


default search action
ACM Transactions on Internet Technology, Volume 23
Volume 23, Number 1, February 2023
- Pankaj Mishra

, Ahmed Moustafa
, Takayuki Ito
:
Real-time Pricing-based Resource Allocation in Open Market Environments. 1:1-1:22 - Jianwei Hao

, Piyush Subedi
, Lakshmish Ramaswamy
, In Kee Kim
:
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy. 2:1-2:33 - Rongjunchen Zhang

, Tingmin Wu
, Sheng Wen
, Surya Nepal
, Cécile Paris, Yang Xiang
:
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching. 3:1-3:18 - Sharon Hirsch

, Slava Novgorodov
, Ido Guy
, Alexander Nus
:
The Tip of the Buyer: Extracting Product Tips from Reviews. 4:1-4:30 - Carlos Javier Hernández-Castro

, David F. Barrero
, María Dolores Rodríguez-Moreno
:
Breaking CaptchaStar Using the BASECASS Methodology. 5:1-5:12 - Luigi Asprino

, Enrico Daga
, Aldo Gangemi
, Paul Mulholland
:
Knowledge Graph Construction with a Façade: A Unified Method to Access Heterogeneous Data Sources on the Web. 6:1-6:31 - Weiwei Fang

, Wenyuan Xu
, Chongchong Yu
, Neal N. Xiong
:
Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters. 7:1-7:21 - Iulia Paun

, Yashar Moshfeghi
, Nikos Ntarmos
:
White Box: On the Prediction of Collaborative Filtering Recommendation Systems' Performance. 8:1-8:29 - Yuanjun Dai

, An Wang
, Yang Guo
, Songqing Chen
:
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks. 9:1-9:25 - Feijie Wu

, Ho Yin Yuen
, Henry C. B. Chan
, Victor C. M. Leung
, Wei Cai
:
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies. 10:1-10:26 - Massimo La Morgia

, Alessandro Mei
, Francesco Sassi
, Julinda Stefa
:
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations. 11:1-11:28 - Man Zeng

, Dandan Li
, Pei Zhang
, Kun Xie
, Xiaohong Huang
:
Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee. 12:1-12:22 - Gonul Ayci

, Murat Sensoy
, Arzucan Özgür
, Pinar Yolum
:
Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions. 13:1-13:24 - Andrea De Salve

, Luca Franceschi
, Andrea Lisi
, Paolo Mori
, Laura Ricci
:
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation. 14:1-14:30 - Wenzhao Zhang

, Yuxuan Zhang
, Hongchang Fan
, Yi Gao
, Wei Dong
:
A Low-code Development Framework for Cloud-native Edge Systems. 15:1-15:22 - Gregorius Satia Budhi

, Raymond Chiong
:
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction. 16:1-16:24 - Chong Zhang

, Qiang Guo
, Luoyi Fu
, Jiaxin Ding
, Xinde Cao
, Fei Long
, Xinbing Wang
, Chenghu Zhou
:
Finding the Source in Networks: An Approach Based on Structural Entropy. 17:1-17:25 - Habib Mostafaei

, Shafi Afridi
:
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics. 18:1-18:21 - Martino Trevisan

, Francesca Soro
, Marco Mellia
, Idilio Drago
, Ricardo Morla
:
Attacking DoH and ECH: Does Server Name Encryption Protect Users' Privacy? 19:1-19:22 - Sidharth Sharma

, Aniruddha Kushwaha
, Mohammad Alizadeh
, George Varghese
, Ashwin Gumaste
:
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency. 20:1-20:26 - Bolin Zhang

, Zhiying Tu
, Shaoshi Hang
, Dianhui Chu
, Xiaofei Xu
:
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot. 21:1-21:24 - Romain Fouquet, Pierre Laperdrix, Romain Rouvoy:

Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript. 22:1-22:28 - Yu-Jhen Wang

, Anthony J. T. Lee
:
Movie Account Recommendation on Instagram. 23:1-23:21
Volume 23, Number 2, May 2023
- Quan Z. Sheng

, Arun Kumar Sangaiah
, Ankit Chaudhary
:
Guest Editors' Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services. 24:1-24:3 - Mu-Yen Chen

, Yi-Wei Lai
, Jiunn-Woei Lian
:
Using Deep Learning Models to Detect Fake News about COVID-19. 25:1-25:23 - Yucheng Dong

, Qin Ran
, Xiangrui Chao
, Congcong Li
, Shui Yu
:
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process. 26:1-26:27 - Yazhou Zhang

, Dan Ma
, Prayag Tiwari
, Chen Zhang
, Mehedi Masud
, Mohammad Shorfuzzaman
, Dawei Song
:
Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks. 27:1-27:21 - Yi-Bing Lin

, Yuan-Fu Liao
, Sin-Horng Chen
, Shaw-Hwa Hwang
, Yih-Ru Wang
:
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English. 28:1-28:30 - Pedro Victor Borges

, Chantal Taconet
, Sophie Chabridon
, Denis Conan
, Everton Cavalcante
, Thaís Batista
:
Taming Internet of Things Application Development with the IoTvar Middleware. 29:1-29:21 - Hucheng Wang

, Zhi Wang
, Lei Zhang
, Xiaonan Luo
, Xinheng Wang
:
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment. 30:1-30:19 - Arvind Kumar Gangwar

