IEEE Transactions on Services Computing

Papers
(The median citation count of IEEE Transactions on Services Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Task Failure Prediction in Cloud Data Centers Using Deep Learning136
An Attention-Based Spatiotemporal LSTM Network for Next POI Recommendation120
Demystifying Membership Inference Attacks in Machine Learning as a Service111
Covering-Based Web Service Quality Prediction via Neighborhood-Aware Matrix Factorization110
Uncertainty-Aware Online Scheduling for Real-Time Workflows in Cloud Service Environment102
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data100
Heterogeneous Computational Resource Allocation for NOMA: Toward Green Mobile Edge-Computing Systems95
Blockchain Security: A Survey of Techniques and Research Directions94
Advancing Non-Negative Latent Factorization of Tensors With Diversified Regularization Schemes93
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing89
DisCOV: Distributed COVID-19 Detection on X-Ray Images With Edge-Cloud Collaboration83
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security78
Efficient Query of Quality Correlation for Service Composition78
A Posterior-Neighborhood-Regularized Latent Factor Model for Highly Accurate Web Service QoS Prediction77
Web Service QoS Prediction via Collaborative Filtering: A Survey76
Blockchain-Enabled Service Optimizations in Supply Chain Digital Twin70
Profit Maximization Incentive Mechanism for Resource Providers in Mobile Edge Computing69
Minimizing the Delay and Cost of Computation Offloading for Vehicular Edge Computing67
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets66
Distributed Redundant Placement for Microservice-based Applications at the Edge65
Mashup Recommendation by Regularizing Matrix Factorization with API Co-Invocations64
READ: Robustness-Oriented Edge Application Deployment in Edge Computing Environment64
Toward a Smart Cloud: A Review of Fault-Tolerance Methods in Cloud Systems62
Multiple Attributes QoS Prediction via Deep Neural Model with Contexts61
Serverless Computing: State-of-the-Art, Challenges and Opportunities60
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing59
Load Balancing Algorithms in Fog Computing56
Auction-Based VM Allocation for Deadline-Sensitive Tasks in Distributed Edge Cloud54
Differential Privacy-Based Location Protection in Spatial Crowdsourcing54
Generalized Nesterov's Acceleration-Incorporated, Non-Negative and Adaptive Latent Factor Analysis54
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks53
An Analysis of Public REST Web Service APIs53
BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing52
AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges52
A Location-Based Factorization Machine Model for Web Service QoS Prediction52
Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment51
DDPQN: An Efficient DNN Offloading Strategy in Local-Edge-Cloud Collaborative Environments50
Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search50
Delay-Sensitive and Availability-Aware Virtual Network Function Scheduling for NFV49
Provable Data Possession with Outsourced Data Transfer48
Resource Aware Routing for Service Function Chains in SDN and NFV-Enabled Network48
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption48
Location-Based Web Service QoS Prediction via Preference Propagation to Address Cold Start Problem47
A Double-Space and Double-Norm Ensembled Latent Factor Model for Highly Accurate Web Service QoS Prediction47
Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement47
QoS-Aware Robotic Streaming Workflow Allocation in Cloud Robotics Systems46
Burst-Aware Predictive Autoscaling for Containerized Microservices46
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing46
A Survey on Web Service QoS Prediction Methods46
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment46
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem45
A Two-Stage Estimation of Distribution Algorithm With Heuristics for Energy-Aware Cloud Workflow Scheduling45
Similarity-Maintaining Privacy Preservation and Location-Aware Low-Rank Matrix Factorization for QoS Prediction Based Web Service Recommendation45
A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels45
Privacy Preserving Location-Aware Personalized Web Service Recommendations44
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities44
PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys44
Security and Privacy for Healthcare Blockchains43
A Dynamic Virtual Machine Placement and Migration Scheme for Data Centers42
Secure Cloud Data Deduplication with Efficient Re-Encryption41
Joint Computation Offloading and Resource Allocation for D2D-Assisted Mobile Edge Computing40
Energy-minimized Scheduling of Real-time Parallel Workflows on Heterogeneous Distributed Computing Systems40
