IEEE Transactions on Services Computing

Papers
(The median citation count of IEEE Transactions on Services Computing is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Cost-aware Resource Recommendation for DAG-based Big Data Workflows: An Apache Spark Case Study185
Towards Effective Resource Procurement in MEC: A Resource Re-Selling Framework177
PPFilter: Provider Privacy-Aware Encrypted Filtering System160
Effective Graph Modeling and Contrastive Learning for Time-Aware QoS Prediction154
RDRM: Real-Time Dynamic Replica Management With Joint Optimization for Edge Computing133
Scheduling Multi-Server Jobs With Sublinear Regrets via Online Learning126
M-DAFTO: Multi-Stage Deferred Acceptance Based Fair Task Offloading in IoT-Fog Systems119
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing118
Dynamic Cluster-Based Flow Management for Software Defined Networks116
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data114
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage108
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs98
SNN-IoT: Efficient Partitioning and Enabling of Deep Spiking Neural Networks in IoT Services98
Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems94
Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)92
Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks90
Proactive Recommendation of Composite Services in Multi-Access Edge Computing90
Maximizing NFT Incentives: References Make You Rich89
Weighted Adversarial Learning From Crowds87
Maximum Entropy Policy for Long-Term Fairness in Interactive Recommender Systems83
Paramart: Parallel Resource Allocation Based on Blockchain Sharding for Edge-Cloud Services81
Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion79
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment79
Optimizing Blockchain Shard Allocations Service: A Multi-Objective Evolutionary Perspective78
KeAD: Knowledge-enhanced Graph Attention Network for Accurate Anomaly Detection71
A Blockchain-Based Cross-Domain Data Transmission Scheme for Industrial Internet of Things with Edge-Cloud Computing69
Enhancing Game Policy Optimization in Mobile Crowdsourcing: A Reinforcement Learning Approach69
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers68
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage67
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment67
Modeling and Empirical Validation of Reliability and Performance Trade-Offs of Dynamic Routing in Service- and Cloud-Based Architectures67
Scalable Large Model for Unlabeled Anomaly Detection With Trio-Attention U-Transformer and Manifold-Learning Siamese Discriminator67
Holistic Root Cause Analysis for Failures in Cloud-Native Systems Through Observability Data66
Task Allocation With Geography-Context-Capacity Awareness in Distributed Burstable Billing Edge-Cloud Systems66
2021 Reviewers List65
An Efficient Replication-Based Aggregation Verification and Correctness Assurance Scheme for Federated Learning63
DeFedGCN: Privacy-Preserving Decentralized Federated GCN for Recommender System61
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys60
Availability and Reliability of Core Networks (4G/5G) From a Deployment Standpoint60
Deep Reinforcement Learning for Scheduling Applications in Serverless and Serverful Hybrid Computing Environments60
FREB: Participant Selection in Federated Learning with Reputation Evaluation and Blockchain58
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query58
Dynamic Trust Enforcing Pricing Scheme for Sensors-as-a-Service in Sensor-Cloud Infrastructure58
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts57
Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning57
Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing55
Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network55
Reputation Bootstrapping for Composite Services Using CP-Nets54
MSCCL: A Framework for Enhancing Mashup Service Clustering With Contrastive Learning52
Incentive Mechanism for Mobile Crowdsensing with Two-Stage Stackelberg Game52
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query52
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing52
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing51
Scheduling Workflows With Composite Tasks: A Nested Particle Swarm Optimization Approach51
Differential Privacy-Based Location Protection in Spatial Crowdsourcing49
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development49
Energy-Aware Service Function Chaining Embedding in NFV Networks48
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem47
Resource Provisioning and Allocation in Function-as-a-Service Edge-Clouds46
In-Flight Energy-Driven Composition of Drone Swarm Services46
Federated Distributed Deep Reinforcement Learning for Recommendation-Enabled Edge Caching45
MADRL-Based Order Dispatching in MoD Systems With Bipartite Graph Splitting44
Microservices: Migration of a Mission Critical System44
Guest Editor's Introduction: Special Section on Edge AI as a Service44
VPFLI: Verifiable Privacy-Preserving Federated Learning With Irregular Users Based on Single Server44
