-
摘要: 元宇宙作為一個新興的概念受到了產業界、學術界、媒體界及公眾的廣泛關注,國內外眾多公司也紛紛在“元宇宙”領域布局,但布局的背后離不開強大的技術支持。本文從技術維度深入剖析元宇宙。首先,從科學與技術的角度論述元宇宙的概念及內涵,并總結了目前從業者、專家以及學者對元宇宙的不同見解。其次,概述了元宇宙相關關鍵技術,包括網絡及運算技術(5G、6G、物聯網、云計算、霧計算及邊緣計算)、管理技術(能耗管理、資源管理、會話管理及時空一致性管理)、虛實對象連接、建模與管理技術(X聯網、身份建模、社會計算、去中心化管理技術)、虛實空間交互與融合技術(拓展現實、電子游戲技術、腦機接口技術)等。元宇宙不宜稱為新技術,而是IT新技術的綜合運用。技術的進步與發展,將為元宇宙的實現和應用奠定堅實的基礎,同時元宇宙的發展也會促進現有技術的升級換代。最后,展望了元宇宙發展面臨的諸多挑戰,以清晰認識、理智決策、穩步探索元宇宙。Abstract: As an emerging concept, metaverse has attracted extensive attention from industry, academia, media, and the public, prompting many companies worldwide about its layout. However, the layout is inseparable from strong technical support. In the early developmental stage of the metaverse, its technology is the core foundation. The development and innovation of technology are the top priority. This paper dived into the metaverse from the technical view. First, the paper discussed the metaverse’s concept and connotation from the perspective of science and technology and summarized the opinions of practitioners, experts, and scholars about it. Second, it outlined the key technologies of the metaverse, including network and operating technology (5G, 6G, Internet of things, cloud computing, fog computing, and edge computing); management technology (energy consumption, resource, session, and spatiotemporal consistency managements); virtual real object connection, modeling and management technology (Internet of X, identity modeling, social computing, and decentralized management); and virtual real space interaction and fusion technology (extend reality, video game, and brain–computer interface). The metaverse is not a novel technology but an all-inclusive internet application. The progress and development of technology play a solid foundation for realizing and applying the metaverse. At the same time, metaverse development also promotes upgrading existing technologies to drive the product, scenario, and application innovation. Finally, this paper looked into many challenges facing metaverse development. Metaverse enables the connection and integration of the real and virtual worlds. It may become a novel form of social development and change people’s way of life. Meanwhile, the growth of the metaverse concept, its development speed, ultimate form, and even its impact on philosophy, culture, society, and economic governance, as well as human beings, are unknown. By implementing a metaverse prototype, the enabling economy will also be of major interest. Moreover, the government adheres to policy guidelines to enable the real economy with technology, which will still apply in the metaverse era. No matter what trend we are in, we should have a clear understanding, make rational decisions, and steadily explore the metaverse!
-
Key words:
- metaverse /
- decentralization /
- virtual world /
- real world /
- mix of virtual and actual reality
-
表 1 從業者、專家以及機構對元宇宙的不同看法與見解
Table 1. Different opinions of practitioners and experts on the metaverse
Name Affiliations Description Chen G, Dong H Peking University The metaverse is a virtual world connected and created through science and technology, mapped and interacted with the real world, and has a digital living space of a novel social system[3]. Zuckerberg M Facebook The metaverse is a world composed of countless interconnected virtual communities where people can meet, work, and entertainment through virtual reality devices (e.g., headphones and eyes), smartphone applications, and other devices[4]. Baszucki D Roblox The metaverse is a virtual world that connects everyone. Everyone