IEEE Transactions on Services Computing

Papers
(The median citation count of IEEE Transactions on Services Computing is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Cost-aware Resource Recommendation for DAG-based Big Data Workflows: An Apache Spark Case Study180
Towards Effective Resource Procurement in MEC: A Resource Re-Selling Framework168
PPFilter: Provider Privacy-Aware Encrypted Filtering System156
Effective Graph Modeling and Contrastive Learning for Time-Aware QoS Prediction152
RDRM: Real-Time Dynamic Replica Management With Joint Optimization for Edge Computing130
Holistic Root Cause Analysis for Failures in Cloud-Native Systems Through Observability Data123
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers118
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment117
Scheduling Multi-Server Jobs With Sublinear Regrets via Online Learning112
M-DAFTO: Multi-Stage Deferred Acceptance Based Fair Task Offloading in IoT-Fog Systems108
Weighted Adversarial Learning From Crowds107
Paramart: Parallel Resource Allocation Based on Blockchain Sharding for Edge-Cloud Services96
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing93
Scalable Large Model for Unlabeled Anomaly Detection With Trio-Attention U-Transformer and Manifold-Learning Siamese Discriminator92
Dynamic Cluster-Based Flow Management for Software Defined Networks92
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage90
Modeling and Empirical Validation of Reliability and Performance Trade-Offs of Dynamic Routing in Service- and Cloud-Based Architectures87
Maximizing NFT Incentives: References Make You Rich86
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data86
Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)82
Proactive Recommendation of Composite Services in Multi-Access Edge Computing79
Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks78
Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion77
KeAD: Knowledge-enhanced Graph Attention Network for Accurate Anomaly Detection75
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment70
Enhancing Game Policy Optimization in Mobile Crowdsourcing: A Reinforcement Learning Approach69
SNN-IoT: Efficient Partitioning and Enabling of Deep Spiking Neural Networks in IoT Services69
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage67
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs66
Maximum Entropy Policy for Long-Term Fairness in Interactive Recommender Systems66
Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems66
Task Allocation With Geography-Context-Capacity Awareness in Distributed Burstable Billing Edge-Cloud Systems65
2021 Reviewers List64
An Efficient Replication-Based Aggregation Verification and Correctness Assurance Scheme for Federated Learning63
DeFedGCN: Privacy-Preserving Decentralized Federated GCN for Recommender System62
Deep Reinforcement Learning for Scheduling Applications in Serverless and Serverful Hybrid Computing Environments62
Availability and Reliability of Core Networks (4G/5G) From a Deployment Standpoint61
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys60
Dynamic Trust Enforcing Pricing Scheme for Sensors-as-a-Service in Sensor-Cloud Infrastructure60
FREB: Participant Selection in Federated Learning with Reputation Evaluation and Blockchain60
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query58
Federated Distributed Deep Reinforcement Learning for Recommendation-Enabled Edge Caching58
Delegatable Order-Revealing Encryption for Reliable Cross-Database Query57
Reputation Bootstrapping for Composite Services Using CP-Nets57
MSCCL: A Framework for Enhancing Mashup Service Clustering With Contrastive Learning57
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development52
Differential Privacy-Based Location Protection in Spatial Crowdsourcing52
In-Flight Energy-Driven Composition of Drone Swarm Services52
Scheduling Workflows With Composite Tasks: A Nested Particle Swarm Optimization Approach52
Energy-Aware Service Function Chaining Embedding in NFV Networks51
Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network51
EHRChain: A Blockchain-Based EHR System Using Attribute-Based and Homomorphic Cryptosystem51
Resource Provisioning and Allocation in Function-as-a-Service Edge-Clouds49
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing49
SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts47
Incentive Mechanism for Mobile Crowdsensing with Two-Stage Stackelberg Game47
Optimizing Energy Efficiency for Data Center via Parameterized Deep Reinforcement Learning46
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing46
Joint Optimization of Request Assignment and Computing Resource Allocation in Multi-Access Edge Computing46
A Blockchain System for QoS Monitoring in Decentralized Edge Computing43
VPFLI: Verifiable Privacy-Preserving Federated Learning With Irregular Users Based on Single Server43
MADRL-Based Order Dispatching in MoD Systems With Bipartite Graph Splitting43
Microservices: Migration of a Mission Critical System43
An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud43
Guest Editor's Introduction: Special Section on Edge AI as a Service43
