


default search action
IEEE Transactions on Services Computing, Volume 15
Volume 15, Number 1, January - February 2022
- Reyhaneh Rabaninejad

, Mahmoud Ahmadian-Attari, Maryam Rajabzadeh Asaar
, Mohammad Reza Aref:
A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage. 1-15 - Xiang Zhou

, Xin Peng
, Tao Xie, Jun Sun, Chao Ji, Wenhai Li, Dan Ding:
Delta Debugging Microservice Systems with Parallel Optimization. 16-29 - Kawsar Haghshenas

, Ali Pahlevan
, Marina Zapater
, Siamak Mohammadi
, David Atienza
:
MAGNETIC: Multi-Agent Machine Learning-Based Approach for Energy Efficient Dynamic Consolidation in Data Centers. 30-44 - Jianhao Wei

, Yaping Lin
, Xin Yao
, Jin Zhang:
Differential Privacy-Based Location Protection in Spatial Crowdsourcing. 45-58 - Changbo Ke

, Fu Xiao
, Zhiqiu Huang
, Yunfei Meng
, Yan Cao:
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data. 59-68 - Qin Liu

, Yue Tian
, Jie Wu
, Tao Peng
, Guojun Wang
:
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data. 69-82 - Xiao Xue

, Jiajia Gao, Shuang Wu, Shufang Wang, Zhiyong Feng
:
Value-Based Analysis Framework of Crossover Service: A Case Study of New Retail in China. 83-96 - Fahima Amin Bhuyan

, Shiyong Lu
, Robert G. Reynolds, Jia Zhang
, Ishtiaq Ahmed
:
A Security Framework for Scientific Workflow Provenance Access Control Policies. 97-109 - Mian Guo

, Quansheng Guan
, Weiqi Chen, Fei Ji
, Zhiping Peng:
Delay-Optimal Scheduling of VMs in a Queueing Cloud Computing System with Heterogeneous Workloads. 110-123 - Jun Shao

, Rongxing Lu
, Yunguo Guan
, Guiyi Wei
:
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud. 124-137 - Quyuan Wang

, Songtao Guo
, Jiadi Liu
, Chengsheng Pan, Li Yang:
Profit Maximization Incentive Mechanism for Resource Providers in Mobile Edge Computing. 138-149 - Qin-zhe Xiao

, Jinghui Zhong
, Liang Feng
, Linbo Luo
, Jianming Lv
:
A Cooperative Coevolution Hyper-Heuristic Framework for Workflow Scheduling Problem. 150-163 - Hui Ma

, Rui Zhang
, Shuzhou Sun
, Zishuai Song, Gaosheng Tan:
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing. 164-173 - Adrian Satja Kurdija

, Marin Silic
, Goran Delac
, Klemo Vladimir
:
Fast Multi-Criteria Service Selection for Multi-User Composite Applications. 174-187 - Song Yang

, Fan Li
, Ramin Yahyapour
, Xiaoming Fu
:
Delay-Sensitive and Availability-Aware Virtual Network Function Scheduling for NFV. 188-201 - Zhihua Xia

, Leqi Jiang, Dandan Liu, Lihua Lu, Byeungwoo Jeon
:
BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing. 202-214 - Attila Altay Yavuz

, Muslum Ozgur Ozmen
:
Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices. 215-227 - Moustafa AbdelBaky

, Manish Parashar
:
A General Performance and QoS Model for Distributed Software-Defined Environments. 228-240 - Chengliang Tian

, Jia Yu
, Hanlin Zhang, Haiyang Xue
, Cong Wang
, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. 241-253 - Yu Du

, Jun Li
, Long Shi
, Tingting Liu
, Feng Shu
, Zhu Han
:
Two-Tier Matching Game in Small Cell Networks for Mobile Edge Computing. 254-265 - Anmin Fu

, Zhenzhu Chen
, Yi Mu
, Willy Susilo
, Yinxia Sun
, Jie Wu
:
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization. 266-278 - Thanh Dat Dang

, Doan Hoang
, Diep N. Nguyen
:
Trust-Based Scheduling Framework for Big Data Processing with MapReduce. 279-293 - Marcello Cinque

, Raffaele Della Corte
, Antonio Pecchia
:
Microservices Monitoring with Event Logs and Black Box Execution Tracing. 294-307 - Zengpeng Li

, Ding Wang
:
Achieving One-Round Password-Based Authenticated Key Exchange over Lattices. 308-321 - Lei Yang

, Xi Yu
, Jiannong Cao
, Wengen Li
, Yuqi Wang
, Michal Szczecinski:
A Novel Demand Dispatching Model for Autonomous On-Demand Services. 322-333 - Xiaojun Zhang

, Jie Zhao
, Chunxiang Xu
, Huaxiong Wang
, Yuan Zhang
:
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage. 334-345 - Ding Ding

, Kyuho Jeong, Shuning Xing
, Mauro Conti
, Renato Figueiredo
, Fangai Liu
:
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships. 346-360 - Yu-Fan Liu, Kate Ching-Ju Lin

, Chien-Chao Tseng
:
Dynamic Cluster-Based Flow Management for Software Defined Networks. 361-371 - Kaneez Fizza

, Nitin Auluck
, Akramul Azim
:
Improving the Schedulability of Real-Time Tasks Using Fog Computing. 372-385 - Christian Cabrera

, Siobhán Clarke
:
A Self-Adaptive Service Discovery Model for Smart Cities. 386-399 - Zhizhong Liu

, Quan Z. Sheng
, Xiaofei Xu, Dianhui Chu, Wei Emma Zhang
:
Context-Aware and Adaptive QoS Prediction for Mobile Edge Computing Services. 400-413 - Aqun Zhao

, Zhiyu Liu, Jianping Pan
, Mangui Liang
:
A Novel Addressing and Routing Architecture for Cloud-Service Datacenter Networks. 414-428 - Massimo La Morgia

, Alessandro Mei
, Eugenio Nerio Nemmi
, Simone Raponi
, Julinda Stefa:
Nationality and Geolocation-Based Profiling in the Dark(Web). 429-441 - Haoran Yuan

, Xiaofeng Chen
, Jin Li
, Tao Jiang
, Jianfeng Wang
, Robert H. Deng
:
Secure Cloud Data Deduplication with Efficient Re-Encryption. 442-456 - Lifang Ren

, Wenjian Wang
:
A Granular SVM-Based Method for Top-N Web Services Recommendation. 457-469 - Asif Iqbal Middya

, Benay Kumar Ray, Sarbani Roy
:
Auction-Based Resource Allocation Mechanism in Federated Cloud Environment: TARA. 470-483 - Pengcheng Zhang

