IEEE Transactions on Services Computing

Papers
(The TQCC of IEEE Transactions on Services Computing is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Large-Scale Service Mesh Orchestration with Probabilistic Routing in Cloud Data Centers167
Li-MSA: Power Consumption Prediction of Servers Based on Few-Shot Learning141
Exploring Dynamic Task Loading in SGX-Based Distributed Computing137
A Transformational Approach to Managing Data Model Evolution of Web Services135
A Framework for Dynamic Composition and Management of Emergency Response Processes120
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing115
A Solution to Blockchain Smart Contract Based Parametric Transport and Logistics Insurance115
Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment108
Privacy-Preserving Classification in Multiple clouds eHealthcare104
Scalable Large Model for Unlabeled Anomaly Detection With Trio-Attention U-Transformer and Manifold-Learning Siamese Discriminator103
TrustPay: A Dual-Layer Blockchain-based Framework for Trusted Service Transaction100
Enhancing Federated Learning through Layer-wise Aggregation over Non-IID Data96
A False Positive Resilient Distributed Trust Management Framework for Collaborative Intrusion Detection Systems91
MAACO: A Dynamic Service Placement Model for Smart Cities85
Cold-Start Next-Item Recommendation by User-Item Matching and Auto-Encoders85
MMLF: Multi-Metric Latent Feature Analysis for High-Dimensional and Incomplete Data84
Towards Close-To-Zero Runtime Collection Overhead: Raft-Based Anomaly Diagnosis on System Faults for Distributed Storage System84
Cloud-Based Charging Management of Heterogeneous Electric Vehicles in a Network of Charging Stations: Price Incentive Versus Capacity Expansion84
Intent-Guided Bilateral Long and Short-Term Information Mining With Contrastive Learning for Sequential Recommendation78
Continuous Management of Machine Learning-Based Application Behavior77
Security and Privacy for Healthcare Blockchains75
Next PoI Recommendation Based on Graph Convolutional Networks and Multiple Context-Awareness75
Multiple Cooperative Task Assignment on Reliability-Oriented Social Crowdsourcing72
Distributed Redundant Placement for Microservice-based Applications at the Edge72
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud68
Availability Evaluation of Multi-Tenant Service Function Chaining Infrastructures by Multidimensional Universal Generating Function68
Integrating Social Networks with Mobile Device-to-Device Services68
Automated Validation of Compensable SLAs64
Paramart: Parallel Resource Allocation Based on Blockchain Sharding for Edge-Cloud Services64
Fair Task Allocation in Crowdsourced Delivery62
Mining Set of Interested Communities with Limited Exemplar Nodes for Network Based Services61
Sifter: A Service Isolation Strategy for Internet Applications61
LKSM: Light Weight Key-Value Store for Efficient Application Services on Local Distributed Mobile Devices61
DMPSI: Efficient Scalable Delegated Multiparty PSI and PSI-CA With Oblivious PRF61
Scheduling Real-Time Security Aware Tasks in Fog Networks60
Defending N-Version Programming Service Components against Co-Resident Attacks in IoT Cloud Systems60
StraAlgin: Automated Strategic Alignment of Services59
Design of Anti-Plagiarism Mechanisms in Decentralized Federated Learning59
Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)58
Privacy Enhanced Authentication for Online Learning Healthcare Systems58
Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin Board56
Data-Submission Control of Web Service-Based Multi-Agent System56
Dynamic Cluster-Based Flow Management for Software Defined Networks56
Cross-Edge Orchestration of Serverless Functions With Probabilistic Caching56
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data56
Maximum Entropy Policy for Long-Term Fairness in Interactive Recommender Systems55
Toward Intelligent Surveillance as an Edge Network Service (iSENSE) Using Lightweight Detection and Tracking Algorithms54
Multi-Attribute Auction-Based Grouped Federated Learning52
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus51
