


default search action
IEEE Transactions on Cloud Computing, Volume 11
Volume 11, Number 1, January - March 2023
- Seyed Mohammad AghamirMohammadAli, Behnam Momeni
, Solmaz Salimi, Mehdi Kharrazi
:
Blue-Pill Oxpecker: A VMI Platform for Transactional Modification. 1-12 - Fahao Chen
, Peng Li
, Deze Zeng
, Song Guo
:
Edge-Assisted Short Video Sharing With Guaranteed Quality-of-Experience. 13-24 - Nazatul Haque Sultan
, Maryline Laurent
, Vijay Varadharajan:
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption. 25-43 - Bo Yi
, Xingwei Wang
, Min Huang
, Qiang He, Fuliang Li
:
Computation Migration Oriented Resource Allocation in Mobile Social Clouds. 44-57 - Jonathan Hasenburg
, Martin Grambow
, David Bermbach
:
MockFog 2.0: Automated Execution of Fog Application Experiments in the Cloud. 58-70 - Junjie Xie
, Chen Qian, Deke Guo
, Xin Li
, Ge Wang
, Honghui Chen
:
A Novel Data Placement and Retrieval Service for Cooperative Edge Clouds. 71-84 - Xinxin Liu, Yu Hua
, Xue Liu
, Ling Yang, Yuanyuan Sun:
Design and Implementation of Smooth Renewable Power in Cloud Data Centers. 85-96 - Hamidreza Moradi
, Wei Wang
, Dakai Zhu
:
Online Performance Modeling and Prediction for Single-VM Applications in Multi-Tenant Clouds. 97-110 - Guiqiang Hu
, Hongwei Li
, Guowen Xu
, Xinqiang Ma:
Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage Image. 111-127 - Junfei Wang
, Jing Li
, Zhen Gao
, Zhu Han
, Chao Qiu
, Xiaofei Wang
:
Resource Management and Pricing for Cloud Computing Based Mobile Blockchain With Pooling. 128-138 - Hongchang Sun, Shengjun Wang, Fengyu Zhou
, Lei Yin, Meizhen Liu:
Dynamic Deployment and Scheduling Strategy for Dual-Service Pooling-Based Hierarchical Cloud Service System in Intelligent Buildings. 139-155 - Di Zhang
, Junqing Le
, Nankun Mu
, Jiahui Wu
, Xiaofeng Liao
:
Secure and Efficient Data Deduplication in JointCloud Storage. 156-167 - Victor Sucasas
, Georgios Mantas
, Maria Papaioannou, Jonathan Rodriguez
:
Attribute-Based Pseudonymity for Privacy-Preserving Authentication in Cloud Services. 168-184 - Rongping Lin
, Song Yu, Shan Luo
, Xiaoning Zhang
, Jingyu Wang
, Moshe Zukerman
:
Column Generation Based Service Function Chaining Embedding in Multi-Domain Networks. 185-199 - Shuo Qin
, Dechang Pi
, Zhongshi Shao
, Yue Xu
:
A Knowledge-Based Adaptive Discrete Water Wave Optimization for Solving Cloud Workflow Scheduling. 200-216 - Fatemeh Rezaeibagha
, Yi Mu
, Ke Huang
, Lanxiang Chen
, Leyou Zhang
:
Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT. 217-228 - Gyeongsik Yang
, Yeonho Yoo
, Minkoo Kang
, Heesang Jin
, Chuck Yoo
:
Accurate and Efficient Monitoring for Virtualized SDN in Clouds. 229-246 - Yang Yang
, Robert H. Deng
, Wenzhong Guo
, Hongju Cheng
, Xiangyang Luo
, Xianghan Zheng, Chunming Rong
:
Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer. 247-262 - Tanner Hobson
, James Hammer, Preston Provins, Jian Huang
:
Interactive Visualization of Large Turbulent Flow as a Cloud Service. 263-277 - Gustavo Portella
, Eduardo Yoshio Nakano
, Genaína Nunes Rodrigues
, Azzedine Boukerche
, Alba C. M. A. Melo
:
A Novel Statistical and Neural Network Combined Approach for the Cloud Spot Market. 278-290 - Hyunseok Chang
, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee
, Jacobus E. van der Merwe, Zirak Zaheer:
MAGNet: Machine Learning Guided Application-Aware Networking for Data Centers. 291-307 - Hua Zhang
, Shaohua Zhao, Ziqing Guo
, Qiaoyan Wen
, Wenmin Li
, Fei Gao
:
Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds. 308-323 - Saeid Alirezazadeh
, Luís A. Alexandre
:
Optimal Algorithm Allocation for Single Robot Cloud Systems. 324-335 - Feng Li
, Jianfeng Ma
, Yinbin Miao
, Qi Jiang
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap. 336-348 - Shi-Cho Cha
, Chun-Lin Chang
, Yang Xiang
, Tzu-Jia Huang, Kuo-Hui Yeh
:
Enhancing OAuth With Blockchain Technologies for Data Portability. 349-366 - Yeongjin Kim
, Jeongho Kwak
, Hyang-Won Lee
, Song Chong:
Dynamic Computation and Network Chaining in Integrated SDN/NFV Cloud Infrastructure. 367-382 - Yuyang Zhou
, Zhebin Hu, Fagen Li
:
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage. 383-396 - Xinliang Wei
, Yu Wang
:
Popularity-Based Data Placement With Load Balancing in Edge Computing. 397-411 - Tianjiao Ni
, Zhili Chen
, Lin Chen, Shun Zhang
, Yan Xu
, Hong Zhong:
Differentially Private Combinatorial Cloud Auction. 412-425 - Armstrong Nhlabatsi
, Khaled Md. Khan
, Jin B. Hong
, Dong Seong Kim
, Rachael Fernandez, Noora Fetais
:
Quantifying Satisfaction of Security Requirements of Cloud Software Systems. 426-444 - Alexandre da Silva Veith
, Marcos Dias de Assunção, Laurent Lefèvre:
Latency-Aware Strategies for Deploying Data Stream Processing Applications on Large Cloud-Edge Infrastructure. 445-456 - Dong Li
, Jiahui Wu
, Junqing Le
, Xiaofeng Liao
, Tao Xiang
:
A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud. 457-469 - Nicholas Woolsey
, Xingyue Wang, Rong-Rong Chen, Mingyue Ji
:
FLCD: A Flexible Low Complexity Design of Coded Distributed Computing. 470-483 - Wei Du, Ang Li
, Qinghua Li, Pan Zhou
:
Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming. 484-498 - Lifeng Guo
, Qianli Wang
, Wei-Chuen Yau
:
Online/Offline Rewritable Blockchain With Auditable Outsourced Computation. 499-514 - Chen Chen
, Qizhen Weng
, Wei Wang
, Baochun Li