, Huiying Jin
, Hai Dong
, Wei Song
:
M-BSRM: Multivariate BayeSian Runtime QoS Monitoring Using Point Mutual Information. 484-497 - Qinya Li

, Fan Wu
, Guihai Chen
:
An Efficient, Fair, and Robust Image Pricing Mechanism for Crowdsourced 3D Reconstruction. 498-512 - Bin Cao

, Jiaxing Wang
, Jing Fan, Shuiguang Deng
, Jian Yang
, Weiliang Zhao
, Jianwei Yin, Mengchu Zhou
:
ProDiff: A Process Difference Detection Method Based on Hierarchical Decomposition. 513-526 - Farshad Mashhadi

, Sergio A. Salinas Monroy
:
Economically-Robust Dynamic Control of the Additive Manufacturing Cloud. 527-538 - Zhiyu Hao, Wei Wang

, Lei Cui
, Xiaochun Yun, Zhenquan Ding:
iConSnap: An Incremental Continuous Snapshots System for Virtual Machines. 539-550 - Yanzhao Wu

, Ling Liu
, Calton Pu
, Wenqi Cao
, Semih Sahin, Wenqi Wei
, Qi Zhang
:
A Comparative Measurement Study of Deep Learning as a Service Framework. 551-566 - Lei Zhang

, Hu Xiong
, Qiong Huang
, Jiguo Li
, Kim-Kwang Raymond Choo
, Jiangtao Li
:
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. 567-587
Volume 15, Number 2, March - April 2022
- Andrzej Goscinski

, Elisa Bertino, Shangguang Wang
:
Guest Editor's Introduction: Special Section on EdgeAI as a Service. 588-590 - Peiying Lin

, Zhichen Shi, Zheng Xiao
, Cen Chen
, Kenli Li
:
Latency-Driven Model Placement for Efficient Edge Intelligence Service. 591-601 - Ivan Lujic

, Vincenzo De Maio
, Srikumar Venugopal, Ivona Brandic
:
SEA-LEAP: Self-Adaptive and Locality-Aware Edge Analytics Placement. 602-613 - Jianxin Zhao

, Rui Han
, Yongkai Yang, Benjamin Catterall, Chi Harold Liu
, Lydia Y. Chen
, Richard Mortier, Jon Crowcroft
, Liang Wang
:
Federated Learning With Heterogeneity-Aware Probabilistic Synchronous Parallel on Edge. 614-626 - Chaofeng Zhang

, Mianxiong Dong
, Kaoru Ota
:
Employ AI to Improve AI Services : Q-Learning Based Holistic Traffic Control for Distributed Co-Inference in Deep Learning. 627-639 - Min Xue, Huaming Wu

, Guang Peng
, Katinka Wolter
:
DDPQN: An Efficient DNN Offloading Strategy in Local-Edge-Cloud Collaborative Environments. 640-655 - Dionysis Athanasopoulos

, Dewei Liu
:
AI Back-End as a Service for Learning Switching of Mobile Apps Between the Fog and the Cloud. 656-668 - Zheyuan Hu

, Jianwei Niu
, Tao Ren
, Bin Dai
, Qingfeng Li
, Mingliang Xu
, Sajal K. Das
:
An Efficient Online Computation Offloading Approach for Large-Scale Mobile Edge Computing via Deep Reinforcement Learning. 669-683 - Lanlan Rui

, Xushan Chen
, Xiaomei Wang
, Zhipeng Gao, Xuesong Qiu
, Shangguang Wang
:
Multiservice Reliability Evaluation Algorithm Considering Network Congestion and Regional Failure Based on Petri Net. 684-697 - Mohammad Allahbakhsh

, Haleh Amintoosi
, Aleksandar Ignjatovic, Elisa Bertino
:
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations. 698-709 - Xiangyu Wang

, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Ruikang Yang
:
Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing. 710-723 - Yang Chen

, Wenmin Li
, Fei Gao
, Qiaoyan Wen
, Hua Zhang
, Huawei Wang
:
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. 724-735 - Chang-Ai Sun

, Hepeng Dai
, Guan Wang, Dave Towey
, Tsong Yueh Chen
, Kai-Yuan Cai:
Dynamic Random Testing of Web Services: A Methodology and Evaluation. 736-751 - Qi Mo

, Wei Song
, Fei Dai
, Leilei Lin, Tong Li
:
Development of Collaborative Business Processes: A Correctness Enforcement Approach. 752-765 - Weiwei Lin

, Wentai Wu
, Ligang He
:
An On-Line Virtual Machine Consolidation Strategy for Dual Improvement in Performance and Energy Conservation of Server Clusters in Cloud Data Centers. 766-777 - Teng Wang

, Xinyu Yang
, Xuebin Ren
, Wei Yu
, Shusen Yang
:
Locally Private High-Dimensional Crowdsourced Data Release Based on Copula Functions. 778-792 - Di Wu

, Qiang He
, Xin Luo
, Mingsheng Shang
, Yi He
, Guoyin Wang
:
A Posterior-Neighborhood-Regularized Latent Factor Model for Highly Accurate Web Service QoS Prediction. 793-805 - Chuan Zhang

, Liehuang Zhu
, Chang Xu
, Kashif Sharif
, Kai Ding
, Ximeng Liu
, Xiaojiang Du
, Mohsen Guizani
:
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET. 806-818 - Beiqing Chen

, Haihang Zhou, Jianguo Yao
, Haibing Guan:
RESERVE: An Energy-Efficient Edge Cloud Architecture for Intelligent Multi-UAV. 819-832 - Haoyu Luo

, Xiao Liu
, Jin Liu
, Yun Yang
, John C. Grundy
:
Runtime Verification of Business Cloud Workflow Temporal Conformance. 833-846 - Yuanning Gao

, Xiaofeng Gao
, Xianyue Li, Bin Yao
, Guihai Chen:
An Embedded GRASP-VNS based Two-Layer Framework for Tour Recommendation. 847-859 - Mutaz Barika

, Saurabh Kumar Garg
, Andrew Chan
, Rodrigo N. Calheiros
:
Scheduling Algorithms for Efficient Execution of Stream Workflow Applications in Multicloud Environments. 860-875 - Andrei Palade

, Siobhán Clarke
:
Collaborative Agent Communities for Resilient Service Composition in Mobile Environments. 876-890 - Xiaoping Li

, Wei Yu
, Rubén Ruiz
, Jie Zhu
:
Energy-Aware Cloud Workflow Applications Scheduling With Geo-Distributed Data. 891-903 - Faruk Hasic

, Johannes De Smedt
, Seppe vanden Broucke
, Estefanía Serral
:
Decision as a Service (DaaS): A Service-Oriented Architecture Approach for Decisions in Processes. 904-917 - Haozhe Lin