A Self-Adaptive Service Discovery Model for Smart Cities50
Incentive Mechanism Design for Two-Layer Wireless Edge Caching Networks Using Contract Theory49
AoI-Aware Inference Services in Edge Computing via Digital Twin Network Slicing49
Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices48
A Monitoring-Free Bitcoin Payment Channel Scheme With Support for Real-Time Settlement48
Web Application Resource Requirements Estimation Based on the Workload Latent Features48
Cross-View Graph Alignment for Mashup Recommendation47
A Socialized Learning-Based Scheduling Framework in Intricate Edge Clouds47
Auction-Based Resource Allocation Mechanism in Federated Cloud Environment: TARA46
Analysis of the Influence of Per-Second Billing on Virtual Machine Allocation Costs in Public Clouds44
Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-Like Blockchains? Quantitative Analysis44
An Efficient, Fair, and Robust Image Pricing Mechanism for Crowdsourced 3D Reconstruction44
Fuzzy Deduplication: Color-Aware Deduplication for Multi-Media Data44
Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems43
Stanza: Layer Separation for Distributed Training in Deep Learning43
Privacy-Preserving Multi-Modality-Based Computer-Aided Diagnosis Processing of Liver Diseases43
A Service Selection Method Based on Ordinal Classification for Historical Records43
History-Aware Privacy Budget Allocation for Model Training on Evolving Data-Sharing Platforms42
Efficient Transition Adjacency Relation Computation for Process Model Similarity42
An Efficient and Multi-Private Key Secure Aggregation Scheme for Federated Learning41
RACE: QoI-Aware Strategic Resource Allocation for Provisioning Se-aaS41
Towards a Trustworthy and Adaptive Execution of Business Process Choreographies41
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud40
Effective Graph Modeling and Contrastive Learning for Time-Aware QoS Prediction40
Trading off Between Multi-Tenancy and Interference: A Service User Allocation Game39
Multi-Objective DAG Task Offloading in MEC Environment Based on Federated DQN With Automated Hyperparameter Optimization39
Holistic Root Cause Analysis for Failures in Cloud-Native Systems Through Observability Data37
RAP: A Light-Weight Privacy-Preserving Framework for Recommender Systems37
Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks37
Learning-to-Adaptation for Security Service in Industrial IoT: An AI-Enabled Slice-Specific Solution37
Exploiting Stragglers in Distributed Computing Systems With Task Grouping37
Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data36
RDRM: Real-Time Dynamic Replica Management With Joint Optimization for Edge Computing36
MEC-Enabled Task Replication With Resource Allocation for Reliability-Sensitive Services in 5G mMTC Networks35
Long-Term IaaS Selection Using Performance Discovery35
Enabling Fast Public Auditing and Data Dynamics in Cloud Services35
Constrained App Data Caching Over Edge Server Graphs in Edge Computing Environment35
Fair Outsourcing Polynomial Computation Based on the Blockchain35
SEA-LEAP: Self-Adaptive and Locality-Aware Edge Analytics Placement34
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs34
Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation34
Priority-Based Selection of Individuals in Memetic Algorithms for Distributed Data-Intensive Web Service Compositions34
A Utility Game Driven QoS Optimization for Cloud Services34
Defending Adversarial Attacks via Semantic Feature Manipulation34
Optimizing Data Center Energy Efficiency via Event-Driven Deep Reinforcement Learning33
A Formal Treatment of Contract Signature33
Experimental Evaluation of Rule-Based Autonomic Computing Management Framework for Cloud-Native Applications33
Flexible Offloading of Service Function Chains to Programmable Switches32
PuzzleMesh: A Puzzle Model to Build Mesh of Agnostic Services for Edge-Fog-Cloud32
Multi-Agent Reinforcement Learning Aided Computation Offloading in Aerial Computing for the Internet-of-Things32
CTL-Based Adaptive Service Composition in Edge Networks32
TreeNet Based Fast Task Decomposition for Resource-Constrained Edge Intelligence32
Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers32
Modeling and Empirical Validation of Reliability and Performance Trade-Offs of Dynamic Routing in Service- and Cloud-Based Architectures32
Multi-criteria performance analysis based on Physics of Decision — Application to COVID-19 and future pandemics31
Privacy-Preserving and Publicly Verifiable Matrix Multiplication30
Distributed Edge System Orchestration for Web-based Mobile Augmented Reality Services30
Service-based, Multi-Provider, Fog Ecosystem with Joint Optimization of Request Mapping and Response Routing30
Cost-aware Resource Recommendation for DAG-based Big Data Workflows: An Apache Spark Case Study30
A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context30
Agile Services Provisioning for Learning-Based Applications in Fog Computing Networks29
Time-Constrained Service Handoff for Mobile Edge Computing in 5G29
Mashup-Oriented Web API Recommendation Via Full-Text Semantic Mining of Developer Requirements29
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms29
Optimal Service Provisioning in Mobile 5G and Beyond Systems29
When to Invoke a Prediction Service for Business Process Monitoring?29
DebtCom: Technical Debt-Aware Service Recomposition in SaaS Cloud29
FedChain: Secure Proof-of-Stake-Based Framework for Federated-Blockchain Systems29
Scheduling Multi-Server Jobs With Sublinear Regrets via Online Learning28
Secure Replication-Based Outsourced Computation Using Smart Contracts28
Identification of Fraudulent Healthcare Claims Using Fuzzy Bipartite Knowledge Graphs28
GRASPED: A GRU-AE Network Based Multi-Perspective Business Process Anomaly Detection Model28
Feynman: Federated Learning-Based Advertising for Ecosystems-Oriented Mobile Apps Recommendation28
BlockMeter: An Application Agnostic Performance Measurement Framework for Private Blockchain Platforms27
Proactive Recommendation of Composite Services in Multi-Access Edge Computing27
RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data27
False Data Injection Attack Detection Based on Redundant Sparse Reconstruction27
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center27
Robust Failure Diagnosis of Microservice System Through Multimodal Data27
NBSync: Parallelism of Local Computing and Global Synchronization for Fast Distributed Machine Learning in WANs27
Ensuring Fairness in Edge Networks: A GNN-Based Media Workload Migration Scheme With Fairness Guarantee27
MHRR: MOOCs Recommender Service With Meta Hierarchical Reinforced Ranking26
EthereumX: Improving Signature Security With Randomness Preprocessing Module26
MDRL-IR: Incentive Routing for Blockchain Scalability With Memory-Based Deep Reinforcement Learning26
Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes26
Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences26
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage26
TNSAR: Temporal Evolution Network Embedding Based on Structural and Attribute Retention26
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage26
Service Recommendations for Mashup Based on Generation Model26
Defending Against Membership Inference Attack by Shielding Membership Signals26
Joint Admission Control and Resource Allocation of Virtual Network Embedding via Hierarchical Deep Reinforcement Learning26
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry26
Automating the Translation of Cloud Users’ High-Level Security Needs to an Optimal Placement Model in the Cloud Infrastructure26
A Bayesian Game Based Bidding Scheme for Mobile Charging Services in IoEV25
Design and Generation of a Set of Declarative APIs for Security Orchestration25
Identifying the Key Attributes in an Unlabeled Event Log for Automated Process Discovery25
TRCF: Temporal Reinforced Collaborative Filtering for Time-Aware QoS Prediction25
Discovering Hierarchical Multi-Instance Business Processes From Event Logs25
Towards Effective Resource Procurement in MEC: A Resource Re-Selling Framework25
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud24
Efficient Approximation Algorithms for Scheduling Coflows With Precedence Constraints in Identical Parallel Networks to Minimize Weighted Completion Time24
