


default search action
IEEE Transactions on Services Computing, Volume 16
Volume 16, Number 1, January - February 2023
- Rahul Saha
, Gulshan Kumar
, Tannishtha Devgun, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Blockchain Framework in Post-Quantum Decentralization. 1-12 - Víctor Gallego-Fontenla
, Juan Carlos Vidal
, Manuel Lama
:
A Conformance Checking-Based Approach for Sudden Drift Detection in Business Processes. 13-26 - Yuan-Yao Shih
, Ai-Chun Pang
, Tian He, Te-Chuan Chiu
:
A Multi-Market Trading Framework for Low-Latency Service Provision at the Edge of Networks. 27-39 - Mengjie Liu
, Gang Feng
, Yao Sun
, Nan Chen
, Wei Tan:
A Network Function Parallelism-Enabled MEC Framework for Supporting Low-Latency Services. 40-52 - Divya Natolana Ganapathy
, Karuna Pande Joshi
:
A Semantically Rich Framework to Automate Cloud Service Level Agreements. 53-64 - Luca Beurer-Kellner, Jens von Pilgrim, Christos Tsigkanos
, Timo Kehrer
:
A Transformational Approach to Managing Data Model Evolution of Web Services. 65-79 - Aref Karimiafshar
, Massoud Reza Hashemi
, Mohammad Reza Heidarpour
, Adel Nadjaran Toosi
:
An Energy-Conservative Dispatcher for Fog-Enabled IIoT Systems: When Stability and Timeliness Matter. 80-94 - Amândio Balcão Filho, Natasha Ruiz
, Ferrucio de Franco Rosa
, Rodrigo Bonacin
, Mário Jino:
Applying a Consumer-Centric Framework for Trust Assessment of Cloud Computing Service Providers. 95-107 - Sung-Hyun Sim
, Hyerim Bae
, Ling Liu
:
Bagging Recurrent Event Imputation for Repair of Imperfect Event Log With Missing Categorical Events. 108-121 - Xiaojun Zhang
, Chao Huang
, Dawu Gu
, Jingwei Zhang, Huaxiong Wang
:
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems. 122-133 - Shanshan Li
, Chunxiang Xu
, Yuan Zhang
, Yicong Du
, Kefei Chen
:
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage. 134-146 - Yan Ding
, Kenli Li
, Chubo Liu
, Zhuo Tang
, Keqin Li
:
Budget-Constrained Service Allocation Optimization for Mobile Edge Computing. 147-161 - Muhammad Adeel Zahid
, Basit Shafiq
, Jaideep Vaidya
, Ayesha Afzal
, Shafay Shamail
:
Collaborative Business Process Fault Resolution in the Services Cloud. 162-176 - Olayinka Adeleye
, Jian Yu
, Guiling Wang
, Sira Yongchareon
:
Constructing and Evaluating Evolving Web-API Networks - A Complex Network Perspective. 177-190 - Long Luo, Qixuan Jin, Jingzhao Xie, Gang Sun
, Hongfang Yu
:
Cost-Efficient Scheduling of Multicast Transfers With Deadline Guarantees Across Edge Datacenters. 191-205 - Zoltán Ádám Mann, Andreas Metzger
, Johannes Prade, Robert Seidl
, Klaus Pohl
:
Cost-Optimized, Data-Protection-Aware Offloading Between an Edge Data Center and the Cloud. 206-220 - Ensheng Liu
, Liping Zheng
, Qiang He
, Benzhu Xu, Gaofeng Zhang
:
Criticality-Awareness Edge User Allocation for Public Safety. 221-234 - Onur Atan
, Saeed Ghoorchian
, Setareh Maghsudi
, Mihaela van der Schaar:
Data-Driven Online Recommender Systems With Costly Information Acquisition. 235-245 - Prabath Abeysekara, Hai Dong
, A. Kai Qin
:
Data-Driven Trust Prediction in Mobile Edge Computing-Based IoT Systems. 246-260 - Xinchang Zhang
, Yinglong Wang, Guanggang Geng
, Jiguo Yu:
Delay-Optimized Multicast Tree Packing in Software-Defined Networks. 261-275 - Alem Fitwi
, Yu Chen
, Sencun Zhu
:
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling. 276-287 - Pengfei Wu
, Jianting Ning
, Wu Luo, Xinyi Huang
, Debiao He
:
Exploring Dynamic Task Loading in SGX-Based Distributed Computing. 288-301 - Indika Kumara
, Mohamed Hameez Ariz, Mohan Baruwal Chhetri
, Majid Mohammadi, Willem-Jan van den Heuvel, Damian A. Tamburri
:
FOCloud: Feature Model Guided Performance Prediction and Explanation for Deployment Configurable Cloud Applications. 302-314 - Xiao Xue
, Deyu Zhou
, Fangyi Chen, Xiangning Yu, Zhiyong Feng
, Yucong Duan
, Lin Meng
, Mu Zhang
:
From SOA to VOA: A Shift in Understanding the Operation and Evolution of Service Ecosystem. 315-329 - Manqing Dong
, Lina Yao
, Xianzhi Wang
, Boualem Benatallah
, Shuai Zhang
, Quan Z. Sheng
:
Gradient Boosted Neural Decision Forest. 330-342 - Jinyu Tian
, Jiantao Zhou
, Jia Duan
:
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption. 343-355 - William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy
:
Immutable Log Storage as a Service on Private and Public Blockchains. 356-369 - Walayat Hussain
, José M. Merigó
, Honghao Gao
, Asma Musabah Alkalbani
, Fethi A. Rabhi
:
Integrated AHP-IOWA, POWA Framework for Ideal Cloud Provider Selection and Optimum Resource Management. 370-382 - Carlo Combi
, Barbara Oliboni
, Francesca Zerbato
:
Integrated Exploration of Data-Intensive Business Processes. 383-397 - Shihong Hu
, Guanghui Li
, Weisong Shi
:
LARS: A Latency-Aware and Real-Time Scheduling Framework for Edge-Enabled Internet of Vehicles. 398-411 - Guangming Cui
, Qiang He
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment. 412-423 - Christian Cabrera
, Sergej Svorobej
, Andrei Palade
, Aqeel H. Kazmi, Siobhán Clarke
:
MAACO: A Dynamic Service Placement Model for Smart Cities. 424-437 - Mingyue Wang
, Yu Guo
, Chen Zhang
, Cong Wang
, Hejiao Huang
, Xiaohua Jia
:
MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain. 438-451 - Quyuan Wang
, Songtao Guo
, Jiadi Liu
, Chengsheng Pan, Li Yang:
MotiShare: Incentive Mechanisms for Content Providers in Heterogeneous Time-Varying Edge Content Market. 452-465 - Vijay Kumar Yadav
, Nitish Andola
, Shekhar Verma, S. Venkatesan:
P2LBS: Privacy Provisioning in Location-Based Services. 466-477 - Huiying Jin
, Pengcheng Zhang
, Hai Dong
, Yuelong Zhu
, Athman Bouguettaya
:
Privacy-Aware Forecasting of Quality of Service in Mobile Edge Computing. 478-492 - Shenqing Wang
, Chunpeng Ge
, Lu Zhou, Huaqun Wang
, Zhe Liu, Jian Wang:
Privacy-Preserving Classification in Multiple Clouds eHealthcare. 493-503 - Xinghua Li
, Lizhong Bai
, Yinbin Miao
, Siqi Ma, Jianfeng Ma
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing. 504-514 - Patrali Pradhan, Chandana Roy
, Sudip Misra
:
Q-Safe: QoS-Aware Pricing Scheme for Provisioning Safety-as-a-Service. 515-524 - Yinbin Miao
, Wei Zheng
, Xiaohua Jia
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method. 525-536 - Tieqiang Mo
, Renfa Li
, Shan Duan:
Reconciling Earlier Snapshot Time With Local Cache for Optimal Performance Under Transactional Causal Consistency. 537-549 - Feijia He, Liwei Shen
, Xin Peng
:
Resource Choreography in Cyber-Physical-Social Systems: Representation, Modeling and Execution. 550-563 - Md Anwarul Kaium Patwary
, Saurabh Garg
, Sudheer Kumar Battula
, Byeong Kang
:
SDP: Scalable Real-Time Dynamic Graph Partitioner. 564-574 - Somchart Fugkeaw
