![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
IEEE Transactions on Services Computing, Volume 17
Volume 17, Number 1, January - February 2024
- Guanglai Guo
, Yan Zhu
, E. Chen
, Stephen S. Yau
:
Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting. 1-17 - Ehsan Nowroozi
, Mohammadreza Mohammadi
, Pargol Golmohammadi, Yassine Mekdad
, Mauro Conti
, A. Selcuk Uluagac
:
Resisting Deep Learning Models Against Adversarial Attack Transferability via Feature Randomization. 18-29 - Shuhui Chu
, Chengxi Gao
, Minxian Xu
, Kejiang Ye
, Zhu Xiao
, Cheng-Zhong Xu
:
Efficient Multi-Task Computation Offloading Game for Mobile Edge Computing. 30-46 - Mohammad Goudarzi
, Maria Alejandra Rodriguez
, Majid Sarvi
, Rajkumar Buyya
:
$\mu$μ-DDRL: A QoS-Aware Distributed Deep Reinforcement Learning Technique for Service Offloading in Fog Computing Environments. 47-59 - Liping Qiao
, Yanping Li
, Yong Ding
, Bo Yang
:
Lightweight and Decentralized Cross-Cloud Auditing With Data Recovery. 60-73 - Kentaroh Toyoda
, Rachel Gan Kai Ying
, Allan NengSheng Zhang
, Puay Siew Tan
:
Identifying the Key Attributes in an Unlabeled Event Log for Automated Process Discovery. 74-81 - Marie Siew
, Shikhar Sharma
, Kun Guo
, Desmond W. H. Cai, Wanli Wen
, Carlee Joe-Wong
, Tony Q. S. Quek
:
Towards Effective Resource Procurement in MEC: A Resource Re-Selling Framework. 82-97 - Hanrui Wu
, Nuosi Li
, Ka Ho Kwok
, Xuheng Cai
, Jia Zhang
, Jinyi Long
, Michael Kwok-Po Ng
:
Feature Matching Machine for Cold-Start Recommendation. 98-112 - Shuaibing Lu
, Jie Wu
, Pengfan Lu, Ning Wang
, Haiming Liu
, Juan Fang
:
QoS-Aware Online Service Provisioning and Updating in Cost-Efficient Multi-Tenant Mobile Edge Computing. 113-126 - Chadni Islam
, Muhammad Ali Babar
, Surya Nepal
:
Design and Generation of a Set of Declarative APIs for Security Orchestration. 127-141 - Cong Liu
, Ying Wang
, Lijie Wen
, Jiujun Cheng
, Long Cheng
, Qingtian Zeng
:
Discovering Hierarchical Multi-Instance Business Processes From Event Logs. 142-155 - Jake Tronge
, Jieyang Chen
, Patricia Grubel
, Tim Randles
, Rusty Davis
, Quincy Wofford
, Steven Anaya
, Qiang Guan
:
An HPC-Container Based Continuous Integration Tool for Detecting Scaling and Performance Issues in HPC Applications. 156-168 - Xiangyu Wang
, Taiyu Ban
, Lyuzhou Chen
, Muhammad Usman
, Yifeng Guan
, Derui Lyu
, Jian Cheng
, Huanhuan Chen
, Cyril Leung
, Chunyan Miao
:
Decentralised Knowledge Graph Evolution via Blockchain. 169-182 - Chinthaka Premachandra
, Yugo Kunisada
:
GAN Based Audio Noise Suppression for Victim Detection at Disaster Sites With UAV. 183-193 - Ángel Ruiz-Zafra
, Janet Pigueiras-del-Real
, Manuel Noguera
, Lawrence Chung
, David Griol Barres
, Kawtar Benghazi
:
Servitization of Customized 3D Assets and Performance Comparison of Services and Microservices Implementations. 194-208 - Peiyun Zhang
, Yutong Chen
, Wenjun Huang
, Haibin Zhu
, Qinglin Zhao
:
Generative-Adversarial-Based Feature Compensation to Predict Quality of Service. 209-223 - Siya Xu
, Jingye Chi
, Shi Wang
, Shaoyong Guo
, Xuesong Qiu
, Luoming Meng
:
AIEC-RSC: AI and Edge Collaboration Empowered Reliable Service Computing for High-Speed Mobile Businesses. 224-236 - Wenqi Wei
, Ka Ho Chow
, Yanzhao Wu
, Ling Liu:
Demystifying Data Poisoning Attacks in Distributed Learning as a Service. 237-250 - Shucun Fu
, Fang Dong
, Dian Shen
, Jinghui Zhang
, Zhaowu Huang
, Qiang He
:
Joint Optimization of Device Selection and Resource Allocation for Multiple Federations in Federated Edge Learning. 251-262 - Puwei Wang
, Haoran Li
, Hang Fu
, Zhouxing Sun
, Jinchuan Chen
, Xiaoyong Du
:
A Blockchain System for QoS Monitoring in Decentralized Edge Computing. 263-276 - Yukai Ping
, He Jiang
, Xingxiang Liu, Zhenyang Zhao
, Zhide Zhou
, Xin Chen
:
Latency-Based Inter-Operator Scheduling for CNN Inference Acceleration on GPU. 277-290 - Yang Yang, Lei Feng, Yao Sun, Yangyang Li, Fanqin Zhou, Wenjing Li, Shangguang Wang:
Decentralized Cooperative Caching and Offloading for Virtual Reality Task Based on GAN-Powered Multi-Agent Reinforcement Learning. 291-305 - Rui Zhu
, Yue Huang
, Ling Liu
, Wei Zhou
, Xuan Zhang
, Yeting Chen, Li Cai:
Business Process Retrieval From Large Model Repositories for Industry 4.0. 306-321 - Baocang Wang
, Yange Chen
, Furong Li
, Jian Song
, Rongxing Lu
, Pu Duan
, Zhihong Tian
:
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys. 322-335 - Wei Mao
, Xingjian Lu
, Yuhui Jiang
, Haikun Zheng
:
Joint Client Selection and Bandwidth Allocation of Wireless Federated Learning by Deep Reinforcement Learning. 336-348
Volume 17, Number 2, March - April 2024
- Linfeng Liu
, Zhipeng Zhang
, Jia Xu
, Ping Wang
:
A Bayesian Game Based Bidding Scheme for Mobile Charging Services in IoEV. 349-363 - Shengmin Xu
, Jianting Ning
, Xiaoguo Li
, Jiaming Yuan
, Xinyi Huang
, Robert H. Deng
:
A Privacy-Preserving and Redactable Healthcare Blockchain System. 364-377 - J. Anju
, R. Shreelekshmi
:
A Secure Image Outsourcing Using Privacy-Preserved Local Color Layout Descriptor in Cloud Environment. 378-391 - Xun Xiao
:
Accelerating Tip Selection in Burst Message Arrivals for DAG-Based Blockchain Systems. 392-405 - Dong Li
, Jiahui Wu
, Junqing Le
, Qingguo Lü, Xiaofeng Liao, Tao Xiang
:
An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud. 406-419 - Weiquan Ni
, Alia Asheralieva
, Jiawen Kang
, Zehui Xiong
, Carsten Maple
, Xuetao Wei
:
An Enhanced Block Validation Framework With Efficient Consensus for Secure Consortium Blockchains. 420-436 - Qing Li
, Shangguang Wang
, Xiao Ma
, Ao Zhou
, Yue Wang
, Gang Huang
, Xuanzhe Liu
:
Battery-Aware Energy Optimization for Satellite Edge Computing. 437-451 - Yue Ma, Xiaofeng Gao
, Shahzad Sarwar Bhatti
, Guihai Chen
:
Clustering Based Priority Queue Algorithm for Spatial Task Assignment in Crowdsourcing. 452-465 - Giovanni Quattrocchi
, Davide Cocco, Simone Staffa, Alessandro Margara
, Gianpaolo Cugola
:
Cromlech: Semi-Automated Monolith Decomposition Into Microservices. 466-481 - Deng Zhao
, Zhangbing Zhou
, Wenbo Zhang
, Shuiguang Deng
, Xiao Xue
, Walid Gaaloul
:
CSTL: Compositional Signal Temporal Logic for Adaptive Edge Service Monitoring. 482-496 - Yihao Yang
, Yunbo Yang
, Xiang Chen
, Xiaolei Dong
, Zhenfu Cao
, Jiachen Shen
:
DMPSI: Efficient Scalable Delegated Multiparty PSI and PSI-CA With Oblivious PRF. 497-508 - Jiahui Li
, Hao Wu
, Qiang He, Yiji Zhao
, Xin Wang
:
Dynamic QoS Prediction With Intelligent Route Estimation Via Inverse Reinforcement Learning. 509-523 - Yandong Zheng
, Rongxing Lu
, Yunguo Guan
, Songnian Zhang
, Jun Shao
, Fengwei Wang
, Hui Zhu
:
EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data. 524-536 - Gepeng Zhu
, Haipeng Yao
, Tianle Mai
, Zunliang Wang
, Di Wu
, Song Guo
:
Fission Spectral Clustering Strategy for UAV Swarm Networks. 537-548 - Feng-Yang Chen, Li-Hsing Yen
:
Incentive-Aware Resource Allocation for Multiple Model Owners in Federated Learning. 549-562 - Yunbo Yang
, Yiwei Hu
, Ruofan Li
, Xiaolei Dong
, Zhenfu Cao
, Jiachen Shen
, Shangmin Dou
:
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI. 563-574 - Di Wu
, Peng Zhang
, Yi He
, Xin Luo
:
MMLF: Multi-Metric Latent Feature Analysis for High-Dimensional and Incomplete Data. 575-588 - Man Zhang
, Xinghua Li
, Yinbin Miao, Bin Luo
, Siqi Ma
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS. 589-603 - Shuaiyu Xie
, Jian Wang
, Bing Li
, Zekun Zhang
, Duantengchuan Li
, Patrick C. K. Hung
:
PBScaler: A Bottleneck-Aware Autoscaling Framework for Microservice-Based Applications. 604-616 - Xingjian Lu
, Haikun Zheng
, Wenyan Liu
, Yuhui Jiang
, Hongyue Wu
:
POP-FL: Towards Efficient Federated Learning on Edge Using Parallel Over-Parameterization. 617-630 - Zhizhong Liu
, Quan Z. Sheng
, Dianhui Chu
, Xiaofei Xu
, Hedan Zheng
, Kai Feng
:
Proactive Recommendation of Composite Services in Multi-Access Edge Computing. 631-644 - Mingyi Liu
, Hanchuan Xu
, Quan Z. Sheng
, Zhongjie Wang
:
QoSGNN: Boosting QoS Prediction Performance With Graph Neural Networks. 645-658 - Wen Huang
, Ganglin Zhang
, Yongjian Liao
, Jian Peng
, Feihu Huang, Julong Yang
:
Secure Neural Network Prediction in the Cloud-Based Open Neural Network Service. 659-673 - Ting Cai
, Wuhui Chen
, Jianting Zhang
, Zibin Zheng
:
SmartChain: A Dynamic and Self-Adaptive Sharding Framework for IoT Blockchain. 674-688 - Cheyma Ben Njima
, Chirine Ghedira Guegan
, Youssef Gamha
, Lotfi Ben Romdhane
:
Web Service Composition in Mobile Environment: A Survey of Techniques. 689-704
Volume 17, Number 3, May - June 2024
- Mingjun Dai
, Zelong Zhang, Ziying Zheng
, Zhonghao Zhang, Xiaohui Lin
, Hui Wang
:
2D-SAZD: A Novel 2D Coded Distributed Computing Framework for Matrix-Matrix Multiplication. 705-717 - Tahiry M. Rabehaja
, Shantanu Pal
, Ambrose Hill
, Michael Hitchens
:
A Blockchain-Based Approach for Parametric Insurance Under Multiple Sources of Truth. 718-732 - Fanghui Bi
, Tiantian He
, Xin Luo
:
A Fast Nonnegative Autoencoder-Based Approach to Latent Feature Analysis on High-Dimensional and Incomplete Data. 733-746 - Guanjie Cheng
, Yewei Wang
, Shuiguang Deng, Zhengzhe Xiang
, Xueqiang Yan
, Peng Zhao, Schahram Dustdar
:
A Lightweight Authentication-Driven Trusted Management Framework for IoT Collaboration. 747-760 - Qinglei Kong
, Xiaodong Qu
, Songnian Zhang
, Feng Yin
, Rongxing Lu
, Bo Chen
:
A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid. 761-775 - Shengmin Xu
, Xingshuo Han
, Guowen Xu
, Jianting Ning