A Novel Addressing and Routing Architecture for Cloud-Service Datacenter Networks24
Synthesis of Regulation Compliant Business Processes24
PPFilter: Provider Privacy-Aware Encrypted Filtering System24
Faashouse: Sustainable Serverless Edge Computing Through Energy-Aware Resource Scheduling24
Robust and Reliable Process-Aware Information Systems24
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment24
Clustering Based Priority Queue Algorithm for Spatial Task Assignment in Crowdsourcing23
MLog: Mogrifier LSTM-Based Log Anomaly Detection Approach Using Semantic Representation23
M-DAFTO: Multi-Stage Deferred Acceptance Based Fair Task Offloading in IoT-Fog Systems23
Generalized Nesterov's Acceleration-Incorporated, Non-Negative and Adaptive Latent Factor Analysis23
Leveraging Consortium Blockchain for Secure Cross-domain Data Sharing in Supply Chain Networks23
Weighted Adversarial Learning From Crowds23
A Technique for Faster Convergence of Game-Theoretic Approaches for Edge Computing Resource Allocation23
Kalman Filter Based Prediction and Forecasting of Cloud Server KPIs23
TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET23
AI-Generated Content-Based Edge Learning for Fast and Efficient Few-Shot Defect Detection in IIoT23
MTDA: Efficient and Fair DPU Offloading Method for Multiple Tenants23
Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities22
A Decentralized Approach for Resource Discovery using Metadata Replication in Edge Networks22
Resource Trading in Edge Computing-Enabled IoV: An Efficient Futures-Based Approach22
Resource Provision and Allocation Based on Microeconomic Theory in Mobile Edge Computing22
Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected Blockchain22
A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid21
When Search Engine Services Meet Large Language Models: Visions and Challenges21
A Granular SVM-Based Method for Top-N Web Services Recommendation21
Joint Deep Networks Based Multi-Source Feature Learning for QoS Prediction21
Computation Offloading in MIMO Based Mobile Edge Computing Systems Under Perfect and Imperfect CSI Estimation20
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks20
LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI20
Task Recommendation in Crowdsourcing Based on Learning Preferences and Reliabilities20
A Path Relinking Method for the Joint Online Scheduling and Capacity Allocation of DL Training Workloads in GPU as a Service Systems20
A QoS-Aware Clustering Based Multi-Layer Model for Web Service Selection20
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing20
Decentralized and Incentivized Federated Learning: A Blockchain-Enabled Framework Utilising Compressed Soft-Labels and Peer Consistency19
In-Flight Energy-Driven Composition of Drone Swarm Services19
Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data19
FIGAT: Accurately Classify Individual Crime Risks with Multi-information Fusion19
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing19
MoESys: A Distributed and Efficient Mixture-of-Experts Training and Inference System for Internet Services19
Two-Stream Graph Convolutional Network-Incorporated Latent Feature Analysis19
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development19
Concept Drift-based Checkpoint-restart for Edge Services Rejuvenation19
Authenticable Additive Homomorphic Scheme and its Application for MEC-based IoT19
On Cyber Risk Management of Blockchain Networks: A Game Theoretic Approach19
An Embedded GRASP-VNS based Two-Layer Framework for Tour Recommendation19
Deep Learning for Predictive Business Process Monitoring: Review and Benchmark19
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query19
A Graph Neural Network and Pointer Network-Based Approach for QoS-Aware Service Composition19
Dynamic Software Containers Workload Balancing via Many-Objective Search18
Metric Learning as a Service With Covariance Embedding18
Coalitional Federated Learning: Improving Communication and Training on Non-IID Data With Selfish Clients18
Implementation of a Multi-Approach Fake News Detector and of a Trust Management Model for News Sources18
