Machine Learning In/for Blockchain: Future and Challenges
Machine Learning In/for Blockchain: Future and Challenges
challenges
arXiv:1909.06189v3 [cs.CR] 8 Dec 2020
Abstract
Machine learning and blockchain are two of the most noticeable technologies
in recent years. The first one is the foundation of artificial intelligence and
big data, and the second one has significantly disrupted the financial indus-
try. Both technologies are data-driven, and thus there are rapidly growing
interests in integrating them for more secure and efficient data sharing and
analysis. In this paper, we review the research on combining blockchain and
machine learning technologies and demonstrate that they can collaborate
efficiently and effectively. In the end, we point out some future directions
and expect more researches on deeper integration of the two promising tech-
nologies.
Keywords: Blockchain, Bitcoin, deep learning, machine learning, rein-
forcement learning.
1 INTRODUCTION
A blockchain is a shared, distributed public ledger that stores transaction
data in a chain of sequential blocks (Dinh & Thai, 2018). The data (block)
are time-stamped and validated before adding to the chain. Each block
contains information from the previous one. The mathematical structure
for storing data makes it nearly impossible to fake (MIT Technology Re-
view Editors, 2018). Thanks to the legacy of cryptocurrency, the term
∗
Ph.D. student, Department of Industrial Engineering, Purdue University.
†
Associate Professor, Department of Industrial and System Engineering, North Car-
olina State University.
‡
Assistant Professor, Department of Industrial Engineering, Purdue University.
§
Corresponding Author. Professor, Department of Statistics, Purdue Univer-
sity. Guang Cheng gratefully acknowledges NSF DMS-1712907, DMS-1811812, DMS-
1821183,and Office of Naval Research, (ONR N00014-18-2759).
1
”blockchain” has transformed from a cryptography terminology to a buzz
word. Many people believe that cryptocurrency IS blockchain. This is incor-
rect. While blockchain is the foundation of cryptocurrency, the applications
of the blockchain technology are much wider. Scenarios involving data vali-
dating, auditing, and sharing can all consider applying blockchains.
In this paper, we review the research on combining blockchain and ma-
chine learning technologies and demonstrate that they can collaborate ef-
ficiently and effectively. Machine learning is a general terminology that
includes variety of methods, machine learning, deep learning and reinforce-
ment learning. These methods are the core technology for big data analysis
(Buhlmann et al., 2019). As a distributed and append-only ledger system,
the blockchain is a natural tool for sharing and handling big data from
various sources through the incorporation of smart contracts (i.e., a piece
of code that will execute automatically in certain conditions). More specifi-
cally, blockchain can preserve data security and encourage data sharing when
training and testing machine learning models. Also, it allows us to utilize
distributed computing powers (for example, IOT), for developing on-time
prediction models with various sources of data. This is especially impor-
tant for deep learning procedures which require a tremendous amount of
computational power. On the other hand, blockchain systems will generate
a huge amount of data from different sources, and the distributed systems
are harder to monitor and control than the centralized ones. Efficient data
analysis and forecasting of the system behaviors are critical for optimal
blockchain mechanism designs. In addition, machine learning can facilitate
the data verification process and identifying malicious attacks and dishonest
transactions in the blockchain. The interdisciplinary research on combining
the two technologies is of great potential.
In this paper, we review articles that are either using machine learn-
ing techniques to study the blockchain system/structure itself or imple-
menting blockchain techniques to improve machine learning, e.g., collab-
orative/distributed learning. The reviewed papers are summarized in Table
1 below. For papers that apply machine learning and blockchain techniques
separately to various areas, we do not include them in our review but list
some of them in Table 2 below. In the rest of this paper, we first review basic
structure and terminology of blockchain in Section 2. The review is by no
means exhaustive, but sufficient for Sections 3, 4, and 5 that introduce how
different machine learning methods can be incorporated into the blockchain
system. Our work is concluded by Section 6 to discuss potential research
directions and challenges that are arose from ongoing and future fusion of
machine learning and blockchain.