, Yushun Fan
, Jia Zhang
, Bing Bai
:
MSP-RNN: Multi-Step Piecewise Recurrent Neural Network for Predicting the Tendency of Services Invocation. 918-930 - Jia Wang, Xiaoping Li

, Rubén Ruiz
, Jie Yang, Dianhui Chu
:
Energy Utilization Task Scheduling for MapReduce in Heterogeneous Clusters. 931-944 - Manuel Parra-Royon

, Ghislain Atemezing
, José Manuel Benítez
:
Semantics of Data Mining Services in Cloud Computing. 945-955 - Evagoras Makridis

, Kyriakos M. Deliparaschos
, Evangelia Kalyvianaki, Argyrios C. Zolotas
, Themistoklis Charalambous
:
Robust Dynamic CPU Resource Provisioning in Virtualized Servers. 956-969 - Zheng Xiao

, Gang Liu, Dan He
, Yang Guo, Jiayi Du
:
Concurrent Request Multiplexing for Cloud Composite Service Reservation. 970-985 - Xiao Pan

, Shili Nie, Haibo Hu
, Philip S. Yu
, Jingfeng Guo:
Reverse Nearest Neighbor Search in Semantic Trajectories for Location-Based Services. 986-999 - Pingpeng Yuan

, Yujie You, Shuang Zhou, Hai Jin
, Ling Liu
:
Providing Fast Reachability Query Services With MGTag: A Multi-Dimensional Graph Labeling Method. 1000-1011 - Yunling Wang

, Shifeng Sun, Jianfeng Wang
, Joseph K. Liu
, Xiaofeng Chen
:
Achieving Searchable Encryption Scheme With Search Pattern Hidden. 1012-1025 - Siyu Zhao

, Rui Jiang
, Bharat K. Bhargava
:
RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage. 1026-1035 - Payal Chaudhari

, Manik Lal Das
:
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption. 1036-1044 - John Ravan

, Shankar M. Banik
, Csilla Farkas:
Ensuring Consistent Transactions in a Web Service Environment With Prediction-Based Performance Metrics. 1045-1058 - Tooba Aamir

, Hai Dong
, Athman Bouguettaya
:
Social-Sensor Composition for Tapestry Scenes. 1059-1073 - An Song

, Wei-Neng Chen
, Xiaonan Luo
, Zhi-Hui Zhan
, Jun Zhang
:
Scheduling Workflows With Composite Tasks: A Nested Particle Swarm Optimization Approach. 1074-1088 - Gary White

, Siobhán Clarke
:
Short-Term QoS Forecasting at the Edge for Reliable Service Applications. 1089-1102 - Pengcheng Zhang

, Huiying Jin
, Hai Dong
, Wei Song
, Athman Bouguettaya
:
Privacy-Preserving QoS Forecasting in Mobile Edge Environments. 1103-1117 - Abubakr O. Al-Abbasi

, Vaneet Aggarwal
:
Joint Information Freshness and Completion Time Optimization for Vehicular Networks. 1118-1129 - Hua Deng

, Zheng Qin
, Qianhong Wu, Zhenyu Guan, Hui Yin
:
Revocable Attribute-Based Data Storage in Mobile Clouds. 1130-1142 - Lamees M. Al Qassem

, Thanos Stouraitis
, Ernesto Damiani
, Ibrahim M. Elfadel
:
FPGAaaS: A Survey of Infrastructures and Systems. 1143-1156 - Kwang Mong Sim

:
Intelligent Resource Management in Intercloud, Fog, and Edge: Tutorial and New Directions. 1157-1174
Volume 15, Number 3, May - June 2022
- Mei-Ling Shyu

, Surya Nepal
, Valérie Issarny
, James Joshi
:
Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics. 1175-1177 - Xinyan Li, Han Wang

, Chunyang Chen
, John Grundy
:
An Empirical Study on How Well Do COVID-19 Information Dashboards Service Users' Information Needs. 1178-1192 - Carmela Comito

:
How COVID-19 Information Spread in U.S.? The Role of Twitter as Early Indicator of Epidemics. 1193-1205 - Xiaolong Xu

, Hao Tian
, Xuyun Zhang
, Lianyong Qi
, Qiang He
, Wanchun Dou
:
DisCOV: Distributed COVID-19 Detection on X-Ray Images With Edge-Cloud Collaboration. 1206-1219 - Javier Andreu-Perez

, Humberto Pérez Espinosa
, Eva Timonet
, Mehrin Kiani, Manuel I. Girón-Pérez, Alma B. Benitez-Trinidad, Delaram Jarchi
, Alejandro Rosales-Pérez
, Nick Gatzoulis, Orion Fausto Reyes-Galaviz
, Alejandro Antonio Torres García, Carlos A. Reyes García, Zulfiqar Ali, Francisco Rivas:
A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels. 1220-1232 - Shantanu Sharma

, Sharad Mehrotra, Nisha Panwar
, Nalini Venkatasubramanian, Peeyush Gupta
, Shanshan Han, Guoxi Wang:
Quest: Privacy-Preserving Monitoring of Network Data: A System for Organizational Response to Pandemics. 1233-1250 - Saiful Khan

, Phong Hai Nguyen
, Alfie Abdul-Rahman
, Euan Freeman
, Cagatay Turkay
, Min Chen
:
Rapid Development of a Data Visualization Service in an Emergency Response. 1251-1264 - Jen-Sheng Tsai

, I-Hsun Chuang
, Jie-Jyun Liu, Yau-Hwang Kuo
, Wanjiun Liao
:
QoS-Aware Fog Service Orchestration for Industrial Internet of Things. 1265-1279 - Abdallah Lakhdari

, Athman Bouguettaya
, Sajib Mistry
, Azadeh Ghari Neiat
:
Composing Energy Services in a Crowdsourced IoT Environment. 1280-1294 - Jisheng Pei

, Lijie Wen
, Xiaojun Ye
, Akhil Kumar
:
Efficient Transition Adjacency Relation Computation for Process Model Similarity. 1295-1308 - Xiaorui Wu

, Hong Xu
, Bo Li
, Yongqiang Xiong
:
Stanza: Layer Separation for Distributed Training in Deep Learning. 1309-1320 - Hang Xu

, Lifang Ren
, Wenjian Wang
:
A Service Selection Method Based on Ordinal Classification for Historical Records. 1321-1333 - Hao Wu

, Xin Luo
, MengChu Zhou
:
Advancing Non-Negative Latent Factorization of Tensors With Diversified Regularization Schemes. 1334-1344 - Xiaolin Chang