Secure Updatable Storage Access Control System for EHRs in the Cloud42
TREAT: Temporal and Relational Attention-Based Tensor Representation Learning for Ethereum Phishing Users42
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving42
ESync: Accelerating Intra-Domain Federated Learning in Heterogeneous Data Centers42
Privacy Cost Optimization of Smart Meters Using URLLC and Demand Side Energy Trading41
Joint Task Offloading, Resource Allocation and Model Placement for AI as a Service in 6G Network41
A Semantically Rich Framework to Automate Cloud Service Level Agreements41
Freshness-Aware Incentive Mechanism for Mobile Crowdsensing With Budget Constraint41
Automated Probe Life-Cycle Management for Monitoring-As-a-Service40
A Game-Based Computation Offloading With Imperfect Information in Multi-Edge Environments40
2024 Reviewers List*40
Joint Scheduling of Overlapping MapReduce Phases: Pair Jobs for Optimization40
PIAS: Privacy-Preserving Incentive Announcement System Based on Blockchain for Internet of Vehicles39
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing39
Dynamic Adaptive Federated Learning on Local Long-Tailed Data39
GraphIoT: Lightweight IoT Device Detection Based on Graph Classifiers and Incremental Learning39
Q-BLPP: A Quality-Enabled Bilateral Location Privacy-Preserving Service Construction Scheme in Mobile Crowd Sensing39
Integrating IoT and 6 G: Applications of Edge Intelligence, Challenges, and Future Directions38
FaaSDeliver: Cost-Efficient and QoS-Aware Function Delivery in Computing Continuum38
Semantically Rich Framework to Automate Cyber Insurance Services38
Criticality and Utility-Aware Fog Computing System for Remote Health Monitoring37
Enforcing Corporate Governance Controls With Cloud-Based Services37
Towards Auditable and Privacy-Preserving Online Medical Diagnosis Service Over Cloud37
Distributed Computing Applications of Context-Aware QoS and Trust Prediction Framework37
FlowValve+: Multi-Queue Packet Scheduling Framework on SoC-Based SmartNICs37
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing36
Online Service Placement, Task Scheduling, and Resource Allocation in Hierarchical Collaborative MEC Systems36
A Direct Data Aware LSTM Neural Network Architecture for Complete Remaining Trace and Runtime Prediction36
Time Series QoS Forecasting for Web Services Using Multi-Predictor-Based Genetic Programming36
User Preference Oriented Service Caching and Task Offloading for UAV-Assisted MEC Networks36
Analysis and Controlling of Manufacturing Service Ecosystem: A Research Framework Based on the Parallel System Theory35
UrbanEnQoSPlace: A Deep Reinforcement Learning Model for Service Placement of Real-Time Smart City IoT Applications35
MapReduce Task Scheduling in Heterogeneous Geo-Distributed Data Centers35
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework35
PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack34
Computation Offloading With Instantaneous Load Billing for Mobile Edge Computing34
A Privacy-Preserving Transparent Central Bank Digital Currency System Based on Consortium Blockchain and Unspent Transaction Outputs34
Boolean Searchable Attribute-Based Signcryption With Search Results Self-Verifiability Mechanism for Data Storage and Retrieval in Clouds34
Hierarchical Reinforcement Learning for Conversational Recommendation With Knowledge Graph Reasoning and Heterogeneous Questions34
Implicit Supervision-Assisted Graph Collaborative Filtering for Third-Party Library Recommendation34
Improving the Schedulability of Real-Time Tasks Using Fog Computing34
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services34
Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting34
Communication-Efficient Federated Learning With Adaptive Aggregation for Heterogeneous Client-Edge-Cloud Network33
BlockEmulator: An Emulator Enabling to Test Blockchain Sharding Protocols33
An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images33
Edge-Assisted Public Key Homomorphic Encryption for Preserving Privacy in Mobile Crowdsensing33
Vehicle Parking Navigation Based on Edge Computing With Diffusion Model and Information Potential Field33
Practical Blockchain-Based Options Contract32
Aggregated Capability Assessment (AgCA) For CAIQ Enabled Cross-cloud Federation32
A Fine-Grained Regularization Scheme for Non-negative Latent Factorization of High-Dimensional and Incomplete Tensors32
A Blockchain-Based Hedonic Game Scheme for Reputable Fog Federations32
Runtime Verification of Business Cloud Workflow Temporal Conformance32
Explainable and Effective Process Remaining Time Prediction Using Feature-Informed Cascade Prediction Model31
Real-Time Detection and Mitigation of LDoS Attacks in the SDN Using the HGB-FP Algorithm31
Burst-Aware Predictive Autoscaling for Containerized Microservices31
A Multi-View Deep Learning Approach for Predictive Business Process Monitoring31
Magneto: Load-Balanced Key-Value Service for Write-Intensive Workloads31
Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices31
Elastic Resource Provisioning Using Data Clustering in Cloud Service Platform30