2
Method Application Paper
Supervised/Unsupervised Learning Yin & Vatrapu (2017), Jourdan et al. (2018),
Transaction Entity Classification
without Deep Methods Akcora et al. (2020)
Jourdan et al. (2018), Shah & Zhang (2014),
Bitcoin Price Prediction
Akcora et al. (2019), Abay et al. (2019), Dey et al. (2020)
Supervised Learning Harris & Waggoner (2019), Chen et al. (2018),
Privacy and Security Preserving
with Deep Methods Zhu, Li, & Yu (2019)
Computation Power Allocation Luong et al. (2018)
Mcnally, Roche, & Caton (2018), Lahmiri & Bekiros (2019),
Cryptocurrency Price Prediction
Alessandretti et al. (2018)
Reinforcement Learning IoT Network Liu, Lin, & Wen (2018)
Eyal & Sirer (2014), Sapirshtein, Sompolinsky & Zohar (2017),
Bitcoin Mining
Wang, Liew, & Zhang (2019)
2 REVIEW ON BLOCKCHAIN
A blockchain, literally speaking, is just a chain of digital blocks. Each block
contains a certain amount of data; and the chain connects these data to
form a distributed database. A newly created block includes multiple trans-
actions collected from nodes and broadcasts to every node on the network.
It can be accepted and added to the blockchain by nodes that have the same
consensus protocol. Each added block includes information of the previous
block in the chain. Hence, if the block is changed, all blocks before this
block will be invalid as well. The strategies to reach agreement of the new
block (consensus) vary in different types of blockchain. The mathematical
structure of the blockchain implies two essential properties: (i) the data (in
block) is immutable (MIT Technology Review Editors, 2018); (ii) the dis-
tributed network with consensus allows users to communicate directly with
each other and download a copy of the current ledger, which means that
there is continuous monitoring and redundancy of the data in the network.
Therefore, the blockchain is more robust to individual outrages and attacks.
Depending on who can access to the blockchain and who can validate the
data, the blockchain can be classified into public chains, private chains, and
consortium chains (Zheng et al., 2018). The comparison of three different
types of blockchains is shown in the Table 3.
3
Attribute Public Private Consortium
Who run/manage the chain All miners One organization/user Selected users
Permission to Access No Yes Yes
Security Nearly impossible to fake Could be tampered Could be tampered
Efficiency Low High High
Centralized No Yes Partial
Example Bitcoin, Ethereum IBM HyperLedger Quorum
In what follows, we use the bitcoin system, which is the most known
blockchain application, as an example to demonstrate how blockchain works
in detail. Typically, an end-to-end blockchain-based transaction needs to
be validated at two different levels, the node level and the block level. The
transaction is first verified between two nodes (Zheng et al., 2018). Then
a unique digital signature, which is a hash wrapping all information of the
transaction, is created. The digital signature that represents the transaction
is submitted to the transaction pool and is waited to be added to a new block.
Before the new block is accepted by the blockchain network, it is required
to be validated by other miners on the network through the Proof-of-Work
(PoW) consensus protocol. The PoW process includes aggregating a set of
transactions to the new block and finding a hash value that is lower than
the target value (Ghimire & Selvaraj, 2018). The new block is only accepted
by the network if transactions are valid and unspent. Other nodes continue
working on creating the new block using the hash from the previous block
(Nakamoto, 2008).
Since the probability that finding a new valid block is extremely low and
the PoW process requires a huge amount of computing power and a high con-
sumption of the electricity, miners tend to collaborate with each other and
form a mining pool. After participating in a mining pool, individual miner
could receive a steady reward and significantly lower the risk. On the other
hand, the mining pools usually charge membership fees to each participant
and allocate rewards to each miner according to their own rewards shar-
ing mechanisms (Bhaskar & Lee, 2015). Some common reward allocation
mechanisms in practice are Pay-Per-Last-N-Shares (PPLNS) (Qin, Yuan, &
Wang, 2019) and Full-Pay-Per-Share (FPPS) (Zhu et al., 2018). Another
popular public chain is Ethereum (Wood, 2014), which allows users to send
not only digital coins but also smart contracts (Wohrer & Zdun, 2018). In
order to reduce the energy consumption on the validation, Ethereum plans
to switch its consensus protocol from the PoW to the Proof-of-Stake (PoS)
gradually (Saleh, 2020).
4
3 SUPERVISED/UNSUPERVISED LEARNING
WITHOUT DEEP METHODS
In this section, we review several applications of machine learning for the
blockchain. Specifically, Section 3.1 reviews three studies regarding trans-
action entities classification (Yin & Vatrapu, 2017; Jourdan et al., 2018;
Akcora et al., 2020) with different purposes. One focuses on the recognition
of cybercriminal entities using supervised learning (Yin & Vatrapu, 2017) as
well as topological data analytics (TDA) method (Akcora et al., 2020), while
another on the recognition of common categories of entities for most trans-
actions (Jourdan et al., 2018). Section 3.2 reviews Bitcoin price prediction
from different perspectives such as probabilistic graphic models (Jourdan et
al., 2018), Bayesian regression (Shah & Zhang, 2014) and feature selection
on the blockchain topological structure using Granger causality and TDA
(Akcora et al., 2019; Abay et al., 2019; Dey et al., 2020).
