


default search action
IEEE Transactions on Services Computing, Volume 15
Volume 15, Number 1, January - February 2022
- Reyhaneh Rabaninejad
, Mahmoud Ahmadian-Attari, Maryam Rajabzadeh Asaar
, Mohammad Reza Aref:
A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage. 1-15 - Xiang Zhou
, Xin Peng
, Tao Xie, Jun Sun, Chao Ji, Wenhai Li, Dan Ding:
Delta Debugging Microservice Systems with Parallel Optimization. 16-29 - Kawsar Haghshenas
, Ali Pahlevan
, Marina Zapater
, Siamak Mohammadi
, David Atienza
:
MAGNETIC: Multi-Agent Machine Learning-Based Approach for Energy Efficient Dynamic Consolidation in Data Centers. 30-44 - Jianhao Wei
, Yaping Lin
, Xin Yao
, Jin Zhang:
Differential Privacy-Based Location Protection in Spatial Crowdsourcing. 45-58 - Changbo Ke
, Fu Xiao
, Zhiqiu Huang
, Yunfei Meng
, Yan Cao:
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data. 59-68 - Qin Liu
, Yue Tian
, Jie Wu
, Tao Peng
, Guojun Wang
:
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data. 69-82 - Xiao Xue
, Jiajia Gao, Shuang Wu, Shufang Wang, Zhiyong Feng
:
Value-Based Analysis Framework of Crossover Service: A Case Study of New Retail in China. 83-96 - Fahima Amin Bhuyan
, Shiyong Lu
, Robert G. Reynolds, Jia Zhang
, Ishtiaq Ahmed
:
A Security Framework for Scientific Workflow Provenance Access Control Policies. 97-109 - Mian Guo
, Quansheng Guan
, Weiqi Chen, Fei Ji
, Zhiping Peng:
Delay-Optimal Scheduling of VMs in a Queueing Cloud Computing System with Heterogeneous Workloads. 110-123 - Jun Shao
, Rongxing Lu
, Yunguo Guan
, Guiyi Wei
:
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud. 124-137 - Quyuan Wang
, Songtao Guo
, Jiadi Liu
, Chengsheng Pan, Li Yang:
Profit Maximization Incentive Mechanism for Resource Providers in Mobile Edge Computing. 138-149 - Qin-zhe Xiao
, Jinghui Zhong
, Liang Feng
, Linbo Luo
, Jianming Lv
:
A Cooperative Coevolution Hyper-Heuristic Framework for Workflow Scheduling Problem. 150-163 - Hui Ma
, Rui Zhang
, Shuzhou Sun
, Zishuai Song, Gaosheng Tan:
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing. 164-173 - Adrian Satja Kurdija
, Marin Silic
, Goran Delac
, Klemo Vladimir
:
Fast Multi-Criteria Service Selection for Multi-User Composite Applications. 174-187 - Song Yang
, Fan Li
, Ramin Yahyapour
, Xiaoming Fu
:
Delay-Sensitive and Availability-Aware Virtual Network Function Scheduling for NFV. 188-201 - Zhihua Xia
, Leqi Jiang, Dandan Liu, Lihua Lu, Byeungwoo Jeon
:
BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing. 202-214 - Attila Altay Yavuz
, Muslum Ozgur Ozmen
:
Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices. 215-227 - Moustafa AbdelBaky
, Manish Parashar
:
A General Performance and QoS Model for Distributed Software-Defined Environments. 228-240 - Chengliang Tian
, Jia Yu
, Hanlin Zhang, Haiyang Xue
, Cong Wang
, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. 241-253 - Yu Du
, Jun Li, Long Shi
, Tingting Liu
, Feng Shu
, Zhu Han
:
Two-Tier Matching Game in Small Cell Networks for Mobile Edge Computing. 254-265 - Anmin Fu
, Zhenzhu Chen
, Yi Mu
, Willy Susilo
, Yinxia Sun
, Jie Wu
:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. 266-278 - Thanh Dat Dang
, Doan Hoang
, Diep N. Nguyen
:
Trust-Based Scheduling Framework for Big Data Processing with MapReduce. 279-293 - Marcello Cinque
, Raffaele Della Corte
, Antonio Pecchia
:
Microservices Monitoring with Event Logs and Black Box Execution Tracing. 294-307 - Zengpeng Li
, Ding Wang
:
Achieving One-Round Password-Based Authenticated Key Exchange over Lattices. 308-321 - Lei Yang
, Xi Yu
, Jiannong Cao
, Wengen Li
, Yuqi Wang
, Michal Szczecinski:
A Novel Demand Dispatching Model for Autonomous On-Demand Services. 322-333 - Xiaojun Zhang
, Jie Zhao
, Chunxiang Xu
, Huaxiong Wang
, Yuan Zhang
:
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage. 334-345 - Ding Ding
, Kyuho Jeong, Shuning Xing
, Mauro Conti
, Renato Figueiredo
, Fangai Liu
:
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships. 346-360 - Yu-Fan Liu, Kate Ching-Ju Lin
, Chien-Chao Tseng
:
Dynamic Cluster-Based Flow Management for Software Defined Networks. 361-371 - Kaneez Fizza
, Nitin Auluck
, Akramul Azim
:
Improving the Schedulability of Real-Time Tasks Using Fog Computing. 372-385 - Christian Cabrera
, Siobhán Clarke
:
A Self-Adaptive Service Discovery Model for Smart Cities. 386-399 - Zhizhong Liu
, Quan Z. Sheng
, Xiaofei Xu, Dianhui Chu, Wei Emma Zhang
:
Context-Aware and Adaptive QoS Prediction for Mobile Edge Computing Services. 400-413 - Aqun Zhao
, Zhiyu Liu, Jianping Pan
, Mangui Liang
:
A Novel Addressing and Routing Architecture for Cloud-Service Datacenter Networks. 414-428 - Massimo La Morgia
, Alessandro Mei
, Eugenio Nerio Nemmi
, Simone Raponi
, Julinda Stefa:
Nationality and Geolocation-Based Profiling in the Dark(Web). 429-441 - Haoran Yuan
, Xiaofeng Chen
, Jin Li
, Tao Jiang
, Jianfeng Wang
, Robert H. Deng
:
Secure Cloud Data Deduplication with Efficient Re-Encryption. 442-456 - Lifang Ren
, Wenjian Wang
:
A Granular SVM-Based Method for Top-N Web Services Recommendation. 457-469 - Asif Iqbal Middya
, Benay Kumar Ray, Sarbani Roy
