1593. [Google Scholar] [CrossRef]
- Wang, Y.; Peng, H.; Su, Z.; Luan, T.H.; Benslimane, A.; Wu, Y. A Platform-Free Proof of Federated Learning Consensus Mechanism for Sustainable Blockchains. IEEE J. Sel. Areas Commun. 2022, 40, 3305–3324. [Google Scholar] [CrossRef]
- Deng, Q. Blockchain Economical Models, Delegated Proof of Economic Value and Delegated Adaptive Byzantine Fault Tolerance and their implementation in Artificial Intelligence BlockCloud. J. Risk Financ. Manag. 2019, 12, 177. [Google Scholar] [CrossRef]
- Alrubei, S.M.; Ball, E.; Rigelsford, J.M. The Use of Blockchain to Support Distributed AI Implementation in IoT Systems. IEEE Internet Things J. 2022, 9, 14790–14802. [Google Scholar] [CrossRef]
- Zhi, H.; Wu, H.; Huang, Y.; Tian, C.; Wang, S. Blockchain Consensus Scheme Based on the Proof of Distributed Deep Learning Work. IET Softw. 2025, 2025, 3378383. [Google Scholar] [CrossRef]
- Jogunola, O.; Adebisi, B.; Ikpehai, A.; Popoola, I.S.; Gui, G.; Gacanin, H.; Ci, S. Consensus Algorithms and Deep Reinforcement Learning in Energy Market: A Review. IEEE Internet Things J. 2021, 8, 4211–4227. [Google Scholar] [CrossRef]
- Goh, Y.; Yun, J.; Jung, D.; Chung, J.M. Secure Trust-Based Delegated Consensus for Blockchain Frameworks Using Deep Reinforcement Learning. IEEE Access 2022, 10, 118498–118511. [Google Scholar] [CrossRef]
- Kim, S.K. Blockchain Smart Contract to Prevent Forgery of Degree Certificates: Artificial Intelligence Consensus Algorithm. Electronics 2022, 11, 2112. [Google Scholar] [CrossRef]
- Chen, Z.; Yu, Z. Intelligent Offloading in Blockchain-Based Mobile Crowdsensing Using Deep Reinforcement Learning. IEEE Commun. Mag. 2023, 61, 118–123. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, H.; Zhang, J.; Ge, Y.; Cui, K.; Peng, Z.; Li, Z.; Wang, L. An Improved Practical Byzantine Fault-Tolerant Algorithm Based on XGBoost Grouping for Consortium Chains. Comput. Mater. Contin. 2025, 82, 1295–1311. [Google Scholar] [CrossRef]
- Xiao, J.; Luo, T.; Li, C.; Zhou, J.; Li, Z. CE-PBFT: A high availability consensus algorithm for large-scale consortium blockchain. J. King Saud Univ.-Comput. Inf. Sci. 2024, 36, 101957. [Google Scholar] [CrossRef]
- Yuan, F.; Huang, X.; Zheng, L.; Wang, L.; Wang, Y.; Yan, X.; Gu, S.; Peng, Y. The Evolution and Optimization Strategies of a PBFT Consensus Algorithm for Consortium Blockchains. Information 2025, 16, 268. [Google Scholar] [CrossRef]
- Lyu, Q.; Ma, C.; Shen, Y.; Jiao, S.; Sun, Y.; Hu, L. Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency. CMES-Comput. Model. Eng. Sci. 2023, 135, 1625–1647. [Google Scholar] [CrossRef]
- Yang, H.; Gu, X.; Chen, X.; Zheng, L.; Cui, Z. CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection. Sci. Comput. Program. 2024, 234, 103076. [Google Scholar] [CrossRef]
- Gao, Z.; Jiang, L.; Xia, X.; Lo, D.; Grundy, J. Checking Smart Contracts with Structural Code Embedding. IEEE Trans. Softw. Eng. 2021, 47, 2874–2891. [Google Scholar] [CrossRef]
- Wei, Z.; Sun, J.; Zhang, Z.; Zhang, X.; Yang, X.; Zhu, L. Survey on Quality Assurance of Smart Contracts. ACM Comput. Surv. 2025, 57, 1–36. [Google Scholar] [CrossRef]
- Vidal, F.R.; Ivaki, N.; Laranjeiro, N. OpenSCV: An open hierarchical taxonomy for smart contract vulnerabilities. Empir. Softw. Eng. 2024, 29, 101. [Google Scholar] [CrossRef]
- Wang, W.; Xia, L.; Zhang, Z.; Meng, X. Smart Contract Timestamp Vulnerability Detection Based on Code Homogeneity. IEICE Trans. Inf. Syst. 2024, E107D, 1362–1366. [Google Scholar] [CrossRef]
- Fei, J.; Chen, X.; Zhao, X. MSmart: Smart Contract Vulnerability Analysis and Improved Strategies Based on Smartcheck. Appl. Sci. 2023, 13, 1733. [Google Scholar] [CrossRef]
- Chen, J.; Xia, X.; Lo, D.; Grundy, J.; Luo, X.; Chen, T. DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. IEEE Trans. Softw. Eng. 2021, 48, 2189–2207. [Google Scholar] [CrossRef]
- Lin, Z.; Chen, J.; Wu, J.; Zhang, W.; Wang, Y.; Zheng, Z. CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts. IEEE Trans. Softw. Eng. 2024, 50, 1534–1547. [Google Scholar] [CrossRef]
- Wu, H.; Dong, H.; He, Y.; Duan, Q. Smart Contract Vulnerability Detection Based on Hybrid Attention Mechanism Model. Appl. Sci. 2023, 13, 770. [Google Scholar] [CrossRef]
- Zhang, L.; Chen, W.; Wang, W.; Jin, Z.; Zhao, C.; Cai, Z.; Chen, H. CBGRU: A Detection Method of Smart Contract Vulnerability Based on a Hybrid Model. Sensors 2022, 22, 3577. [Google Scholar] [CrossRef] [PubMed]
- Hwang, S.J.; Choi, S.H.; Shin, J.; Choi, Y.H. CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability Detection. IEEE Access 2022, 10, 32595–32607. [Google Scholar] [CrossRef]
- Gao, C.; Yang, W.; Ye, J.; Xue, Y.; Sun, J. sGUARD plus: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts. ACM Trans. Softw. Eng. Methodol. 2024, 33, 114. [Google Scholar] [CrossRef]
- Ivanov, N.; Yan, Q.; Kompalli, A. TxT: Real-Time Transaction Encapsulation for Ethereum Smart Contracts. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1141–1155. [Google Scholar] [CrossRef]
- Yu, R.; Zhang, Y.; Wang, Y.; Liu, C. TxMirror: When the Dynamic EVM Stack Meets Transactions for Smart Contract Vulnerability Detection. Symmetry 2023, 15, 1345. [Google Scholar] [CrossRef]
- Li, J.; Lu, G.; Gao, Y.; Gao, F. A Smart Contract Vulnerability Detection Method Based on Multimodal Feature Fusion and Deep Learning. Mathematics 2023, 11, 4823. [Google Scholar] [CrossRef]
- Pasqua, M.; Benini, A.; Contro, F.; Crosara, M.; Dalla Preda, M.; Ceccato, M. Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode. J. Syst. Softw. 2023, 200, 111653. [Google Scholar] [CrossRef]
- Qian, S.; Ning, H.; He, Y.; Chen, M. Multi-Label Vulnerability Detection of Smart Contracts Based on Bi-LSTM and Attention Mechanism. Electronics 2022, 11, 3260. [Google Scholar] [CrossRef]
- Qian, P.; He, J.; Lu, L.; Wu, S.; Lu, Z.; Wu, L.; Zhou, Y.; He, Q. Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. IEEE Trans. Softw. Eng. 2023, 49, 3793–3810. [Google Scholar] [CrossRef]
- Le, T.T.H.; Kim, J.; Lee, S.; Kim, H. Robust Vulnerability Detection in Solidity-Based Ethereum Smart Contracts Using Fine-Tuned Transformer Encoder Models. IEEE Access 2024, 12, 154700–154717. [Google Scholar] [CrossRef]
- Wang, M.; Xie, Z.; Wen, X.; Li, J.; Zhou, K. Ethereum Smart Contract Vulnerability Detection Model Based on Triplet Loss and BiLSTM. Electronics 2023, 12, 2327. [Google Scholar] [CrossRef]
- Park, J.; Jeong, S.; Yeom, K. Smart Contract Broker: Improving Smart Contract Reusability in a Blockchain Environment. Sensors 2023, 23, 6149. [Google Scholar] [CrossRef]
- Sanchez-Gomez, N.; Torres-Valderrama, J.; Mejias Risoto, M.; Garrido, A. Blockchain Smart Contract Meta-modeling. J. Web Eng. 2021, 20, 2059–2079. [Google Scholar] [CrossRef]
