Jinjun Chen

Orcid: 0009-0003-1189-1208

According to our database1, Jinjun Chen authored at least 327 papers between 2004 and 2025.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2022, "for contributions to scalable architecture for cloud data storage and processing".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A two-stage accelerated search strategy for large-scale multi-objective evolutionary algorithm.
Inf. Sci., 2025

A joint vehicular device scheduling and uncertain resource management scheme for Federated Learning in Internet of Vehicles.
Inf. Sci., 2025

2024
Scenario-based Adaptations of Differential Privacy: A Technical Survey.
ACM Comput. Surv., August, 2024

Vector-Indistinguishability: Location Dependency Based Privacy Protection for Successive Location Data.
IEEE Trans. Computers, April, 2024

Multitasking bi-level evolutionary algorithm for data-intensive scientific workflows on clouds.
Expert Syst. Appl., March, 2024

Synergetic Focal Loss for Imbalanced Classification in Federated XGBoost.
IEEE Trans. Artif. Intell., February, 2024

A many-objective evolutionary algorithm assisted by ideal hyperplane.
Swarm Evol. Comput., February, 2024

Differentially private enhanced permissioned blockchain for private data sharing in industrial IoT.
Inf. Sci., February, 2024

MODSC: Many-Objective-Optimization-Driven Data-Balancing Strategy in Cross-Architectural Malware Classification for Extreme IoT.
IEEE Internet Things J., February, 2024

Adversarial Modality Alignment Network for Cross-Modal Molecule Retrieval.
IEEE Trans. Artif. Intell., January, 2024

Efficient low-rank multi-component fusion with component-specific factors in image-recipe retrieval.
Multim. Tools Appl., January, 2024

Dynamic adaptive multi-objective optimization algorithm based on type detection.
Inf. Sci., January, 2024

An adaptive interval many-objective evolutionary algorithm with information entropy dominance.
Swarm Evol. Comput., 2024

Special Issue on "Ensuring security for artificial intelligence applications in mobile edge computing software systems".
Softw. Pract. Exp., 2024

Many-objective joint optimization of computation offloading and service caching in mobile edge computing.
Simul. Model. Pract. Theory, 2024

A multi-task evolutionary algorithm for solving the problem of transfer targets.
Inf. Sci., 2024

Resource-aware multi-criteria vehicle participation for federated learning in Internet of vehicles.
Inf. Sci., 2024

An adaptive differential evolution algorithm based on archive reuse.
Inf. Sci., 2024

Cooperative interference to achieve interval many-objective evolutionary algorithm for association privacy secure computing migration.
Expert Syst. Appl., 2024

Dynamic deadline constrained multi-objective workflow scheduling in multi-cloud environments.
Expert Syst. Appl., 2024

Bounded and Unbiased Composite Differential Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DISS-CF: Direct Item Session Similarity Enhanced Collaborative Filtering Method for Recommendation.
Proceedings of the IEEE International Conference on Web Services, 2024

2023
A Knowledge Graph-Based Many-Objective Model for Explainable Social Recommendation.
IEEE Trans. Comput. Soc. Syst., December, 2023

Adaptive multi-task evolutionary algorithm based on knowledge reuse.
Inf. Sci., November, 2023

An interval multi-objective optimization algorithm based on elite genetic strategy.
Inf. Sci., November, 2023

Geo-Ellipse-Indistinguishability: Community-Aware Location Privacy Protection for Directional Distribution.
IEEE Trans. Knowl. Data Eng., July, 2023

A Correlation Graph Based Approach for Personalized and Compatible Web APIs Recommendation in Mobile APP Development.
IEEE Trans. Knowl. Data Eng., June, 2023

Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid.
IEEE Trans. Knowl. Data Eng., June, 2023

A Numerical Splitting and Adaptive Privacy Budget-Allocation-Based LDP Mechanism for Privacy Preservation in Blockchain-Powered IoT.
IEEE Internet Things J., 2023

A Many-Objective Optimized Sharding Scheme for Blockchain Performance Improvement in End-Edge-Enabled Internet of Things.
IEEE Internet Things J., 2023

Edge computing service deployment and task offloading based on multi-task high-dimensional multi-objective optimization.
CoRR, 2023

Huff-DP: Huffman Coding based Differential Privacy Mechanism for Real-Time Data.
CoRR, 2023