has a virtual identity and can do anything desired. The metaverse has eight characteristics: identity, friends, immersion, low latency, diversity, anywhere, economy, and civilization[5]. Redmond E Nike The metaverse spans the physical/digital gap between reality and virtual reality [6]. Kimber C Posterscope The metaverse is an observable digital universe composed of millions of digital galaxies[6]. Shabro L Army Futures Command The metaverse is a fuzzy digital hybrid reality. The things and people in the metaverse are irreplaceable and infinite and are not limited by the traditional physical space[6]. Kicks P BITKRAFT Ventures Metaverse: a lasting and real-time digital world, providing individuals with a series of agency, social existence, and shared space consciousness. It has a wide range of virtual economic systems[6]. Bellinghausen B Alissia Spaces The metaverse is a bridge between the real and virtual worlds[6]. Redding N Redding Futures The metaverse is an infinite space where people can do everything physically and still have sensory stimuli such as vision, hearing, touch, and smell[6]. Piech E AMP Creative The metaverse is a world that no longer pays attention to the difference between our digital avatars and bodies. It is a world where we are surrounded by information (e.g., work, entertainment, and education) using intelligent lenses and brain–computer interface devices. It is the next generation of the internet[6]. Ning H S University of science and technology Beijing The general cyberspace (metaverse) is a unified description of conventional cyberspace and cyber-enabled physical, social, and thinking spaces formed based on ubiquitous connections between things and the deep convergence of spaces[7]. 表 2 近年來典型的物聯網研究以支持元宇宙的發展
Table 2. Typical research on the IoT for metaverse in recent years
Layer Author Title Reference Sensing layer Gong, et al A remote attestation mechanism for the sensing layer nodes for the Internet of Things [16] Wang, et al RF sensing in the Internet of Things: a general deep learning framework [17] Ye, et al An efficient authentication and access control scheme for perception layer of Internet of Things [18] Norouzi, et al GAPSO-SVM: An IDSS-based energy-aware clustering routing algorithm for IoT perception layer [19] Kou, et al A lightweight three-factor user authentication protocol for the information perception of IoT [20] Network layer Shafiq, et al CorrAUC: A malicious bot-iot traffic detection method in IoT network using machine-learning techniques [21] Hafeez, et al IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge [22] Application layer Sun and Ansari Dynamic resource caching in the IoT application layer for smart cities [23] Sun and Ansari Traffic load balancing among brokers at the IoT application layer [24] Deogirikar and Vidhate An improved publish-subscribe method in application layer protocol for IoT [25] Mohanta, et al Trustworthy Management in Decentralized IoT Application using Blockchain [26] 表 3 云計算、霧計算和邊緣計算的比較
Table 3. Comparison of cloud computing, fog computing, and edge computing
Paradigm Deployment Network access type Network latency Real-time Ability Transmission Scalability degree Bandwidth requirements Location awareness Mobility support Server nodes location Service type User device Target application Cloud computing Centralization WAN High Low Device to cloud High Focus No Low Within the Internet Global services Multiple terminals General Internet application Fog computing Distribution LAN Medium Medium Device to device/cloud High Non-focus Yes High Between terminal device and cloud Localized services Multiple mobile terminals Internet of Things or mobile application Edge computing Distribution LAN/WLAN Low High Device to device High Non-focus Yes High At the edge of the local network Localized services Multiple mobile terminals Internet of Things or mobile application 表 4 資源管理列表