- Gec, S.; Stankovski, V.; Lavbic, D.; Kochovski, P. A Recommender System for Robust Smart Contract Template Classification. Sensors 2023, 23, 639. [Google Scholar] [CrossRef]
- Chen, Y.; Hu, D.; Xu, C.; Chen, N. An Annotation Assisted Smart Contracts Generation Method. IEEE Access 2024, 12, 51485–51499. [Google Scholar] [CrossRef]
- Tong, Y.; Tan, W.; Guo, J.; Shen, B.; Qin, P.; Zhuo, S. Smart Contract Generation Assisted by AI-Based Word Segmentation. Appl. Sci. 2022, 12, 4773. [Google Scholar] [CrossRef]
- Margret, M.K.; Julie, E.G. Smarter and resilient smart contracts applications for smart cities environment using blockchain technology. Automatika 2024, 65, 572–583. [Google Scholar] [CrossRef]
- Zhang, L.; Kim, D. A Peer-to-Peer Smart Food Delivery Platform Based on Smart Contract. Electronics 2022, 11, 1806. [Google Scholar] [CrossRef]
- Zhang, X.; Liu, C.; Medda, F. A Smart-Contract-Aided Plastic Credit Scheme. IEEE Syst. J. 2023, 17, 1703–1713. [Google Scholar] [CrossRef]
- Wang, L.; Xu, L.; Zheng, Z.; Liu, S.; Li, X.; Cao, L.; Li, J.; Sun, C. Smart Contract-Based Agricultural Food Supply Chain Traceability. IEEE Access 2021, 9, 9296–9307. [Google Scholar] [CrossRef]
- Garcia, R.D.; Ramachandran, G.; Ueyama, J. Exploiting smart contracts in PBFT-based blockchains: A case study in medical prescription system. Comput. Netw. 2022, 211, 109003. [Google Scholar] [CrossRef]
- Agrawal, T.K.; Angelis, J.; Khilji, W.A.; Kalaiarasan, R.; Wiktorsson, M. Demonstration of a blockchain-based framework using smart contracts for supply chain collaboration. Int. J. Prod. Res. 2023, 61, 1497–1516. [Google Scholar] [CrossRef]
- Zhang, Y.; Yutaka, M.; Sasabe, M.; Kasahara, S. Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework. IEEE Internet Things J. 2021, 8, 6372–6384. [Google Scholar] [CrossRef]
- Karakoc, E.; Ceken, C. Secure SLA Management Using Smart Contracts for SDN-Enabled WSN. KSII Trans. Internet Inf. Syst. 2023, 17, 3003–3029. [Google Scholar] [CrossRef]
- Guo, Z.Y.; Chen, Y.C.; Lin, H.P. Oblivious Access for Decentralized Database Systems: A New Asymmetric Framework from Smart Contracts. Symmetry 2022, 14, 680. [Google Scholar] [CrossRef]
- Selvarajan, S.; Srivastava, G.; Khadidos, A.O.; Khadidos, A.O.; Baza, M.; Alshehri, A.; Lin, J.C.W. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud-Comput.-Adv. Syst. Appl. 2023, 12, 38. [Google Scholar] [CrossRef]
- Wang, J.; Li, J. Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated Personalized Privacy-Preserving Federated Learning. Appl. Sci. 2024, 14, 1743. [Google Scholar] [CrossRef]
- Miao, Q.; Lin, H.; Hu, J.; Wang, X. An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things. Digit. Commun. Netw. 2022, 8, 636–643. [Google Scholar] [CrossRef]
- Smahi, A.; Li, H.; Yang, Y.; Yang, X.; Lu, P.; Zhong, Y.; Liu, C. BV-ICVs: A privacy-preserving and verifiable federated learning framework for V2X environments using blockchain and zkSNARKs. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101542. [Google Scholar] [CrossRef]
- Yang, F.; Abedin, m.Z.; Hajek, P. An explainable federated learning and blockchain-based secure credit modeling method. Eur. J. Oper. Res. 2024, 317, 449–467. [Google Scholar] [CrossRef]
- Firdaus, M.; Larasati, H.T.; Rhee, K.H. A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks. CMC-Comput. Mater. Contin. 2023, 76, 2959–2978. [Google Scholar] [CrossRef]
- Li, K.; Zhou, H.; Tu, Z.; Liu, F.; Zhang, H. Blockchain Empowered Federated Learning for Distributed Network Security Behaviour Knowledge Base in 6G. Secur. Commun. Netw. 2022, 2022, 4233238. [Google Scholar] [CrossRef]
- Wan, C.; Wang, Y.; Xu, J.; Wu, J.; Zhang, T.; Wang, Y. Research on Privacy Protection in Federated Learning Combining Distillation Defense and Blockchain. Electronics 2024, 13, 679. [Google Scholar] [CrossRef]
- Liu, W.; He, Y.; Wang, X.; Duan, Z.; Liang, W.; Liu, Y. BFG: Privacy protection framework for internet of medical things based on blockchain and federated learning. Connect. Sci. 2023, 35. [Google Scholar] [CrossRef]
- Ma, H.; Huang, S.; Guo, J.; Lam, K.Y.; Yang, T. Blockchain-Based Privacy-Preserving Federated Learning for Mobile Crowdsourcing. IEEE Internet Things J. 2024, 11, 13884–13899. [Google Scholar] [CrossRef]
- Wang, N.; Yang, W.; Wang, X.; Wu, L.; Guan, Z.; Du, X.; Guizani, M. A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. Digit. Commun. Netw. 2024, 10, 126–134. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D.; Li, Z.; Lyu, L.; Liu, Y. Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices. IEEE Internet Things J. 2021, 8, 1817–1829. [Google Scholar] [CrossRef]
- Zhu, C.; Zhu, X.; Qin, T. An Efficient Privacy Protection Mechanism for Blockchain-Based Federated Learning System in UAV-MEC Networks. Sensors 2024, 24, 1364. [Google Scholar] [CrossRef]
- Mo, M.; Ji, S.; Wang, X.; Mohiuddin, G.; Ren, Y. Privacy Data Management Mechanism Based on Blockchain and Federated Learning. CMC-Comput. Mater. Contin. 2023, 74, 37–53. [Google Scholar] [CrossRef]
- Wang, Q.; Dong, H.; Huang, Y.; Liu, Z.; Gou, Y. Blockchain-Enabled Federated Learning for Privacy-Preserving Non-IID Data Sharing in Industrial Internet. CMC-Comput. Mater. Contin. 2024, 80, 1967–1983. [Google Scholar] [CrossRef]
- Zhang, F.; Zhang, Y.; Ji, S.; Han, Z. Secure and decentralized federated learning framework with non-IID data based on blockchain. Heliyon 2024, 10, e27176. [Google Scholar] [CrossRef]
- Myrzashova, R.; Alsamhi, S.H.; Hawbani, A.; Curry, E.; Guizani, M.; Wei, X. Safeguarding Patient Data-Sharing: Blockchain-Enabled Federated Learning in Medical Diagnostics. IEEE Trans. Sustain. Comput. 2025, 10, 176–189. [Google Scholar] [CrossRef]
- Rabbani, H.; Shahid, M.F.; Khanzada, T.J.S.; Siddiqui, S.; Jamjoom, M.M.; Ashari, R.B.; Ullah, Z.; Mukati, M.U.; Nooruddin, M. Enhancing security in financial transactions: A novel blockchain-based federated learning framework for detecting counterfeit data in fintech. PeerJ Comput. Sci. 2024, 10, e2280. [Google Scholar] [CrossRef]
- Meng, M.; Li, Y. SFedChain: Blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks. PeerJ Comput. Sci. 2022, 8, e1027. [Google Scholar] [CrossRef]
- Zhu, L.; Hu, S.; Zhu, X.; Meng, C.; Huang, M. Enhancing the Security and Privacy in the IoT Supply Chain Using Blockchain and Federated Learning with Trusted Execution Environment. Mathematics 2023, 11, 3759. [Google Scholar] [CrossRef]
- Jia, Y.; Xiong, L.; Fan, Y.; Liang, W.; Xiong, N.; Xiao, F. Blockchain-based privacy-preserving multi-tasks federated learning framework. Connect. Sci. 2024, 36. [Google Scholar] [CrossRef]