Anomaly Detection in Blockchain Networks: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

A Label Distribution for Few-shot In-domain Out-of-Scope Detection.
Proceedings of the IEEE International Conference on Data Mining, 2023

Research on All-Digital Simulation Method for OTN Optical Signal Fault.
Proceedings of the 8th International Conference on Cyber Security and Information Engineering, 2023

2022
A Survey on Differential Privacy for Unstructured Data Content.
ACM Comput. Surv., January, 2022

A Many-Objective Optimization Based Intelligent High Performance Data Processing Model for Cyber-Physical-Social Systems.
IEEE Trans. Netw. Sci. Eng., 2022

Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications.
IEEE Trans. Ind. Informatics, 2022

Optimizing Blockchain Based Smart Grid Auctions: A Green Revolution.
IEEE Trans. Green Commun. Netw., 2022

Collaborative deep learning framework on IoT data with bidirectional NLSTM neural networks for energy consumption forecasting.
J. Parallel Distributed Comput., 2022

Sign language digits and alphabets recognition by capsule networks.
J. Ambient Intell. Humaniz. Comput., 2022

An optional splitting extraction based gain-AUPRC balanced strategy in federated XGBoost for mitigating imbalanced credit card fraud detection.
Int. J. Bio Inspired Comput., 2022

An Optimized Privacy-Utility Trade-off Framework for Differentially Private Data Sharing in Blockchain-based Internet of Things.
CoRR, 2022

Privacy Preserving Machine Learning for Electric Vehicles: A Survey.
CoRR, 2022

Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey.
Cogn. Comput., 2022

Membership Inference via Backdooring.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Message from Data Science and Systems 2022 Steering Chairs.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G.
IEEE Trans. Veh. Technol., 2021

Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems.
IEEE Trans. Sustain. Comput., 2021

A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems.
ACM Trans. Internet Techn., 2021

A Sharding Scheme-Based Many-Objective Optimization Algorithm for Enhancing Security in Blockchain-Enabled Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

A Many-Objective Multistage Optimization-Based Fuzzy Decision-Making Model for Coal Production Prediction.
IEEE Trans. Fuzzy Syst., 2021

Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data.
IEEE Trans. Dependable Secur. Comput., 2021

An Improved Secure High-Order-Lanczos Based Orthogonal Tensor SVD for Outsourced Cyber-Physical-Social Big Data Reduction.
IEEE Trans. Big Data, 2021

Unified integration of many-objective optimization algorithm based on temporary offspring for software defects prediction.
Swarm Evol. Comput., 2021

Malicious Code Detection under 5G HetNets Based on a Multi-Objective RBM Model.
IEEE Netw., 2021

An improved matrix factorization based model for many-objective optimization recommendation.
Inf. Sci., 2021

A New Subspace Clustering Strategy for AI-Based Data Analysis in IoT System.
IEEE Internet Things J., 2021

A Multicloud-Model-Based Many-Objective Intelligent Algorithm for Efficient Task Scheduling in Internet of Things.
IEEE Internet Things J., 2021

SCADS: A Scalable Approach Using Spark in Cloud for Host-based Intrusion Detection System with System Calls.
CoRR, 2021

VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain based Virtual Power Plants.
CoRR, 2021

Differentially Private Demand Side Management for Incentivized Dynamic Pricing in Smart Grid.
CoRR, 2021

Image encryption based on a single-round dictionary and chaotic sequences in cloud computing.
Concurr. Comput. Pract. Exp., 2021

A polynomial-time algorithm for simple undirected graph isomorphism.
Concurr. Comput. Pract. Exp., 2021

Recognizing Hand Gesture in Still Infrared Images by CapsNet.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

A Framework for Deep Q-Learning Based Hybrid DVFS Algorithms for Real-Time Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Message from the SmartCity 2021 Steering Committee.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Message from the DSS 2021 Steering Chairs.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Transparency-privacy Trade-off in Blockchain-Based Supply Chain in Industrial Internet of Things.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Utilizing Local Tangent Information for Word Re-embedding.
Proceedings of the Advances in Information Retrieval, 2021

Differential Privacy-Based Permissioned Blockchain for Private Data Sharing in Industrial IoT.
Proceedings of the Broadband Communications, Networks, and Systems, 2021

