<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Blockchain</journal-id>
<journal-title>Frontiers in Blockchain</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Blockchain</abbrev-journal-title>
<issn pub-type="epub">2624-7852</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">927006</article-id>
<article-id pub-id-type="doi">10.3389/fbloc.2022.927006</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Blockchain</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Artificial Intelligence for Demystifying Blockchain Technology Challenges: A Survey of Recent Advances</article-title>
<alt-title alt-title-type="left-running-head">Olaniyi et al.</alt-title>
<alt-title alt-title-type="right-running-head">Artificial Intelligence for Demystifying Blockchain Technology</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Olaniyi</surname>
<given-names>Olayemi Mikail</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1673627/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Alfa</surname>
<given-names>Abraham Ayegba</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1834475/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Umar</surname>
<given-names>Buhari Ugbede</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1668828/overview"/>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>Department of Computer Engineering</institution>, <institution>Federal University of Technology</institution>, <addr-line>Minna</addr-line>, <country>Nigeria</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Department of Computer Science</institution>, <institution>Confluence University of Science and Technology</institution>, <addr-line>Osara</addr-line>, <country>Nigeria</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1445443/overview">Kavita Saini</ext-link>, Galgotias University, India</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1792309/overview">Chellammal Surianarayanan</ext-link>, Bharathidasan University, India</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1795681/overview">KM. Bala</ext-link>, Galgotias University, India</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Olayemi Mikail Olaniyi, <email>mikail.olaniyi@futminna.edu.ng</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Blockchain Technologies, a section of the journal Frontiers in Blockchain</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>04</day>
<month>07</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>5</volume>
<elocation-id>927006</elocation-id>
<history>
<date date-type="received">
<day>23</day>
<month>04</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>30</day>
<month>05</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2022 Olaniyi, Alfa and Umar.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Olaniyi, Alfa and Umar</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Blockchain technology has gained lots of traction in the past five years due to the innovations introduced in digital currency, the Bitcoin. This technology is powered by distributed ledger technology, which is a distributed database system. It is often renowned for decentralization, anti-attack, and unfalsified attributes making it a top choice in several non-monetary applications. In fact, the problem of privacy and security of the Internet of Things has been undertaken aggressively with Blockchain. Several problems have been identified with blockchain technology such as large delays and lack of support for real-time transaction processing, authorization, node verification, and consensus mechanisms. This article intends to provide a comprehensive survey on the recent advances and solutions to the problems of blockchain technology by leveraging the artificial intelligence approaches. The outcomes of this study will provide valuable information and guidance on the design of Blockchain-based systems to support time-sensitive and real-time specific applications and processes.</p>
</abstract>
<kwd-group>
<kwd>blockchain technology</kwd>
<kwd>artificial intelligence</kwd>
<kwd>real-time</kwd>
<kwd>Internet of Things</kwd>
<kwd>distributed ledger technology</kwd>
<kwd>weaknesses</kwd>
<kwd>solutions</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>The prospects of blockchain technologies became pronounced shortly after the launch of Bitcoin, the online cryptocurrency, in 2008. The operation of the blockchain is based on a decentralized and distributed ledger system maintained by every node on the network. There is no central authority for managing transactions due to the concept of immutability placed on transactions, which implies no tampering or overwriting of the ledger once committed. The storage or database is safe and secured through strong hashing cryptography. Every transaction is linked to another; thereby increasing transparency and security of information. There are complete and comprehensive transaction logging systems on Blockchain. The process of writing and reading to the blockchain are consensually attained rather than a set of nodes (<xref ref-type="bibr" rid="B17">Hassan et al., 2019</xref>; <xref ref-type="bibr" rid="B4">Alfa et al., 2021a</xref>).</p>
<p>The intention of Szabo&#x2019;s smart contracts is to design computer-based protocols that autonomously support, enhance, verify and carry out digital contracts and negotiations entered between individuals or parties without the need for central establishments such as Hyperledger and Ethereum. In effect, blockchain technology uses smart contracts in the digital economy, intelligent manufacturing and industries, medicine, financial management, Internet of Things (IoT), and the list is inexhaustive. Aside immaturity of blockchain technology, security and privacy are the topmost technical hurdles to be scaled (<xref ref-type="bibr" rid="B24">Wang et al., 2019</xref>). The blockchain networks are usually complex, the quest to have lightweight clients capable of running mobile interfaces is desirous. This is capable of increasing the application frontiers of this technology (<xref ref-type="bibr" rid="B19">Mukkamala et al., 2018</xref>).</p>
<p>Artificial intelligence (AI) is a field of computer science responsible for the design and execution of tasks initially undertaken by humans. However, these tasks are often repetitive and well defined (<xref ref-type="bibr" rid="B27">Yang and Yu, 2021</xref>). AI was developed to accumulate and identify information of interest within a stockpile of data generated from events. The emergence of AI brought about smart environments. Though, the merger of blockchain technology and AI has been a long subject of investigation by the research community (<xref ref-type="bibr" rid="B7">Azzaoui et al., 2020</xref>). Several variants (such as the deep convolutional neural network) of AI have been successful in diverse areas of applications including natural language processing, and computer vision. (<xref ref-type="bibr" rid="B30">Zhang et al., 2019</xref>). This survey underpins the contributions of both technologies (that is, blockchain technology and AI) to resolving the challenges of the former. The contributions of this study include the following: 1) To identify current challenges of blockchain technology. 2) To discuss the recent methods of AI for demystifying these challenges in blockchain technology. 3) To highlight the cases, scenarios, and prospects of AI in blockchain technology.</p>