, Bo Li
:
Accelerating Distributed Learning in Non-Dedicated Environments. 515-531 - Vasileios Karagiannis
, Pantelis A. Frangoudis
, Schahram Dustdar
, Stefan Schulte
:
Context-Aware Routing in Fog Computing Systems. 532-549 - Djabir Abdeldjalil Chekired
, Mohammed Amine Togou
, Lyes Khoukhi
:
HybCon: A Scalable SDN-Based Distributed Cloud Architecture for 5G Networks. 550-563 - Yao Liu
, Tanping Zhou
, Zelun Yue, Wenchao Liu, Yiliang Han, Qi Li
, Xiaoyuan Yang:
Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing. 564-578 - E. Chen
, Yan Zhu
, Kaitai Liang
, Hongjian Yin
:
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization. 579-594 - Ludovico Funari, Luca Petrucci, Andrea Detti
:
Storage-Saving Scheduling Policies for Clusters Running Containers. 595-607 - Lina Sha, Wei Wu
, Bingbing Li:
Low-Complexity and High-Coding-Efficiency Image Deletion for Compressed Image Sets in Cloud Servers. 608-619 - Bin Xiang
, Jocelyne Elias
, Fabio Martignon
, Elisabetta Di Nitto
:
Joint Planning of Network Slicing and Mobile Edge Computing: Models and Algorithms. 620-638 - Dazhao Cheng
, Yu Wang
, Dong Dai
:
Dynamic Resource Provisioning for Iterative Workloads on Apache Spark. 639-652 - Wei Wang
, Massimo Tornatore
, Yongli Zhao
, Haoran Chen
, Yajie Li
, Abhishek Gupta
, Jie Zhang
, Biswanath Mukherjee
:
Infrastructure-efficient Virtual-Machine Placement and Workload Assignment in Cooperative Edge-Cloud Computing Over Backhaul Networks. 653-665 - Chuntao Ding
, Ao Zhou
, Xiao Ma
, Ning Zhang
, Ching-Hsien Hsu
, Shangguang Wang
:
Towards Diversified IoT Image Recognition Services in Mobile Edge Computing. 666-677 - Qinlong Huang
, Guanyu Yan, Yixian Yang
:
Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud. 678-691 - Tianle Mai
, Haipeng Yao
, Ni Zhang, Lexi Xu
, Mohsen Guizani
, Song Guo
:
Cloud Mining Pool Aided Blockchain-Enabled Internet of Things: An Evolutionary Game Approach. 692-703 - Gyuyeong Kim
, Wonjun Lee
:
DynaQ: Enabling Protocol-Independent Service Queue Isolation in Cloud Data Centers. 704-715 - Bruna Soares Peres, Otávio Augusto de Oliviera Souza, Olga Goussevskaia
, Chen Avin
, Stefan Schmid
:
Distributed Self-Adjusting Tree Networks. 716-729 - Xinliang Wei
, A. B. M. Mohaimenur Rahman
, Dazhao Cheng
, Yu Wang
:
Joint Optimization Across Timescales: Resource Placement and Task Dispatching in Edge Clouds. 730-744 - Hongying Dong
, Aaron T. Kinfe, Jiakai Yu, Qi Liu, Dan Kilper
, Ronald D. Williams, Malathi Veeraraghavan
:
Towards Enabling Residential Virtual-Desktop Computing. 745-762 - Tommaso Cucinotta
, Luca Abeni, Mauro Marinoni
, Riccardo Mancini
, Carlo Vitucci
:
Strong Temporal Isolation Among Containers in OpenStack for NFV Services. 763-778 - Niklas Carlsson
, Derek L. Eager:
Optimized Dynamic Cache Instantiation and Accurate LRU Approximations Under Time-Varying Request Volume. 779-797 - Chao Wang
, Xuehai Qian:
RDMA-Enabled Concurrency Control Protocols for Transactions in the Cloud Era. 798-810 - Mohammad Arif Hossain
, Nirwan Ansari
:
Network Slicing for NOMA-Enabled Edge Computing. 811-821 - Jianfei Sun
, Guowen Xu
, Tianwei Zhang
, Hu Xiong
, Hongwei Li
, Robert H. Deng
:
Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing. 822-838 - Feng Li
, Jianfeng Ma
, Yinbin Miao
, Zhiquan Liu
, Kim-Kwang Raymond Choo
, Ximeng Liu
, Robert H. Deng
:
Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data. 839-853 - Hung-Hsin Chen
, En-Te Lin
, Yu-Min Chou
, Jerry Chou
:
Gemini: Enabling Multi-Tenant GPU Sharing Based on Kernel Burst Estimation. 854-867 - Pengwei Wang
, Zhen Chen, MengChu Zhou
, Zhaohui Zhang
, Abdullah Abusorrah
, Ahmed Chiheb Ammari
:
Cost-Effective and Latency-Minimized Data Placement Strategy for Spatial Crowdsourcing in Multi-Cloud Environment. 868-878 - Qian Wang
, Chengzhe Lai
, Rongxing Lu
, Dong Zheng
:
Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud. 879-896 - Soroush Karimian Aliabadi
, Mohammad-Mohsen Aseman-Manzar
, Reza Entezari-Maleki
, Danilo Ardagna
, Bernhard Egger
, Ali Movaghar
:
Fixed-Point Iteration Approach to Spark Scalable Performance Modeling and Evaluation. 897-910 - Yiting Chen
, Lailong Luo
, Deke Guo
, Ori Rottenstreich
, Jie Wu
:
SDTP: Accelerating Wide-Area Data Analytics With Simultaneous Data Transfer and Processing. 911-926 - Avadh Kishor
, Rajdeep Niyogi
, Anthony Theodore Chronopoulos
, Albert Y. Zomaya
:
Latency and Energy-Aware Load Balancing in Cloud Data Centers: A Bargaining Game Based Approach. 927-941 - Fucai Luo
, Saif M. Al-Kuwari
:
Generic Construction of Black-Box Traceable Attribute-Based Encryption. 942-955 - Sourav Kanti Addya
, Anurag Satpathy
, Bishakh Chandra Ghosh
, Sandip Chakraborty
, Soumya K. Ghosh
, Sajal K. Das
:
CoMCLOUD: Virtual Machine Coalition for Multi-Tier Applications Over Multi-Cloud Environments. 956-970 - Yinghui Zhang
, Tian Zhu
, Rui Guo
, Shengmin Xu
, Hui Cui, Jin Cao:
Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data. 971-983 - Luan Teylo
, Luciana Arantes, Pierre Sens
, Lúcia Maria de A. Drummond
:
Scheduling Bag-of-Tasks in Clouds Using Spot and Burstable Virtual Machines. 984-996 - Ruitao Xie
, Junhong Fang, Junmei Yao, Xiaohua Jia
, Kaishun Wu
:
Sharing-Aware Task Offloading of Remote Rendering for Interactive Applications in Mobile Edge Computing. 997-1010 - Libin Liu
, Chengxi Gao
, Peng Wang
, Hongming Huang
, Jiamin Li