:
Auction-Based Resource Allocation Mechanism in Federated Cloud Environment: TARA. 470-483 - Pengcheng Zhang
, Huiying Jin
, Hai Dong
, Wei Song
:
M-BSRM: Multivariate BayeSian Runtime QoS Monitoring Using Point Mutual Information. 484-497 - Qinya Li
, Fan Wu
, Guihai Chen
:
An Efficient, Fair, and Robust Image Pricing Mechanism for Crowdsourced 3D Reconstruction. 498-512 - Bin Cao
, Jiaxing Wang
, Jing Fan, Shuiguang Deng
, Jian Yang
, Weiliang Zhao
, Jianwei Yin, Mengchu Zhou
:
ProDiff: A Process Difference Detection Method Based on Hierarchical Decomposition. 513-526 - Farshad Mashhadi
, Sergio A. Salinas Monroy
:
Economically-Robust Dynamic Control of the Additive Manufacturing Cloud. 527-538 - Zhiyu Hao, Wei Wang
, Lei Cui
, Xiaochun Yun, Zhenquan Ding:
iConSnap: An Incremental Continuous Snapshots System for Virtual Machines. 539-550 - Yanzhao Wu
, Ling Liu
, Calton Pu
, Wenqi Cao
, Semih Sahin, Wenqi Wei
, Qi Zhang
:
A Comparative Measurement Study of Deep Learning as a Service Framework. 551-566 - Lei Zhang
, Hu Xiong
, Qiong Huang
, Jiguo Li
, Kim-Kwang Raymond Choo
, Jiangtao Li
:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. 567-587
Volume 15, Number 2, March - April 2022
- Andrzej Goscinski
, Elisa Bertino, Shangguang Wang
:
Guest Editor's Introduction: Special Section on EdgeAI as a Service. 588-590 - Peiying Lin
, Zhichen Shi, Zheng Xiao
, Cen Chen
, Kenli Li
:
Latency-Driven Model Placement for Efficient Edge Intelligence Service. 591-601 - Ivan Lujic
, Vincenzo De Maio
, Srikumar Venugopal, Ivona Brandic
:
SEA-LEAP: Self-Adaptive and Locality-Aware Edge Analytics Placement. 602-613 - Jianxin Zhao
, Rui Han
, Yongkai Yang, Benjamin Catterall, Chi Harold Liu
, Lydia Y. Chen
, Richard Mortier, Jon Crowcroft
, Liang Wang
:
Federated Learning With Heterogeneity-Aware Probabilistic Synchronous Parallel on Edge. 614-626 - Chaofeng Zhang
, Mianxiong Dong
, Kaoru Ota
:
Employ AI to Improve AI Services : Q-Learning Based Holistic Traffic Control for Distributed Co-Inference in Deep Learning. 627-639 - Min Xue, Huaming Wu
, Guang Peng
, Katinka Wolter
:
DDPQN: An Efficient DNN Offloading Strategy in Local-Edge-Cloud Collaborative Environments. 640-655 - Dionysis Athanasopoulos
, Dewei Liu
:
AI Back-End as a Service for Learning Switching of Mobile Apps Between the Fog and the Cloud. 656-668 - Zheyuan Hu
, Jianwei Niu
, Tao Ren
, Bin Dai
, Qingfeng Li
, Mingliang Xu
, Sajal K. Das
:
An Efficient Online Computation Offloading Approach for Large-Scale Mobile Edge Computing via Deep Reinforcement Learning. 669-683 - Lanlan Rui
, Xushan Chen
, Xiaomei Wang
, Zhipeng Gao, Xuesong Qiu
, Shangguang Wang
:
Multiservice Reliability Evaluation Algorithm Considering Network Congestion and Regional Failure Based on Petri Net. 684-697 - Mohammad Allahbakhsh
, Haleh Amintoosi
, Aleksandar Ignjatovic, Elisa Bertino
:
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations. 698-709 - Xiangyu Wang
, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Ruikang Yang
:
Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing. 710-723 - Yang Chen
, Wenmin Li
, Fei Gao
, Qiaoyan Wen
, Hua Zhang
, Huawei Wang
:
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. 724-735 - Chang-Ai Sun
, Hepeng Dai
, Guan Wang, Dave Towey
, Tsong Yueh Chen
, Kai-Yuan Cai:
Dynamic Random Testing of Web Services: A Methodology and Evaluation. 736-751 - Qi Mo
, Wei Song
, Fei Dai
, Leilei Lin, Tong Li
:
Development of Collaborative Business Processes: A Correctness Enforcement Approach. 752-765 - Weiwei Lin
, Wentai Wu
, Ligang He
:
An On-Line Virtual Machine Consolidation Strategy for Dual Improvement in Performance and Energy Conservation of Server Clusters in Cloud Data Centers. 766-777 - Teng Wang
, Xinyu Yang
, Xuebin Ren
, Wei Yu
, Shusen Yang
:
Locally Private High-Dimensional Crowdsourced Data Release Based on Copula Functions. 778-792 - Di Wu
, Qiang He
, Xin Luo
, Mingsheng Shang
, Yi He
, Guoyin Wang
:
A Posterior-Neighborhood-Regularized Latent Factor Model for Highly Accurate Web Service QoS Prediction. 793-805 - Chuan Zhang
, Liehuang Zhu
, Chang Xu
, Kashif Sharif
, Kai Ding
, Ximeng Liu
, Xiaojiang Du
, Mohsen Guizani
:
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET. 806-818 - Beiqing Chen
, Haihang Zhou, Jianguo Yao
, Haibing Guan:
RESERVE: An Energy-Efficient Edge Cloud Architecture for Intelligent Multi-UAV. 819-832 - Haoyu Luo
, Xiao Liu
, Jin Liu
, Yun Yang
, John C. Grundy
:
Runtime Verification of Business Cloud Workflow Temporal Conformance. 833-846 - Yuanning Gao
, Xiaofeng Gao
, Xianyue Li, Bin Yao
, Guihai Chen:
An Embedded GRASP-VNS based Two-Layer Framework for Tour Recommendation. 847-859 - Mutaz Barika
, Saurabh Kumar Garg
, Andrew Chan
, Rodrigo N. Calheiros
:
Scheduling Algorithms for Efficient Execution of Stream Workflow Applications in Multicloud Environments. 860-875 - Andrei Palade
, Siobhán Clarke
:
Collaborative Agent Communities for Resilient Service Composition in Mobile Environments. 876-890 - Xiaoping Li
, Wei Yu
, Rubén Ruiz
, Jie Zhu
:
Energy-Aware Cloud Workflow Applications Scheduling With Geo-Distributed Data. 891-903 - Faruk Hasic