</sec>
<sec id="s2">
<title>Blockchain Technology</title>
<sec id="s2-1">
<title>The Basis of Blockchain Technology</title>
<p>The origin of blockchain can be traced to a pseudonym, Satoshi Nakamoto, during a forum on the bitcoin in the year 2008 entitled Bitcoin: A Peer-to-Peer Electronic Cash System. This technology motivated several revolutions in industry and technology. The concept of blockchain technology enables distributed ledger systems, intelligent consensus contracts, asymmetric encryption, and numerous core technologies. Blockchain is the backbone technology for digital cryptocurrencies such as Hyperledger, Bitcoin, and Ethereum. Blockchain offers point-to-point, traceability, anonymity, tamper-proof, trust, and security of transactions. Aside from the financial sector, other application areas of blockchain include the Internet of Things (IoT), edge computing, supply chain management, and Artificial Intelligence (<xref ref-type="bibr" rid="B25">Wang et al., 2020</xref>).</p>
<p>The blockchain is a database on an append-only structure and operated by the peer-to-peer (P2P) nodes on its networks. It is composed of three key layers including the peer-to-peer network backbone, databases, and associated applications. In this case, the communication process is managed by a P2P network, every node has an equal right to provide and consume information. More so, is the routing process of the network (that is, discovering and establishing connections to adjoining nodes) (<xref ref-type="bibr" rid="B15">Feng et al., 2019</xref>). While the global ledger controls the message transmission across addresses assigned to users in form of cryptographic-based public-private keys (<xref ref-type="bibr" rid="B15">Feng et al., 2019</xref>).</p>
</sec>
<sec id="s2-2">
<title>Strengths of Blockchain Technology</title>
<p>The trustless nature of blockchain technology emboldens the consensus mechanism in which nodes on the entire network must reach an agreement on authorizing or verifying transactions. Though, the information contained in blocks becomes public due to the disclosure policy of the chain, which raises privacy challenges for the users. However, blockchain is a kind of distributed database that enforces privacy protection through a decentralized structure and data storage mechanism. These offer information tamper-proof, stability of the network, and anonymity in attempts to overcome the issue of privacy disclosure often faced in centralized services, especially in blockchain-propelled voting systems, and intelligent parking lot systems (<xref ref-type="bibr" rid="B25">Wang et al., 2020</xref>; <xref ref-type="bibr" rid="B15">Feng et al., 2019</xref>).</p>
<p>Blockchain technology uses distributed verification of transactions process in that large amounts of miners collaborate in verifying the legitimacy of the transaction prior to appending it to the blockchain. In case of the inconsistent state of the blockchain, all the nodes update their local copy of the blockchain with the state on the basis of the consensus of miners, that is, the exact state of the blockchain is attained through the election. However, this approach is weak to the attacks such as sybil (<xref ref-type="bibr" rid="B12">Conti et al., 2018</xref>). <xref ref-type="bibr" rid="B11">Chatterjee and Chatterjee (2017</xref>) enlisted the key benefits of blockchain including irreversible (double spending resistant), immutable (tamper-proof), distributed system (participants retain a copy of ledger), resilient (less prone to common attacks), and trustless (peer-to-peer system rather than central authority).</p>
</sec>
</sec>
<sec id="s3">
<title>Artificial Intelligence</title>
<p>The science targeted at evolving machine systems capable of exhibiting intelligence similar to the mind of humans is known as Artificial Intelligence (AI). It can be used to crack complex tasks autonomously without interference by humans. AI can be broadly classified into natural language processing, and machine learning approaches. Natural language processing (NLP) assists humans to interrelate with computers through specialized natural language. NLP understands, deciphers, and comprehends human language in special ways. Machine learning attempts to explain the interrelationship between input and output for the purpose of deducing primary needed for future forecasts on the basis of acquired patterns (supervised learning) or identifying clusters of data from input values (<xref ref-type="bibr" rid="B23">van Klompenburg et al., 2020</xref>). Though, deep learning has advanced the applications of AIs by means of optimization processes. In fact, deep learning replicates the functions of the human brain by acquiring knowledge autonomously from unlabeled and unstructured data (<xref ref-type="bibr" rid="B7">Azzaoui et al., 2020</xref>; <xref ref-type="bibr" rid="B23">van Klompenburg et al., 2020</xref>).</p>
<p>In particular, deep learning is applied to high-dimensional data to explain the interrelationships as in the case of, object detection, image classification, and semantic segmentation. Convolutional neural network (CNN), Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), and Radial Basis Function Network (RBFN) are some forms of AI&#x2019;s deep learning subcategory (<xref ref-type="bibr" rid="B27">Yang and Yu, 2021</xref>). A water management and control station using RBFN was developed for the purpose of predicting water level, weather, and irrigation parameters (<xref ref-type="bibr" rid="B2">Adenugba et al., 2019</xref>). The rate of yield of the crop was undertaken with AI&#x2019;s machine learning subcategories such as deep neural networks, LSTM and CNN. The global markets return forecasting was accurately determined through machine learning methods (<xref ref-type="bibr" rid="B3">Al- Sulaiman and Al- Matouq, 2021</xref>). AI is used to improve medical decision-making processes, diagnosis, and treatment of chronic diseases (<xref ref-type="bibr" rid="B8">Battineni et al., 2020</xref>). AI-based trust management for security and resource allocation on critical health networks/applications (<xref ref-type="bibr" rid="B1">Abbasi et al., 2021</xref>).</p>
</sec>
<sec id="s4">
<title>Problems of Blockchain Technology</title>
<p>A peer-to-peer technology-based cryptographically secure electronic payment platform was investigated by <xref ref-type="bibr" rid="B12">Conti et al., (2018)</xref>, which allows virtual currency (known as Bitcoin) to be traded. Bitcoins arouse interest from researchers and industry players due to their huge market capitalization and increased transaction pull on daily basis. These attracted all manners of attacks including double spending, net-split, the malleability of the transaction, networking attacks, and mining pools. Anonymous digital currency and decentralized networking (such as blockchain and consensus protocols) are mostly used in Bitcoin which removes backtracking property, central controls, and increased openness. Two algorithms have been proposed for the Bitcoin system for privacy protection of users&#x2019; transactions including proof-of-work and consensus; but, are unable to resist manipulations and stop certain kinds of attacks. However, there is a need to focus, in future works, on user privacy and anonymity issues in the e-commerce industry.</p>
