default search action
ACM Transactions on Internet Technology, Volume 23
Volume 23, Number 1, February 2023
- Pankaj Mishra, Ahmed Moustafa, Takayuki Ito:
Real-time Pricing-based Resource Allocation in Open Market Environments. 1:1-1:22 - Jianwei Hao, Piyush Subedi, Lakshmish Ramaswamy, In Kee Kim:
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy. 2:1-2:33 - Rongjunchen Zhang, Tingmin Wu, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching. 3:1-3:18 - Sharon Hirsch, Slava Novgorodov, Ido Guy, Alexander Nus:
The Tip of the Buyer: Extracting Product Tips from Reviews. 4:1-4:30 - Carlos Javier Hernández-Castro, David F. Barrero, María Dolores Rodríguez-Moreno:
Breaking CaptchaStar Using the BASECASS Methodology. 5:1-5:12 - Luigi Asprino, Enrico Daga, Aldo Gangemi, Paul Mulholland:
Knowledge Graph Construction with a Façade: A Unified Method to Access Heterogeneous Data Sources on the Web. 6:1-6:31 - Weiwei Fang, Wenyuan Xu, Chongchong Yu, Neal N. Xiong:
Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters. 7:1-7:21 - Iulia Paun, Yashar Moshfeghi, Nikos Ntarmos:
White Box: On the Prediction of Collaborative Filtering Recommendation Systems' Performance. 8:1-8:29 - Yuanjun Dai, An Wang, Yang Guo, Songqing Chen:
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks. 9:1-9:25 - Feijie Wu, Ho Yin Yuen, Henry C. B. Chan, Victor C. M. Leung, Wei Cai:
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies. 10:1-10:26 - Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa:
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations. 11:1-11:28 - Man Zeng, Dandan Li, Pei Zhang, Kun Xie, Xiaohong Huang:
Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee. 12:1-12:22 - Gonul Ayci, Murat Sensoy, Arzucan Özgür, Pinar Yolum:
Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions. 13:1-13:24 - Andrea De Salve, Luca Franceschi, Andrea Lisi, Paolo Mori, Laura Ricci:
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation. 14:1-14:30 - Wenzhao Zhang, Yuxuan Zhang, Hongchang Fan, Yi Gao, Wei Dong:
A Low-code Development Framework for Cloud-native Edge Systems. 15:1-15:22 - Gregorius Satia Budhi, Raymond Chiong:
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction. 16:1-16:24 - Chong Zhang, Qiang Guo, Luoyi Fu, Jiaxin Ding, Xinde Cao, Fei Long, Xinbing Wang, Chenghu Zhou:
Finding the Source in Networks: An Approach Based on Structural Entropy. 17:1-17:25 - Habib Mostafaei, Shafi Afridi:
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics. 18:1-18:21 - Martino Trevisan, Francesca Soro, Marco Mellia, Idilio Drago, Ricardo Morla:
Attacking DoH and ECH: Does Server Name Encryption Protect Users' Privacy? 19:1-19:22 - Sidharth Sharma, Aniruddha Kushwaha, Mohammad Alizadeh, George Varghese, Ashwin Gumaste:
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency. 20:1-20:26 - Bolin Zhang, Zhiying Tu, Shaoshi Hang, Dianhui Chu, Xiaofei Xu:
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot. 21:1-21:24 - Romain Fouquet, Pierre Laperdrix, Romain Rouvoy:
Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript. 22:1-22:28 - Yu-Jhen Wang, Anthony J. T. Lee:
Movie Account Recommendation on Instagram. 23:1-23:21
Volume 23, Number 2, May 2023
- Quan Z. Sheng, Arun Kumar Sangaiah, Ankit Chaudhary:
Guest Editors' Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services. 24:1-24:3 - Mu-Yen Chen, Yi-Wei Lai, Jiunn-Woei Lian:
Using Deep Learning Models to Detect Fake News about COVID-19. 25:1-25:23 - Yucheng Dong, Qin Ran, Xiangrui Chao, Congcong Li, Shui Yu:
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process. 26:1-26:27 - Yazhou Zhang, Dan Ma, Prayag Tiwari, Chen Zhang, Mehedi Masud, Mohammad Shorfuzzaman, Dawei Song:
Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks. 27:1-27:21 - Yi-Bing Lin, Yuan-Fu Liao, Sin-Horng Chen, Shaw-Hwa Hwang, Yih-Ru Wang:
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English. 28:1-28:30 - Pedro Victor Borges, Chantal Taconet, Sophie Chabridon, Denis Conan, Everton Cavalcante, Thaís Batista:
Taming Internet of Things Application Development with the IoTvar Middleware. 29:1-29:21 - Hucheng Wang, Zhi Wang, Lei Zhang, Xiaonan Luo, Xinheng Wang:
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment. 30:1-30:19 - Arvind Kumar Gangwar, Sandeep Kumar:
Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift. 31:1-31:28 - Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li:
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts. 32:1-32:28 - Luca Muscariello, Michele Papalini, Olivier Roques, Mauro Sardara, Arthur Tran Van:
Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking. 33:1-33:20 - Yibin Xu, Jianhua Shao, Tijs Slaats, Boris Düdder:
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding. 34:1-34:27 - Li Yang, Xi Li, Zhuoru Ma, Lu Li, Neal N. Xiong, Jianfeng Ma:
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios. 35:1-35:29
Volume 23, Number 3, August 2023
- Shancang Li, Surya Nepal, Theo Tryfonas, Hongwei Li:
Blockchain-based Zero Trust Cybersecurity in the Internet of Things. 36:1-36:3 - Ying Li, Yaxin Yu, Xingwei Wang:
Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy. 37:1-37:28 - Keke Gai, Yufeng She, Liehuang Zhu, Kim-Kwang Raymond Choo, Zhiguo Wan:
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing. 38:1-38:25 - Mohammad Wazid, Prosanta Gope:
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications. 39:1-39:28 - Fuchen Ma, Meng Ren, Fu Ying, Wanting Sun, Houbing Song, Heyuan Shi, Yu Jiang, Huizhong Li:
V-Gas: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability. 40:1-40:22 - Zhenyu Li, Yong Ding, Honghao Gao, Bo Qu, Yujue Wang, Jun Li:
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network. 41:1-41:23 - Jin Wang, Jiahao Chen, Neal Xiong, Osama Alfarraj, Amr Tolba, Yongjun Ren:
S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT. 42:1-42:23 - Amjad Alsirhani, Muhammad Ali Khan, Abdullah Alomari, Sauda Maryam, Aiman Younas, Muddesar Iqbal, Muhammad Hameed Siqqidi, Amjad Ali:
Securing Low-Power Blockchain-enabled IoT Devices against Energy Depletion Attack. 43:1-43:17 - Fan Wang, Guangshun Li, Yilei Wang, Wajid Rafique, Mohammad Reza Khosravi, Guanfeng Liu, Yuwen Liu, Lianyong Qi:
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City. 44:1-44:19
- Luca Gioacchini, Luca Vassio, Marco Mellia, Idilio Drago, Zied Ben-Houidi, Dario Rossi:
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis. 45:1-45:28 - Mohammed Bahutair, Athman Bouguettaya:
An End-to-end Trust Management Framework for Crowdsourced IoT Services. 46:1-46:32 - Keke Chen, Yuechun Gu, Sagar Sharma:
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds. 47:1-47:26 - Hossein Chegini, Fernando Beltrán, Aniket Mahanti:
Designing and Developing a Weed Detection Model for California Thistle. 48:1-48:29
Volume 23, Number 4, November 2023
- Gautam Srivastava, Jerry Chun-Wei Lin, Calton Pu, Yudong Zhang:
Special Section on "Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions". 49:1-49:4 - Xiuwen Fu, Pasquale Pace, Gianluca Aloi, Antonio Guerrieri, Wenfeng Li, Giancarlo Fortino:
Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures. 50:1-50:23 - Yirui Wu, Hao Cao, Guoqiang Yang, Tong Lu, Shaohua Wan:
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems. 51:1-51:20 - Lizhen Deng, Guoxia Xu, Jiaqi Pi, Hu Zhu, Xiaokang Zhou:
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution. 52:1-52:18 - Jan Pennekamp, Markus Dahlmanns, Frederik Fuhrmann, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, Klaus Wehrle:
Offering Two-way Privacy for Evolved Purchase Inquiries. 53:1-53:32 - Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava:
Exploring the Potential of Cyber Manufacturing System in the Digital Age. 54:1-54:38
- Pei-Cheng Song, Jeng-Shyang Pan, Han-Chieh Chao, Shu-Chuan Chu:
Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City. 55:1-55:15 - Wenzhao Zhang, Yi Gao, Wei Dong:
Providing Realtime Support for Containerized Edge Services. 56:1-56:25 - Loredana Caruccio, Gaetano Cimino, Stefano Cirillo, Domenico Desiato, Giuseppe Polese, Genoveffa Tortora:
Malicious Account Identification in Social Network Platforms. 57:1-57:25 - Fanyi Yang, Huifang Ma, Cairui Yan, Zhixin Li, Liang Chang:
Polarized Communities Search via Co-guided Random Walk in Attributed Signed Networks. 58:1-58:22 - Wenhua Xiao, Xudong Fang, Bixin Liu, Ji Wang, Xiaomin Zhu:
UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud. 59:1-59:27
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.