


default search action
IEEE Transactions on Services Computing, Volume 16
Volume 16, Number 1, January - February 2023
- Rahul Saha

, Gulshan Kumar
, Tannishtha Devgun, William J. Buchanan
, Reji Thomas
, Mamoun Alazab
, Tai-Hoon Kim
, Joel J. P. C. Rodrigues
:
A Blockchain Framework in Post-Quantum Decentralization. 1-12 - Víctor Gallego-Fontenla

, Juan Carlos Vidal
, Manuel Lama
:
A Conformance Checking-Based Approach for Sudden Drift Detection in Business Processes. 13-26 - Yuan-Yao Shih

, Ai-Chun Pang
, Tian He, Te-Chuan Chiu
:
A Multi-Market Trading Framework for Low-Latency Service Provision at the Edge of Networks. 27-39 - Mengjie Liu

, Gang Feng
, Yao Sun
, Nan Chen
, Wei Tan:
A Network Function Parallelism-Enabled MEC Framework for Supporting Low-Latency Services. 40-52 - Divya Natolana Ganapathy

, Karuna Pande Joshi
:
A Semantically Rich Framework to Automate Cloud Service Level Agreements. 53-64 - Luca Beurer-Kellner, Jens von Pilgrim, Christos Tsigkanos

, Timo Kehrer
:
A Transformational Approach to Managing Data Model Evolution of Web Services. 65-79 - Aref Karimiafshar

, Massoud Reza Hashemi
, Mohammad Reza Heidarpour
, Adel Nadjaran Toosi
:
An Energy-Conservative Dispatcher for Fog-Enabled IIoT Systems: When Stability and Timeliness Matter. 80-94 - Amândio Balcão Filho, Natasha Ruiz

, Ferrucio de Franco Rosa
, Rodrigo Bonacin
, Mário Jino:
Applying a Consumer-Centric Framework for Trust Assessment of Cloud Computing Service Providers. 95-107 - Sung-Hyun Sim

, Hyerim Bae
, Ling Liu
:
Bagging Recurrent Event Imputation for Repair of Imperfect Event Log With Missing Categorical Events. 108-121 - Xiaojun Zhang

, Chao Huang
, Dawu Gu
, Jingwei Zhang, Huaxiong Wang
:
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems. 122-133 - Shanshan Li

, Chunxiang Xu
, Yuan Zhang
, Yicong Du
, Kefei Chen
:
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage. 134-146 - Yan Ding

, Kenli Li
, Chubo Liu
, Zhuo Tang
, Keqin Li
:
Budget-Constrained Service Allocation Optimization for Mobile Edge Computing. 147-161 - Muhammad Adeel Zahid

, Basit Shafiq
, Jaideep Vaidya
, Ayesha Afzal
, Shafay Shamail
:
Collaborative Business Process Fault Resolution in the Services Cloud. 162-176 - Olayinka Adeleye

, Jian Yu
, Guiling Wang
, Sira Yongchareon
:
Constructing and Evaluating Evolving Web-API Networks - A Complex Network Perspective. 177-190 - Long Luo, Qixuan Jin, Jingzhao Xie

, Gang Sun
, Hongfang Yu
:
Cost-Efficient Scheduling of Multicast Transfers With Deadline Guarantees Across Edge Datacenters. 191-205 - Zoltán Ádám Mann, Andreas Metzger

, Johannes Prade, Robert Seidl
, Klaus Pohl
:
Cost-Optimized, Data-Protection-Aware Offloading Between an Edge Data Center and the Cloud. 206-220 - Ensheng Liu

, Liping Zheng
, Qiang He
, Benzhu Xu, Gaofeng Zhang
:
Criticality-Awareness Edge User Allocation for Public Safety. 221-234 - Onur Atan

, Saeed Ghoorchian
, Setareh Maghsudi
, Mihaela van der Schaar:
Data-Driven Online Recommender Systems With Costly Information Acquisition. 235-245 - Prabath Abeysekara, Hai Dong

, A. Kai Qin
:
Data-Driven Trust Prediction in Mobile Edge Computing-Based IoT Systems. 246-260 - Xinchang Zhang

, Yinglong Wang, Guanggang Geng
, Jiguo Yu:
Delay-Optimized Multicast Tree Packing in Software-Defined Networks. 261-275 - Alem Fitwi

, Yu Chen
, Sencun Zhu
:
Enforcing Privacy Preservation on Edge Cameras Using Lightweight Video Frame Scrambling. 276-287 - Pengfei Wu

, Jianting Ning
, Wu Luo, Xinyi Huang
, Debiao He
:
Exploring Dynamic Task Loading in SGX-Based Distributed Computing. 288-301 - Indika Kumara

, Mohamed Hameez Ariz, Mohan Baruwal Chhetri
, Majid Mohammadi, Willem-Jan van den Heuvel, Damian A. Tamburri
:
FOCloud: Feature Model Guided Performance Prediction and Explanation for Deployment Configurable Cloud Applications. 302-314 - Xiao Xue

, Deyu Zhou
, Fangyi Chen, Xiangning Yu, Zhiyong Feng
, Yucong Duan
, Lin Meng
, Mu Zhang
:
From SOA to VOA: A Shift in Understanding the Operation and Evolution of Service Ecosystem. 315-329 - Manqing Dong

, Lina Yao
, Xianzhi Wang
, Boualem Benatallah
, Shuai Zhang
, Quan Z. Sheng
:
Gradient Boosted Neural Decision Forest. 330-342 - Jinyu Tian

, Jiantao Zhou
, Jia Duan
:
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption. 343-355 - William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, Andriy V. Miranskyy

:
Immutable Log Storage as a Service on Private and Public Blockchains. 356-369 - Walayat Hussain

, José M. Merigó
, Honghao Gao
, Asma Musabah Alkalbani
, Fethi A. Rabhi
:
Integrated AHP-IOWA, POWA Framework for Ideal Cloud Provider Selection and Optimum Resource Management. 370-382 - Carlo Combi

, Barbara Oliboni
, Francesca Zerbato
:
Integrated Exploration of Data-Intensive Business Processes. 383-397 - Shihong Hu

, Guanghui Li
, Weisong Shi
:
LARS: A Latency-Aware and Real-Time Scheduling Framework for Edge-Enabled Internet of Vehicles. 398-411 - Guangming Cui

, Qiang He
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment. 412-423 - Christian Cabrera

, Sergej Svorobej
, Andrei Palade
, Aqeel H. Kazmi
, Siobhán Clarke
:
MAACO: A Dynamic Service Placement Model for Smart Cities. 424-437 - Mingyue Wang

, Yu Guo
, Chen Zhang
, Cong Wang
, Hejiao Huang
, Xiaohua Jia
:
MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain. 438-451 - Quyuan Wang

, Songtao Guo
, Jiadi Liu
, Chengsheng Pan, Li Yang:
MotiShare: Incentive Mechanisms for Content Providers in Heterogeneous Time-Varying Edge Content Market. 452-465 - Vijay Kumar Yadav

, Nitish Andola
, Shekhar Verma, S. Venkatesan:
P2LBS: Privacy Provisioning in Location-Based Services. 466-477 - Huiying Jin

, Pengcheng Zhang
, Hai Dong
, Yuelong Zhu
, Athman Bouguettaya
:
Privacy-Aware Forecasting of Quality of Service in Mobile Edge Computing. 478-492 - Shenqing Wang

, Chunpeng Ge
, Lu Zhou, Huaqun Wang
, Zhe Liu, Jian Wang:
Privacy-Preserving Classification in Multiple Clouds eHealthcare. 493-503 - Xinghua Li

, Lizhong Bai
, Yinbin Miao
, Siqi Ma
, Jianfeng Ma
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing. 504-514 - Patrali Pradhan, Chandana Roy

, Sudip Misra
:
Q-Safe: QoS-Aware Pricing Scheme for Provisioning Safety-as-a-Service. 515-524 - Yinbin Miao

, Wei Zheng
, Xiaohua Jia
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method. 525-536 - Tieqiang Mo

, Renfa Li
, Shan Duan:
Reconciling Earlier Snapshot Time With Local Cache for Optimal Performance Under Transactional Causal Consistency. 537-549 - Feijia He, Liwei Shen

, Xin Peng
:
Resource Choreography in Cyber-Physical-Social Systems: Representation, Modeling and Execution. 550-563 - Md Anwarul Kaium Patwary

, Saurabh Garg
, Sudheer Kumar Battula
, Byeong Kang
:
SDP: Scalable Real-Time Dynamic Graph Partitioner. 564-574 - Somchart Fugkeaw

:
Secure Data Sharing With Efficient Key Update for Industrial Cloud-Based Access Control. 575-587 - Ketki Sane