<p>One of the topmost cryptocurrencies is the Bitcoin in which all transactions are kept in a distributed append-only public ledger known as the blockchain. Bitcoin is majorly protected through incentive-well-suited proof-of-work using distributed consensus protocol run by miners (network nodes). In reward for the incentive, the miners are required to fairly preserve the blockchain. Since its unveiling in 2009, Bitcoin has amassed a stupendous growth rate and is valued at several billions of dollars. But, the unprecedented progress in the economy of Bitcoin has given rise to threats from adversaries in attempts to exploit weaknesses for profit-making purposes; therefore, researchers are expected to reveal fresh vulnerabilities in this system. In addition, Bitcoin&#x27;s normal functionality can be distorted due to the vulnerabilities of Proof-of-Work and blockchain (<xref ref-type="bibr" rid="B12">Conti et al., 2018</xref>).</p>
<p>A number of advantages can be derived from blockchain technology, especially in providing distributed things security services [<xref ref-type="bibr" rid="B22">Salman et al. (2019)</xref>] including confidentiality, privacy, provenance, authentication, and integrity. The authentication and confidentiality solutions are attainable through the public-private key cryptography such as encryption and the signature approaches. However, there is no practical experimentation of different blockchain approaches in large-scale and real-world situations for performance assessments. <xref ref-type="bibr" rid="B16">Ferrag et al. (2018)</xref> highlighted various blockchain protocols in IoT networks. In particular, these protocols have been applied in Vehicles, Energy, Cloud, and Edge computing. Blockchain-IoT network protocols are vulnerable to threats such as identity, manipulation, cryptanalytic, reputation, and service. New solutions are expected to be evolved for special blockchain infrastructure, vehicular cloud advertisement broadcast, and Skyline query processing, trust management, and resiliency against threats.</p>
<p>Blockchain technology is an important part of the cryptocurrency Bitcoin because of its decentralized and falsified properties (<xref ref-type="bibr" rid="B28">Yang et al., 2018</xref>). The Blockchain&#x2019;s distributed and anti-attack nature makes it suited for more advanced applications, especially in IoT systems. These technical properties of blockchain enable distributed privacy and security solutions for IoT systems. Blockchain technology provides less-expensive links and direct exchanges among several IoT devices. Though, IoT and blockchain are distinct technologies whose integration may give rise to new challenges. Most significantly, there is the prospect of advancing both technologies in improving the well-being of people globally through the automation of everyday activities.</p>
<p>Data compromises and corruption are largely responsible for the vulnerability of smart places (<xref ref-type="bibr" rid="B9">Brand&#xe3;o et al., 2018</xref>)). Moreover, the false integration of new devices and devices running on inconsistent firmware versions will continue to increase risks in addition to the huge pile of data, devices, infrastructures, and end-users available on the Web. Notwithstanding the applications of blockchain in IoT, serious issues abound including security focus (confidence, privacy, scalability, and anonymization); scalability (applications require huge power for computing, verification, and confirmation of transactions); unrestricted access to information (transactions are consummated in public for transparency open identification and backtrack); and data management (centralized service provision to be replaced with a decentralized scheme to eliminate third party controls).</p>
<p>
<xref ref-type="bibr" rid="B15">Feng et al. (2019)</xref> understudied the possible setbacks for the widespread deployment of Blockchain, in which privacy risks is topmost. The general acceptance and awareness of blockchain technology are associated with the decentralized nature and security; as well as a unique mode of storing, sharing, and updating data which is the direction of most upcoming Internet interactive systems such as IoT or supply chain systems. It was discovered that most of the deployed data privacy preservation techniques were based on cryptography for anonymity and transaction privacy only. However, there is a need to evolve conditional methodology for a trusted authority to backtrack users and transactions while hiding the personal data of users in the blockchain network. More so, new privacy protection methods must reduce the overheads due to communication, waiting for delays, and complex computations, especially in non-scalable anonymity sets. The author drew the future efforts in three aspects to include: 1) Obfuscation on the transaction associations to prevent backtrack analysis. 2) Concealing the identities of the sender and the receiver identities by mean complex cryptographic primitives. 3) Blinding the transaction content but, their verifiability and computability are reserved.</p>
<p>Blockchain technology is limited by the one-mode of transaction phenomenon; that is, only one type of asset can be operated at a time, while there is a lack of specified amounts of nodes required to attain consensus for transaction approval. This causes enormous time wastage and process slowness on the blockchain (<xref ref-type="bibr" rid="B11">Chatterjee and Chatterjee, 2017</xref>). Though there are several upcoming applications motivated by Blockchain, its performance and architecture can be improved subsequently. Notwithstanding, interoperability and scalability problems of blockchains still persist (<xref ref-type="bibr" rid="B13">Ensor et al., 2019</xref>) in its subcategories such as public, private, and consortium.</p>
</sec>
<sec id="s5">
<title>Potential Solutions of Artificial Intelligence</title>
<p>AI can be significantly applied to overcome the problem of threats and vulnerabilities through effective auditing of blockchain assets and resources (<xref ref-type="bibr" rid="B5">Alfa et al., 2021b</xref>). The smart contract refers to the collection of promises generated digitally alongside a collection of rules to guide parties in fulfilling their promises (<xref ref-type="bibr" rid="B24">Wang et al., 2019</xref>). AI can be used to adequately control the operations of the consensus mechanisms and protocols in blockchain (<xref ref-type="bibr" rid="B12">Conti et al., 2018</xref>). The hash functions are used to generate block hash in order to resist attack as shown in the following equation:<disp-formula id="e1">