2020
Guest editorial: special issue on data science in cyberspace 2019.
World Wide Web, 2020

Optimal placement of barrier coverage in heterogeneous bistatic radar sensor networks.
World Wide Web, 2020

DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading.
IEEE Trans. Serv. Comput., 2020

A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN.
IEEE Trans. Serv. Comput., 2020

Personalized Recommendation System Based on Collaborative Filtering for IoT Scenarios.
IEEE Trans. Serv. Comput., 2020

A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks.
IEEE Trans. Netw. Sci. Eng., 2020

A Scalable Multi-Data Sources Based Recursive Approximation Approach for Fast Error Recovery in Big Sensing Data on Cloud.
IEEE Trans. Knowl. Data Eng., 2020

A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture.
IEEE Trans. Ind. Informatics, 2020

High Performance Computing for Cyber Physical Social Systems by Using Evolutionary Multi-Objective Optimization Algorithm.
IEEE Trans. Emerg. Top. Comput., 2020

An Experimental Investigation Into the Hash Functions Used in Blockchains.
IEEE Trans. Engineering Management, 2020

Abnormal visual event detection based on multi-instance learning and autoregressive integrated moving average model in edge-based Smart City surveillance.
Softw. Pract. Exp., 2020

Weight convergence analysis of DV-hop localization algorithm with GA.
Soft Comput., 2020

Hybrid many-objective cuckoo search algorithm with Lévy and exponential distributions.
Memetic Comput., 2020

Differential privacy in blockchain technology: A futuristic approach.
J. Parallel Distributed Comput., 2020

Dual incremental fuzzy schemes for frequent itemsets discovery in streaming numeric data.
Inf. Sci., 2020

Hybrid many-objective particle swarm optimization algorithm for green coal production problem.
Inf. Sci., 2020

Special Section on Privacy Computing: Principles and Applications.
Inf. Sci., 2020

A many-objective optimization recommendation algorithm based on knowledge mining.
Inf. Sci., 2020

Scheduling workflows with privacy protection constraints for big data applications on cloud.
Future Gener. Comput. Syst., 2020

A hybrid recommendation system with many-objective evolutionary algorithm.
Expert Syst. Appl., 2020

A Survey on Representation Learning Efforts in Cybersecurity Domain.
ACM Comput. Surv., 2020

Performance Evaluation of Differential Privacy Mechanisms in Blockchain based Smart Metering.
CoRR, 2020

A Gaussian error correction multi-objective positioning model with NSGA-II.
Concurr. Comput. Pract. Exp., 2020

An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search.
Concurr. Comput. Pract. Exp., 2020

Differential Privacy Techniques for Cyber Physical Systems: A Survey.
IEEE Commun. Surv. Tutorials, 2020

Evaluating DAG Scheduling Algorithms for Maximum Parallelism.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Differentially Private Dynamic Pricing for Efficient Demand Response in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

An Improved DVFS Algorithm for Energy-Efficient Real-time Task Scheduling.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

A Fuzzy Theory Based Topological Distance Measurement for Undirected Multigraphs.
Proceedings of the 29th IEEE International Conference on Fuzzy Systems, 2020

Manifold Learning-based Word Representation Refinement Incorporating Global and Local Information.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

Performance evaluation of differential privacy mechanisms in blockchain-based smart metering.
Proceedings of the Blockchains for Network Security: Principles, 2020

2019
Big Data Stream Security Classification for IoT Applications.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Multivariate Multi-Order Markov Multi-Modal Prediction With Its Applications in Network Traffic Management.
IEEE Trans. Netw. Serv. Manag., 2019

Error Concealment for Cloud-Based and Scalable Video Coding of HD Videos.
IEEE Trans. Cloud Comput., 2019

Secure Tensor Decomposition for Big Data Using Transparent Computing Paradigm.
IEEE Trans. Computers, 2019

SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams.
IEEE Trans. Big Data, 2019

P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications.
IEEE J. Sel. Areas Commun., 2019

Differential privacy for renewable energy resources based smart metering.
J. Parallel Distributed Comput., 2019

Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things.
J. Parallel Distributed Comput., 2019

QoS-aware service recommendation based on relational topic model and factorization machines for IoT Mashup applications.
J. Parallel Distributed Comput., 2019