5
the bitcoin address graph by first grouping similar addresses into nodes and
then putting common addresses between two nodes into the set of edges.
The TDA is an approach commonly used for dimension reduction. It rep-
resents the data set in a graph by first dividing data to sub-samples based
on different filtration criteria and then clustering similar points in each sub-
sample. The Bitcoin transaction graph model is a directed graph, denoted
as G = (V, E, B), where V is the set of vertices, E is a set of edges and
B = {Address, Transaction} is a set of node types. By using six graph fea-
tures extracted for each address, a TDA Mapper method is applied to create
six filtered cluster tree graphs. After calculating the number of ransomware
addresses in each cluster, denoted as V , a suspicion score is assigned to a
new address. The suspicion scores of addresses in the cluster are set to be 0
initially. It increments by one if inclusion and size thresholds are satisfied as
follow: (1) the inclusion threshold, denoted as 1 , times the total amount of
labeled ransomware addresses is less than V ; (2) the size threshold, denoted
as 2 , times the number of labeled ransomware addresses in the cluster is
greater than the number of all addresses in the cluster. Suspicious addresses
are then filtered by a quantile threshold, denoted as q, when their suspicious
scores are higher than the quantile threshold. The result indicates that the
best TDA model with 1 = 0.05, 2 = 0.35, q = 0.7 outperforms random
forest (RF), and XGBoost in new ransomware addresses prediction.
Jourdan et al. (2018) are interested in classifying entities of transactions
into four most common categories: Exchange, Service, Gambling, Mining
Pool, based on data collected from 97 sources (Ermilov, Panov, & Yanovih,
2017). The goal of classification is to assist in selecting an appropriate
prediction model that is built according to categories of transactions (Jour-
dan et al., 2018). The applied classification method is a gradient boosted
decision tree algorithm along with a Gaussian process based optimization
procedure that determines optimal hyperparameters. Table 4 concludes that
accuracy’s in Exchange, Gambling, and Service categories are high. How-
ever, the accuracy in the Mining Pool category is poor. This may indicate
that mining activities may not be appropriate as an independent label.
6
Category Accuracy F1 Precision
Exchange 0.94 0.92 0.91
Gambling 0.95 0.97 1.00
Mining 0.50 0.67 1.00
Service 0.95 0.88 0.83
Overall 0.92 0.91 0.92
7
Figure 1: Block-transaction Address Model (Jourdan et al., 2018)
8
by (3.2). Then ∆p over a 10-second period is formulated as
3
X
∆p = w0 + wj ∆pj + w4 r (3.3)
j=1
9
Figure 2: A Transaction-Address Graph
10
Jang & Lee (2018), and Sun, Liu, & Sima (2018), it is hard to include all
papers in the review. As a result, we will move on to review more articles
in prediction of cryptocurrency price using deep learning in Section 4.
11
gradient, denoted as ∇gk (wt )∗ , by adding a noise factor to the local gradient.
The message broadcasts a pseudo-identity of Pk , normalized hidden local
gradient, denoted as ∇gbk (wt )∗ , together with the norm of its un-normalized
version to computing nodes on the network. In the final phase, after solving
Proof-of-Work (PoW), the winner node selects top l-nearest local normalized
gradients according to the cosine distance between each normalized local
gradient and the sum vector of ∇gk (wt )∗ to update the global gradient. The
predictive model is updated by wt+1 = wt + η∇J(wt ), where ∇J(wt ) is the
updated global gradient.
“Learning Chain” is trained and tested in three different data sets: syn-
thetic data set; Wisconsin breast cancer data set; MNIST data set; using
the Ethereum blockchain framework. There exists a trade-off between pri-
vacy and accuracy in the sense that decreasing the privacy budget leads to
an increase of test errors on all data sets. This proposed model is further
compared with the “Learning ChainEX”, which is implemented with higher
differential privacy and has similar test error.