, Karuna Pande Joshi
, Sudip Mittal
:
Semantically Rich Framework to Automate Cyber Insurance Services. 588-599 - Ting Cai

, Zicong Hong
, Shuo Liu, Wuhui Chen
, Zibin Zheng
, Yang Yu
:
SocialChain: Decoupling Social Data and Applications to Return Your Data Ownership. 600-614 - Shreshth Tuli

, Sukhpal Singh Gill
, Peter Garraghan
, Rajkumar Buyya
, Giuliano Casale
, Nicholas R. Jennings
:
START: Straggler Prediction and Mitigation for Cloud Computing Environments Using Encoder LSTM Networks. 615-627 - Guobing Zou

, Ya Liu
, Zhen Qin
, Jin Chen
, Zhiwei Xu
, Yanglan Gan
, Bofeng Zhang
, Qiang He
:
ST-EUA: Spatio-Temporal Edge User Allocation With Task Decomposition. 628-641 - Haozhe Lin

, Yushun Fan
, Jia Zhang
, Bing Bai
, Zhenghua Xu, Thomas Lukasiewicz:
Toward Knowledge as a Service (KaaS): Predicting Popularity of Knowledge Services Leveraging Graph Neural Networks. 642-655 - Lei Xu

, Xingliang Yuan
, Zhengxiang Zhou
, Cong Wang
, Chungen Xu
:
Towards Efficient Cryptographic Data Validation Service in Edge Computing. 656-669 - Huaijie Zhu

, Wei Liu, Jian Yin, Jianliang Xu
, Wang-Chien Lee
:
Towards Keyword-Based Geo-Social Group Query Services. 670-683 - Shujuan Tian

, Chi Chang
, Saiqin Long
, Sangyoon Oh
, Zhetao Li
, Jun Long:
User Preference-Based Hierarchical Offloading for Collaborative Cloud-Edge Computing. 684-697 - Xinghua Li

, Qiuyun Tong
, Jinwei Zhao
, Yinbin Miao
, Siqi Ma
, Jian Weng
, Jianfeng Ma
, Kim-Kwang Raymond Choo
:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. 698-710 - Sasko Ristov

, Stefan Pedratscher
, Thomas Fahringer
:
$xAFCL$xAFCL: Run Scalable Function Choreographies Across Multiple FaaS Systems. 711-723 - Wenhua Xiao

, Cheng Yang, Ji Wang
, Xiaomin Zhu
, Weidong Bao
, Xiaojie Feng, Yu Xie, Wei Cao, Feng Yu, Ling Liu
:
YISHAN: Managing Large-scale Cloud Database Instances via Machine Learning. 724-738 - Efrén Rama-Maneiro

, Juan Carlos Vidal
, Manuel Lama
:
Deep Learning for Predictive Business Process Monitoring: Review and Benchmark. 739-756 - Wattana Viriyasitavat

, Li Da Xu, Gaurav Dhiman
, Assadaporn Sapsomboon
, Vitara Pungpapong
, Zhuming Bi
:
Service Workflow: State-of-the-Art and Future Trends. 757-772
Volume 16, Number 2, March - April 2023
- Xiaohan Hao

, Wei Ren
, Yangyang Fei
, Tianqing Zhu
, Kim-Kwang Raymond Choo
:
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things. 773-786 - Harsha Sandaruwan Gardiyawasam Pussewalage

, Vladimir A. Oleshchuk
:
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud. 787-801 - Di Wu

, Peng Zhang, Yi He, Xin Luo
:
A Double-Space and Double-Norm Ensembled Latent Factor Model for Highly Accurate Web Service QoS Prediction. 802-814 - Luigi De Simone

, Mario Di Mauro
, Roberto Natella
, Fabio Postiglione
:
A Latency-Driven Availability Assessment for Multi-Tenant Service Chains. 815-829 - Weiling Li

, Xin Luo
, Huaqiang Yuan, MengChu Zhou
:
A Momentum-Accelerated Hessian-Vector-Based Latent Factor Analysis Model. 830-844 - Xuejun Li

, Tianxiang Chen
, Dong Yuan
, Jia Xu
, Xiao Liu
:
A Novel Graph-Based Computation Offloading Strategy for Workflow Applications in Mobile Edge Computing. 845-857 - Yuan Liu

, Chuang Zhang, Yu Yan, Xin Zhou
, Zhihong Tian
, Jie Zhang:
A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System. 858-871 - Naela Rizvi

, Dharavath Ramesh
, Lipo Wang
, Annappa Basava
:
A Workflow Scheduling Approach With Modified Fuzzy Adaptive Genetic Algorithm in IaaS Clouds. 872-885 - Zhizhong Liu

, Quan Z. Sheng
, Zhenxing Zhang, Xiaofei Xu, Dianhui Chu
, Jian Yu
, Shuang Wang
:
Accurate and Reliable Service Recommendation Based on Bilateral Perception in Multi-Access Edge Computing. 886-899 - Gulshan Kumar

, Rahul Saha
, Mauro Conti
, Reji Thomas
, Tannishtha Devgun, Joel J. P. C. Rodrigues
:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. 900-912 - Dan Zhu

, Hui Zhu
, Xiangyu Wang
, Rongxing Lu
, Dengguo Feng:
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images. 913-926 - Xun Shao

, Go Hasegawa
, Mianxiong Dong
, Zhi Liu
, Hiroshi Masui
, Yusheng Ji
:
An Online Orchestration Mechanism for General-Purpose Edge Computing. 927-940 - Shiyong Li, Huan Liu, Wenzhe Li, Wei Sun

:
An Optimization Framework for Migrating and Deploying Multiclass Enterprise Applications Into the Cloud. 941-956 - Qinlong Huang

, Guanyu Yan, Qinglin Wei:
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing. 957-968 - Alessandro Tundo

, Marco Mobilio
, Oliviero Riganelli
, Leonardo Mariani
:
Automated Probe Life-Cycle Management for Monitoring-As-a-Service. 969-982 - Nikolay Ivanov

, Qiben Yan
:
AutoThing: A Secure Transaction Framework for Self-Service Things. 983-995 - Yong Yang

, Long Wang
, Jing Gu, Ying Li
:
Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation. 996-1010 - Lanxiang Chen

, Yujie Xue, Yi Mu
, Lingfang Zeng
, Fatemeh Rezaeibagha
, Robert H. Deng
:
CASE-SSE: Context-Aware Semantically Extensible Searchable Symmetric Encryption for Encrypted Cloud Data. 1011-1022 - Muhammad Zakarya

, Lee Gillam
, Khaled Salah
, Omer F. Rana
, Santosh Tirunagari
, Rajkumar Buyya
:
CoLocateMe: Aggregation-Based, Energy, Performance and Cost Aware VM Placement and Consolidation in Heterogeneous IaaS Clouds. 1023-1038 - Hai Jin

, Ruikun Luo
, Qiang He
, Song Wu
, Zilai Zeng, Xiaoyu Xia
:
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code. 1039-1050 - Deng Zhao

, Zhangbing Zhou
, Patrick C. K. Hung
, Shuiguang Deng
, Xiao Xue
, Walid Gaaloul
:
CTL-Based Adaptive Service Composition in Edge Networks. 1051-1065 - Guanghui Zhang

, Jie Zhang
, Ke Liu
, Jing Guo, Jack Y. B. Lee
, Haibo Hu
, Vaneet Aggarwal
:
DUASVS: A Mobile Data Saving Strategy in Short-Form Video Streaming. 1066-1078 - Kyungtae Lee

, Jinhwi Kim, Jeongho Kwak
, Yeongjin Kim
:
Dynamic Multi-Resource Optimization for Storage Acceleration in Cloud Storage Systems. 1079-1092 - Sijie Huang, He Huang

, Guoju Gao
, Yu-E Sun
, Yang Du
, Jie Wu
:
Edge Resource Pricing and Scheduling for Blockchain: A Stackelberg Game Approach. 1093-1106 - Ramin Ganjavi

, Ahmad R. Sharafat
:
Edge-Assisted Public Key Homomorphic Encryption for Preserving Privacy in Mobile Crowdsensing. 1107-1117 - Jiong Lou

, Hao Luo
, Zhiqing Tang
, Weijia Jia
, Wei Zhao
:
Efficient Container Assignment and Layer Sequencing in Edge Computing. 1118-1131 - Chen Wang

, Mengting Yuan, Rui Zhang
, Kai Peng
, Ling Liu
:
Efficient Point-of-Interest Recommendation Services With Heterogenous Hypergraph Embedding. 1132-1143 - Samira Chouikhi