:
Secure Data Sharing With Efficient Key Update for Industrial Cloud-Based Access Control. 575-587 - Ketki Sane
, Karuna Pande Joshi
, Sudip Mittal
:
Semantically Rich Framework to Automate Cyber Insurance Services. 588-599 - Ting Cai
, Zicong Hong
, Shuo Liu, Wuhui Chen
, Zibin Zheng
, Yang Yu
:
SocialChain: Decoupling Social Data and Applications to Return Your Data Ownership. 600-614 - Shreshth Tuli
, Sukhpal Singh Gill
, Peter Garraghan
, Rajkumar Buyya
, Giuliano Casale
, Nicholas R. Jennings
:
START: Straggler Prediction and Mitigation for Cloud Computing Environments Using Encoder LSTM Networks. 615-627 - Guobing Zou
, Ya Liu
, Zhen Qin
, Jin Chen
, Zhiwei Xu
, Yanglan Gan
, Bofeng Zhang
, Qiang He
:
ST-EUA: Spatio-Temporal Edge User Allocation With Task Decomposition. 628-641 - Haozhe Lin
, Yushun Fan
, Jia Zhang
, Bing Bai
, Zhenghua Xu, Thomas Lukasiewicz:
Toward Knowledge as a Service (KaaS): Predicting Popularity of Knowledge Services Leveraging Graph Neural Networks. 642-655 - Lei Xu
, Xingliang Yuan
, Zhengxiang Zhou
, Cong Wang
, Chungen Xu
:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. 656-669 - Huaijie Zhu
, Wei Liu, Jian Yin, Jianliang Xu
, Wang-Chien Lee
:
Towards Keyword-Based Geo-Social Group Query Services. 670-683 - Shujuan Tian
, Chi Chang
, Saiqin Long
, Sangyoon Oh
, Zhetao Li
, Jun Long:
User Preference-Based Hierarchical Offloading for Collaborative Cloud-Edge Computing. 684-697 - Xinghua Li
, Qiuyun Tong
, Jinwei Zhao
, Yinbin Miao
, Siqi Ma, Jian Weng
, Jianfeng Ma
, Kim-Kwang Raymond Choo
:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. 698-710 - Sasko Ristov
, Stefan Pedratscher
, Thomas Fahringer
:
$xAFCL$xAFCL: Run Scalable Function Choreographies Across Multiple FaaS Systems. 711-723 - Wenhua Xiao
, Cheng Yang, Ji Wang
, Xiaomin Zhu
, Weidong Bao
, Xiaojie Feng, Yu Xie, Wei Cao, Feng Yu, Ling Liu
:
YISHAN: Managing Large-scale Cloud Database Instances via Machine Learning. 724-738 - Efrén Rama-Maneiro
, Juan Carlos Vidal
, Manuel Lama
:
Deep Learning for Predictive Business Process Monitoring: Review and Benchmark. 739-756 - Wattana Viriyasitavat
, Li Da Xu, Gaurav Dhiman
, Assadaporn Sapsomboon
, Vitara Pungpapong
, Zhuming Bi
:
Service Workflow: State-of-the-Art and Future Trends. 757-772
Volume 16, Number 2, March - April 2023
- Xiaohan Hao
, Wei Ren
, Yangyang Fei
, Tianqing Zhu
, Kim-Kwang Raymond Choo
:
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things. 773-786 - Harsha Sandaruwan Gardiyawasam Pussewalage
, Vladimir A. Oleshchuk
:
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud. 787-801 - Di Wu
, Peng Zhang, Yi He, Xin Luo
:
A Double-Space and Double-Norm Ensembled Latent Factor Model for Highly Accurate Web Service QoS Prediction. 802-814 - Luigi De Simone
, Mario Di Mauro
, Roberto Natella
, Fabio Postiglione
:
A Latency-Driven Availability Assessment for Multi-Tenant Service Chains. 815-829 - Weiling Li
, Xin Luo
, Huaqiang Yuan, MengChu Zhou
:
A Momentum-Accelerated Hessian-Vector-Based Latent Factor Analysis Model. 830-844 - Xuejun Li
, Tianxiang Chen
, Dong Yuan
, Jia Xu
, Xiao Liu
:
A Novel Graph-Based Computation Offloading Strategy for Workflow Applications in Mobile Edge Computing. 845-857 - Yuan Liu
, Chuang Zhang, Yu Yan, Xin Zhou
, Zhihong Tian
, Jie Zhang:
A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System. 858-871 - Naela Rizvi
, Dharavath Ramesh
, Lipo Wang
, Annappa Basava
:
A Workflow Scheduling Approach With Modified Fuzzy Adaptive Genetic Algorithm in IaaS Clouds. 872-885 - Zhizhong Liu
, Quan Z. Sheng
, Zhenxing Zhang, Xiaofei Xu, Dianhui Chu
, Jian Yu
, Shuang Wang
:
Accurate and Reliable Service Recommendation Based on Bilateral Perception in Multi-Access Edge Computing. 886-899 - Gulshan Kumar
, Rahul Saha
, Mauro Conti
, Reji Thomas
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. 900-912 - Dan Zhu
, Hui Zhu
, Xiangyu Wang
, Rongxing Lu
, Dengguo Feng:
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images. 913-926 - Xun Shao
, Go Hasegawa
, Mianxiong Dong
, Zhi Liu
, Hiroshi Masui
, Yusheng Ji
:
An Online Orchestration Mechanism for General-Purpose Edge Computing. 927-940 - Shiyong Li, Huan Liu, Wenzhe Li, Wei Sun
:
An Optimization Framework for Migrating and Deploying Multiclass Enterprise Applications Into the Cloud. 941-956 - Qinlong Huang
, Guanyu Yan, Qinglin Wei:
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing. 957-968 - Alessandro Tundo
, Marco Mobilio
, Oliviero Riganelli
, Leonardo Mariani
:
Automated Probe Life-Cycle Management for Monitoring-As-a-Service. 969-982 - Nikolay Ivanov
, Qiben Yan
:
AutoThing: A Secure Transaction Framework for Self-Service Things. 983-995 - Yong Yang
, Long Wang
, Jing Gu, Ying Li
:
Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation. 996-1010 - Lanxiang Chen
, Yujie Xue, Yi Mu
, Lingfang Zeng
, Fatemeh Rezaeibagha
, Robert H. Deng
:
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data. 1011-1022 - Muhammad Zakarya
, Lee Gillam
, Khaled Salah
, Omer F. Rana
, Santosh Tirunagari
, Rajkumar Buyya
:
CoLocateMe: Aggregation-Based, Energy, Performance and Cost Aware VM Placement and Consolidation in Heterogeneous IaaS Clouds. 1023-1038 - Hai Jin
, Ruikun Luo
, Qiang He
, Song Wu
, Zilai Zeng, Xiaoyu Xia
:
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code. 1039-1050 - Deng Zhao
, Zhangbing Zhou
, Patrick C. K. Hung
, Shuiguang Deng
, Xiao Xue
, Walid Gaaloul
:
CTL-Based Adaptive Service Composition in Edge Networks. 1051-1065 - Guanghui Zhang
, Jie Zhang
, Ke Liu
, Jing Guo, Jack Y. B. Lee
, Haibo Hu
, Vaneet Aggarwal
:
DUASVS: A Mobile Data Saving Strategy in Short-Form Video Streaming. 1066-1078 - Kyungtae Lee
, Jinhwi Kim, Jeongho Kwak
, Yeongjin Kim
:
Dynamic Multi-Resource Optimization for Storage Acceleration in Cloud Storage Systems. 1079-1092 - Sijie Huang, He Huang
, Guoju Gao
, Yu-E Sun
, Yang Du
, Jie Wu
:
Edge Resource Pricing and Scheduling for Blockchain: A Stackelberg Game Approach. 1093-1106 - Ramin Ganjavi
, Ahmad R. Sharafat
:
Edge-Assisted Public Key Homomorphic Encryption for Preserving Privacy in Mobile Crowdsensing. 1107-1117 - Jiong Lou
, Hao Luo
, Zhiqing Tang
, Weijia Jia
, Wei Zhao
:
Efficient Container Assignment and Layer Sequencing in Edge Computing. 1118-1131 - Chen Wang
, Mengting Yuan, Rui Zhang
, Kai Peng
, Ling Liu
:
Efficient Point-of-Interest Recommendation Services With Heterogenous Hypergraph Embedding. 1132-1143 - Samira Chouikhi
, Moez Esseghir
, Leïla Merghem-Boulahia:
Energy Consumption Scheduling as a Fog Computing Service in Smart Grid. 1144-1157 - Rongping Lin
, Liu He, Shan Luo
, Moshe Zukerman
:
Energy-Aware Service Function Chaining Embedding in NFV Networks. 1158-1171 - Joanna Kosinska
, Krzysztof Zielinski
:
Experimental Evaluation of Rule-Based Autonomic Computing Management Framework for Cloud-Native Applications. 1172-1183 - Binbin Feng
, Zhijun Ding
, Changjun Jiang
:
FAST: A Forecasting Model With Adaptive Sliding Window and Time Locality Integration for Dynamic Cloud Workloads. 1184-1197 - Junte Ma
, Sihao Xie
, Jin Zhao
:
Flexible Offloading of Service Function Chains to Programmable Switches. 1198-1211 - Zhixiang He
, Chi-Yin Chow
, Jia-Dong Zhang
, Kam-Yiu Lam
:
H3Rec: Higher-Order Heterogeneous and Homogeneous Interaction Modeling for Group Recommendations of Web Services. 1212-1224 - Amin Mohajer
, Mahya Sam Daliri
, Abbas Mirzaei
, Amir Ziaeddini
, Mohammad Nabipour, Maryam Bavaghar:
Heterogeneous Computational Resource Allocation for NOMA: Toward Green Mobile Edge-Computing Systems. 1225-1238 - Ying Wang
, Naling Li
, Peng Yu
, Wenjing Li
, Xuesong Qiu
, Shangguang Wang
, Mohamed Cheriet
:
Intelligent and Collaborative Orchestration of Network Slices. 1239-1253 - Haolin Liu
, Xiaoling Long, Zhetao Li
, Saiqin Long, Rong Ran
, Hui-Ming Wang
:
Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing. 1254-1267 - Mohammed Bahutair
, Athman Bouguettaya
, Azadeh Ghari Neiat
:
Multi-Use Trust in Crowdsourced IoT Services. 1268-1281 - Tengfei Yang
, Jianfeng Ma
, Yinbin Miao
, Yue Wang
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Bin Xiao
:
MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting. 1282-1295 - Yongyi Ran
, Xin Zhou, Han Hu
, Yonggang Wen
:
Optimizing Data Center Energy Efficiency via Event-Driven Deep Reinforcement Learning. 1296-1309 - Yongyi Ran
, Han Hu
, Yonggang Wen
, Xin Zhou
:
Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning. 1310-1323 - Liping Zhang
, Yue Zhu
, Wei Ren
, Yixin Zhang, Kim-Kwang Raymond Choo
:
Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems. 1324-1333 - Dante D. Sánchez-Gallegos
, José Luis González
, Jesús Carretero
, Heidy Marisol Marín-Castro, Andrei Tchernykh
, Raffaele Montella
:
PuzzleMesh: A Puzzle Model to Build Mesh of Agnostic Services for Edge-Fog-Cloud. 1334-1345 - Patryk Osypanka
, Piotr Nawrocki
:
QoS-Aware Cloud Resource Prediction for Computing Services. 1346-1357 - Amanjot Kaur, Nitin Auluck
, Omer F. Rana
:
Real-Time Scheduling on Hierarchical Heterogeneous Fog Networks. 1358-1372 - Anurag Satpathy
, Manmath Narayan Sahoo
, Lucky Behera, Chittaranjan Swain
:
ReMatch: An Efficient Virtual Data Center Re-Matching Strategy Based on Matching Theory. 1373-1386 - Yongqian Sun
, Daguo Cheng, Pengxiang Jin, Quan Ding, Shenglin Zhang
, Xu Chen
, Yuzhi Zhang
, Minghan Liang, Dan Pei
, Jianyan Zheng, Sen Luo, Xinyu Tang:
Robust Anomaly Clue Localization of Multi-Dimensional Derived Measure for Online Video Services. 1387-1401 - Kanika Sharma
, Bernard Butler
, Brendan Jennings
:
Scaling and Placing Distributed Services on Vehicle Clusters in Urban Environments. 1402-1416 - Jing Li
, Weifa Liang
, Wenzheng Xu
, Zichuan Xu
, Yuchen Li
, Xiaohua Jia
:
Service Home Identification of Multiple-Source IoT Applications in Edge Computing. 1417-1430 - Dongyang Zhan
, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang
, Lin Ye
:
Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation. 1431-1443 - Yang Yang
, Chunming Rong
, Xianghan Zheng, Hongju Cheng
, Victor Chang
, Xiangyang Luo
, Zuoyong Li
:
Time Controlled Expressive Predicate Query With Accountable Anonymity. 1444-1457 - Emre Yigitoglu, Mehmet Emre Gursoy
, Ling Liu
:
Utility-Aware and Privacy-Preserving Mobile Query Services. 1458-1472 - Qinkai Wang
, Ye Tian
, Xin Yu, Lan Ding, Xinming Zhang
:
Where is the Traffic Going? A Comparative Study of Clouds Following Different Designs. 1473-1484 - Firas Al-Doghman
, Nour Moustafa
, Ibrahim Khalil
, Nasrin Sohrabi, Zahir Tari
, Albert Y. Zomaya
:
AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges. 1485-1504 - Mostafa Haghi Kashani
, Ebrahim Mahdipour
:
Load Balancing Algorithms in Fog Computing. 1505-1521 - Yongkang Li
, Yanying Lin
, Yang Wang
, Kejiang Ye
, Cheng-Zhong Xu
:
Serverless Computing: State-of-the-Art, Challenges and Opportunities. 1522-1539
Volume 16, Number 3, May - June 2023
- Qing Huang
, Zhiqiang Yuan, Zhenchang Xing
, Zhengkang Zuo
, Changjing Wang, Xin Xia
:
1+1>2: Programming Know-What and Know-How Knowledge Fusion, Semantic Enrichment and Coherent Application. 1540-1554 - Md Geaur Rahman
, Md Zahidul Islam
:
A Framework for Supervised Heterogeneous Transfer Learning Using Dynamic Distribution Adaptation and Manifold Regularization. 1555-1571 - Haoran Qiu
, Tao Ji, Shixiong Zhao
, Xusheng Chen, Ji Qi, Heming Cui
, Sen Wang:
A Geography-Based P2P Overlay Network for Fast and Robust Blockchain Systems. 1572-1588 - Xiao Wang
, Hanchuan Xu
, Xianzhi Wang
, Xiaofei Xu, Zhongjie Wang
:
A Graph Neural Network and Pointer Network-Based Approach for QoS-Aware Service Composition. 1589-1603 - Deepika Saxena
, Ashutosh Kumar Singh
:
A High Availability Management Model Based on VM Significance Ranking and Resource Estimation for Cloud Applications. 1604-1615 - Md. Mainul Islam, Md. Kamrul Islam, Md. Shahjalal, Mostafa Zaman Chowdhury, Yeong Min Jang:
A Low-Cost Cross-Border Payment System Based on Auditable Cryptocurrency With Consortium Blockchain: Joint Digital Currency. 1616-1629 - Federica Filippini
, Marco Lattuada
, Michele Ciavotta
, Arezoo Jahani, Danilo Ardagna
, Edoardo Amaldi:
A Path Relinking Method for the Joint Online Scheduling and Capacity Allocation of DL Training Workloads in GPU as a Service Systems. 1630-1646 - Nazatul Haque Sultan
, Vijay Varadharajan, Lan Zhou, Ferdous Ahmed Barbhuiya
:
A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context. 1647-1661 - Leixiao Cheng
, Fei Meng
:
An Improvement on "CryptCloud$^{+}$+: Secure and Expressive Data Access Control for Cloud Storage". 1662-1663 - Fatemeh Rezaeibagha
, Yi Mu
, Ke Huang
, Lanxiang Chen
, Leyou Zhang
:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT. 1664-1672 - Keke Gai
, Yue Zhang
, Meikang Qiu
, Bhavani Thuraisingham:
Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin. 1673-1685 - Mengqi Zhan
, Yang Li
, Huiran Yang, Guangxi Yu, Bo Li
, Weiping Wang:
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers. 1686-1697 - Ana Claudia Bastos Loureiro Monção, Sand Luz Correa
, Aline Carneiro Viana
, Kleber Vieira Cardoso
:
Combining Resource-Aware Recommendation and Caching in the Era of MEC for Improving the Experience of Video Streaming Users. 1698-1712 - Lei Wang
, Jiyuan Liu, Qiang He
:
Concept Drift-Based Checkpoint-Restart for Edge Services Rejuvenation. 1713-1725 - Mohammad-Mohsen Aseman-Manzar