, Yu Shi, Zhenjiang Zhang
, Zhen Xu, Kishor S. Trivedi
:
Job Completion Time Under Migration-Based Dynamic Platform Technique. 1345-1357 - Yandong Zheng

, Rongxing Lu
, Jun Shao
, Fan Yin
, Hui Zhu
:
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud. 1358-1370 - Guangshun Yao

, Qian Ren
, Xiaoping Li
, Shenghui Zhao, Rubén Ruiz
:
A Hybrid Fault-Tolerant Scheduling for Deadline-Constrained Tasks in Cloud Systems. 1371-1384 - Yifan Yang

, Daniel Cooper, John P. Collomosse
, Constantin Catalin Dragan
, Mark Manulis
, Jamie Steane
, Arthi Manohar
, Jo Briggs
, Helen S. Jones
, Wendy Moncur
:
TAPESTRY: A De-Centralized Service for Trusted Interaction Online. 1385-1398 - Meng Ma

, Weilan Lin, Disheng Pan, Ping Wang
:
Self-Adaptive Root Cause Diagnosis for Large-Scale Microservice Architecture. 1399-1410 - Jiechao Gao

, Haoyu Wang
, Haiying Shen
:
Task Failure Prediction in Cloud Data Centers Using Deep Learning. 1411-1422 - Yong-Yi Fanjiang

, Yang Syu
, Wei-Lun Huang:
Time Series QoS Forecasting for Web Services Using Multi-Predictor-Based Genetic Programming. 1423-1435 - Juanjuan Li

, Xiaochun Ni, Yong Yuan
, Fei-Yue Wang
:
A Novel GSP Auction Mechanism for Dynamic Confirmation Games on Bitcoin Transactions. 1436-1447 - Muhammad Abdullah

, Waheed Iqbal
, Josep Lluis Berral
, Jorda Polo
, David Carrera
:
Burst-Aware Predictive Autoscaling for Containerized Microservices. 1448-1460 - Shaohan Feng

, Zehui Xiong
, Dusit Niyato
, Ping Wang
, Shaun Shuxun Wang, Xuemin Sherman Shen
:
Joint Pricing and Security Investment in Cloud Security Service Market With User Interdependency. 1461-1472 - Mingjin Gao, Rujing Shen

, Jun Li
, Shihao Yan
, Yonghui Li
, Jinglin Shi, Zhu Han
, Li Zhuo
:
Computation Offloading With Instantaneous Load Billing for Mobile Edge Computing. 1473-1485 - Mohammad Allahbakhsh

, Haleh Amintoosi
, Behshid Behkamal
, Salil S. Kanhere
, Elisa Bertino
:
AQA: An Adaptive Quality Assessment Framework for Online Review Systems. 1486-1497 - Masoud Barati

, Omer F. Rana
:
Tracking GDPR Compliance in Cloud-Based Service Delivery. 1498-1511 - Jiadi Liu

, Songtao Guo
, Kai Liu
, Liang Feng
:
Resource Provision and Allocation Based on Microeconomic Theory in Mobile Edge Computing. 1512-1525 - Shuo Wang

, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
, Shangyu Chen, Tianle Chen:
Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models. 1526-1539 - Sudip Misra

, Robert Schober, Aishwariya Chakraborty
:
RACE: QoI-Aware Strategic Resource Allocation for Provisioning Se-aaS. 1540-1550 - Junqi Zhang

, Yushun Fan
, Jia Zhang
, Bing Bai
:
Learning to Build Accurate Service Representations and Visualization. 1551-1563 - Cristina Cabanillas

, Manuel Resinas
, Antonio Ruiz-Cortés
:
A Mashup-Based Framework for Business Process Compliance Checking. 1564-1577 - Bowen Fei

, Xiaomin Zhu
, Daqian Liu
, Junjie Chen, Weidong Bao
, Ling Liu
:
Elastic Resource Provisioning Using Data Clustering in Cloud Service Platform. 1578-1591 - Ehab Zaghloul

, Tongtong Li
, Matt W. Mutka
, Jian Ren
:
$d$d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. 1592-1605 - Zhuoran Ma

, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Ruikang Yang
, Xiangyu Wang
:
Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing. 1606-1618 - Jianting Ning

, Jiageng Chen
, Kaitai Liang
, Joseph K. Liu
, Chunhua Su
, Qianhong Wu
:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. 1619-1633 - Muhammad Zakarya

, Lee Gillam
, Hashim Ali
, Izaz Ur Rahman
, Khaled Salah
, Rahim Khan
, Omer F. Rana
, Rajkumar Buyya
:
epcAware: A Game-Based, Energy, Performance and Cost-Efficient Resource Management Technique for Multi-Access Edge Computing. 1634-1648 - Bei Wang, Ling Xu, Meng Yan, Chao Liu, Ling Liu:

Multi-Dimension Convolutional Neural Network for Bug Localization. 1649-1663 - Xueqiao Liu

, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Rongmao Chen
, Xixiang Lv
:
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. 1664-1677 - Xiaojuan Dong

, Weiming Zhang
, Mohsin Shah
, Bei Wang
, Nenghai Yu
:
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud. 1678-1692 - Cui-Yu Kong

, Bhaskar Prasad Rimal
, Martin Reisslein
, Martin Maier
, Islam Safak Bayram
, Michael Devetsikiotis
:
Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion. 1693-1706 - Jian Shen

, Tiantian Miao, Jin-Feng Lai
, Xiaofeng Chen
, Jin Li
, Shui Yu
:
IMS: An Identity-Based Many-to-Many Subscription Scheme With Efficient Key Management for Wireless Broadcast Systems. 1707-1719 - Aishwariya Chakraborty

, Sudip Misra
, Ayan Mondal
:
QoS-Aware Dynamic Cost Management Scheme for Sensors-as-a-Service. 1720-1731 - Hailiang Zhao

, Shuiguang Deng
, Zijie Liu
, Jianwei Yin, Schahram Dustdar
:
Distributed Redundant Placement for Microservice-based Applications at the Edge. 1732-1745 - Bo Li

, Qiang He
, Guangming Cui
, Xiaoyu Xia
, Feifei Chen
, Hai Jin
, Yun Yang
:
READ: Robustness-Oriented Edge Application Deployment in Edge Computing Environment. 1746-1759
Volume 15, Number 4, July - August 2022
- Xiao Xue

, Zhaojie Chen, Shufang Wang, Zhiyong Feng
, Yucong Duan
, Zhangbing Zhou
:
Value Entropy: A Systematic Evaluation Model of Service Ecosystem Evolution. 1760-1773 - Gregory Levitin

, Liudong Xing
, Yanping Xiang
:
Reliability versus Vulnerability of N-Version Programming Cloud Service Component With Dynamic Decision Time Under Co-Resident Attacks. 1774-1784 - Qiyu Kang