<mml:math id="m1">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mi>r</mml:mi>
</mml:msup>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>where, <inline-formula id="inf1">
<mml:math id="m2">
<mml:mrow>
<mml:mi>r</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>256</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mn>384</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mn>512</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula> bits long in present-day blockchains, which must exceed the hashing value of <italic>y</italic> for every <italic>r</italic> in <xref ref-type="disp-formula" rid="e1">Eq. 1</xref> (<xref ref-type="bibr" rid="B18">Meng et al., 2018</xref>).</p>
<p>However, lightweight cryptography has been identified to overcome the extended hashing processes on the blockchain (<xref ref-type="bibr" rid="B4">Alfa et al., 2021a</xref>; <xref ref-type="bibr" rid="B17">Hassan et al., 2019</xref>). In addition, lightweight cryptographic schemes are generally weak but can be enhanced with hardening schemes such as Sooner (<xref ref-type="bibr" rid="B5">Alfa et al., 2021b</xref>). Authorizations and verifications of transactions on mined blocks in blockchain can be outsourced for effectiveness and speedups using AI approaches.</p>
<p>The process of reaching decisions about the mining of blocks and rewarding systems on blockchain technology can be effectively managed by AI approaches (<xref ref-type="bibr" rid="B17">Hassan et al., 2019</xref>). Ingenuine blocks are expected to be left unconfirmed and discarded by the blockchain networks in conjunction with Proof-of-Work and AI-inspired algorithms (<xref ref-type="bibr" rid="B13">Ensor et al., 2019</xref>). Blockchain technology can be superimposed on other technologies such as the Internet of Things to overcome problems of security, privacy, and delays (<xref ref-type="bibr" rid="B17">Hassan et al., 2019</xref>). The Byzantine general&#x2019;s problem can be resolved with blockchain in which reliability and transparency are introduced through an AI approach for effective data sharing among numerous end-users of the network (<xref ref-type="bibr" rid="B6">Atlam and Wills, 2019</xref>).</p>
<p>Transactions transmission, communication, and management in blockchain can be carried out more effectively through AI applications. The identity leakage problem and ineffective pseudo identities on the blockchain can be further protected through proof-of-conformance mechanisms using AI approaches such as computer vision (<xref ref-type="bibr" rid="B27">Yang and Yu, 2021</xref>). The linkability of identities to information kept on the blockchain has been ineffectively undertaken by anonymization of personally identifiable information (PII). Though, the secrecy of public-private keys of blockchain is the heart of its operational effectiveness, which can be achieved using AI schemes (<xref ref-type="bibr" rid="B26">Wirth and Kolain, 2018</xref>). There are numerous opportunities of integrating AI into blockchain technology by leveraging features such as decentralization, transparency, privacy, and auditability, for highly complex and intricate applications (<xref ref-type="bibr" rid="B19">Mukkamala et al., 2018</xref>).</p>
<p>The initial Blockchains were built on cryptographic primitives without trusting an entity for proofing rather than proofs derived from strong cryptography. The validation and endorsement of transactions rely entirely on digital signatures (<xref ref-type="bibr" rid="B11">Chatterjee and Chatterjee, 2017</xref>). However, new approaches based on AI such as pattern recognition could be explored. The virtualization of Distributed Ledger Technology (such as blockchain Technology) could overcome scalability and interoperability problems (<xref ref-type="bibr" rid="B13">Ensor et al., 2019</xref>). However, AI could play important roles in managing network traffic and the consummation of a large volume of transactions on blockchains.</p>
<sec id="s5-1">
<title>Prospective Artificial Intelligence Solutions in Blockchain Technology</title>
<p>The prospects of AI in blockchain technology for overcoming perceived weaknesses from this study are summarized in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Prospects of AI in blockchain technology problems. Tick <inline-formula id="inf2">
<mml:math id="m3">
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mo>&#x221a;</mml:mo>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> indicates AI solution probable; tick <inline-formula id="inf3">
<mml:math id="m4">
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mo>&#xd7;</mml:mo>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> indicates AI solution improbable.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">S/N</th>
<th align="center">Blockchain technology weakness</th>
<th align="center">AI solution applicable</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="left">Smart contracts</td>
<td align="center">
<inline-formula id="inf4">
<mml:math id="m5">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">Authorization and verification</td>
<td align="center">
<inline-formula id="inf5">
<mml:math id="m6">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">3</td>
<td align="left">Complex cryptography and weak hashing functions</td>
<td align="center">
<inline-formula id="inf6">
<mml:math id="m7">
<mml:mo>&#xd7;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">Mining decision-making process</td>
<td align="center">
<inline-formula id="inf7">
<mml:math id="m8">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">Vulnerabilities to attacks and threats</td>
<td align="center">
<inline-formula id="inf8">
<mml:math id="m9">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">6</td>
<td align="left">Transactions delays</td>
<td align="center">
<inline-formula id="inf9">
<mml:math id="m10">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">Byzantine generals&#x2019; problem</td>
<td align="center">
<inline-formula id="inf10">
<mml:math id="m11">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">8</td>
<td align="left">Identity privacy and security leakages</td>
<td align="center">
<inline-formula id="inf11">
<mml:math id="m12">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">Secrecy of public-private keys</td>
<td align="center">
<inline-formula id="inf12">
<mml:math id="m13">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">10</td>
<td align="left">Validation and endorsement of transactions</td>
<td align="center">
<inline-formula id="inf13">
<mml:math id="m14">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">11</td>
<td align="left">Network control and management</td>
<td align="center">
<inline-formula id="inf14">
<mml:math id="m15">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">12</td>
<td align="left">Scalability and interoperability</td>
<td align="center">
<inline-formula id="inf15">
<mml:math id="m16">
<mml:mo>&#xd7;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">13</td>
<td align="left">Data sharing ineffectiveness</td>
<td align="center">
<inline-formula id="inf16">
<mml:math id="m17">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">14</td>