, Soroush Karimian Aliabadi
, Reza Entezari-Maleki
, Bernhard Egger
, Ali Movaghar
:
Cost-Aware Resource Recommendation for DAG-Based Big Data Workflows: An Apache Spark Case Study. 1726-1737 - Moirangthem Biken Singh
, Navneet Taunk, Naveen Kumar Mall, Ajay Pratap
:
Criticality and Utility-Aware Fog Computing System for Remote Health Monitoring. 1738-1749 - Jingwen Zhou
, Feifei Chen
, Qiang He
, Xiaoyu Xia
, Rui Wang
, Yong Xiang
:
Data Caching Optimization With Fairness in Mobile Edge Computing. 1750-1762 - Changhee Hahn
, Junbeom Hur
:
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query. 1763-1777 - Pei Ren
, Ling Liu
, Xiuquan Qiao
, Junliang Chen:
Distributed Edge System Orchestration for Web-Based Mobile Augmented Reality Services. 1778-1792 - Yongqiang Gao
, Lin Wang, Zhulong Xie, Zhengwei Qi, Jiantao Zhou:
Energy- and Quality of Experience-Aware Dynamic Resource Allocation for Massively Multiplayer Online Games in Heterogeneous Cloud Computing Systems. 1793-1806 - Zai-Xing Sun
, Boyu Zhang, Chonglin Gu
, Ruitao Xie
, Bin Qian
, Hejiao Huang
:
ET2FA: A Hybrid Heuristic Algorithm for Deadline-Constrained Workflow Scheduling in Cloud. 1807-1821 - Zigui Jiang
, Zibin Zheng
, Kai Chen, Xiapu Luo, Xiuwen Tang, Yin Li:
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development. 1822-1832 - Rik Eshuis
:
Extracting Reusable Fragments From Data-Centric Process Variants. 1833-1845 - Guangshun Yao
, Xiaoping Li
, Qian Ren
, Rubén Ruiz
:
Failure-Aware Elastic Cloud Workflow Scheduling. 1846-1859 - Xiangli Xiao
, Yushu Zhang
, Xuewen Dong
, Liangmin Wang
, Yong Xiang
, Xiaochun Cao:
Fair Outsourcing Paid in Fiat Money Using Blockchain. 1860-1873 - Md. Palash Uddin
, Yong Xiang
, Xuequan Lu
, John Yearwood, Longxiang Gao
:
Federated Learning via Disentangled Information Bottleneck. 1874-1889 - Wenbo Xu
, Peiyi Han
, Shaoming Duan, Chuanyi Liu
:
FIGAT: Accurately Classify Individual Crime Risks With Multi-Information Fusion. 1890-1903 - Chih-Lin Hu
, Kun-Yu Lin
, Carl K. Chang
:
Incentive Mechanism for Mobile Crowdsensing With Two-Stage Stackelberg Game. 1904-1918 - Balsam Alkouz
, Amani Abusafia
, Abdallah Lakhdari, Athman Bouguettaya
:
In-Flight Energy-Driven Composition of Drone Swarm Services. 1919-1933 - Yanjun Shu
, Jianhang Zhang, Wei Emma Zhang
, Decheng Zuo
, Quan Z. Sheng
:
IQSrec: An Efficient and Diversified Skyline Services Recommendation on Incomplete QoS. 1934-1948 - Wei Jiang
, Daquan Feng
, Yao Sun
, Gang Feng
, Zhenzhong Wang
, Xiang-Gen Xia
:
Joint Computation Offloading and Resource Allocation for D2D-Assisted Mobile Edge Computing. 1949-1963 - Zhaoyang Han
, Chunpeng Ge
, Bingzhe Wu
, Zhe Liu
:
Lightweight Privacy-Preserving Federated Incremental Decision Trees. 1964-1975 - Zeyu Qin, Haipeng Yao
, Tianle Mai
, Di Wu, Ni Zhang, Song Guo
:
Multi-Agent Reinforcement Learning Aided Computation Offloading in Aerial Computing for the Internet-of-Things. 1976-1986 - Nafe Moradkhani
, Frédérick Bénaben, Benoît Montreuil
, Matthieu Lauras
, Julien Jeany, Louis Faugère
:
Multi-Criteria Performance Analysis Based on Physics of Decision - Application to COVID-19 and Future Pandemics. 1987-1998 - Marco Anisetti
, Claudio Agostino Ardagna
, Nicola Bena
:
Multi-Dimensional Certification of Modern Distributed Systems. 1999-2012 - Roaa Elghondakly
, Sherin M. Moussa
, Nagwa L. Badr:
Mutual Information-Based Modeling for Services Dependency. 2013-2029 - Guobing Zou
, Shaogang Wu, Shengxiang Hu
, Chenhong Cao
, Yanglan Gan
, Bofeng Zhang
, Yixin Chen
:
NCRL: Neighborhood-Based Collaborative Residual Learning for Adaptive QoS Prediction. 2030-2043 - Jine Tang
, Taishan Qin, Yong Xiang
, Zhangbing Zhou
, Junhua Gu
:
Optimization Search Strategy for Task Offloading From Collaborative Edge Computing. 2044-2058 - Jing Liu
, Liang Feng Zhang
:
Privacy-Preserving and Publicly Verifiable Matrix Multiplication. 2059-2071 - Guoqiang Deng
, Min Tang
, Yuxing Xi
, Mingwu Zhang
:
Privacy-Preserving Online Medical Prediagnosis Training Model Based on Soft-Margin SVM. 2072-2084 - Chenkai Guo
, Weijie Zhang
, Naipeng Dong
, Zheli Liu
, Yang Xiang
:
QoS-Aware Diversified Service Selection. 2085-2099 - Shunrong Jiang
, Jianqing Liu
, Jingwei Chen, Yiliang Liu
, Liangmin Wang
, Yong Zhou
:
Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data. 2100-2113 - Xiaoqin Feng
, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks. 2114-2125 - Chen Hou
:
Request Control of Web Service-Based Sampling System With Multiple Smart Sensors. 2126-2138 - Nasrin Sohrabi
, Zahir Tari
, Gauthier Voron
, Vincent Gramoli
, Qiang Fu
:
SAZyzz: Scaling AZyzzyva to Meet Blockchain Requirements. 2139-2152 - Keqin Li
:
Scheduling Precedence Constrained Tasks for Mobile Applications in Fog Computing. 2153-2164 - Qinlong Huang
, Chao Wang, Lixuan Chen:
Secure and Fine-Grained Flow Control for Subscription-Based Data Services in Cloud-Edge Computing. 2165-2177 - Yu Li
, Jianting Ning
, Jie Chen
:
Secure and Practical Wildcard Searchable Encryption System Based on Inner Product. 2178-2190 - Qingyuan Xie
, Chen Zhang
, Xiaohua Jia
:
Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems. 2191-2202 - Mays F. Al-Naday
, Nikolaos Thomos
, Jiejun Hu
, Bruno Volckaert
, Filip De Turck
, Martin J. Reed
:
Service-Based, Multi-Provider, Fog Ecosystem With Joint Optimization of Request Mapping and Response Routing. 2203-2214 - Ke Ma
, Geng Yang
:
TBAC: A Fine-Grained Topic-Based Access Control Model for Text Data. 2215-2228 - Chunyu Wei
, Yushun Fan, Jia Zhang
:
Time-Aware Service Recommendation With Social-Powered Graph Hierarchical Attention Network. 2229-2240 - Nafiseh Sharghivand
, Lena Mashayekhy
, Weibin Ma, Schahram Dustdar
:
Time-Constrained Service Handoff for Mobile Edge Computing in 5G. 2241-2253 - Dong Lu
, Yanlong Zhai
, Jun Shen
, Mahdi Fahmideh
, Jianqing Wu
, Jude Tchaye-Kondi
, Liehuang Zhu
:
TreeNet Based Fast Task Decomposition for Resource-Constrained Edge Intelligence. 2254-2266 - Qi Zhang
, Yingjie Wang
, Guisheng Yin
, Xiangrong Tong
, Akshita Maradapu Vera Venkata Sai
, Zhipeng Cai
:
Two-Stage Bilateral Online Priority Assignment in Spatio-Temporal Crowdsourcing. 2267-2282 - Daejin Kim
, Hyegyeong Park
, Dusit Niyato
, Jun Kyun Choi
:
Worker Assignment for Multiple Masters to Speed Up Coded Distributed Computing in Heterogeneous Clusters. 2283-2298 - Wattana Viriyasitavat
, Li Da Xu
, Gaurav Dhiman
, Zhuming Bi
:
Blockchain-as-a-Service for Business Process Management: Survey and Challenges. 2299-2314
Volume 16, Number 4, July - August 2023
- Xiaohu Chen, Anjia Yang
, Jian Weng
, Yao Tong, Cheng Huang
, Tao Li