, Johannes De Smedt
, Seppe vanden Broucke
, Estefanía Serral
:
Decision as a Service (DaaS): A Service-Oriented Architecture Approach for Decisions in Processes. 904-917 - Haozhe Lin
, Yushun Fan
, Jia Zhang
, Bing Bai
:
MSP-RNN: Multi-Step Piecewise Recurrent Neural Network for Predicting the Tendency of Services Invocation. 918-930 - Jia Wang, Xiaoping Li
, Rubén Ruiz
, Jie Yang, Dianhui Chu
:
Energy Utilization Task Scheduling for MapReduce in Heterogeneous Clusters. 931-944 - Manuel Parra-Royon
, Ghislain Atemezing
, José Manuel Benítez
:
Semantics of Data Mining Services in Cloud Computing. 945-955 - Evagoras Makridis
, Kyriakos M. Deliparaschos
, Evangelia Kalyvianaki, Argyrios C. Zolotas
, Themistoklis Charalambous
:
Robust Dynamic CPU Resource Provisioning in Virtualized Servers. 956-969 - Zheng Xiao
, Gang Liu, Dan He
, Yang Guo, Jiayi Du
:
Concurrent Request Multiplexing for Cloud Composite Service Reservation. 970-985 - Xiao Pan
, Shili Nie, Haibo Hu
, Philip S. Yu
, Jingfeng Guo:
Reverse Nearest Neighbor Search in Semantic Trajectories for Location-Based Services. 986-999 - Pingpeng Yuan
, Yujie You, Shuang Zhou, Hai Jin
, Ling Liu
:
Providing Fast Reachability Query Services With MGTag: A Multi-Dimensional Graph Labeling Method. 1000-1011 - Yunling Wang
, Shifeng Sun, Jianfeng Wang
, Joseph K. Liu
, Xiaofeng Chen
:
Achieving Searchable Encryption Scheme With Search Pattern Hidden. 1012-1025 - Siyu Zhao
, Rui Jiang
, Bharat K. Bhargava
:
RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage. 1026-1035 - Payal Chaudhari
, Manik Lal Das
:
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption. 1036-1044 - John Ravan
, Shankar M. Banik
, Csilla Farkas:
Ensuring Consistent Transactions in a Web Service Environment With Prediction-Based Performance Metrics. 1045-1058 - Tooba Aamir
, Hai Dong
, Athman Bouguettaya
:
Social-Sensor Composition for Tapestry Scenes. 1059-1073 - An Song
, Wei-Neng Chen
, Xiaonan Luo
, Zhi-Hui Zhan
, Jun Zhang
:
Scheduling Workflows With Composite Tasks: A Nested Particle Swarm Optimization Approach. 1074-1088 - Gary White
, Siobhán Clarke
:
Short-Term QoS Forecasting at the Edge for Reliable Service Applications. 1089-1102 - Pengcheng Zhang
, Huiying Jin
, Hai Dong
, Wei Song
, Athman Bouguettaya
:
Privacy-Preserving QoS Forecasting in Mobile Edge Environments. 1103-1117 - Abubakr O. Al-Abbasi
, Vaneet Aggarwal
:
Joint Information Freshness and Completion Time Optimization for Vehicular Networks. 1118-1129 - Hua Deng
, Zheng Qin
, Qianhong Wu, Zhenyu Guan, Hui Yin
:
Revocable Attribute-Based Data Storage in Mobile Clouds. 1130-1142 - Lamees M. Al Qassem
, Thanos Stouraitis
, Ernesto Damiani
, Ibrahim M. Elfadel
:
FPGAaaS: A Survey of Infrastructures and Systems. 1143-1156 - Kwang Mong Sim
:
Intelligent Resource Management in Intercloud, Fog, and Edge: Tutorial and New Directions. 1157-1174
Volume 15, Number 3, May - June 2022
- Mei-Ling Shyu
, Surya Nepal
, Valérie Issarny
, James Joshi
:
Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics. 1175-1177 - Xinyan Li, Han Wang
, Chunyang Chen
, John Grundy
:
An Empirical Study on How Well Do COVID-19 Information Dashboards Service Users' Information Needs. 1178-1192 - Carmela Comito
:
How COVID-19 Information Spread in U.S.? The Role of Twitter as Early Indicator of Epidemics. 1193-1205 - Xiaolong Xu
, Hao Tian
, Xuyun Zhang
, Lianyong Qi
, Qiang He
, Wanchun Dou
:
DisCOV: Distributed COVID-19 Detection on X-Ray Images With Edge-Cloud Collaboration. 1206-1219 - Javier Andreu-Perez
, Humberto Pérez Espinosa
, Eva Timonet
, Mehrin Kiani, Manuel I. Girón-Pérez, Alma B. Benitez-Trinidad, Delaram Jarchi
, Alejandro Rosales-Pérez
, Nick Gatzoulis, Orion Fausto Reyes-Galaviz
, Alejandro Antonio Torres García, Carlos A. Reyes García, Zulfiqar Ali, Francisco Rivas:
A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels. 1220-1232 - Shantanu Sharma
, Sharad Mehrotra, Nisha Panwar
, Nalini Venkatasubramanian, Peeyush Gupta
, Shanshan Han, Guoxi Wang:
Quest: Privacy-Preserving Monitoring of Network Data: A System for Organizational Response to Pandemics. 1233-1250 - Saiful Khan
, Phong Hai Nguyen
, Alfie Abdul-Rahman
, Euan Freeman
, Cagatay Turkay
, Min Chen
:
Rapid Development of a Data Visualization Service in an Emergency Response. 1251-1264 - Jen-Sheng Tsai
, I-Hsun Chuang
, Jie-Jyun Liu, Yau-Hwang Kuo
, Wanjiun Liao
:
QoS-Aware Fog Service Orchestration for Industrial Internet of Things. 1265-1279 - Abdallah Lakhdari
, Athman Bouguettaya
, Sajib Mistry
, Azadeh Ghari Neiat
:
Composing Energy Services in a Crowdsourced IoT Environment. 1280-1294 - Jisheng Pei
, Lijie Wen
, Xiaojun Ye
, Akhil Kumar
:
Efficient Transition Adjacency Relation Computation for Process Model Similarity. 1295-1308 - Xiaorui Wu
, Hong Xu
, Bo Li
, Yongqiang Xiong
:
Stanza: Layer Separation for Distributed Training in Deep Learning. 1309-1320 - Hang Xu
, Lifang Ren
, Wenjian Wang
:
A Service Selection Method Based on Ordinal Classification for Historical Records. 1321-1333 - Hao Wu
, Xin Luo
, MengChu Zhou
:
Advancing Non-Negative Latent Factorization of Tensors With Diversified Regularization Schemes. 1334-1344 - Xiaolin Chang