<td align="left">Consensus mechanisms and protocols</td>
<td align="center">
<inline-formula id="inf17">
<mml:math id="m18">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">15</td>
<td align="left">Transparency and openness</td>
<td align="center">
<inline-formula id="inf18">
<mml:math id="m19">
<mml:mo>&#xd7;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
<tr>
<td align="left">16</td>
<td align="left">Anonymization of PII</td>
<td align="center">
<inline-formula id="inf19">
<mml:math id="m20">
<mml:mo>&#x221a;</mml:mo>
</mml:math>
</inline-formula>
</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s6">
<title>AI in Blockchain Technology: Cases and Scenarios</title>
<p>The AI has sufficient capabilities to advance the data exchanges and transmissions across cloud infrastructures through distributed and multi-computing, visualization, and large-scale computation. These enable numerous services to be performed in parallel including server, network hardware, and space maximization (<xref ref-type="bibr" rid="B20">Namasudra et al., 2020</xref>).</p>
<p>Big data applications require effective information extrapolation and conversion methods, which can be achieved through high-performance machine/deep learning algorithms. Again, the effectiveness of control access methods in big data applications can be improved with the use of malicious data/transaction identification based on deep learning schemes (<xref ref-type="bibr" rid="B20">Namasudra et al., 2020</xref>). Optimization approaches offered by machine learning searching and meta-heuristic algorithms in conjunction with decentralized database structures enable cloud service providers including Google&#x2019;s Cloud IoT, Microsoft&#x2019;s Azure IoT Edge, and Amazon&#x2019;s AWS Greengrass ().</p>
<p>Financial Chains and other decentralized applications (DAPPs) can be effectively scrutinized with deep learning algorithms to unveil malicious and ingenuine transactions and manipulations. Fake product reviews can be detected on Blockchain-based platforms using machine learning algorithms. Blockchain supports a secure platform for sharing digital content between buyers and sellers in which data risks can be minimized through machine learning techniques (<xref ref-type="bibr" rid="B21">Naz et al., 2019</xref>).</p>
<p>Blockchain-based drone monitoring system throughputs and network performance can be achieved through AI&#x2019;s deep learning to safeguard their routing and movement. The security of data collected and transmitted by drone airborne is jointly attained with Drone-based Delegated Proof of Stake and deep learning (<xref ref-type="bibr" rid="B29">Yazdinejad et al., 2020</xref>).</p>
<p>The collaborative and open mode of blockchain technology further raises the requirements for effectual data management. Therefore, machine learning and AI methods can be integrated into the blockchain to secure data analytics transparency (<xref ref-type="bibr" rid="B14">Faroukhi et al., 2020</xref>). The hierarchical representation of the main cases and scenarios of AI in blockchain technology is depicted in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Hierarchy of the cases and scenarios of AI in blockchain technology.</p>
</caption>
<graphic xlink:href="fbloc-05-927006-g001.tif"/>
</fig>
</sec>
<sec sec-type="conclusion" id="s7">
<title>Conclusion</title>
<p>The growth of blockchain technology can be viewed from three main perspectives in deriving values including the development of innovative models and far-reaching exploration; improved research on domain-specific and end-users; and the advancement of fresh enterprise capabilities. More so, there is the need to consider the adoption of formal models for the purpose of understanding the intricate complications and complexities surrounding the application of blockchain technology (<xref ref-type="bibr" rid="B19">Mukkamala et al., 2018</xref>).</p>
<p>The concept of smart contracts is similar to small pieces of software regulating a deal or transaction between a client and consumer, while it is dissimilar in the sense that the structure of financial smart contracts is different from that of non-financial smart contracts (<xref ref-type="bibr" rid="B11">Chatterjee and Chatterjee, 2017</xref>). Consequently, developers, security experts, and decentralized application programmers will need to collaborate effectively to move more quickly towards flawless blockchain-based applications through AI.</p>
<p>Blockchain technology is capable of offering Sensing-as-a-Service in which data from sensing objects are protected in exchange for certain incentives (<xref ref-type="bibr" rid="B13">Ensor et al., 2019</xref>). Then, AI could facilitate Sensing-as-a-Service platforms through the use of blockchain data in weather stations, smart precision farming, and other smart environments. The study contributed to the ongoing discussions on the use of AI to overcome problems of blockchain technology including network management, data exchanges, transaction verification, public-private keys management, smart contracts programming, the effectiveness of consensus protocols, and complex cryptography and weak hashing functions.</p>
</sec>
</body>
<back>
<sec id="s8" sec-type="data-availability">
<title>Data Availability Statement</title>
<p>The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s9">
<title>Author Contributions</title>
<p>The first author reviewed and modified the content of this manuscript. The second author wrote <xref ref-type="sec" rid="s1">Sections 1</xref>, <xref ref-type="sec" rid="s2">2</xref>, <xref ref-type="sec" rid="s4">4</xref>, provided references, and formatted the manuscript. The third author wrote <xref ref-type="sec" rid="s3">Sections 3</xref>, <xref ref-type="sec" rid="s5">5</xref>, and <xref ref-type="sec" rid="s6">6</xref>.</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ack>
<p>The authors want to acknowledge their reviewers for their contributions in making this manuscript better and publishable.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Abbasi</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Memon</surname>
<given-names>Z. A.</given-names>
</name>
<name>
<surname>Durrani</surname>
<given-names>N. M.</given-names>
</name>
<name>
<surname>Haider</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Laeeq</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Mallah</surname>
