default search action
IEEE Transactions on Services Computing, Volume 16
Volume 16, Number 1, January - February 2023
- Rahul Saha, Gulshan Kumar, Tannishtha Devgun, William J. Buchanan, Reji Thomas, Mamoun Alazab, Tai-Hoon Kim, Joel J. P. C. Rodrigues:
A Blockchain Framework in Post-Quantum Decentralization. 1-12 - Víctor Gallego-Fontenla, Juan Carlos Vidal, Manuel Lama:
A Conformance Checking-Based Approach for Sudden Drift Detection in Business Processes. 13-26 - Yuan-Yao Shih, Ai-Chun Pang, Tian He, Te-Chuan Chiu:
A Multi-Market Trading Framework for Low-Latency Service Provision at the Edge of Networks. 27-39 - Mengjie Liu, Gang Feng, Yao Sun, Nan Chen, Wei Tan:
A Network Function Parallelism-Enabled MEC Framework for Supporting Low-Latency Services. 40-52 - Divya Natolana Ganapathy, Karuna Pande Joshi:
A Semantically Rich Framework to Automate Cloud Service Level Agreements. 53-64 - Luca Beurer-Kellner, Jens von Pilgrim, Christos Tsigkanos, Timo Kehrer:
A Transformational Approach to Managing Data Model Evolution of Web Services. 65-79 - Aref Karimiafshar, Massoud Reza Hashemi, Mohammad Reza Heidarpour, Adel Nadjaran Toosi:
An Energy-Conservative Dispatcher for Fog-Enabled IIoT Systems: When Stability and Timeliness Matter. 80-94 - Amândio Balcão Filho, Natasha Ruiz, Ferrucio de Franco Rosa, Rodrigo Bonacin, Mário Jino:
Applying a Consumer-Centric Framework for Trust Assessment of Cloud Computing Service Providers. 95-107 - Sung-Hyun Sim, Hyerim Bae, Ling Liu:
Bagging Recurrent Event Imputation for Repair of Imperfect Event Log With Missing Categorical Events. 108-121 - Xiaojun Zhang, Chao Huang, Dawu Gu, Jingwei Zhang, Huaxiong Wang:
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems. 122-133 - Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Kefei Chen:
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage. 134-146 - Yan Ding, Kenli Li, Chubo Liu, Zhuo Tang, Keqin Li:
Budget-Constrained Service Allocation Optimization for Mobile Edge Computing. 147-161 - Muhammad Adeel Zahid, Basit Shafiq, Jaideep Vaidya, Ayesha Afzal, Shafay Shamail:
Collaborative Business Process Fault Resolution in the Services Cloud. 162-176 - Olayinka Adeleye, Jian Yu, Guiling Wang, Sira Yongchareon:
Constructing and Evaluating Evolving Web-API Networks - A Complex Network Perspective. 177-190 - Long Luo, Qixuan Jin, Jingzhao Xie, Gang Sun, Hongfang Yu:
Cost-Efficient Scheduling of Multicast Transfers With Deadline Guarantees Across Edge Datacenters. 191-205 - Zoltán Ádám Mann, Andreas Metzger, Johannes Prade, Robert Seidl, Klaus Pohl:
Cost-Optimized, Data-Protection-Aware Offloading Between an Edge Data Center and the Cloud. 206-220 - Ensheng Liu, Liping Zheng, Qiang He, Benzhu Xu, Gaofeng Zhang:
Criticality-Awareness Edge User Allocation for Public Safety. 221-234 - Onur Atan, Saeed Ghoorchian, Setareh Maghsudi, Mihaela van der Schaar:
Data-Driven Online Recommender Systems With Costly Information Acquisition. 235-245 - Prabath Abeysekara, Hai Dong, A. Kai Qin:
Data-Driven Trust Prediction in Mobile Edge Computing-Based IoT Systems. 246-260 - Xinchang Zhang, Yinglong Wang, Guanggang Geng, Jiguo Yu:
Delay-Optimized Multicast Tree Packing in Software-Defined Networks. 261-275 - Alem Fitwi, Yu Chen, Sencun Zhu:
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling. 276-287 - Pengfei Wu, Jianting Ning, Wu Luo, Xinyi Huang, Debiao He:
Exploring Dynamic Task Loading in SGX-Based Distributed Computing. 288-301 - Indika Kumara, Mohamed Hameez Ariz, Mohan Baruwal Chhetri, Majid Mohammadi, Willem-Jan van den Heuvel, Damian A. Tamburri:
FOCloud: Feature Model Guided Performance Prediction and Explanation for Deployment Configurable Cloud Applications. 302-314 - Xiao Xue, Deyu Zhou, Fangyi Chen, Xiangning Yu, Zhiyong Feng, Yucong Duan, Lin Meng, Mu Zhang:
From SOA to VOA: A Shift in Understanding the Operation and Evolution of Service Ecosystem. 315-329 - Manqing Dong, Lina Yao, Xianzhi Wang, Boualem Benatallah, Shuai Zhang, Quan Z. Sheng:
Gradient Boosted Neural Decision Forest. 330-342 - Jinyu Tian, Jiantao Zhou, Jia Duan:
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption. 343-355 - William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy:
Immutable Log Storage as a Service on Private and Public Blockchains. 356-369 - Walayat Hussain, José M. Merigó, Honghao Gao, Asma Musabah Alkalbani, Fethi A. Rabhi:
Integrated AHP-IOWA, POWA Framework for Ideal Cloud Provider Selection and Optimum Resource Management. 370-382 - Carlo Combi, Barbara Oliboni, Francesca Zerbato:
Integrated Exploration of Data-Intensive Business Processes. 383-397 - Shihong Hu, Guanghui Li, Weisong Shi:
LARS: A Latency-Aware and Real-Time Scheduling Framework for Edge-Enabled Internet of Vehicles. 398-411 - Guangming Cui, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, Yun Yang:
Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment. 412-423 - Christian Cabrera, Sergej Svorobej, Andrei Palade, Aqeel H. Kazmi, Siobhán Clarke:
MAACO: A Dynamic Service Placement Model for Smart Cities. 424-437 - Mingyue Wang, Yu Guo, Chen Zhang, Cong Wang, Hejiao Huang, Xiaohua Jia:
MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain. 438-451 - Quyuan Wang, Songtao Guo, Jiadi Liu, Chengsheng Pan, Li Yang:
MotiShare: Incentive Mechanisms for Content Providers in Heterogeneous Time-Varying Edge Content Market. 452-465 - Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, S. Venkatesan:
P2LBS: Privacy Provisioning in Location-Based Services. 466-477 - Huiying Jin, Pengcheng Zhang, Hai Dong, Yuelong Zhu, Athman Bouguettaya:
Privacy-Aware Forecasting of Quality of Service in Mobile Edge Computing. 478-492 - Shenqing Wang, Chunpeng Ge, Lu Zhou, Huaqun Wang, Zhe Liu, Jian Wang:
Privacy-Preserving Classification in Multiple Clouds eHealthcare. 493-503 - Xinghua Li, Lizhong Bai, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing. 504-514 - Patrali Pradhan, Chandana Roy, Sudip Misra:
Q-Safe: QoS-Aware Pricing Scheme for Provisioning Safety-as-a-Service. 515-524 - Yinbin Miao, Wei Zheng, Xiaohua Jia, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method. 525-536 - Tieqiang Mo, Renfa Li, Shan Duan:
Reconciling Earlier Snapshot Time With Local Cache for Optimal Performance Under Transactional Causal Consistency. 537-549 - Feijia He, Liwei Shen, Xin Peng:
Resource Choreography in Cyber-Physical-Social Systems: Representation, Modeling and Execution. 550-563 - Md Anwarul Kaium Patwary, Saurabh Garg, Sudheer Kumar Battula, Byeong Kang:
SDP: Scalable Real-Time Dynamic Graph Partitioner. 564-574 - Somchart Fugkeaw:
Secure Data Sharing With Efficient Key Update for Industrial Cloud-Based Access Control. 575-587 - Ketki Sane, Karuna Pande Joshi, Sudip Mittal:
Semantically Rich Framework to Automate Cyber Insurance Services. 588-599 - Ting Cai, Zicong Hong, Shuo Liu, Wuhui Chen, Zibin Zheng, Yang Yu:
SocialChain: Decoupling Social Data and Applications to Return Your Data Ownership. 600-614 - Shreshth Tuli, Sukhpal Singh Gill, Peter Garraghan, Rajkumar Buyya, Giuliano Casale, Nicholas R. Jennings:
START: Straggler Prediction and Mitigation for Cloud Computing Environments Using Encoder LSTM Networks. 615-627 - Guobing Zou, Ya Liu, Zhen Qin, Jin Chen, Zhiwei Xu, Yanglan Gan, Bofeng Zhang, Qiang He:
ST-EUA: Spatio-Temporal Edge User Allocation With Task Decomposition. 628-641 - Haozhe Lin, Yushun Fan, Jia Zhang, Bing Bai, Zhenghua Xu, Thomas Lukasiewicz:
Toward Knowledge as a Service (KaaS): Predicting Popularity of Knowledge Services Leveraging Graph Neural Networks. 642-655 - Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. 656-669 - Huaijie Zhu, Wei Liu, Jian Yin, Jianliang Xu, Wang-Chien Lee:
Towards Keyword-Based Geo-Social Group Query Services. 670-683 - Shujuan Tian, Chi Chang, Saiqin Long, Sangyoon Oh, Zhetao Li, Jun Long:
User Preference-Based Hierarchical Offloading for Collaborative Cloud-Edge Computing. 684-697 - Xinghua Li, Qiuyun Tong, Jinwei Zhao, Yinbin Miao, Siqi Ma, Jian Weng, Jianfeng Ma, Kim-Kwang Raymond Choo:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. 698-710 - Sasko Ristov, Stefan Pedratscher, Thomas Fahringer:
$xAFCL$xAFCL: Run Scalable Function Choreographies Across Multiple FaaS Systems. 711-723 - Wenhua Xiao, Cheng Yang, Ji Wang, Xiaomin Zhu, Weidong Bao, Xiaojie Feng, Yu Xie, Wei Cao, Feng Yu, Ling Liu:
YISHAN: Managing Large-scale Cloud Database Instances via Machine Learning. 724-738 - Efrén Rama-Maneiro, Juan Carlos Vidal, Manuel Lama:
Deep Learning for Predictive Business Process Monitoring: Review and Benchmark. 739-756 - Wattana Viriyasitavat, Li Da Xu, Gaurav Dhiman, Assadaporn Sapsomboon, Vitara Pungpapong, Zhuming Bi:
Service Workflow: State-of-the-Art and Future Trends. 757-772
Volume 16, Number 2, March - April 2023
- Xiaohan Hao, Wei Ren, Yangyang Fei, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things. 773-786 - Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud. 787-801 - Di Wu, Peng Zhang, Yi He, Xin Luo:
A Double-Space and Double-Norm Ensembled Latent Factor Model for Highly Accurate Web Service QoS Prediction. 802-814 - Luigi De Simone, Mario Di Mauro, Roberto Natella, Fabio Postiglione:
A Latency-Driven Availability Assessment for Multi-Tenant Service Chains. 815-829 - Weiling Li, Xin Luo, Huaqiang Yuan, MengChu Zhou:
A Momentum-Accelerated Hessian-Vector-Based Latent Factor Analysis Model. 830-844 - Xuejun Li, Tianxiang Chen, Dong Yuan, Jia Xu, Xiao Liu:
A Novel Graph-Based Computation Offloading Strategy for Workflow Applications in Mobile Edge Computing. 845-857 - Yuan Liu, Chuang Zhang, Yu Yan, Xin Zhou, Zhihong Tian, Jie Zhang:
A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System. 858-871 - Naela Rizvi, Dharavath Ramesh, Lipo Wang, Annappa Basava:
A Workflow Scheduling Approach With Modified Fuzzy Adaptive Genetic Algorithm in IaaS Clouds. 872-885 - Zhizhong Liu, Quan Z. Sheng, Zhenxing Zhang, Xiaofei Xu, Dianhui Chu, Jian Yu, Shuang Wang:
Accurate and Reliable Service Recommendation Based on Bilateral Perception in Multi-Access Edge Computing. 886-899 - Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tannishtha Devgun, Joel J. P. C. Rodrigues:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. 900-912 - Dan Zhu, Hui Zhu, Xiangyu Wang, Rongxing Lu, Dengguo Feng:
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images. 913-926 - Xun Shao, Go Hasegawa, Mianxiong Dong, Zhi Liu, Hiroshi Masui, Yusheng Ji:
An Online Orchestration Mechanism for General-Purpose Edge Computing. 927-940 - Shiyong Li, Huan Liu, Wenzhe Li, Wei Sun:
An Optimization Framework for Migrating and Deploying Multiclass Enterprise Applications Into the Cloud. 941-956 - Qinlong Huang, Guanyu Yan, Qinglin Wei:
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing. 957-968 - Alessandro Tundo, Marco Mobilio, Oliviero Riganelli, Leonardo Mariani:
Automated Probe Life-Cycle Management for Monitoring-As-a-Service. 969-982 - Nikolay Ivanov, Qiben Yan:
AutoThing: A Secure Transaction Framework for Self-Service Things. 983-995 - Yong Yang, Long Wang, Jing Gu, Ying Li:
Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation. 996-1010 - Lanxiang Chen, Yujie Xue, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng:
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data. 1011-1022 - Muhammad Zakarya, Lee Gillam, Khaled Salah, Omer F. Rana, Santosh Tirunagari, Rajkumar Buyya:
CoLocateMe: Aggregation-Based, Energy, Performance and Cost Aware VM Placement and Consolidation in Heterogeneous IaaS Clouds. 1023-1038 - Hai Jin, Ruikun Luo, Qiang He, Song Wu, Zilai Zeng, Xiaoyu Xia:
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code. 1039-1050 - Deng Zhao, Zhangbing Zhou, Patrick C. K. Hung, Shuiguang Deng, Xiao Xue, Walid Gaaloul:
CTL-Based Adaptive Service Composition in Edge Networks. 1051-1065 - Guanghui Zhang, Jie Zhang, Ke Liu, Jing Guo, Jack Y. B. Lee, Haibo Hu, Vaneet Aggarwal:
DUASVS: A Mobile Data Saving Strategy in Short-Form Video Streaming. 1066-1078 - Kyungtae Lee, Jinhwi Kim, Jeongho Kwak, Yeongjin Kim:
Dynamic Multi-Resource Optimization for Storage Acceleration in Cloud Storage Systems. 1079-1092 - Sijie Huang, He Huang, Guoju Gao, Yu-E Sun, Yang Du, Jie Wu:
Edge Resource Pricing and Scheduling for Blockchain: A Stackelberg Game Approach. 1093-1106 - Ramin Ganjavi, Ahmad R. Sharafat:
Edge-Assisted Public Key Homomorphic Encryption for Preserving Privacy in Mobile Crowdsensing. 1107-1117 - Jiong Lou, Hao Luo, Zhiqing Tang, Weijia Jia, Wei Zhao:
Efficient Container Assignment and Layer Sequencing in Edge Computing. 1118-1131 - Chen Wang, Mengting Yuan, Rui Zhang, Kai Peng, Ling Liu:
Efficient Point-of-Interest Recommendation Services With Heterogenous Hypergraph Embedding. 1132-1143 - Samira Chouikhi, Moez Esseghir, Leïla Merghem-Boulahia:
Energy Consumption Scheduling as a Fog Computing Service in Smart Grid. 1144-1157 - Rongping Lin, Liu He, Shan Luo, Moshe Zukerman:
Energy-Aware Service Function Chaining Embedding in NFV Networks. 1158-1171 - Joanna Kosinska, Krzysztof Zielinski:
Experimental Evaluation of Rule-Based Autonomic Computing Management Framework for Cloud-Native Applications. 1172-1183 - Binbin Feng, Zhijun Ding, Changjun Jiang:
FAST: A Forecasting Model With Adaptive Sliding Window and Time Locality Integration for Dynamic Cloud Workloads. 1184-1197 - Junte Ma, Sihao Xie, Jin Zhao:
Flexible Offloading of Service Function Chains to Programmable Switches. 1198-1211 - Zhixiang He, Chi-Yin Chow, Jia-Dong Zhang, Kam-Yiu Lam:
H3Rec: Higher-Order Heterogeneous and Homogeneous Interaction Modeling for Group Recommendations of Web Services. 1212-1224 - Amin Mohajer, Mahya Sam Daliri, Abbas Mirzaei, Amir Ziaeddini, Mohammad Nabipour, Maryam Bavaghar:
Heterogeneous Computational Resource Allocation for NOMA: Toward Green Mobile Edge-Computing Systems. 1225-1238 - Ying Wang, Naling Li, Peng Yu, Wenjing Li, Xuesong Qiu, Shangguang Wang, Mohamed Cheriet:
Intelligent and Collaborative Orchestration of Network Slices. 1239-1253 - Haolin Liu, Xiaoling Long, Zhetao Li, Saiqin Long, Rong Ran, Hui-Ming Wang:
Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing. 1254-1267 - Mohammed Bahutair, Athman Bouguettaya, Azadeh Ghari Neiat:
Multi-Use Trust in Crowdsourced IoT Services. 1268-1281 - Tengfei Yang, Jianfeng Ma, Yinbin Miao, Yue Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Bin Xiao:
MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting. 1282-1295 - Yongyi Ran, Xin Zhou, Han Hu, Yonggang Wen:
Optimizing Data Center Energy Efficiency via Event-Driven Deep Reinforcement Learning. 1296-1309 - Yongyi Ran, Han Hu, Yonggang Wen, Xin Zhou:
Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning. 1310-1323 - Liping Zhang, Yue Zhu, Wei Ren, Yixin Zhang, Kim-Kwang Raymond Choo:
Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems. 1324-1333 - Dante D. Sánchez-Gallegos, José Luis González, Jesús Carretero, Heidy Marisol Marín-Castro, Andrei Tchernykh, Raffaele Montella:
PuzzleMesh: A Puzzle Model to Build Mesh of Agnostic Services for Edge-Fog-Cloud. 1334-1345 - Patryk Osypanka, Piotr Nawrocki:
QoS-Aware Cloud Resource Prediction for Computing Services. 1346-1357 - Amanjot Kaur, Nitin Auluck, Omer F. Rana:
Real-Time Scheduling on Hierarchical Heterogeneous Fog Networks. 1358-1372 - Anurag Satpathy, Manmath Narayan Sahoo, Lucky Behera, Chittaranjan Swain:
ReMatch: An Efficient Virtual Data Center Re-Matching Strategy Based on Matching Theory. 1373-1386 - Yongqian Sun, Daguo Cheng, Pengxiang Jin, Quan Ding, Shenglin Zhang, Xu Chen, Yuzhi Zhang, Minghan Liang, Dan Pei, Jianyan Zheng, Sen Luo, Xinyu Tang:
Robust Anomaly Clue Localization of Multi-Dimensional Derived Measure for Online Video Services. 1387-1401 - Kanika Sharma, Bernard Butler, Brendan Jennings:
Scaling and Placing Distributed Services on Vehicle Clusters in Urban Environments. 1402-1416 - Jing Li, Weifa Liang, Wenzheng Xu, Zichuan Xu, Yuchen Li, Xiaohua Jia:
Service Home Identification of Multiple-Source IoT Applications in Edge Computing. 1417-1430 - Dongyang Zhan, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang, Lin Ye:
Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation. 1431-1443 - Yang Yang, Chunming Rong, Xianghan Zheng, Hongju Cheng, Victor Chang, Xiangyang Luo, Zuoyong Li:
Time Controlled Expressive Predicate Query With Accountable Anonymity. 1444-1457 - Emre Yigitoglu, Mehmet Emre Gursoy, Ling Liu:
Utility-Aware and Privacy-Preserving Mobile Query Services. 1458-1472 - Qinkai Wang, Ye Tian, Xin Yu, Lan Ding, Xinming Zhang:
Where is the Traffic Going? A Comparative Study of Clouds Following Different Designs. 1473-1484 - Firas Al-Doghman, Nour Moustafa, Ibrahim Khalil, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya:
AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges. 1485-1504 - Mostafa Haghi Kashani, Ebrahim Mahdipour:
Load Balancing Algorithms in Fog Computing. 1505-1521 - Yongkang Li, Yanying Lin, Yang Wang, Kejiang Ye, Cheng-Zhong Xu:
Serverless Computing: State-of-the-Art, Challenges and Opportunities. 1522-1539
Volume 16, Number 3, May - June 2023
- Qing Huang, Zhiqiang Yuan, Zhenchang Xing, Zhengkang Zuo, Changjing Wang, Xin Xia:
1+1>2: Programming Know-What and Know-How Knowledge Fusion, Semantic Enrichment and Coherent Application. 1540-1554 - Md Geaur Rahman, Md Zahidul Islam:
A Framework for Supervised Heterogeneous Transfer Learning Using Dynamic Distribution Adaptation and Manifold Regularization. 1555-1571 - Haoran Qiu, Tao Ji, Shixiong Zhao, Xusheng Chen, Ji Qi, Heming Cui, Sen Wang:
A Geography-Based P2P Overlay Network for Fast and Robust Blockchain Systems. 1572-1588 - Xiao Wang, Hanchuan Xu, Xianzhi Wang, Xiaofei Xu, Zhongjie Wang:
A Graph Neural Network and Pointer Network-Based Approach for QoS-Aware Service Composition. 1589-1603 - Deepika Saxena, Ashutosh Kumar Singh:
A High Availability Management Model Based on VM Significance Ranking and Resource Estimation for Cloud Applications. 1604-1615 - Md. Mainul Islam, Md. Kamrul Islam, Md. Shahjalal, Mostafa Zaman Chowdhury, Yeong Min Jang:
A Low-Cost Cross-Border Payment System Based on Auditable Cryptocurrency With Consortium Blockchain: Joint Digital Currency. 1616-1629 - Federica Filippini, Marco Lattuada, Michele Ciavotta, Arezoo Jahani, Danilo Ardagna, Edoardo Amaldi:
A Path Relinking Method for the Joint Online Scheduling and Capacity Allocation of DL Training Workloads in GPU as a Service Systems. 1630-1646 - Nazatul Haque Sultan, Vijay Varadharajan, Lan Zhou, Ferdous Ahmed Barbhuiya:
A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context. 1647-1661 - Leixiao Cheng, Fei Meng:
An Improvement on "CryptCloud$^{+}$+: Secure and Expressive Data Access Control for Cloud Storage". 1662-1663 - Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT. 1664-1672 - Keke Gai, Yue Zhang, Meikang Qiu, Bhavani Thuraisingham:
Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin. 1673-1685 - Mengqi Zhan, Yang Li, Huiran Yang, Guangxi Yu, Bo Li, Weiping Wang:
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers. 1686-1697 - Ana Claudia Bastos Loureiro Monção, Sand Luz Correa, Aline Carneiro Viana, Kleber Vieira Cardoso:
Combining Resource-Aware Recommendation and Caching in the Era of MEC for Improving the Experience of Video Streaming Users. 1698-1712 - Lei Wang, Jiyuan Liu, Qiang He:
Concept Drift-Based Checkpoint-Restart for Edge Services Rejuvenation. 1713-1725 - Mohammad-Mohsen Aseman-Manzar, Soroush Karimian Aliabadi, Reza Entezari-Maleki, Bernhard Egger, Ali Movaghar:
Cost-Aware Resource Recommendation for DAG-Based Big Data Workflows: An Apache Spark Case Study. 1726-1737 - Moirangthem Biken Singh, Navneet Taunk, Naveen Kumar Mall, Ajay Pratap:
Criticality and Utility-Aware Fog Computing System for Remote Health Monitoring. 1738-1749 - Jingwen Zhou, Feifei Chen, Qiang He, Xiaoyu Xia, Rui Wang, Yong Xiang:
Data Caching Optimization With Fairness in Mobile Edge Computing. 1750-1762 - Changhee Hahn, Junbeom Hur:
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query. 1763-1777 - Pei Ren, Ling Liu, Xiuquan Qiao, Junliang Chen:
Distributed Edge System Orchestration for Web-Based Mobile Augmented Reality Services. 1778-1792 - Yongqiang Gao, Lin Wang, Zhulong Xie, Zhengwei Qi, Jiantao Zhou:
Energy- and Quality of Experience-Aware Dynamic Resource Allocation for Massively Multiplayer Online Games in Heterogeneous Cloud Computing Systems. 1793-1806 - Zai-Xing Sun, Boyu Zhang, Chonglin Gu, Ruitao Xie, Bin Qian, Hejiao Huang:
ET2FA: A Hybrid Heuristic Algorithm for Deadline-Constrained Workflow Scheduling in Cloud. 1807-1821 - Zigui Jiang, Zibin Zheng, Kai Chen, Xiapu Luo, Xiuwen Tang, Yin Li:
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development. 1822-1832 - Rik Eshuis:
Extracting Reusable Fragments From Data-Centric Process Variants. 1833-1845 - Guangshun Yao, Xiaoping Li, Qian Ren, Rubén Ruiz:
Failure-Aware Elastic Cloud Workflow Scheduling. 1846-1859 - Xiangli Xiao, Yushu Zhang, Xuewen Dong, Liangmin Wang, Yong Xiang, Xiaochun Cao:
Fair Outsourcing Paid in Fiat Money Using Blockchain. 1860-1873 - Md. Palash Uddin, Yong Xiang, Xuequan Lu, John Yearwood, Longxiang Gao:
Federated Learning via Disentangled Information Bottleneck. 1874-1889 - Wenbo Xu, Peiyi Han, Shaoming Duan, Chuanyi Liu:
FIGAT: Accurately Classify Individual Crime Risks With Multi-Information Fusion. 1890-1903 - Chih-Lin Hu, Kun-Yu Lin, Carl K. Chang:
Incentive Mechanism for Mobile Crowdsensing With Two-Stage Stackelberg Game. 1904-1918 - Balsam Alkouz, Amani Abusafia, Abdallah Lakhdari, Athman Bouguettaya:
In-Flight Energy-Driven Composition of Drone Swarm Services. 1919-1933 - Yanjun Shu, Jianhang Zhang, Wei Emma Zhang, Decheng Zuo, Quan Z. Sheng:
IQSrec: An Efficient and Diversified Skyline Services Recommendation on Incomplete QoS. 1934-1948 - Wei Jiang, Daquan Feng, Yao Sun, Gang Feng, Zhenzhong Wang, Xiang-Gen Xia:
Joint Computation Offloading and Resource Allocation for D2D-Assisted Mobile Edge Computing. 1949-1963 - Zhaoyang Han, Chunpeng Ge, Bingzhe Wu, Zhe Liu:
Lightweight Privacy-Preserving Federated Incremental Decision Trees. 1964-1975 - Zeyu Qin, Haipeng Yao, Tianle Mai, Di Wu, Ni Zhang, Song Guo:
Multi-Agent Reinforcement Learning Aided Computation Offloading in Aerial Computing for the Internet-of-Things. 1976-1986 - Nafe Moradkhani, Frédérick Bénaben, Benoît Montreuil, Matthieu Lauras, Julien Jeany, Louis Faugère:
Multi-Criteria Performance Analysis Based on Physics of Decision - Application to COVID-19 and Future Pandemics. 1987-1998 - Marco Anisetti, Claudio Agostino Ardagna, Nicola Bena:
Multi-Dimensional Certification of Modern Distributed Systems. 1999-2012 - Roaa Elghondakly, Sherin M. Moussa, Nagwa L. Badr:
Mutual Information-Based Modeling for Services Dependency. 2013-2029 - Guobing Zou, Shaogang Wu, Shengxiang Hu, Chenhong Cao, Yanglan Gan, Bofeng Zhang, Yixin Chen:
NCRL: Neighborhood-Based Collaborative Residual Learning for Adaptive QoS Prediction. 2030-2043 - Jine Tang, Taishan Qin, Yong Xiang, Zhangbing Zhou, Junhua Gu:
Optimization Search Strategy for Task Offloading From Collaborative Edge Computing. 2044-2058 - Jing Liu, Liang Feng Zhang:
Privacy-Preserving and Publicly Verifiable Matrix Multiplication. 2059-2071 - Guoqiang Deng, Min Tang, Yuxing Xi, Mingwu Zhang:
Privacy-Preserving Online Medical Prediagnosis Training Model Based on Soft-Margin SVM. 2072-2084 - Chenkai Guo, Weijie Zhang, Naipeng Dong, Zheli Liu, Yang Xiang:
QoS-Aware Diversified Service Selection. 2085-2099 - Shunrong Jiang, Jianqing Liu, Jingwei Chen, Yiliang Liu, Liangmin Wang, Yong Zhou:
Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data. 2100-2113 - Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks. 2114-2125 - Chen Hou:
Request Control of Web Service-Based Sampling System With Multiple Smart Sensors. 2126-2138 - Nasrin Sohrabi, Zahir Tari, Gauthier Voron, Vincent Gramoli, Qiang Fu:
SAZyzz: Scaling AZyzzyva to Meet Blockchain Requirements. 2139-2152 - Keqin Li:
Scheduling Precedence Constrained Tasks for Mobile Applications in Fog Computing. 2153-2164 - Qinlong Huang, Chao Wang, Lixuan Chen:
Secure and Fine-Grained Flow Control for Subscription-Based Data Services in Cloud-Edge Computing. 2165-2177 - Yu Li, Jianting Ning, Jie Chen:
Secure and Practical Wildcard Searchable Encryption System Based on Inner Product. 2178-2190 - Qingyuan Xie, Chen Zhang, Xiaohua Jia:
Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems. 2191-2202 - Mays F. Al-Naday, Nikolaos Thomos, Jiejun Hu, Bruno Volckaert, Filip De Turck, Martin J. Reed:
Service-Based, Multi-Provider, Fog Ecosystem With Joint Optimization of Request Mapping and Response Routing. 2203-2214 - Ke Ma, Geng Yang:
TBAC: A Fine-Grained Topic-Based Access Control Model for Text Data. 2215-2228 - Chunyu Wei, Yushun Fan, Jia Zhang:
Time-Aware Service Recommendation With Social-Powered Graph Hierarchical Attention Network. 2229-2240 - Nafiseh Sharghivand, Lena Mashayekhy, Weibin Ma, Schahram Dustdar:
Time-Constrained Service Handoff for Mobile Edge Computing in 5G. 2241-2253 - Dong Lu, Yanlong Zhai, Jun Shen, Mahdi Fahmideh, Jianqing Wu, Jude Tchaye-Kondi, Liehuang Zhu:
TreeNet Based Fast Task Decomposition for Resource-Constrained Edge Intelligence. 2254-2266 - Qi Zhang, Yingjie Wang, Guisheng Yin, Xiangrong Tong, Akshita Maradapu Vera Venkata Sai, Zhipeng Cai:
Two-Stage Bilateral Online Priority Assignment in Spatio-Temporal Crowdsourcing. 2267-2282 - Daejin Kim, Hyegyeong Park, Dusit Niyato, Jun Kyun Choi:
Worker Assignment for Multiple Masters to Speed Up Coded Distributed Computing in Heterogeneous Clusters. 2283-2298 - Wattana Viriyasitavat, Li Da Xu, Gaurav Dhiman, Zhuming Bi:
Blockchain-as-a-Service for Business Process Management: Survey and Challenges. 2299-2314