, Moez Esseghir
, Leïla Merghem-Boulahia:
Energy Consumption Scheduling as a Fog Computing Service in Smart Grid. 1144-1157 - Rongping Lin

, Liu He, Shan Luo
, Moshe Zukerman
:
Energy-Aware Service Function Chaining Embedding in NFV Networks. 1158-1171 - Joanna Kosinska

, Krzysztof Zielinski
:
Experimental Evaluation of Rule-Based Autonomic Computing Management Framework for Cloud-Native Applications. 1172-1183 - Binbin Feng

, Zhijun Ding
, Changjun Jiang
:
FAST: A Forecasting Model With Adaptive Sliding Window and Time Locality Integration for Dynamic Cloud Workloads. 1184-1197 - Junte Ma

, Sihao Xie
, Jin Zhao
:
Flexible Offloading of Service Function Chains to Programmable Switches. 1198-1211 - Zhixiang He

, Chi-Yin Chow
, Jia-Dong Zhang
, Kam-Yiu Lam
:
H3Rec: Higher-Order Heterogeneous and Homogeneous Interaction Modeling for Group Recommendations of Web Services. 1212-1224 - Amin Mohajer

, Mahya Sam Daliri
, Abbas Mirzaei
, Amir Ziaeddini
, Mohammad Nabipour, Maryam Bavaghar:
Heterogeneous Computational Resource Allocation for NOMA: Toward Green Mobile Edge-Computing Systems. 1225-1238 - Ying Wang

, Naling Li
, Peng Yu
, Wenjing Li
, Xuesong Qiu
, Shangguang Wang
, Mohamed Cheriet
:
Intelligent and Collaborative Orchestration of Network Slices. 1239-1253 - Haolin Liu

, Xiaoling Long, Zhetao Li
, Saiqin Long, Rong Ran
, Hui-Ming Wang
:
Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing. 1254-1267 - Mohammed Bahutair

, Athman Bouguettaya
, Azadeh Ghari Neiat
:
Multi-Use Trust in Crowdsourced IoT Services. 1268-1281 - Tengfei Yang

, Jianfeng Ma
, Yinbin Miao
, Yue Wang
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Bin Xiao
:
MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting. 1282-1295 - Yongyi Ran

, Xin Zhou, Han Hu
, Yonggang Wen
:
Optimizing Data Center Energy Efficiency via Event-Driven Deep Reinforcement Learning. 1296-1309 - Yongyi Ran

, Han Hu
, Yonggang Wen
, Xin Zhou
:
Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning. 1310-1323 - Liping Zhang

, Yue Zhu
, Wei Ren
, Yixin Zhang, Kim-Kwang Raymond Choo
:
Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems. 1324-1333 - Dante D. Sánchez-Gallegos

, José Luis González
, Jesús Carretero
, Heidy Marisol Marín-Castro, Andrei Tchernykh
, Raffaele Montella
:
PuzzleMesh: A Puzzle Model to Build Mesh of Agnostic Services for Edge-Fog-Cloud. 1334-1345 - Patryk Osypanka

, Piotr Nawrocki
:
QoS-Aware Cloud Resource Prediction for Computing Services. 1346-1357 - Amanjot Kaur

, Nitin Auluck
, Omer F. Rana
:
Real-Time Scheduling on Hierarchical Heterogeneous Fog Networks. 1358-1372 - Anurag Satpathy

, Manmath Narayan Sahoo
, Lucky Behera, Chittaranjan Swain
:
ReMatch: An Efficient Virtual Data Center Re-Matching Strategy Based on Matching Theory. 1373-1386 - Yongqian Sun

, Daguo Cheng, Pengxiang Jin, Quan Ding, Shenglin Zhang
, Xu Chen
, Yuzhi Zhang
, Minghan Liang, Dan Pei
, Jianyan Zheng, Sen Luo, Xinyu Tang:
Robust Anomaly Clue Localization of Multi-Dimensional Derived Measure for Online Video Services. 1387-1401 - Kanika Sharma

, Bernard Butler
, Brendan Jennings
:
Scaling and Placing Distributed Services on Vehicle Clusters in Urban Environments. 1402-1416 - Jing Li

, Weifa Liang
, Wenzheng Xu
, Zichuan Xu
, Yuchen Li
, Xiaohua Jia
:
Service Home Identification of Multiple-Source IoT Applications in Edge Computing. 1417-1430 - Dongyang Zhan

, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang
, Lin Ye
:
Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation. 1431-1443 - Yang Yang

, Chunming Rong
, Xianghan Zheng, Hongju Cheng
, Victor Chang
, Xiangyang Luo
, Zuoyong Li
:
Time Controlled Expressive Predicate Query With Accountable Anonymity. 1444-1457 - Emre Yigitoglu, Mehmet Emre Gursoy

, Ling Liu
:
Utility-Aware and Privacy-Preserving Mobile Query Services. 1458-1472 - Qinkai Wang

, Ye Tian
, Xin Yu, Lan Ding, Xinming Zhang
:
Where is the Traffic Going? A Comparative Study of Clouds Following Different Designs. 1473-1484 - Firas Al-Doghman

, Nour Moustafa
, Ibrahim Khalil
, Nasrin Sohrabi, Zahir Tari
, Albert Y. Zomaya
:
AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges. 1485-1504 - Mostafa Haghi Kashani

, Ebrahim Mahdipour
:
Load Balancing Algorithms in Fog Computing. 1505-1521 - Yongkang Li

, Yanying Lin
, Yang Wang
, Kejiang Ye
, Cheng-Zhong Xu
:
Serverless Computing: State-of-the-Art, Challenges and Opportunities. 1522-1539
Volume 16, Number 3, May - June 2023
- Qing Huang

, Zhiqiang Yuan, Zhenchang Xing
, Zhengkang Zuo
, Changjing Wang, Xin Xia
:
1+1>2: Programming Know-What and Know-How Knowledge Fusion, Semantic Enrichment and Coherent Application. 1540-1554 - Md Geaur Rahman

, Md Zahidul Islam
:
A Framework for Supervised Heterogeneous Transfer Learning Using Dynamic Distribution Adaptation and Manifold Regularization. 1555-1571 - Haoran Qiu

, Tao Ji, Shixiong Zhao
, Xusheng Chen, Ji Qi, Heming Cui
, Sen Wang:
A Geography-Based P2P Overlay Network for Fast and Robust Blockchain Systems. 1572-1588 - Xiao Wang

, Hanchuan Xu
, Xianzhi Wang
, Xiaofei Xu, Zhongjie Wang
:
A Graph Neural Network and Pointer Network-Based Approach for QoS-Aware Service Composition. 1589-1603 - Deepika Saxena

, Ashutosh Kumar Singh
:
A High Availability Management Model Based on VM Significance Ranking and Resource Estimation for Cloud Applications. 1604-1615 - Md. Mainul Islam, Md. Kamrul Islam, Md. Shahjalal, Mostafa Zaman Chowdhury, Yeong Min Jang:

A Low-Cost Cross-Border Payment System Based on Auditable Cryptocurrency With Consortium Blockchain: Joint Digital Currency. 1616-1629 - Federica Filippini

, Marco Lattuada
, Michele Ciavotta
, Arezoo Jahani, Danilo Ardagna
, Edoardo Amaldi:
A Path Relinking Method for the Joint Online Scheduling and Capacity Allocation of DL Training Workloads in GPU as a Service Systems. 1630-1646 - Nazatul Haque Sultan

, Vijay Varadharajan, Lan Zhou, Ferdous Ahmed Barbhuiya
:
A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context. 1647-1661 - Leixiao Cheng

, Fei Meng
:
An Improvement on "CryptCloud$^{+}$+: Secure and Expressive Data Access Control for Cloud Storage". 1662-1663 - Fatemeh Rezaeibagha

, Yi Mu
, Ke Huang
, Lanxiang Chen
, Leyou Zhang
:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT. 1664-1672 - Keke Gai

, Yue Zhang
, Meikang Qiu
, Bhavani Thuraisingham:
Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin. 1673-1685 - Mengqi Zhan

, Yang Li
, Huiran Yang, Guangxi Yu, Bo Li
, Weiping Wang
:
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers. 1686-1697 - Ana Claudia Bastos Loureiro Monção, Sand Luz Correa

, Aline Carneiro Viana
, Kleber Vieira Cardoso
:
Combining Resource-Aware Recommendation and Caching in the Era of MEC for Improving the Experience of Video Streaming Users. 1698-1712 - Lei Wang

, Jiyuan Liu, Qiang He
:
Concept Drift-Based Checkpoint-Restart for Edge Services Rejuvenation. 1713-1725 - Mohammad-Mohsen Aseman-Manzar