:
A Blockchain-Based Copyright Protection Scheme With Proactive Defense. 2316-2329 - Björn Rafn Gunnarsson
, Seppe vanden Broucke
, Jochen De Weerdt
:
A Direct Data Aware LSTM Neural Network Architecture for Complete Remaining Trace and Runtime Prediction. 2330-2342 - Yao Zhao
, Youyang Qu
, Yong Xiang
, Yushu Zhang
, Longxiang Gao
:
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT. 2343-2358 - Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. 2359-2371 - Md. Mainul Islam
, Hoh Peter In
:
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs. 2372-2386 - Yang Yang
, Ming Cheng
, Yingqiu Ding
, Weiming Zhang
:
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding. 2387-2401 - Yun Li, Shi-Jie Jian
, Sun-Yuan Hsieh
, Wei-Kang Chung, Albert Y. Zomaya
:
A Weighted Optimal Scheduling Scheme for Congestion Control in Cloud Data Center Networks. 2402-2410 - Hossein Shirazi
, Shashika Ranga Muramudalige
, Indrakshi Ray
, Anura P. Jayasumana
, Haonan Wang:
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms. 2411-2422 - Nanxi Chen
, Qi Sun, Yanbei Li, Hongfeng Shu, Jiamao Li
, Xiaolin Zhang
:
Agile Services Provisioning for Learning-Based Applications in Fog Computing Networks. 2423-2436 - Zhe Sun
, Peng Zhao
, Chunping Wang, Xiaoli Zhang
, Hongbing Cheng
:
An Efficient and Secure Trading Framework for Shared Charging Service Based on Multiple Consortium Blockchains. 2437-2450 - Divija Swetha Gadiraju, V. Lalitha
, Vaneet Aggarwal
:
An Optimization Framework Based on Deep Reinforcement Learning Approaches for Prism Blockchain. 2451-2461 - Sarhad Arisdakessian, Omar Abdel Wahab
, Azzam Mourad
, Hadi Otrok
:
Coalitional Federated Learning: Improving Communication and Training on Non-IID Data With Selfish Clients. 2462-2476 - Hanrui Wu
, Chung Wang Wong, Jia Zhang
, Yuguang Yan
, Dahai Yu
, Jinyi Long
, Michael K. Ng
:
Cold-Start Next-Item Recommendation by User-Item Matching and Auto-Encoders. 2477-2489 - Xiaoquan Zhang
, Lin Cui
, Fung Po Tso
, Weijia Jia
:
Compiling Service Function Chains via Fine-Grained Composition in the Programmable Data Plane. 2490-2502 - Dayoung Lee
, Younghyun Kim
, Minseok Song
:
Cost-Effective, Quality-Oriented Transcoding of Live-Streamed Video on Edge-Servers. 2503-2516 - Hao Dai
, Jiashu Wu
, Yang Wang
, Jerome Yen, Yong Zhang
, Cheng-Zhong Xu
:
Cost-Efficient Sharing Algorithms for DNN Model Serving in Mobile Edge Networks. 2517-2531 - Xiaoquan Zhang
, Lin Cui
, Fung Po Tso
, Zhetao Li
, Weijia Jia
:
Dapper: Deploying Service Function Chains in the Programmable Data Plane Via Deep Reinforcement Learning. 2532-2544 - Satish Kumar
, Tao Chen, Rami Bahsoon
, Rajkumar Buyya
:
DebtCom: Technical Debt-Aware Service Recomposition in SaaS Cloud. 2545-2558 - Samaikya Valluripally
, Benjamin Frailey, Brady Kruse, Boonakij Palipatana, Roland Oruche
, Aniket Gulhane, Khaza Anuarul Hoque
, Prasad Calyam
:
Detection of Security and Privacy Attacks Disrupting User Immersive Experience in Virtual Reality Learning Environments. 2559-2574 - Anwar Ghammam
, Thiago do Nascimento Ferreira, Wajdi Aljedaani, Marouane Kessentini
, Ali Husain:
Dynamic Software Containers Workload Balancing via Many-Objective Search. 2575-2591 - Mingyi Liu
, Zhiying Tu
, Hanchuan Xu
, Xiaofei Xu, Zhongjie Wang
:
DySR: A Dynamic Graph Neural Network Based Service Bundle Recommendation Model for Mashup Creation. 2592-2605 - Prabath Abeysekara, Hai Dong
, A. Kai Qin
:
Edge Intelligence for Real-Time IoT Service Trust Prediction. 2606-2619 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Songnian Zhang
, Jun Shao
, Fengwei Wang
, Hui Zhu
:
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query. 2620-2631 - Hai Huang
, Luyao Wang:
Efficient Privacy-Preserving Face Identification Protocol. 2632-2641 - Cong Thanh Nguyen
, Dinh Thai Hoang
, Diep N. Nguyen
, Yong Xiao
, Hoang-Anh Pham
, Eryk Dutkiewicz
, Nguyen Huynh Tuong
:
FedChain: Secure Proof-of-Stake-Based Framework for Federated-Blockchain Systems. 2642-2656 - Meng Xu
, Yi Mei
, Shiqiang Zhu
, Beibei Zhang
, Tian Xiang
, Fangfang Zhang
, Mengjie Zhang
:
Genetic Programming for Dynamic Workflow Scheduling in Fog Computing. 2657-2671 - Zhenhua Chen
, Jingjing Nie
, Li Zhan-Li, Willy Susilo
, Chunpeng Ge
:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. 2672-2684 - Yuxiang Liu
, Bo Yang
, Yu Wu
, Cailian Chen
, Xinping Guan
:
How to Share: Balancing Layer and Chain Sharing in Industrial Microservice Deployment. 2685-2698 - Di Wu
, Bo Sun, Mingsheng Shang
:
Hyperparameter Learning for Deep Learning-Based Recommender Systems. 2699-2712 - Xiaoming Yu
, Wenjun Wu, Yangzhou Wang:
Integrating Cognition Cost With Reliability QoS for Dynamic Workflow Scheduling Using Reinforcement Learning. 2713-2726 - Dongjin Yu
, Tong Wu
, Chengfei Liu
, Dongjing Wang
:
Joint Content Caching and Recommendation in Opportunistic Mobile Networks Through Deep Reinforcement Learning and Broad Learning. 2727-2741 - Thomas Weripuo Gyeera
, Anthony J. H. Simons
, Mike Stannett
:
Kalman Filter Based Prediction and Forecasting of Cloud Server KPIs. 2742-2754 - Chunyan Sang
, Xinyan Deng
, Shigen Liao
:
Mashup-Oriented Web API Recommendation Via Full-Text Semantic Mining of Developer Requirements. 2755-2768 - Jing Bai
, Xiaolin Chang
, Fumio Machida
, Kishor S. Trivedi
, Yaru Li:
Model-Driven Dependability Assessment of Microservice Chains in MEC-Enabled IoT. 2769-2785 - Ruyu Yan
, Haozhe Lin
, Yushun Fan
, Jia Zhang
, Bing Bai
:
Multi-Modal Reciprocal Spatiotemporal Framework for Predicting Usage Trend of Knowledge Services. 2786-2799 - Chunming Zhang
, Fengji Luo
, Gianluca Ranzi
:
Multistage Game Theoretical Approach for Ransomware Attack and Defense. 2800-2811 - Cedric Parfait Kankeu Fotsing
, Chih-Ya Shen
, Liang-Hao Huang, Yi-Shin Chen, Wang-Chien Lee
, De-Nian Yang
:
On Efficient Processing of Queries for Live Multi-Streaming Soiree Organization. 2812-2826 - Jiajun Yao
, Lei Yang
, Xiaohua Xu
:
Online Dependent Task Assignment in Preference Aware Spatial Crowdsourcing. 2827-2840 - Alexandros-Ioannis Manolopoulos
, Markos P. Anastasopoulos
, Victoria-Maria Alevizaki
, Anna Tzanakaki:
Optimal Service Provisioning in Mobile 5G and Beyond Systems. 2841-2854 - Hui Yin
, Yangfan Li
, Hua Deng, Wei Zhang
, Zheng Qin
, Keqin Li
:
Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data. 2855-2867 - Liang Zhang
, Haibin Kan
, Yihao Wang
:
Privacy-Preserving AGV Collision-Resistance at the Edge Using Location-Based Encryption. 2868-2878 - Yuanyuan Gao, Lei Zhang, Lulu Wang
, Kim-Kwang Raymond Choo
, Rui Zhang:
Privacy-Preserving and Reliable Decentralized Federated Learning. 2879-2891 - Yuejing Yan
, Yanyan Xu