Zhu, Li, & Yu (2019) develop a blockchain-based privacy-preserving
framework to secure the share of updates in federated learning. The Fed-
erated Learning algorithm is developed by McMahan et al., (2017), which
allows each mobile device to compute and upload updates to the global pre-
dictive model based on their local data sets. A security issue arises when
there exist Byzantine devices in the network. In this case, the blockchain
transaction mechanism is adopted to ensure the security of sharing and
updating changes. Specifically, model updates are written in a blockchain
transaction by nodes. Along with the digital signature of a node, a trans-
action broadcasts to other nodes information, including changes of hyper-
parameters and weights, public keys (participants’ addresses). Other nodes
validate the transaction and test updates according to their local data sets.
If most nodes confirm that the performance score of the updated model is
higher than the existing model under their local data sets, the updates are
implemented into the current model.
12
size divided by initial computing capacity is larger. The ECSP evaluates all
valuation profiles and maximizes its revenue in the following steps.
An allocation rule is applied to map transformed valuation profiles, de-
noted as v i := φi (vi ), to assignment probabilities using a Softmax function.
The winner miner i will pay the price pi := φ−1 i (ReLU(maxi6=j v j )). In the
end, the loss function of ECSP is defined as
N
(w,β) (w,β)
X
R(w,
b β) = − gi (vs )pi (vs ) (4.1)
i=1
13
(DFA) to detect chaos characteristics of cryptocurrency price data without
having the assumption of stationarity. Then a deep neural network (DLNN)
model with LSTM implementation (Hochreiter & Schmidhuber, 1997) and
a generalized regression neural network (GRNN) model (Specht, 1991) are
built to predict three types of cryptocurrency: Bitcoin, Digital Cash, and
Ripple price. The number of data samples obtained for the model is 3006
Bitcoin, 1704 Digital Cash ,and 1357 Ripples. The authors create a many-
to-many sequence prediction, which utilizes the first 90% observations for
training and the last 10% observations for testing and out-of-sample forecast-
ing. According to Figure 3 whose x-axis represents the time horizon and the
y-axis represents the price, positive Hurst exponent (HE) value indicates
long-memory features of data, and negative LLE value indicates training
data is chaos. As a result, a short-term prediction model would be suitable
for data. The simulation results claim that the LSTM model outperforms
the GRNN model in all three cryptocurrencies’ price predictions. Although
the RMSE of the LSTM model is still high, the model demonstrates a similar
trend to real price changes for all three cryptocurrencies.
Besides cryptocurrency price prediction, Alessandertti et al. (2018) ex-
plore a portfolio analysis by forecasting daily prices of 1681 types of cryp-
tocurrencies. Three models are developed to predict the prices of every kind
of cryptocurrency. For each type c, the target is the return of investment
(ROI) at each time ti ∈ {0, ..., 895}, which is expressed as:
price(c, ti ) − price(c, ti − 1)
ROI(c, ti ) = (4.2)
price(c, ti − 1)
Features considered are price, market capitalization, market share, rank, and
volume. The first model is an ensemble of regression trees using XGboost,
which features of each type of cryptocurrency are paring with prices of each
type of cryptocurrency. The second model is a regression model by consid-
ering features of all kinds of cryptocurrency as a whole paired with prices
of each type of cryptocurrency. The third model adopts RNN with LSTM
implementation with the second model’s features and target paring strategy.
All models are one-step ahead forecasting. A portfolio is constructed based
on the predicted prices. Model hyperparameters are optimized by maximiz-
ing either sharp ratio or geometric mean of the total return. The result
concludes that all three models generate profits, and the optimization of
parameters using the sharp ratio metric achieves a higher return. Another
conclusion is that the first two models implementing gradient boosting with
decision trees have higher accuracy for the short-term (5-10 days), while the
14
Figure 3: Chaotic Analysis and Prediction Result (Lahmiri & Bekiros, 2019)
15
third model adopting LSTM has a better prediction performance in the long
term (around 50 days).
5 REINFORCEMENT LEARNING
In this section, we first review a framework that incorporates reinforcement
learning into blockchain to ensure the security of data collection, storage
and processing in the IoT network (Liu, Lin, & Wen, 2018). Secondly, we
review two types of frameworks that study the Bitcoin blockchain mining
activities. The first explores the potential of Bitcoin mining through the
mobile network (Nguyen et al., 2020). While the second formulate a Markov
decision process (MDP) for the blockchain mining activity (Eyal & Sirer,
2014; Sapirshtein, Sompolinsky, & Zohar 2017). The last work in the review
applies a new reinforcement learning algorithm to find the optimal mining
strategy (Wang, Liew, & Zhang, 2019).