, Wee Peng Tay
:
Task Recommendation in Crowdsourcing Based on Learning Preferences and Reliabilities. 1785-1798 - Qin Liu

, Yu Peng
, Shuyu Pei, Jie Wu
, Tao Peng
, Guojun Wang
:
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search. 1799-1812 - Wei Guo

, Su-Juan Qin
, Fei Gao
, Hua Zhang
, Wenmin Li
, Zhengping Jin
, Qiaoyan Wen
:
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud. 1813-1824 - Sunanda Bose

, Nandini Mukherjee
:
SenSchedule: Scheduling Heterogeneous Resources in Sensor-Cloud Infrastructure. 1825-1840 - Haining Yu

, Xiaohua Jia
, Hongli Zhang
, Jiangang Shu
:
Efficient and Privacy-Preserving Ride Matching Using Exact Road Distance in Online Ride Hailing Services. 1841-1854 - Guoxiu Liu

, Geng Yang
, Shuangjie Bai
, Huaqun Wang, Yang Xiang
:
FASE: A Fast and Accurate Privacy-Preserving Multi-Keyword Top-k Retrieval Scheme Over Encrypted Cloud Data. 1855-1867 - Myeonggyun Han

, Woongki Baek
:
SDRP: Safe, Efficient, and SLO-Aware Workload Consolidation Through Secure and Dynamic Resource Partitioning. 1868-1882 - Zetao Yang

, Kang Liu
, Yufei Chen
, Wuhui Chen
, Mingdong Tang:
Two-Level Stackelberg Game for IoT Computational Resource Trading Mechanism: A Smart Contract Approach. 1883-1895 - Yuming Wang

, Yanbo Long, Lai Tu
, Ling Liu
:
Delivering Scientific Influence Analysis as a Service on Research Grants Repository. 1896-1911 - Maanak Gupta

, James O. Benson
, Farhan Patwa, Ravi S. Sandhu
:
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets. 1912-1925 - Fan Deng

, Zhenhua Yu
, Liyong Zhang, Jiawei Wang, Kexin Feng, Wenbin Kong, Lingyu Li, Jiawen Wu
:
ANNPDP: An Efficient and Stable Evaluation Engine for Large-Scale Policy Sets. 1926-1939 - Guobing Zou

, Zhen Qin
, Qiang He
, Pengwei Wang
, Bofeng Zhang
, Yanglan Gan
:
DeepWSC: Clustering Web Services via Integrating Service Composability into Deep Semantic Features. 1940-1953 - Chandana Roy

, Sudip Misra
, Jhareswar Maiti
, Ujjayini Chakravarty
:
Safe-Serv: Energy-Efficient Decision Delivery for Provisioning Safety-as-a-Service. 1954-1966 - Shih Yu Chang

, Hsiao-Chun Wu
:
Divide-and-Iterate Approach to Big Data Systems. 1967-1979 - Guangming Cui

, Qiang He
, Feifei Chen
, Hai Jin
, Yun Yang
:
Trading off Between Multi-Tenancy and Interference: A Service User Allocation Game. 1980-1992 - Xiong Gao

, Weidong Bao
, Xiaomin Zhu
, Guanlin Wu
, Ling Liu
:
An Edge Storage Acceleration Service for Collaborative Mobile Devices. 1993-2006 - Abeer Elahraf, Ayesha Afzal

, Ahmed Akhtar
, Basit Shafiq
, Jaideep Vaidya
, Shafay Shamail
, Nabil R. Adam
:
A Framework for Dynamic Composition and Management of Emergency Response Processes. 2018-2031 - Peng Zhao

, Wei Yu
, Xinyu Yang
, Duolun Meng, Li Wang, Shusen Yang
, Jie Lin
:
Context-Aware Multi-Criteria Handover at the Software Defined Network Edge for Service Differentiation in Next Generation Wireless Networks. 2032-2046 - Changhee Hahn

, Hyunsoo Kwon
, Daeyeong Kim
, Junbeom Hur
:
Enabling Fast Public Auditing and Data Dynamics in Cloud Services. 2047-2059 - Yu Guo

, Hongcheng Xie
, Yinbin Miao
, Cong Wang
, Xiaohua Jia
:
FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain. 2060-2073 - Ying Liu

, Qiang He
, Dequan Zheng, Xiaoyu Xia
, Feifei Chen
, Bin Zhang:
Data Caching Optimization in the Edge Computing Environment. 2074-2085 - Leilei Lin

, Lijie Wen
, Li Lin, Jisheng Pei
, Hedong Yang:
LCDD: Detecting Business Process Drifts Based on Local Completeness. 2086-2099 - Yu Zhao

, Daniel Alencar da Costa, Ying Zou:
Composing Web Services Using a Multi-Agent Framework. 2100-2113 - Jianshe Wu

, Nan Chen, Chaojie Zhou, Hefei Che, Chunlei Han, Qin Liu:
Computing the Number of Loop-Free k-hop Paths of Networks. 2114-2128 - Sheik Mohammad Mostakim Fattah

, Athman Bouguettaya
, Sajib Mistry
:
Long-Term IaaS Selection Using Performance Discovery. 2129-2143 - Cem Tekin

, Sepehr Elahi
, Mihaela van der Schaar:
Feedback Adaptive Learning for Medical and Educational Application Recommendation. 2144-2157 - Md. Azharul Islam, Sanjay Kumar Madria

:
Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud. 2158-2172 - Sébastien Andreina

, Jens-Matthias Bohli, Ghassan O. Karame
, Wenting Li
, Giorgia Azzurra Marson
:
PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains. 2173-2187 - Mengmeng Yang

, Ivan Tjuawinata
, Kwok-Yan Lam
, Jun Zhao
, Lin Sun:
Secure Hot Path Crowdsourcing With Local Differential Privacy Under Fog Computing Architecture. 2188-2201 - Yumei Li

, Futai Zhang
, Xin Liu
:
Secure Data Delivery With Identity-Based Linearly Homomorphic Network Coding Signature Scheme in IoT. 2202-2212 - Li Kong

, Chuanyi Li
, Jidong Ge
, Vincent Ng, Bin Luo:
Predicting Product Review Helpfulness - A Hybrid Method. 2213-2225 - Qingxuan Wang

, Chi Cheng
, Rui Xu, Jintai Ding
, Zhe Liu
:
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification. 2226-2231 - Ranjana Roy Chowdhury, Soumi Chattopadhyay

, Chandranath Adak
:
CAHPHF: Context-Aware Hierarchical QoS Prediction With Hybrid Filtering. 2232-2247 - Jian-Jhih Kuo

