


default search action
ACM Transactions on Internet Technology, Volume 23
Volume 23, Number 1, February 2023
- Pankaj Mishra
, Ahmed Moustafa
, Takayuki Ito
:
Real-time Pricing-based Resource Allocation in Open Market Environments. 1:1-1:22 - Jianwei Hao
, Piyush Subedi
, Lakshmish Ramaswamy
, In Kee Kim
:
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy. 2:1-2:33 - Rongjunchen Zhang
, Tingmin Wu
, Sheng Wen
, Surya Nepal
, Cécile Paris, Yang Xiang
:
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching. 3:1-3:18 - Sharon Hirsch
, Slava Novgorodov
, Ido Guy
, Alexander Nus
:
The Tip of the Buyer: Extracting Product Tips from Reviews. 4:1-4:30 - Carlos Javier Hernández-Castro
, David F. Barrero
, María Dolores Rodríguez-Moreno
:
Breaking CaptchaStar Using the BASECASS Methodology. 5:1-5:12 - Luigi Asprino
, Enrico Daga
, Aldo Gangemi
, Paul Mulholland
:
Knowledge Graph Construction with a Façade: A Unified Method to Access Heterogeneous Data Sources on the Web. 6:1-6:31 - Weiwei Fang
, Wenyuan Xu
, Chongchong Yu
, Neal N. Xiong
:
Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters. 7:1-7:21 - Iulia Paun
, Yashar Moshfeghi
, Nikos Ntarmos
:
White Box: On the Prediction of Collaborative Filtering Recommendation Systems' Performance. 8:1-8:29 - Yuanjun Dai
, An Wang
, Yang Guo
, Songqing Chen
:
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks. 9:1-9:25 - Feijie Wu
, Ho Yin Yuen
, Henry C. B. Chan
, Victor C. M. Leung
, Wei Cai
:
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies. 10:1-10:26 - Massimo La Morgia
, Alessandro Mei
, Francesco Sassi
, Julinda Stefa
:
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations. 11:1-11:28 - Man Zeng
, Dandan Li
, Pei Zhang
, Kun Xie
, Xiaohong Huang
:
Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee. 12:1-12:22 - Gonul Ayci
, Murat Sensoy
, Arzucan Özgür
, Pinar Yolum
:
Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions. 13:1-13:24 - Andrea De Salve
, Luca Franceschi
, Andrea Lisi
, Paolo Mori
, Laura Ricci
:
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation. 14:1-14:30 - Wenzhao Zhang
, Yuxuan Zhang
, Hongchang Fan
, Yi Gao
, Wei Dong
:
A Low-code Development Framework for Cloud-native Edge Systems. 15:1-15:22 - Gregorius Satia Budhi
, Raymond Chiong
:
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction. 16:1-16:24 - Chong Zhang
, Qiang Guo
, Luoyi Fu
, Jiaxin Ding
, Xinde Cao
, Fei Long
, Xinbing Wang
, Chenghu Zhou
:
Finding the Source in Networks: An Approach Based on Structural Entropy. 17:1-17:25 - Habib Mostafaei
, Shafi Afridi
:
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics. 18:1-18:21 - Martino Trevisan
, Francesca Soro
, Marco Mellia
, Idilio Drago
, Ricardo Morla
:
Attacking DoH and ECH: Does Server Name Encryption Protect Users' Privacy? 19:1-19:22 - Sidharth Sharma
, Aniruddha Kushwaha
, Mohammad Alizadeh
, George Varghese
, Ashwin Gumaste
:
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency. 20:1-20:26 - Bolin Zhang
, Zhiying Tu
, Shaoshi Hang
, Dianhui Chu
, Xiaofei Xu
:
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot. 21:1-21:24 - Romain Fouquet, Pierre Laperdrix, Romain Rouvoy:
Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript. 22:1-22:28 - Yu-Jhen Wang
, Anthony J. T. Lee
:
Movie Account Recommendation on Instagram. 23:1-23:21
Volume 23, Number 2, May 2023
- Quan Z. Sheng
, Arun Kumar Sangaiah
, Ankit Chaudhary
:
Guest Editors' Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services. 24:1-24:3 - Mu-Yen Chen
, Yi-Wei Lai
, Jiunn-Woei Lian
:
Using Deep Learning Models to Detect Fake News about COVID-19. 25:1-25:23 - Yucheng Dong
, Qin Ran
, Xiangrui Chao
, Congcong Li
, Shui Yu
:
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process. 26:1-26:27 - Yazhou Zhang
, Dan Ma
, Prayag Tiwari
, Chen Zhang
, Mehedi Masud
, Mohammad Shorfuzzaman
, Dawei Song
:
Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks. 27:1-27:21 - Yi-Bing Lin
, Yuan-Fu Liao
, Sin-Horng Chen
, Shaw-Hwa Hwang
, Yih-Ru Wang
:
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English. 28:1-28:30 - Pedro Victor Borges
, Chantal Taconet
, Sophie Chabridon
, Denis Conan
, Everton Cavalcante
, Thaís Batista
:
Taming Internet of Things Application Development with the IoTvar Middleware. 29:1-29:21 - Hucheng Wang
, Zhi Wang
, Lei Zhang
, Xiaonan Luo
, Xinheng Wang
:
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment. 30:1-30:19 - Arvind Kumar Gangwar