Multistage Game Theoretical Approach for Ransomware Attack and Defense18
A Cloud Broker for Executing Deadline-Constrained Periodic Scientific Workflows18
Deep Reinforcement Learning for Containerized Edge Intelligence Inference Request Processing in IoT Edge Computing18
OffsetINT: Achieving High Accuracy and Low Bandwidth for In-Band Network Telemetry18
Edge Intelligence for Real-Time IoT Service Trust Prediction18
ECFA: An Efficient Convergent Firefly Algorithm for Solving Task Scheduling Problems in Cloud-Edge Computing18
Moving Real-Time Services to Web 3.0: Challenges and Opportunities18
Securing Deep Learning as a Service Against Adaptive High Frequency Attacks With MMCAT18
Joint Optimization of Coverage and Reliability for Application Placement in Mobile Edge Computing18
Auto-Scaling Containerized Applications in Geo-Distributed Clouds17
Lightweight and Decentralized Cross-Cloud Auditing With Data Recovery17
Peak AoI Minimization With Directional Charging for Data Collection at Wireless-Powered Network Edge17
An Effective Classification-Based Framework for Predicting Cloud Capacity Demand in Cloud Services17
: A QoS-Aware Distributed Deep Reinforcement Learning Technique for Service Offloading in Fog Computing Environments17
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing17
User-Driven Synthetic Dataset Generation With Quantifiable Differential Privacy17
Adaptive Regularization and Resilient Estimation in Federated Learning17
Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach17
Heterogeneity-Aware Proactive Elastic Resource Allocation for Serverless Applications16
Collaborative Tag-Aware Graph Neural Network for Long-Tail Service Recommendation16
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys16
Accelerating Tip Selection in Burst Message Arrivals for DAG-Based Blockchain Systems16
Exploiting Heterogeneity for Opportunistic Resource Scaling in Cloud-Hosted Applications16
Blockchain-Based Efficient and Trustworthy AIGC Services in Metaverse16
AIEC-RSC: AI and Edge Collaboration Empowered Reliable Service Computing for High-Speed Mobile Businesses16
Dynamic Trust Enforcing Pricing Scheme for Sensors-as-a-Service in Sensor-Cloud Infrastructure16
Latency-Based Inter-Operator Scheduling for CNN Inference Acceleration on GPU16
SmartChain: A Dynamic and Self-Adaptive Sharding Framework for IoT Blockchain16
A Security Framework for Scientific Workflow Provenance Access Control Policies16
Sentiment-Aware Representation Learning Framework Fusion With Multi-Aspect Information for POI Recommendation16
Accelerating Cross-Shard Blockchain Consensus via Decentralized Coordinators Service With Verifiable Global States16
An Enhanced Block Validation Framework With Efficient Consensus for Secure Consortium Blockchains16
Recommendation-Enabled Edge Caching and D2D Offloading via Incentive-Driven Deep Reinforcement Learning16
Reputation Measurement for Online Services Based on Dominance Relationships16
McTAR: A Multi-Trigger Checkpointing Tactic for Fast Task Recovery in MapReduce16
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage16
A Deep Recurrent-Reinforcement Learning Method for Intelligent AutoScaling of Serverless Functions15
Secure Neighbor Discovery as a Service in the Internet of Ships Environment15
Semantics of Data Mining Services in Cloud Computing15
Trusted Sharing of Computing Power Resources: Benefit-Driven Heterogeneous Network Service Provision Mechanism15
CouldPin-Fast: Effient and Effective Root Cause Localization for Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks15
Concurrent Request Multiplexing for Cloud Composite Service Reservation15
SEnD: A Social Network Friendship Enhanced Decentralized System to Circumvent Censorships15
Federated Distributed Deep Reinforcement Learning for Recommendation-Enabled Edge Caching15
Detecting Evolving Fraudulent Behavior in Online Payment Services: Open-Category and Concept-Drift14
SECaaS-Based Partially Observable Defense Model for IIoT Against Advanced Persistent Threats14
Adaptive Network Management Service Based on Control Relation Graph for Software-Defined LEO Satellite Networks in 6G14
0.15158891677856