, Chih-Hang Wang
, Yishuo Shi
, De-Nian Yang
, Wen-Tsuen Chen
:
Scalable Rate Allocation for SDN With Diverse Service Requirements. 2248-2260 - Zonghang Li

, Huaman Zhou, Tianyao Zhou, Hongfang Yu
, Zenglin Xu
, Gang Sun
:
ESync: Accelerating Intra-Domain Federated Learning in Heterogeneous Data Centers. 2261-2274 - Avadh Kishor

, Rajdeep Niyogi
, Bharadwaj Veeravalli
:
Fairness-Aware Mechanism for Load Balancing in Distributed Systems. 2275-2288 - Suyel Namasudra

:
Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment. 2289-2300 - Lei Wang

, Qiang He
, Demin Gao
, Jing Wan, Yunqiu Zhang:
Temporal-Perturbation Aware Reliability Sensitivity Measurement for Adaptive Cloud Service Selection. 2301-2313 - Youhao Xia

, Ding Ding
, Zhenhua Chang
, Fan Li:
Joint Deep Networks Based Multi-Source Feature Learning for QoS Prediction. 2314-2327 - Shiva Kazemi Taskou

, Mehdi Rasti
, Pedro H. J. Nardelli
:
Energy and Cost Efficient Resource Allocation for Blockchain-Enabled NFV. 2328-2341 - Alberto Martin-Lopez

, Sergio Segura
, Carlos Müller
, Antonio Ruiz-Cortés
:
Specification and Automated Analysis of Inter-Parameter Dependencies in Web APIs. 2342-2355 - Md. Enamul Haque

, Mehmet Engin Tozal
:
Identifying Health Insurance Claim Frauds Using Mixture of Clinical Concepts. 2356-2367 - Shaoshuai Ding, Lei Yang

, Jiannong Cao
, Wei Cai
, Mingkui Tan
, Zhenyu Wang:
Partitioning Stateful Data Stream Applications in Dynamic Edge Cloud Environments. 2368-2381 - Vincenzo Pasquadibisceglie

, Annalisa Appice
, Giovanna Castellano
, Donato Malerba
:
A Multi-View Deep Learning Approach for Predictive Business Process Monitoring. 2382-2395 - Mohammed Bahutair

, Athman Bouguettaya
, Azadeh Ghari Neiat
:
Multi-Perspective Trust Management Framework for Crowdsourced IoT Services. 2396-2409 - Onur Ascigil

, Argyrios G. Tasiopoulos, Truong Khoa Phan
, Vasilis Sourlas
, Ioannis Psaras, George Pavlou
:
Resource Provisioning and Allocation in Function-as-a-Service Edge-Clouds. 2410-2424 - Wei Song

, Fangfei Chen, Hans-Arno Jacobsen
, Chengzhen Zhang:
Identifying a Minimum Sequence of High-Level Changes Between Workflows. 2425-2438 - Seyyed Hamid Ghafouri

, Seyyed Mohsen Hashemi
, Patrick C. K. Hung
:
A Survey on Web Service QoS Prediction Methods. 2439-2454 - Zibin Zheng

, Xiaoli Li
, Mingdong Tang
, Fenfang Xie
, Michael R. Lyu:
Web Service QoS Prediction via Collaborative Filtering: A Survey. 2455-2472 - Paolo Ceravolo

, Gabriel Marques Tavares
, Sylvio Barbon Junior
, Ernesto Damiani
:
Evaluation Goals for Online Process Mining: A Concept Drift Perspective. 2473-2489 - Jiewu Leng

, Man Zhou, J. Leon Zhao, Yongfeng Huang
, Yiyang Bian
:
Blockchain Security: A Survey of Techniques and Research Directions. 2490-2510
Volume 15, Number 5, September - October 2022
- Imed Abbassi

, Amel Mammar
, Mohamed Graiet:
A Correct-by-Construction Model for Verifying Transactional Composite Services Configuration. 2511-2525 - Ilir Murturi

, Schahram Dustdar
:
A Decentralized Approach for Resource Discovery using Metadata Replication in Edge Networks. 2526-2537 - Azadeh Ghari Neiat

, Athman Bouguettaya
, Mohammed Bahutair
:
A Deep Reinforcement Learning Approach for Composing Moving IoT Services. 2538-2550 - Huiying Hou

, Jianting Ning
, Yunlei Zhao
, Robert H. Deng
:
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs. 2551-2564 - Fan Li

, Gary White
, Siobhán Clarke
:
A Trust Model for SLA Negotiation Candidates Selection in a Dynamic IoT Environment. 2565-2578 - Xi Liu

, Jun Liu
:
A Truthful Double Auction Mechanism for Multi-Resource Allocation in Crowd Sensing Systems. 2579-2590 - Yan Wang

, Jiantao Zhou, Xiaoyu Song:
A Utility Game Driven QoS Optimization for Cloud Services. 2591-2603 - Yandong Zheng

, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data. 2604-2618 - Usama Ahmed

, Imran Raza
, Omer F. Rana
, Syed Asad Hussain
:
Aggregated Capability Assessment (AgCA) For CAIQ Enabled Cross-cloud Federation. 2619-2632 - Jinyong Chang

, Bilin Shao
, Yanyan Ji
, Genqing Bian:
Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage". 2633-2634 - Xiaoyu Xia

, Feifei Chen
, John C. Grundy
, Mohamed Abdelrazek
, Hai Jin
, Qiang He
:
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment. 2635-2647 - Mohammad Belayet Hossain

, Iynkaran Natgunanathan
, Yong Xiang
, Yushu Zhang
:
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices. 2648-2657 - Jianchang Lai

, Fuchun Guo
, Willy Susilo
, Xinyi Huang
, Peng Jiang
, Futai Zhang
:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. 2658-2670 - Hani Sami

, Azzam Mourad
, Hadi Otrok
, Jamal Bentahar
:
Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement. 2671-2684 - Ali Hamdi

, Flora D. Salim
, Du Yong Kim
, Azadeh Ghari Neiat
, Athman Bouguettaya
:
Drone-as-a-Service Composition Under Uncertainty. 2685-2698 - Phu Lai

, Qiang He
, Xiaoyu Xia
, Feifei Chen
, Mohamed Abdelrazek
, John C. Grundy
, John G. Hosking
, Yun Yang
:
Dynamic User Allocation in Stochastic Mobile Edge Computing Systems. 2699-2712 - Christos Tsigkanos

, Marcello M. Bersani
, Pantelis A. Frangoudis
, Schahram Dustdar
:
Edge-Based Runtime Verification for the Internet of Things. 2713-2727 - Xu Yang