, Yu Shi, Zhenjiang Zhang
, Zhen Xu, Kishor S. Trivedi
:
Job Completion Time Under Migration-Based Dynamic Platform Technique. 1345-1357 - Yandong Zheng
, Rongxing Lu
, Jun Shao
, Fan Yin
, Hui Zhu
:
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud. 1358-1370 - Guangshun Yao
, Qian Ren
, Xiaoping Li
, Shenghui Zhao, Rubén Ruiz
:
A Hybrid Fault-Tolerant Scheduling for Deadline-Constrained Tasks in Cloud Systems. 1371-1384 - Yifan Yang
, Daniel Cooper, John P. Collomosse
, Constantin Catalin Dragan
, Mark Manulis
, Jamie Steane
, Arthi Manohar
, Jo Briggs
, Helen S. Jones
, Wendy Moncur
:
TAPESTRY: A De-Centralized Service for Trusted Interaction Online. 1385-1398 - Meng Ma
, Weilan Lin, Disheng Pan, Ping Wang
:
Self-Adaptive Root Cause Diagnosis for Large-Scale Microservice Architecture. 1399-1410 - Jiechao Gao
, Haoyu Wang
, Haiying Shen
:
Task Failure Prediction in Cloud Data Centers Using Deep Learning. 1411-1422 - Yong-Yi Fanjiang
, Yang Syu
, Wei-Lun Huang:
Time Series QoS Forecasting for Web Services Using Multi-Predictor-Based Genetic Programming. 1423-1435 - Juanjuan Li
, Xiaochun Ni, Yong Yuan
, Fei-Yue Wang
:
A Novel GSP Auction Mechanism for Dynamic Confirmation Games on Bitcoin Transactions. 1436-1447 - Muhammad Abdullah
, Waheed Iqbal
, Josep Lluis Berral
, Jorda Polo
, David Carrera
:
Burst-Aware Predictive Autoscaling for Containerized Microservices. 1448-1460 - Shaohan Feng
, Zehui Xiong
, Dusit Niyato
, Ping Wang
, Shaun Shuxun Wang, Xuemin Sherman Shen
:
Joint Pricing and Security Investment in Cloud Security Service Market With User Interdependency. 1461-1472 - Mingjin Gao, Rujing Shen
, Jun Li, Shihao Yan
, Yonghui Li
, Jinglin Shi, Zhu Han
, Li Zhuo
:
Computation Offloading With Instantaneous Load Billing for Mobile Edge Computing. 1473-1485 - Mohammad Allahbakhsh
, Haleh Amintoosi
, Behshid Behkamal
, Salil S. Kanhere
, Elisa Bertino
:
AQA: An Adaptive Quality Assessment Framework for Online Review Systems. 1486-1497 - Masoud Barati
, Omer F. Rana
:
Tracking GDPR Compliance in Cloud-Based Service Delivery. 1498-1511 - Jiadi Liu
, Songtao Guo
, Kai Liu
, Liang Feng
:
Resource Provision and Allocation Based on Microeconomic Theory in Mobile Edge Computing. 1512-1525 - Shuo Wang
, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
, Shangyu Chen, Tianle Chen:
Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models. 1526-1539 - Sudip Misra
, Robert Schober, Aishwariya Chakraborty
:
RACE: QoI-Aware Strategic Resource Allocation for Provisioning Se-aaS. 1540-1550 - Junqi Zhang
, Yushun Fan
, Jia Zhang
, Bing Bai
:
Learning to Build Accurate Service Representations and Visualization. 1551-1563 - Cristina Cabanillas
, Manuel Resinas
, Antonio Ruiz-Cortés
:
A Mashup-Based Framework for Business Process Compliance Checking. 1564-1577 - Bowen Fei
, Xiaomin Zhu
, Daqian Liu
, Junjie Chen, Weidong Bao
, Ling Liu
:
Elastic Resource Provisioning Using Data Clustering in Cloud Service Platform. 1578-1591 - Ehab Zaghloul
, Tongtong Li
, Matt W. Mutka
, Jian Ren
:
$d$d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. 1592-1605 - Zhuoran Ma
, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Ruikang Yang
, Xiangyu Wang
:
Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing. 1606-1618 - Jianting Ning
, Jiageng Chen
, Kaitai Liang
, Joseph K. Liu
, Chunhua Su
, Qianhong Wu
:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. 1619-1633 - Muhammad Zakarya
, Lee Gillam
, Hashim Ali
, Izaz Ur Rahman
, Khaled Salah
, Rahim Khan
, Omer F. Rana
, Rajkumar Buyya
:
epcAware: A Game-Based, Energy, Performance and Cost-Efficient Resource Management Technique for Multi-Access Edge Computing. 1634-1648 - Bei Wang, Ling Xu, Meng Yan, Chao Liu, Ling Liu:
Multi-Dimension Convolutional Neural Network for Bug Localization. 1649-1663 - Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Rongmao Chen
, Xixiang Lv
:
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. 1664-1677 - Xiaojuan Dong
, Weiming Zhang
, Mohsin Shah
, Bei Wang
, Nenghai Yu
:
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud. 1678-1692 - Cui-Yu Kong
, Bhaskar Prasad Rimal
, Martin Reisslein
, Martin Maier
, Islam Safak Bayram
, Michael Devetsikiotis
:
Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion. 1693-1706 - Jian Shen
, Tiantian Miao, Jin-Feng Lai
, Xiaofeng Chen
, Jin Li
, Shui Yu
:
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems. 1707-1719 - Aishwariya Chakraborty
, Sudip Misra
, Ayan Mondal
:
QoS-Aware Dynamic Cost Management Scheme for Sensors-as-a-Service. 1720-1731 - Hailiang Zhao
, Shuiguang Deng
, Zijie Liu
, Jianwei Yin, Schahram Dustdar
:
Distributed Redundant Placement for Microservice-based Applications at the Edge. 1732-1745 - Bo Li
, Qiang He
, Guangming Cui
, Xiaoyu Xia
, Feifei Chen
, Hai Jin
, Yun Yang
:
READ: Robustness-Oriented Edge Application Deployment in Edge Computing Environment. 1746-1759
Volume 15, Number 4, July - August 2022
- Xiao Xue
, Zhaojie Chen, Shufang Wang, Zhiyong Feng
, Yucong Duan
, Zhangbing Zhou
:
Value Entropy: A Systematic Evaluation Model of Service Ecosystem Evolution. 1760-1773 - Gregory Levitin