, Soroush Karimian Aliabadi
, Reza Entezari-Maleki
, Bernhard Egger
, Ali Movaghar
:
Cost-Aware Resource Recommendation for DAG-Based Big Data Workflows: An Apache Spark Case Study. 1726-1737 - Moirangthem Biken Singh

, Navneet Taunk, Naveen Kumar Mall, Ajay Pratap
:
Criticality and Utility-Aware Fog Computing System for Remote Health Monitoring. 1738-1749 - Jingwen Zhou

, Feifei Chen
, Qiang He
, Xiaoyu Xia
, Rui Wang
, Yong Xiang
:
Data Caching Optimization With Fairness in Mobile Edge Computing. 1750-1762 - Changhee Hahn

, Junbeom Hur
:
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query. 1763-1777 - Pei Ren

, Ling Liu
, Xiuquan Qiao
, Junliang Chen:
Distributed Edge System Orchestration for Web-Based Mobile Augmented Reality Services. 1778-1792 - Yongqiang Gao

, Lin Wang, Zhulong Xie, Zhengwei Qi, Jiantao Zhou
:
Energy- and Quality of Experience-Aware Dynamic Resource Allocation for Massively Multiplayer Online Games in Heterogeneous Cloud Computing Systems. 1793-1806 - Zai-Xing Sun

, Boyu Zhang, Chonglin Gu
, Ruitao Xie
, Bin Qian
, Hejiao Huang
:
ET2FA: A Hybrid Heuristic Algorithm for Deadline-Constrained Workflow Scheduling in Cloud. 1807-1821 - Zigui Jiang

, Zibin Zheng
, Kai Chen, Xiapu Luo, Xiuwen Tang, Yin Li:
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development. 1822-1832 - Rik Eshuis

:
Extracting Reusable Fragments From Data-Centric Process Variants. 1833-1845 - Guangshun Yao

, Xiaoping Li
, Qian Ren
, Rubén Ruiz
:
Failure-Aware Elastic Cloud Workflow Scheduling. 1846-1859 - Xiangli Xiao

, Yushu Zhang
, Xuewen Dong
, Liangmin Wang
, Yong Xiang
, Xiaochun Cao:
Fair Outsourcing Paid in Fiat Money Using Blockchain. 1860-1873 - Md. Palash Uddin

, Yong Xiang
, Xuequan Lu
, John Yearwood, Longxiang Gao
:
Federated Learning via Disentangled Information Bottleneck. 1874-1889 - Wenbo Xu

, Peiyi Han
, Shaoming Duan, Chuanyi Liu
:
FIGAT: Accurately Classify Individual Crime Risks With Multi-Information Fusion. 1890-1903 - Chih-Lin Hu

, Kun-Yu Lin
, Carl K. Chang
:
Incentive Mechanism for Mobile Crowdsensing With Two-Stage Stackelberg Game. 1904-1918 - Balsam Alkouz

, Amani Abusafia
, Abdallah Lakhdari, Athman Bouguettaya
:
In-Flight Energy-Driven Composition of Drone Swarm Services. 1919-1933 - Yanjun Shu

, Jianhang Zhang, Wei Emma Zhang
, Decheng Zuo
, Quan Z. Sheng
:
IQSrec: An Efficient and Diversified Skyline Services Recommendation on Incomplete QoS. 1934-1948 - Wei Jiang

, Daquan Feng
, Yao Sun
, Gang Feng
, Zhenzhong Wang
, Xiang-Gen Xia
:
Joint Computation Offloading and Resource Allocation for D2D-Assisted Mobile Edge Computing. 1949-1963 - Zhaoyang Han

, Chunpeng Ge
, Bingzhe Wu
, Zhe Liu
:
Lightweight Privacy-Preserving Federated Incremental Decision Trees. 1964-1975 - Zeyu Qin, Haipeng Yao

, Tianle Mai
, Di Wu, Ni Zhang, Song Guo
:
Multi-Agent Reinforcement Learning Aided Computation Offloading in Aerial Computing for the Internet-of-Things. 1976-1986 - Nafe Moradkhani

, Frédérick Bénaben, Benoît Montreuil
, Matthieu Lauras
, Julien Jeany, Louis Faugère
:
Multi-Criteria Performance Analysis Based on Physics of Decision - Application to COVID-19 and Future Pandemics. 1987-1998 - Marco Anisetti

, Claudio Agostino Ardagna
, Nicola Bena
:
Multi-Dimensional Certification of Modern Distributed Systems. 1999-2012 - Roaa Elghondakly

, Sherin M. Moussa
, Nagwa L. Badr:
Mutual Information-Based Modeling for Services Dependency. 2013-2029 - Guobing Zou

, Shaogang Wu, Shengxiang Hu
, Chenhong Cao
, Yanglan Gan
, Bofeng Zhang
, Yixin Chen
:
NCRL: Neighborhood-Based Collaborative Residual Learning for Adaptive QoS Prediction. 2030-2043 - Jine Tang

, Taishan Qin, Yong Xiang
, Zhangbing Zhou
, Junhua Gu
:
Optimization Search Strategy for Task Offloading From Collaborative Edge Computing. 2044-2058 - Jing Liu

, Liang Feng Zhang
:
Privacy-Preserving and Publicly Verifiable Matrix Multiplication. 2059-2071 - Guoqiang Deng

, Min Tang
, Yuxing Xi
, Mingwu Zhang
:
Privacy-Preserving Online Medical Prediagnosis Training Model Based on Soft-Margin SVM. 2072-2084 - Chenkai Guo

, Weijie Zhang
, Naipeng Dong
, Zheli Liu
, Yang Xiang
:
QoS-Aware Diversified Service Selection. 2085-2099 - Shunrong Jiang

, Jianqing Liu
, Jingwei Chen, Yiliang Liu
, Liangmin Wang
, Yong Zhou
:
Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data. 2100-2113 - Xiaoqin Feng

, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks. 2114-2125 - Chen Hou

:
Request Control of Web Service-Based Sampling System With Multiple Smart Sensors. 2126-2138 - Nasrin Sohrabi

, Zahir Tari
, Gauthier Voron
, Vincent Gramoli
, Qiang Fu
:
SAZyzz: Scaling AZyzzyva to Meet Blockchain Requirements. 2139-2152 - Keqin Li

:
Scheduling Precedence Constrained Tasks for Mobile Applications in Fog Computing. 2153-2164 - Qinlong Huang

, Chao Wang, Lixuan Chen:
Secure and Fine-Grained Flow Control for Subscription-Based Data Services in Cloud-Edge Computing. 2165-2177 - Yu Li

, Jianting Ning
, Jie Chen
:
Secure and Practical Wildcard Searchable Encryption System Based on Inner Product. 2178-2190 - Qingyuan Xie

, Chen Zhang
, Xiaohua Jia
:
Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems. 2191-2202 - Mays F. Al-Naday

, Nikolaos Thomos
, Jiejun Hu
, Bruno Volckaert
, Filip De Turck
, Martin J. Reed
:
Service-Based, Multi-Provider, Fog Ecosystem With Joint Optimization of Request Mapping and Response Routing. 2203-2214 - Ke Ma

, Geng Yang
:
TBAC: A Fine-Grained Topic-Based Access Control Model for Text Data. 2215-2228 - Chunyu Wei

, Yushun Fan, Jia Zhang
:
Time-Aware Service Recommendation With Social-Powered Graph Hierarchical Attention Network. 2229-2240 - Nafiseh Sharghivand

, Lena Mashayekhy
, Weibin Ma, Schahram Dustdar
:
Time-Constrained Service Handoff for Mobile Edge Computing in 5G. 2241-2253 - Dong Lu

, Yanlong Zhai
, Jun Shen
, Mahdi Fahmideh
, Jianqing Wu
, Jude Tchaye-Kondi
, Liehuang Zhu
:
TreeNet Based Fast Task Decomposition for Resource-Constrained Edge Intelligence. 2254-2266 - Qi Zhang

, Yingjie Wang
, Guisheng Yin
, Xiangrong Tong
, Akshita Maradapu Vera Venkata Sai
, Zhipeng Cai
:
Two-Stage Bilateral Online Priority Assignment in Spatio-Temporal Crowdsourcing. 2267-2282 - Daejin Kim

, Hyegyeong Park
, Dusit Niyato
, Jun Kyun Choi
:
Worker Assignment for Multiple Masters to Speed Up Coded Distributed Computing in Heterogeneous Clusters. 2283-2298 - Wattana Viriyasitavat

, Li Da Xu
, Gaurav Dhiman
, Zhuming Bi
:
Blockchain-as-a-Service for Business Process Management: Survey and Challenges. 2299-2314
Volume 16, Number 4, July - August 2023
- Xiaohu Chen, Anjia Yang