Optimal LEACH Protocol with Improved Bat Algorithm in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2019

Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019

Data fusion in cyber-physical-social systems: State-of-the-art and perspectives.
Inf. Fusion, 2019

Analyses of inverted generational distance for many-objective optimisation algorithms.
Int. J. Bio Inspired Comput., 2019

An enhanced priority-based scheduling heuristic for DAG applications with temporal unpredictability in task execution and data transmission.
Future Gener. Comput. Syst., 2019

Energy and cost aware scheduling with batch processing for instance-intensive IoT workflows in clouds.
Future Gener. Comput. Syst., 2019

Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions.
Future Gener. Comput. Syst., 2019

A Survey on Big Multimedia Data Processing and Management in Smart Cities.
ACM Comput. Surv., 2019

Host-Based Intrusion Detection System with System Calls: Review and Future Trends.
ACM Comput. Surv., 2019

Differential Privacy in Blockhain Technology: A Futuristic Approach.
CoRR, 2019

Special issue: 2016 International Conference on Information Technology in Medicine and Education (ITME2016).
Concurr. Comput. Pract. Exp., 2019

A pigeon-inspired optimization algorithm for many-objective optimization problems.
Sci. China Inf. Sci., 2019

A Tensor-Based Forensics Framework for Virtualized Network Functions in the Internet of Things: Utilizing Tensor Algebra in Facilitating More Efficient Network Forensic Investigations.
IEEE Consumer Electron. Mag., 2019

Cyberthreat-Intelligence Information Sharing: Enhancing Collaborative Security.
IEEE Consumer Electron. Mag., 2019

MultiScan: A Private Online Virus Detection System.
IEEE Consumer Electron. Mag., 2019

A Coupling Approach With GSO-BFOA for Many-Objective Optimization.
IEEE Access, 2019

An Extensible Toolkit for Resource Usage Prediction in Clouds.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

A Web Services Classification Method Based on GCN.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Dynamic Virtual Machine Number Selection for Processing-Capacity Constrained Workflow Scheduling in Cloud Computing Environments.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

A Novel Model for Classification of Parkinson's Disease: Accurately Identifying Patients for Surgical Therapy.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Grid and Workflows.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services.
IEEE Trans. Serv. Comput., 2018

Detection of Malicious Code Variants Based on Deep Learning.
IEEE Trans. Ind. Informatics, 2018

A Holistic Approach for Distributed Dimensionality Reduction of Big Data.
IEEE Trans. Cloud Comput., 2018

Guest Editorial: Big Data Infrastructure II.
IEEE Trans. Big Data, 2018

Guest Editorial: Big Data Infrastructure I.
IEEE Trans. Big Data, 2018

Hybrid multi-objective cuckoo search with dynamical local search.
Memetic Comput., 2018

Recommending a personalized sequence of pick-up points.
J. Comput. Sci., 2018

Privacy Computing: Concept, Computing Framework And Future Development Trends.
IACR Cryptol. ePrint Arch., 2018

Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds.
Future Gener. Comput. Syst., 2018

A benchmark approach and its toolkit for online scheduling of multiple deadline-constrained workflows in big-data processing systems.
Future Gener. Comput. Syst., 2018

A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment.
Future Gener. Comput. Syst., 2018

Speed control of mobile chargers serving wireless rechargeable networks.
Future Gener. Comput. Syst., 2018

Integrating Collaborative Filtering and Association Rule Mining for Market Basket Recommendation.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Personalized Commodity Recommendations of Retail Business Using User Feature Based Collaborative Filtering.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Towards Energy-Efficient Scheduling with Batch Processing for Instance-Intensive Cloud Workflows.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

A Resource Usage Prediction-Based Energy-Aware Scheduling Algorithm for Instance-Intensive Cloud Workflows.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud.
IEEE Trans. Sustain. Comput., 2017

A Scalable Data Chunk Similarity Based Compression Approach for Efficient Big Sensing Data Processing on Cloud.
IEEE Trans. Knowl. Data Eng., 2017

Securely Reinforcing Synchronization for Embedded Online Contests.
ACM Trans. Embed. Comput. Syst., 2017

DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream.
ACM Trans. Embed. Comput. Syst., 2017