<given-names>G. A.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>A Multi-Layer Trust-Based Middleware Framework for Handling Interoperability Issues in Heterogeneous IOTs</article-title>. <source>Clust. Comput.</source> <volume>24</volume>, <fpage>2133</fpage>&#x2013;<lpage>2160</lpage>. <pub-id pub-id-type="doi">10.1007/s10586-021-03243-1</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s10586-021-03243-1">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=A+Multi-Layer+Trust-Based+Middleware+Framework+for+Handling+Interoperability+Issues+in+Heterogeneous+IOTs&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Adenugba</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Misra</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Misra</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Maskeli&#x16b;nas</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Dama&#x161;evi&#x10d;ius</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Kazanavi&#x10d;ius</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Smart Irrigation System for Environmental Sustainability in Africa: An Internet of Everything (IoE) Approach</article-title>. <source>Math. Biosci. Eng.</source> <volume>16</volume> (<issue>5</issue>), <fpage>5490</fpage>&#x2013;<lpage>5503</lpage>. <pub-id pub-id-type="doi">10.3934/mbe.2019273</pub-id> <ext-link ext-link-type="uri" xlink:href="https://pubmed.ncbi.nlm.nih.gov/31499722/">PubMed Abstract</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3934/mbe.2019273">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Smart+Irrigation+System+for+Environmental+Sustainability+in+Africa:+An+Internet+of+Everything+(IoE)+Approach&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Al-Sulaiman</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Al-Matouq</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>A Convex Collaborative Filtering Framework for Global Market Return Prediction</article-title>. <source>IEEE Access</source> <volume>9</volume>, <fpage>29458</fpage>&#x2013;<lpage>29469</lpage>. <pub-id pub-id-type="doi">10.1109/access.2021.3058646</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/access.2021.3058646">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=A+Convex+Collaborative+Filtering+Framework+for+Global+Market+Return+Prediction&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alfa</surname>
<given-names>A. A.</given-names>
</name>
<name>
<surname>Alhassan</surname>
<given-names>J. K.</given-names>
</name>
<name>
<surname>Olaniyi</surname>
<given-names>O. M.</given-names>
</name>
<name>
<surname>Olalere</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Blockchain Technology in IoT Systems: Current Trends, Methodology, Problems, Applications, and Future Directions</article-title>. <source>J. Reliab. Intell. Environ.</source> <volume>7</volume> (<issue>2</issue>), <fpage>115</fpage>&#x2013;<lpage>143</lpage>. <pub-id pub-id-type="doi">10.1007/s40860-020-00116-z</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s40860-020-00116-z">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Blockchain+Technology+in+IoT+Systems:+Current+Trends,+Methodology,+Problems,+Applications,+and+Future+Directions&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B5">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Alfa</surname>
<given-names>A. A.</given-names>
</name>
<name>
<surname>Alhassan</surname>
<given-names>J. K.</given-names>
</name>
<name>
<surname>Olaniyi</surname>
<given-names>O. M.</given-names>
</name>
<name>
<surname>Olalere</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices</article-title>,&#x201d; in <source>ICTA 2020, CCIS</source>. Editors <person-group person-group-type="editor">
<name>
<surname>Misra</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Muhammad-Bello</surname>
<given-names>B.</given-names>
</name>
</person-group> (<publisher-loc>Midtown Manhattan, New York City</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>415</fpage>&#x2013;<lpage>429</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-69143-1_32</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-69143-1_32">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Sooner+Lightweight+Cryptosystem:+Towards+Privacy+Preservation+of+Resource-Constrained+Devices&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Atlam</surname>
<given-names>H. F.</given-names>
</name>
<name>
<surname>Wills</surname>
<given-names>G. B.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Technical Aspects of Blockchain and IoT</article-title>. <source>Adv. Comput.</source> <volume>115</volume>, <fpage>1</fpage>&#x2013;<lpage>39</lpage>. <pub-id pub-id-type="doi">10.1016/bs.adcom.2018.10.006</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/bs.adcom.2018.10.006">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Technical+Aspects+of+Blockchain+and+IoT&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B7">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Azzaoui</surname>
<given-names>A. E.</given-names>
</name>
<name>
<surname>Singh</surname>
<given-names>S. K.</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Park</surname>
<given-names>J. H.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Block5GIntell: Blockchain for AI-Enabled 5G Networks</article-title>. <source>IEEE Access</source> <volume>8</volume>, <fpage>145918</fpage>&#x2013;<lpage>145935</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2020.3014356</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/ACCESS.2020.3014356">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Block5GIntell:+Blockchain+for+AI-Enabled+5G+Networks&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Battineni</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Sagaro</surname>
<given-names>G. G.</given-names>
</name>
<name>
<surname>Chinatalapudi</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Applications of Machine Learning Predictive Models in the Chronic Disease Diagnosis</article-title>. <source>J. Pers. Med.</source> <volume>10</volume>, <fpage>21</fpage>. <pub-id pub-id-type="doi">10.3390/jpm10020021</pub-id> <ext-link ext-link-type="uri" xlink:href="https://pubmed.ncbi.nlm.nih.gov/32244292/">PubMed Abstract</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/jpm10020021">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Applications+of+Machine+Learning+Predictive+Models+in+the+Chronic+Disease+Diagnosis&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B9">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Brand&#xe3;o</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Mamede</surname>
<given-names>H. S.</given-names>
</name>
<name>
<surname>Gon&#xe7;alves</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Systematic Review of the Literature, Research on Blockchain Technology as Support to the Trust Model Proposed Applied to Smart Places</article-title>. In: <source>Advances in Intelligent Systems and Computing</source>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer-Verlag</publisher-name> p. <fpage>1163</fpage>. <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Systematic+Review+of+the+Literature,+Research+on+Blockchain+Technology+as+Support+to+the+Trust+Model+Proposed+Applied+to+Smart+Places&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B10">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Cao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Edge Computing: A Primer</article-title>,&#x201d; in <source>SpringerBriefs in Computer Science</source>, <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>. <pub-id pub-id-type="doi">10.1007/978-3-030-02083-5_1</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-02083-5_1">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Edge+Computing:+A+Primer&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B11">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Chatterjee</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Chatterjee</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2017</year>). &#x201c;<article-title>An