, Jian Weng
, Yao Tong, Cheng Huang
, Tao Li
:
A Blockchain-Based Copyright Protection Scheme With Proactive Defense. 2316-2329 - Björn Rafn Gunnarsson

, Seppe vanden Broucke
, Jochen De Weerdt
:
A Direct Data Aware LSTM Neural Network Architecture for Complete Remaining Trace and Runtime Prediction. 2330-2342 - Yao Zhao

, Youyang Qu
, Yong Xiang
, Yushu Zhang
, Longxiang Gao
:
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT. 2343-2358 - Ankit Shah

, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. 2359-2371 - Md. Mainul Islam

, Hoh Peter In
:
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs. 2372-2386 - Yang Yang

, Ming Cheng
, Yingqiu Ding
, Weiming Zhang
:
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding. 2387-2401 - Yun Li, Shi-Jie Jian

, Sun-Yuan Hsieh
, Wei-Kang Chung, Albert Y. Zomaya
:
A Weighted Optimal Scheduling Scheme for Congestion Control in Cloud Data Center Networks. 2402-2410 - Hossein Shirazi

, Shashika Ranga Muramudalige
, Indrakshi Ray
, Anura P. Jayasumana
, Haonan Wang:
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms. 2411-2422 - Nanxi Chen

, Qi Sun, Yanbei Li, Hongfeng Shu, Jiamao Li
, Xiaolin Zhang
:
Agile Services Provisioning for Learning-Based Applications in Fog Computing Networks. 2423-2436 - Zhe Sun

, Peng Zhao
, Chunping Wang, Xiaoli Zhang
, Hongbing Cheng
:
An Efficient and Secure Trading Framework for Shared Charging Service Based on Multiple Consortium Blockchains. 2437-2450 - Divija Swetha Gadiraju, V. Lalitha

, Vaneet Aggarwal
:
An Optimization Framework Based on Deep Reinforcement Learning Approaches for Prism Blockchain. 2451-2461 - Sarhad Arisdakessian, Omar Abdel Wahab

, Azzam Mourad
, Hadi Otrok
:
Coalitional Federated Learning: Improving Communication and Training on Non-IID Data With Selfish Clients. 2462-2476 - Hanrui Wu

, Chung Wang Wong, Jia Zhang
, Yuguang Yan
, Dahai Yu
, Jinyi Long
, Michael K. Ng
:
Cold-Start Next-Item Recommendation by User-Item Matching and Auto-Encoders. 2477-2489 - Xiaoquan Zhang

, Lin Cui
, Fung Po Tso
, Weijia Jia
:
Compiling Service Function Chains via Fine-Grained Composition in the Programmable Data Plane. 2490-2502 - Dayoung Lee

, Younghyun Kim
, Minseok Song
:
Cost-Effective, Quality-Oriented Transcoding of Live-Streamed Video on Edge-Servers. 2503-2516 - Hao Dai

, Jiashu Wu
, Yang Wang
, Jerome Yen, Yong Zhang
, Cheng-Zhong Xu
:
Cost-Efficient Sharing Algorithms for DNN Model Serving in Mobile Edge Networks. 2517-2531 - Xiaoquan Zhang

, Lin Cui
, Fung Po Tso
, Zhetao Li
, Weijia Jia
:
Dapper: Deploying Service Function Chains in the Programmable Data Plane Via Deep Reinforcement Learning. 2532-2544 - Satish Kumar

, Tao Chen, Rami Bahsoon
, Rajkumar Buyya
:
DebtCom: Technical Debt-Aware Service Recomposition in SaaS Cloud. 2545-2558 - Samaikya Valluripally

, Benjamin Frailey, Brady Kruse, Boonakij Palipatana, Roland Oruche
, Aniket Gulhane, Khaza Anuarul Hoque
, Prasad Calyam
:
Detection of Security and Privacy Attacks Disrupting User Immersive Experience in Virtual Reality Learning Environments. 2559-2574 - Anwar Ghammam

, Thiago do Nascimento Ferreira, Wajdi Aljedaani, Marouane Kessentini
, Ali Husain:
Dynamic Software Containers Workload Balancing via Many-Objective Search. 2575-2591 - Mingyi Liu

, Zhiying Tu
, Hanchuan Xu
, Xiaofei Xu, Zhongjie Wang
:
DySR: A Dynamic Graph Neural Network Based Service Bundle Recommendation Model for Mashup Creation. 2592-2605 - Prabath Abeysekara, Hai Dong

, A. Kai Qin
:
Edge Intelligence for Real-Time IoT Service Trust Prediction. 2606-2619 - Yandong Zheng

, Rongxing Lu
, Yunguo Guan
, Songnian Zhang
, Jun Shao
, Fengwei Wang
, Hui Zhu
:
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query. 2620-2631 - Hai Huang

, Luyao Wang:
Efficient Privacy-Preserving Face Identification Protocol. 2632-2641 - Cong Thanh Nguyen

, Dinh Thai Hoang
, Diep N. Nguyen
, Yong Xiao
, Hoang-Anh Pham
, Eryk Dutkiewicz
, Nguyen Huynh Tuong
:
FedChain: Secure Proof-of-Stake-Based Framework for Federated-Blockchain Systems. 2642-2656 - Meng Xu

, Yi Mei
, Shiqiang Zhu
, Beibei Zhang
, Tian Xiang
, Fangfang Zhang
, Mengjie Zhang
:
Genetic Programming for Dynamic Workflow Scheduling in Fog Computing. 2657-2671 - Zhenhua Chen

, Jingjing Nie
, Li Zhan-Li, Willy Susilo
, Chunpeng Ge
:
Geometric Searchable Encryption for Privacy-Preserving Location-Based Services. 2672-2684 - Yuxiang Liu

, Bo Yang
, Yu Wu
, Cailian Chen
, Xinping Guan
:
How to Share: Balancing Layer and Chain Sharing in Industrial Microservice Deployment. 2685-2698 - Di Wu

, Bo Sun, Mingsheng Shang
:
Hyperparameter Learning for Deep Learning-Based Recommender Systems. 2699-2712 - Xiaoming Yu

, Wenjun Wu, Yangzhou Wang:
Integrating Cognition Cost With Reliability QoS for Dynamic Workflow Scheduling Using Reinforcement Learning. 2713-2726 - Dongjin Yu

, Tong Wu
, Chengfei Liu
, Dongjing Wang
:
Joint Content Caching and Recommendation in Opportunistic Mobile Networks Through Deep Reinforcement Learning and Broad Learning. 2727-2741 - Thomas Weripuo Gyeera

, Anthony J. H. Simons
, Mike Stannett
:
Kalman Filter Based Prediction and Forecasting of Cloud Server KPIs. 2742-2754 - Chunyan Sang

, Xinyan Deng
, Shigen Liao
:
Mashup-Oriented Web API Recommendation Via Full-Text Semantic Mining of Developer Requirements. 2755-2768 - Jing Bai

, Xiaolin Chang
, Fumio Machida
, Kishor S. Trivedi
, Yaru Li:
Model-Driven Dependability Assessment of Microservice Chains in MEC-Enabled IoT. 2769-2785 - Ruyu Yan

, Haozhe Lin
, Yushun Fan
, Jia Zhang
, Bing Bai
:
Multi-Modal Reciprocal Spatiotemporal Framework for Predicting Usage Trend of Knowledge Services. 2786-2799 - Chunming Zhang

, Fengji Luo
, Gianluca Ranzi
:
Multistage Game Theoretical Approach for Ransomware Attack and Defense. 2800-2811 - Cedric Parfait Kankeu Fotsing

, Chih-Ya Shen
, Liang-Hao Huang, Yi-Shin Chen, Wang-Chien Lee
, De-Nian Yang
:
On Efficient Processing of Queries for Live Multi-Streaming Soiree Organization. 2812-2826 - Jiajun Yao

, Lei Yang
, Xiaohua Xu
:
Online Dependent Task Assignment in Preference Aware Spatial Crowdsourcing. 2827-2840 - Alexandros-Ioannis Manolopoulos

, Markos P. Anastasopoulos
, Victoria-Maria Alevizaki
, Anna Tzanakaki:
Optimal Service Provisioning in Mobile 5G and Beyond Systems. 2841-2854 - Hui Yin

, Yangfan Li
, Hua Deng, Wei Zhang
, Zheng Qin
, Keqin Li
:
Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data. 2855-2867 - Liang Zhang

, Haibin Kan
, Yihao Wang
:
Privacy-Preserving AGV Collision-Resistance at the Edge Using Location-Based Encryption. 2868-2878 - Yuanyuan Gao, Lei Zhang, Lulu Wang