Table 4. Resource management technology list
Stage Technology Abbreviation Description Resource naming Resource description framework RDF A language used to express resource information on the world wide web. Web ontology language WOL Used for semantic description of ontology. Physical markup language PML A common standard used for describing all natural objects, processes, and environments. Resource addressing Domain name system DNS Used to automatically resolve and exchange of network domain names and IP addresses. Object name system ONS Object name service proposed by EPCglobal U code resolution protocol U code RP Ubiquitous encoding resolution protocol proposed by UID Center Resource discovery Distributed Hash Table DHT A distributed storage method where each client is responsible for a small routing rqnge and storing a small part of data without a server to realize the addressing and storage of the whole DHT network. Resource allocation Dynamic Programming Method DPM A dynamic resource allocation framework for synchronizing metaverse with IoT services and data[50]. 表 5 典型游戲引擎概述
Table 5. Overview of representative game engines
Year Engine name Company Representative work Website 1993 RenderWare Criterion Software Grand Theft Auto; Chinese Paladin; XuanYuan Sword; etc. https://www.renderware.com/ 1998 Unreal Epic Unreal Tournament 3; Gears of War; PuBG: Battlegrounds; Mass Effect; BioShock; etc. https://www.unrealengine.com/zh-CN/ 2002 Cryengine3 Crytek Far cry; Crysis; Sniper Ghost Warrior; The Climb; etc. https://www.cryengine.com/ 2004 Source Valve Counter-Strike: Source; Half-Life; DoTA 2; Vindictus; etc. https://developer.valvesoftware.com/wiki/Main_Page 2005 IW Infinity Ward Call of Duty; Quantum of Solace; etc. https://www.infinityward.com/ 2005 Unity Unity Technologies Temple Run; Genshin; Monument Valley; Arena of Valor: 5v5 Arena Game; League of Legends: Wild Rift; etc. https://unity.cn/ 2006 Frostbite EA DICE Need for Speed: The Run; Plants vs Zombies: Garden Warfare; Need for Speed; etc. https://www.ea.com/frostbite 2006 Rockstar Rockstar Games Rockstar Games Presents Table Tennis; Grand Theft Auto; Red Dead Redemption; Max Payne 3; etc. https://www.rockstargames.com/zh/ 2010 Coscos2d-x / CarrotFantasy; Warpath; Anipop; etc. https://www.cocos.com/ 2011 Creation Bethesda Game Studios The Elder Scrolls; Fallout; Starfield; etc. https://shop.creationengine.com/ -
參考文獻
[1] What is the metaverse of the recent fire? [EB/OL]. CNR(2021-09-13) [2021-11-18].https://baijiahao.baidu.com/s?id=1710776745437385158&wfr=spider&for=pc最近大火的元宇宙是什么?[EB/OL]. 央廣網(2021-9-13) [2021-11-18].https://baijiahao.baidu.com/s?id=1710776745437385158&wfr=spider&for=pc [2] What is the metaverse of the recent fire [EB/ OL]. Mr. Xiong Hongmeng development (2021-11-09) [2021-11-18].https://baijiahao.baidu.com/s?id=1715932153689619383&wfr=spider&for=pc最近大火的“元宇宙”到底是什么[EB/OL]. 鴻蒙開發大熊老師(2021-11-09) [2021-11-18].https://baijiahao.baidu.com/s?id=1715932153689619383&wfr=spider&for=pc [3] Chen G. Scholar of Peking University released the start Atlas of metaverse characteristics and attributes [EB/OL]. Guangming. com (2021-11-19) [2021-11-22].https://view.inews.qq.com/a/20211119A02CIJ00陳剛. 北京大學學者發布元宇宙特征與屬性START圖譜[EB/OL]. 