- Zhang, Y.; Tang, Y.; Zhang, Z.; Li, M.; Li, Z.; Khan, S.; Chen, H.; Cheng, G. Blockchain-Based Practical and Privacy-Preserving Federated Learning with Verifiable Fairness. Mathematics 2023, 11, 1091. [Google Scholar] [CrossRef]
- Dong, C.; Zhou, J.; An, Q.; Jiang, F.; Chen, S.; Pan, L.; Liu, X. Optimizing Performance in Federated Person Re-Identification through Benchmark Evaluation for Blockchain-Integrated Smart UAV Delivery Systems. Drones 2023, 7, 413. [Google Scholar] [CrossRef]
- Dhasaratha, C.; Hasan, M.K.; Islam, S.; Khapre, S.; Abdullah, S.; Ghazal, T.M.; Alzahrani, A.I.; Alalwan, N.; Vo, N.; Akhtaruzzaman, M. Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things. CAAI Trans. Intell. Technol. 2024. [Google Scholar] [CrossRef]
- Li, K. A Blockchain-Integrated Federated Learning Approach for Secure Data Sharing and Privacy Protection in Multi-Device Communication. Appl. Artif. Intell. 2025, 39. [Google Scholar] [CrossRef]
- Cai, C.; Xu, L.; Zhou, A.; Wang, R.; Wang, C.; Wang, Q. EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 1887–1896. [Google Scholar] [CrossRef]
- Shen, H.; Wang, T.; Chen, J.; Tao, Y.; Chen, F. Blockchain-Based Batch Authentication Scheme for Internet of Vehicles. IEEE Trans. Veh. Technol. 2024, 73, 7866–7879. [Google Scholar] [CrossRef]
- Shinde, R.; Patil, S.; Kotecha, K.; Ruikar, K. Blockchain for Securing AI Applications and Open Innovations. J. Open Innov. Technol. Mark. Complex. 2021, 7, 189. [Google Scholar] [CrossRef]
- Khan, J.A.; Bangalore, K.U.; Kurkcu, A.; Ozbay, K. TREAD: Privacy Preserving Incentivized Connected Vehicle Mobility Data Storage on InterPlanetary-File-System-Enabled Blockchain. Transp. Res. Rec. 2021, 2676, 680–691. [Google Scholar] [CrossRef]
- Yiu, N.C.K. Decentralizing Supply Chain Anti-Counterfeiting and Traceability Systems Using Blockchain Technology. Future Internet 2021, 13, 84. [Google Scholar] [CrossRef]
- Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. An AI—Enabled Hybrid Lightweight Authentication Model for Digital Healthcare Using Industrial Internet of Things Cyber-Physical Systems. Sensors 2022, 22, 1448. [Google Scholar] [CrossRef] [PubMed]
- Bouachir, O.; Aloqaily, M.; Karray, F.; Saddik, A.E. AI-based Blockchain for the Metaverse: Approaches and Challenges. In Proceedings of the 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), San Antonio, TX, USA, 5–7 September 2022; pp. 231–236. [Google Scholar]
- Singh, S.K.; Park, J.H. TaLWaR: Blockchain-Based Trust Management Scheme for Smart Enterprises With Augmented Intelligence. IEEE Trans. Ind. Inform. 2023, 19, 626–634. [Google Scholar] [CrossRef]
- Wang, X.; Garg, S.; Lin, H.; Kaddoum, G.; Hu, J.; Hassan, M.M. Heterogeneous Blockchain and AI-Driven Hierarchical Trust Evaluation for 5G-Enabled Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2023, 24, 2074–2083. [Google Scholar] [CrossRef]
- Khan, S.; Khan, M.; Khan, M.A.; Khan, M.A.; Wang, L.; Wu, K. A Blockchain-Enabled AI-Driven Secure Searchable Encryption Framework for Medical IoT Systems. IEEE J. Biomed. Health Inform. 2025, 1–14. [Google Scholar] [CrossRef]
Author | Year | Core Mechanics | Pros | Cons |
---|---|---|---|---|
Verma, D. et al. [26] | 2022 | Application of blockchain and AI in plastic recycling. | Improve recycling efficiency and support environmental protection. | Data privacy and security issues not involved; lack of practical cases. |
Badidi, E. et al. [27] | 2022 | Edge AI and blockchain for smart sustainable cities. | Provide smart city application cases to improve infrastructure management. | Lack of blockchain performance optimization and privacy protection solutions. |
Haddad, A. et al. [28] | 2022 | Blockchain + AI for electronic health records. | Solve privacy issues of electronic health records and improve data management efficiency. | Scalability optimization of blockchain not discussed. |
Kumar, R. et al. [29] | 2023 | AI-driven blockchain applications in public health. | Covers multiple public health applications and provides real-world examples. | Lacks adequate discussion on technical challenges and deployment scenarios. |
Uddin, M. et al. [30] | 2024 | Integration of Metaverse, blockchain, and AI. | Innovative analysis emphasizing digital currency and data security. | Lack of factual industry application cases and insufficient in-depth analysis. |
Omidian, H. et al. [31] | 2024 | Synergy of blockchain and AI in healthcare. | Emphasis on data privacy, security, and innovative solutions. | Lack of technical implementation steps and practical issues. |
Zhou, Q. et al. [32] | 2022 | Application of AI, big data, and blockchain in food safety. | Emphasis on data traceability with practical application value. | Lack of in-depth discussion on privacy protection and blockchain optimization. |
Our Survey | 2025 | Comprehensively summarize the optimization role of AI in the four core modules of blockchain (consensus algorithm, smart contract, privacy protection, data retrieval). | Clearly point out the systematic challenges of the four core modules of blockchain (consensus algorithm, smart contract, privacy protection, data retrieval) in scalability, security, and privacy, and analyze them in detail. | Lack of actual case demonstrations in each category. |
Type | Public Blockchain | Consortium Blockchain | Private Blockchain |
---|---|---|---|
Participants | Anyone | Consortium members | Internal to an organization |
Consensus Mechanism | PoW/PoS/DPoS | PBFT/Kafka/BFT | Raft/Paxos |
Incentive Mechanism | Required | Optional | Not required |
Degree of Decentralization | Decentralized | Partially decentralized | (Partially) centralized |
Data Consistency | (weak) consistency | (strong) consistency | (strong) consistency |
Network Scale | Large | Relatively large | Small |
Typical Applications | Cryptocurrencies | Payments | Auditing |
Consensus Algorithm | Core Description | Application Examples | Reward Mechanism | Advantages | Disadvantages |
---|---|---|---|---|---|
PoW | Consensus is achieved through competitive cryptographic puzzles | Bitcoin | Rewards miners with block rewards and transaction fees, but computationally expensive | High security, resistant to Sybil attacks | High energy consumption, low throughput |
PoS | Nodes gain block validation rights based on the amount and duration of cryptocurrency held | Ethereum 2.0 | Holders receive block rewards, malicious actors may be penalized | Low energy consumption, efficient | May lead to wealth centralization |
DPoS | Representatives are elected to validate and confirm transactions | EOS, TRON | Delegates receive rewards, malicious representatives can be voted out | High efficiency, low energy consumption | Potential centralization, risk of delegate collusion |