, Xun Yi
, Surya Nepal
, Ibrahim Khalil
, Xinyi Huang, Jian Shen
:
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. 2728-2741 - Yandong Zheng

, Rongxing Lu
, Yunguo Guan
, Jun Shao
, Hui Zhu
:
Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare. 2742-2754 - Fengqi Li

, Kemeng Liu, Lupeng Zhang, Sikai Huang, Qiufan Wu:
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem. 2755-2765 - Biao Hu

, Zhengcai Cao
, MengChu Zhou
:
Energy-minimized Scheduling of Real-time Parallel Workflows on Heterogeneous Distributed Computing Systems. 2766-2779 - Shashika Ranga Muramudalige

, Benjamin W. K. Hung
, Anura P. Jayasumana
, Indrakshi Ray
, Jytte Klausen:
Enhancing Investigative Pattern Detection via Inexact Matching and Graph Databases. 2780-2794 - Yunguo Guan

, Hui Zheng, Jun Shao
, Rongxing Lu
, Guiyi Wei
:
Fair Outsourcing Polynomial Computation Based on the Blockchain. 2795-2808 - Xin Luo

, Yue Zhou, Zhigang Liu
, Lun Hu
, MengChu Zhou
:
Generalized Nesterov's Acceleration-Incorporated, Non-Negative and Adaptive Latent Factor Analysis. 2809-2823 - Maycon Leone Maciel Peixoto

, Thiago A. L. Genez, Luiz F. Bittencourt
:
Hierarchical Scheduling Mechanisms in Multi-Level Fog Computing. 2824-2837 - Lingyun Jiang, Xiaofu Niu, Jia Xu, Dejun Yang

, Lijie Xu:
Incentive Mechanism Design for Truth Discovery in Crowdsourcing With Copiers. 2838-2853 - Marco Rasori

, Pericle Perazzo
, Gianluca Dini
, Shucheng Yu
:
Indirect Revocable KP-ABE With Revocation Undoing Resistance. 2854-2868 - Jaydeep Das

, Shreya Ghosh
, Soumya K. Ghosh
, Rajkumar Buyya
:
LYRIC: Deadline and Budget Aware Spatio-Temporal Query Processing in Cloud. 2869-2882 - Zan Zong

, Lijie Wen
, Xuming Hu
, Rui Han
, Chen Qian
, Li Lin:
MespaConfig: Memory-Sparing Configuration Auto-Tuning for Co-Located In-Memory Cluster Computing Jobs. 2883-2896 - Quyuan Luo

, Changle Li
, Tom H. Luan
, Weisong Shi
:
Minimizing the Delay and Cost of Computation Offloading for Vehicular Edge Computing. 2897-2909 - Mincheol Kim

, Ling Liu
, Wonik Choi
:
Multi-GPU Efficient Indexing For Maximizing Parallelism of High Dimensional Range Query Services. 2910-2924 - Mohamed Yassin

, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb:
Multi-Tenant Intrusion Detection Framework as a Service for SaaS. 2925-2938 - Soheila Sadeghiram

, Hui Ma
, Gang Chen
:
Priority-Based Selection of Individuals in Memetic Algorithms for Distributed Data-Intensive Web Service Compositions. 2939-2953 - Xiaoguo Li

, Tao Xiang
, Shangwei Guo
, Hongwei Li
, Yi Mu
:
Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data. 2954-2968 - Miao Hu

, Di Wu
, Run Wu, Zhenkai Shi
, Min Chen
, Yipeng Zhou
:
RAP: A Light-Weight Privacy-Preserving Framework for Recommender Systems. 2969-2981 - Cosmin Avasalcai

, Christos Tsigkanos
, Schahram Dustdar
:
Resource Management for Latency-Sensitive IoT Applications With Satisfiability. 2982-2993 - Minghui Liwang

, Ruitao Chen
, Xianbin Wang
:
Resource Trading in Edge Computing-Enabled IoV: An Efficient Futures-Based Approach. 2994-3007 - Abdulhamid Adebayo, Danda B. Rawat

:
Scalable Service-Driven Database-Enabled Wireless Network Virtualization for Robust RF Sharing. 3008-3018 - Leyou Zhang

, Wenting You
, Yi Mu
:
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems. 3019-3030 - Kaustabha Ray

, Ansuman Banerjee
, Swarup Kumar Mohalik
:
Service Selection With Package Bundles and Compatibility Constraints. 3031-3046 - Ruitao Chen

, Xianbin Wang
, Xue (Steve) Liu
:
Smart Futures Based Resource Trading and Coalition Formation for Real-Time Mobile Data Processing. 3047-3060 - E. Chen

, Bohan Qin
, Yan Zhu
, Weijing Song, Shengdian Wang, William Cheng-Chung Chu
, Stephen S. Yau:
SPESC-Translator: Towards Automatically Smart Legal Contract Conversion for Blockchain-Based Auction Services. 3061-3076 - Haithem Mezni

:
Temporal Knowledge Graph Embedding for Effective Service Recommendation. 3077-3088 - Yi-Wei Ci

, Xiao-Ke Zhao, Yan-Peng Li, Zibin Zheng
:
Virtdev: Towards Providing Edge Services. 3089-3100
Volume 15, Number 6, November - December 2022
- Ron van der Meyden

:
A Formal Treatment of Contract Signature. 3101-3114 - Endong Tong

, Wenjia Niu, Jiqiang Liu:
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering. 3115-3128 - Linfeng Liu

, Zhiyuan Xi, Jiagao Wu, Jia Xu
:
Adaptive Data Dissemination Algorithm Based on Storing-Discarding Equilibrium for OUSNs. 3129-3142 - Meiyan Xiao

, Qiong Huang
, Ying Miao, Shunpeng Li, Willy Susilo
:
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation. 3143-3155 - Zhipeng Zhang

, Mianxiong Dong
, Kaoru Ota
, Yao Zhang, Yasuo Kudo
:
Context-Enhanced Probabilistic Diffusion for Urban Point-of-Interest Recommendation. 3156-3169 - Qi Gu

, Jian Cao
, Yancen Liu:
CSBR: A Compositional Semantics-Based Service Bundle Recommendation Approach for Mashup Development. 3170-3183 - Shuo Wang

, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
, Shangyu Chen, Tianle Chen, Zike An:
Defending Adversarial Attacks via Semantic Feature Manipulation. 3184-3197 - Nazim Uddin Sheikh

, Hassan Jameel Asghar
, Farhad Farokhi
, Mohamed Ali Kâafar
:
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters. 3198-3209 - Ning Huang, Lihui Wu, Weigang Wu

, Sajal K. Das
:
DTC: A Dynamic Transaction Chopping Technique for Geo-Replicated Storage Services. 3210-3223 - Yu Chen, Jiguo Li