光明網(2021-11-19) [2021-11-22].https://view.inews.qq.com/a/20211119A02CIJ00 [4] O’Brien M, Chan K. Explainer: What is the metaverse and how will it work? [EB/OL]. AP News (2021-10-29) [2021-11-22].https://apnews.com/article/meta-facebook-explaining-the-metaverse-f57e01cd5739840945e89fd668b0fa27 [5] Lin X. Metaverse: What? Why? When? [EB/OL]. Solactive (2021-12-20) [2022-01-03].https://www.solactive.com/metaverse-what-why-when/ [6] Hackl C. Defining the metaverse today [EB/OL]. Forbes (2021-05-02) [2021-11-22].https://www.forbes.com/sites/cathyhackl/2021/05/02/defining-the-metaverse-today/?sh=8204e5964485 [7] Ning H S, Ye X Z, Bouras M A, et al. General cyberspace: Cyberspace and cyber-enabled spaces. IEEE Internet Things J, 2018, 5(3): 1843 doi: 10.1109/JIOT.2018.2815535 [8] Lee L H, Braud T, Zhou P Y, et al. All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda [EB/OL]. arXiv preprint (2021-10-12) [2022-01-15].https://arxiv.org/abs/2110.05352 [9] Siddiqi, Yu, Joung. 5G ultra-reliable low-latency communication implementation challenges and operational issues with IoT devices. Electronics, 2019, 8(9): 981 doi: 10.3390/electronics8090981 [10] Torres Vega M, Liaskos C, Abadal S, et al. Immersive interconnected virtual and augmented reality: A 5G and IoT perspective. J Netw Syst Manag, 2020, 28(4): 796 doi: 10.1007/s10922-020-09545-w [11] Kumar N, Ahmad A. ANFIS-based reactive strategy for uRLLC and eMBB traffic multiplexing in 5G new radio. Adv Commun Comput Technol, 2021: 1409 [12] Malik H, Alam M M, le Moullec Y, et al. Interference-aware radio resource allocation for 5G ultra-reliable low-latency communication // 2018 IEEE Globecom Workshops. Abu Dhabi, 2018: 1 [13] Buccheri L, Mandelli S, Saur S, et al. Hybrid retransmission scheme for QoS-defined 5G ultra-reliable low-latency communications // 2018 IEEE Wireless Communications and Networking Conference. Barcelona, 2018: 1 [14] You X H, Wang C X, Huang J, et al. Towards 6G wireless communication networks: Vision, enabling technologies, and new paradigm shifts. Sci China Inf Sci, 2020, 64(1): 1 [15] Chowdhury M Z, Shahjalal M, Ahmed S, et al. 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open J Commun Soc, 2020, 1: 957 doi: 10.1109/OJCOMS.2020.3010270 [16] Gong B, Zhang Y, Wang Y B. A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener Comput Syst, 2018, 78: 867 doi: 10.1016/j.future.2017.07.034 [17] Wang X Y, Wang X Y, Mao S W. RF sensing in the Internet of Things: A general deep learning framework. IEEE Commun Mag, 2018, 56(9): 62 doi: 10.1109/MCOM.2018.1701277 [18] Ye N, Zhu Y, Wang R C, et al. An efficient authentication and access control scheme for perception layer of Internet of Things. Appl Math Inf Sci, 2014, 8(4): 1617 doi: 10.12785/amis/080416 [19] Norouzi Shad M, Maadani M, Nesari Moghadam M. GAPSO-SVM: An IDSS-based energy-aware clustering routing algorithm for IoT perception layer. Wirel Pers Commun, 2021: 1 [20] Kou L, Shi Y Q, Zhang L G, et al. A lightweight three-factor user authentication protocol for the information perception of IoT. Comput Mater Continua, 2019, 58(2): 545 doi: 10.32604/cmc.2019.03760 [21] Shafiq M, Tian Z H, Bashir A K, et al. CorrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J, 2021, 8(5): 3242 doi: 10.1109/JIOT.2020.3002255 [22] Hafeez I, Antikainen M, Ding A Y, et al. IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge. IEEE Trans Netw Serv Manag, 2020, 17(1): 45 doi: 10.1109/TNSM.2020.2966951 [23] Sun X, Ansari N. Dynamic resource caching in the IoT application layer for smart cities. IEEE