PBFT | Consensus is reached through multiple rounds of voting, suitable for a small number of nodes | Hyperledger Fabric, financial blockchain | No economic incentives, relies on node trust | Low latency, high throughput | No cryptocurrency incentives, malicious nodes may impact consensus |
Kafka | Consensus is achieved based on a reliable message queue, commonly used in enterprise architectures | Hyperledger Fabric (ordering service) | No economic incentives, relies on access control | High throughput, suitable for private chains | Relies on centralized nodes, single point of failure risk |
Raft | Leader-based replication for log consistency, suitable for small-scale distributed systems | Enterprise private blockchains | No economic incentives | Simple implementation, easy deployment | Limited application scope, performance affected by leader |
Paxos | Achieves consensus in distributed systems through message passing | Google Chubby, AWS DynamoDB | No economic incentives | Suitable for strong consistency databases | High algorithmic complexity, significant communication overhead |
Advantage | Description | Applicable Scenarios | Potential Challenges | Typical Application |
---|---|---|---|---|
Speed, Efficiency, and Accuracy | Automatically executes without human intervention, reducing errors and improving transaction efficiency. | Supply chain, payment settlement | High computational costs, slow execution for complex contracts | Supply chain settlement, insurance claims |
Trust and Transparency | Public and transparent data reduces information asymmetry and enhances trust. | DeFi, government record-keeping | Potential privacy leakage, requires privacy protection technologies | Transparent charity, decentralized exchanges |
Security | Encryption and consensus mechanisms ensure transaction security and immutability. | Identity verification, medical data storage | Code vulnerabilities may be exploited by hackers | Digital identity, electronic health records |
Cost Savings | Reduces reliance on intermediaries, lowering transaction and operational costs. | Finance, real estate | High development and computational costs | Securities clearing, P2P lending |
Automation and Autonomy | Automatically executes when predefined conditions are met, minimizing human intervention. | Logistics, enterprise automation | Immutable code requires rigorous testing | Supply chain payments, smart insurance |
Feature | Symmetric Encryption | Asymmetric Encryption |
---|---|---|
Key Usage | Same key for encryption and decryption | Public key for encryption, private key for decryption |
Security | Vulnerable to key interception | More secure due to separate keys, reducing risk of compromise |
Speed | Encryption and decryption are efficient | Slower due to complex mathematical operations |
Key Distribution | Requires secure key exchange | Only the public key is shared, ensuring security |
Scalability | Difficult to manage as user numbers increase | More scalable as no pre-shared keys are needed |
Usage Scenarios | Bulk data encryption and secure storage | Digital signatures, key exchange, secure communication |
Common Algorithms | DES, 3DES, AES, RC4, RC5, Blowfish | RSA, ECC, DSA, ElGamal |
Comparison Criteria | Supervised Learning | Unsupervised Learning | Semi-Supervised Learning | Reinforcement Learning |
---|---|---|---|---|
Definition | Utilizes labeled data to train models for predicting outputs of new input data. | Employs unlabeled data to discover inherent structures or patterns within the data. | Combines a small amount of labeled data with a large volume of unlabeled data to enhance learning performance. | Involves an agent interacting with the environment to learn strategies that maximize cumulative rewards. |
Data Requirements | Requires a substantial amount of high-quality labeled data. | Needs a large quantity of unlabeled data. | Uses a combination of a small set of labeled data and a large set of unlabeled data. | Gathers data through interactions with the environment, eliminating the need for pre-labeled data. |
Primary Tasks | Classification, regression. | Clustering, dimensionality reduction, association rule learning. | Classification, regression, semi-supervised clustering. | Sequential decision-making, policy optimization. |
Common Algorithms | Linear Regression, Logistic Regression, Support Vector Machine (SVM), Decision Tree, Random Forest, Neural Networks. | K-Means Clustering, Hierarchical Clustering, Principal Component Analysis (PCA), Autoencoders. | Self-training, Autoencoders, Graph-based Semi-Supervised Learning. | Q-Learning, Deep Q Network (DQN), Policy Gradient Methods, Actor-Critic Methods. |
Advantages | High predictive accuracy with interpretable results. | Capable of uncovering hidden patterns in data without the need for labeled data. | Enhances model performance by leveraging unlabeled data, reducing labeling costs. | Effective in learning optimal strategies within complex and uncertain environments. |
Disadvantages | Dependence on large amounts of labeled data, leading to high labeling costs. | Results may lack clear interpretability and are challenging to evaluate. | Increased model complexity and potential instability during training. | Learning processes may require extensive interactions, resulting in long training times and high computational resource demands. |
Application Areas | Image recognition, speech recognition, spam detection, stock price prediction. | Customer segmentation, anomaly detection, gene data analysis, market basket analysis. | Medical image analysis, text classification, web content categorization. | Game AI, robotic control, autonomous driving, resource management. |
Algorithm | Core Principle | Main Applications | Advantages | Disadvantages |
---|---|---|---|---|
CNN | Extracts spatial features through convolutional layers, reduces dimensionality with pooling layers, and classifies using fully connected layers | Computer vision (image classification, object detection, semantic segmentation) | Spatial invariance, parameter sharing reduces computation | Requires large datasets, struggles with sequential data |
RNN | Maintains sequential dependencies through recurrent connections | Natural language processing, time-series forecasting | Suitable for sequential data, capable of learning long-term dependencies | Training difficulty (vanishing/exploding gradient), inefficient parallelization |
LSTM | Introduces gating mechanisms (forget, input, and output gates) to improve RNNs | Machine translation, speech recognition | Solves vanishing gradient issue, retains long-term dependencies | High computational complexity, slower training compared to RNNs |