, Kim-Kwang Raymond Choo
, Rui Zhang:
Privacy-Preserving and Reliable Decentralized Federated Learning. 2879-2891 - Yuejing Yan

, Yanyan Xu
, Zhiheng Wang, Xue Ouyang
, Bo Zhang, Zheheng Rao
:
Privacy-Preserving Multi-Source Image Retrieval in Edge Computing. 2892-2907 - Amit Biswas

, Ravi Yadav
, Gaurav Baranwal
, Anil Kumar Tripathi
:
Proof of Karma (PoK): A Novel Consensus Mechanism for Consortium Blockchain. 2908-2922 - Songlei Wang

, Yifeng Zheng
, Xiaohua Jia
:
SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service. 2923-2938 - Jingwei Wang

, Xinchun Yin
, Jianting Ning
, Shengmin Xu
, Guowen Xu
, Xinyi Huang:
Secure Updatable Storage Access Control System for EHRs in the Cloud. 2939-2953 - Sithu Kaung Set

, Gi Seok Park
:
Service-Aware Dynamic Sharding Approach for Scalable Blockchain. 2954-2969 - Vincenzo Pasquadibisceglie

, Annalisa Appice
, Giovanna Castellano
, Nicola Fiorentino
, Donato Malerba
:
STARDUST: A Novel Process Mining Approach to Discover Evolving Models From Trace Streams. 2970-2984 - Kexin Li

, Xingwei Wang
, Qiang He
, Mingzhou Yang, Min Huang
, Schahram Dustdar
:
Task Computation Offloading for Multi-Access Edge Computing via Attention Communication Deep Reinforcement Learning. 2985-2999 - Hang Xu, Ching-Fang Hsu

, Lein Harn
, Jianqun Cui
, Zhuo Zhao
, Ze Zhang:
Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things. 3000-3013 - Mohan Baruwal Chhetri

, Abdur Rahim Mohammad Forkan
, Quoc Bao Vo
, Surya Nepal
, Ryszard Kowalczyk
:
Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources. 3014-3026 - Fanghui Bi, Tiantian He

, Yuetong Xie, Xin Luo
:
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis. 3027-3042 - Maggi Bansal

, Inderveer Chana, Siobhán Clarke
:
UrbanEnQoSPlace: A Deep Reinforcement Learning Model for Service Placement of Real-Time Smart City IoT Applications. 3043-3060 - Jian Cao

, Naixuan Wang, Shiyou Qian
, Wei Guan
:
When to Invoke a Prediction Service for Business Process Monitoring? 3061-3074 - Mohammad Javad Nadjafi-Arani

, Saeed Doostali
, Mohamed F. Younis
:
Workflow Scheduling With Guaranteed Responsiveness and Minimal Cost. 3075-3087
Volume 16, Number 5, September - October 2023
- Hoda Taheri

, Saeid Abrishami
, Mahmoud Naghibzadeh
:
A Cloud Broker for Executing Deadline-Constrained Periodic Scientific Workflows. 3089-3100 - Jiangjiang Zhang

, Bei Gong
, Muhammad Waqas
, Shanshan Tu
, Zhu Han
:
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks. 3101-3114 - Song Deng

, Yujia Zhai
, Di Wu
, Dong Yue
, Xiong Fu
, Yi He
:
A Lightweight Dynamic Storage Algorithm With Adaptive Encoding for Energy Internet. 3115-3128 - Gabriele Proietti Mattia

, Antonio Pietrabissa
, Roberto Beraldi
:
A Load Balancing Algorithm for Equalising Latency Across Fog or Edge Computing Nodes. 3129-3140 - Lalit Purohit

, Santosh Singh Rathore
, Sandeep Kumar
:
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection. 3141-3154 - Hiren Dutta

, Saurabh Nagesh
, Jawahar Talluri
, Parama Bhaumik
:
A Solution to Blockchain Smart Contract Based Parametric Transport and Logistics Insurance. 3155-3167 - Weiwen Zhang

, Jinzhou Luo
, Lei Chen
, Jianqi Liu
:
A Trajectory Prediction-Based and Dependency-Aware Container Migration for Mobile Edge Computing. 3168-3181 - Jiani Li

, Tao Wang
, Bo Yang
, Qiliang Yang
, Wenzheng Zhang
, Keyong Hong
:
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving. 3182-3195 - Davi Monteiro Barbosa

, Yijun Yu
, Andrea Zisman
, Bashar Nuseibeh
:
Adaptive Observability for Forensic-Ready Microservice Systems. 3196-3209 - Suhui Liu

, Liquan Chen
, Ge Wu
, Huaqun Wang
, Hongtao Yu
:
Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records. 3210-3223 - Siyu Yu

, Pinjia He
, Ningjiang Chen
, Yifan Wu
:
Brain: Log Parsing With Bidirectional Parallel Tree. 3224-3237 - Marius Popa, Sebastian Michael Stoklossa, Somnath Mazumdar

:
ChainDiscipline - Towards a Blockchain-IoT-Based Self-Sovereign Identity Management Framework. 3238-3251 - Xiaoxu Ren

, Chao Qiu
, Zheyuan Chen
, Xiaofei Wang
, Dusit Niyato
, Wenyu Wang:
CompCube: A Space-Time-Request Resource Trading Framework for Edge-Cloud Service Market. 3252-3264 - Cheng-Wei Ching

, Jia-Ming Chang
, Jian-Jhih Kuo
, Chih-Yu Wang
:
Dual-Objective Personalized Federated Service System With Partially-Labeled Data Over Wireless Networks. 3265-3279 - Lu Yin

, Jin Sun
, Junlong Zhou
, Zonghua Gu
, Keqin Li
:
ECFA: An Efficient Convergent Firefly Algorithm for Solving Task Scheduling Problems in Cloud-Edge Computing. 3280-3293 - Chao Lin

, Xinyi Huang
, Debiao He
:
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation. 3294-3304 - Swasti Khurana

, Novarun Deb
, Sajib Mistry
, Aditya Ghose
, Aneesh Krishna
, Hoa Khanh Dam
:
Egalitarian Transient Service Composition in Crowdsourced IoT Environment. 3305-3317 - Peng Jiang

, Fuchun Guo
, Willy Susilo
, Chao Lin
, Jiaxi Hu, Zhen Zhao
, Liehuang Zhu
, Debiao He
:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. 3318-3331 - Guangba Yu

, Pengfei Chen
, Zibin Zheng
, Jingrun Zhang
, Xiaoyun Li
, Zilong He
:
FaaSDeliver: Cost-Efficient and QoS-Aware Function Delivery in Computing Continuum. 3332-3347 - Qinlong Huang

, Qinglin Wei, Guanyu Yan, Lin Zou, Yixian Yang
:
Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services. 3348-3360 - Jiang Bian

, Jizhou Huang
, Shilei Ji
, Yuan Liao
, Xuhong Li
, Qingzhong Wang
, Jingbo Zhou
, Dejing Dou
, Yaqing Wang
, Haoyi Xiong
:
Feynman: Federated Learning-Based Advertising for Ecosystems-Oriented Mobile Apps Recommendation. 3361-3372 - Dan Tang

, Siyuan Wang
, Boru Liu
, Wenqiang Jin
, Jiliang Zhang
:
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN. 3373-3384 - Sourav Kanti Addya

, Anurag Satpathy
, Bishakh Chandra Ghosh
, Sandip Chakraborty
, Soumya K. Ghosh
, Sajal K. Das
:
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets. 3385-3396 - Minghui Liwang

, Zhibin Gao
, Seyyedali Hosseinalipour
, Yuhan Su
, Xianbin Wang
, Huaiyu Dai
:
Graph-Represented Computation-Intensive Task Scheduling Over Air-Ground Integrated Vehicular Networks. 3397-3411 - Wei Guan

, Jian Cao
, Yang Gu
, Shiyou Qian
:
GRASPED: A GRU-AE Network Based Multi-Perspective Business Process Anomaly Detection Model. 3412-3424 - Teng Li

, Jiawei Zhang
, Yulong Shen
, Jianfeng Ma
:
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things. 3425-3438 - Yao-Chun Yang

, Chiao-Ting Chen
, Tzu-Yu Lu
, Szu-Hao Huang
:
Hierarchical Reinforcement Learning for Conversational Recommendation With Knowledge Graph Reasoning and Heterogeneous Questions. 3439-3452 - Wei Tang

, Haifeng Sun
, Jingyu Wang
, Cong Liu, Qi Qi
, Jing Wang, Jianxin Liao
:
Identifying Users Across Social Media Networks for Interpretable Fine-Grained Neighborhood Matching by Adaptive GAT. 3453-3466 - Zhixuan Jia