, Liudong Xing
, Yanping Xiang
:
Reliability versus Vulnerability of N-Version Programming Cloud Service Component With Dynamic Decision Time Under Co-Resident Attacks. 1774-1784 - Qiyu Kang
, Wee Peng Tay
:
Task Recommendation in Crowdsourcing Based on Learning Preferences and Reliabilities. 1785-1798 - Qin Liu
, Yu Peng
, Shuyu Pei, Jie Wu
, Tao Peng
, Guojun Wang
:
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search. 1799-1812 - Wei Guo
, Su-Juan Qin
, Fei Gao
, Hua Zhang
, Wenmin Li
, Zhengping Jin
, Qiaoyan Wen
:
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud. 1813-1824 - Sunanda Bose
, Nandini Mukherjee
:
SenSchedule: Scheduling Heterogeneous Resources in Sensor-Cloud Infrastructure. 1825-1840 - Haining Yu
, Xiaohua Jia
, Hongli Zhang
, Jiangang Shu
:
Efficient and Privacy-Preserving Ride Matching Using Exact Road Distance in Online Ride Hailing Services. 1841-1854 - Guoxiu Liu
, Geng Yang
, Shuangjie Bai
, Huaqun Wang, Yang Xiang
:
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data. 1855-1867 - Myeonggyun Han
, Woongki Baek
:
SDRP: Safe, Efficient, and SLO-Aware Workload Consolidation Through Secure and Dynamic Resource Partitioning. 1868-1882 - Zetao Yang
, Kang Liu
, Yufei Chen
, Wuhui Chen
, Mingdong Tang:
Two-Level Stackelberg Game for IoT Computational Resource Trading Mechanism: A Smart Contract Approach. 1883-1895 - Yuming Wang
, Yanbo Long, Lai Tu
, Ling Liu
:
Delivering Scientific Influence Analysis as a Service on Research Grants Repository. 1896-1911 - Maanak Gupta
, James O. Benson
, Farhan Patwa, Ravi S. Sandhu
:
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets. 1912-1925 - Fan Deng
, Zhenhua Yu
, Liyong Zhang, Jiawei Wang, Kexin Feng, Wenbin Kong, Lingyu Li, Jiawen Wu
:
ANNPDP: An Efficient and Stable Evaluation Engine for Large-Scale Policy Sets. 1926-1939 - Guobing Zou
, Zhen Qin
, Qiang He
, Pengwei Wang
, Bofeng Zhang
, Yanglan Gan
:
DeepWSC: Clustering Web Services via Integrating Service Composability into Deep Semantic Features. 1940-1953 - Chandana Roy
, Sudip Misra
, Jhareswar Maiti, Ujjayini Chakravarty
:
Safe-Serv: Energy-Efficient Decision Delivery for Provisioning Safety-as-a-Service. 1954-1966 - Shih Yu Chang
, Hsiao-Chun Wu
:
Divide-and-Iterate Approach to Big Data Systems. 1967-1979 - Guangming Cui
, Qiang He
, Feifei Chen
, Hai Jin
, Yun Yang
:
Trading off Between Multi-Tenancy and Interference: A Service User Allocation Game. 1980-1992 - Xiong Gao
, Weidong Bao
, Xiaomin Zhu
, Guanlin Wu
, Ling Liu
:
An Edge Storage Acceleration Service for Collaborative Mobile Devices. 1993-2006 - Abeer Elahraf, Ayesha Afzal
, Ahmed Akhtar
, Basit Shafiq
, Jaideep Vaidya
, Shafay Shamail
, Nabil R. Adam
:
A Framework for Dynamic Composition and Management of Emergency Response Processes. 2018-2031 - Peng Zhao
, Wei Yu
, Xinyu Yang
, Duolun Meng, Li Wang, Shusen Yang
, Jie Lin
:
Context-Aware Multi-Criteria Handover at the Software Defined Network Edge for Service Differentiation in Next Generation Wireless Networks. 2032-2046 - Changhee Hahn
, Hyunsoo Kwon
, Daeyeong Kim
, Junbeom Hur
:
Enabling Fast Public Auditing and Data Dynamics in Cloud Services. 2047-2059 - Yu Guo
, Hongcheng Xie
, Yinbin Miao
, Cong Wang
, Xiaohua Jia
:
FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain. 2060-2073 - Ying Liu
, Qiang He
, Dequan Zheng, Xiaoyu Xia
, Feifei Chen
, Bin Zhang:
Data Caching Optimization in the Edge Computing Environment. 2074-2085 - Leilei Lin
, Lijie Wen
, Li Lin, Jisheng Pei
, Hedong Yang:
LCDD: Detecting Business Process Drifts Based on Local Completeness. 2086-2099 - Yu Zhao
, Daniel Alencar da Costa, Ying Zou:
Composing Web Services Using a Multi-Agent Framework. 2100-2113 - Jianshe Wu
, Nan Chen, Chaojie Zhou, Hefei Che, Chunlei Han, Qin Liu:
Computing the Number of Loop-Free k-hop Paths of Networks. 2114-2128 - Sheik Mohammad Mostakim Fattah
, Athman Bouguettaya
, Sajib Mistry
:
Long-Term IaaS Selection Using Performance Discovery. 2129-2143 - Cem Tekin
, Sepehr Elahi
, Mihaela van der Schaar:
Feedback Adaptive Learning for Medical and Educational Application Recommendation. 2144-2157 - Md. Azharul Islam, Sanjay Kumar Madria
:
Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud. 2158-2172 - Sébastien Andreina
, Jens-Matthias Bohli, Ghassan O. Karame
, Wenting Li
, Giorgia Azzurra Marson
:
PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains. 2173-2187 - Mengmeng Yang
, Ivan Tjuawinata
, Kwok-Yan Lam
, Jun Zhao
, Lin Sun:
Secure Hot Path Crowdsourcing With Local Differential Privacy Under Fog Computing Architecture. 2188-2201 - Yumei Li
, Futai Zhang
, Xin Liu
:
Secure Data Delivery With Identity-Based Linearly Homomorphic Network Coding Signature Scheme in IoT. 2202-2212 - Li Kong
, Chuanyi Li
, Jidong Ge
, Vincent Ng, Bin Luo:
Predicting Product Review Helpfulness - A Hybrid Method. 2213-2225 - Qingxuan Wang
, Chi Cheng
, Rui Xu, Jintai Ding
, Zhe Liu
:
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification. 2226-2231 - Ranjana Roy Chowdhury, Soumi Chattopadhyay
, Chandranath Adak
:
CAHPHF: Context-Aware Hierarchical QoS Prediction With Hybrid Filtering. 2232-2247 - Jian-Jhih Kuo