, Hong Xu
, Wei Zhang
:
Bottleneck-Aware Non-Clairvoyant Coflow Scheduling With Fai. 1011-1025 - Josep Sampé
, Marc Sánchez Artigas
, Gil Vernik, Ido Yehekzel
, Pedro García López
:
Outsourcing Data Processing Jobs With Lithops. 1026-1037 - Chengxi Gao
, Shuhui Chu, Hong Xu
, Minxian Xu
, Kejiang Ye
, Chengzhong Xu
:
Flash: Joint Flow Scheduling and Congestion Control in Data Center Networks. 1038-1049 - Wei-Kang Chung, Yun Li, Chih-Heng Ke, Sun-Yuan Hsieh
, Albert Y. Zomaya
, Rajkumar Buyya
:
Dynamic Parallel Flow Algorithms With Centralized Scheduling for Load Balancing in Cloud Data Center Networks. 1050-1064 - Hongyin Chen
, Zhaohua Chen
, Yukun Cheng
, Xiaotie Deng
, Wenhan Huang
, Jichen Li
, Hongyi Ling
, Mengqian Zhang
:
A Provable Softmax Reputation-Based Protocol for Permissioned Blockchains. 1065-1077 - Ting Yang
, Han Jiang
, Yucheng Hou
, Yinan Geng
:
Carbon Management of Multi-Datacenter Based On Spatio-Temporal Task Migration. 1078-1090 - Mingyue Li
, Chunfu Jia
, Ruizhong Du, Wei Shao
:
Forward and Backward Secure Searchable Encryption Scheme Supporting Conjunctive Queries Over Bipartite Graphs. 1091-1102
Volume 11, Number 2, April - June 2023
- Ruilong Deng
, Chee-Wooi Ten, Chaojie Li, Dusit Niyato, Fei Teng:
Guest Editorial: Introduction to Special Issue on "Cloud-Edge-End Orchestrated Computing for Smart Grid". 1107-1110 - Wen-Ting Lin
, Guo Chen
, Huaqing Li
:
Carbon-Aware Load Balance Control of Data Centers With Renewable Generations. 1111-1121 - Huan Zhou
, Zhenyu Zhang
, Dawei Li
, Zhou Su:
Joint Optimization of Computing Offloading and Service Caching in Edge Computing-Based Smart Grid. 1122-1132 - Caishan Guo, Fengji Luo
, Jiajia Yang, Zexiang Cai
:
Transactive Operational Framework for Internet Data Centers in Geo-Distributed Local Energy Markets. 1133-1143 - Xueqing Yang, Xin Guan
, Ning Wang, Yongnan Liu
, Huayang Wu, Yan Zhang
:
Cloud-Edge-End Intelligence for Fault-Tolerant Renewable Energy Accommodation in Smart Grid. 1144-1156 - Changyu Chen
, Guangchao Geng
, Heyang Yu
, Zixuan Liu, Quanyuan Jiang
:
An End-Cloud Collaborated Framework for Transferable Non-Intrusive Load Monitoring. 1157-1169 - Kai Fan
, Qi Chen
, Ruidan Su
, Kuan Zhang
, Haoyang Wang
, Hui Li
, Yintang Yang
:
MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End. 1170-1181 - Linwei Sang
, Qinran Hu
, Yinliang Xu
, Zaijun Wu
:
Privacy-Preserving Hybrid Cloud Framework for Real-Time TCL-Based Demand Response. 1182-1193 - Kuan Wang
, Jun Wu
, James Xi Zheng
, Jianhua Li, Wu Yang, Athanasios V. Vasilakos
:
Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources. 1194-1203 - Bihuan Li
, Dan Yu, Jun Wu, Ping Ju, Zhiyi Li
:
Coordinated Cloud-Edge Anomaly Identification for Active Distribution Networks. 1204-1216 - Jiangxia Zhong
, Bin Liu
, Xinghuo Yu
, Peter Wong
, Zeyu Wang, Chongchong Xu, Xiaojun Zhou
:
Enhancing Voltage Compliance in Distribution Network Under Cloud and Edge Computing Framework. 1217-1229 - Nikolaos Tzanis
, Eleftherios Mylonas
, Panagiotis Papaioannou, Michael K. Birbas
, Alexios N. Birbas
, Christos Tranoris
, Spyros G. Denazis, Alex Papalexopoulos
:
Cloud-Edge Architecture With Virtualized Hardware Functionality for Real-Time Diagnosis of Transients in Smart Grids. 1230-1241 - Jiaxuan Han, Qiteng Hong
, Mazheruddin H. Syed
, Md Asif Uddin Khan, Guangya Yang
, Graeme Burt
, Campbell Booth
:
Cloud-Edge Hosted Digital Twins for Coordinated Control of Distributed Energy Resources. 1242-1256 - Chinmaya Kumar Dehury
, Prasan Kumar Sahoo
, Bharadwaj Veeravalli
:
RRFT: A Rank-Based Resource Aware Fault Tolerant Strategy for Cloud Platforms. 1257-1272 - Xin Huang
, Hu Xiong
, Jinhao Chen
, Minghao Yang:
Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things. 1273-1285 - Dan Zhu
, Hui Zhu
, Xiangyu Wang
, Rongxing Lu
, Dengguo Feng:
Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data. 1286-1302 - Jun Sun
, Shibo Chen
, Pengcheng You
, Qinmin Yang
, Zaiyue Yang
:
Battery-Assisted Online Operation of Distributed Data Centers With Uncertain Workload and Electricity Prices. 1303-1314 - Yuncan Zhang
, Fujun He
, Eiji Oki
:
Service Mapping and Scheduling With Uncertain Processing Time in Network Function Virtualization. 1315-1333 - Lei Pan
, Xiao Liu
, Zhaohong Jia
, Jia Xu
, Xuejun Li
:
A Multi-Objective Clustering Evolutionary Algorithm for Multi-Workflow Computation Offloading in Mobile Edge Computing. 1334-1351 - Zhuo Tang
, Zhanfei Xiao, Li Yang
, Kailin He, Kenli Li
:
A Network Load Perception Based Task Scheduler for Parallel Distributed Data Processing Systems. 1352-1364 - Sharmistha Mandal
, Giridhar Maji
, Sunirmal Khatua
, Rajib K. Das
:
Cost Minimizing Reservation and Scheduling Algorithms for Public Clouds. 1365-1380 - Zhaoyi Li
, Jiawei Huang
, Jinbin Hu
, Weihe Li
, Tao Zhang
, Jingling Liu
, Jianxin Wang
, Tian He
:
REN: Receiver-Driven Congestion Control Using Explicit Notification for Data Center. 1381-1394 - Michel Gokan Khan
, Javid Taheri
, Auday Al-Dulaimy, Andreas Kassler
:
PerfSim: A Performance Simulator for Cloud Native Microservice Chains. 1395-1413 - Ji Liu
, Lei Mo
, Sijia Yang, Jingbo Zhou, Shilei Ji, Haoyi Xiong
, Dejing Dou
:
Data Placement for Multi-Tenant Data Federation on the Cloud. 1414-1429 - Ruochen Liu
, Ping Yang, Haoyuan Lv, Weibin Li
:
Multi-Objective Multi-Factorial Evolutionary Algorithm for Container Placement. 1430-1445 - Yi Xie