Internet Things J, 2018, 5(2): 606 doi: 10.1109/JIOT.2017.2764418 [24] Sun X, Ansari N. Traffic load balancing among brokers at the IoT application layer. IEEE Trans Netw Serv Manag, 2018, 15(1): 489 doi: 10.1109/TNSM.2017.2787859 [25] Deogirikar J, Vidhate A. An improved publish-subscribe method in application layer protocol for IoT // 2017 International Conference on Smart Technologies For Smart Nation (SmartTechCon). Bengaluru, 2017: 1070 [26] Mohanta B K, Panda S S, Satapathy U, et al. Trustworthy management in decentralized IoT application using blockchain // 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). Kanpur, 2019: 1 [27] Shi F F, Ning H S, Huangfu W, et al. Recent progress on the convergence of the Internet of Things and artificial intelligence. IEEE Netw, 2020, 34(5): 8 doi: 10.1109/MNET.011.2000009 [28] Ning H S, Liu H. Cyber-physical-social-thinking space based science and technology framework for the Internet of Things. Sci China Inf Sci, 2015, 58(3): 1 [29] Ning H S, Farha F, Mohammad Z N, et al. A survey and tutorial on “connection exploding meets efficient communication” in the Internet of Things. IEEE Internet Things J, 2020, 7(11): 10733 doi: 10.1109/JIOT.2020.2996615 [30] Cui S, Farha F, Ning H S, et al. A survey on the bottleneck between applications exploding and user requirements in IoT. IEEE Internet Things J, 2022, 9(1): 261 doi: 10.1109/JIOT.2021.3097634 [31] Fettweis G P. The tactile Internet: Applications and challenges. IEEE Veh Technol Mag, 2014, 9(1): 64 doi: 10.1109/MVT.2013.2295069 [32] Sachs J, Andersson L A A, Araújo J, et al. Adaptive 5G low-latency communication for tactile InternEt services. Proc IEEE, 2019, 107(2): 325 doi: 10.1109/JPROC.2018.2864587 [33] Antonakoglou K, Xu X, Steinbach E, et al. Toward haptic communications over the 5G tactile Internet. IEEE Commun Surv Tutor, 2018, 20(4): 3034 doi: 10.1109/COMST.2018.2851452 [34] Matsubara M, Oguchi M. Evaluation of Metaverse Server in a Widely-Distributed Environment // On the Move to Meaningful Internet Systems: OTM 2010 Workshops. Berlin, 2010: 307 [35] Singh S P, Nayyar A, Kumar R, et al. Fog computing: From architecture to edge computing and big data processing. J Supercomput, 2019, 75(4): 2070 doi: 10.1007/s11227-018-2701-2 [36] Zhang W S, Sun H Y, Zhao D H, et al. A streaming cloud platform for real-time video processing on embedded devices. IEEE Trans Cloud Comput, 2021, 9(3): 868 doi: 10.1109/TCC.2019.2894621 [37] Wang D Z, Shen S H, Zhou N N. Data storage in cloud computing environment. Comput Technol Dev, 2011, 21(4): 81 doi: 10.3969/j.issn.1673-629X.2011.04.021王德政, 申山宏, 周寧寧. 云計算環境下的數據存儲. 計算機技術與發展, 2011, 21(4):81 doi: 10.3969/j.issn.1673-629X.2011.04.021 [38] Sharma P, Jindal R, Borah M D. Blockchain technology for cloud storage. ACM Comput Surv, 2021, 53(4): 1 [39] Qiu H, Noura H, Qiu M K, et al. A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans Cloud Comput, 2021, 9(4): 1293 doi: 10.1109/TCC.2019.2911679 [40] Doan V T, Khang V Q H, Nguyen H H C, et al. A novel solution for virtual Server on the data consistency maintenance in cloud storage systems // International Conference on Computing and Information Technology. Bangkok, 2019: 227 [41] Jia W J, Zhou X J. Concepts, issues, and applications of fog computing. J Commun, 2018, 39(5): 153 doi: 10.11959/j.issn.1000-436x.2018086賈維嘉, 周小杰. 霧計算的概念、相關研究與應用. 通信學報, 2018, 39(5):153 doi: 10.11959/j.issn.1000-436x.2018086 [42] Wu J, Cao Z, Chen P, et al. User information behaviour from the perspective of the metaverse: Framework and prospect. J Inf Resour Manag, https://kns.cnki.net/kcms/detail/42.1812.g2.20211129.1429.004.html吳江, 曹喆, 陳佩, 等. 