, Chih-Hang Wang
, Yishuo Shi
, De-Nian Yang
, Wen-Tsuen Chen
:
Scalable Rate Allocation for SDN With Diverse Service Requirements. 2248-2260 - Zonghang Li
, Huaman Zhou, Tianyao Zhou, Hongfang Yu
, Zenglin Xu
, Gang Sun
:
ESync: Accelerating Intra-Domain Federated Learning in Heterogeneous Data Centers. 2261-2274 - Avadh Kishor
, Rajdeep Niyogi
, Bharadwaj Veeravalli
:
Fairness-Aware Mechanism for Load Balancing in Distributed Systems. 2275-2288 - Suyel Namasudra
:
Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment. 2289-2300 - Lei Wang
, Qiang He
, Demin Gao
, Jing Wan, Yunqiu Zhang:
Temporal-Perturbation Aware Reliability Sensitivity Measurement for Adaptive Cloud Service Selection. 2301-2313 - Youhao Xia
, Ding Ding
, Zhenhua Chang
, Fan Li:
Joint Deep Networks Based Multi-Source Feature Learning for QoS Prediction. 2314-2327 - Shiva Kazemi Taskou
, Mehdi Rasti
, Pedro H. J. Nardelli
:
Energy and Cost Efficient Resource Allocation for Blockchain-Enabled NFV. 2328-2341 - Alberto Martin-Lopez
, Sergio Segura
, Carlos Müller
, Antonio Ruiz-Cortés
:
Specification and Automated Analysis of Inter-Parameter Dependencies in Web APIs. 2342-2355 - Md. Enamul Haque
, Mehmet Engin Tozal
:
Identifying Health Insurance Claim Frauds Using Mixture of Clinical Concepts. 2356-2367 - Shaoshuai Ding, Lei Yang
, Jiannong Cao
, Wei Cai
, Mingkui Tan
, Zhenyu Wang:
Partitioning Stateful Data Stream Applications in Dynamic Edge Cloud Environments. 2368-2381 - Vincenzo Pasquadibisceglie
, Annalisa Appice
, Giovanna Castellano
, Donato Malerba
:
A Multi-View Deep Learning Approach for Predictive Business Process Monitoring. 2382-2395 - Mohammed Bahutair
, Athman Bouguettaya
, Azadeh Ghari Neiat
:
Multi-Perspective Trust Management Framework for Crowdsourced IoT Services. 2396-2409 - Onur Ascigil
, Argyrios G. Tasiopoulos, Truong Khoa Phan
, Vasilis Sourlas
, Ioannis Psaras, George Pavlou
:
Resource Provisioning and Allocation in Function-as-a-Service Edge-Clouds. 2410-2424 - Wei Song
, Fangfei Chen, Hans-Arno Jacobsen
, Chengzhen Zhang:
Identifying a Minimum Sequence of High-Level Changes Between Workflows. 2425-2438 - Seyyed Hamid Ghafouri
, Seyyed Mohsen Hashemi
, Patrick C. K. Hung
:
A Survey on Web Service QoS Prediction Methods. 2439-2454 - Zibin Zheng
, Xiaoli Li
, Mingdong Tang
, Fenfang Xie
, Michael R. Lyu:
Web Service QoS Prediction via Collaborative Filtering: A Survey. 2455-2472 - Paolo Ceravolo
, Gabriel Marques Tavares
, Sylvio Barbon Junior
, Ernesto Damiani
:
Evaluation Goals for Online Process Mining: A Concept Drift Perspective. 2473-2489 - Jiewu Leng
, Man Zhou, J. Leon Zhao, Yongfeng Huang
, Yiyang Bian
:
Blockchain Security: A Survey of Techniques and Research Directions. 2490-2510
Volume 15, Number 5, September - October 2022
- Imed Abbassi
, Amel Mammar
, Mohamed Graiet:
A Correct-by-Construction Model for Verifying Transactional Composite Services Configuration. 2511-2525 - Ilir Murturi
, Schahram Dustdar
:
A Decentralized Approach for Resource Discovery using Metadata Replication in Edge Networks. 2526-2537 - Azadeh Ghari Neiat
, Athman Bouguettaya
, Mohammed Bahutair
:
A Deep Reinforcement Learning Approach for Composing Moving IoT Services. 2538-2550 - Huiying Hou
, Jianting Ning
, Yunlei Zhao
, Robert H. Deng
:
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs. 2551-2564 - Fan Li
, Gary White
, Siobhán Clarke
:
A Trust Model for SLA Negotiation Candidates Selection in a Dynamic IoT Environment. 2565-2578 - Xi Liu
, Jun Liu
:
A Truthful Double Auction Mechanism for Multi-Resource Allocation in Crowd Sensing Systems. 2579-2590 - Yan Wang
, Jiantao Zhou, Xiaoyu Song:
A Utility Game Driven QoS Optimization for Cloud Services. 2591-2603 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data. 2604-2618 - Usama Ahmed
, Imran Raza
, Omer F. Rana
, Syed Asad Hussain
:
Aggregated Capability Assessment (AgCA) For CAIQ Enabled Cross-cloud Federation. 2619-2632 - Jinyong Chang
, Bilin Shao, Yanyan Ji
, Genqing Bian:
Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage". 2633-2634 - Xiaoyu Xia
, Feifei Chen
, John C. Grundy
, Mohamed Abdelrazek
, Hai Jin
, Qiang He
:
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment. 2635-2647 - Mohammad Belayet Hossain
, Iynkaran Natgunanathan
, Yong Xiang
, Yushu Zhang
:
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices. 2648-2657 - Jianchang Lai
, Fuchun Guo
, Willy Susilo
, Xinyi Huang
, Peng Jiang
, Futai Zhang
:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. 2658-2670 - Hani Sami
, Azzam Mourad
, Hadi Otrok
, Jamal Bentahar
:
Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement. 2671-2684 - Ali Hamdi
, Flora D. Salim
, Du Yong Kim
, Azadeh Ghari Neiat
, Athman Bouguettaya
:
Drone-as-a-Service Composition Under Uncertainty. 2685-2698 - Phu Lai
, Qiang He
, Xiaoyu Xia
, Feifei Chen
, Mohamed Abdelrazek
, John C. Grundy
, John G. Hosking
, Yun Yang
:
Dynamic User Allocation in Stochastic Mobile Edge Computing Systems. 2699-2712 - Christos Tsigkanos
, Marcello M. Bersani
, Pantelis A. Frangoudis
, Schahram Dustdar
:
Edge-Based Runtime Verification for the Internet of Things. 2713-2727 - Xu Yang
, Xun Yi
, Surya Nepal
, Ibrahim Khalil
, Xinyi Huang, Jian Shen
:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. 2728-2741 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare. 2742-2754 - Fengqi Li
, Kemeng Liu, Lupeng Zhang, Sikai Huang, Qiufan Wu:
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem. 2755-2765 - Biao Hu
, Zhengcai Cao
, MengChu Zhou
:
Energy-minimized Scheduling of Real-time Parallel Workflows on Heterogeneous Distributed Computing Systems. 2766-2779 - Shashika Ranga Muramudalige
, Benjamin W. K. Hung
, Anura P. Jayasumana
, Indrakshi Ray
, Jytte Klausen:
Enhancing Investigative Pattern Detection via Inexact Matching and Graph Databases. 2780-2794 - Yunguo Guan
, Hui Zheng, Jun Shao
, Rongxing Lu
, Guiyi Wei
:
Fair Outsourcing Polynomial Computation Based on the Blockchain. 2795-2808 - Xin Luo
, Yue Zhou, Zhigang Liu
, Lun Hu
, MengChu Zhou
:
Generalized Nesterov's Acceleration-Incorporated, Non-Negative and Adaptive Latent Factor Analysis. 2809-2823 - Maycon Leone Maciel Peixoto
, Thiago A. L. Genez, Luiz F. Bittencourt
:
Hierarchical Scheduling Mechanisms in Multi-Level Fog Computing. 2824-2837 - Lingyun Jiang, Xiaofu Niu, Jia Xu, Dejun Yang
, Lijie Xu:
Incentive Mechanism Design for Truth Discovery in Crowdsourcing With Copiers. 2838-2853 - Marco Rasori
, Pericle Perazzo
, Gianluca Dini
, Shucheng Yu
:
Indirect Revocable KP-ABE With Revocation Undoing Resistance. 2854-2868 - Jaydeep Das
, Shreya Ghosh
, Soumya K. Ghosh
, Rajkumar Buyya
:
LYRIC: Deadline and Budget Aware Spatio-Temporal Query Processing in Cloud. 2869-2882 - Zan Zong
, Lijie Wen
, Xuming Hu
, Rui Han
, Chen Qian
, Li Lin:
MespaConfig: Memory-Sparing Configuration Auto-Tuning for Co-Located In-Memory Cluster Computing Jobs. 2883-2896 - Quyuan Luo
, Changle Li
, Tom H. Luan
, Weisong Shi
:
Minimizing the Delay and Cost of Computation Offloading for Vehicular Edge Computing. 2897-2909 - Mincheol Kim
, Ling Liu
, Wonik Choi
:
Multi-GPU Efficient Indexing For Maximizing Parallelism of High Dimensional Range Query Services. 2910-2924 - Mohamed Yassin
, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb:
Multi-Tenant Intrusion Detection Framework as a Service for SaaS. 2925-2938 - Soheila Sadeghiram
, Hui Ma
, Gang Chen
:
Priority-Based Selection of Individuals in Memetic Algorithms for Distributed Data-Intensive Web Service Compositions. 2939-2953 - Xiaoguo Li
, Tao Xiang
, Shangwei Guo
, Hongwei Li
, Yi Mu
:
Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data. 2954-2968 - Miao Hu
, Di Wu
, Run Wu, Zhenkai Shi
, Min Chen
, Yipeng Zhou
:
RAP: A Light-Weight Privacy-Preserving Framework for Recommender Systems. 2969-2981 - Cosmin Avasalcai
, Christos Tsigkanos
, Schahram Dustdar
:
Resource Management for Latency-Sensitive IoT Applications With Satisfiability. 2982-2993 - Minghui Liwang
, Ruitao Chen
, Xianbin Wang
:
Resource Trading in Edge Computing-Enabled IoV: An Efficient Futures-Based Approach. 2994-3007 - Abdulhamid Adebayo, Danda B. Rawat
:
Scalable Service-Driven Database-Enabled Wireless Network Virtualization for Robust RF Sharing. 3008-3018 - Leyou Zhang
, Wenting You
, Yi Mu
:
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems. 3019-3030 - Kaustabha Ray
, Ansuman Banerjee
, Swarup Kumar Mohalik
:
Service Selection With Package Bundles and Compatibility Constraints. 3031-3046 - Ruitao Chen
, Xianbin Wang
, Xue (Steve) Liu
:
Smart Futures Based Resource Trading and Coalition Formation for Real-Time Mobile Data Processing. 3047-3060 - E. Chen
, Bohan Qin
, Yan Zhu
, Weijing Song, Shengdian Wang, William Cheng-Chung Chu
, Stephen S. Yau:
SPESC-Translator: Towards Automatically Smart Legal Contract Conversion for Blockchain-Based Auction Services. 3061-3076 - Haithem Mezni
:
Temporal Knowledge Graph Embedding for Effective Service Recommendation. 3077-3088 - Yi-Wei Ci
, Xiao-Ke Zhao, Yan-Peng Li, Zibin Zheng
:
Virtdev: Towards Providing Edge Services. 3089-3100
Volume 15, Number 6, November - December 2022
- Ron van der Meyden
:
A Formal Treatment of Contract Signature. 3101-3114 - Endong Tong
, Wenjia Niu, Jiqiang Liu:
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering. 3115-3128 - Linfeng Liu
, Zhiyuan Xi, Jiagao Wu, Jia Xu
:
Adaptive Data Dissemination Algorithm Based on Storing-Discarding Equilibrium for OUSNs. 3129-3142 - Meiyan Xiao
, Qiong Huang
, Ying Miao, Shunpeng Li, Willy Susilo
:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. 3143-3155 - Zhipeng Zhang
, Mianxiong Dong
, Kaoru Ota
, Yao Zhang, Yasuo Kudo
:
Context-Enhanced Probabilistic Diffusion for Urban Point-of-Interest Recommendation. 3156-3169 - Qi Gu
, Jian Cao
, Yancen Liu:
CSBR: A Compositional Semantics-Based Service Bundle Recommendation Approach for Mashup Development. 3170-3183 - Shuo Wang
, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
, Shangyu Chen, Tianle Chen, Zike An:
Defending Adversarial Attacks via Semantic Feature Manipulation. 3184-3197 - Nazim Uddin Sheikh
, Hassan Jameel Asghar
, Farhad Farokhi
, Mohamed Ali Kâafar
:
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters. 3198-3209 - Ning Huang, Lihui Wu, Weigang Wu
