IEEE Transactions on Services Computing

Papers
(The TQCC of IEEE Transactions on Services Computing is 15. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Cost-aware Resource Recommendation for DAG-based Big Data Workflows: An Apache Spark Case Study196
Effective Graph Modeling and Contrastive Learning for Time-Aware QoS Prediction196
Proactive Recommendation of Composite Services in Multi-Access Edge Computing151
A Blockchain-Based Cross-Domain Data Transmission Scheme for Industrial Internet of Things With Edge-Cloud Computing137
Optimizing Blockchain Shard Allocations Service: A Multi-Objective Evolutionary Perspective137
ESR-MHFL: Edge Server Reallocation for Multi-Hierarchical Federated Learning128
Paramart: Parallel Resource Allocation Based on Blockchain Sharding for Edge-Cloud Services112
Scheduling Multi-Server Jobs With Sublinear Regrets via Online Learning110
Modeling and Empirical Validation of Reliability and Performance Trade-Offs of Dynamic Routing in Service- and Cloud-Based Architectures105
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment104
Dynamic Cluster-Based Flow Management for Software Defined Networks102
M-DAFTO: Multi-Stage Deferred Acceptance Based Fair Task Offloading in IoT-Fog Systems100
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data98
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs97
Weighted Adversarial Learning From Crowds97
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers97
Scalable Large Model for Unlabeled Anomaly Detection With Trio-Attention U-Transformer and Manifold-Learning Siamese Discriminator92
SNN-IoT: Efficient Partitioning and Enabling of Deep Spiking Neural Networks in IoT Services92
Location Privacy Protection Method Based on Local Differential Privacy in Crowdsensing With Approximately Accurate Task Allocation90
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing90
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage78
Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems77
Maximizing NFT Incentives: References Make You Rich77
KeAD: Knowledge-enhanced Graph Attention Network for Accurate Anomaly Detection76
Enhancing Game Policy Optimization in Mobile Crowdsourcing: A Reinforcement Learning Approach75
Holistic Root Cause Analysis for Failures in Cloud-Native Systems Through Observability Data75
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment75
Cross-F$^{2}$SCIL: A Federated Few-Shot Class Incremental Learning Method for Cross Mobile Edge Network Environments75
Maximum Entropy Policy for Long-Term Fairness in Interactive Recommender Systems70
DynaEDI+: Reliable and Decentralized Integrity Verification for Dynamic Edge Data68
Distributed Bandit-Based Cooperative Coevolution for Large-Scale Multi-Objective Data Publishing66
Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion66
Towards Effective Resource Procurement in MEC: A Resource Re-Selling Framework65
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage65
DALAD: Unsupervised Detection of Global and Local Anomalies in Microservice Systems65
Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks64
RDRM: Real-Time Dynamic Replica Management With Joint Optimization for Edge Computing64
Task Allocation With Geography-Context-Capacity Awareness in Distributed Burstable Billing Edge-Cloud Systems62
Availability and Reliability of Core Networks (4G/5G) From a Deployment Standpoint61
DeFedGCN: Privacy-Preserving Decentralized Federated GCN for Recommender System60
Pre-Fetch or Not: A Privacy-Aware Edge-User Co-opetition Delivery Framework for Metaverse Multimedia Services60
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys60
Deep Reinforcement Learning for Scheduling Applications in Serverless and Serverful Hybrid Computing Environments59
Privacy-Preserving Cross-Client Recommender Systems With Fully-Separable Graph Neural Networks58
In-Flight Energy-Driven Composition of Drone Swarm Services57
An Efficient Replication-Based Aggregation Verification and Correctness Assurance Scheme for Federated Learning57
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts57
FREB: Participant Selection in Federated Learning with Reputation Evaluation and Blockchain57
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query56
MSCCL: A Framework for Enhancing Mashup Service Clustering With Contrastive Learning56
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query55
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development53
Energy-Aware Service Function Chaining Embedding in NFV Networks53
Reputation Bootstrapping for Composite Services Using CP-Nets51
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing50
Joint Optimization of Fine-grained Representation and Workflow Orchestration in Metaverse Articulated Manipulation Auto-generation by VLA Method50
An Adaptive Toolbox for Computing Throttling Rate Limits in Web APIs49
Resource Provisioning and Allocation in Function-as-a-Service Edge-Clouds49
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing48
Real-Time Task and Resource Co-Optimization in Edge-Cloud Computing for Networked Control Systems via Logic-Based Benders Decomposition48
Differential Privacy-Based Location Protection in Spatial Crowdsourcing48