, Xinyi Huang
, Robert H. Deng
:
An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption. 776-788 - Zhenhua Chen
, Luqi Huang
, Guomin Yang
, Willy Susilo
, Xingbing Fu
, Xingxing Jia
:
Attribute-Hiding Fuzzy Encryption for Privacy-Preserving Data Evaluation. 789-803 - Giovanni Quattrocchi
, Emilio Incerto
, Riccardo Pinciroli
, Catia Trubiani
, Luciano Baresi
:
Autoscaling Solutions for Cloud Applications Under Dynamic Workloads. 804-820 - Zhongyun Hua
, Yufei Yao
, Mingyang Song
, Yifeng Zheng
, Yushu Zhang
, Cong Wang
:
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service. 821-835 - Youyang Qu, Shui Yu
, Longxiang Gao, Keshav Sood
, Yong Xiang
:
Blockchained Dual-Asynchronous Federated Learning Services for Digital Twin Empowered Edge-Cloud Continuum. 836-849 - Shize Zhang
, Yunfeng Zhao
, Jianyuan Lu
, Shuai Yang
, Biao Lyu, Shunmin Zhu
, Enhuan Dong
, Zhiliang Wang, Jiahai Yang:
CouldPin-Fast: Effient and Effective Root Cause Localization for Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks. 850-864 - Axin Wu
, Weiqi Luo
, Anjia Yang
, Yinghui Zhang
, Jianhao Zhu
:
Efficient Bilateral Privacy-Preserving Data Collection for Mobile Crowdsensing. 865-877 - Wei Xu
, Hui Zhu
, Yandong Zheng
, Fengwei Wang
, Jiaqi Zhao
, Zhe Liu
, Hui Li
:
ELXGB: An Efficient and Privacy-Preserving XGBoost for Vertical Federated Learning. 878-892 - Yunjiao Song, Xinrui Ge
, Jia Yu
, Rong Hao
, Ming Yang
:
Enabling Privacy-Preserving $K$K-Hop Reachability Query Over Encrypted Graphs. 893-904 - Jiale Zhang
, Mingqian Ma
, Xiaofeng Gao
, Guihai Chen
:
Encoder-Decoder Based Route Generation Model for Flexible Travel Recommendation. 905-920 - Jie Liao
, Wei Zhou
, Fengji Luo
, Junhao Wen
:
Enhancing Disentanglement of Popularity Bias for Recommendation With Triplet Contrastive Learning. 921-933 - Cheng Zhang
, Jianwei Yin
, Shuiguang Deng
:
Ensuring Fairness in Edge Networks: A GNN-Based Media Workload Migration Scheme With Fairness Guarantee. 934-948 - Na Guo
, Cong Liu, Caihong Li, Qingtian Zeng
, Chun Ouyang
, Qingzhi Liu
, Xixi Lu
:
Explainable and Effective Process Remaining Time Prediction Using Feature-Informed Cascade Prediction Model. 949-962 - Guobing Zou
, Wenzhuo Yu
, Shengxiang Hu
, Yanglan Gan, Bofeng Zhang, Yixin Chen
:
FRLN: Federated Residual Ladder Network for Data-Protected QoS Prediction. 963-976 - Xikun Jiang
, Chenhao Ying
, Lei Li
, Boris Düdder
, Haiqin Wu
, Haiming Jin
, Yuan Luo
:
Incentive Mechanism for Uncertain Tasks Under Differential Privacy. 977-989 - Jianfeng Lu
, Haibo Liu
, Riheng Jia
, Zhao Zhang
, Xiong Wang
, Jiangtao Wang
:
Incentivizing Proportional Fairness for Multi-Task Allocation in Crowdsensing. 990-1000 - Tianfu Wang
, Li Shen, Qilin Fan
, Tong Xu
, Tongliang Liu
, Hui Xiong:
Joint Admission Control and Resource Allocation of Virtual Network Embedding via Hierarchical Deep Reinforcement Learning. 1001-1015 - Kai Peng
, Liangyuan Wang
, Jintao He
, Chao Cai
, Menglan Hu
:
Joint Optimization of Service Deployment and Request Routing for Microservices in Mobile Edge Computing. 1016-1028 - Xiaoyu Shi
, Quanliang Liu
, Hong Xie
, Yanan Bai
, Mingsheng Shang
:
Maximum Entropy Policy for Long-Term Fairness in Interactive Recommender Systems. 1029-1043 - Shiva Raj Pokhrel
, Mohammad Belayet Hossain
, Anwar Walid
:
Modeling Practically Private Wireless Vehicle to Grid System With Federated Reinforcement Learning. 1044-1055 - Renhao Lu
, Hongwei Yang
, Yan Wang
, Hui He
, Qiong Li
, Xiaoxiong Zhong
, Weizhe Zhang
:
Multi-Attribute Auction-Based Grouped Federated Learning. 1056-1071 - Mimi Qian
, Lin Cui
, Fung Po Tso
, Yuhui Deng
, Weijia Jia
:
OffsetINT: Achieving High Accuracy and Low Bandwidth for In-Band Network Telemetry. 1072-1083 - Zijian Zhang
, Xuyang Liu
, Kaiyu Feng
, Mingchao Wan
, Meng Li, Jin Dong, Liehuang Zhu
:
Phantasm: Adaptive Scalable Mining Toward Stable BlockDAG. 1084-1096 - Bakkiam David Deebak
, Seong Oun Hwang
:
Privacy Preserving Based on Seamless Authentication With Provable Key Verification Using mIoMT for B5G-Enabled Healthcare Systems. 1097-1113 - Shengling Wang
, Lina Shi
, Hongwei Shi
, Yifang Zhang
, Qin Hu
, Xiuzhen Cheng
:
Proof of User Similarity: The Spatial Measurer of Blockchain. 1114-1125 - Mengxue Yang
, Huaqun Wang
, Zhiguo Wan
:
PUL-ABE: An Efficient and Quantum-Resistant CP-ABE With Policy Update in Cloud Storage. 1126-1139 - Jingwei Jiang
, Ding Wang
, Guoyin Zhang
:
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage. 1140-1153 - Ziteng Wu
, Ding Ding
, Yuting Xiu
, Yuekun Zhao
, Jing Hong
:
Robust QoS Prediction Based on Reputation Integrated Graph Convolution Network. 1154-1167 - Hailiang Zhao
, Shuiguang Deng
, Zhengzhe Xiang
, Xueqiang Yan, Jianwei Yin, Schahram Dustdar
, Albert Y. Zomaya
:
Scheduling Multi-Server Jobs With Sublinear Regrets via Online Learning. 1168-1180 - Yuanhao Yang, Hong Shen
, Hui Tian
:
Scheduling Workflow Tasks With Unknown Task Execution Time by Combining Machine-Learning and Greedy-Optimization. 1181-1195 - Pengfei Wang, Wei Song
, Heng Qi
, Changjun Zhou, Fuliang Li
, Yong Wang
, Peng Sun
, Qiang Zhang:
Server-Initiated Federated Unlearning to Eliminate Impacts of Low-Quality Data. 1196-1211 - Ahmed Saeed Alsayed
, Hoa Khanh Dam
, Aditya Ghose
, Chau Nguyen
:
StraAlgin: Automated Strategic Alignment of Services. 1212-1226 - Huaqun Wang
, Zhiguo Wan
, Debiao He
, Jia Yu
:
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security. 1227-1238 - Meng Li
, Jianbo Gao
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
:
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud. 1239-1251 - Youshui Lu
, Bowen Cai
, Xiaojun Tang, Lei Liu
, Jun Du
, Shui Yu
, Mohammed Atiquzzaman
, Schahram Dustdar
:
Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain. 1252-1264 - Meiling Dai
, Shaoyong Guo, Song Guo
, Sujie Shao
, Xuesong Qiu:
Trusted Sharing of Computing Power Resources: Benefit-Driven Heterogeneous Network Service Provision Mechanism. 1265-1278 - Chao Li
, Balaji Palanisamy
:
T-Watch: Towards Timed Execution of Private Transaction in Blockchains. 1279-1292 - Fendy Santoso
, Anthony Finn
:
An In-Depth Examination of Artificial Intelligence-Enhanced Cybersecurity in Robotics, Autonomous Systems, and Critical Infrastructures. 1293-1310
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.