, Fengxian Gui
, Wei-Jun Wang, Chen Fu Chien
:
A Two-stage Multi-population Genetic Algorithm with Heuristics for Workflow Scheduling in Heterogeneous Distributed Computing Environments. 1446-1460 - Xiaoyong Tang
, Yi Liu, Zeng Zeng
, Bharadwaj Veeravalli
:
Service Cost Effective and Reliability Aware Job Scheduling Algorithm on Cloud Computing Systems. 1461-1473 - Ziyang Han
, Haibo Hu
, Qingqing Ye
:
ReFlat: A Robust Access Pattern Hiding Solution for General Cloud Query Processing Based on K-Isomorphism and Hardware Enclave. 1474-1486 - Ping Zhao
, Jiawei Tao, Kangjie Lui, Guanglin Zhang
, Fei Gao
:
Deep Reinforcement Learning-Based Joint Optimization of Delay and Privacy in Multiple-User MEC Systems. 1487-1499 - Yiding Wang
, Weiyan Wang
, Duowen Liu, Xin Jin
, Junchen Jiang, Kai Chen
:
Enabling Edge-Cloud Video Analytics for Robotics Applications. 1500-1513 - Ruiting Zhou
, Jinlong Pang
, Qin Zhang, Chuan Wu
, Lei Jiao
, Yi Zhong
, Zongpeng Li:
Online Scheduling Algorithm for Heterogeneous Distributed Machine Learning Jobs. 1514-1529 - Vittorio Cozzolino
, Leonardo Tonetto, Nitinder Mohan
, Aaron Yi Ding
, Jörg Ott
:
Nimbus: Towards Latency-Energy Efficient Task Offloading for AR Services. 1530-1545 - Jiawei Zhang
, Teng Li
, Zuobin Ying
, Jianfeng Ma
:
Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT. 1546-1561 - Siqi Huang
, Jiang (Linda) Xie
, Muhana Magboul Ali Muslam
:
A Cloud Computing Based Deep Compression Framework for UHD Video Delivery. 1562-1574 - Jianhang Tang
, Mohammad M. Jalalzai
, Chen Feng
, Zehui Xiong
, Yang Zhang
:
Latency-Aware Task Scheduling in Software-Defined Edge and Cloud Computing With Erasure-Coded Storage Systems. 1575-1590 - Xiang Chen
, Hongyan Liu
, Dong Zhang
, Zili Meng
, Qun Huang
, Haifeng Zhou
, Chunming Wu
, Xuan Liu
, Qiang Yang
:
Automatic Performance-Optimal Offloading of Network Functions on Programmable Switches. 1591-1607 - Xingjian Ding
, Jianxiong Guo
, Deying Li
, Weili Wu
:
Pricing and Budget Allocation for IoT Blockchain With Edge Computing. 1608-1621 - Saifullah Khalid
, Ishfaq Ahmad:
Dual Optimization of Revenue and Expense in Geo-Distributed Data Centers Using Smart Grid. 1622-1635 - Márk Szalay
, Péter Mátray
, László Toka
:
Real-Time FaaS: Towards a Latency Bounded Serverless Cloud. 1636-1650 - Chao Guo
, Xinyu Wang
, Gangxiang Shen
, Sanjay Kumar Bose
, Jiahe Xu
, Moshe Zukerman
:
Exploring the Benefits of Resource Disaggregation for Service Reliability in Data Centers. 1651-1666 - Ying Mao
, Weifeng Yan, Yun Song, Yue Zeng, Ming Chen, Long Cheng
, Qingzhi Liu
:
Differentiate Quality of Experience Scheduling for Deep Learning Inferences With Docker Containers in the Cloud. 1667-1677 - Yi Su
, Wenhao Fan
, Yuan'an Liu
, Fan Wu
:
A Truthful Combinatorial Auction Mechanism Towards Mobile Edge Computing in Industrial Internet of Things. 1678-1691 - Guangyong Gao
, Shikun Tong
, Zhihua Xia
, Yun-Qing Shi:
A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding. 1692-1706 - Xueyi Wang
, Lianbo Ma
, Xingwei Wang
, Ying Shi
, Bo Yi, Min Huang
:
Truthful VNFI Procurement Mechanisms With Flexible Resource Provisioning in NFV Markets. 1707-1718 - Li Ruan
, Yu Bai, Shaoning Li
, Jiaxun Lv
, Tianyuan Zhang, Limin Xiao
, Haiguang Fang, Chunhao Wang, Yunzhi Xue:
Cloud Workload Turning Points Prediction via Cloud Feature-Enhanced Deep Learning. 1719-1732 - Zeyi Tao
, Qi Xia
, Songqing Chen
, Qun Li
:
An Efficient and Robust Cloud-Based Deep Learning With Knowledge Distillation. 1733-1745 - Xiang He
, Zhiying Tu, Markus Wagner
, Xiaofei Xu, Zhongjie Wang
:
Online Deployment Algorithms for Microservice Systems With Complex Dependencies. 1746-1763 - Yunxiao Du, Zichen Xu
, Kanqi Zhang, Jie Liu, Christopher Stewart
, Jiacheng Huang:
Cost-Effective Strong Consistency on Scalable Geo-Diverse Data Replicas. 1764-1776 - Zhijun Ding
, Song Wang
, Changjun Jiang
:
Kubernetes-Oriented Microservice Placement With Dynamic Resource Allocation. 1777-1793 - Jannatun Noor
, Md. Nazrul Huda Shanto
, Joyanta Jyoti Mondal
, Md. Golam Hossain
, Sriram Chellappan
, A. B. M. Alim Al Islam
:
Orchestrating Image Retrieval and Storage Over a Cloud System. 1794-1806 - Fabiana Rossi
, Valeria Cardellini
, Francesco Lo Presti
, Matteo Nardelli
:
Dynamic Multi-Metric Thresholds for Scaling Applications Using Reinforcement Learning. 1807-1821 - Bing Wei
, Limin Xiao
, Hanjie Zhou, Guangjun Qin
, Yao Song
, Chenhao Zhang
:
Global Virtual Data Space for Unified Data Access Across Supercomputing Centers. 1822-1839 - Kaiyang Liu
, Jun Peng
, Jingrong Wang
, Zhiwu Huang
, Jianping Pan
:
Adaptive and Scalable Caching With Erasure Codes in Distributed Cloud-Edge Storage Systems. 1840-1853 - Jing Yao
, Xiangyi Meng
, Yifeng Zheng
, Cong Wang
:
Privacy-Preserving Content-Based Similarity Detection Over in-the-Cloud Middleboxes. 1854-1870 - Xing Chen
, Lijian Yang, Zheyi Chen
, Geyong Min
, Xianghan Zheng, Chunming Rong
:
Resource Allocation With Workload-Time Windows for Cloud-Based Software Services: A Deep Reinforcement Learning Approach. 1871-1885 - Axin Wu
, Anjia Yang
, Weiqi Luo
, Jinghang Wen
:
Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud. 1886-1898 - Nima Mahmoudi
, Hamzeh Khazaei
:
Performance Modeling of Metric-Based Serverless Computing Platforms. 1899-1910 - Xiaoguo Li
, Tao Xiang
, Yi Mu