A traffic hotline discovery method over cloud of things using big taxi GPS data.
Softw. Pract. Exp., 2017

Service Mining for Trusted Service Composition in Cross-Cloud Environment.
IEEE Syst. J., 2017

A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber-physical systems.
J. Parallel Distributed Comput., 2017

Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud.
J. Netw. Comput. Appl., 2017

A dynamic prime number based efficient security mechanism for big sensing data streams.
J. Comput. Syst. Sci., 2017

A Space-Filling Multidimensional Visualization (SFMDVis) for Exploratory Data Analysis.
Inf. Sci., 2017

Towards a trust evaluation middleware for cloud service selection.
Future Gener. Comput. Syst., 2017

An Adaptive Priority-Based Heuristic Approach for Scheduling DAG Applications with Uncertainties.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

IoT and Big Data: An Architecture with Data Flow and Security Issues.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
A Deployment Optimization Scheme Over Multimedia Big Data for Large-Scale Media Streaming Application.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Robust Hashing Based on Quaternion Zernike Moments for Image Authentication.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Frame Interpolation for Cloud-Based Mobile Video Streaming.
IEEE Trans. Multim., 2016

EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment.
IEEE Trans. Cloud Comput., 2016

HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing.
Concurr. Comput. Pract. Exp., 2016

Weighted principal component analysis-based service selection method for multimedia services in cloud.
Computing, 2016

Threats to Networking Cloud and Edge Datacenters in the Internet of Things.
IEEE Cloud Comput., 2016

A Resource Provisioning Strategy for Elastic Analytical Workflows in the Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

A Task Scheduling Method for Energy-Performance Trade-Off in Clouds.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
A Big Picture of Integrity Verification of Big Data in Cloud Computing.
Proceedings of the Handbook on Data Centers, 2015

A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud.
IEEE Trans. Parallel Distributed Syst., 2015

HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications.
IEEE Trans. Parallel Distributed Syst., 2015

Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud.
IEEE Trans. Computers, 2015

CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds.
IEEE Trans. Computers, 2015

MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud.
IEEE Trans. Computers, 2015

Efficiently Predicting Trustworthiness of Mobile Services Based on Trust Propagation in Social Networks.
Mob. Networks Appl., 2015

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud.
IACR Cryptol. ePrint Arch., 2015

External integrity verification for outsourced big data in cloud and IoT: A big picture.
Future Gener. Comput. Syst., 2015

A service evaluation method for cross-cloud service choreography.
Concurr. Comput. Pract. Exp., 2015

Cloud service QoS prediction via exploiting collaborative filtering and location-based data smoothing.
Concurr. Comput. Pract. Exp., 2015

Guest editorial: Special issue on data intensive cloud computing.
Computing, 2015

Cybermatics: A Holistic Field for Systematic Study of Cyber-Enabled New Worlds.
IEEE Access, 2015

A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Hybrid Genetic Algorithm for Privacy and Cost Aware Scheduling of Data Intensive Workflow in Cloud.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Efficient Algorithms for Social Network Coverage and Reach.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
An Optimized Computational Model for Multi-Community-Cloud Social Collaboration.
IEEE Trans. Serv. Comput., 2014

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
IEEE Trans. Parallel Distributed Syst., 2014

KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data Applications.
IEEE Trans. Parallel Distributed Syst., 2014

Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates.
IEEE Trans. Parallel Distributed Syst., 2014

Do we need to handle every temporal violation in scientific workflow systems?
ACM Trans. Softw. Eng. Methodol., 2014

CPU load prediction for cloud environment based on a dynamic ensemble model.
Softw. Pract. Exp., 2014

Introduction: Social Computing and Social Networks.
J. Organ. Comput. Electron. Commer., 2014

A security framework in G-Hadoop for big data computing across distributed Cloud data centres.
J. Comput. Syst. Sci., 2014

A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud.
J. Comput. Syst. Sci., 2014

A spatiotemporal compression based approach for efficient big data processing on Cloud.
J. Comput. Syst. Sci., 2014

Special Issue: Dependable and Secure Computing.
J. Comput. Syst. Sci., 2014

Special Issue on Scalable Computing for Big Data.
Big Data Res., 2014

Services for Knowledge Sharing in Dynamic Business Networks.
Proceedings of the 23rd Australian Software Engineering Conference, 2014