5.1 IoT
Liu, Lin, & Wen (2018) propose a framework to secure data collection and
sharing among mobile terminals (MTs) on the IoT network. The framework
consists of two phases: data collection and data sharing. In the first phase,
each MT, denoted as m, adopts multi-agent deep reinforcement learning
(DRL) to maximize efficacy of data collection. The state space is defined
as S = {S1 , S2 , S3 }. Here, S1 = {(xk , y k ), (xc , y c )} is a set of state which
represents coordinates of k Point-of-Interest (PoIs) and c obstacles in the
environment, denoted as Ex × Ey , where x ∈ [0, Ex ], y ∈ [0, Ey ]; S2 stands
for MTs’ coordinates and S3 represents sensing time ht (k) ∈ [0, t] for the
i-th POI. Action space consists of moving direction, denoted as θtm , and
moving distance, denoted as ltm . Thus, it is written as A = {(θtm , ltm ) | θtm ∈
[0, 2π), ltm ∈ [0, lmax )}. The reward rtm is given as
wt bm
t
rtm = (5.1)
αbm
t + κltm
where bmt is the amount of collected data, α, κ are the energy consumption
per collected data and per travelled distance; wt is the achieved geographical
( K ht (k))2
P
fairness, calculated by wt = Pk=1
K Each MT is implemented by four
k k=1 ht (k)2
deep neural networks and actor-critic algorithm is applied to maximize the
reward.
16
After MTs finish the data collection, they share data through an Ethereum
blockchain network. However, the first step would be to send data to the
certificate authority (CA) for verification. Once CA verifies the ownership
of MTs’ data and checks the consistence of received data and original data
stored in the terminal, a digital signature is generated and sent back to the
MT. As a result, the MT is able to broadcast its transaction request consist-
ing of digital signature of CA, original data and its public key to other nodes
on blockchain network to be further validated. By comparing to randomly
moving MTs, MTs implemented DRL collect much more data but consume
more energy. The blockchain-based data sharing framework can still store
all data sent by MTs even under Dos attack.
17
assumes that the block generation time follows Poisson distribution and it is
independently with each other. The new block is created by an honest agent
with probability (1 − α), while the new block is obtained by the adversary
agent, also known as an attacker, with probability α. The adversary may
hide some blocks on its own private chain, but the blockchain is always the
longest public chain. The state space of the MDP is defined as (a, h, f ork),
where a represents the number of blocks on the adversary’s private chain;
h represents the number of blocks on the public chain; fork is an environ-
ment variable that has three values, which are (irrelevant, relevant, active).
(a, h, irrelevant) denotes the case when previous state is (a−1, h) and match
action is feasible, i.e., the last mined block accepted by the chain is mined
by the adversary miner; (a, h, relevant) denotes the case when previous
state is (a, h − 1) and match action is infeasible, i.e., the last mined block
is mined by the honest miner; active refers to the case that the network
is broken into two branches containing the same number of blocks. When
f ork = active, the probability that follows the honest block is γ and the
probability that follows the adversary block is 1 − γ. The action space, de-
fined as A = (Adopt, Override, M atch, W ait), contains four actions. The
Adopt refers to an agent always mines mines the last block on the public
chain and do not have any blocks on its private chain. The Override be-
comes feasible when the number of blocks on the private chain is more than
the number of blocks on the public chain. In other words, all blocks on the
private chain are published to replace the existing public chain. The M atch
action refers to the adversary agent releases the same number of blocks as
the current public chain, which creates a fork on the public chain. The
W ait action is always feasible, which the adversary agent keeps mining on
its private chain and not releasing any new blocks to the public chain. The
transition probability matrix is shown in Table 6. Since the honest agent
is consider as a part of environment, we only focus on finding the optimal
strategy for adversary agents. The number of blocks on the public chain is
considered as rewards. The reward is formulated as two dimensions, which
are the number of blocks mined by honest agents and adversary agents sep-
arately. The reward function then considers relative reward instead of a
absolute reward. The objective function is defined as 5.2.