, Sandeep Kumar
:
Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift. 31:1-31:28 - Jing Chen
, Wenjun Jiang
, Jie Wu
, Kenli Li
, Keqin Li
:
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts. 32:1-32:28 - Luca Muscariello
, Michele Papalini
, Olivier Roques
, Mauro Sardara
, Arthur Tran Van
:
Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking. 33:1-33:20 - Yibin Xu
, Jianhua Shao
, Tijs Slaats
, Boris Düdder
:
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding. 34:1-34:27 - Li Yang
, Xi Li
, Zhuoru Ma
, Lu Li
, Neal N. Xiong
, Jianfeng Ma
:
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios. 35:1-35:29
Volume 23, Number 3, August 2023
- Shancang Li, Surya Nepal, Theo Tryfonas, Hongwei Li:
Blockchain-based Zero Trust Cybersecurity in the Internet of Things. 36:1-36:3 - Ying Li
, Yaxin Yu, Xingwei Wang:
Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy. 37:1-37:28 - Keke Gai
, Yufeng She
, Liehuang Zhu
, Kim-Kwang Raymond Choo
, Zhiguo Wan
:
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing. 38:1-38:25 - Mohammad Wazid, Prosanta Gope:
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications. 39:1-39:28 - Fuchen Ma
, Meng Ren
, Ying Fu
, Wanting Sun
, Houbing Song
, Heyuan Shi
, Yu Jiang
, Huizhong Li
:
V-Gas: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability. 40:1-40:22 - Zhenyu Li
, Yong Ding
, Honghao Gao, Bo Qu, Yujue Wang, Jun Li:
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network. 41:1-41:23 - Jin Wang, Jiahao Chen, Neal Xiong, Osama Alfarraj, Amr Tolba
, Yongjun Ren:
S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT. 42:1-42:23 - Amjad Alsirhani
, Muhammad Ali Khan
, Abdullah Alomari
, Sauda Maryam, Aiman Younas
, Muddesar Iqbal
, Muhammad Hameed Siqqidi, Amjad Ali:
Securing Low-Power Blockchain-enabled IoT Devices against Energy Depletion Attack. 43:1-43:17 - Fan Wang
, Guangshun Li, Yilei Wang, Wajid Rafique, Mohammad Reza Khosravi, Guanfeng Liu, Yuwen Liu
, Lianyong Qi:
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City. 44:1-44:19
- Luca Gioacchini
, Luca Vassio
, Marco Mellia
, Idilio Drago
, Zied Ben-Houidi
, Dario Rossi
:
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis. 45:1-45:28 - Mohammed Bahutair
, Athman Bouguettaya
:
An End-to-end Trust Management Framework for Crowdsourced IoT Services. 46:1-46:32 - Keke Chen
, Yuechun Gu
, Sagar Sharma
:
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds. 47:1-47:26 - Hossein Chegini
, Fernando Beltrán
, Aniket Mahanti
:
Designing and Developing a Weed Detection Model for California Thistle. 48:1-48:29
Volume 23, Number 4, November 2023
- Gautam Srivastava, Jerry Chun-Wei Lin
, Calton Pu, Yudong Zhang:
Special Section on "Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions". 49:1-49:4 - Xiuwen Fu
, Pasquale Pace
, Gianluca Aloi
, Antonio Guerrieri
, Wenfeng Li
, Giancarlo Fortino
:
Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures. 50:1-50:23 - Yirui Wu
, Hao Cao
, Guoqiang Yang
, Tong Lu
, Shaohua Wan
:
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems. 51:1-51:20 - Lizhen Deng
, Guoxia Xu
, Jiaqi Pi
, Hu Zhu
, Xiaokang Zhou
:
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution. 52:1-52:18 - Jan Pennekamp
, Markus Dahlmanns
, Frederik Fuhrmann
, Timo Heutmann
, Alexander Kreppein
, Dennis Grunert
, Christoph Lange
, Robert H. Schmitt
, Klaus Wehrle
:
Offering Two-way Privacy for Evolved Purchase Inquiries. 53:1-53:32 - Usman Ahmed
, Jerry Chun-Wei Lin
, Gautam Srivastava
:
Exploring the Potential of Cyber Manufacturing System in the Digital Age. 54:1-54:38
- Pei-Cheng Song
, Jeng-Shyang Pan
, Han-Chieh Chao
, Shu-Chuan Chu
:
Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City. 55:1-55:15 - Wenzhao Zhang
, Yi Gao
, Wei Dong
:
Providing Realtime Support for Containerized Edge Services. 56:1-56:25 - Loredana Caruccio
, Gaetano Cimino
, Stefano Cirillo
, Domenico Desiato
, Giuseppe Polese
, Genoveffa Tortora
:
Malicious Account Identification in Social Network Platforms. 57:1-57:25 - Fanyi Yang
, Huifang Ma
, Cairui Yan
, Zhixin Li
, Liang Chang:
Polarized Communities Search via Co-guided Random Walk in Attributed Signed Networks. 58:1-58:22 - Wenhua Xiao
, Xudong Fang
, Bixin Liu
, Ji Wang
, Xiaomin Zhu
:
UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud. 59:1-59:27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.