GRU | A simplified version of LSTM with merged forget and input gates | Speech recognition, text generation | Lower computational cost than LSTM, similar performance | Slightly less expressive power than LSTM |
Transformer | Utilizes self-attention mechanisms and feedforward networks, independent of sequential order | Machine translation, conversational AI, large models (e.g., GPT, BERT) | Highly parallelizable, strong long-range dependency learning | High computational complexity, resource-intensive for long sequences |
GAN | Composed of a generator and a discriminator in an adversarial setup, learning to generate realistic data | Image generation, data augmentation, super-resolution | Strong generative capability, useful for data augmentation | Unstable training, prone to mode collapse |
VAE | Uses probabilistic modeling to generate data, with a latent variable controlling the generator | Image generation, anomaly detection | Smooth latent space, stable training | Generated images may be blurry, lacks fine details compared to GANs |
Aspect | Consensus Mechanisms | Smart Contracts | Privacy Protection | Data Retrieval |
---|---|---|---|---|
Performance | Low TPS, high latency [108] | Execution inefficiency [109], high gas costs [110] | High computational overhead (e.g., ZKP, FHE) [111] | Slow query speed, limited scalability |
Security | 51% attack risk, PoS centralization | Vulnerabilities, irreversible deployment | TEE vulnerabilities, MPC security concerns | Data integrity risks, potential manipulation |
Decentralization | Validator oligopoly risk | Platform dependence (e.g., Ethereum) | Requires trusted third parties (e.g., MPC and FHE) | Often relies on centralized indexing |
Scalability | Limited node expansion, slow finality | High on-chain storage and computation costs | ZKP and MPC scalability issues | High storage costs, inefficiency in large datasets |
Privacy | Transparent transactions, weak financial privacy | Code and execution transparency | High cost for privacy-preserving computations | Publicly accessible data may expose user behavior |
Energy Consumption | High in PoW, moderate in PoS [112] | Gas fees fluctuate, inefficient execution | Cryptographic computations are energy-intensive | Storage and verification require significant resources |
Usability | High confirmation time, node reliability required | Difficult to upgrade and fix vulnerabilities | Complex deployment, high technical threshold | Slower than traditional databases |
Regulatory Compliance | Difficult to regulate, irreversible transactions | Hard to modify contracts per legal requirements | Potential restrictions on privacy technologies | Cross-chain data access challenges, regulatory concerns |
Cost | High mining and staking costs [113] | High gas fees, expensive audits | Expensive cryptographic computations | High storage and retrieval costs |
Algorithm | Core Mechanism | Communication Complexity | Key Advantages | Existing Limitations |
---|---|---|---|---|
PoAh 2.0 [116] | AI-powered dynamic authentication | Suitable for IoT devices, enhanced security | Dependence on AI computational capacity | |
IoV Consensus [117] | Vehicle prediction + BP neural network | Reduces leader node dropouts | Limited accuracy in vehicle time prediction | |
FGADL-DEVCA [118] | Deep learning for transaction verification | Improves data integrity | High computational cost | |
BDEV-CAM [119] | Machine-learning-enhanced blockchain verification | Enhance IoT security | High computational demands |
Algorithm | Core Mechanism | Communication Complexity | Key Advantages | Existing Limitations |
---|---|---|---|---|
Nakamoto + AI [120] | Off-chain validation + AI data analysis | Suitable for high computational tasks | High resource consumption | |
DPoS for IIoT [121] | AI-optimized DPoS election | Lower energy use, improved efficiency | Dependence on delegates | |
C-PoA [122] | PoA with LSTM for threat detection | Improves blockchain security | Limited by PoA governance | |
LSTM Security Consensus [123] | LSTM-based malicious node detection | Suitable for automotive security | High computational overhead |
Algorithm | Core Mechanism | Communication Complexity | Key Advantages | Existing Limitations |
---|---|---|---|---|
BCFL [124] | PBFT + Federated Learning | Enhanced data privacy | High resource consumption | |
PF-PoFL [125] | Credit-based federated consensus | Privacy-preserving, secure | Slower training time | |
DABFT [126] | AI-based Byzantine fault tolerance | Improved fault resilience | Data quality dependent | |
PoA + PoW for IoT [127] | AI-enhanced PoA and PoW | Optimized for IoT devices | High PoW computational cost | |
DPoEV [128] | Economic incentive with AI evaluation | Suitable for blockchain economy | Data dependency | |
DRL + PoW [129] | DRL for PoW task offloading | Reduces computational overhead | Requires stable network | |
D3P [130] | Double DQN + trusted delegate consensus | Improved efficiency, security | Long training process |
Algorithm | Core Mechanism | Communication Complexity | Key Advantages | Existing Limitations |
---|---|---|---|---|
XG-PBFT [133] | Using XGBoost for node grouping and reputation score allocation | Suitable for edge devices | Requires additional computational overhead | |
Degree Certificate Verification [131] | NLP + Blockchain for credential validation | Prevents academic fraud | Dependence on NLP accuracy | |
Multi-Party Consensus [132] | AI-enhanced Nakamoto consensus | Suitable for privacy-preserving computing | High computational cost | |
CE-PBFT [134] | Using decision tree algorithms for node grouping and reputation score allocation | Suitable for edge devices | Requires additional computational overhead |
Category | Main Research Focus | Core Techniques | Application Scenarios | Major Contributions |
---|---|---|---|---|
Smart Contract Security and Vulnerability Detection | Identifying and detecting security vulnerabilities such as re-entrancy attacks, integer overflows, and timestamp dependencies. | Static/Dynamic Analysis, GNN, Transformer, LSTM, Fuzzing. | Ethereum, DeFi, Supply Chain. | Improving vulnerability detection accuracy and reducing false positives/negatives. |
Smart Contract Optimization and Generation | Enhancing smart contract reusability, automation, classification, and efficiency. | NLP, AI-based recommendation systems, meta-modeling (UML), Code Annotation. | Blockchain Development, EVM Contracts, Smart Contract Libraries. | Reducing development time, improving contract code quality. |