q a (s, a)
f (s, a) = (5.2)
q a (s, a) + q h (s, a)
Wang, Liew, & Zhang (2019) plan to apply the off-policy based Q-
learning to solve the problem, unfortunately the reason that Q-learning is
used there does not mention in the original paper. Since Q-learning can
18
State, Action State + 1 Transition Prob. Reward
(a, h, ), adopt (1, 0, irrelevant) α (0, h)
(0, 1, irrelevant) 1−α (0, h)
(a, h, ), override (a − h, 0, irrelevant) α (h + 1, 0)
(a − h − 1, 1, relevant) 1−α (h + 1, 0)
(a, h, irrelevant), wait (a + 1, h, irrelevant) α (0, 0)
(a, h, relevant), wait (a, h + 1, relevant) 1−α (0, 0)
(a, h, active), wait (a + 1, h, active) α (0, 0)
(a, h, relevant), match (a − h, 1, relevant) ˙ − α)
γ (1 (h, 0)
(a, h + 1, relevant) ˙ − α)
(1 − γ)(1 (0, 0)
only solve a linear reward function, the authors propose a new RL multi-
dimensional algorithm based on the off-policy Q-learning. The new algo-
rithm considers two Q-functions, i.e., a pair of (Q(a) (s, a), Q(h) (s, a)). At
a , r h ) from the en-
each time step, the adversary agent observes (st+1 , rt+1 t+1
vironment. Then two Q-functions are updated as follows:
(a)
q (a) (st , at ) ← (1 − β)q (a) (st , at ) + β[(rt+1 + λq (a) (st+1 , a0 )] (5.3)
(h) (h) (h) (h) 0
q (st , at ) ← (1 − β)q (st , at ) + β[(rt+1 + λq (st+1 , a )] (5.4)
19
Figure 4: Simulation Result for Different Mining Strategies (Wang, Liew, &
Zhang, 2019)
20
cess. Although there exist a few works related to finding the optimal
mining strategy using single-agent reinforcement learning, individual
mining is not as popular as pool mining in reality. Specifically, miners
collaborate and compete with each other to mine blocks. A multi-agent
reinforcement learning (MARL) with a mixed setting of collaborative
and competitive agents is more suitable to model the complex pool
mining activity and helps miners find the optimal mining strategies in
the future.
References
[1] Abay, N. C., Akcora, C. G., Gel, Y. R., Kantarcioglu, M., Islambekov,
U. D., Tian, Y., & Thuraisingham, B. (2019). Chainnet: Learning on
blockchain graphs with topological features. In 2019 IEEE International
Conference on Data Mining (ICDM), 946–951.
[3] Agbo, C.C., Mahmoud, Q.H., & Eklund, J.M. (2019). Blockchain Tech-
nology in Healthcare: A Systematic Review. In Healthcare, 7, 56.
[4] Akcora, C. G., Dey, A. K., Gel, Y. R., & Kantarcioglu, M. (2019) Fore-
casting bitcoin price with graph chainlets. In Advances in Knowledge
Discovery and Data Mining. (Cham, 2018), D. Phung, V. S. Tseng, G. I.
21
Webb, B. Ho, M. Ganji, and L. Rashidi. (Eds). Springer International
Publishing, 765–776.
[5] Akcora, C. G., Li, Y., Gel, Y. R., & Kantarcioglu, M. (2020). Bitcoin-
Heist: Topological Data Analysis for Ransomware Prediction on the Bit-
coin Blockchain. In Twenty-Ninth International Joint Conference on Ar-
tificial Intelligence Special Track on AI in FinTech, 4439 - 4445
[6] Alessandretti, L., ElBahrawy, A., Aiello, L. M., & Baronchelli, A. (2018).
Anticipating cryptocurrency prices using machine learning. In Complexity
2018 .
[8] Bhattacharya, P., Tanwar, S., Bodke, U., Tyagi, S., & Kumar, N. (2019).
BinDaaS: Blockchain-Based Deep-Learning as-a-Service in Healthcare 4.0
Applications. In IEEE Transactions on Network Science and Engineering
[9] Bresler, G., Chen, G. H., & Shah, D. (2014). A latent source model for
online collaborative filtering. In Advances in Neural Information Process-
ing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence,
and K. Q. Weinberger, (Eds.) Curran Associates, Inc., 3347–3355.
[10] Buhlmann, P., Drineas, P., Kane, M., & van der Laan, M. (2019).
Handbook of big data. in CRC Press.
[11] Chen, G. H., Nikolov, S., & Shah, D. (2013). A latent source model
for nonparametric time series classification. In Advances in Neural Infor-
mation Processing Systems 26, C. J. C. Burges, L. Bottou, M. Welling,
Z. Ghahramani, and K. Q. Weinberger. (Eds.) Curran Associates, Inc.,
1088–1096.
[12] Chen, X., Ji, J., Luo, C., Liao, W., & Li, P. (2018). When machine
learning meets blockchain: A decentralized, privacy-preserving and secure
design. In 2018 IEEE International Conference on Big Data (Big Data),
IEEE, 1178–1187.