Fair Task Allocation in Crowdsourced Delivery40
MedShare: A Privacy-Preserving Medical Data Sharing System by Using Blockchain40
Resource Provisioning and Allocation in Function-as-a-Service Edge-Clouds39
Evolutionary Multi-Objective Optimization for Web Service Location Allocation Problem39
Low-Cost Adaptive Monitoring Techniques for the Internet of Things38
Value Entropy: A Systematic Evaluation Model of Service Ecosystem Evolution37
Computation Offloading in MIMO Based Mobile Edge Computing Systems Under Perfect and Imperfect CSI Estimation37
Joint Computation Partitioning and Resource Allocation for Latency Sensitive Applications in Mobile Edge Clouds37
A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System37
Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models37
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment37
Temporal Task Scheduling of Multiple Delay-Constrained Applications in Green Hybrid Cloud36
Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level36
FedCrowd: A Federated and Privacy-Preserving Crowdsourcing Platform on Blockchain36
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET36
Computation Offloading With Instantaneous Load Billing for Mobile Edge Computing35
Multiple Cooperative Task Allocation in Group-Oriented Social Mobile Crowdsensing35
Multi-Scale LSTM Model for BGP Anomaly Classification35
Improving the Schedulability of Real-Time Tasks Using Fog Computing35
Availability Evaluation of Multi-Tenant Service Function Chaining Infrastructures by Multidimensional Universal Generating Function35
How COVID-19 Information Spread in U.S.? The Role of Twitter as Early Indicator of Epidemics34
Practical Multi-Keyword and Boolean Search Over Encrypted E-mail in Cloud Server34
An Availability Analysis Approach for Deployment Configurations of Containers34
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search33
Multi-Objective Service Composition in Uncertain Environments33
A Classification Based Web Service Selection Approach31
Efficient Verification of Edge Data Integrity in Edge Computing Environment31
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage31
Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing31
Towards Green Service Composition Approach in the Cloud30
Energy-Aware Cloud Workflow Applications Scheduling With Geo-Distributed Data30
Achieving Searchable Encryption Scheme With Search Pattern Hidden30
Efficient Attribute Based Server-Aided Verification Signature30
An Efficient Online Computation Offloading Approach for Large-Scale Mobile Edge Computing via Deep Reinforcement Learning30
Delay-Optimized Multicast Tree Packing in Software-Defined Networks30
DP-LTOD: Differential Privacy Latent Trajectory Community Discovering Services over Location-Based Social Networks29
Deep Learning for Predictive Business Process Monitoring: Review and Benchmark29
Microservices: Migration of a Mission Critical System29
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus29
Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization29
On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach29
A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing28
A Comparative Measurement Study of Deep Learning as a Service Framework28
Achieving One-Round Password-Based Authenticated Key Exchange over Lattices28
Tracking GDPR Compliance in Cloud-Based Service Delivery27
An On-Line Virtual Machine Consolidation Strategy for Dual Improvement in Performance and Energy Conservation of Server Clusters in Cloud Data Centers27
Mashup-Oriented Web API Recommendation via Multi-Model Fusion and Multi-Task Learning27
Microservices Monitoring with Event Logs and Black Box Execution Tracing27
epcAware: A Game-Based, Energy, Performance and Cost-Efficient Resource Management Technique for Multi-Access Edge Computing27
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage27
Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems27
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services27
A Game-Based Price Bidding Algorithm for Multi-Attribute Cloud Resource Provision26
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data26
Scheduling Real-Time Security Aware Tasks in Fog Networks26
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things25
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings25
Two-Tier Matching Game in Small Cell Networks for Mobile Edge Computing25
Joint Information Freshness and Completion Time Optimization for Vehicular Networks25
A Multi-View Deep Learning Approach for Predictive Business Process Monitoring25
Data Caching Optimization in the Edge Computing Environment25
Integrated AHP-IOWA, POWA Framework for Ideal Cloud Provider Selection and Optimum Resource Management25
MAGNETIC: Multi-Agent Machine Learning-Based Approach for Energy Efficient Dynamic Consolidation in Data Centers24