Scheduling Workflows With Composite Tasks: A Nested Particle Swarm Optimization Approach48
Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network48
Federated Distributed Deep Reinforcement Learning for Recommendation-Enabled Edge Caching47
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem47
Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing47
Incentive Mechanism for Mobile Crowdsensing with Two-Stage Stackelberg Game47
MADRL-Based Order Dispatching in MoD Systems With Bipartite Graph Splitting46
Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning46
Semantically Rich Framework to Automate Cyber Insurance Services45
A Semantically Rich Framework to Automate Cloud Service Level Agreements44
Secure and Privacy Preserving Scalable GDPR Enforcement System44
Automated Probe Life-Cycle Management for Monitoring-As-a-Service44
2024 Reviewers List*44
Joint Task Offloading, Resource Allocation and Model Placement for AI as a Service in 6G Network43
VPFLI: Verifiable Privacy-Preserving Federated Learning With Irregular Users Based on Single Server43
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles43
An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud42
GraphIoT: Lightweight IoT Device Detection Based on Graph Classifiers and Incremental Learning42
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving42
Dynamic Adaptive Federated Learning on Local Long-Tailed Data41
Guest Editor's Introduction: Special Section on Edge AI as a Service41
Criticality and Utility-Aware Fog Computing System for Remote Health Monitoring41
Freshness-Aware Incentive Mechanism for Mobile Crowdsensing With Budget Constraint41
A Game-Based Computation Offloading With Imperfect Information in Multi-Edge Environments41
ESync: Accelerating Intra-Domain Federated Learning in Heterogeneous Data Centers40
FlowValve+: Multi-Queue Packet Scheduling Framework on SoC-Based SmartNICs40
A Stable Locality-Aware Task Scheduling Mechanism for Mobile Edge Computing With Workflow Task Offloading40
Q-BLPP: A Quality-Enabled Bilateral Location Privacy-Preserving Service Construction Scheme in Mobile Crowd Sensing40
Privacy Cost Optimization of Smart Meters Using URLLC and Demand Side Energy Trading40
Secure Updatable Storage Access Control System for EHRs in the Cloud40
OPUS: Optimal Pricing for UAV-as-a-Service Using Bargaining Game40
Enforcing Corporate Governance Controls With Cloud-Based Services39
Integrating IoT and 6G: Applications of Edge Intelligence, Challenges, and Future Directions39
TREAT: Temporal and Relational Attention-Based Tensor Representation Learning for Ethereum Phishing Users39
Boolean Searchable Attribute-Based Signcryption With Search Results Self-Verifiability Mechanism for Data Storage and Retrieval in Clouds39
A Blockchain System for QoS Monitoring in Decentralized Edge Computing39
Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud39
FaaSDeliver: Cost-Efficient and QoS-Aware Function Delivery in Computing Continuum39
QuanFraud: Quantum State Verification Scheme for Fraud Detection in IoT-Assisted Quantum-Blockchain Networks39
Performance Isolation for Serverless Functions39
Distributed Computing Applications of Context-Aware QoS and Trust Prediction Framework38
PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack38
Time Series QoS Forecasting for Web Services Using Multi-Predictor-Based Genetic Programming38
Runtime Verification of Business Cloud Workflow Temporal Conformance38
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing37
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting37
Vehicle Parking Navigation Based on Edge Computing With Diffusion Model and Information Potential Field37
Edge-Assisted Public Key Homomorphic Encryption for Preserving Privacy in Mobile Crowdsensing36
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework36
Hierarchical Reinforcement Learning for Conversational Recommendation With Knowledge Graph Reasoning and Heterogeneous Questions36
Improving the Schedulability of Real-Time Tasks Using Fog Computing36
UrbanEnQoSPlace: A Deep Reinforcement Learning Model for Service Placement of Real-Time Smart City IoT Applications35
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs34
Online Service Placement, Task Scheduling, and Resource Allocation in Hierarchical Collaborative MEC Systems34
A Fine-Grained Regularization Scheme for Non-negative Latent Factorization of High-Dimensional and Incomplete Tensors34
MapReduce Task Scheduling in Heterogeneous Geo-Distributed Data Centers34
Implicit Supervision-Assisted Graph Collaborative Filtering for Third-Party Library Recommendation34
Computation Offloading With Instantaneous Load Billing for Mobile Edge Computing34
BlockEmulator: An Emulator Enabling to Test Blockchain Sharding Protocols33
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images33
TAPESTRY: A De-Centralized Service for Trusted Interaction Online32
A Direct Data Aware LSTM Neural Network Architecture for Complete Remaining Trace and Runtime Prediction32
Aggregated Capability Assessment (AgCA) For CAIQ Enabled Cross-cloud Federation32
User Preference Oriented Service Caching and Task Offloading for UAV-Assisted MEC Networks32