[13] Chung, K.-Y., Yoo, H., Choe, D.-E., & Jung, H. (2019). Blockchain
network based topic mining process for cognitive manufacturing. In Wire-
less Personal Communications, 105, 583–597.
22
[14] Dey, A. K., Akcora, C. G., Gel, Y. R., & Kantarcioglu, M. (2020).
On the role of local blockchain network features in cryptocurrency price
formation. In Canadian Journal of Statistics, 48(3), 561–581.
[16] Ermilov, D., Panov, M., & Yanovich, Y. (2017). Automatic bitcoin ad-
dress clustering. In 2017 16th IEEE International Conference on Machine
Learning and Applications (ICMLA), 461–466.
[17] Eyal, I. & Sirer, E. G. (2014). Majority is not enough: Bitcoin mining
is vulnerable. In Commun. ACM, 61(7), 95–102.
[19] Firdaus, A., Anuar, N., Faizal, M., Hashem, I., Bachok, S., & Ku-
mar, A. (2018). Root exploit detection and features optimization: Mobile
device and blockchain based medical data management. In Journal of
Medical Systems/, 42.
[21] Gökalp, E., Gökalp, M. O., Çoban, S., & Eren, P. E. (2018). Analysing
opportunities and challenges of integrated blockchain technologies in
healthcare. In Information Systems: Research, Development, Applica-
tions, Education (Cham, 2018), S. Wrycza and J. Maślankowski, (Eds.)
Springer International Publishing, 174–183.
[23] Greaves, A. S. & Au, B. (2015). Using the bitcoin transaction graph to
predict the price of bitcoin. Stanford Publishing.
23
Data Computing, Internet of People, and Smart World Congress
(UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 368–373.
[26] He, X., Liu, J., Jin, R., & Dai, H. (2017). Privacy-aware offloading
in mobile-edge computing. In GLOBECOM 2017 - 2017 IEEE Global
Communications Conference, 1–6.
[28] Jang, H. & Lee, J. (2018). An empirical study on modeling and predic-
tion of bitcoin prices with bayesian neural networks based on blockchain
information. In IEEE Access, 6, 5427–5437.
[30] Jourdan, M., Blandin, S., Wynter, L., & Deshpande, P. (2018). A prob-
abilistic model of the bitcoin blockchain. In CoRR.
[32] Khezr, S., Moniruzzaman, M., Yassine, A., & Benlamri, R. (2019).
Blockchain Technology in Healthcare: A Comprehensive Review and Di-
rections for Future Research. In Appl. Sci, 9, 1736.
[33] Khan, A.S., Zhang, X., Lambotharan, S., Zheng, G., AsSadhan, B., &
Hanzo, L. (2020). Machine Learning Aided Blockchain Assisted Frame-
work for Wireless Networks. In IEEE Network, 34(5) 262-268.
[35] Li, Z., Guo, H., Wang, W. M., Guan, Y., Barenji, A. V., Huang, G. Q.,
McFall, K. S., & Chen, X. (2019). A blockchain and automl approach for
24
open and automated customer service. In IEEE Transactions on Indus-
trial Informatics, 15(6), 3642–3651.
[36] Liu, C. H., Lin, Q., & Wen, S. (2018). Blockchain-enabled data collec-
tion and sharing for industrial iot with deep reinforcement learning. In
IEEE Transactions on Industrial Informatics, 15(6), 3516-3526.
[37] Luong, N. C., Xiong, Z., Wang, P., & Niyato, D. (2018). Optimal auc-
tion for edge computing resource management in mobile blockchain net-
works: A deep learning approach. In 2018 IEEE International Conference
on Communications (ICC), 1–6.
[38] Mamoshina, P., Ojomoko, L., Yanovich, Y., Ostrovski, A., Botezatu,
A., Prikhodko, P., Izumchenko, E., Aliper, A., Romantsov, K., Zhe-
brak, A., Ogu, I. O., & Zhavoronkov, A. (2017). Converging blockchain
and next-generation artificial intelligence technologies to decentralize
and accelerate biomedical research and healthcare. In Oncotarget, 9(5),
5665–5690.
[39] McMahan, B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A.
(2016). Communication-Efficient Learning of Deep Networks from De-
centralized Data. In Proceedings of the 20th International Conference on
Artificial Intelligence and Statistics, A. Singh and J. Zhu, (Eds.), 54 of
Proceedings of Machine Learning Research, PMLR, 1273–1282.