Smart Contract Applications in Specific Domains | Utilizing smart contracts in real-world applications such as smart cities, supply chain management, and healthcare. | Blockchain + Smart Contracts, Decentralized Storage (IPFS), Attribute-Based Access Control. | Smart Cities, Agriculture, Food Supply Chain, Healthcare. | Demonstrating the feasibility of smart contract applications and improving data reliability and traceability. |
Smart Contract Access Control and Resource Management | Research on access control mechanisms, privacy protection, and computational resource optimization in smart contracts. | SDN + Smart Contracts, Decentralized Databases, ABAC Mechanism. | IoT, Distributed Systems, Security Management. | Enhancing smart contract scalability, security, and efficient resource utilization. |
Type | Definition | Causes | Typical Example | Potential Impact |
---|---|---|---|---|
Arithmetic Vulnerabilities | Errors in mathematical operations such as overflow and underflow. | Lack of boundary checks and absence of safe math libraries. | Overflow in ERC20 tokens. | Incorrect calculations, unauthorized fund transfers. |
Re-entrancy Attacks | Exploiting recursive calls to re-enter the contract before state updates. | State changes occur after external calls; absence of function locks. | The DAO attack. | Repeated fund withdrawals, total asset drain. |
Unchecked Calls | Failure to verify the return value of low-level function calls. | Ignoring success/failure checks for call(), delegatecall(), etc. | Parity Wallet bug. | Logic errors, silent failures, potential loss of funds. |
Inconsistent Access Control | Improper or missing role-based restrictions for function access. | Misconfigured or absent access control mechanisms. | Governance function override. | Unauthorized users gain control of sensitive operations. |
Author | Core Innovation | Algorithm | Performance Comparison | Advantages | Limitations |
---|---|---|---|---|---|
Lyu et al. [136] | Contract Dependency Graph (CDG) for vulnerability propagation | Graph analysis | 14.7% victim contract detection | Identifies vulnerability chains | Relies on CDG quality |
Yang et al. [137] | Cross-contract fuzzing-based vulnerability detection | Fuzzing, data flow analysis | Improved detection efficiency | Effective for multi-contract scenarios | High computation cost |
Gao et al. [138] | Structural code embedding for clone/error detection | Code embedding | 90% clone detection rate | Enhances vulnerability detection | Requires existing vulnerability databases |
Wei et al. [139] | Comprehensive survey of 40 vulnerabilities | Survey study | Benchmarked 14 detection tools | Provides classification framework | Cannot detect new vulnerabilities |
Vidal et al. [140] | OpenSCV hierarchical taxonomy | Machine learning classification | Improved classification clarity | Open-source and extendable | Subjective expert-based classification |
Wang et al. [141] | Timestamp vulnerability detection using code homogeneity | Homogeneity-based similarity matching | Identified vulnerable contracts efficiently | Effective for timestamp-related vulnerabilities | Limited to specific vulnerability types |
Fei et al. [142] | Improved SmartCheck-based vulnerability analysis tool (MSmart) | Intermediate representation and XPath rules | Reduced false positives and false negatives | Detects more vulnerability types than SmartCheck | Complexity in rule optimization |
Chen et al. [143] | Symbolic execution for defect detection (DefectChecker) | Bytecode-level symbolic execution | 88.8% F-score, 0.15s per contract | Fast and accurate detection | Limited to EVM bytecode |
Lin et al. [144] | Rug pull risk detection for DeFi smart contracts (CRPWarner) | Analyzing contract functionality | 91.8% precision, 85.9% recall | High detection rate for rug pull risks | Requires labeled datasets |
Wu et al. [145] | Hybrid Attention Mechanism (HAM) for security vulnerabilities | Attention mechanism | 93.36% re-entrancy detection | Combines static and dynamic analysis | High computational overhead |
Zhang et al. [146] | CBGRU hybrid deep learning model for vulnerability detection | Combination of CNN, LSTM, BiGRU | Improved performance on SmartBugs dataset | High detection accuracy | Requires significant computational resources |
Hwang et al. [147] | CodeNet: CNN-based vulnerability detection | Code transformation to images | Competitive detection performance | Novel approach using deep learning | Potential loss of semantic information |
Author | Core Innovation | Algorithm | Performance Comparison | Advantages | Limitations |
---|---|---|---|---|---|
Gao et al. [148] | GNN with expert knowledge | Contract graph representation | Detection accuracy: 89.15% re-entrancy, 89.02% timestamp dependency | Incorporates domain knowledge with GNN | High complexity in graph processing |
Gao et al. [149] | Transaction encapsulation for security testing (TxT) | Local execution of transactions on isolated Ethereum nodes | 96.5% transactions verified, 83.8% vulnerability coverage | High accuracy and coverage | Requires synchronized node execution |
Yu et al. [150] | TxMirror: EVM-stack-based vulnerability detection | Transaction simulation and double link forest indexing | Effective detection of unknown vulnerabilities | Novel EVM stack analysis approach | Limited applicability beyond Ethereum |
Jinggang et al. [151] | Multi-modal feature fusion with deep learning | GCN and Bi-LSTM integration | 90.96% accuracy for integer overflow detection | Fuses static and dynamic features | High training complexity |
Pasqua et al. [152] | Control Flow Graph (CFG) reconstruction for smart contracts | Symbolic execution-based CFG analysis | More precise CFG extraction than existing methods | Enhances static vulnerability analysis | Requires symbolic execution overhead |
Qian et al. [153] | Multi-label vulnerability detection using Bi-LSTM | Neural network classification for multiple vulnerabilities | Over 85% accuracy for all detected vulnerabilities | Detects multiple vulnerabilities simultaneously | Potential overfitting to training data |
Peng et al. [154] | RNVulDet: Random number vulnerability detection | Taint analysis and attack detection | 44,264 attack transactions detected | Fast detection speed (2.98 s per contract) | Requires a large labeled dataset |
Le et al. [155] | Transformer-based vulnerability detection | Fine-tuned LLM for Solidity code analysis | Effective detection of security flaws | High interpretability with transformer models | Requires high computational resources |
Wang et al. [156] | Triplet Loss and Bi-LSTM for vulnerability detection | Metric learning-based feature optimization | 93.25% accuracy for re-entrancy detection | Optimized feature representation | Limited to predefined vulnerability categories |
Category | Key Techniques | Advantages | Limitations |