, Yushun Fan
, Jia Zhang
, Chunyu Wei
, Ruyu Yan
, Xing Wu
:
Improving Next Location Recommendation Services With Spatial-Temporal Multi-Group Contrastive Learning. 3467-3478 - Tong Xiao

, Zhe Quan
, Zhi-Jie Wang
, Yuquan Le
, Yunfei Du
, Xiangke Liao
, Kenli Li
, Keqin Li
:
Loader: A Log Anomaly Detector Based on Transformer. 3479-3492 - Yicheng Sui

, Yuzhe Zhang, Jianjun Sun, Ting Xu
, Shenglin Zhang, Zhengdan Li, Yongqian Sun
, Fangrui Guo, Junyu Shen, Yuzhi Zhang, Dan Pei, Xiao Yang, Li Yu:
LogKG: Log Failure Diagnosis Through Knowledge Graph. 3493-3507 - Imam Mustafa Kamal

, Hyerim Bae
, Ling Liu
:
Metric Learning as a Service With Covariance Embedding. 3508-3522 - Amit Samanta

, Quoc-Viet Pham
, Nhu-Ngoc Dao
, Ammar Muthanna
, Sungrae Cho
:
mISO: Incentivizing Demand-Agnostic Microservices for Edge-Enabled IoT Networks. 3523-3536 - Yuanyuan Fu

, Kun Liang, Jian Xu
:
MLog: Mogrifier LSTM-Based Log Anomaly Detection Approach Using Semantic Representation. 3537-3549 - Chuang Li

, Aoli He
, Yanhua Wen
, Gang Liu
, Anthony Theodore Chronopoulos
:
Optimal Trading Mechanism Based on Differential Privacy Protection and Stackelberg Game in Big Data Market. 3550-3563 - Lulu Han

, Weiqi Luo
, Yaxi Yang
, Anjia Yang
, Rongxing Lu
, Junzuo Lai, Yandong Zheng
:
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments. 3564-3577 - Wenjing Gao

, Jia Yu
:
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing. 3578-3589 - Yankai Xie

, Qingtao Wang
, Ruoyue Li
, Chi Zhang
, Lingbo Wei
:
Private Transaction Retrieval for Lightweight Bitcoin Clients. 3590-3603 - Yifeng Zheng

, Shuangqing Xu
, Songlei Wang
, Yansong Gao
, Zhongyun Hua
:
Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables. 3604-3620 - Zhen Lv

, Kaiyu Shang
, Hongwei Huo
, Ximeng Liu
, Yanguo Peng
, Xiangyu Wang
, Yaorong Tan
:
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data. 3621-3635 - Ensheng Liu

, Liping Zheng
, Qiang He
, Phu Lai
, Benzhu Xu
, Gaofeng Zhang
:
Role-Based User Allocation Driven by Criticality in Edge Computing. 3636-3650 - Yue Zeng

, Zhihao Qu
, Song Guo
, Bin Tang
, Baoliu Ye
, Jing Li
, Jie Zhang
:
RuleDRL: Reliability-Aware SFC Provisioning With Bounded Approximations in Dynamic Environments. 3651-3664 - E. Chen

, Shengdian Wang
, Yuqing Fan
, Yan Zhu
, Stephen S. Yau:
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts. 3665-3681 - Zhijun Ding

, Yuanyuan Zhou
, Shuaijun Wang, Changjun Jiang
:
SCAFE: A Service-Centered Cloud-Native Workflow Engine Architecture. 3682-3695 - Songnian Zhang

, Suprio Ray
, Rongxing Lu
, Yunguo Guan
, Yandong Zheng
, Jun Shao
:
SecBerg: Secure and Practical Iceberg Queries in Cloud. 3696-3710 - Willy Susilo

, Fuchun Guo
, Zhen Zhao
, Yinhao Jiang
, Chunpeng Ge
:
Secure Replication-Based Outsourced Computation Using Smart Contracts. 3711-3722 - Bingbing Song

, Ruxin Wang
, Song Gao
, Yunyun Dong
, Ling Liu
, Wei Zhou
:
Securing Deep Learning as a Service Against Adaptive High Frequency Attacks With MMCAT. 3723-3735 - Shaozhong Zhang

, Dingkai Zhang
, Yaohui Wu
, Haidong Zhong
:
Service Recommendation Model Based on Trust and QoS for Social Internet of Things. 3736-3750 - Rui Shi

, Huamin Feng
, Yang Yang
, Feng Yuan
, Yingjiu Li
, HweeHwa Pang
, Robert H. Deng
:
Threshold Attribute-Based Credentials With Redactable Signature. 3751-3765 - Lili Sun

, Yonggang Zhang
, Yandong Zheng
, Weiyu Song
, Rongxing Lu
:
Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud. 3766-3781 - Ran Ding

, Yan Xu
, Hong Zhong
, Jie Cui
, Kewei Sha
:
Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing. 3782-3795 - Wenjing Zhong

, Jinjing Zhao
, Hesuan Hu
:
Unified Implementation and Simplification for Task-Based Authorization Security in Workflows. 3796-3811 - Bo-Chen Tai

, Yao-Tung Tsou
, Szu-Chuang Li
, Yennun Huang
, Pei-Yuan Tsai
, Yu-Cheng Tsai
:
User-Driven Synthetic Dataset Generation With Quantifiable Differential Privacy. 3812-3826 - Wei Wei

, Qiao Ke
, Adam Zielonka
, Mariusz Pleszczynski
, Marcin Wozniak
:
Vehicle Parking Navigation Based on Edge Computing With Diffusion Model and Information Potential Field. 3827-3836 - Buqing Cao

, Mi Peng
, Lulu Zhang
, Yueying Qing
, Bing Tang
, Guosheng Kang
, Jianxun Liu
:
Web Service Recommendation via Integrating Heterogeneous Graph Attention Network Representation and FiBiNET Score Prediction. 3837-3850
Volume 16, Number 6, November - December 2023
- Shenglin Zhang, Pengxiang Jin, Zihan Lin, Yongqian Sun, Bicheng Zhang, Sibo Xia, Zhengdan Li, Zhenyu Zhong, Minghua Ma, Wa Jin, Dai Zhang, Zhenyu Zhu, Dan Pei:

Robust Failure Diagnosis of Microservice System Through Multimodal Data. 3851-3864 - Sujit Chowdhury

, Arnab Mukherjee
, Raju Halder
:
${\sf FedRLChain}$: Secure Federated Deep Reinforcement Learning With Blockchain. 3865-3878 - Ifteher Alom

, Md. Sadek Ferdous
, Mohammad Jabed Morshed Chowdhury
:
BlockMeter: An Application Agnostic Performance Measurement Framework for Private Blockchain Platforms. 3879-3891 - Huy Minh Huynh

, Bay Vo
, Zuzana Komínková Oplatková
, Witold Pedrycz
:
An Approach for Incremental Mining of Clickstream Patterns as a Service Application. 3892-3905 - Zhenli He

, Yanan Xu
, Mingxiong Zhao
, Wei Zhou
, Keqin Li
:
Priority-Based Offloading Optimization in Cloud-Edge Collaborative Computing. 3906-3919 - Yudi Zhang

, Willy Susilo
, Fuchun Guo
, Guomin Yang
:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. 3920-3930 - Md. Enamul Haque

, Mehmet Engin Tozal
:
Identification of Fraudulent Healthcare Claims Using Fuzzy Bipartite Knowledge Graphs. 3931-3945 - Feifei Chen

, Jingwen Zhou
, Xiaoyu Xia
, Yong Xiang
, Xuehong Tao
, Qiang He
:
Joint Optimization of Coverage and Reliability for Application Placement in Mobile Edge Computing. 3946-3957 - Meng Xi

, Jianwei Yin
, Zhengzi Xu
, Ying Li
, Shuiguang Deng, Yang Liu
:
Service Pattern Optimization: Focusing on Collaboration in Service Ecosystems. 3958-3971 - Hanqi Zhang

, Chang Xu
, Rongxing Lu
, Liehuang Zhu
, Chuan Zhang
, Yunguo Guan
:
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage. 3972-3985 - Lunzhi Deng

, Bo Wang
, Tao Wang, Shuai Feng, Siwei Li
:
Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage. 3986-3998 - Dilxat Ghopur

, Jianfeng Ma
, Xindi Ma
, Jialu Hao
, Tao Jiang
, Xiangyu Wang
:
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation. 3999-4011 - Qi He

, Jie Sun
, Xiao-Jian Li
:
False Data Injection Attack Detection Based on Redundant Sparse Reconstruction. 4012-4024 - Amani Abusafia

, Abdallah Lakhdari
, Athman Bouguettaya
:
Flow-Based Energy Services Composition. 4025-4040 - Ryeong Hwan Kim