, Zhiheng Wang, Xue Ouyang
, Bo Zhang, Zheheng Rao
:
Privacy-Preserving Multi-Source Image Retrieval in Edge Computing. 2892-2907 - Amit Biswas
, Ravi Yadav
, Gaurav Baranwal
, Anil Kumar Tripathi
:
Proof of Karma (PoK): A Novel Consensus Mechanism for Consortium Blockchain. 2908-2922 - Songlei Wang
, Yifeng Zheng
, Xiaohua Jia
:
SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service. 2923-2938 - Jingwei Wang
, Xinchun Yin
, Jianting Ning
, Shengmin Xu
, Guowen Xu
, Xinyi Huang:
Secure Updatable Storage Access Control System for EHRs in the Cloud. 2939-2953 - Sithu Kaung Set
, Gi Seok Park
:
Service-Aware Dynamic Sharding Approach for Scalable Blockchain. 2954-2969 - Vincenzo Pasquadibisceglie
, Annalisa Appice
, Giovanna Castellano
, Nicola Fiorentino, Donato Malerba
:
STARDUST: A Novel Process Mining Approach to Discover Evolving Models From Trace Streams. 2970-2984 - Kexin Li
, Xingwei Wang
, Qiang He
, Mingzhou Yang, Min Huang
, Schahram Dustdar
:
Task Computation Offloading for Multi-Access Edge Computing via Attention Communication Deep Reinforcement Learning. 2985-2999 - Hang Xu, Ching-Fang Hsu
, Lein Harn
, Jianqun Cui
, Zhuo Zhao
, Ze Zhang:
Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things. 3000-3013 - Mohan Baruwal Chhetri
, Abdur Rahim Mohammad Forkan
, Quoc Bao Vo
, Surya Nepal
, Ryszard Kowalczyk
:
Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources. 3014-3026 - Fanghui Bi, Tiantian He
, Yuetong Xie, Xin Luo
:
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis. 3027-3042 - Maggi Bansal
, Inderveer Chana, Siobhán Clarke
:
UrbanEnQoSPlace: A Deep Reinforcement Learning Model for Service Placement of Real-Time Smart City IoT Applications. 3043-3060 - Jian Cao
, Naixuan Wang, Shiyou Qian
, Wei Guan
:
When to Invoke a Prediction Service for Business Process Monitoring? 3061-3074 - Mohammad Javad Nadjafi-Arani
, Saeed Doostali
, Mohamed F. Younis
:
Workflow Scheduling With Guaranteed Responsiveness and Minimal Cost. 3075-3087
Volume 16, Number 5, September - October 2023
- Hoda Taheri
, Saeid Abrishami
, Mahmoud Naghibzadeh
:
A Cloud Broker for Executing Deadline-Constrained Periodic Scientific Workflows. 3089-3100 - Jiangjiang Zhang
, Bei Gong
, Muhammad Waqas
, Shanshan Tu
, Zhu Han
:
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks. 3101-3114 - Song Deng
, Yujia Zhai
, Di Wu
, Dong Yue
, Xiong Fu
, Yi He
:
A Lightweight Dynamic Storage Algorithm With Adaptive Encoding for Energy Internet. 3115-3128 - Gabriele Proietti Mattia
, Antonio Pietrabissa
, Roberto Beraldi
:
A Load Balancing Algorithm for Equalising Latency Across Fog or Edge Computing Nodes. 3129-3140 - Lalit Purohit
, Santosh Singh Rathore
, Sandeep Kumar
:
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection. 3141-3154 - Hiren Dutta
, Saurabh Nagesh
, Jawahar Talluri
, Parama Bhaumik
:
A Solution to Blockchain Smart Contract Based Parametric Transport and Logistics Insurance. 3155-3167 - Weiwen Zhang
, Jinzhou Luo
, Lei Chen
, Jianqi Liu:
A Trajectory Prediction-Based and Dependency-Aware Container Migration for Mobile Edge Computing. 3168-3181 - Jiani Li
, Tao Wang
, Bo Yang
, Qiliang Yang
, Wenzheng Zhang
, Keyong Hong
:
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving. 3182-3195 - Davi Monteiro Barbosa
, Yijun Yu
, Andrea Zisman
, Bashar Nuseibeh
:
Adaptive Observability for Forensic-Ready Microservice Systems. 3196-3209 - Suhui Liu
, Liquan Chen
, Ge Wu
, Huaqun Wang
, Hongtao Yu
:
Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records. 3210-3223 - Siyu Yu
, Pinjia He
, Ningjiang Chen
, Yifan Wu
:
Brain: Log Parsing With Bidirectional Parallel Tree. 3224-3237 - Marius Popa, Sebastian Michael Stoklossa, Somnath Mazumdar
:
ChainDiscipline - Towards a Blockchain-IoT-Based Self-Sovereign Identity Management Framework. 3238-3251 - Xiaoxu Ren
, Chao Qiu
, Zheyuan Chen
, Xiaofei Wang
, Dusit Niyato
, Wenyu Wang:
CompCube: A Space-Time-Request Resource Trading Framework for Edge-Cloud Service Market. 3252-3264 - Cheng-Wei Ching
, Jia-Ming Chang
, Jian-Jhih Kuo
, Chih-Yu Wang
:
Dual-Objective Personalized Federated Service System With Partially-Labeled Data Over Wireless Networks. 3265-3279 - Lu Yin
, Jin Sun
, Junlong Zhou
, Zonghua Gu
, Keqin Li
:
ECFA: An Efficient Convergent Firefly Algorithm for Solving Task Scheduling Problems in Cloud-Edge Computing. 3280-3293 - Chao Lin
, Xinyi Huang
, Debiao He
:
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation. 3294-3304 - Swasti Khurana
, Novarun Deb
, Sajib Mistry
, Aditya Ghose
, Aneesh Krishna
, Hoa Khanh Dam
:
Egalitarian Transient Service Composition in Crowdsourced IoT Environment. 3305-3317 - Peng Jiang
, Fuchun Guo
, Willy Susilo
, Chao Lin
, Jiaxi Hu, Zhen Zhao
, Liehuang Zhu
, Debiao He
:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. 3318-3331 - Guangba Yu
, Pengfei Chen
, Zibin Zheng
, Jingrun Zhang
, Xiaoyun Li
, Zilong He
:
FaaSDeliver: Cost-Efficient and QoS-Aware Function Delivery in Computing Continuum. 3332-3347 - Qinlong Huang
, Qinglin Wei, Guanyu Yan, Lin Zou, Yixian Yang
:
Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services. 3348-3360 - Jiang Bian
, Jizhou Huang
, Shilei Ji
, Yuan Liao
, Xuhong Li
, Qingzhong Wang
, Jingbo Zhou
, Dejing Dou
, Yaqing Wang
, Haoyi Xiong
:
Feynman: Federated Learning-Based Advertising for Ecosystems-Oriented Mobile Apps Recommendation. 3361-3372 - Dan Tang
, Siyuan Wang
, Boru Liu
, Wenqiang Jin
, Jiliang Zhang
:
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN. 3373-3384 - Sourav Kanti Addya
, Anurag Satpathy
, Bishakh Chandra Ghosh
, Sandip Chakraborty
, Soumya K. Ghosh
, Sajal K. Das
:
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets. 3385-3396 - Minghui Liwang
, Zhibin Gao
, Seyyedali Hosseinalipour
, Yuhan Su
, Xianbin Wang
, Huaiyu Dai
:
Graph-Represented Computation-Intensive Task Scheduling Over Air-Ground Integrated Vehicular Networks. 3397-3411 - Wei Guan
, Jian Cao
, Yang Gu
, Shiyou Qian
:
GRASPED: A GRU-AE Network Based Multi-Perspective Business Process Anomaly Detection Model. 3412-3424 - Teng Li
, Jiawei Zhang
, Yulong Shen
, Jianfeng Ma
:
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things. 3425-3438 - Yao-Chun Yang
, Chiao-Ting Chen
, Tzu-Yu Lu
, Szu-Hao Huang
:
Hierarchical Reinforcement Learning for Conversational Recommendation With Knowledge Graph Reasoning and Heterogeneous Questions. 3439-3452 - Wei Tang
, Haifeng Sun
, Jingyu Wang
, Cong Liu, Qi Qi
, Jing Wang, Jianxin Liao
:
Identifying Users Across Social Media Networks for Interpretable Fine-Grained Neighborhood Matching by Adaptive GAT. 3453-3466 - Zhixuan Jia
, Yushun Fan
, Jia Zhang
, Chunyu Wei