---|---|---|---|
Smart Contract Agents | Autonomous code generation, lifecycle management | High automation, reduced human effort | May rely on predefined behaviours or agents |
Meta-Modeling | Contract abstraction and model-driven generation | Facilitates reuse, improves modularity | Often tied to specific ecosystems |
AI Recommendation Systems | Code completion and contract suggestion engines | Boosts efficiency, leverages historical data | Requires large training data and context awareness |
Code Annotation Optimization | Semantic tagging and structured metadata | Enhances maintainability and readability | Needs standardization and metadata consistency |
NLP Disambiguation | Natural language to code translation | Lowers entry barrier, enables text-driven development | Prone to ambiguity, may reduce accuracy in complex logic |
Author | Core Innovation | Algorithm | Performance Comparison | Advantages | Limitations |
---|---|---|---|---|---|
Park et al. [157] | Smart contract broker for reusability | Broker mechanism | Improved reuse | Enhances flexibility | Needs metadata management |
Sanche et al. [158] | Smart contract meta-modeling (UML) | UML-based modeling | Standardized modeling framework | Aids automation | Needs further extension |
Gec et al. [159] | Smart contract recommender system | OpenZeppelin + ML | Reduced development time | Supports EVM contracts | Relies on OpenZeppelin ecosystem |
Chen et al. [160] | AI-assisted contract annotation generation | Code annotation + AI | BLEU score +27% | High automation | Limited to specific domains |
Tong et al. [161] | AI-assisted word segmentation for contract generation | AI-based segmentation | Multi-language support | Compatible | Requires NLP capabilities |
Author | Core Innovation | Algorithm | Application Scenario | Advantages | Limitations |
---|---|---|---|---|---|
Margret et al. [162] | Smart contract framework for smart cities | Blockchain + Smart Contracts | Smart Cities | Solves data management | High computational demand |
Zhang et al. [163] | Peer-to-peer food delivery automation | Smart contract automation | Food supply chain | Trust-enhancing, commission-free | Limited transaction throughput |
Xiao et al. [164] | Smart contract-aided plastic credit scheme | Blockchain + Smart Contracts | Plastic recycling governance | Promotes self-regulated plastic trading, improves recyclability | Requires industry-wide adoption |
Wang et al. [165] | Blockchain-based agricultural product traceability | IPFS + Smart Contracts | Agricultural supply chain | Improves data integrity | Dependent on distributed storage |
Garcia et al. [166] | Smart contracts in PBFT-based blockchains for medical prescriptions | PBFT Blockchain (Tendermint, Hyperledger Besu) + Smart Contracts | Decentralized e-prescription system | Efficient for multi-stakeholder applications | Limited scalability compared to PoW-based solutions |
Agrawal et al. [167] | Blockchain-based supply chain collaboration framework | Ethereum + Smart Contracts | Supply chain collaboration | Ensures data authenticity and quality in supply networks | Challenges in integration with existing supply chains |
Author | Core Innovation | Method/Algorithm | Application Scenario | Advantages | Limitations |
---|---|---|---|---|---|
Zhang et al. [168] | ABAC for smart contract access control | ABAC model | Access management | Strong security | High computational resources |
Karakoc et al. [169] | SLA management using SDN-integrated smart contracts | SDN + Smart Contracts | Wireless sensor networks | Energy-efficient | Suitable for specific networks |
Guo et al. [170] | Decentralized database access control | ORAM + Parallel Contracts | Database management | Enhances privacy | High computational complexity |
Research ID | Research Title | Key Technologies | Application Scenario | Main Contributions |
---|---|---|---|---|
Selvarajan et al. [171] | An Artificial Intelligence Lightweight Blockchain Security Model for Security and Privacy in IIoT Systems | Blockchain, AI, Autoencoder | IIoT | Enhances anomaly detection, optimizes execution time |
Wang et al. [172] | Blockchain nd Access Control Encryption-Empowered IoT Knowledge Sharing | Blockchain, Access Control Encryption | IoT | Achieves secure and personalized privacy protection |
Miao et al. [173] | An Intelligent and Privacy-Enhanced Data Sharing Strategy for Blockchain-Empowered IoT | Blockchain, BP2P | IoT | Records data-sharing processes, improves data quality |
Smahi et al. [174] | BV-ICVs: A Privacy-Preserving and Verifiable Federated Learning Framework for V2X Environments Using Blockchain and zkSNARKs | Blockchain, zkSNARKs | Vehicular Networks (V2X) | Prevents malicious data uploads, enhances privacy protection |
Yang et al. [175] | An Explainable Federated Learning and Blockchain-Based Secure Credit Modeling Method | Blockchain, Explainable ML | Finance | Provides transparent and traceable credit decisions |
Firdaus et al. [176] | A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks | Blockchain, Differential Privacy | Vehicular Networks | Improves privacy protection and traffic prediction |
Li et al. [177] | Blockchain-Empowered Federated Learning for a 6G Knowledge Base on Distributed Network Security | Blockchain, Knowledge Graphs | Network Security | Secures knowledge transmission, enhances attack tracing |
Research ID | Title | Key Technologies | Application Domain | Major Contribution | Limitations |
---|---|---|---|---|---|
Wan et al. [178] | Privacy Protection in Federated Learning Combining Distillation Defense and Blockchain | Blockchain, FL, Distillation Defense | General | Reduces client sensitivity to perturbations, enhances security | High computational cost for distillation |
Liu et al. [179] | BFG: Privacy Protection Framework for Internet of Medical Things | Blockchain, FL, Differential Privacy, GAN | Healthcare | Prevents poisoning attacks, enhances privacy protection | Increased storage overhead due to blockchain |
Ma et al. proposed [180] | Blockchain-Based Privacy-Preserving FL for Mobile Crowdsourcing | Blockchain, FL, Chinese Remainder Theorem | Mobile Crowdsourcing | Reduces computation and communication costs, improves accuracy | Vulnerable to model poisoning attacks |
Wang et al. [181] | Blockchain-Based Privacy-Preserving FL for IoV | Blockchain, FL, Multi-Krum, Homomorphic Encryption | IoV | Ensures local model authenticity, encourages participation | Homomorphic encryption increases computational burden |
Zhao et al. [182] | Privacy-Preserving Blockchain-Based FL for IoT | Blockchain, FL, Reputation Mechanism | IoT | Enhances decentralized privacy protection and secure data sharing | Scalability issues with reputation mechanism |