2013
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud.
IEEE Trans. Parallel Distributed Syst., 2013

A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2013

An evaluation method of outsourcing services for developing an elastic cloud platform.
J. Supercomput., 2013

A Method for Optimizing Top-k Composite Services towards Preference-Aware Service Dominance.
Int. J. Web Serv. Res., 2013

An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud.
J. Comput. Syst. Sci., 2013

CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing.
Future Gener. Comput. Syst., 2013

A confidence-based filtering method for DDoS attack defense in cloud environment.
Future Gener. Comput. Syst., 2013

SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud.
Concurr. Comput. Pract. Exp., 2013

Mining batch processing workflow models from event logs.
Concurr. Comput. Pract. Exp., 2013

A QoS-aware service discovery method for elastic cloud computing in an unstructured peer-to-peer network.
Concurr. Comput. Pract. Exp., 2013

A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing.
Concurr. Comput. Pract. Exp., 2013

Special issue: second international workshop on workflow management in service and cloud computing (WMSC2010).
Concurr. Comput. Pract. Exp., 2013

Special issue: 2011 international conference on cloud and green computing (CGC2011).
Concurr. Comput. Pract. Exp., 2013

Research trends in cloud, cluster and grid computing.
Clust. Comput., 2013

A Privacy-Leakage-Tolerance Based Noise Enhancing Strategy for Privacy Protection in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Selecting Top-k Composite Web Services Using Preference-Aware Dominance Relationship.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Querying Streaming XML Big Data with Multiple Filters on Cloud.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Social Sentiment Detection of Event via Microblog.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Public Auditing for Big Data Storage in Cloud Computing - A Survey.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

A User Demand Uncertainty Based Approach for Cloud Resource Management.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
The Design of Cloud Workflow Systems.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-1933-4, 2012

A trust-based noise injection strategy for privacy protection in cloud.
Softw. Pract. Exp., 2012

A Collaborative QoS-Aware Service Evaluation Method Among Multi-Users for a Shared Service.
Int. J. Web Serv. Res., 2012

Reputation rating modeling for open environment lack of communication by using online social cognition.
J. Netw. Comput. Appl., 2012

A historical probability based noise generation strategy for privacy protection in cloud computing.
J. Comput. Syst. Sci., 2012

A QoS-aware composition method supporting cross-platform service invocation in cloud environment.
J. Comput. Syst. Sci., 2012

Special Issue: Cloud Computing 2011.
J. Comput. Syst. Sci., 2012

A data dependency based strategy for intermediate data storage in scientific cloud workflow systems.
Concurr. Comput. Pract. Exp., 2012

Dependency-based Risk Evaluation for Robust Workflow Scheduling.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

LSDSS Introduction.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing.
Proceedings of the Service-Oriented Computing - 10th International Conference, 2012

Key Research Issues for Privacy Protection and Preservation in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Privacy-Preserving Layer over MapReduce on Cloud.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Risk-Aware Checkpoint Selection in Cloud-Based Scientific Workflow.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Workflow Refactoring for Concurrent Task Execution.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

A Cost-Effective Mechanism for Cloud Data Reliability Management Based on Proactive Replica Checking.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Orchestrating e-Science with the Workflow Paradigm: Task-Based Scientific Workflow Modeling and Executing.
Proceedings of the Guide to e-Science, Next Generation Scientific Research and Discovery, 2011

Preventing Temporal Violations in Scientific Workflows: Where and How.
IEEE Trans. Software Eng., 2011

Building Quick Service Query List Using WordNet and Multiple Heterogeneous Ontologies toward More Realistic Service Composition.
IEEE Trans. Serv. Comput., 2011

Temporal dependency-based checkpoint selection for dynamic verification of temporal constraints in scientific workflow systems.
ACM Trans. Softw. Eng. Methodol., 2011

A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems.
J. Syst. Softw., 2011

A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow systems.
J. Syst. Softw., 2011

On-demand minimum cost benchmarking for intermediate dataset storage in scientific cloud workflow systems.
J. Parallel Distributed Comput., 2011

Building enterprise mashups.
Future Gener. Comput. Syst., 2011

A workflow framework for intelligent service composition.
Future Gener. Comput. Syst., 2011