, Fuchun Guo
, Zhongyuan Yao:
C-Wall: Conflict-Resistance in Privacy-Preserving Cloud Storage. 1911-1926 - Dandan Lu, Ming Li
, Yi Liao, Guihua Tao, Hongmin Cai
:
Verifiable Privacy-Preserving Queries on Multi-Source Dynamic DNA Datasets. 1927-1939 - Hong Liu
, Xiaojing Lu, Shengchen Duan, Yushu Zhang
, Yong Xiang
:
An Efficient Oblivious Random Data Access Scheme in Cloud Computing. 1940-1953 - Wenyu Zhang
, Sherali Zeadally
, Wei Li, Haijun Zhang
, Jingyi Hou, Victor C. M. Leung
:
Edge AI as a Service: Configurable Model Deployment and Delay-Energy Optimization With Result Quality Constraints. 1954-1969 - Zhiqing Tang
, Fuming Zhang
, Xiaojie Zhou
, Weijia Jia
, Wei Zhao
:
Pricing Model for Dynamic Resource Overbooking in Edge Computing. 1970-1984 - Xiuhua Li
, Zhenghui Xu, Fang Fang
, Qilin Fan
, Xiaofei Wang
, Victor C. M. Leung
:
Task Offloading for Deep Learning Empowered Automatic Speech Analysis in Mobile Edge-Cloud Computing Networks. 1985-1998 - Kenneth Kwame Azumah
, Paulo Romero Martins Maciel
, Lene Tolstrup Sørensen, Sokol Kosta
:
Modeling and Simulating a Process Mining-Influenced Load-Balancer for the Hybrid Cloud. 1999-2010 - Diogo Vaz
, David R. Matos
, Miguel L. Pardal
, Miguel Correia
:
MIRES: Intrusion Recovery for Applications Based on Backend-As-a-Service. 2011-2027 - Jaeseong Im
, Jongyul Kim
, Youngjin Kwon, Seungryoul Maeng:
On-Demand Virtualization for Post-Copy OS Migration in Bare-Metal Cloud. 2028-2038 - Desheng Wang
, Weizhe Zhang
, Xiao Han, Junren Lin, Yu-Chu Tian
:
A Multi-Objective Virtual Network Migration Algorithm Based on Reinforcement Learning. 2039-2056 - Zili Zha
, An Wang
, Yang Guo
, Songqing Chen
:
Towards Software Defined Measurement in Data Centers: A Comparative Study of Designs, Implementation, and Evaluation. 2057-2070 - Sina Zangbari Koohi
, Nor Asilah Wati Abdul Hamid
, Mohamed Othman
, Gafurjan I. Ibragimov
:
HATS: HetTask Scheduling. 2071-2083 - Yuejin Li
, Kai Hwang
, Kefan Shuai
, Zhengdao Li
, Albert Y. Zomaya
:
Federated Clouds for Efficient Multitasking in Distributed Artificial Intelligence Applications. 2084-2095 - Kyungwoon Lee
, Kwanhoon Lee
, Hyunchan Park
, Jaehyun Hwang
, Chuck Yoo
:
Autothrottle: Satisfying Network Performance Requirements for Containers. 2096-2109 - Eunil Seo
, Hyoungshick Kim
, Bhaskar Krishnamachari
, Erik Elmroth:
An ICN-Based Data Marketplace Model Based on a Game Theoretic Approach Using Quality-Data Discovery and Profit Optimization. 2110-2126 - E. Cao
, Saira Musa
, Mingsong Chen
, Tongquan Wei
, Xian Wei, Xin Fu, Meikang Qiu
:
Energy and Reliability-Aware Task Scheduling for Cost Optimization of DVFS-Enabled Cloud Workflows. 2127-2143 - Soghra Mousavi, Sepehr Ebrahimi Mood
, Alireza Souri
, Mohammad Masoud Javidi
:
Directed Search: A New Operator in NSGA-II for Task Scheduling in IoT Based on Cloud-Fog Computing. 2144-2157 - Shaojing Fu
, XueLun Huang
, Lin Liu
, Yuchuan Luo
:
BFCRI: A Blockchain-Based Framework for Crowdsourcing With Reputation and Incentive. 2158-2174 - Kefan Shuai
, Yiming Miao
, Kai Hwang
, Zhengdao Li
:
Transfer Reinforcement Learning for Adaptive Task Offloading Over Distributed Edge Clouds. 2175-2187 - Jingling Yuan
, Yao Xiang, Yuhui Deng
, Yi Zhou, Geyong Min
:
UPOA: A User Preference Based Latency and Energy Aware Intelligent Offloading Approach for Cloud-Edge Systems. 2188-2203 - Ying Mao
, Vaishali Sharma, Wenjia Zheng, Long Cheng
, Qiang Guan, Ang Li
:
Elastic Resource Management for Deep Learning Applications in a Container Cluster. 2204-2216
Volume 11, Number 3, July - September 2023
- Francesco Pace
, Daniele Venzano, Damiano Carra
, Pietro Michiardi
:
A Flexible Heuristic to Schedule Distributed Analytic Applications in Compute Clusters. 2217-2230 - Biao Hu
, Yinbin Shi, Zhengcai Cao
, MengChu Zhou
:
A Hybrid Scheduling Framework for Mixed Real-Time Tasks in an Automotive System With Vehicular Network. 2231-2244 - Chuan Pham
, Foroutan Fami, Kim Khoa Nguyen
, Mohamed Cheriet
:
When RAN Intelligent Controller in O-RAN Meets Multi-UAV Enable Wireless Network. 2245-2259 - Sheng Gao
, Yuqi Chen, Jianming Zhu
, Zhiyuan Sui
, Rui Zhang
, Xindi Ma
:
BPMS: Blockchain-Based Privacy-Preserving Multi-Keyword Search in Multi-Owner Setting. 2260-2272 - Yushu Zhang
, Jiajia Jiang
, Xuewen Dong
, Liangmin Wang
, Yong Xiang
:
BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation. 2273-2284 - Kaile Zhou
, Zhineng Fei
, Xinhui Lu:
Optimal Energy Management of Internet Data Center With Distributed Energy Resources. 2285-2295 - Zehua Guo
, Jiayu Wang
, Sen Liu
, Jineng Ren
, Yang Xu
, Chao Yao
:
Congestion-Aware Critical Gradient Scheduling for Distributed Machine Learning in Data Center Networks. 2296-2311 - Jiawei Huang
, Jingling Liu
, Ning Jiang, Sen Liu
, Jinbin Hu
, Jianxin Wang
:
Achieving Fast Convergence and High Efficiency using Differential Explicit Feedback in Data Center. 2312-2324 - Zewei Liu
, Chunqiang Hu
, Ruinian Li
, Tao Xiang
, Xingwang Li
, Jiguo Yu
, Hui Xia
:
A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment. 2325-2336 - Xiaoxu Ren
, Chao Qiu
, Xiaofei Wang
, Zhu Han
, Ke Xu
, Haipeng Yao
, Song Guo
:
AI-Bazaar: A Cloud-Edge Computing Power Trading Framework for Ubiquitous AI Services. 2337-2348 - Junxue Zhang
, Wei Bai, Kai Chen
:
Enabling ECN for Datacenter Networks With RTT Variations. 2349-2364 - Lin Zhang
