IEEE Transactions on Services Computing

Papers
(The median citation count of IEEE Transactions on Services Computing is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
KeAD: Knowledge-enhanced Graph Attention Network for Accurate Anomaly Detection192
Effective Graph Modeling and Contrastive Learning for Time-Aware QoS Prediction188
RDRM: Real-Time Dynamic Replica Management With Joint Optimization for Edge Computing165
Cost-aware Resource Recommendation for DAG-based Big Data Workflows: An Apache Spark Case Study160
Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems136
Modeling and Empirical Validation of Reliability and Performance Trade-Offs of Dynamic Routing in Service- and Cloud-Based Architectures134
Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks128
Cross-F $^{2}$ SCIL: A Federated Few-Shot Class Incremental Learning Method for Cross Mobile Edge Network Environments125
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers122
Weighted Adversarial Learning From Crowds108
Maximizing NFT Incentives: References Make You Rich106
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage102
Maximum Entropy Policy for Long-Term Fairness in Interactive Recommender Systems99
Distributed Bandit-Based Cooperative Coevolution for Large-Scale Multi-Objective Data Publishing96
Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)96
Holistic Root Cause Analysis for Failures in Cloud-Native Systems Through Observability Data94
DynaEDI+: Reliable and Decentralized Integrity Verification for Dynamic Edge Data93
Scalable Large Model for Unlabeled Anomaly Detection With Trio-Attention U-Transformer and Manifold-Learning Siamese Discriminator92
Dynamic Cluster-Based Flow Management for Software Defined Networks91
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage89
M-DAFTO: Multi-Stage Deferred Acceptance Based Fair Task Offloading in IoT-Fog Systems86
Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion84
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing82
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data75
Towards Effective Resource Procurement in MEC: A Resource Re-Selling Framework73
Paramart: Parallel Resource Allocation Based on Blockchain Sharding for Edge-Cloud Services72
Proactive Recommendation of Composite Services in Multi-Access Edge Computing72
ESR-MHFL: Edge Server Reallocation for Multi-Hierarchical Federated Learning71
A Blockchain-Based Cross-Domain Data Transmission Scheme for Industrial Internet of Things With Edge-Cloud Computing70
Optimizing Blockchain Shard Allocations Service: A Multi-Objective Evolutionary Perspective70
Enhancing Game Policy Optimization in Mobile Crowdsourcing: A Reinforcement Learning Approach70
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment69
SNN-IoT: Efficient Partitioning and Enabling of Deep Spiking Neural Networks in IoT Services69
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment68
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs65
Scheduling Multi-Server Jobs With Sublinear Regrets via Online Learning65
Task Allocation With Geography-Context-Capacity Awareness in Distributed Burstable Billing Edge-Cloud Systems64
2021 Reviewers List63
Availability and Reliability of Core Networks (4G/5G) From a Deployment Standpoint63
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts59
Pre-Fetch or Not: A Privacy-Aware Edge-User Co-opetition Delivery Framework for Metaverse Multimedia Services59
Federated Distributed Deep Reinforcement Learning for Recommendation-Enabled Edge Caching58
Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network58
MSCCL: A Framework for Enhancing Mashup Service Clustering With Contrastive Learning58
An Efficient Replication-Based Aggregation Verification and Correctness Assurance Scheme for Federated Learning58
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query57
Deep Reinforcement Learning for Scheduling Applications in Serverless and Serverful Hybrid Computing Environments57
Incentive Mechanism for Mobile Crowdsensing with Two-Stage Stackelberg Game57
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query57
Energy-Aware Service Function Chaining Embedding in NFV Networks55
Resource Provisioning and Allocation in Function-as-a-Service Edge-Clouds54
Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing54
Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning53
DeFedGCN: Privacy-Preserving Decentralized Federated GCN for Recommender System53
FREB: Participant Selection in Federated Learning with Reputation Evaluation and Blockchain53
Reputation Bootstrapping for Composite Services Using CP-Nets52
In-Flight Energy-Driven Composition of Drone Swarm Services50
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development50
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing49
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing47
Joint Optimization of Fine-grained Representation and Workflow Orchestration in Metaverse Articulated Manipulation Auto-generation by VLA Method47
Scheduling Workflows With Composite Tasks: A Nested Particle Swarm Optimization Approach47