Magneto: Load-Balanced Key-Value Service for Write-Intensive Workloads32
Practical Blockchain-Based Options Contract32
Communication-Efficient Federated Learning With Adaptive Aggregation for Heterogeneous Client-Edge-Cloud Network32
DeFiGuard: A Price Manipulation Detection Service in DeFi Using Graph Neural Networks31
DMSDRec: Dynamic Structure-Aware Graph Masked Autoencoder and Spatiotemporal Diffusion for Next-POI Recommendation31
Linear Structure Analysis of Embeddings for Bias Disparity Reduction in Collaborative Filtering31
Achieving Searchable Encryption Scheme With Search Pattern Hidden31
Secure Cloud Data Deduplication with Efficient Re-Encryption31
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation31
Web Service Recommendation via Combining Topic-aware Heterogeneous Graph Representation and Interactive Semantic Enhancement31
Elastic Resource Provisioning Using Data Clustering in Cloud Service Platform31
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security31
Toward Efficient and Reliable Private Set Computation in Decentralized Storage30
Deep Reinforcement Learning With Entropy and Attention Mechanism for D2D-Assisted Task Offloading in Edge Computing30
ReMatch: An Efficient Virtual Data Center Re-Matching Strategy Based on Matching Theory30
Accurate and Interpretable Log-Based Fault Diagnosis Using Large Language Models30
Explainable and Effective Process Remaining Time Prediction Using Feature-Informed Cascade Prediction Model30
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain30
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices30
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection29
FRESCO: Fast and Reliable Edge Offloading With Reputation-Based Hybrid Smart Contracts29
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations29
TaCo: Tasks Co-Programming for Accelerating Inference in Scaling Edge Computing29
Data Caching Optimization With Fairness in Mobile Edge Computing28
Utility-Aware and Privacy-Preserving Mobile Query Services28
Fast Subgraph Matching by Dynamic Graph Editing28
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm28
Burst-Aware Predictive Autoscaling for Containerized Microservices28
Virtdev: Towards Providing Edge Services28
Social-Sensor Composition for Tapestry Scenes28
Trajectory Privacy Protection Method Based on Differential Privacy in Crowdsensing28
A Multi-View Deep Learning Approach for Predictive Business Process Monitoring28
Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting28
Swift and Accurate Mobility-Aware QoS Forecasting for Mobile Edge Environments27
Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources27
Service Regulation Analysis Framework for Service Design Time: A Case Study of Internet Healthcare Service27
An Approach for Incremental Mining of Clickstream Patterns as a Service Application27
CATScaler: A Convolution-Augmented Transformer Scaling Framework for Cloud-Native Applications27
Compiling Service Function Chains via Fine-Grained Composition in the Programmable Data Plane27
Accurate and Reliable Service Recommendation Based on Bilateral Perception in Multi-Access Edge Computing27
FedOrbit: Energy Efficient Federated Learning for Orbital Edge Computing Using Block Minifloat Arithmetic27
STARDUST: A Novel Process Mining Approach to Discover Evolving Models From Trace Streams27
Hierarchical Reinforcement Learning for Optimizing Local-Global Collaborative Computation Offloading and Resource Allocation27
Artificial Impostors: An Efficient and Scalable Scheme for Location Privacy Preservation26
A Trust Model for SLA Negotiation Candidates Selection in a Dynamic IoT Environment26
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding26
Employ AI to Improve AI Services : Q-Learning Based Holistic Traffic Control for Distributed Co-Inference in Deep Learning26
Random Coding Responses for Resisting Side-Channel Attacks in Client-Side Deduplicated Cloud Storage26
Efficient and Privacy-Enhanced Federated Learning Based on Parameter Degradation26
FAST: A Forecasting Model With Adaptive Sliding Window and Time Locality Integration for Dynamic Cloud Workloads26
NOVA: Neural-Optimized Viewport Adaptive 360-Degree Video Streaming at the Edge26
RESERVE: An Energy-Efficient Edge Cloud Architecture for Intelligent Multi-UAV26
Transparent Business Process Outcome Prediction Using a Graph Stochastic Attention Mechanism26
Crossport: a Cloud-Edge-End Microservice Architecture for Collaborative Rendering in Metaverse Services26
Multi-Layered Continuous Reasoning for Cloud-IoT Application Management26
Energy Consumption Scheduling as a Fog Computing Service in Smart Grid26
Data Access Control in Cloud Computing: Flexible and Receiver Extendable26
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code26
A Privacy-Preserving Authenticated Key Agreement Scheme Based on Physically Unclonable Functions for Multi-Server Architecture25
DDPQN: An Efficient DNN Offloading Strategy in Local-Edge-Cloud Collaborative Environments25
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing25
Comment on “A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage”25