A QoS-aware exception handling method in scientific workflow execution.
Concurr. Comput. Pract. Exp., 2011

A probabilistic strategy for temporal constraint management in scientific workflow systems.
Concurr. Comput. Pract. Exp., 2011

Special Issue: Fourth International Workshop on Workflow Management (ICWM2009).
Concurr. Comput. Pract. Exp., 2011

A History Record-Based Service Optimization Method for QoS-Aware Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2011

A QoS-Aware Service Evaluation Method for Co-selecting a Shared Service.
Proceedings of the IEEE International Conference on Web Services, 2011

Graph-Cut Based Coscheduling Strategy Towards Efficient Execution of Scientific Workflows in Collaborative Cloud Environments.
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011

An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A Local-Optimisation Based Strategy for Cost-Effective Datasets Storage of Scientific Applications in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Localising temporal constraints in scientific workflows.
J. Comput. Syst. Sci., 2010

Special issue: Scientific workflow 2009.
J. Comput. Syst. Sci., 2010

A Compromised-Time-Cost Scheduling Algorithm in SwinDeW-C for Instance-Intensive Cost-Constrained Workflows on a Cloud Computing Platform.
Int. J. High Perform. Comput. Appl., 2010

A data placement strategy in scientific cloud workflows.
Future Gener. Comput. Syst., 2010

A cost-effective strategy for intermediate data storage in scientific cloud workflow systems.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Combining Local Optimization and Enumeration for QoS-aware Web Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2010

An Effective Framework of Light-Weight Handling for Three-Level Fine-Grained Recoverable Temporal Violations in Scientific Workflows.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

A QoS-aware Web Service Selection Method Based on Credibility Evaluation.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

A Comprehensive Evaluation Method for Cross-Organizational Service Selection.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

Handling Recoverable Temporal Violations in Scientific Workflow Systems: A Workflow Rescheduling Based Strategy.
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010

SwinDeW-C: A Peer-to-Peer Based Cloud Workflow System.
Proceedings of the Handbook of Cloud Computing., 2010

2009
Grid and Workflows.
Proceedings of the Encyclopedia of Database Systems, 2009

A policy-based authorization model for workflow-enabled dynamic process management.
J. Netw. Comput. Appl., 2009

Trust-based robust scheduling and runtime adaptation of scientific workflow.
Concurr. Comput. Pract. Exp., 2009

Building Quick Service Query list (QSQL) to support automated service discovery for scientific workflow.
Concurr. Comput. Pract. Exp., 2009

Optimizing execution path of scientific workflow by gradual removal of QoS constraint violations in Reverse Order.
Concurr. Comput. Pract. Exp., 2009

Special Issue: 3rd International Workshop on Workflow Management and Applications in Grid Environments (WaGe2008).
Concurr. Comput. Pract. Exp., 2009

Achieving On-Time Delivery: A Two-Stage Probabilistic Scheduling Strategy for Software Projects.
Proceedings of the Trustworthy Software Development Processes, 2009

Implementation of a Visual Modeling Tool for Defining Instance Aspect in Workflow.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Gradual Removal of QoS Constraint Violations by Employing Recursive Bargaining Strategy for Optimizing Service Composition Execution Path.
Proceedings of the IEEE International Conference on Web Services, 2009

Process-Oriented Enterprise Mashups.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2009

A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows.
Proceedings of the Seventh Australasian Symposium on Grid Computing and e-Research, 2009

Reasoning intra-dependency in commitments for robust scheduling.
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
A Workflow Engine-Driven SOA-Based Cooperative Computing Paradigm in Grid Environments.
Int. J. High Perform. Comput. Appl., 2008

Activity Completion Duration Based Checkpoint Selection for Dynamic Verification of Temporal Constraints in Grid Workflow Systems.
Int. J. High Perform. Comput. Appl., 2008

Preface.
Int. J. High Perform. Comput. Appl., 2008

WdCM: a workday calendar model for workflows in service grid environments.
Concurr. Comput. Pract. Exp., 2008

A throughput maximization strategy for scheduling transaction-intensive workflows on SwinDeW-G.
Concurr. Comput. Pract. Exp., 2008

A context- and role-driven scientific workflow development pattern.
Concurr. Comput. Pract. Exp., 2008