A Blockchain System for QoS Monitoring in Decentralized Edge Computing43
TREAT: Temporal and Relational Attention-Based Tensor Representation Learning for Ethereum Phishing Users43
Secure Updatable Storage Access Control System for EHRs in the Cloud43
ESync: Accelerating Intra-Domain Federated Learning in Heterogeneous Data Centers43
Joint Task Offloading, Resource Allocation and Model Placement for AI as a Service in 6G Network42
Freshness-Aware Incentive Mechanism for Mobile Crowdsensing With Budget Constraint42
Privacy Cost Optimization of Smart Meters Using URLLC and Demand Side Energy Trading41
Automated Probe Life-Cycle Management for Monitoring-As-a-Service41
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles41
Joint Scheduling of Overlapping MapReduce Phases: Pair Jobs for Optimization41
A Semantically Rich Framework to Automate Cloud Service Level Agreements41
2024 Reviewers List*41
A Game-Based Computation Offloading With Imperfect Information in Multi-Edge Environments41
Dynamic Adaptive Federated Learning on Local Long-Tailed Data41
Q-BLPP: A Quality-Enabled Bilateral Location Privacy-Preserving Service Construction Scheme in Mobile Crowd Sensing40
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing40
GraphIoT: Lightweight IoT Device Detection Based on Graph Classifiers and Incremental Learning40
FlowValve+: Multi-Queue Packet Scheduling Framework on SoC-Based SmartNICs39
Semantically Rich Framework to Automate Cyber Insurance Services39
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving38
Criticality and Utility-Aware Fog Computing System for Remote Health Monitoring38
Integrating IoT and 6G: Applications of Edge Intelligence, Challenges, and Future Directions38
User Preference Oriented Service Caching and Task Offloading for UAV-Assisted MEC Networks37
Secure and Privacy Preserving Scalable GDPR Enforcement System37
Distributed Computing Applications of Context-Aware QoS and Trust Prediction Framework37
FaaSDeliver: Cost-Efficient and QoS-Aware Function Delivery in Computing Continuum37
Enforcing Corporate Governance Controls With Cloud-Based Services37
An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud37
Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud37
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework36
Implicit Supervision-Assisted Graph Collaborative Filtering for Third-Party Library Recommendation36
Time Series QoS Forecasting for Web Services Using Multi-Predictor-Based Genetic Programming36
UrbanEnQoSPlace: A Deep Reinforcement Learning Model for Service Placement of Real-Time Smart City IoT Applications36
Improving the Schedulability of Real-Time Tasks Using Fog Computing36
Online Service Placement, Task Scheduling, and Resource Allocation in Hierarchical Collaborative MEC Systems36
PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack36
Edge-Assisted Public Key Homomorphic Encryption for Preserving Privacy in Mobile Crowdsensing35
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting35
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs35
Vehicle Parking Navigation Based on Edge Computing With Diffusion Model and Information Potential Field35
Hierarchical Reinforcement Learning for Conversational Recommendation With Knowledge Graph Reasoning and Heterogeneous Questions35
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing34
Communication-Efficient Federated Learning With Adaptive Aggregation for Heterogeneous Client-Edge-Cloud Network34
Analysis and Controlling of Manufacturing Service Ecosystem: A Research Framework Based on the Parallel System Theory34
Runtime Verification of Business Cloud Workflow Temporal Conformance34
Boolean Searchable Attribute-Based Signcryption With Search Results Self-Verifiability Mechanism for Data Storage and Retrieval in Clouds34
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images33
MapReduce Task Scheduling in Heterogeneous Geo-Distributed Data Centers33
Computation Offloading With Instantaneous Load Billing for Mobile Edge Computing33
BlockEmulator: An Emulator Enabling to Test Blockchain Sharding Protocols33
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services33
A Direct Data Aware LSTM Neural Network Architecture for Complete Remaining Trace and Runtime Prediction33
A Fine-Grained Regularization Scheme for Non-negative Latent Factorization of High-Dimensional and Incomplete Tensors32
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices32
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations32
Trajectory Privacy Protection Method Based on Differential Privacy in Crowdsensing32
Burst-Aware Predictive Autoscaling for Containerized Microservices32
Practical Blockchain-Based Options Contract32
Achieving Searchable Encryption Scheme With Search Pattern Hidden32
Aggregated Capability Assessment (AgCA) For CAIQ Enabled Cross-cloud Federation32
DeFiGuard: A Price Manipulation Detection Service in DeFi Using Graph Neural Networks31
Deep Reinforcement Learning With Entropy and Attention Mechanism for D2D-Assisted Task Offloading in Edge Computing31