元宇宙視域下的用戶信息行為: 框架與展望. 信息資源管理學報,https://kns.cnki.net/kcms/detail/42.1812.g2.20211129.1429.004.html [43] Kim W S. Edge Computing server deployment technique for cloud VR-based multi-user metaverse content. J Korea Multimed Soc, 2021, 24(8): 1090 [44] Ren J K, Yu G D, He Y H, et al. Collaborative cloud and edge computing for latency minimization. IEEE Trans Veh Technol, 2019, 68(5): 5031 doi: 10.1109/TVT.2019.2904244 [45] Elbamby M S, Perfecto C, Liu C F, et al. Wireless edge computing with latency and reliability guarantees. Proc IEEE, 2019, 107(8): 1717 doi: 10.1109/JPROC.2019.2917084 [46] Xu H. Quanzhen internet: Is Tencent ready? [J/OL]. China Electronic News (2021-08-20) [2022-01-11]. http://epaper.cena.com.cn/content/1/2021-08/20/02/2021082002_pdf.pdf徐恒. 全真互聯網: 騰訊準備好了嗎?[J/OL]. 中國電子報(2021-08-20) [2022-01-11]. http://epaper.cena.com.cn/content/1/2021-08/20/02/2021082002_pdf.pdf [47] Somula R S, Sasikala R. A survey on mobile cloud computing: Mobile computing + cloud computing (MCC = MC + CC). Scalable Comput Pract Exp, 2018, 19(4): 309 doi: 10.12694/scpe.v19i4.1411 [48] Bi M N, Wang Y J, Cai Z P, et al. A privacy-preserving mechanism based on local differential privacy in edge computing. China Commun, 2020, 17(9): 50 doi: 10.23919/JCC.2020.09.005 [49] Ning H S, Zhu T. Generalized cyberspace. Beijing: Publishing House of Electronics industry, 2017寧煥生, 朱濤. 廣義網絡空間. 北京: 電子工業出版社, 2017 [50] Nunes L H, Estrella J C, Perera C, et al. The elimination-selection based algorithm for efficient resource discovery in Internet of Things environments // 2018 15th IEEE Annual Consumer Communications & Networking Conference. Las Vegas, 2018: 1 [51] Kim J H, Kim S G. An efficient session management scheme for low-latency communications in 5G systems. J Korea Soc Comput Inf, 2020, 25(2): 83 [52] Park K Y, Soyer O. Advances in Computer Science and Ubiquitous Computing. Singapore: Springer, 2021 [53] Nadar V M, Chatterjee M, Jacob L. A defensive approach for CSRF and broken authentication and session management attack. In: Perez G, Tiwari S, Trivedi M, Mishra K eds. Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Singapore: Springer, 2018 [54] Marlinspike M, Perrin T. The Sesame Algorithm: Session Management for Asynchronous Message Encryption, Revision 2. 2017 [55] Atluri G, Karpatne A, Kumar V. Spatio-temporal data mining. ACM Comput Surv, 2019, 51(4): 1 [56] Shi F F, Wang W X, Wang H, et al. The Internet of people: A survey and tutorial[J/OL]. arXiv preprint (2021-04-06) [2022-01-15].https://arxiv.org/abs/2104.04079 [57] Zhang Z M, Yin R, Ning H S. Internet of brain, thought, thinking, and creation. Chinese J Electron, http://cje.ejournal.org.cn/article/doi/10.1049/cje.2021.00.236 [58] Ning H S, Hu S, He W, et al. nID-based internet of things and its application in airport aviation risk management. Chin J Electron, 2012, 21(2): 209 [59] Verma M. Modeling identity management system based on blockchain technology. Int J Res Rev 2021, 2(4): 450 [60] Ning H S, Zhen Z, Shi F F, et al. A survey of identity modeling and identity addressing in Internet of Things. IEEE Internet Things J, 2020, 7(6): 4697 doi: 10.1109/JIOT.2020.2971773 [61] Bouras M A, Lu Q H, Dhelim S, et al. A lightweight blockchain-based IoT identity management approach. Future Internet, 2021, 13(2): 24 doi: 10.3390/fi13020024 [62] Ye X Z, Ning H S, Xia B M, et al. A review of generalized cyberspace. Comput Sci Appl, 2020, 10(5): 893葉曉貞, 寧煥生, 夏博明, 等, 廣義網絡空間研究綜述. 