, Ruyu Yan
, Xing Wu
:
Improving Next Location Recommendation Services With Spatial-Temporal Multi-Group Contrastive Learning. 3467-3478 - Tong Xiao
, Zhe Quan
, Zhi-Jie Wang
, Yuquan Le
, Yunfei Du
, Xiangke Liao
, Kenli Li
, Keqin Li
:
Loader: A Log Anomaly Detector Based on Transformer. 3479-3492 - Yicheng Sui
, Yuzhe Zhang, Jianjun Sun, Ting Xu
, Shenglin Zhang, Zhengdan Li, Yongqian Sun
, Fangrui Guo, Junyu Shen, Yuzhi Zhang, Dan Pei, Xiao Yang, Li Yu:
LogKG: Log Failure Diagnosis Through Knowledge Graph. 3493-3507 - Imam Mustafa Kamal
, Hyerim Bae
, Ling Liu
:
Metric Learning as a Service With Covariance Embedding. 3508-3522 - Amit Samanta
, Quoc-Viet Pham
, Nhu-Ngoc Dao
, Ammar Muthanna
, Sungrae Cho
:
mISO: Incentivizing Demand-Agnostic Microservices for Edge-Enabled IoT Networks. 3523-3536 - Yuanyuan Fu
, Kun Liang, Jian Xu
:
MLog: Mogrifier LSTM-Based Log Anomaly Detection Approach Using Semantic Representation. 3537-3549 - Chuang Li
, Aoli He
, Yanhua Wen
, Gang Liu
, Anthony Theodore Chronopoulos
:
Optimal Trading Mechanism Based on Differential Privacy Protection and Stackelberg Game in Big Data Market. 3550-3563 - Lulu Han
, Weiqi Luo
, Yaxi Yang
, Anjia Yang
, Rongxing Lu
, Junzuo Lai, Yandong Zheng
:
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments. 3564-3577 - Wenjing Gao
, Jia Yu
:
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing. 3578-3589 - Yankai Xie
, Qingtao Wang
, Ruoyue Li
, Chi Zhang
, Lingbo Wei
:
Private Transaction Retrieval for Lightweight Bitcoin Clients. 3590-3603 - Yifeng Zheng
, Shuangqing Xu
, Songlei Wang
, Yansong Gao
, Zhongyun Hua
:
Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables. 3604-3620 - Zhen Lv
, Kaiyu Shang
, Hongwei Huo
, Ximeng Liu
, Yanguo Peng
, Xiangyu Wang
, Yaorong Tan
:
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data. 3621-3635 - Ensheng Liu
, Liping Zheng
, Qiang He
, Phu Lai
, Benzhu Xu
, Gaofeng Zhang
:
Role-Based User Allocation Driven by Criticality in Edge Computing. 3636-3650 - Yue Zeng
, Zhihao Qu
, Song Guo
, Bin Tang
, Baoliu Ye
, Jing Li
, Jie Zhang
:
RuleDRL: Reliability-Aware SFC Provisioning With Bounded Approximations in Dynamic Environments. 3651-3664 - E. Chen
, Shengdian Wang
, Yuqing Fan
, Yan Zhu
, Stephen S. Yau:
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts. 3665-3681 - Zhijun Ding
, Yuanyuan Zhou
, Shuaijun Wang, Changjun Jiang
:
SCAFE: A Service-Centered Cloud-Native Workflow Engine Architecture. 3682-3695 - Songnian Zhang
, Suprio Ray
, Rongxing Lu
, Yunguo Guan
, Yandong Zheng
, Jun Shao
:
SecBerg: Secure and Practical Iceberg Queries in Cloud. 3696-3710 - Willy Susilo
, Fuchun Guo
, Zhen Zhao
, Yinhao Jiang
, Chunpeng Ge
:
Secure Replication-Based Outsourced Computation Using Smart Contracts. 3711-3722 - Bingbing Song
, Ruxin Wang
, Song Gao
, Yunyun Dong
, Ling Liu
, Wei Zhou
:
Securing Deep Learning as a Service Against Adaptive High Frequency Attacks With MMCAT. 3723-3735 - Shaozhong Zhang
, Dingkai Zhang
, Yaohui Wu
, Haidong Zhong
:
Service Recommendation Model Based on Trust and QoS for Social Internet of Things. 3736-3750 - Rui Shi
, Huamin Feng
, Yang Yang
, Feng Yuan
, Yingjiu Li
, HweeHwa Pang
, Robert H. Deng
:
Threshold Attribute-Based Credentials With Redactable Signature. 3751-3765 - Lili Sun
, Yonggang Zhang
, Yandong Zheng
, Weiyu Song
, Rongxing Lu
:
Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud. 3766-3781 - Ran Ding
, Yan Xu
, Hong Zhong
, Jie Cui
, Kewei Sha
:
Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing. 3782-3795 - Wenjing Zhong
, Jinjing Zhao
, Hesuan Hu
:
Unified Implementation and Simplification for Task-Based Authorization Security in Workflows. 3796-3811 - Bo-Chen Tai
, Yao-Tung Tsou
, Szu-Chuang Li
, Yennun Huang
, Pei-Yuan Tsai
, Yu-Cheng Tsai
:
User-Driven Synthetic Dataset Generation With Quantifiable Differential Privacy. 3812-3826 - Wei Wei
, Qiao Ke
, Adam Zielonka
, Mariusz Pleszczynski
, Marcin Wozniak
:
Vehicle Parking Navigation Based on Edge Computing With Diffusion Model and Information Potential Field. 3827-3836 - Buqing Cao
, Mi Peng
, Lulu Zhang
, Yueying Qing
, Bing Tang
, Guosheng Kang
, Jianxun Liu
:
Web Service Recommendation via Integrating Heterogeneous Graph Attention Network Representation and FiBiNET Score Prediction. 3837-3850
Volume 16, Number 6, November - December 2023
- Shenglin Zhang, Pengxiang Jin, Zihan Lin, Yongqian Sun, Bicheng Zhang, Sibo Xia, Zhengdan Li, Zhenyu Zhong, Minghua Ma, Wa Jin, Dai Zhang, Zhenyu Zhu, Dan Pei:
Robust Failure Diagnosis of Microservice System Through Multimodal Data. 3851-3864 - Sujit Chowdhury
, Arnab Mukherjee
, Raju Halder
:
${\sf FedRLChain}$: Secure Federated Deep Reinforcement Learning With Blockchain. 3865-3878 - Ifteher Alom
, Md. Sadek Ferdous
, Mohammad Jabed Morshed Chowdhury
:
BlockMeter: An Application Agnostic Performance Measurement Framework for Private Blockchain Platforms. 3879-3891 - Huy Minh Huynh
, Bay Vo
, Zuzana Komínková Oplatková
, Witold Pedrycz
:
An Approach for Incremental Mining of Clickstream Patterns as a Service Application. 3892-3905 - Zhenli He
, Yanan Xu
, Mingxiong Zhao
, Wei Zhou
, Keqin Li
:
Priority-Based Offloading Optimization in Cloud-Edge Collaborative Computing. 3906-3919 - Yudi Zhang
, Willy Susilo
, Fuchun Guo
, Guomin Yang
:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. 3920-3930 - Md. Enamul Haque
, Mehmet Engin Tozal
:
Identification of Fraudulent Healthcare Claims Using Fuzzy Bipartite Knowledge Graphs. 3931-3945 - Feifei Chen
, Jingwen Zhou
, Xiaoyu Xia
, Yong Xiang
, Xuehong Tao
, Qiang He
:
Joint Optimization of Coverage and Reliability for Application Placement in Mobile Edge Computing. 3946-3957 - Meng Xi
, Jianwei Yin
, Zhengzi Xu
, Ying Li
, Shuiguang Deng, Yang Liu
:
Service Pattern Optimization: Focusing on Collaboration in Service Ecosystems. 3958-3971 - Hanqi Zhang
, Chang Xu
, Rongxing Lu
, Liehuang Zhu
, Chuan Zhang
, Yunguo Guan
:
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage. 3972-3985 - Lunzhi Deng
, Bo Wang
, Tao Wang, Shuai Feng, Siwei Li
:
Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage. 3986-3998 - Dilxat Ghopur
, Jianfeng Ma
, Xindi Ma
, Jialu Hao
, Tao Jiang
, Xiangyu Wang
:
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation. 3999-4011 - Qi He
, Jie Sun
, Xiao-Jian Li
:
False Data Injection Attack Detection Based on Redundant Sparse Reconstruction. 4012-4024 - Amani Abusafia
, Abdallah Lakhdari
, Athman Bouguettaya
:
Flow-Based Energy Services Composition. 4025-4040 - Ryeong Hwan Kim
, Hwangjun Song
, Gi Seok Park
:
Moving Real-Time Services to Web 3.0: Challenges and Opportunities. 4041-4059 - PeiYun Zhang