TAPESTRY: A De-Centralized Service for Trusted Interaction Online31
ReMatch: An Efficient Virtual Data Center Re-Matching Strategy Based on Matching Theory30
Data Caching Optimization With Fairness in Mobile Edge Computing30
Elastic Resource Provisioning Using Data Clustering in Cloud Service Platform29
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain29
Accurate and Interpretable Log-Based Fault Diagnosis using Large Language Models29
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection29
Secure Cloud Data Deduplication with Efficient Re-Encryption29
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security28
Linear Structure Analysis of Embeddings for Bias Disparity Reduction in Collaborative Filtering28
Web Service Recommendation via Combining Topic-aware Heterogeneous Graph Representation and Interactive Semantic Enhancement28
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm28
Magneto: Load-Balanced Key-Value Service for Write-Intensive Workloads28
Holistic VM Placement for Distributed Parallel Applications in Heterogeneous Clusters28
DMSDRec: Dynamic Structure-Aware Graph Masked Autoencoder and Spatiotemporal Diffusion for Next-POI Recommendation28
Toward Efficient and Reliable Private Set Computation in Decentralized Storage28
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation27
Explainable and Effective Process Remaining Time Prediction Using Feature-Informed Cascade Prediction Model27
A Multi-View Deep Learning Approach for Predictive Business Process Monitoring27
A Trust Model for SLA Negotiation Candidates Selection in a Dynamic IoT Environment26
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets26
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud26
Multi-Layered Continuous Reasoning for Cloud-IoT Application Management26
Social-Sensor Composition for Tapestry Scenes26
Virtdev: Towards Providing Edge Services26
Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting26
Random Coding Responses for Resisting Side-Channel Attacks in Client-Side Deduplicated Cloud Storage26
Fast Subgraph Matching by Dynamic Graph Editing26
Service Regulation Analysis Framework for Service Design Time: A Case Study of Internet Healthcare Service26
Utility-Aware and Privacy-Preserving Mobile Query Services26
STARDUST: A Novel Process Mining Approach to Discover Evolving Models From Trace Streams26
Artificial Impostors: An Efficient and Scalable Scheme for Location Privacy Preservation26
FAST: A Forecasting Model With Adaptive Sliding Window and Time Locality Integration for Dynamic Cloud Workloads25
RESERVE: An Energy-Efficient Edge Cloud Architecture for Intelligent Multi-UAV25
Swift and Accurate Mobility-Aware QoS Forecasting for Mobile Edge Environments25
Energy Consumption Scheduling as a Fog Computing Service in Smart Grid25
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security25
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption25
Data Access Control in Cloud Computing: Flexible and Receiver Extendable25
CrossMeta: A Fast and Cheap Cross-Metaverse Interoperability Protocol25
A Workflow Scheduling Approach With Modified Fuzzy Adaptive Genetic Algorithm in IaaS Clouds25
An Approach for Incremental Mining of Clickstream Patterns as a Service Application25
FedOrbit: Energy Efficient Federated Learning for Orbital Edge Computing Using Block Minifloat Arithmetic25
Comment on “A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage”25
Efficient Privacy-Preserving Face Identification Protocol25
Efficient and Privacy-Enhanced Federated Learning Based on Parameter Degradation25
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing24
Employ AI to Improve AI Services : Q-Learning Based Holistic Traffic Control for Distributed Co-Inference in Deep Learning24
CATScaler: A Convolution-Augmented Transformer Scaling Framework for Cloud-Native Applications24
Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources24
Accurate and Reliable Service Recommendation Based on Bilateral Perception in Multi-Access Edge Computing24
An Efficient Algorithm for Microservice Placement in Cloud-Edge Collaborative Computing Environment24
A Privacy-Preserving Authenticated Key Agreement Scheme Based on Physically Unclonable Functions for Multi-Server Architecture24
RT3C: Real-Time Crowd Counting in Multi-Scene Video Streams via Cloud-Edge-Device Collaboration24
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code24
NOVA: Neural-Optimized Viewport Adaptive 360-Degree Video Streaming at the Edge23
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding23
Compiling Service Function Chains via Fine-Grained Composition in the Programmable Data Plane23
DySR: A Dynamic Graph Neural Network Based Service Bundle Recommendation Model for Mashup Creation23
Indirect Revocable KP-ABE With Revocation Undoing Resistance23
Energy-minimized Scheduling of Real-time Parallel Workflows on Heterogeneous Distributed Computing Systems23
DDPQN: An Efficient DNN Offloading Strategy in Local-Edge-Cloud Collaborative Environments23