ReMatch: An Efficient Virtual Data Center Re-Matching Strategy Based on Matching Theory30
Trajectory Privacy Protection Method Based on Differential Privacy in Crowdsensing30
TAPESTRY: A De-Centralized Service for Trusted Interaction Online29
Linear Structure Analysis of Embeddings for Bias Disparity Reduction in Collaborative Filtering29
DeFiGuard: A Price Manipulation Detection Service in DeFi Using Graph Neural Networks29
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security29
Data Caching Optimization With Fairness in Mobile Edge Computing29
Deep Reinforcement Learning With Entropy and Attention Mechanism for D2D-Assisted Task Offloading in Edge Computing28
Holistic VM Placement for Distributed Parallel Applications in Heterogeneous Clusters28
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain28
Achieving Searchable Encryption Scheme With Search Pattern Hidden28
DMSDRec: Dynamic Structure-aware Graph Masked Autoencoder and Spatiotemporal Diffusion for Next-POI Recommendation28
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation28
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection28
Secure Cloud Data Deduplication with Efficient Re-Encryption28
Toward Efficient and Reliable Private Set Computation in Decentralized Storage27
Web Service Recommendation via Combining Topic-aware Heterogeneous Graph Representation and Interactive Semantic Enhancement27
Social-Sensor Composition for Tapestry Scenes27
FedOrbit: Energy Efficient Federated Learning for Orbital Edge Computing Using Block Minifloat Arithmetic26
Utility-Aware and Privacy-Preserving Mobile Query Services26
Fast Subgraph Matching by Dynamic Graph Editing26
A Trust Model for SLA Negotiation Candidates Selection in a Dynamic IoT Environment26
An Approach for Incremental Mining of Clickstream Patterns as a Service Application26
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets26
Service Regulation Analysis Framework for Service Design Time: A Case Study of Internet Healthcare Service26
Virtdev: Towards Providing Edge Services26
Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting26
Indirect Revocable KP-ABE With Revocation Undoing Resistance25
KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption25
Random Coding Responses for Resisting Side-Channel Attacks in Client-Side Deduplicated Cloud Storage25
RESERVE: An Energy-Efficient Edge Cloud Architecture for Intelligent Multi-UAV25
Efficient Privacy-Preserving Face Identification Protocol25
Data Access Control in Cloud Computing: Flexible and Receiver Extendable25
STARDUST: A Novel Process Mining Approach to Discover Evolving Models From Trace Streams25
Artificial Impostors: An Efficient and Scalable Scheme for Location Privacy Preservation25
Swift and Accurate Mobility-Aware QoS Forecasting for Mobile Edge Environments25
Efficient and Privacy-Enhanced Federated Learning Based on Parameter Degradation25
Comment on “A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage”25
Multi-Layered Continuous Reasoning for Cloud-IoT Application Management25
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud25
CrossMeta: A Fast and Cheap Cross-Metaverse Interoperability Protocol25
Employ AI to Improve AI Services : Q-Learning Based Holistic Traffic Control for Distributed Co-Inference in Deep Learning25
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets24
A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels24
DySR: A Dynamic Graph Neural Network Based Service Bundle Recommendation Model for Mashup Creation24
FAST: A Forecasting Model With Adaptive Sliding Window and Time Locality Integration for Dynamic Cloud Workloads24
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing24
Compiling Service Function Chains via Fine-Grained Composition in the Programmable Data Plane23
Threshold Attribute-Based Credentials With Redactable Signature23
Energy Consumption Scheduling as a Fog Computing Service in Smart Grid23
Cost-Effective Data Placement in Edge Storage Systems With Erasure Code23
CATScaler: A Convolution-Augmented Transformer Scaling Framework for Cloud-Native Applications23
DDPQN: An Efficient DNN Offloading Strategy in Local-Edge-Cloud Collaborative Environments23
Energy-minimized Scheduling of Real-time Parallel Workflows on Heterogeneous Distributed Computing Systems23
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security23
Towards Proactive Risk-Aware Cloud Cost Optimization Leveraging Transient Resources23
A Privacy-Preserving Authenticated Key Agreement Scheme Based on Physically Unclonable Functions for Multi-Server Architecture23
NOVA: Neural-Optimized Viewport Adaptive 360-Degree Video Streaming at the Edge22
DRPC: Distributed Reinforcement Learning Approach for Scalable Resource Provisioning in Container-Based Clusters22
Priority-Based Selection of Individuals in Memetic Algorithms for Distributed Data-Intensive Web Service Compositions22
RT3C: Real-Time Crowd Counting in Multi-Scene Video Streams via Cloud-Edge-Device Collaboration22
A Workflow Scheduling Approach With Modified Fuzzy Adaptive Genetic Algorithm in IaaS Clouds22
A Novel Addressing and Routing Architecture for Cloud-Service Datacenter Networks22