Overview of the Emerging Technology: Blockchain</article-title>,&#x201d; in <conf-name>Proceedings of the2017 International Conference on Computational Intelligence and Networks, CINE</conf-name> (<publisher-name>IEEE</publisher-name>), <fpage>126</fpage>&#x2013;<lpage>127</lpage>. <pub-id pub-id-type="doi">10.1109/cine.2017.33</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/cine.2017.33">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=An+Overview+of+the+Emerging+Technology:+Blockchain&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Conti</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Sandeep Kumar</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Lal</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Ruj</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>A Survey on Security and Privacy Issues of Bitcoin</article-title>. <source>IEEE Commun. Surv. Tutorials</source> <volume>20</volume> (<issue>4</issue>), <fpage>3416</fpage>&#x2013;<lpage>3452</lpage>. <pub-id pub-id-type="doi">10.1109/comst.2018.2842460</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/comst.2018.2842460">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=A+Survey+on+Security+and+Privacy+Issues+of+Bitcoin&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B13">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Ensor</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Schefer-Wenzl</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Miladinovic</surname>
<given-names>I.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>Blockchains for IoT Payments: A Survey</article-title>,&#x201d; in <conf-name>2018 IEEE Globecom Work GC Wkshps</conf-name> (<publisher-name>IEEE</publisher-name>). <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Blockchains+for+IoT+Payments:+A+Survey&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Faroukhi</surname>
<given-names>A. Z.</given-names>
</name>
<name>
<surname>El Alaoui</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Gahi</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Amine</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A Multi-Layer Big Data Value Chain Approach for Security Issues</article-title>. <source>Procedia Comput. Sci.</source> <volume>175</volume>, <fpage>737</fpage>&#x2013;<lpage>744</lpage>. <pub-id pub-id-type="doi">10.1016/j.procs.2020.07.109</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.procs.2020.07.109">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=A+Multi-Layer+Big+Data+Value+Chain+Approach+for+Security+Issues&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Feng</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Zeadally</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>M. K.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A Survey on Privacy Protection in Blockchain System</article-title>. <source>J. Netw. Comput. Appl.</source> <volume>126</volume>, <fpage>45</fpage>&#x2013;<lpage>58</lpage>. <pub-id pub-id-type="doi">10.1016/j.jnca.2018.10.020</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.jnca.2018.10.020">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=A+Survey+on+Privacy+Protection+in+Blockchain+System&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ferrag</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Derdour</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Mukherjee</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Derhab</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Maglaras</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Janicke</surname>
<given-names>H.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Blockchain Technologies for the Internet of Things: Research Issues and Challenges</article-title>. <source>IEEE Internet Things J.</source> <volume>6</volume>, <fpage>2188</fpage>&#x2013;<lpage>2204</lpage>. <pub-id pub-id-type="doi">10.1109/JIOT.2018.2882794</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/JIOT.2018.2882794">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Blockchain+Technologies+for+the+Internet+of+Things:+Research+Issues+and+Challenges&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hassan</surname>
<given-names>M. U.</given-names>
</name>
<name>
<surname>Rehmani</surname>
<given-names>M. H.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Privacy Preservation in Blockchain Based IoT Systems: Integration Issues, Prospects, Challenges, and Future Research Directions</article-title>. <source>Future Gener. Comput. Syst.</source> <volume>97</volume>, <fpage>512</fpage>&#x2013;<lpage>529</lpage>. <pub-id pub-id-type="doi">10.1016/j.future.2019.02.060</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.future.2019.02.060">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Privacy+Preservation+in+Blockchain+Based+IoT+Systems:+Integration+Issues,+Prospects,+Challenges,+and+Future+Research+Directions&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Meng</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Tischhauser</surname>
<given-names>E. W.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>When Intrusion Detection Meets Blockchain Technology: A Review</article-title>. <source>IEEE Access</source> <volume>6</volume>, <fpage>10179</fpage>&#x2013;<lpage>10188</lpage>. <pub-id pub-id-type="doi">10.1109/access.2018.2799854</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/access.2018.2799854">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=When+Intrusion+Detection+Meets+Blockchain+Technology:+A+Review&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B19">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mukkamala</surname>
<given-names>R. R.</given-names>
</name>
<name>
<surname>Vatrapu</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Ray</surname>
<given-names>P. K.</given-names>
</name>
<name>
<surname>Sengupta</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Halder</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Blockchain for Social Business: Principles and Applications</article-title>. <source>IEEE Eng. Manag. Rev.</source> <volume>46</volume>, <fpage>94</fpage>&#x2013;<lpage>99</lpage>. <pub-id pub-id-type="doi">10.1109/EMR.2018.2881149</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/EMR.2018.2881149">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Blockchain+for+Social+Business:+Principles+and+Applications&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Namasudra</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Devi</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Kadry</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Sundarasekar</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Shanthini</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Towards DNA Based Data Security in the Cloud Computing Environment</article-title>. <source>Comput. Commun.</source> <volume>151</volume>, <fpage>539</fpage>&#x2013;<lpage>547</lpage>. <pub-id pub-id-type="doi">10.1016/j.comcom.2019.12.041</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.comcom.2019.12.041">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Towards+DNA+Based+Data+Security+in+the+Cloud+Computing+Environment&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Naz</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Al-zahrani</surname>