, Chengdong Liu, Jinguang Han
, Yichen Zhang, Peng Yi
:
Efficient Attribute Based Server-Aided Verification Signature. 3224-3232 - Guangming Cui

, Qiang He
, Bo Li
, Xiaoyu Xia
, Feifei Chen
, Hai Jin
, Yang Xiang
, Yun Yang
:
Efficient Verification of Edge Data Integrity in Edge Computing Environment. 3233-3244 - Md. Al Maruf

, Anil Singh
, Akramul Azim
, Nitin Auluck
:
Faster Fog Computing Based Over-the-Air Vehicular Updates: A Transfer Learning Approach. 3245-3259 - Pei Ren

, Xiuquan Qiao
, Yakun Huang
, Ling Liu, Calton Pu
, Schahram Dustdar
:
Fine-Grained Elastic Partitioning for Distributed DNN Towards Mobile Web AR Services in the 5G Era. 3260-3274 - Wai-Kong Lee

, Seong Oun Hwang
:
High Throughput Implementation of Post-Quantum Key Encapsulation and Decapsulation on GPU for Internet of Things Applications. 3275-3288 - Erhe Yang

, Fei Hao
, Yixuan Yang
, Carmen De Maio, Aziz Nasridinov
, Geyong Min
, Laurence T. Yang
:
Incremental Entity Summarization With Formal Concept Analysis. 3289-3303 - Zhongwei Xie

, Ling Liu
, Yanzhao Wu
, Lin Li
, Luo Zhong:
Learning TFIDF Enhanced Joint Embedding for Recipe-Image Cross-Modal Retrieval Service. 3304-3316 - Xiaoping Li

, Fuchao Chen, Rubén Ruiz
, Jie Zhu
:
MapReduce Task Scheduling in Heterogeneous Geo-Distributed Data Centers. 3317-3329 - Hao Wu

, Yunhao Duan
, Kun Yue
, Lei Zhang
:
Mashup-Oriented Web API Recommendation via Multi-Model Fusion and Multi-Task Learning. 3330-3343 - Feifei Niu

, Chuanyi Li
, Jidong Ge
, Lijie Wen
, Zhongjin Li
, Bin Luo:
Measuring Business Process Behavioral Similarity Based on Token Log Profile. 3344-3357 - Dragi Kimovski

, Narges Mehran
, Christopher Emanuel Kerth, Radu Prodan
:
Mobility-Aware IoT Application Placement in the Cloud - Edge Continuum. 3358-3371 - Amirali Amiri

, Uwe Zdun
, André van Hoorn
:
Modeling and Empirical Validation of Reliability and Performance Trade-Offs of Dynamic Routing in Service- and Cloud-Based Architectures. 3372-3386 - Wenan Tan

, Lu Zhao
, Bo Li
, Lida Xu
, Yun Yang
:
Multiple Cooperative Task Allocation in Group-Oriented Social Mobile Crowdsensing. 3387-3401 - Lu Zhao

, Wenan Tan
, Bo Li
, Lida Xu
, Yun Yang
:
Multiple Cooperative Task Assignment on Reliability-Oriented Social Crowdsourcing. 3402-3416 - Yuanyuan Zeng

, Shujie Zhou, Kai Xiang
:
Online-Offline Interactive Urban Crowd Flow Prediction Toward IoT-Based Smart City. 3417-3428 - Zhuoran Ma

, Jianfeng Ma
, Yinbin Miao
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud. 3429-3442 - Qinlong Huang

, Jiabao Du, Guanyu Yan, Yixian Yang
, Qinglin Wei:
Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services. 3443-3456 - Meng Xi

, Jianwei Yin
, Jintao Chen, Ying Li
, Shuiguang Deng
:
Quantitative Assessment of Service Pattern: Framework, Language, and Metrics. 3457-3470 - Dan Tang

, Siqi Zhang
, Yudong Yan
, Jingwen Chen, Zheng Qin
:
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm. 3471-3484 - Zuobin Ying

, Wenjie Jiang, Ximeng Liu
, Shengmin Xu, Robert H. Deng
:
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing. 3485-3498 - Weizhe Zhang

, Desheng Wang
, Shui Yu
, Hui He
, Yan Wang
:
Repeatable Multi-Dimensional Virtual Network Embedding in Cloud Service Platform. 3499-3512 - Sajib Mistry

, Athman Bouguettaya
:
Reputation Bootstrapping for Composite Services Using CP-Nets. 3513-3527 - Chao Li

, Balaji Palanisamy:
SilentDelivery: Practical Timed-Delivery of Private Information Using Smart Contracts. 3528-3540 - Masoumeh Koochak Shooshtari

, Mohammad Reza Aref:
Smooth Projective Hash Function From Codes and its Applications. 3541-3553 - Haojun Huang

, Li Li, Geyong Min
, Wang Miao
, Yingying Zhu
, Yangming Zhao
:
TNDP: Tensor-Based Network Distance Prediction With Confidence Intervals. 3554-3565 - Qingqing Gan

, Xiaoming Wang
, Daxin Huang, Jianwei Li, Dehua Zhou, Chao Wang:
Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing. 3566-3576 - Sheng Gao

, Xiuhua Chen, Jianming Zhu
, Xuewen Dong
, Jianfeng Ma
:
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing. 3577-3590 - Jiayi Li

, Jianfeng Ma
, Yinbin Miao
, Lei Chen, Yunbo Wang, Ximeng Liu
, Kim-Kwang Raymond Choo
:
Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing. 3591-3605 - Qiuyun Tong

, Yinbin Miao
, Lei Chen, Jian Weng
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings. 3606-3619 - Min Shi

, Yuan Zhuang
, Yufei Tang
, Maohua Lin
, Xingquan Zhu
, Jianxun Liu
:
Web Service Network Embedding Based on Link Prediction and Convolutional Learning. 3620-3633 - Qiufen Xia

, Wenhao Ren
, Zichuan Xu
, Xin Wang
, Weifa Liang
:
When Edge Caching Meets a Budget: Near Optimal Service Delivery in Multi-Tiered Edge Clouds. 3634-3648 - Hao Zheng

, Yanan Jiang, Chen Tian, Long Cheng, Qun Huang
, Weichao Li, Yi Wang, Qianyi Huang, Jiaqi Zheng, Rui Xia, Yi Wang, Wanchun Dou, Guihai Chen:
Rethinking Fine-Grained Measurement From Software-Defined Perspective: A Survey. 3649-3667 - Rui Zhang

, Rui Xue
, Ling Liu
:
Security and Privacy for Healthcare Blockchains. 3668-3686

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