A Novel Addressing and Routing Architecture for Cloud-Service Datacenter Networks22
DRPC: Distributed Reinforcement Learning Approach for Scalable Resource Provisioning in Container-Based Clusters22
Priority-Based Selection of Individuals in Memetic Algorithms for Distributed Data-Intensive Web Service Compositions22
Efficient Approximation Algorithms for Scheduling Coflows With Precedence Constraints in Identical Parallel Networks to Minimize Weighted Completion Time22
Threshold Attribute-Based Credentials With Redactable Signature22
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets22
A Formal Treatment of Contract Signature22
A Monitoring-Free Bitcoin Payment Channel Scheme With Support for Real-Time Settlement22
A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels22
Efficient Transition Adjacency Relation Computation for Process Model Similarity22
Multi-criteria performance analysis based on Physics of Decision — Application to COVID-19 and future pandemics22
Cold-Start Next-Item Recommendation by User-Item Matching and Auto-Encoders22
Secure Replication-Based Outsourced Computation Using Smart Contracts21
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data21
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud21
TrustPay: A Dual-Layer Blockchain-Based Framework for Trusted Service Transaction21
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection21
Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation21
Next PoI Recommendation Based on Graph Convolutional Networks and Multiple Context-Awareness21
Leveraging Consortium Blockchain for Secure Cross-Domain Data Sharing in Supply Chain Networks21
Experimental Evaluation of Rule-Based Autonomic Computing Management Framework for Cloud-Native Applications21
A Granular SVM-Based Method for Top-N Web Services Recommendation21
Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain20
Data Re-Outsourcing Detection With Latency-Constraint for Edge Storage20
MTDA: Efficient and Fair DPU Offloading Method for Multiple Tenants20
HGDRec:Next POI Recommendation Based on Hypergraph Neural Network and Diffusion Model20
Unlocking Complexity: Harnessing Value Entropy for Advanced Multidimensional Utility Evaluation in Service Ecosystems20
AoI-Aware Inference Services in Edge Computing via Digital Twin Network Slicing20
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis20
Exploring Dynamic Task Loading in SGX-Based Distributed Computing20
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks19
MHRR: MOOCs Recommender Service With Meta Hierarchical Reinforced Ranking19
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing19
Secure Neighbor Discovery as a Service in the Internet of Ships Environment19
An Efficient and Secure Trading Framework for Shared Charging Service Based on Multiple Consortium Blockchains19
Task Recommendation in Crowdsourcing Based on Learning Preferences and Reliabilities19
A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid19
FACT: Sealed-Bid Auction With Full Privacy via Threshold Fully Homomorphic Encryption19
In-Network Computing Empowered Mobile Edge Offloading Architecture for Internet of Things19
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET19
Generalized Nesterov's Acceleration-Incorporated, Non-Negative and Adaptive Latent Factor Analysis19
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI19
Concurrent Request Multiplexing for Cloud Composite Service Reservation19
Dynamic Multi-Resource Optimization for Storage Acceleration in Cloud Storage Systems19
TF-DDRL: A Transformer-Enhanced Distributed DRL Technique for Scheduling IoT Applications in Edge and Cloud Computing Environments18
A Learning Automata-Based Scheduling for Deadline Sensitive Task in The Cloud18
Reliable Service Recommendation: A Multi-Modal Adversarial Method for Personalized Recommendation Under Uncertain Missing Modalities18
Time-Varying Microservice Orchestration with Routing for Dynamic Call Graphs via Multi-Scale Deep Reinforcement Learning18
Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing18
SHELDB: Client Storage Aware Homomorphic Encrypted Database Processing Framework With Low Communication Overhead18
Latency-Driven Model Placement for Efficient Edge Intelligence Service18
Extracting Reusable Fragments From Data-Centric Process Variants18
An Embedded GRASP-VNS based Two-Layer Framework for Tour Recommendation18
A Deep Reinforcement Learning Approach for Composing Moving IoT Services18
Detecting Evolving Fraudulent Behavior in Online Payment Services: Open-Category and Concept-Drift18
Online Traffic Allocation for Video Service Providers in Cloud-Edge Cooperative Systems18
TPI-LLM: Serving 70B-scale LLMs Efficiently on Low-resource Mobile Devices18
A Utility-Optimal Reverse Posted Pricing Mechanism for Online Mobile Crowdsensing Task Allocation17
ELXGB: An Efficient and Privacy-Preserving XGBoost for Vertical Federated Learning17
Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS17
Incentive Mechanism Design for Truth Discovery in Crowdsourcing With Copiers17
0.033668994903564