<given-names>F. A.</given-names>
</name>
<name>
<surname>Khalid</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Javaid</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Qamar</surname>
<given-names>A. M.</given-names>
</name>
<name>
<surname>Afzal</surname>
<given-names>M. K.</given-names>
</name>
<etal/>
</person-group> (<year>2019</year>). <article-title>A Secure Data Sharing Platform Using Blockchain and Interplanetary File System</article-title>. <source>Sustainability</source> <volume>11</volume> (<issue>7054</issue>), <fpage>1</fpage>&#x2013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.3390/su11247054</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/su11247054">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=A+Secure+Data+Sharing+Platform+Using+Blockchain+and+Interplanetary+File+System&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Salman</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Zolanvari</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Erbad</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Jain</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Samaka</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Security Services Using Blockchains: A State of the Art Survey</article-title>. <source>IEEE Commun. Surv. Tutorials</source> <volume>21</volume> (<issue>1</issue>), <fpage>858</fpage>&#x2013;<lpage>880</lpage>. <pub-id pub-id-type="doi">10.1109/comst.2018.2863956</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/comst.2018.2863956">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Security+Services+Using+Blockchains:+A+State+of+the+Art+Survey&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>van Klompenburg</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Kassahun</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Catal</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Crop Yield Prediction Using Machine Learning: A Systematic Literature Review</article-title>. <source>Comput. Electron. Agric.</source> <volume>177</volume>, <fpage>105709</fpage>. <pub-id pub-id-type="doi">10.1016/j.compag.2020.105709</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.compag.2020.105709">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Crop+Yield+Prediction+Using+Machine+Learning:+A+Systematic+Literature+Review&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Ouyang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Yuan</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Ni</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>F-Y.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends</article-title>. <source>IEEE Trans. Syst. Man. Cybern. Syst.</source> <volume>49</volume>, <fpage>2266</fpage>&#x2013;<lpage>2277</lpage>. <pub-id pub-id-type="doi">10.1109/tsmc.2019.2895123</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/tsmc.2019.2895123">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Blockchain-Enabled+Smart+Contracts:+Architecture,+Applications,+and+Future+Trends&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A Survey on Privacy Protection of Blockchain: The Technology and Application</article-title>. <source>IEEE Access</source> <volume>8</volume>, <fpage>108766</fpage>&#x2013;<lpage>108781</lpage>. <pub-id pub-id-type="doi">10.1109/access.2020.2994294</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/access.2020.2994294">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=A+Survey+on+Privacy+Protection+of+Blockchain:+The+Technology+and+Application&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B26">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Wirth</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Kolain</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Privacy by BlockChain Design: A Blockchain-Enabled GDPR-Compliant Approach for Handling Personal Data</article-title>,&#x201d; in <conf-name>ERCIM-Blockchain 2018: Blockchain Engineering - Challenges and Opportunities for Computer Science Research</conf-name>. <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Privacy+by+BlockChain+Design:+A+Blockchain-Enabled+GDPR-Compliant+Approach+for+Handling+Personal+Data&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Artificial Convolutional Neural Network in Object Detection and Semantic Segmentation for Medical Imaging Analysis</article-title>. <source>Front. Oncol.</source> <volume>11</volume>, <fpage>1</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.3389/fonc.2021.638182</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fonc.2021.638182">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Artificial+Convolutional+Neural+Network+in+Object+Detection+and+Semantic+Segmentation+for+Medical+Imaging+Analysis&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B28">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Application of Blockchain in Internet of Things</article-title>,&#x201d; in <source>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source> (<publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer-Verlag</publisher-name>), <fpage>73</fpage>&#x2013;<lpage>82</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-00018-9_7</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-030-00018-9_7">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Application+of+Blockchain+in+Internet+of+Things&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yazdinejad</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Parizi</surname>
<given-names>R. M.</given-names>
</name>
<name>
<surname>Dehghantanha</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Srivastava</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Aledhari</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Enabling Drones in the Internet of Things with Decentralized Blockchain-Based Security</article-title>. <source>IEEE Internet Things J.</source> <volume>8</volume> (<issue>8</issue>), <fpage>6406</fpage>. <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Enabling+Drones+in+the+Internet+of+Things+with+Decentralized+Blockchain-Based+Security&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Qin</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Optimized Compression for Implementing Convolutional Neural Networks on FPGA</article-title>. <source>Electronics</source> <volume>8</volume>, <fpage>295</fpage>. <pub-id pub-id-type="doi">10.3390/electronics8030295</pub-id> <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/electronics8030295">CrossRef Full Text</ext-link> &#x7c; <ext-link ext-link-type="uri" xlink:href="https://scholar.google.com/scholar?hl=en&#x0026;as_sdt=0%2C5&#x0026;q=Optimized+Compression+for+Implementing+Convolutional+Neural+Networks+on+FPGA&#x0026;btnG=">Google Scholar</ext-link>
</citation>
</ref>
</ref-list>
</back>
</article>