, Sajal K. Das
:
DTC: A Dynamic Transaction Chopping Technique for Geo-Replicated Storage Services. 3210-3223 - Yu Chen, Jiguo Li
, Chengdong Liu, Jinguang Han
, Yichen Zhang, Peng Yi
:
Efficient Attribute Based Server-Aided Verification Signature. 3224-3232 - Guangming Cui
, Qiang He
, Bo Li
, Xiaoyu Xia
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Efficient Verification of Edge Data Integrity in Edge Computing Environment. 3233-3244 - Md. Al Maruf
, Anil Singh
, Akramul Azim
, Nitin Auluck
:
Faster Fog Computing Based Over-the-Air Vehicular Updates: A Transfer Learning Approach. 3245-3259 - Pei Ren
, Xiuquan Qiao
, Yakun Huang
, Ling Liu, Calton Pu
, Schahram Dustdar
:
Fine-Grained Elastic Partitioning for Distributed DNN Towards Mobile Web AR Services in the 5G Era. 3260-3274 - Wai-Kong Lee
, Seong Oun Hwang
:
High Throughput Implementation of Post-Quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications. 3275-3288 - Erhe Yang
, Fei Hao
, Yixuan Yang
, Carmen De Maio, Aziz Nasridinov
, Geyong Min
, Laurence T. Yang
:
Incremental Entity Summarization With Formal Concept Analysis. 3289-3303 - Zhongwei Xie
, Ling Liu
, Yanzhao Wu
, Lin Li
, Luo Zhong:
Learning TFIDF Enhanced Joint Embedding for Recipe-Image Cross-Modal Retrieval Service. 3304-3316 - Xiaoping Li
, Fuchao Chen, Rubén Ruiz
, Jie Zhu
:
MapReduce Task Scheduling in Heterogeneous Geo-Distributed Data Centers. 3317-3329 - Hao Wu
, Yunhao Duan
, Kun Yue
, Lei Zhang
:
Mashup-Oriented Web API Recommendation via Multi-Model Fusion and Multi-Task Learning. 3330-3343 - Feifei Niu
, Chuanyi Li
, Jidong Ge
, Lijie Wen
, Zhongjin Li
, Bin Luo:
Measuring Business Process Behavioral Similarity Based on Token Log Profile. 3344-3357 - Dragi Kimovski
, Narges Mehran
, Christopher Emanuel Kerth, Radu Prodan
:
Mobility-Aware IoT Application Placement in the Cloud - Edge Continuum. 3358-3371 - Amirali Amiri
, Uwe Zdun
, André van Hoorn
:
Modeling and Empirical Validation of Reliability and Performance Trade-Offs of Dynamic Routing in Service- and Cloud-Based Architectures. 3372-3386 - Wenan Tan
, Lu Zhao
, Bo Li
, Lida Xu
, Yun Yang
:
Multiple Cooperative Task Allocation in Group-Oriented Social Mobile Crowdsensing. 3387-3401 - Lu Zhao
, Wenan Tan
, Bo Li
, Lida Xu
, Yun Yang
:
Multiple Cooperative Task Assignment on Reliability-Oriented Social Crowdsourcing. 3402-3416 - Yuanyuan Zeng
, Shujie Zhou, Kai Xiang
:
Online-Offline Interactive Urban Crowd Flow Prediction Toward IoT-Based Smart City. 3417-3428 - Zhuoran Ma
, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud. 3429-3442 - Qinlong Huang
, Jiabao Du, Guanyu Yan, Yixian Yang
, Qinglin Wei:
Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services. 3443-3456 - Meng Xi
, Jianwei Yin
, Jintao Chen, Ying Li
, Shuiguang Deng
:
Quantitative Assessment of Service Pattern: Framework, Language, and Metrics. 3457-3470 - Dan Tang
, Siqi Zhang
, Yudong Yan
, Jingwen Chen, Zheng Qin
:
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm. 3471-3484 - Zuobin Ying
, Wenjie Jiang, Ximeng Liu
, Shengmin Xu, Robert H. Deng
:
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing. 3485-3498 - Weizhe Zhang
, Desheng Wang
, Shui Yu
, Hui He
, Yan Wang
:
Repeatable Multi-Dimensional Virtual Network Embedding in Cloud Service Platform. 3499-3512 - Sajib Mistry
, Athman Bouguettaya
:
Reputation Bootstrapping for Composite Services Using CP-Nets. 3513-3527 - Chao Li
, Balaji Palanisamy:
SilentDelivery: Practical Timed-Delivery of Private Information Using Smart Contracts. 3528-3540 - Masoumeh Koochak Shooshtari
, Mohammad Reza Aref:
Smooth Projective Hash Function From Codes and its Applications. 3541-3553 - Haojun Huang
, Li Li, Geyong Min
, Wang Miao
, Yingying Zhu
, Yangming Zhao
:
TNDP: Tensor-Based Network Distance Prediction With Confidence Intervals. 3554-3565 - Qingqing Gan
, Xiaoming Wang
, Daxin Huang, Jianwei Li, Dehua Zhou, Chao Wang:
Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing. 3566-3576 - Sheng Gao
, Xiuhua Chen, Jianming Zhu
, Xuewen Dong
, Jianfeng Ma
:
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing. 3577-3590 - Jiayi Li
, Jianfeng Ma
, Yinbin Miao
, Lei Chen, Yunbo Wang, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing. 3591-3605 - Qiuyun Tong
, Yinbin Miao
, Lei Chen, Jian Weng
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings. 3606-3619 - Min Shi
, Yuan Zhuang
, Yufei Tang
, Maohua Lin
, Xingquan Zhu
, Jianxun Liu
:
Web Service Network Embedding Based on Link Prediction and Convolutional Learning. 3620-3633 - Qiufen Xia
, Wenhao Ren
, Zichuan Xu
, Xin Wang
, Weifa Liang
:
When Edge Caching Meets a Budget: Near Optimal Service Delivery in Multi-Tiered Edge Clouds. 3634-3648 - Hao Zheng
, Yanan Jiang, Chen Tian, Long Cheng, Qun Huang
, Weichao Li, Yi Wang, Qianyi Huang, Jiaqi Zheng, Rui Xia, Yi Wang, Wanchun Dou, Guihai Chen:
Rethinking Fine-Grained Measurement From Software-Defined Perspective: A Survey. 3649-3667 - Rui Zhang
, Rui Xue
, Ling Liu
:
Security and Privacy for Healthcare Blockchains. 3668-3686

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.