, Hwangjun Song
, Gi Seok Park
:
Moving Real-Time Services to Web 3.0: Challenges and Opportunities. 4041-4059 - PeiYun Zhang

, Wenjun Huang
, Yutong Chen
, MengChu Zhou
:
Predicting Quality of Services Based on a Two-Stream Deep Learning Model With User and Service Graphs. 4060-4072 - Guobing Zou

, Shiyi Lin
, Shengxiang Hu
, Shengyu Duan
, Yanglan Gan
, Bofeng Zhang
, Yixin Chen
:
FHC-DQP: Federated Hierarchical Clustering for Distributed QoS Prediction. 4073-4086 - Yinbin Miao, Yueming Yu

, Xinghua Li
, Yu Guo
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Defending Against Membership Inference Attack by Shielding Membership Signals. 4087-4101 - Yimin Guo

, Yajun Guo
:
CS-LAKA: A Lightweight Authenticated Key Agreement Protocol With Critical Security Properties for IoT Environments. 4102-4114 - Huaman Zhou

, Zonghang Li
, Hongfang Yu
, Long Luo
, Gang Sun
:
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs. 4115-4127 - Fadhila Tlili

, Samiha Ayed
, Lamia Chaari Fourati
:
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection. 4128-4139 - Mohammad Belayet Hossain

, Shiva Raj Pokhrel
, Jinho Choi
:
Privacy Cost Optimization of Smart Meters Using URLLC and Demand Side Energy Trading. 4140-4153 - Jin Li

, Shu Li
, Yuan Zhao
, Longjiang Guo
, Fei Hao
, Meirui Ren
, Keqin Li
:
Predicting Dropouts Before Enrollments in MOOCs: An Explainable and Self-Supervised Model. 4154-4167 - Duo Zhang

, Shangping Wang
, Qian Zhang
, Yaling Zhang
:
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain. 4168-4182 - Yi Xie

, Xue-Yi Wang, Zi-Jun Shen
, Yuhan Sheng
, Gong-Xing Wu
:
A Two-Stage Estimation of Distribution Algorithm With Heuristics for Energy-Aware Cloud Workflow Scheduling. 4183-4197 - Hochan Lee

, Jaewook Lee
, Heewon Kim
, Sangheon Pack
:
Straggler-Aware In-Network Aggregation for Accelerating Distributed Deep Learning. 4198-4204 - Yang Gu

, Jian Cao
, Shiyou Qian
, Wei Guan
:
SWORTS: A Scientific Workflow Retrieval Approach by Learning Textual and Structural Semantics. 4205-4219 - Xin Wang, Xiaojun Zhang

, Xinpeng Zhang
, Yinbin Miao, Jingting Xue:
Enabling Anonymous Authorized Auditing Over Keyword-Based Searchable Ciphertexts in Cloud Storage Systems. 4220-4232 - Jinlu Liu

, Zhongkai Wei
, Jing Qin
, Bo Zhao
, Jixin Ma
:
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting. 4233-4247 - Ying Cheng

, Xiumin Wang
, Pan Zhou
, Xinglin Zhang
, Weiwei Wu
:
Freshness-Aware Incentive Mechanism for Mobile Crowdsensing With Budget Constraint. 4248-4260 - Tao Shi

, Hui Ma
, Gang Chen
, Sven Hartmann
:
Auto-Scaling Containerized Applications in Geo-Distributed Clouds. 4261-4274 - Kaiyang Liu

, Jingrong Wang
, Heng Li
, Jun Peng
, Jianping Pan
:
Sampling-Based Caching for Low Latency in Distributed Coded Storage Systems. 4275-4287 - Claudio Marche

, Ilaria Cabiddu
, Christian Giovanni Castangia
, Luigi Serreli
, Michele Nitti
:
Implementation of a Multi-Approach Fake News Detector and of a Trust Management Model for News Sources. 4288-4301 - Zhenyu Wen

, Renyu Yang
, Bin Qian
, Yubo Xuan
, Lingling Lu
, Zheng Wang
, Hao Peng
, Jie Xu
, Albert Y. Zomaya
, Rajiv Ranjan
:
Janus: Latency-Aware Traffic Scheduling for IoT Data Streaming in Edge Environments. 4302-4316 - Shanshan Tu

, Muhammad Waqas
, Akhtar Badshah
, Mingxi Yin, Ghulam Abbas
:
Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing. 4317-4327 - Lionel Nkenyereye

, Kang-Jun Baeg
, Wan-Young Chung
:
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing. 4328-4344 - Xingxia Dai

, Zhu Xiao
, Hongbo Jiang
, Ming Lei, Geyong Min
, Jiangchuan Liu
, Schahram Dustdar
:
Offloading Dependent Tasks in Edge Computing With Unknown System-Side Information. 4345-4359 - Hao Guo

, Collin Meese
, Wanxin Li
, Chien-Chung Shen
, Mark M. Nejad
:
B2SFL: A Bi-Level Blockchained Architecture for Secure Federated Learning-Based Traffic Prediction. 4360-4374 - Bingxin Tang, Junyuan Liang, Zhongteng Cai, Ting Cai, Xiaocong Zhou, Yingye Chen:

MDRL-IR: Incentive Routing for Blockchain Scalability With Memory-Based Deep Reinforcement Learning. 4375-4388 - Yeonho Yoo

, Gyeongsik Yang
, Changyong Shin
, Junseok Lee
, Chuck Yoo
:
Machine Learning-Based Prediction Models for Control Traffic in SDN Systems. 4389-4403 - Jing Mei

, Zhao Tong
, Kenli Li
, Lianming Zhang
, Keqin Li
:
Energy-Efficient Heuristic Computation Offloading With Delay Constraints in Mobile Edge Computing. 4404-4417 - Wenan Tan

, Weinan Niu
, Jia Wei
, Lida Xu
:
TNSAR: Temporal Evolution Network Embedding Based on Structural and Attribute Retention. 4418-4431 - Ahmad Hammoud

, Rabeb Mizouni
, Hadi Otrok
, Shakti Singh
, Azzam Mourad
, Zbigniew Dziong
:
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations. 4432-4443 - Jinhua Ma

, Shengmin Xu
, Jianting Ning
, Xinyi Huang
, Robert H. Deng
:
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials. 4444-4455 - Yatong Jiang

, Tao Shang
, Jianwei Liu
:
Secure Gene Sequence Alignment Based on Garbled Circuit. 4456-4466 - Yuchen Li

, Haoyi Xiong
, Linghe Kong
, Rui Zhang
, Fanqin Xu
, Guihai Chen
, Minglu Li
:
MHRR: MOOCs Recommender Service With Meta Hierarchical Reinforced Ranking. 4467-4480 - Shuai Feng

, Liang Feng Zhang
:
An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage. 4481-4492 - Hamed Aboutorab

, Omar Khadeer Hussain
, Morteza Saberi
, Farookh Khadeer Hussain
, Daniel D. Prior
:
Reinforcement Learning-Based News Recommendation System. 4493-4502 - Zhiwei Wang

, Longwen Lan
, Siu-Ming Yiu
:
Chameleon Hash Based Efficiently Updatable Oblivious Key Management. 4503-4513 - Gianni Costa

, Agostino Forestiero
, Riccardo Ortale
:
Rule-Based Detection of Anomalous Patterns in Device Behavior for Explainable IoT Security. 4514-4525 - Haojun Huang

, Jialin Tian
, Hao Yin
, Geyong Min
, Dapeng Oliver Wu
, Wang Miao
:
RQAP: Resource and QoS Aware Placement of Service Function Chains in NFV-Enabled Networks. 4526-4539 - Jiajun Yao

, Lei Yang
, Zhenyu Wang
, Xiaohua Xu
:
Non-Rejection Aware Online Task Assignment in Spatial Crowdsourcing. 4540-4553 - Hua Shen

, Ge Wu
, Willy Susilo
, Mingwu Zhang
:
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry. 4554-4566 - Yanzhao Tian

, Lixiang Li
, Haipeng Peng
, Ding Wang
, Yixian Yang
:
Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences. 4567-4579 - Amin Bagheri

, Alireza Shameli-Sendi
:
Automating the Translation of Cloud Users' High-Level Security Needs to an Optimal Placement Model in the Cloud Infrastructure. 4580-4590 - Jiao Liu

, Xinghua Li
, Ximeng Liu
, Jiawei Tang
, Yunwei Wang
, Qiuyun Tong
, Jianfeng Ma
:
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework. 4591-4604 - Muhammad Umair

, Athman Bouguettaya
, Abdallah Lakhdari
:
Determining Intent of Changes to Ascertain Fake Crowdsourced Image Services. 4605-4616

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