An Efficient Algorithm for Microservice Placement in Cloud-Edge Collaborative Computing Environment25
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets25
Energy-minimized Scheduling of Real-time Parallel Workflows on Heterogeneous Distributed Computing Systems25
PAWSSP: A Two-stage Parallelism-aware Algorithm for Joint Workflow Scheduling and Service Placement in Edge Computing24
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets24
DySR: A Dynamic Graph Neural Network Based Service Bundle Recommendation Model for Mashup Creation24
CrossMeta: A Fast and Cheap Cross-Metaverse Interoperability Protocol24
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption24
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud24
RT3C: Real-Time Crowd Counting in Multi-Scene Video Streams via Cloud-Edge-Device Collaboration24
A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels24
Efficient Privacy-Preserving Face Identification Protocol24
A Workflow Scheduling Approach With Modified Fuzzy Adaptive Genetic Algorithm in IaaS Clouds24
Threshold Attribute-Based Credentials With Redactable Signature24
DRPC: Distributed Reinforcement Learning Approach for Scalable Resource Provisioning in Container-Based Clusters23
Efficient Approximation Algorithms for Scheduling Coflows With Precedence Constraints in Identical Parallel Networks to Minimize Weighted Completion Time23
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data23
Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation23
Indirect Revocable KP-ABE With Revocation Undoing Resistance23
Unlocking Complexity: Harnessing Value Entropy for Advanced Multidimensional Utility Evaluation in Service Ecosystems23
TrustPay: A Dual-Layer Blockchain-Based Framework for Trusted Service Transaction23
Multi-criteria performance analysis based on Physics of Decision — Application to COVID-19 and future pandemics23
Data Re-Outsourcing Detection With Latency-Constraint for Edge Storage23
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud23
Cold-Start Next-Item Recommendation by User-Item Matching and Auto-Encoders22
Leveraging Consortium Blockchain for Secure Cross-Domain Data Sharing in Supply Chain Networks22
Task Recommendation in Crowdsourcing Based on Learning Preferences and Reliabilities22
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI22
A Formal Treatment of Contract Signature22
Experimental Evaluation of Rule-Based Autonomic Computing Management Framework for Cloud-Native Applications22
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection22
AoI-Aware Inference Services in Edge Computing via Digital Twin Network Slicing22
Priority-Based Selection of Individuals in Memetic Algorithms for Distributed Data-Intensive Web Service Compositions22
Exploring Dynamic Task Loading in SGX-Based Distributed Computing22
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET22
MTDA: Efficient and Fair DPU Offloading Method for Multiple Tenants21
A Granular SVM-Based Method for Top-N Web Services Recommendation21
A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid21
MHRR: MOOCs Recommender Service With Meta Hierarchical Reinforced Ranking21
A Novel Addressing and Routing Architecture for Cloud-Service Datacenter Networks21
A Monitoring-Free Bitcoin Payment Channel Scheme With Support for Real-Time Settlement21
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks21
Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain21
HGDRec:Next POI Recommendation Based on Hypergraph Neural Network and Diffusion Model21
Secure Replication-Based Outsourced Computation Using Smart Contracts21
Efficient Transition Adjacency Relation Computation for Process Model Similarity21
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing21
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis21
Next PoI Recommendation Based on Graph Convolutional Networks and Multiple Context-Awareness21
Latency-Driven Model Placement for Efficient Edge Intelligence Service20
Extracting Reusable Fragments From Data-Centric Process Variants20
TPI-LLM: Serving 70B-Scale LLMs Efficiently on Low-Resource Mobile Devices20
Reliable Service Recommendation: A Multi-Modal Adversarial Method for Personalized Recommendation Under Uncertain Missing Modalities20
SHELDB: Client Storage Aware Homomorphic Encrypted Database Processing Framework With Low Communication Overhead20
A Geography-Based P2P Overlay Network for Fast and Robust Blockchain Systems20
HG-PAD: Heterogeneous Graph Structure Learning Aided Performance Anomaly Diagnosis in Microservice Systems20
ET2FA: A Hybrid Heuristic Algorithm for Deadline-constrained Workflow Scheduling in Cloud20
Model Caching and Application Offloading for Mobile Edge Intelligence Network With Learning-and-Optimization Approach20
Secure Neighbor Discovery as a Service in the Internet of Ships Environment20
Detecting Evolving Fraudulent Behavior in Online Payment Services: Open-Category and Concept-Drift20
Online Traffic Allocation for Video Service Providers in Cloud-Edge Cooperative Systems20
Time-Varying Microservice Orchestration With Routing for Dynamic Call Graphs via Multi-Scale Deep Reinforcement Learning20
Concurrent Request Multiplexing for Cloud Composite Service Reservation20
0.11491084098816