Dynamic Trust Enforcing Pricing Scheme for Sensors-as-a-Service in Sensor-Cloud Infrastructure24
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems24
A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage24
Context-Aware and Adaptive QoS Prediction for Mobile Edge Computing Services24
RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage24
A Topic-Sensitive Method for Mashup Tag Recommendation Utilizing Multi-Relational Service Data23
Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud23
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud23
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing23
Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach23
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption23
A Hybrid Fault-Tolerant Scheduling for Deadline-Constrained Tasks in Cloud Systems23
Multi-Agent Reinforcement Learning Aided Computation Offloading in Aerial Computing for the Internet-of-Things23
Hierarchical Scheduling Mechanisms in Multi-Level Fog Computing22
Scheduling Workflows With Composite Tasks: A Nested Particle Swarm Optimization Approach22
An Effective Classification-Based Framework for Predicting Cloud Capacity Demand in Cloud Services22
Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing22
Dynamic User Allocation in Stochastic Mobile Edge Computing Systems22
Joint Deep Networks Based Multi-Source Feature Learning for QoS Prediction22
Comments on “SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage”22
A Cooperative Coevolution Hyper-Heuristic Framework for Workflow Scheduling Problem22
A Learning Automata-Based Scheduling for Deadline Sensitive Task in The Cloud22
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm21
HAP: A Hybrid QoS Prediction Approach in Cloud Manufacturing Combining Local Collaborative Filtering and Global Case-Based Reasoning21
Evaluation Goals for Online Process Mining: A Concept Drift Perspective21
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud21
Fine-Grained Elastic Partitioning for Distributed DNN Towards Mobile Web AR Services in the 5G Era21
Energy Utilization Task Scheduling for MapReduce in Heterogeneous Clusters21
A Novel GSP Auction Mechanism for Dynamic Confirmation Games on Bitcoin Transactions21
Delay-Optimal Scheduling of VMs in a Queueing Cloud Computing System with Heterogeneous Workloads21
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage21
Delta Debugging Microservice Systems with Parallel Optimization21
LA-LMRBF: Online and Long-Term Web Service QoS Forecasting20
Mobility-Aware IoT Application Placement in the Cloud – Edge Continuum20
Specification and Automated Analysis of Inter-Parameter Dependencies in Web APIs20
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing20
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud20
Resource Management for Latency-Sensitive IoT Applications With Satisfiability20
An Online Orchestration Mechanism for General-Purpose Edge Computing20
Learning User Preference from Heterogeneous Information for Store-Type Recommendation20
Efficient Encrypted Data Search With Expressive Queries and Flexible Update19
Prediction of Cloud Resources Demand Based on Hierarchical Pythagorean Fuzzy Deep Neural Network19
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud19
Multi-Dimension Convolutional Neural Network for Bug Localization19
Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services19
A Deep Reinforcement Learning Approach for Composing Moving IoT Services19
Multi-Perspective Trust Management Framework for Crowdsourced IoT Services19
Secure Hot Path Crowdsourcing With Local Differential Privacy Under Fog Computing Architecture19
Defending N-Version Programming Service Components against Co-Resident Attacks in IoT Cloud Systems19
ESync: Accelerating Intra-Domain Federated Learning in Heterogeneous Data Centers18
Enabling Probabilistic Differential Privacy Protection for Location Recommendations18
A Self-Adaptive Service Discovery Model for Smart Cities18
Composing Energy Services in a Crowdsourced IoT Environment18
Variation-Aware Cloud Service Selection via Collaborative QoS Prediction18
Service Home Identification of Multiple-Source IoT Applications in Edge Computing18
A Blockchain Framework in Post-Quantum Decentralization18
QoS-Aware Cloud Resource Prediction for Computing Services18
GASF-IPP: Detection and Mitigation of LDoS Attack in SDN17
Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices17
Attribute-Based Encryption Scheme for Secure Multi-Group Data Sharing in Cloud17
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud17
A Momentum-Accelerated Hessian-Vector-Based Latent Factor Analysis Model17
Enabling Fast Public Auditing and Data Dynamics in Cloud Services17
Delegated Authorization Framework for EHR Services Using Attribute-Based Encryption17
Two-Level Stackelberg Game for IoT Computational Resource Trading Mechanism: A Smart Contract Approach17