, Wenjun Huang
, Yutong Chen
, MengChu Zhou
:
Predicting Quality of Services Based on a Two-Stream Deep Learning Model With User and Service Graphs. 4060-4072 - Guobing Zou
, Shiyi Lin
, Shengxiang Hu
, Shengyu Duan
, Yanglan Gan
, Bofeng Zhang
, Yixin Chen
:
FHC-DQP: Federated Hierarchical Clustering for Distributed QoS Prediction. 4073-4086 - Yinbin Miao, Yueming Yu
, Xinghua Li
, Yu Guo
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Defending Against Membership Inference Attack by Shielding Membership Signals. 4087-4101 - Yimin Guo
, Yajun Guo
:
CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments. 4102-4114 - Huaman Zhou
, Zonghang Li
, Hongfang Yu
, Long Luo
, Gang Sun
:
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs. 4115-4127 - Fadhila Tlili
, Samiha Ayed
, Lamia Chaari Fourati
:
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection. 4128-4139 - Mohammad Belayet Hossain
, Shiva Raj Pokhrel
, Jinho Choi
:
Privacy Cost Optimization of Smart Meters Using URLLC and Demand Side Energy Trading. 4140-4153 - Jin Li
, Shu Li
, Yuan Zhao
, Longjiang Guo
, Fei Hao
, Meirui Ren
, Keqin Li
:
Predicting Dropouts Before Enrollments in MOOCs: An Explainable and Self-Supervised Model. 4154-4167 - Duo Zhang
, Shangping Wang
, Qian Zhang
, Yaling Zhang
:
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain. 4168-4182 - Yi Xie
, Xue-Yi Wang, Zi-Jun Shen
, Yuhan Sheng
, Gong-Xing Wu
:
A Two-Stage Estimation of Distribution Algorithm With Heuristics for Energy-Aware Cloud Workflow Scheduling. 4183-4197 - Hochan Lee
, Jaewook Lee
, Heewon Kim
, Sangheon Pack
:
Straggler-Aware In-Network Aggregation for Accelerating Distributed Deep Learning. 4198-4204 - Yang Gu
, Jian Cao
, Shiyou Qian
, Wei Guan
:
SWORTS: A Scientific Workflow Retrieval Approach by Learning Textual and Structural Semantics. 4205-4219 - Xin Wang, Xiaojun Zhang
, Xinpeng Zhang
, Yinbin Miao, Jingting Xue:
Enabling Anonymous Authorized Auditing Over Keyword-Based Searchable Ciphertexts in Cloud Storage Systems. 4220-4232 - Jinlu Liu
, Zhongkai Wei
, Jing Qin
, Bo Zhao
, Jixin Ma
:
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting. 4233-4247 - Ying Cheng
, Xiumin Wang
, Pan Zhou
, Xinglin Zhang
, Weiwei Wu
:
Freshness-Aware Incentive Mechanism for Mobile Crowdsensing With Budget Constraint. 4248-4260 - Tao Shi
, Hui Ma
, Gang Chen
, Sven Hartmann
:
Auto-Scaling Containerized Applications in Geo-Distributed Clouds. 4261-4274 - Kaiyang Liu
, Jingrong Wang
, Heng Li
, Jun Peng
, Jianping Pan
:
Sampling-Based Caching for Low Latency in Distributed Coded Storage Systems. 4275-4287 - Claudio Marche
, Ilaria Cabiddu
, Christian Giovanni Castangia
, Luigi Serreli
, Michele Nitti
:
Implementation of a Multi-Approach Fake News Detector and of a Trust Management Model for News Sources. 4288-4301 - Zhenyu Wen
, Renyu Yang
, Bin Qian
, Yubo Xuan
, Lingling Lu
, Zheng Wang
, Hao Peng
, Jie Xu
, Albert Y. Zomaya
, Rajiv Ranjan
:
Janus: Latency-Aware Traffic Scheduling for IoT Data Streaming in Edge Environments. 4302-4316 - Shanshan Tu
, Muhammad Waqas
, Akhtar Badshah
, Mingxi Yin, Ghulam Abbas
:
Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing. 4317-4327 - Lionel Nkenyereye
, Kang-Jun Baeg
, Wan-Young Chung
:
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing. 4328-4344 - Xingxia Dai
, Zhu Xiao
, Hongbo Jiang
, Ming Lei, Geyong Min
, Jiangchuan Liu
, Schahram Dustdar
:
Offloading Dependent Tasks in Edge Computing With Unknown System-Side Information. 4345-4359 - Hao Guo
, Collin Meese
, Wanxin Li
, Chien-Chung Shen
, Mark M. Nejad
:
B2SFL: A Bi-Level Blockchained Architecture for Secure Federated Learning-Based Traffic Prediction. 4360-4374 - Bingxin Tang, Junyuan Liang, Zhongteng Cai, Ting Cai, Xiaocong Zhou, Yingye Chen:
MDRL-IR: Incentive Routing for Blockchain Scalability With Memory-Based Deep Reinforcement Learning. 4375-4388 - Yeonho Yoo
, Gyeongsik Yang
, Changyong Shin
, Junseok Lee
, Chuck Yoo
:
Machine Learning-Based Prediction Models for Control Traffic in SDN Systems. 4389-4403 - Jing Mei
, Zhao Tong
, Kenli Li
, Lianming Zhang
, Keqin Li
:
Energy-Efficient Heuristic Computation Offloading With Delay Constraints in Mobile Edge Computing. 4404-4417 - Wenan Tan
, Weinan Niu
, Jia Wei
, Lida Xu
:
TNSAR: Temporal Evolution Network Embedding Based on Structural and Attribute Retention. 4418-4431 - Ahmad Hammoud
, Rabeb Mizouni
, Hadi Otrok
, Shakti Singh
, Azzam Mourad
, Zbigniew Dziong
:
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations. 4432-4443 - Jinhua Ma
, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Robert H. Deng
:
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials. 4444-4455 - Yatong Jiang
, Tao Shang
, Jianwei Liu
:
Secure Gene Sequence Alignment Based on Garbled Circuit. 4456-4466 - Yuchen Li
, Haoyi Xiong
, Linghe Kong
, Rui Zhang
, Fanqin Xu
, Guihai Chen
, Minglu Li
:
MHRR: MOOCs Recommender Service With Meta Hierarchical Reinforced Ranking. 4467-4480 - Shuai Feng
, Liang Feng Zhang
:
An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage. 4481-4492 - Hamed Aboutorab
, Omar Khadeer Hussain
, Morteza Saberi
, Farookh Khadeer Hussain
, Daniel D. Prior
:
Reinforcement Learning-Based News Recommendation System. 4493-4502 - Zhiwei Wang
, Longwen Lan
, Siu-Ming Yiu
:
Chameleon Hash Based Efficiently Updatable Oblivious Key Management. 4503-4513 - Gianni Costa
, Agostino Forestiero
, Riccardo Ortale
:
Rule-Based Detection of Anomalous Patterns in Device Behavior for Explainable IoT Security. 4514-4525 - Haojun Huang
, Jialin Tian
, Hao Yin
, Geyong Min
, Dapeng Oliver Wu
, Wang Miao
:
RQAP: Resource and QoS Aware Placement of Service Function Chains in NFV-Enabled Networks. 4526-4539 - Jiajun Yao
, Lei Yang
, Zhenyu Wang
, Xiaohua Xu
:
Non-Rejection Aware Online Task Assignment in Spatial Crowdsourcing. 4540-4553 - Hua Shen
, Ge Wu
, Willy Susilo
, Mingwu Zhang
:
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry. 4554-4566 - Yanzhao Tian
, Lixiang Li
, Haipeng Peng
, Ding Wang
, Yixian Yang
:
Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences. 4567-4579 - Amin Bagheri
, Alireza Shameli-Sendi
:
Automating the Translation of Cloud Users' High-Level Security Needs to an Optimal Placement Model in the Cloud Infrastructure. 4580-4590 - Jiao Liu
, Xinghua Li
, Ximeng Liu
, Jiawei Tang
, Yunwei Wang
, Qiuyun Tong
, Jianfeng Ma
:
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework. 4591-4604 - Muhammad Umair
, Athman Bouguettaya
, Abdallah Lakhdari
:
Determining Intent of Changes to Ascertain Fake Crowdsourced Image Services. 4605-4616

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.