Volume 16, Number 4, July - August 2023
- Xiaohu Chen, Anjia Yang, Jian Weng, Yao Tong, Cheng Huang, Tao Li:
A Blockchain-Based Copyright Protection Scheme With Proactive Defense. 2316-2329 - Björn Rafn Gunnarsson, Seppe vanden Broucke, Jochen De Weerdt:
A Direct Data Aware LSTM Neural Network Architecture for Complete Remaining Trace and Runtime Prediction. 2330-2342 - Yao Zhao, Youyang Qu, Yong Xiang, Yushu Zhang, Longxiang Gao:
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT. 2343-2358 - Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. 2359-2371 - Md. Mainul Islam, Hoh Peter In:
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs. 2372-2386 - Yang Yang, Ming Cheng, Yingqiu Ding, Weiming Zhang:
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding. 2387-2401 - Yun Li, Shi-Jie Jian, Sun-Yuan Hsieh, Wei-Kang Chung, Albert Y. Zomaya:
A Weighted Optimal Scheduling Scheme for Congestion Control in Cloud Data Center Networks. 2402-2410 - Hossein Shirazi, Shashika Ranga Muramudalige, Indrakshi Ray, Anura P. Jayasumana, Haonan Wang:
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms. 2411-2422 - Nanxi Chen, Qi Sun, Yanbei Li, Hongfeng Shu, Jiamao Li, Xiaolin Zhang:
Agile Services Provisioning for Learning-Based Applications in Fog Computing Networks. 2423-2436 - Zhe Sun, Peng Zhao, Chunping Wang, Xiaoli Zhang, Hongbing Cheng:
An Efficient and Secure Trading Framework for Shared Charging Service Based on Multiple Consortium Blockchains. 2437-2450 - Divija Swetha Gadiraju, V. Lalitha, Vaneet Aggarwal:
An Optimization Framework Based on Deep Reinforcement Learning Approaches for Prism Blockchain. 2451-2461 - Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad, Hadi Otrok:
Coalitional Federated Learning: Improving Communication and Training on Non-IID Data With Selfish Clients. 2462-2476 - Hanrui Wu, Chung Wang Wong, Jia Zhang, Yuguang Yan, Dahai Yu, Jinyi Long, Michael K. Ng:
Cold-Start Next-Item Recommendation by User-Item Matching and Auto-Encoders. 2477-2489 - Xiaoquan Zhang, Lin Cui, Fung Po Tso, Weijia Jia:
Compiling Service Function Chains via Fine-Grained Composition in the Programmable Data Plane. 2490-2502 - Dayoung Lee, Younghyun Kim, Minseok Song:
Cost-Effective, Quality-Oriented Transcoding of Live-Streamed Video on Edge-Servers. 2503-2516 - Hao Dai, Jiashu Wu, Yang Wang, Jerome Yen, Yong Zhang, Cheng-Zhong Xu:
Cost-Efficient Sharing Algorithms for DNN Model Serving in Mobile Edge Networks. 2517-2531 - Xiaoquan Zhang, Lin Cui, Fung Po Tso, Zhetao Li, Weijia Jia:
Dapper: Deploying Service Function Chains in the Programmable Data Plane Via Deep Reinforcement Learning. 2532-2544 - Satish Kumar, Tao Chen, Rami Bahsoon, Rajkumar Buyya:
DebtCom: Technical Debt-Aware Service Recomposition in SaaS Cloud. 2545-2558 - Samaikya Valluripally, Benjamin Frailey, Brady Kruse, Boonakij Palipatana, Roland Oruche, Aniket Gulhane, Khaza Anuarul Hoque, Prasad Calyam:
Detection of Security and Privacy Attacks Disrupting User Immersive Experience in Virtual Reality Learning Environments. 2559-2574 - Anwar Ghammam, Thiago do Nascimento Ferreira, Wajdi Aljedaani, Marouane Kessentini, Ali Husain:
Dynamic Software Containers Workload Balancing via Many-Objective Search. 2575-2591 - Mingyi Liu, Zhiying Tu, Hanchuan Xu, Xiaofei Xu, Zhongjie Wang:
DySR: A Dynamic Graph Neural Network Based Service Bundle Recommendation Model for Mashup Creation. 2592-2605 - Prabath Abeysekara, Hai Dong, A. Kai Qin:
Edge Intelligence for Real-Time IoT Service Trust Prediction. 2606-2619 - Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu:
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query. 2620-2631 - Hai Huang, Luyao Wang:
Efficient Privacy-Preserving Face Identification Protocol. 2632-2641 - Cong Thanh Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Yong Xiao, Hoang-Anh Pham, Eryk Dutkiewicz, Nguyen Huynh Tuong:
FedChain: Secure Proof-of-Stake-Based Framework for Federated-Blockchain Systems. 2642-2656 - Meng Xu, Yi Mei, Shiqiang Zhu, Beibei Zhang, Tian Xiang, Fangfang Zhang, Mengjie Zhang:
Genetic Programming for Dynamic Workflow Scheduling in Fog Computing. 2657-2671 - Zhenhua Chen, Jingjing Nie, Li Zhan-Li, Willy Susilo, Chunpeng Ge:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. 2672-2684 - Yuxiang Liu, Bo Yang, Yu Wu, Cailian Chen, Xinping Guan:
How to Share: Balancing Layer and Chain Sharing in Industrial Microservice Deployment. 2685-2698 - Di Wu, Bo Sun, Mingsheng Shang:
Hyperparameter Learning for Deep Learning-Based Recommender Systems. 2699-2712 - Xiaoming Yu, Wenjun Wu, Yangzhou Wang:
Integrating Cognition Cost With Reliability QoS for Dynamic Workflow Scheduling Using Reinforcement Learning. 2713-2726 - Dongjin Yu, Tong Wu, Chengfei Liu, Dongjing Wang:
Joint Content Caching and Recommendation in Opportunistic Mobile Networks Through Deep Reinforcement Learning and Broad Learning. 2727-2741 - Thomas Weripuo Gyeera, Anthony J. H. Simons, Mike Stannett:
Kalman Filter Based Prediction and Forecasting of Cloud Server KPIs. 2742-2754 - Chunyan Sang, Xinyan Deng, Shigen Liao:
Mashup-Oriented Web API Recommendation Via Full-Text Semantic Mining of Developer Requirements. 2755-2768 - Jing Bai, Xiaolin Chang, Fumio Machida, Kishor S. Trivedi, Yaru Li:
Model-Driven Dependability Assessment of Microservice Chains in MEC-Enabled IoT. 2769-2785 - Ruyu Yan, Haozhe Lin, Yushun Fan, Jia Zhang, Bing Bai:
Multi-Modal Reciprocal Spatiotemporal Framework for Predicting Usage Trend of Knowledge Services. 2786-2799 - Chunming Zhang, Fengji Luo, Gianluca Ranzi:
Multistage Game Theoretical Approach for Ransomware Attack and Defense. 2800-2811 - Cedric Parfait Kankeu Fotsing, Chih-Ya Shen, Liang-Hao Huang, Yi-Shin Chen, Wang-Chien Lee, De-Nian Yang:
On Efficient Processing of Queries for Live Multi-Streaming Soiree Organization. 2812-2826 - Jiajun Yao, Lei Yang, Xiaohua Xu:
Online Dependent Task Assignment in Preference Aware Spatial Crowdsourcing. 2827-2840 - Alexandros-Ioannis Manolopoulos, Markos P. Anastasopoulos, Victoria-Maria Alevizaki, Anna Tzanakaki:
Optimal Service Provisioning in Mobile 5G and Beyond Systems. 2841-2854 - Hui Yin, Yangfan Li, Hua Deng, Wei Zhang, Zheng Qin, Keqin Li:
Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data. 2855-2867 - Liang Zhang, Haibin Kan, Yihao Wang:
Privacy-Preserving AGV Collision-Resistance at the Edge Using Location-Based Encryption. 2868-2878 - Yuanyuan Gao, Lei Zhang, Lulu Wang, Kim-Kwang Raymond Choo, Rui Zhang:
Privacy-Preserving and Reliable Decentralized Federated Learning. 2879-2891 - Yuejing Yan, Yanyan Xu, Zhiheng Wang, Xue Ouyang, Bo Zhang, Zheheng Rao:
Privacy-Preserving Multi-Source Image Retrieval in Edge Computing. 2892-2907 - Amit Biswas, Ravi Yadav, Gaurav Baranwal, Anil Kumar Tripathi:
Proof of Karma (PoK): A Novel Consensus Mechanism for Consortium Blockchain. 2908-2922 - Songlei Wang, Yifeng Zheng, Xiaohua Jia:
SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service. 2923-2938 - Jingwei Wang, Xinchun Yin, Jianting Ning, Shengmin Xu, Guowen Xu, Xinyi Huang:
Secure Updatable Storage Access Control System for EHRs in the Cloud. 2939-2953 - Sithu Kaung Set, Gi Seok Park:
Service-Aware Dynamic Sharding Approach for Scalable Blockchain. 2954-2969 - Vincenzo Pasquadibisceglie, Annalisa Appice, Giovanna Castellano, Nicola Fiorentino, Donato Malerba:
STARDUST: A Novel Process Mining Approach to Discover Evolving Models From Trace Streams. 2970-2984 - Kexin Li, Xingwei Wang, Qiang He, Mingzhou Yang, Min Huang, Schahram Dustdar:
Task Computation Offloading for Multi-Access Edge Computing via Attention Communication Deep Reinforcement Learning. 2985-2999 - Hang Xu, Ching-Fang Hsu, Lein Harn, Jianqun Cui, Zhuo Zhao, Ze Zhang:
Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things. 3000-3013 - Mohan Baruwal Chhetri, Abdur Rahim Mohammad Forkan, Quoc Bao Vo, Surya Nepal, Ryszard Kowalczyk:
Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources. 3014-3026 - Fanghui Bi, Tiantian He, Yuetong Xie, Xin Luo:
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis. 3027-3042 - Maggi Bansal, Inderveer Chana, Siobhán Clarke:
UrbanEnQoSPlace: A Deep Reinforcement Learning Model for Service Placement of Real-Time Smart City IoT Applications. 3043-3060 - Jian Cao, Naixuan Wang, Shiyou Qian, Wei Guan:
When to Invoke a Prediction Service for Business Process Monitoring? 3061-3074 - Mohammad Javad Nadjafi-Arani, Saeed Doostali, Mohamed F. Younis:
Workflow Scheduling With Guaranteed Responsiveness and Minimal Cost. 3075-3087
Volume 16, Number 5, September - October 2023
- Hoda Taheri, Saeid Abrishami, Mahmoud Naghibzadeh:
A Cloud Broker for Executing Deadline-Constrained Periodic Scientific Workflows. 3089-3100 - Jiangjiang Zhang, Bei Gong, Muhammad Waqas, Shanshan Tu, Zhu Han:
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks. 3101-3114 - Song Deng, Yujia Zhai, Di Wu, Dong Yue, Xiong Fu, Yi He:
A Lightweight Dynamic Storage Algorithm With Adaptive Encoding for Energy Internet. 3115-3128 - Gabriele Proietti Mattia, Antonio Pietrabissa, Roberto Beraldi:
A Load Balancing Algorithm for Equalising Latency Across Fog or Edge Computing Nodes. 3129-3140 - Lalit Purohit, Santosh Singh Rathore, Sandeep Kumar:
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection. 3141-3154 - Hiren Dutta, Saurabh Nagesh, Jawahar Talluri, Parama Bhaumik:
A Solution to Blockchain Smart Contract Based Parametric Transport and Logistics Insurance. 3155-3167 - Weiwen Zhang, Jinzhou Luo, Lei Chen, Jianqi Liu:
A Trajectory Prediction-Based and Dependency-Aware Container Migration for Mobile Edge Computing. 3168-3181 - Jiani Li, Tao Wang, Bo Yang, Qiliang Yang, Wenzheng Zhang, Keyong Hong:
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving. 3182-3195 - Davi Monteiro Barbosa, Yijun Yu, Andrea Zisman, Bashar Nuseibeh:
Adaptive Observability for Forensic-Ready Microservice Systems. 3196-3209 - Suhui Liu, Liquan Chen, Ge Wu, Huaqun Wang, Hongtao Yu:
Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records. 3210-3223 - Siyu Yu, Pinjia He, Ningjiang Chen, Yifan Wu:
Brain: Log Parsing With Bidirectional Parallel Tree. 3224-3237 - Marius Popa, Sebastian Michael Stoklossa, Somnath Mazumdar:
ChainDiscipline - Towards a Blockchain-IoT-Based Self-Sovereign Identity Management Framework. 3238-3251 - Xiaoxu Ren, Chao Qiu, Zheyuan Chen, Xiaofei Wang, Dusit Niyato, Wenyu Wang:
CompCube: A Space-Time-Request Resource Trading Framework for Edge-Cloud Service Market. 3252-3264 - Cheng-Wei Ching, Jia-Ming Chang, Jian-Jhih Kuo, Chih-Yu Wang:
Dual-Objective Personalized Federated Service System With Partially-Labeled Data Over Wireless Networks. 3265-3279 - Lu Yin, Jin Sun, Junlong Zhou, Zonghua Gu, Keqin Li:
ECFA: An Efficient Convergent Firefly Algorithm for Solving Task Scheduling Problems in Cloud-Edge Computing. 3280-3293 - Chao Lin, Xinyi Huang, Debiao He:
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation. 3294-3304 - Swasti Khurana, Novarun Deb, Sajib Mistry, Aditya Ghose, Aneesh Krishna, Hoa Khanh Dam:
Egalitarian Transient Service Composition in Crowdsourced IoT Environment. 3305-3317 - Peng Jiang, Fuchun Guo, Willy Susilo, Chao Lin, Jiaxi Hu, Zhen Zhao, Liehuang Zhu, Debiao He:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. 3318-3331 - Guangba Yu, Pengfei Chen, Zibin Zheng, Jingrun Zhang, Xiaoyun Li, Zilong He:
FaaSDeliver: Cost-Efficient and QoS-Aware Function Delivery in Computing Continuum. 3332-3347 - Qinlong Huang, Qinglin Wei, Guanyu Yan, Lin Zou, Yixian Yang:
Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services. 3348-3360 - Jiang Bian, Jizhou Huang, Shilei Ji, Yuan Liao, Xuhong Li, Qingzhong Wang, Jingbo Zhou, Dejing Dou, Yaqing Wang, Haoyi Xiong:
Feynman: Federated Learning-Based Advertising for Ecosystems-Oriented Mobile Apps Recommendation. 3361-3372 - Dan Tang, Siyuan Wang, Boru Liu, Wenqiang Jin, Jiliang Zhang:
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN. 3373-3384 - Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das:
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets. 3385-3396 - Minghui Liwang, Zhibin Gao, Seyyedali Hosseinalipour, Yuhan Su, Xianbin Wang, Huaiyu Dai:
Graph-Represented Computation-Intensive Task Scheduling Over Air-Ground Integrated Vehicular Networks. 3397-3411 - Wei Guan, Jian Cao, Yang Gu, Shiyou Qian:
GRASPED: A GRU-AE Network Based Multi-Perspective Business Process Anomaly Detection Model. 3412-3424 - Teng Li, Jiawei Zhang, Yulong Shen, Jianfeng Ma:
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things. 3425-3438 - Yao-Chun Yang, Chiao-Ting Chen, Tzu-Yu Lu, Szu-Hao Huang:
Hierarchical Reinforcement Learning for Conversational Recommendation With Knowledge Graph Reasoning and Heterogeneous Questions. 3439-3452 - Wei Tang, Haifeng Sun, Jingyu Wang, Cong Liu, Qi Qi, Jing Wang, Jianxin Liao:
Identifying Users Across Social Media Networks for Interpretable Fine-Grained Neighborhood Matching by Adaptive GAT. 3453-3466 - Zhixuan Jia, Yushun Fan, Jia Zhang, Chunyu Wei, Ruyu Yan, Xing Wu:
Improving Next Location Recommendation Services With Spatial-Temporal Multi-Group Contrastive Learning. 3467-3478 - Tong Xiao, Zhe Quan, Zhi-Jie Wang, Yuquan Le, Yunfei Du, Xiangke Liao, Kenli Li, Keqin Li:
Loader: A Log Anomaly Detector Based on Transformer. 3479-3492 - Yicheng Sui, Yuzhe Zhang, Jianjun Sun, Ting Xu, Shenglin Zhang, Zhengdan Li, Yongqian Sun, Fangrui Guo, Junyu Shen, Yuzhi Zhang, Dan Pei, Xiao Yang, Li Yu:
LogKG: Log Failure Diagnosis Through Knowledge Graph. 3493-3507 - Imam Mustafa Kamal, Hyerim Bae, Ling Liu:
Metric Learning as a Service With Covariance Embedding. 3508-3522 - Amit Samanta, Quoc-Viet Pham, Nhu-Ngoc Dao, Ammar Muthanna, Sungrae Cho:
mISO: Incentivizing Demand-Agnostic Microservices for Edge-Enabled IoT Networks. 3523-3536 - Yuanyuan Fu, Kun Liang, Jian Xu:
MLog: Mogrifier LSTM-Based Log Anomaly Detection Approach Using Semantic Representation. 3537-3549 - Chuang Li, Aoli He, Yanhua Wen, Gang Liu, Anthony Theodore Chronopoulos:
Optimal Trading Mechanism Based on Differential Privacy Protection and Stackelberg Game in Big Data Market. 3550-3563 - Lulu Han, Weiqi Luo, Yaxi Yang, Anjia Yang, Rongxing Lu, Junzuo Lai, Yandong Zheng:
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments. 3564-3577 - Wenjing Gao, Jia Yu:
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing. 3578-3589 - Yankai Xie, Qingtao Wang, Ruoyue Li, Chi Zhang, Lingbo Wei:
Private Transaction Retrieval for Lightweight Bitcoin Clients. 3590-3603 - Yifeng Zheng, Shuangqing Xu, Songlei Wang, Yansong Gao, Zhongyun Hua:
Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables. 3604-3620 - Zhen Lv, Kaiyu Shang, Hongwei Huo, Ximeng Liu, Yanguo Peng, Xiangyu Wang, Yaorong Tan:
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data. 3621-3635 - Ensheng Liu, Liping Zheng, Qiang He, Phu Lai, Benzhu Xu, Gaofeng Zhang:
Role-Based User Allocation Driven by Criticality in Edge Computing. 3636-3650 - Yue Zeng, Zhihao Qu, Song Guo, Bin Tang, Baoliu Ye, Jing Li, Jie Zhang:
RuleDRL: Reliability-Aware SFC Provisioning With Bounded Approximations in Dynamic Environments. 3651-3664 - E. Chen, Shengdian Wang, Yuqing Fan, Yan Zhu, Stephen S. Yau:
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts. 3665-3681 - Zhijun Ding, Yuanyuan Zhou, Shuaijun Wang, Changjun Jiang:
SCAFE: A Service-Centered Cloud-Native Workflow Engine Architecture. 3682-3695 - Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao:
SecBerg: Secure and Practical Iceberg Queries in Cloud. 3696-3710 - Willy Susilo, Fuchun Guo, Zhen Zhao, Yinhao Jiang, Chunpeng Ge:
Secure Replication-Based Outsourced Computation Using Smart Contracts. 3711-3722 - Bingbing Song, Ruxin Wang, Song Gao, Yunyun Dong, Ling Liu, Wei Zhou:
Securing Deep Learning as a Service Against Adaptive High Frequency Attacks With MMCAT. 3723-3735 - Shaozhong Zhang, Dingkai Zhang, Yaohui Wu, Haidong Zhong:
Service Recommendation Model Based on Trust and QoS for Social Internet of Things. 3736-3750 - Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
Threshold Attribute-Based Credentials With Redactable Signature. 3751-3765 - Lili Sun, Yonggang Zhang, Yandong Zheng, Weiyu Song, Rongxing Lu:
Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud. 3766-3781 - Ran Ding, Yan Xu, Hong Zhong, Jie Cui, Kewei Sha:
Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing. 3782-3795 - Wenjing Zhong, Jinjing Zhao, Hesuan Hu:
Unified Implementation and Simplification for Task-Based Authorization Security in Workflows. 3796-3811 - Bo-Chen Tai, Yao-Tung Tsou, Szu-Chuang Li, Yennun Huang, Pei-Yuan Tsai, Yu-Cheng Tsai:
User-Driven Synthetic Dataset Generation With Quantifiable Differential Privacy. 3812-3826 - Wei Wei, Qiao Ke, Adam Zielonka, Mariusz Pleszczynski, Marcin Wozniak:
Vehicle Parking Navigation Based on Edge Computing With Diffusion Model and Information Potential Field. 3827-3836 - Buqing Cao, Mi Peng, Lulu Zhang, Yueying Qing, Bing Tang, Guosheng Kang, Jianxun Liu:
Web Service Recommendation via Integrating Heterogeneous Graph Attention Network Representation and FiBiNET Score Prediction. 3837-3850
Volume 16, Number 6, November - December 2023
- Shenglin Zhang, Pengxiang Jin, Zihan Lin, Yongqian Sun, Bicheng Zhang, Sibo Xia, Zhengdan Li, Zhenyu Zhong, Minghua Ma, Wa Jin, Dai Zhang, Zhenyu Zhu, Dan Pei:
Robust Failure Diagnosis of Microservice System Through Multimodal Data. 3851-3864 - Sujit Chowdhury, Arnab Mukherjee, Raju Halder:
${\sf FedRLChain}$: Secure Federated Deep Reinforcement Learning With Blockchain. 3865-3878 - Ifteher Alom, Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury:
BlockMeter: An Application Agnostic Performance Measurement Framework for Private Blockchain Platforms. 3879-3891 - Huy Minh Huynh, Bay Vo, Zuzana Komínková Oplatková, Witold Pedrycz:
An Approach for Incremental Mining of Clickstream Patterns as a Service Application. 3892-3905 - Zhenli He, Yanan Xu, Mingxiong Zhao, Wei Zhou, Keqin Li:
Priority-Based Offloading Optimization in Cloud-Edge Collaborative Computing. 3906-3919 - Yudi Zhang, Willy Susilo, Fuchun Guo, Guomin Yang:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. 3920-3930 - Md. Enamul Haque, Mehmet Engin Tozal:
Identification of Fraudulent Healthcare Claims Using Fuzzy Bipartite Knowledge Graphs. 3931-3945 - Feifei Chen, Jingwen Zhou, Xiaoyu Xia, Yong Xiang, Xuehong Tao, Qiang He:
Joint Optimization of Coverage and Reliability for Application Placement in Mobile Edge Computing. 3946-3957 - Meng Xi, Jianwei Yin, Zhengzi Xu, Ying Li, Shuiguang Deng, Yang Liu:
Service Pattern Optimization: Focusing on Collaboration in Service Ecosystems. 3958-3971 - Hanqi Zhang, Chang Xu, Rongxing Lu, Liehuang Zhu, Chuan Zhang, Yunguo Guan:
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage. 3972-3985 - Lunzhi Deng, Bo Wang, Tao Wang, Shuai Feng, Siwei Li:
Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage. 3986-3998 - Dilxat Ghopur, Jianfeng Ma, Xindi Ma, Jialu Hao, Tao Jiang, Xiangyu Wang:
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation. 3999-4011 - Qi He, Jie Sun, Xiao-Jian Li:
False Data Injection Attack Detection Based on Redundant Sparse Reconstruction. 4012-4024 - Amani Abusafia, Abdallah Lakhdari, Athman Bouguettaya:
Flow-Based Energy Services Composition. 4025-4040 - Ryeong Hwan Kim, Hwangjun Song, Gi Seok Park:
Moving Real-Time Services to Web 3.0: Challenges and Opportunities. 4041-4059 - PeiYun Zhang, Wenjun Huang, Yutong Chen, MengChu Zhou:
Predicting Quality of Services Based on a Two-Stream Deep Learning Model With User and Service Graphs. 4060-4072 - Guobing Zou, Shiyi Lin, Shengxiang Hu, Shengyu Duan, Yanglan Gan, Bofeng Zhang, Yixin Chen:
FHC-DQP: Federated Hierarchical Clustering for Distributed QoS Prediction. 4073-4086 - Yinbin Miao, Yueming Yu, Xinghua Li, Yu Guo, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Defending Against Membership Inference Attack by Shielding Membership Signals. 4087-4101 - Yimin Guo, Yajun Guo:
CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments. 4102-4114 - Huaman Zhou, Zonghang Li, Hongfang Yu, Long Luo, Gang Sun:
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs. 4115-4127 - Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection. 4128-4139 - Mohammad Belayet Hossain, Shiva Raj Pokhrel, Jinho Choi:
Privacy Cost Optimization of Smart Meters Using URLLC and Demand Side Energy Trading. 4140-4153 - Jin Li, Shu Li, Yuan Zhao, Longjiang Guo, Fei Hao, Meirui Ren, Keqin Li:
Predicting Dropouts Before Enrollments in MOOCs: An Explainable and Self-Supervised Model. 4154-4167 - Duo Zhang, Shangping Wang, Qian Zhang, Yaling Zhang:
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain. 4168-4182 - Yi Xie, Xue-Yi Wang, Zi-Jun Shen, Yuhan Sheng, Gong-Xing Wu:
A Two-Stage Estimation of Distribution Algorithm With Heuristics for Energy-Aware Cloud Workflow Scheduling. 4183-4197 - Hochan Lee, Jaewook Lee, Heewon Kim, Sangheon Pack:
Straggler-Aware In-Network Aggregation for Accelerating Distributed Deep Learning. 4198-4204 - Yang Gu, Jian Cao, Shiyou Qian, Wei Guan:
SWORTS: A Scientific Workflow Retrieval Approach by Learning Textual and Structural Semantics. 4205-4219 - Xin Wang, Xiaojun Zhang, Xinpeng Zhang, Yinbin Miao, Jingting Xue:
Enabling Anonymous Authorized Auditing Over Keyword-Based Searchable Ciphertexts in Cloud Storage Systems. 4220-4232 - Jinlu Liu, Zhongkai Wei, Jing Qin, Bo Zhao, Jixin Ma:
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting. 4233-4247 - Ying Cheng, Xiumin Wang, Pan Zhou, Xinglin Zhang, Weiwei Wu:
Freshness-Aware Incentive Mechanism for Mobile Crowdsensing With Budget Constraint. 4248-4260 - Tao Shi, Hui Ma, Gang Chen, Sven Hartmann:
Auto-Scaling Containerized Applications in Geo-Distributed Clouds. 4261-4274 - Kaiyang Liu, Jingrong Wang, Heng Li, Jun Peng, Jianping Pan:
Sampling-Based Caching for Low Latency in Distributed Coded Storage Systems. 4275-4287 - Claudio Marche, Ilaria Cabiddu, Christian Giovanni Castangia, Luigi Serreli, Michele Nitti:
Implementation of a Multi-Approach Fake News Detector and of a Trust Management Model for News Sources. 4288-4301 - Zhenyu Wen, Renyu Yang, Bin Qian, Yubo Xuan, Lingling Lu, Zheng Wang, Hao Peng, Jie Xu, Albert Y. Zomaya, Rajiv Ranjan:
Janus: Latency-Aware Traffic Scheduling for IoT Data Streaming in Edge Environments. 4302-4316 - Shanshan Tu, Muhammad Waqas, Akhtar Badshah, Mingxi Yin, Ghulam Abbas:
Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing. 4317-4327 - Lionel Nkenyereye, Kang-Jun Baeg, Wan-Young Chung:
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing. 4328-4344 - Xingxia Dai, Zhu Xiao, Hongbo Jiang, Ming Lei, Geyong Min, Jiangchuan Liu, Schahram Dustdar:
Offloading Dependent Tasks in Edge Computing With Unknown System-Side Information. 4345-4359 - Hao Guo, Collin Meese, Wanxin Li, Chien-Chung Shen, Mark M. Nejad:
B2SFL: A Bi-Level Blockchained Architecture for Secure Federated Learning-Based Traffic Prediction. 4360-4374 - Bingxin Tang, Junyuan Liang, Zhongteng Cai, Ting Cai, Xiaocong Zhou, Yingye Chen:
MDRL-IR: Incentive Routing for Blockchain Scalability With Memory-Based Deep Reinforcement Learning. 4375-4388 - Yeonho Yoo, Gyeongsik Yang, Changyong Shin, Junseok Lee, Chuck Yoo:
Machine Learning-Based Prediction Models for Control Traffic in SDN Systems. 4389-4403 - Jing Mei, Zhao Tong, Kenli Li, Lianming Zhang, Keqin Li:
Energy-Efficient Heuristic Computation Offloading With Delay Constraints in Mobile Edge Computing. 4404-4417 - Wenan Tan, Weinan Niu, Jia Wei, Lida Xu:
TNSAR: Temporal Evolution Network Embedding Based on Structural and Attribute Retention. 4418-4431 - Ahmad Hammoud, Rabeb Mizouni, Hadi Otrok, Shakti Singh, Azzam Mourad, Zbigniew Dziong:
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations. 4432-4443 - Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials. 4444-4455 - Yatong Jiang, Tao Shang, Jianwei Liu:
Secure Gene Sequence Alignment Based on Garbled Circuit. 4456-4466 - Yuchen Li, Haoyi Xiong, Linghe Kong, Rui Zhang, Fanqin Xu, Guihai Chen, Minglu Li:
MHRR: MOOCs Recommender Service With Meta Hierarchical Reinforced Ranking. 4467-4480 - Shuai Feng, Liang Feng Zhang:
An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage. 4481-4492 - Hamed Aboutorab, Omar Khadeer Hussain, Morteza Saberi, Farookh Khadeer Hussain, Daniel D. Prior:
Reinforcement Learning-Based News Recommendation System. 4493-4502 - Zhiwei Wang, Longwen Lan, Siu-Ming Yiu:
Chameleon Hash Based Efficiently Updatable Oblivious Key Management. 4503-4513 - Gianni Costa, Agostino Forestiero, Riccardo Ortale:
Rule-Based Detection of Anomalous Patterns in Device Behavior for Explainable IoT Security. 4514-4525 - Haojun Huang, Jialin Tian, Hao Yin, Geyong Min, Dapeng Oliver Wu, Wang Miao:
RQAP: Resource and QoS Aware Placement of Service Function Chains in NFV-Enabled Networks. 4526-4539 - Jiajun Yao, Lei Yang, Zhenyu Wang, Xiaohua Xu:
Non-Rejection Aware Online Task Assignment in Spatial Crowdsourcing. 4540-4553 - Hua Shen, Ge Wu, Willy Susilo, Mingwu Zhang:
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry. 4554-4566 - Yanzhao Tian, Lixiang Li, Haipeng Peng, Ding Wang, Yixian Yang:
Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences. 4567-4579 - Amin Bagheri, Alireza Shameli-Sendi:
Automating the Translation of Cloud Users' High-Level Security Needs to an Optimal Placement Model in the Cloud Infrastructure. 4580-4590 - Jiao Liu, Xinghua Li, Ximeng Liu, Jiawei Tang, Yunwei Wang, Qiuyun Tong, Jianfeng Ma:
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework. 4591-4604 - Muhammad Umair, Athman Bouguettaya, Abdallah Lakhdari:
Determining Intent of Changes to Ascertain Fake Crowdsourced Image Services. 4605-4616
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.