, Shaohuai Shi
, Wei Wang
, Bo Li
:
Scalable K-FAC Training for Deep Neural Networks With Distributed Preconditioning. 2365-2378 - Yaxi Yang
, Yao Tong, Jian Weng
, Yufeng Yi, Yandong Zheng
, Leo Yu Zhang
, Rongxing Lu
:
PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data. 2379-2391 - Haoyu Wang
, Guoxin Liu, Haiying Shen
:
Cooperative Job Scheduling and Data Allocation in Data-Intensive Parallel Computing Clusters. 2392-2406 - Ziqi Wei
, Qing Li
, Keke Zhu, Jianer Zhou, Longhao Zou, Yong Jiang
, Xi Xiao
:
DiffTREAT: Differentiated Traffic Scheduling Based on RNN in Data Centers. 2407-2419 - Yudi Zhang
, Fuchun Guo
, Willy Susilo
, Guomin Yang
:
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System. 2420-2430 - Yu Guo
, Hongcheng Xie
, Mingyue Wang
, Xiaohua Jia
:
Privacy-Preserving Multi-Range Queries for Secure Data Outsourcing Services. 2431-2444 - Sizheng Fan
, Juntao Zhao
, Rong Zhao, Zehua Wang, Wei Cai
:
CryptoArcade: A Cloud Gaming System With Blockchain-Based Token Economy. 2445-2458 - Hassan Nasiraee
, Maede Ashouri-Talouki
, Ximeng Liu
:
Optimal Black-Box Traceability in Decentralized Attribute-Based Encryption. 2459-2472 - Kha Dinh Duy
, Hojoon Lee
:
SE-PIM: In-Memory Acceleration of Data-Intensive Confidential Computing. 2473-2490 - Ting Yang
, Xutao Han
, Hao Li, Wei Li
, Albert Y. Zomaya
:
Parallel Scientific Power Calculations in Cloud Data Center Based On Decomposition-Coordination Directed Acyclic Graph. 2491-2502 - Datong Zhang, Yuhui Deng
, Yi Zhou, Jie Li, Weiheng Zhu, Geyong Min
:
MGRM: A Multi-Segment Greedy Rewriting Method to Alleviate Data Fragmentation in Deduplication-Based Cloud Backup Systems. 2503-2516 - Yanlin Zhou
, Xiyao Ma, Dapeng Oliver Wu
, Xiaolin Li
:
Communication-Efficient and Attack-Resistant Federated Edge Learning With Dataset Distillation. 2517-2528 - Baopeng Cheng
, Yangwang Fang, Weishi Peng
:
Improved Sparrow Search Algorithm Based on Normal Cloud Model and Niche Recombination Strategy. 2529-2545 - Qiuyun Lyu
, Hao Li
, Zhining Deng
, Jingyu Wang, Yizhi Ren
, Ning Zheng
, Junliang Liu, Huaping Liu
, Kim-Kwang Raymond Choo
:
A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services. 2546-2561 - Mengqian Zhang
, Jichen Li
, Zhaohua Chen
, Hongyin Chen
, Xiaotie Deng
:
An Efficient and Robust Committee Structure for Sharding Blockchain. 2562-2574 - Martin Grambow
, Denis Kovalev
, Christoph Laaber
, Philipp Leitner
, David Bermbach
:
Using Microbenchmark Suites to Detect Application Performance Changes. 2575-2590 - Wanchun Jiang
, Yujia Qiu, Fa Ji, Yongjia Zhang, Xiangqian Zhou, Jianxin Wang
:
AMS: Adaptive Multiget Scheduling Algorithm for Distributed Key-Value Stores. 2591-2602 - Wei Wu
, Lina Sha:
Image Subset Union for Compressed Image Sets in Cloud Servers. 2603-2613 - Vassilios D. Tsakanikas
, Tasos Dagiuklas
:
A Generic Framework for Deploying Video Analytic Services on the Edge. 2614-2630 - Xiaoqin Feng
, Jianfeng Ma
, Huaxiong Wang
, Sheng Wen
, Yang Xiang
, Yinbin Miao
:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. 2631-2645 - Giulia Mangiaracina
, Pierluigi Plebani
, Mattia Salnitri
, Monica Vitali
:
Efficient Data as a Service in Fog Computing: An Adaptive Multi-Agent Based Approach. 2646-2663 - Akshay Jajoo
, Y. Charlie Hu
, Xiaojun Lin
, Nan Deng:
SLearn: A Case for Task Sampling Based Learning for Cluster Job Scheduling. 2664-2680 - Ahmad Taghinezhad-Niar
, Javid Taheri
:
Reliability, Rental-Cost and Energy-Aware Multi-Workflow Scheduling on Multi-Cloud Systems. 2681-2692 - Gil Einziger, Gabriel Scalosub
, Carla-Fabiana Chiasserini
, Francesco Malandrino
:
Virtual Service Embedding With Time-Varying Load and Provable Guarantees. 2693-2710 - Jun Shen
, Xiaofeng Chen
, Jianghong Wei
, Fuchun Guo
, Willy Susilo
:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. 2711-2724 - Shengnan Yue
, Xiao Lin
, Weiqiang Sun
, Weisheng Hu
:
Modeling Sparse Store-and-Forward Bulk Data Transfers in Inter-Datacenter Networks With Multiple Congested Links. 2725-2738 - Yeonho Yoo
, Gyeongsik Yang
, Jeunghwan Lee
, Changyong Shin
, Hoseok Kim
, Chuck Yoo
:
TeaVisor: Network Hypervisor for Bandwidth Isolation in SDN-NV. 2739-2755 - Long Shi
, Taotao Wang
, Jun Li, Shengli Zhang
, Song Guo
:
Pooling is not Favorable: Decentralize Mining Power of PoW Blockchain Using Age-of-Work. 2756-2769 - Guozhu Zhao
, Pinchang Zhang
, Yulong Shen
, Limei Peng
, Xiaohong Jiang
:
Passive User Authentication Utilizing Two-Dimensional Features for IIoT Systems. 2770-2783 - Jin Wang
, Zhaobo Lu, Mingjia Fu, Jianping Wang
, Kejie Lu
, Admela Jukan
:
Decode-and-Compare: An Efficient Verification Scheme for Coded Distributed Edge Computing. 2784-2802 - Ke Cheng
, Yantian Hou
, Liangmin Wang
:
Secure Similar Sequence Query over Multi-source Genomic Data on Cloud. 2803-2819 - Marco Iorio
, Fulvio Risso
, Alex Palesandro
, Leonardo Camiciotti
, Antonio Manzalini
:
Computing Without Borders: The Way Towards Liquid Computing. 2820-2838 - Mohammad Ali
, Mohammad-Reza Sadeghi
, Ximeng Liu
, Athanasios V. Vasilakos
:
Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health. 2839-2855 - Mingyue Li
, Chunfu Jia
, Ruizhong Du, Wei Shao
, Guanxiong Ha
:
DSE-RB: A Privacy-Preserving Dynamic Searchable Encryption Framework on Redactable Blockchain. 2856-2872 - Qihui Li
, Xiaohua Jia
, Chuanhe Huang
, Haizhou Bao
:
A Dynamic Combinatorial Double Auction Model for Cloud Resource Allocation. 2873-2884 - Peipeng Yu
, Jian Tang, Zhihua Xia
, Zhetao Li
, Jian Weng
:
A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing. 2885-2896 - Reuven Cohen
, Matty Kadosh, Alan Lo
, Qasem Sayah:
On the Protection of a High Performance Load Balancer Against SYN Attacks**This is an extended journal version of [2]. 2897-2909 - Mohammad Arif Hossain
, Nirwan Ansari
:
Hybrid Multiple Access for Network Slicing Aware Mobile Edge Computing. 2910-2921 - Ran Ding
, Yan Xu
, Hong Zhong
, Jie Cui
, Geyong Min
:
An Efficient Integrity Checking Scheme With Full Identity Anonymity for Cloud Data Sharing. 2922-2935 - Juan Wang
, Jie Wang
, Chengyang Fan
, Fei Yan
, Yueqiang Cheng
, Yinqian Zhang
, Wenhui Zhang
, Mengda Yang
, Hongxin Hu
:
SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing. 2936-2953 - Santa Maria Shithil, Muhammad Abdullah Adnan
:
A Prediction Based Replica Selection Strategy for Reducing Tail Latency in Geo-Distributed Systems. 2954-2965 - Xin Wang
, Pei Guo, Xingyan Li, Aryya Gangopadhyay
, Carl E. Busart
, Jade Freeman, Jianwu Wang
:
Reproducible and Portable Big Data Analytics in the Cloud. 2966-2982 - Zhichao Yang
, Debiao He
, Longjiang Qu
, Qing Ye
:
An Efficient Identity-Based Encryption With Equality Test in Cloud Computing. 2983-2992 - Yun Wang
, Dimitrios Papadopoulos
:
Multi-User Collusion-Resistant Searchable Encryption for Cloud Storage. 2993-3008 - Mohammad Khodaei
, Hamid Noroozi
, Panos Papadimitratos
:
SECMACE+: Upscaling Pseudonymous Authentication for Large Mobile Systems. 3009-3026 - Fangzheng Liu
, Jiwei Huang
, Xianbin Wang
:
Joint Task Offloading and Resource Allocation for Device-Edge-Cloud Collaboration With Subtask Dependencies. 3027-3039 - Chin-Hsien Wu
, Liang-Ting Chen, Ren-Jhen Hsu
, Jian-Yu Dai
:
A State-Aware Method for Flows With Fairness on NVMe SSDs With Load Balance. 3040-3054 - Shenglai Zeng, Zonghang Li
, Hongfang Yu
, Zhihao Zhang, Long Luo, Bo Li
, Dusit Niyato
:
HFedMS: Heterogeneous Federated Learning With Memorable Data Semantics in Industrial Metaverse. 3055-3069 - Ruopeng Geng
, Chongrong Fang
, Shiyang Guo, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng
:
FlowPinpoint: Localizing Anomalies in Cloud-Client Services for Cloud Providers. 3070-3084 - Lizhi Xiong
, Xiao Han
, Ching-Nung Yang
, Xinpeng Zhang
:
Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism. 3085-3098 - Seyed Ali Mohammad Tajalli, Seyede Zahra Tajalli
, Maryam Homayounzadeh, Mohammad Hassan Khooban
:
Zero-Carbon Power-to-Hydrogen Integrated Residential System Over a Hybrid Cloud Framework. 3099-3110 - Huanghuang Liang
, Qianlong Sang
, Chuang Hu
, Dazhao Cheng
, Xiaobo Zhou
, Dan Wang
, Wei Bao
, Yu Wang
:
DNN Surgery: Accelerating DNN Inference on the Edge Through Layer Partitioning. 3111-3125 - Ziyu Shen
, Xusheng Zhang
, Zheng Liu
, Yun Li
:
PM$^{2}$2VE: Power Metering Model for Virtualization Environments in Cloud Data Centers. 3126-3138 - Xuewen Dong
, Lingtao Xue
, Zhiwei Zhang
, Yushu Zhang
, Teng Li
, Zhichao You
, Yulong Shen
:
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control. 3139-3152 - Xiaoyang Wang
, Yongkun Li
, Fan Guo
, Yinlong Xu
, John C. S. Lui
:
Dynamic GPU Scheduling With Multi-Resource Awareness and Live Migration Support. 3153-3167 - Changsong Jiang
, Chunxiang Xu
, Zhao Zhang
, Kefei Chen
:
SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search. 3168-3183 - Yanping Li
, Zirui Li
, Bo Yang
, Yong Ding
:
Algebraic Signature-Based Public Data Integrity Batch Verification for Cloud-IoT. 3184-3196 - Liwen Yang
, Yuanqing Xia
, Lingjuan Ye
, Runze Gao
, Yufeng Zhan
:
A Fully Hybrid Algorithm for Deadline Constrained Workflow Scheduling in Clouds. 3197-3210 - Lin Liu
, Jinshu Su
, Ximeng Liu
, Rongmao Chen
, Xinyi Huang
, Guang Kou
, Shaojing Fu
:
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud. 3211-3225 - Jianda Wang
, Zhen Wang
, Yang Hu
:
Towards an Efficient SIMD Virtual Radio Access Network (vRAN) and Edge Cloud System. 3226-3238 - Xiaowei Shang
, Weiwei Jia
, Jianchen Shan
, Xiaoning Ding
, Cristian Borcea
:
Reestablishing Page Placement Mechanisms for Nested Virtualization. 3239-3250 - Tanping Zhou
, Dong Chen
, Wenchao Liu
, Xiaoyuan Yang
:
Attacks and Improvement of Unlinkability of Biometric Template Protection Scheme Based on Bloom Filters. 3251-3261 - Tong Liu
, Dongyu Guo
, Qichao Xu
, Honghao Gao
, Yanmin Zhu
, Yuanyuan Yang
:
Joint Task Offloading and Dispatching for MEC With Rational Mobile Devices and Edge Nodes. 3262-3273 - Ruiyun Liu
, Weiqiang Sun
, Weisheng Hu
:
Placement of High Availability Geo-Distributed Data Centers in Emerging Economies. 3274-3288 - Dinuni K. Fernando
, Jonathan Terner
, Ping Yang
, Kartik Gopalan
:
V-Recover: Virtual Machine Recovery When Live Migration Fails. 3289-3300 - Jing Wang
, Yi Wu
, Yang-Quan Chen
:
Branchy Deep Learning Based Real-Time Defect Detection Under Edge-Cloud Fusion Architecture. 3301-3313 - Zhixun Lu
, Qihua Feng
, Peiya Li
, Kwok-Tung Lo
, Feiran Huang
:
A Privacy-Preserving Image Retrieval Scheme Based on 16×16 DCT and Deep Learning. 3314-3325
Volume 11, Number 4, October - December 2023
- Jiaqi Zhao
, Hui Zhu
, Fengwei Wang
, Rongxing Lu
, Ermei Wang
, Linfeng Li
, Hui Li
:
VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression. 3326-3340 - Xuan Jing