Real-Time Task and Resource Co-Optimization in Edge-Cloud Computing for Networked Control Systems via Logic-based Benders Decomposition47
Differential Privacy-Based Location Protection in Spatial Crowdsourcing46
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys46
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem46
TREAT: Temporal and Relational Attention-Based Tensor Representation Learning for Ethereum Phishing Users45
MADRL-Based Order Dispatching in MoD Systems With Bipartite Graph Splitting45
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles45
VPFLI: Verifiable Privacy-Preserving Federated Learning With Irregular Users Based on Single Server45
FaaSDeliver: Cost-Efficient and QoS-Aware Function Delivery in Computing Continuum44
Semantically Rich Framework to Automate Cyber Insurance Services44
Integrating IoT and 6G: Applications of Edge Intelligence, Challenges, and Future Directions44
Performance Isolation for Serverless Functions43
A Blockchain System for QoS Monitoring in Decentralized Edge Computing42
Automated Probe Life-Cycle Management for Monitoring-As-a-Service42
Criticality and Utility-Aware Fog Computing System for Remote Health Monitoring42
Privacy Cost Optimization of Smart Meters Using URLLC and Demand Side Energy Trading42
2024 Reviewers List*41
A Semantically Rich Framework to Automate Cloud Service Level Agreements41
GraphIoT: Lightweight IoT Device Detection Based on Graph Classifiers and Incremental Learning40
Secure and Privacy Preserving Scalable GDPR Enforcement System40
Dynamic Adaptive Federated Learning on Local Long-Tailed Data40
A Game-Based Computation Offloading With Imperfect Information in Multi-Edge Environments40
An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud40
Secure Updatable Storage Access Control System for EHRs in the Cloud39
Guest Editor's Introduction: Special Section on Edge AI as a Service39
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving39
Q-BLPP: A Quality-Enabled Bilateral Location Privacy-Preserving Service Construction Scheme in Mobile Crowd Sensing39
Freshness-Aware Incentive Mechanism for Mobile Crowdsensing With Budget Constraint39
FlowValve+: Multi-Queue Packet Scheduling Framework on SoC-Based SmartNICs39
Online Service Placement, Task Scheduling, and Resource Allocation in Hierarchical Collaborative MEC Systems38
Joint Task Offloading, Resource Allocation and Model Placement for AI as a Service in 6G Network38
Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud38
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing38
ESync: Accelerating Intra-Domain Federated Learning in Heterogeneous Data Centers38
Boolean Searchable Attribute-Based Signcryption With Search Results Self-Verifiability Mechanism for Data Storage and Retrieval in Clouds37
Distributed Computing Applications of Context-Aware QoS and Trust Prediction Framework37
MapReduce Task Scheduling in Heterogeneous Geo-Distributed Data Centers37
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services37
Enforcing Corporate Governance Controls With Cloud-Based Services37
Implicit Supervision-Assisted Graph Collaborative Filtering for Third-Party Library Recommendation37
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing37
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs36
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images36
Communication-Efficient Federated Learning With Adaptive Aggregation for Heterogeneous Client-Edge-Cloud Network36
Time Series QoS Forecasting for Web Services Using Multi-Predictor-Based Genetic Programming36
Analysis and Controlling of Manufacturing Service Ecosystem: A Research Framework Based on the Parallel System Theory35
Vehicle Parking Navigation Based on Edge Computing With Diffusion Model and Information Potential Field35
Runtime Verification of Business Cloud Workflow Temporal Conformance35
PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack35
User Preference Oriented Service Caching and Task Offloading for UAV-Assisted MEC Networks34
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting34
A Direct Data Aware LSTM Neural Network Architecture for Complete Remaining Trace and Runtime Prediction34
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework34
UrbanEnQoSPlace: A Deep Reinforcement Learning Model for Service Placement of Real-Time Smart City IoT Applications33
Improving the Schedulability of Real-Time Tasks Using Fog Computing33
Edge-Assisted Public Key Homomorphic Encryption for Preserving Privacy in Mobile Crowdsensing33
Hierarchical Reinforcement Learning for Conversational Recommendation With Knowledge Graph Reasoning and Heterogeneous Questions33
Practical Blockchain-Based Options Contract32
Computation Offloading With Instantaneous Load Billing for Mobile Edge Computing32
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices32
A Fine-Grained Regularization Scheme for Non-negative Latent Factorization of High-Dimensional and Incomplete Tensors32
Aggregated Capability Assessment (AgCA) For CAIQ Enabled Cross-cloud Federation32
BlockEmulator: An Emulator Enabling to Test Blockchain Sharding Protocols32