A taxonomy of grid workflow verification and validation.
Concurr. Comput. Pract. Exp., 2008

Special Issue: First International Workshop on Workflow Systems in Grid Environments (WSGE2006).
Concurr. Comput. Pract. Exp., 2008

Special issue: Second International Workshop on Workflow Management and Applications in Grid Environments (WaGe2007).
Concurr. Comput. Pract. Exp., 2008

Measuring Knowledge Delivery Quantity of Associated Knowledge Flow.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

A Reverse Order-Based QoS Constraint Correction Approach for Optimizing Execution Path for Service Composition.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

QoS-Aware Service Selection Using QDG for B2B Collaboration.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Robust Scheduling and Runtime Adaptation of Multi-agent Plan Execution.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2008

A QSQL-Based Collaboration Framework to Support Automatic Service Composition and Workflow Execution.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

An Algorithm in SwinDeW-C for Scheduling Transaction-Intensive Cost-Constrained Cloud Workflows.
Proceedings of the Fourth International Conference on e-Science, 2008

Forecasting Duration Intervals of Scientific Workflow Activities Based on Time-Series Patterns.
Proceedings of the Fourth International Conference on e-Science, 2008

A Probabilistic Strategy for Setting Temporal Constraints in Scientific Workflows.
Proceedings of the Business Process Management, 6th International Conference, 2008

Building Quick Service Query List Using Wordnet for Automated Service Composition.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

A QSQL-based Efficient Planning Algorithm for Fully-automated Service Composition in Dynamic Service Environments.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Adaptive selection of necessary and sufficient checkpoints for dynamic verification of temporal constraints in grid workflow systems.
ACM Trans. Auton. Adapt. Syst., 2007

On design, verification, and dynamic modification of the problem-based scientific workflow model.
Simul. Model. Pract. Theory, 2007

Multiple states based temporal consistency for dynamic verification of fixed-time constraints in Grid workflow systems.
Concurr. Comput. Pract. Exp., 2007

Grid-Based Semantic Web Service Discovery Model with QoS Constraints.
Proceedings of the Third International Conference on Semantics, 2007

A Knowledge Map Based Composite Services Model and its Application in WSG-Based Services Discovery.
Proceedings of the Third International Conference on Semantics, 2007

Managing Email Overload with an Automatic Nonparametric Clustering Approach.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

A Job Scheduling Optimization Model based on Time Difference in Service Grid Environments.
Proceedings of the Grid and Cooperative Computing, 2007

Peer-to-Peer Based Grid Workflow Runtime Environment of SwinDeW-G.
Proceedings of the Third International Conference on e-Science and Grid Computing, 2007

Safety Analysis and Performance Evaluation of Time WF-nets.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

A Pre-reasoning Based Method for Service Discovery and Service Instance Selection in Service Grid Environments.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

2006
Dynamic Setting, Verification and Adjustment of Upper Bound Constraints in Grid Workflow Systems.
Proceedings of the 2006 International Conference on Semantics, 2006

Assigning Local Fixed-time Constraints in Grid Workflow Systems.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

Preface.
Proceedings of the Business Process Management Workshops, 2006

Selecting Necessary and Sufficient Checkpoints for Dynamic Verification of Fixed-Time Constraints in Grid Workflow Systems.
Proceedings of the Business Process Management, 4th International Conference, 2006

Key research issues in grid workflow verification and validation.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2005
An Activity Completion Duration based Checkpoint Selection Strategy for Dynamic Verification of Fixed-time Constraints in Grid Workflow Systems.
Proceedings of the NODe 2005, 2005

Flexible Temporal Consistency for Fixed-Time Constraint Verification in Grid Workflow Systems.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Multiple Temporal Consistency States for Dynamical Verification of Upper Bound Constraints in Grid Workflow Systems.
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005

Temporal Dependency for Dynamic Verification of Fixed-Date Constraints in Grid Workflow Systems.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

A Minimum Proportional Time Redundancy based Checkpoint Selection Strategy for Dynamic Verification of Fixed-time Constraints in Grid Workflow Systems.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

2004
Temporal Dependency for Dynamic Verification of Temporal Constraints in Workflow Systems.
Proceedings of the Grid and Cooperative Computing, 2004

Dynamic Verification of Temporal Constraints on-the-fly for Workflow Systems.
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004


  Loading...