計算機科學與應用, 2020, 10(5): 893 [63] Merwe D. The Metaverse as Virtual Heterotopia // 3rd World Conference on Research in Social Sciences. Vienna, 2021 [64] Zhai S P, Yang Y Y, Li J, et al. Research on the application of cryptography on the blockchain. J Phys:Conf Ser, 2019, 1168: 032077 doi: 10.1088/1742-6596/1168/3/032077 [65] Zhu Y, Wang Q S, Qin B H, et al. Survey of blockchain technology and its advances. Chin J Eng, 2019, 41(11): 1361朱巖, 王巧石, 秦博涵, 等. 區塊鏈技術及其研究進展. 工程科學學報, 2019, 41(11):1361 [66] Iq. The metaverse concept leading coin [J/OL]. Coin Circle (2021-11-03) [2021-12-28]. http://www.elecfans.com/d/1726181.htmlIq. 元宇宙概念龍頭幣[J/OL]. 幣圈子(2021-11-03) [2021-12-28]. http://www.elecfans.com/d/1726181.html [67] Jentzsch C. Decentralized Autonomous Organization to Automate Governance [EB/OL]. 2016. https://lawofthelevel.lexblogplatformthree.com/wp-content/uploads/sites/187/2017/07/WhitePaper-1.pdf [68] Learn about the development history of decentralized exchange [J/OL]. Uupool Double Excellent Ore Pool (2021-04-20) [2021-12-28].https://baijiahao.baidu.com/s?id=1697546275667027545&wfr=spider&for=pc一文了解去中心化交易所發展歷史[J/OL]. UUPool雙優礦池(2021-04-20) [2021-12-28].https://baijiahao.baidu.com/s?id=1697546275667027545&wfr=spider&for=pc [69] Qiao S Q. Decentralized Secure Data Sharing Platform Based on Blockchain [Dissertation]. Tianjin: Tianjin University of Technology, 2020喬雙全. 基于區塊鏈的去中心化數據安全共享平臺[學位論文]. 天津: 天津理工大學, 2020 [70] Fu C H. The Frame of Decentralized Storage System Based on Distributed Ledger [Dissertation]. Chengdu: University of Electronic Science and Technology, 2020符純浩. 基于分布式賬本的去中心化存儲系統框[學位論文]. 成都: 電子科技大學, 2020 [71] Zhang X, Yao L, Wang X Z, et al. A survey on deep learning based brain computer interface: Recent advances and new frontiers[J/OL]. arXiv preprint (2021-10-12) [2022-01-15]. https://arxiv.org/abs/1905.04149 [72] Sun H, Zhang X, Zhang Y, et al. Brain-computer interface technology based on EEG signals. Anhui Sci Technol, 2015(4): 54 doi: 10.3969/j.issn.1007-7855.2015.04.027孫瀚, 張雄, 張玉, 等. 基于腦電信號的腦機接口技術. 安徽科技, 2015(4):54 doi: 10.3969/j.issn.1007-7855.2015.04.027 [73] Abiri R, Borhani S, Sellers E W, et al. A comprehensive review of EEG-based brain-computer interface paradigms. J Neural Eng, 2019, 16(1): 011001 doi: 10.1088/1741-2552/aaf12e [74] Fahimi F, Dosen S, Ang K K, et al. Generative adversarial networks-based data augmentation for brain-computer interface. IEEE Trans Neural Netw Learn Syst, 2020, 32(9): 4039 [75] Aggarwal S, Chugh N. Signal processing techniques for motor imagery brain computer interface: A review. Array, 2019, 1-2: 100003 doi: 10.1016/j.array.2019.100003 [76] Ning H S, Wang H, Lin Y J, et al. A survey on metaverse: The state-of-the-art, technologies, applications, and challenges[J/OL]. arXiv preprint (2021-11-18) [2022-01-15].https://arxiv.org/abs/2111.09673 [77] Zhang Z M, Ning H S, Shi F F, et al. Artificial intelligence in cyber security: Research advances, challenges, and opportunities. Artif Intell Rev, 2022, 55(2): 1029 doi: 10.1007/s10462-021-09976-0 [78] Falchuk B, Loeb S, Neff R. The social metaverse: Battle for privacy. IEEE Technol Soc Mag, 2018, 37(2): 52 doi: 10.1109/MTS.2018.2826060 [79] Jeon H, Youn H, Ko S, et al. Blockchain and AI meet in the metaverse // Fernández-Caramés T M, Fraga-Lamas P, Eds, Advances in the Convergence of Blockchain and Artificial Intelligence. London: IntechOpen, 2021 [80] Zhang Z M, Shi F F, Wan Y L, et al. Application progress of artificial intelligence in military confrontation. Chin J Eng, 2020, 42(9): 1106張智敏, 石飛飛, 萬月亮, 等. 人工智能在軍事對抗中的應用進展. 工程科學學報, 2020, 42(9):1106 -