Accurate and Interpretable Log-Based Fault Diagnosis Using Large Language Models31
Magneto: Load-Balanced Key-Value Service for Write-Intensive Workloads31
TAPESTRY: A De-Centralized Service for Trusted Interaction Online31
Data Caching Optimization With Fairness in Mobile Edge Computing30
DeFiGuard: A Price Manipulation Detection Service in DeFi Using Graph Neural Networks30
Trajectory Privacy Protection Method Based on Differential Privacy in Crowdsensing30
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations30
TaCo: Tasks Co-programming for Accelerating Inference in Scaling Edge Computing30
FRESCO: Fast and Reliable Edge Offloading with Reputation-based Hybrid Smart Contracts30
Web Service Recommendation via Combining Topic-aware Heterogeneous Graph Representation and Interactive Semantic Enhancement30
Linear Structure Analysis of Embeddings for Bias Disparity Reduction in Collaborative Filtering30
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security30
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection29
Explainable and Effective Process Remaining Time Prediction Using Feature-Informed Cascade Prediction Model29
Deep Reinforcement Learning With Entropy and Attention Mechanism for D2D-Assisted Task Offloading in Edge Computing29
Achieving Searchable Encryption Scheme With Search Pattern Hidden29
DMSDRec: Dynamic Structure-Aware Graph Masked Autoencoder and Spatiotemporal Diffusion for Next-POI Recommendation29
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm29
ReMatch: An Efficient Virtual Data Center Re-Matching Strategy Based on Matching Theory29
Social-Sensor Composition for Tapestry Scenes28
Burst-Aware Predictive Autoscaling for Containerized Microservices28
Elastic Resource Provisioning Using Data Clustering in Cloud Service Platform28
Secure Cloud Data Deduplication with Efficient Re-Encryption28
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation28
Toward Efficient and Reliable Private Set Computation in Decentralized Storage28
A Multi-View Deep Learning Approach for Predictive Business Process Monitoring28
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain28
Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting27
Virtdev: Towards Providing Edge Services27
Fast Subgraph Matching by Dynamic Graph Editing27
Random Coding Responses for Resisting Side-Channel Attacks in Client-Side Deduplicated Cloud Storage27
Multi-Layered Continuous Reasoning for Cloud-IoT Application Management27
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets27
Utility-Aware and Privacy-Preserving Mobile Query Services27
Energy Consumption Scheduling as a Fog Computing Service in Smart Grid26
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing26
Comment on “A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage”26
Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources26
Artificial Impostors: An Efficient and Scalable Scheme for Location Privacy Preservation26
Employ AI to Improve AI Services : Q-Learning Based Holistic Traffic Control for Distributed Co-Inference in Deep Learning26
CrossMeta: A Fast and Cheap Cross-Metaverse Interoperability Protocol26
RT3C: Real-Time Crowd Counting in Multi-Scene Video Streams via Cloud-Edge-Device Collaboration26
A Privacy-Preserving Authenticated Key Agreement Scheme Based on Physically Unclonable Functions for Multi-Server Architecture26
An Approach for Incremental Mining of Clickstream Patterns as a Service Application26
Indirect Revocable KP-ABE With Revocation Undoing Resistance26
FedOrbit: Energy Efficient Federated Learning for Orbital Edge Computing Using Block Minifloat Arithmetic26
Accurate and Reliable Service Recommendation Based on Bilateral Perception in Multi-Access Edge Computing26
Threshold Attribute-Based Credentials With Redactable Signature25
An Efficient Algorithm for Microservice Placement in Cloud-Edge Collaborative Computing Environment25
A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels25
RESERVE: An Energy-Efficient Edge Cloud Architecture for Intelligent Multi-UAV25
DRPC: Distributed Reinforcement Learning Approach for Scalable Resource Provisioning in Container-Based Clusters25
Data Access Control in Cloud Computing: Flexible and Receiver Extendable25
CATScaler: A Convolution-Augmented Transformer Scaling Framework for Cloud-Native Applications25
FAST: A Forecasting Model With Adaptive Sliding Window and Time Locality Integration for Dynamic Cloud Workloads25
Compiling Service Function Chains via Fine-Grained Composition in the Programmable Data Plane25
Swift and Accurate Mobility-Aware QoS Forecasting for Mobile Edge Environments25
STARDUST: A Novel Process Mining Approach to Discover Evolving Models From Trace Streams24
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud24
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption24
Efficient Privacy-Preserving Face Identification Protocol24
NOVA: Neural-Optimized Viewport Adaptive 360-Degree Video Streaming at the Edge24
DySR: A Dynamic Graph Neural Network Based Service Bundle Recommendation Model for Mashup Creation24