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding22
Accurate and Reliable Service Recommendation Based on Bilateral Perception in Multi-Access Edge Computing22
An Efficient Algorithm for Microservice Placement in Cloud-Edge Collaborative Computing Environment22
Efficient Transition Adjacency Relation Computation for Process Model Similarity22
A Monitoring-Free Bitcoin Payment Channel Scheme With Support for Real-Time Settlement21
A Formal Treatment of Contract Signature21
Efficient Approximation Algorithms for Scheduling Coflows With Precedence Constraints in Identical Parallel Networks to Minimize Weighted Completion Time21
Cold-Start Next-Item Recommendation by User-Item Matching and Auto-Encoders21
Multi-criteria performance analysis based on Physics of Decision — Application to COVID-19 and future pandemics21
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data20
Data Re-outsourcing Detection with Latency-Constraint for Edge Storage20
Secure Replication-Based Outsourced Computation Using Smart Contracts20
A Granular SVM-Based Method for Top-N Web Services Recommendation20
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection20
Unlocking Complexity: Harnessing Value Entropy for Advanced Multidimensional Utility Evaluation in Service Ecosystems20
A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid20
Experimental Evaluation of Rule-Based Autonomic Computing Management Framework for Cloud-Native Applications20
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI20
Leveraging Consortium Blockchain for Secure Cross-Domain Data Sharing in Supply Chain Networks20
TrustPay: A Dual-Layer Blockchain-Based Framework for Trusted Service Transaction20
AoI-Aware Inference Services in Edge Computing via Digital Twin Network Slicing20
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing19
HGDRec:Next POI Recommendation Based on Hypergraph Neural Network and Diffusion Model19
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks19
Concurrent Request Multiplexing for Cloud Composite Service Reservation19
MTDA: Efficient and Fair DPU Offloading Method for Multiple Tenants19
Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation19
Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain19
Task Recommendation in Crowdsourcing Based on Learning Preferences and Reliabilities19
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud19
Generalized Nesterov's Acceleration-Incorporated, Non-Negative and Adaptive Latent Factor Analysis19
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET19
Exploring Dynamic Task Loading in SGX-Based Distributed Computing19
MHRR: MOOCs Recommender Service With Meta Hierarchical Reinforced Ranking19
Next PoI Recommendation Based on Graph Convolutional Networks and Multiple Context-Awareness19
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis19
FACT: Sealed-Bid Auction With Full Privacy via Threshold Fully Homomorphic Encryption19
A Deep Reinforcement Learning Approach for Composing Moving IoT Services18
A Learning Automata-Based Scheduling for Deadline Sensitive Task in The Cloud18
Secure Neighbor Discovery as a Service in the Internet of Ships Environment18
Latency-Driven Model Placement for Efficient Edge Intelligence Service18
SHELDB: Client Storage Aware Homomorphic Encrypted Database Processing Framework With Low Communication Overhead18
An Embedded GRASP-VNS based Two-Layer Framework for Tour Recommendation18
In-Network Computing Empowered Mobile Edge Offloading Architecture for Internet of Things18
Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing18
Detecting Evolving Fraudulent Behavior in Online Payment Services: Open-Category and Concept-Drift18
TF-DDRL: A Transformer-Enhanced Distributed DRL Technique for Scheduling IoT Applications in Edge and Cloud Computing Environments18
An Efficient and Secure Trading Framework for Shared Charging Service Based on Multiple Consortium Blockchains18
Dynamic Multi-Resource Optimization for Storage Acceleration in Cloud Storage Systems18
Graph-Represented Computation-Intensive Task Scheduling Over Air-Ground Integrated Vehicular Networks17
Extracting Reusable Fragments From Data-Centric Process Variants17
Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data17
Online Traffic Allocation for Video Service Providers in Cloud-Edge Cooperative Systems17
Dynamic User Allocation in Stochastic Mobile Edge Computing Systems17
Task Failure Prediction in Cloud Data Centers Using Deep Learning17
Reliable Service Recommendation: A Multi-Modal Adversarial Method for Personalized Recommendation Under Uncertain Missing Modalities17
: A QoS-Aware Distributed Deep Reinforcement Learning Technique for Service Offloading in Fog Computing Environments17
A Geography-Based P2P Overlay Network for Fast and Robust Blockchain Systems17
Loader: A Log Anomaly Detector Based on Transformer16
ET2FA: A Hybrid Heuristic Algorithm for Deadline-constrained Workflow Scheduling in Cloud16
SmartChain: A Dynamic and Self-Adaptive Sharding Framework for IoT Blockchain16
Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement16
0.047322034835815