, Meixia Miao
, Jianghong Wei
, Jianfeng Wang
:
Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting. 3341-3354 - Mohammad Arif Hossain
, Nirwan Ansari
:
Energy-Efficient Federated Edge Learning in Multi-Tier NOMA-Enabled HetNet. 3355-3366 - Jing Bai
, Yaru Li, Xiaolin Chang
, Fumio Machida
, Kishor S. Trivedi
:
Understanding NFV-Enabled Vehicle Platooning Application: A Dependability View. 3367-3380 - Jiao Liu
, Xinghua Li
, Ximeng Liu
, Jiawei Tang
, Siqi Ma
, Jian Weng
:
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network. 3381-3395 - Zhen Zhao
, Willy Susilo
, Baocang Wang
, Kai Zeng:
Public-Key Encryption With Tester Verifiable Equality Test for Cloud Computing. 3396-3406 - Konstantinos Kontodimas
, Polyzois Soumplis
, Aristotelis Kretsis
, Panagiotis C. Kokkinos
, Marcell Fehér
, Daniel E. Lucani
, Emmanouel A. Varvarigos
:
Secure Distributed Storage Orchestration on Heterogeneous Cloud-Edge Infrastructures. 3407-3425 - Shanchen Pang
, Xiao He
, Ching-Hsien Hsu
, Chunming Rong
, Hailong Zhu
, Peiying Zhang
:
Joint Trajectory and Energy Consumption Optimization Based on UAV Wireless Charging in Cloud Computing System. 3426-3438 - Junna Zhang
, Guoxian Zhang
, Xiang Bao
, Chuntao Ding
, Peiyan Yuan
, Xinglin Zhang
, Shangguang Wang
:
Dependent Application Offloading in Edge Computing. 3439-3451 - Peijia Zheng
, Ziyan Cheng
, Xianhao Tian
, Hongmei Liu
, Weiqi Luo
, Jiwu Huang
:
Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data. 3452-3468 - Remo Andreoli
, Tommaso Cucinotta
, Daniel Bristot de Oliveira
:
Priority-Driven Differentiated Performance for NoSQL Database-as-a-Service. 3469-3482 - Chenyu Fan
, Xiaoning Zhang
, Yangming Zhao
, Yutao Liu
, Shui Yu
:
Self-Adaptive Gradient Quantization for Geo-Distributed Machine Learning Over Heterogeneous and Dynamic Networks. 3483-3496 - Byeonghui Jeong
, Jueun Jeon
, Young-Sik Jeong
:
Proactive Resource Autoscaling Scheme Based on SCINet for High-Performance Cloud Computing. 3497-3509 - Minjun Deng
, Kai Zhang
, Pengfei Wu
, Mi Wen
, Jianting Ning
:
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes. 3510-3524 - Jia Chen, Jing Chen, Kuo Guo
:
Queue-Aware Service Orchestration and Adaptive Parallel Traffic Scheduling Optimization in SDNFV-Enabled Cloud Computing. 3525-3540 - Harshit Daga
, Yiwen Chen, Aastha Agrawal, Ada Gavrilovska
:
CLUE: Systems Support for Knowledge Transfer in Collaborative Learning With Neural Nets. 3541-3554 - Victor Sucasas
, Abdelrahaman Aly
, Georgios Mantas
, Jonathan Rodriguez
, Najwa Aaraj
:
Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities. 3555-3572 - Kuo Guo
, Jia Chen
, Ping Dong
, Tao Zou
, Jun Zhu
, Xu Huang
, Shang Liu
, Chenxi Liao
:
DTFL: A Digital Twin-Assisted Graph Neural Network Approach for Service Function Chains Failure Localization. 3573-3590 - Seema Pillai
, Vijayant Verma:
A Novel Web Attack Detection Mechanism Using Maximal-Munch With Torrent Deep Network. 3591-3600 - Yuchen Wang
, Junyao Yang
, Zhenlin Wang
:
Multi-Tenant In-Memory Key-Value Cache Partitioning Using Efficient Random Sampling-Based LRU Model. 3601-3618 - Yang Lu
, Jiguo Li
:
Privacy-Preserving and Forward Public Key Encryption With Field-Free Multi-Keyword Search for Cloud Encrypted Data. 3619-3630 - Jin Yang
, Liang Bao
, Wenjing Liu
, Rong Yang
, Chase Q. Wu
:
On a Meta Learning-Based Scheduler for Deep Learning Clusters. 3631-3642 - Weiwei Lin
, Xiaoxuan Luo
, ChunKi Li
, Jiechao Liang
, Guokai Wu
, Keqin Li
:
An Energy-Efficient Tuning Method for Cloud Servers Combining DVFS and Parameter Optimization. 3643-3655 - Xin Li
, Xinglin Zhang
, Tiansheng Huang
:
Joint Task Offloading and Service Placement for Mobile Edge Computing: An Online Two-Timescale Approach. 3656-3671 - Guanxiong Ha
, Chunfu Jia
, Yuchen Chen
, Hang Chen
, Mingyue Li
:
A Secure Client-Side Deduplication Scheme Based on Updatable Server-Aided Encryption. 3672-3684 - Zhihua Cui
, Tianhao Zhao
, Linjie Wu
, A. Kai Qin
, Jianwei Li
:
Multi-Objective Cloud Task Scheduling Optimization Based on Evolutionary Multi-Factor Algorithm. 3685-3699 - Feibo Jiang
, Yubo Peng
, Kezhi Wang
, Li Dong
, Kun Yang
:
MARS: A DRL-Based Multi-Task Resource Scheduling Framework for UAV With IRS-Assisted Mobile Edge Computing System. 3700-3712 - Shuo Wang
, Zhijun Ding
, Ru Yang
, Changjun Jiang
:
A Complex Behavioral Interaction Analysis Method for Microservice Systems With Bounded Buffers. 3713-3724 - Jialun Li
, Danyang Xiao
, Jieqian Yao
, Yujie Long
, Weigang Wu
:
Learning Scheduling Policies for Co-Located Workloads in Cloud Datacenters. 3725-3736 - Chunlin Li
, Jinguo Li
, Kai Zhang
, Yan Yan
, Jianting Ning
:
Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy. 3737-3749 - Michal Kucab
, Piotr Borylo
, Piotr Cholda
:
Hardware-Assisted Static and Runtime Attestation for Cloud Deployments. 3750-3765 - Kai Peng
, Peiyun Xiao
, Shangguang Wang
, Victor C. M. Leung
:
AoI-Aware Partial Computation Offloading in IIoT With Edge Computing: A Deep Reinforcement Learning Based Approach. 3766-3777 - Hui Sun
, Guanzhong Chen
, Yinliang Yue
, Xiao Qin
:
Improving LSM-Tree Based Key-Value Stores With Fine-Grained Compaction Mechanism. 3778-3796 - Wan-Peng Guo
, Run-Hua Shi
, Xiao-Xu Zhang
:
Comment on "Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data". 3797-3798

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.