A Workflow Scheduling Approach With Modified Fuzzy Adaptive Genetic Algorithm in IaaS Clouds24
Service Regulation Analysis Framework for Service Design Time: A Case Study of Internet Healthcare Service24
A Trust Model for SLA Negotiation Candidates Selection in a Dynamic IoT Environment24
Efficient and Privacy-Enhanced Federated Learning Based on Parameter Degradation24
Energy-minimized Scheduling of Real-time Parallel Workflows on Heterogeneous Distributed Computing Systems24
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding24
DDPQN: An Efficient DNN Offloading Strategy in Local-Edge-Cloud Collaborative Environments23
A Novel Addressing and Routing Architecture for Cloud-Service Datacenter Networks23
Unlocking Complexity: Harnessing Value Entropy for Advanced Multidimensional Utility Evaluation in Service Ecosystems23
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets23
Multi-criteria performance analysis based on Physics of Decision — Application to COVID-19 and future pandemics23
Data Re-Outsourcing Detection With Latency-Constraint for Edge Storage23
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code23
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security23
Efficient Approximation Algorithms for Scheduling Coflows With Precedence Constraints in Identical Parallel Networks to Minimize Weighted Completion Time23
Efficient Transition Adjacency Relation Computation for Process Model Similarity23
Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation22
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data22
Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain22
Generalized Nesterov's Acceleration-Incorporated, Non-Negative and Adaptive Latent Factor Analysis22
Next PoI Recommendation Based on Graph Convolutional Networks and Multiple Context-Awareness22
TrustPay: A Dual-Layer Blockchain-Based Framework for Trusted Service Transaction22
MTDA: Efficient and Fair DPU Offloading Method for Multiple Tenants22
Task Recommendation in Crowdsourcing Based on Learning Preferences and Reliabilities22
Experimental Evaluation of Rule-Based Autonomic Computing Management Framework for Cloud-Native Applications22
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection22
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis22
MHRR: MOOCs Recommender Service With Meta Hierarchical Reinforced Ranking21
Cold-Start Next-Item Recommendation by User-Item Matching and Auto-Encoders21
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud21
A Granular SVM-Based Method for Top-N Web Services Recommendation21
Secure Replication-Based Outsourced Computation Using Smart Contracts21
A Formal Treatment of Contract Signature21
Priority-Based Selection of Individuals in Memetic Algorithms for Distributed Data-Intensive Web Service Compositions21
AoI-Aware Inference Services in Edge Computing via Digital Twin Network Slicing21
HGDRec:Next POI Recommendation Based on Hypergraph Neural Network and Diffusion Model20
A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid20
Understanding AWS Provider Dependencies Updates in Infrastructure-as-Code: Empirical Study, Taxonomy, and Insights20
Dynamic Multi-Resource Optimization for Storage Acceleration in Cloud Storage Systems20
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks20
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET20
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI20
Exploring Dynamic Task Loading in SGX-Based Distributed Computing20
Secure Neighbor Discovery as a Service in the Internet of Ships Environment20
Leveraging Consortium Blockchain for Secure Cross-Domain Data Sharing in Supply Chain Networks20
A Monitoring-Free Bitcoin Payment Channel Scheme With Support for Real-Time Settlement20
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing20
An Efficient and Secure Trading Framework for Shared Charging Service Based on Multiple Consortium Blockchains20
In-Network Computing Empowered Mobile Edge Offloading Architecture for Internet of Things20
Online Traffic Allocation for Video Service Providers in Cloud-Edge Cooperative Systems19
Extracting Reusable Fragments From Data-Centric Process Variants19
Graph-Represented Computation-Intensive Task Scheduling Over Air-Ground Integrated Vehicular Networks19
Reliable Service Recommendation: A Multi-Modal Adversarial Method for Personalized Recommendation Under Uncertain Missing Modalities19
A Deep Reinforcement Learning Approach for Composing Moving IoT Services19
Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing19
HG-PAD: Heterogeneous Graph Structure Learning Aided Performance Anomaly Diagnosis in Microservice Systems19
SHELDB: Client Storage Aware Homomorphic Encrypted Database Processing Framework With Low Communication Overhead19
Offloading Dependent Tasks in Edge Computing With Unknown System-Side Information19
An Embedded GRASP-VNS based Two-Layer Framework for Tour Recommendation19
Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS19
DIST: Distributed Learning-Based Energy-Efficient and Reliable Task Scheduling and Resource Allocation in Fog Computing19
Loader: A Log Anomaly Detector Based on Transformer19
0.18829703330994