[40] Mcnally, S., Roche, J., & Caton, S. (2018). Predicting the price of
bitcoin using machine learning. In 2018 26th Euromicro International
Conference on Parallel, Distributed and Network-based Processing (PDP),
IEEE, 339–343.
[43] Nguyen, D. C., Pathirana, P., Ding, M., & Seneviratne, A. (2020).
Privacy-preserved task offloading in mobile blockchain with deep rein-
forcement learning. In IEEE Transactions on Network and Service Man-
agement, 1–1.
[44] Özyilmaz, K. R., Doğan, M., & Yurdakul, A. (2018). Idmob: Iot
data marketplace on blockchain. In 2018 Crypto Valley Conference on
Blockchain Technology (CVCBT), 11–19.
25
[45] Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M., &
Pustišek, M. (2018). Towards decentralized iot security enhancement: A
blockchain approach. In Computers and Electrical Engineering, 72, 266 –
273.
[46] Qin, R., Yuan, Y., & Wang, F.-Y. (2019). A novel hybrid share report-
ing strategy for blockchain miners in pplns pools. In Decision Support
Systems, 118, 91 – 101.
[47] Rathore, S., Pan, Y., & Park, J.H. (2019). BlockDeepNet: A
Blockchain-Based Secure Deep Learning for IoT Network. In Sustainabil-
ity, 11, 3974.
[49] Sapirshtein, A., Sompolinsky, Y., & Zohar, A. (2017). Optimal selfish
mining strategies in bitcoin. In Financial Cryptography and Data Security
(Berlin, Heidelberg, 2017), J. Grossklags and B. Preneel, (Eds.), Springer
Berlin Heidelberg, 515–532.
[50] Shah, D. & Zhang, K. (2014). Bayesian regression and bitcoin. In 2014
52nd Annual Allerton Conference on Communication, Control, and Com-
puting (Allerton), 409–414.
[51] Shen, M., Tang, X., Zhu, L., Du, X., & Guizani, M. (2019). Privacy-
preserving support vector machine training over blockchain-based en-
crypted iot data in smart cities. In IEEE Internet of Things Journal,
6(5), 7702–7712.
[52] Singla, K., Bose, J., & Katariya, S. (2018). Machine learning for secure
device personalization using blockchain. In 2018 International Conference
on Advances in Computing, Communications and Informatics (ICACCI),
67–73.
[54] Sun, X., Liu, M., & Sima, Z. (2020). A novel cryptocurrency price
trend forecasting model based on lightgbm. In Finance Research Letters,
32, 101084.
26
[55] Vyas, S., Gupta, M., & Yadav, R. (2019). Converging blockchain and
machine learning for healthcare. In 2019 Amity International Conference
on Artificial Intelligence (AICAI), 709–711.
[57] Wang, T., Liew, S. C., & Zhang, S. (2019). When blockchain meets ai:
Optimal mining strategy achieved by machine learning. arXiv eprints.
[58] S. Wang and J. Wang and X. Wang and T. Qiu and Y. Yuan and L.
Ouyang and Y. Guo and F. Wang (2018). Blockchain-Powered Parallel
Healthcare Systems Based on the ACP Approach. In IEEE Transactions
on Computational Social Systems, 5(4), 942 – 950.
[61] Xiong, W. & Xiong, L. (2019). Smart contract based data trading
mode using blockchain and machine learning. In IEEE Access, 7, 102331–
102344.
[63] Zheng, X., Mukkamala, R. R., Vatrapu, R., & Ordieres-Mere, J. (2018).
Blockchain-based personal health data sharing system using cloud stor-
age. In 2018 IEEE 20th International Conference on e-Health Networking,
Applications and Services (Healthcom), 1–6.
[64] Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2018). Blockchain
challenges and opportunities: a survey. In Int. J. of Web and Grid Ser-
vices, 14, 4.
27
[65] Zhu, S., Li, W., Li, H., Hu, C., & Cai, Z. (2019). A survey: Reward
distribution mechanisms and withholding attacks in bitcoin pool mining.
In Mathematical Foundations of Computing, 1, 393.
[66] Zhu, X., Li, H., & Yu, Y. (2019). Blockchain-based privacy preserv-
ing deep learning. In Information Security and Cryptology (Cham, 2019),
F. Guo, X. Huang, and M. Yung, (Eds.), Springer International Publish-
ing, 370–383.
28