IEEE Transactions on Services Computing

Papers
(The H4-Index of IEEE Transactions on Services Computing is 50. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Cost-aware Resource Recommendation for DAG-based Big Data Workflows: An Apache Spark Case Study169
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data147
Scheduling Multi-Server Jobs With Sublinear Regrets via Online Learning140
Proactive Recommendation of Composite Services in Multi-Access Edge Computing139
Towards Effective Resource Procurement in MEC: A Resource Re-Selling Framework123
PPFilter: Provider Privacy-Aware Encrypted Filtering System116
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage116
Paramart: Parallel Resource Allocation Based on Blockchain Sharding for Edge-Cloud Services110
Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems106
Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks105
Effective Graph Modeling and Contrastive Learning for Time-Aware QoS Prediction103
RDRM: Real-Time Dynamic Replica Management With Joint Optimization for Edge Computing101
Holistic Root Cause Analysis for Failures in Cloud-Native Systems Through Observability Data94
Modeling and Empirical Validation of Reliability and Performance Trade-Offs of Dynamic Routing in Service- and Cloud-Based Architectures90
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers86
Weighted Adversarial Learning From Crowds85
Maximum Entropy Policy for Long-Term Fairness in Interactive Recommender Systems85
Dynamic Cluster-Based Flow Management for Software Defined Networks84
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs78
Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion78
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage76
Scalable Large Model for Unlabeled Anomaly Detection With Trio-Attention U-Transformer and Manifold-Learning Siamese Discriminator76
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment74
Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)73
M-DAFTO: Multi-Stage Deferred Acceptance Based Fair Task Offloading in IoT-Fog Systems73
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing70
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment68
Task Allocation With Geography-Context-Capacity Awareness in Distributed Burstable Billing Edge-Cloud Systems65
Scheduling Workflows With Composite Tasks: A Nested Particle Swarm Optimization Approach64
2021 Reviewers List64
Multi-Scale LSTM Model for BGP Anomaly Classification63
An Efficient Replication-Based Aggregation Verification and Correctness Assurance Scheme for Federated Learning62
Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing62
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts62
DeFedGCN: Privacy-Preserving Decentralized Federated GCN for Recommender System61
Availability and Reliability of Core Networks (4G/5G) From a Deployment Standpoint61
Deep Reinforcement Learning for Scheduling Applications in Serverless and Serverful Hybrid Computing Environments61
Federated Distributed Deep Reinforcement Learning for Recommendation-Enabled Edge Caching61
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem59
Efficient Query of Quality Correlation for Service Composition59
Energy-Aware Service Function Chaining Embedding in NFV Networks59
Differential Privacy-Based Location Protection in Spatial Crowdsourcing57
Incentive Mechanism for Mobile Crowdsensing with Two-Stage Stackelberg Game56
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development56
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys56
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing55
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing54
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query54
Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach53
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query50
Dynamic Trust Enforcing Pricing Scheme for Sensors-as-a-Service in Sensor-Cloud Infrastructure50
Reputation Bootstrapping for Composite Services Using CP-Nets50
Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network50
0.082683086395264