Incentive Mechanism Design for Truth Discovery in Crowdsourcing With Copiers17
Temporal Knowledge Graph Embedding for Effective Service Recommendation17
Locally Private High-Dimensional Crowdsourced Data Release Based on Copula Functions17
Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs16
Elastic Resource Provisioning Using Data Clustering in Cloud Service Platform16
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud16
Value-Based Analysis Framework of Crossover Service: A Case Study of New Retail in China16
A Truthful Double Auction Mechanism for Multi-Resource Allocation in Crowd Sensing Systems16
Development of Collaborative Business Processes: A Correctness Enforcement Approach16
MP-Coopetition: Competitive and Cooperative Mechanism for Multiple Platforms in Mobile Crowd Sensing16
An Edge Storage Acceleration Service for Collaborative Mobile Devices16
Ranked Keyword Search over Encrypted Cloud Data Through Machine Learning Method16
Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning16
Efficient Container Assignment and Layer Sequencing in Edge Computing16
FAST: A Forecasting Model With Adaptive Sliding Window and Time Locality Integration for Dynamic Cloud Workloads15
Edge-Assisted Public Key Homomorphic Encryption for Preserving Privacy in Mobile Crowdsensing15
FogSpot: Spot Pricing for Application Provisioning in Edge/Fog Computing15
Drone-as-a-Service Composition Under Uncertainty15
A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT15
Fairness-Aware Mechanism for Load Balancing in Distributed Systems15
QoS-Aware Dynamic Cost Management Scheme for Sensors-as-a-Service15
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering14
Coordinating Workload Scheduling of Geo-Distributed Data Centers and Electricity Generation of Smart Grid14
START: Straggler Prediction and Mitigation for Cloud Computing Environments using Encoder LSTM Networks14
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing14
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control14
Test-Oriented RESTful Service Discovery with Semantic Interface Compatibility14
Collaborative Agent Communities for Resilient Service Composition in Mobile Environments14
Hyperparameter Learning for Deep Learning-Based Recommender Systems14
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing14
Toward Intelligent Surveillance as an Edge Network Service (iSENSE) Using Lightweight Detection and Tracking Algorithms14
User Preference-Based Hierarchical Offloading for Collaborative Cloud-Edge Computing14
Semantics Mining&Indexing-Based Rapid Web Services Discovery Framework14
Short-Term QoS Forecasting at the Edge for Reliable Service Applications14
VRFMS: Verifiable Ranked Fuzzy Multi-keyword Search over Encrypted Data14
From SOA to VOA: A Shift in Understanding the Operation and Evolution of Service Ecosystem14
Auction-Based Resource Allocation Mechanism in Federated Cloud Environment: TARA14
Self-Adaptive Root Cause Diagnosis for Large-Scale Microservice Architecture14
Privacy-Preserving and Reliable Decentralized Federated Learning14
Genetic Programming for Dynamic Workflow Scheduling in Fog Computing14
Brain: Log Parsing With Bidirectional Parallel Tree14
Privacy-Preserving QoS Forecasting in Mobile Edge Environments13
Analysis and Controlling of Manufacturing Service Ecosystem: A Research Framework Based on the Parallel System Theory13
Resource Trading in Edge Computing-Enabled IoV: An Efficient Futures-Based Approach13
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code13
Fog Computing Service Provision Using Bargaining Solutions13
Optimizing Data Center Energy Efficiency via Event-Driven Deep Reinforcement Learning13
Trading off Between Multi-Tenancy and Interference: A Service User Allocation Game13
A Workflow Scheduling Approach With Modified Fuzzy Adaptive Genetic Algorithm in IaaS Clouds13
QoS-Aware Dispersed Dynamic Mapping of Virtual Sensors in Sensor-Cloud13
A Decentralized Approach for Resource Discovery using Metadata Replication in Edge Networks13
A High Availability Management Model Based on VM Significance Ranking and Resource Estimation for Cloud Applications12
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis12
Fair Outsourcing Polynomial Computation Based on the Blockchain12
ECFA: An Efficient Convergent Firefly Algorithm for Solving Task Scheduling Problems in Cloud-Edge Computing12
CAHPHF: Context-Aware Hierarchical QoS Prediction With Hybrid Filtering12
Resource Provision and Allocation Based on Microeconomic Theory in Mobile Edge Computing12
A Low-Cost Cross-Border Payment System Based on Auditable Cryptocurrency With Consortium Blockchain: Joint Digital Currency12
Task Recommendation in Crowdsourcing Based on Learning Preferences and Reliabilities12
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing12
0.046471834182739