Zhu et al. [183] | Privacy Protection FL for UAV-MEC Networks | Blockchain, FL, Nonlinear Encryption, RCF Detection | UAV Communication | Protects UAV data privacy, reduces data pollution impact | Requires strong computational resources for encryption |
Mo et al. [184] | Privacy Data Management Mechanism Based on Blockchain and FL | Blockchain, FL, Smart Contracts | Healthcare | Ensures secure data sharing among medical institutions | High complexity in managing smart contracts |
Wang et al. [185] | Blockchain-Enabled FL for Privacy-Preserving Non-IID Data Sharing | Blockchain, FL, Dynamic Gradient Clipping | Industrial Internet | Addresses non-IID data issue, improves training accuracy | Potential privacy leakage in gradient sharing |
Zhang et al. [186] | Secure and Decentralized FL for Non-IID Data | Blockchain, FL, Hierarchical Shared Pool | Distributed Computing | Improves accuracy of FL with non-IID data | High communication cost due to model synchronization |
Research ID | Research Title | Key Technologies | Application Scenario | Main Contributions | Limitations |
---|---|---|---|---|---|
Myrzashova et al. [187] | Blockchain-Enabled FL for Medical Data Sharing | Blockchain, FL | Healthcare | Improves privacy in medical data sharing, supports disease prediction | High latency in blockchain transactions |
Rabbani et al. [188] | Enhancing Security in Financial Transactions with Blockchain-Based FL | Blockchain, FL, Multiple ML Models | Finance | Detects fraudulent transactions, enhances privacy | Lack of real-world deployment and testing |
Meng et al. [189] | SFedChain: Secure Data Sharing in Energy Storage Networks | Blockchain, FL, Secure Computing | Energy | Protects distributed energy data privacy | Increased computational and storage demands |
Zhu et al. [190] | Enhancing IoT Supply Chain Security with Blockchain and FL | Blockchain, FL, Trusted Execution Environment | Supply Chain | Ensures secure computation and tamper-resistant data | Limited scalability due to TEE constraints |
Jia et al. [191] | Blockchain-Based Multi-Task Privacy-Preserving FL Framework | Blockchain, FL, Partitioned Blockchain | Industrial Applications | Supports multiple FL tasks, improves privacy | Complexity in multi-task model coordination |
Zhang et al. [192] | Practical and Privacy-Preserving FL with Verifiable Fairness | Blockchain, FL, VRF, Zero-Knowledge Proof | General | Ensures fairness in FL training, enhances privacy | High verification cost in real-world implementation |
Dong et al. [193] | Optimizing Federated Person Re-ID in Smart UAV Delivery Systems | Blockchain, FL, Decentralized Mechanism | UAV Delivery | Prevents single points of failure, optimizes data privacy | Limited effectiveness in dynamic network environments |
Dhasaratha et al. [194] | Blockchain-Reinforced FL for Scalable IoMT Privacy Protection | Blockchain, Reinforcement FL | Healthcare IoMT | Improves data security and communication efficiency | Needs further validation in large-scale IoMT systems |
Li et al. [195] | Blockchain-Integrated FL for Multi-Device Privacy Protection | Blockchain, FL, Reputation Mechanism | Multi-Device Communication | Enhances federated learning trust and privacy security | Reputation mechanisms may introduce biases |
Study | Application Domain | Blockchain Platform | AI Techniques Used | Privacy/Security Mechanisms | Main Contributions |
---|---|---|---|---|---|
Almaiah et al. [201] | Digital Healthcare | Blockchain + IoT | AI-based authentication | Lightweight encryption for IoT security | Provides a hybrid authentication model for healthcare. |
Singh et al. [203] | Smart Enterprises | Blockchain | Augmented Intelligence | Blockchain-based trust management | Improves enterprise security and trust management. |
Wang et al. [204] | Intelligent Transportation | Heterogeneous Blockchain | Federated Deep Learning | Hierarchical trust evaluation | Ensures low-latency and reliable communication in ITS. |
Khan et al. [205] | Medical IoT Systems | Blockchain | Hybrid Deep Neural Networks | Secure Searchable Encryption (Binary Spring Search) | Enhances security and reliability in medical data storage and retrieval. |
Category | Training Type | Algorithms/Architectures | Blockchain Application Scenarios |
---|---|---|---|
Machine Learning | Supervised Learning | Decision Tree, SVM, Random Forest, XGBoost | Smart contract vulnerability detection, node classification (e.g., XG-PBFT uses XGBoost for node grouping) |
Unsupervised Learning | K-Means, DBSCAN, PCA, AutoEncoder | Blockchain data clustering, address behavior clustering, transaction pattern discovery | |
Semi-Supervised Learning | Self-training, Co-training, Label Propagation | Privacy-preserving medical data sharing, transaction record analysis, classification with limited labeled data | |
Reinforcement Learning | Q-Learning, DQN, DDPG, PPO | Consensus optimization, miner task offloading, block selection strategies, on-chain resource scheduling | |
Deep Learning | CNN | LeNet, AlexNet, ResNet, 1D/2D CNN | Smart contract vulnerability detection (e.g., CodeNet), image/video pre-processing for on-chain storage, multimodal data indexing |
RNN and Variants | LSTM, GRU, Bi-LSTM | Multi-label vulnerability prediction in contracts, time-series analysis (e.g., transaction forecasting) | |
Transformer-based Models | BERT, GPT, CodeBERT, T5, ViT | Smart contract language modeling, code classification, blockchain + NLP (e.g., contract generation, audit tasks) | |
GANs | DCGAN, WGAN, cGAN, CycleGAN | Privacy protection, synthetic data generation, adversarial training, identity anonymization in data sharing |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yuan, F.; Zuo, Z.; Jiang, Y.; Shu, W.; Tian, Z.; Ye, C.; Yang, J.; Mao, Z.; Huang, X.; Gu, S.; et al. AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection. Algorithms 2025, 18, 263. https://doi.org/10.3390/a18050263
Yuan F, Zuo Z, Jiang Y, Shu W, Tian Z, Ye C, Yang J, Mao Z, Huang X, Gu S, et al. AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection. Algorithms. 2025; 18(5):263. https://doi.org/10.3390/a18050263
Chicago/Turabian StyleYuan, Fujiang, Zihao Zuo, Yang Jiang, Wenzhou Shu, Zhen Tian, Chenxi Ye, Junye Yang, Zebing Mao, Xia Huang, Shaojie Gu, and et al. 2025. "AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection" Algorithms 18, no. 5: 263. https://doi.org/10.3390/a18050263
APA StyleYuan, F., Zuo, Z., Jiang, Y., Shu, W., Tian, Z., Ye, C., Yang, J., Mao, Z., Huang, X., Gu, S., & Peng, Y. (2025). AI-Driven Optimization of Blockchain Scalability, Security, and Privacy Protection. Algorithms, 18(5), 263. https://doi.org/10.3390/a18050263