, Sandeep Kumar
:
Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift. 31:1-31:28 - Jing Chen

, Wenjun Jiang
, Jie Wu
, Kenli Li
, Keqin Li
:
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts. 32:1-32:28 - Luca Muscariello

, Michele Papalini
, Olivier Roques
, Mauro Sardara
, Arthur Tran Van
:
Securing Scalable Real-time Multiparty Communications with Hybrid Information-centric Networking. 33:1-33:20 - Yibin Xu

, Jianhua Shao
, Tijs Slaats
, Boris Düdder
:
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding. 34:1-34:27 - Li Yang

, Xi Li
, Zhuoru Ma
, Lu Li
, Neal N. Xiong
, Jianfeng Ma
:
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios. 35:1-35:29
Volume 23, Number 3, August 2023
- Shancang Li, Surya Nepal, Theo Tryfonas, Hongwei Li:

Blockchain-based Zero Trust Cybersecurity in the Internet of Things. 36:1-36:3 - Ying Li

, Yaxin Yu, Xingwei Wang:
Three-tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy. 37:1-37:28 - Keke Gai

, Yufeng She
, Liehuang Zhu
, Kim-Kwang Raymond Choo
, Zhiguo Wan
:
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing. 38:1-38:25 - Mohammad Wazid, Prosanta Gope:

BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications. 39:1-39:28 - Fuchen Ma

, Meng Ren
, Ying Fu
, Wanting Sun
, Houbing Song
, Heyuan Shi
, Yu Jiang
, Huizhong Li
:
V-Gas: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability. 40:1-40:22 - Zhenyu Li

, Yong Ding
, Honghao Gao, Bo Qu, Yujue Wang, Jun Li:
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network. 41:1-41:23 - Jin Wang, Jiahao Chen, Neal Xiong, Osama Alfarraj, Amr Tolba

, Yongjun Ren:
S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT. 42:1-42:23 - Amjad Alsirhani

, Muhammad Ali Khan
, Abdullah Alomari
, Sauda Maryam, Aiman Younas
, Muddesar Iqbal
, Muhammad Hameed Siqqidi, Amjad Ali:
Securing Low-Power Blockchain-enabled IoT Devices against Energy Depletion Attack. 43:1-43:17 - Fan Wang

, Guangshun Li, Yilei Wang, Wajid Rafique
, Mohammad Reza Khosravi, Guanfeng Liu, Yuwen Liu
, Lianyong Qi:
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City. 44:1-44:19
- Luca Gioacchini

, Luca Vassio
, Marco Mellia
, Idilio Drago
, Zied Ben-Houidi
, Dario Rossi
:
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis. 45:1-45:28 - Mohammed Bahutair

, Athman Bouguettaya
:
An End-to-end Trust Management Framework for Crowdsourced IoT Services. 46:1-46:32 - Keke Chen

, Yuechun Gu
, Sagar Sharma
:
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds. 47:1-47:26 - Hossein Chegini

, Fernando Beltrán
, Aniket Mahanti
:
Designing and Developing a Weed Detection Model for California Thistle. 48:1-48:29
Volume 23, Number 4, November 2023
- Gautam Srivastava, Jerry Chun-Wei Lin

, Calton Pu, Yudong Zhang:
Special Section on "Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions". 49:1-49:4 - Xiuwen Fu

, Pasquale Pace
, Gianluca Aloi
, Antonio Guerrieri
, Wenfeng Li
, Giancarlo Fortino
:
Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures. 50:1-50:23 - Yirui Wu

, Hao Cao
, Guoqiang Yang
, Tong Lu
, Shaohua Wan
:
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems. 51:1-51:20 - Lizhen Deng

, Guoxia Xu
, Jiaqi Pi
, Hu Zhu
, Xiaokang Zhou
:
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution. 52:1-52:18 - Jan Pennekamp

, Markus Dahlmanns
, Frederik Fuhrmann
, Timo Heutmann
, Alexander Kreppein
, Dennis Grunert
, Christoph Lange
, Robert H. Schmitt
, Klaus Wehrle
:
Offering Two-way Privacy for Evolved Purchase Inquiries. 53:1-53:32 - Usman Ahmed

, Jerry Chun-Wei Lin
, Gautam Srivastava
:
Exploring the Potential of Cyber Manufacturing System in the Digital Age. 54:1-54:38
- Pei-Cheng Song

, Jeng-Shyang Pan
, Han-Chieh Chao
, Shu-Chuan Chu
:
Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City. 55:1-55:15 - Wenzhao Zhang

, Yi Gao
, Wei Dong
:
Providing Realtime Support for Containerized Edge Services. 56:1-56:25 - Loredana Caruccio

, Gaetano Cimino
, Stefano Cirillo
, Domenico Desiato
, Giuseppe Polese
, Genoveffa Tortora
:
Malicious Account Identification in Social Network Platforms. 57:1-57:25 - Fanyi Yang

, Huifang Ma
, Cairui Yan
, Zhixin Li
, Liang Chang:
Polarized Communities Search via Co-guided Random Walk in Attributed Signed Networks. 58:1-58:22 - Wenhua Xiao

, Xudong Fang
, Bixin Liu
, Ji Wang
, Xiaomin Zhu
:
UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud. 59:1-59:27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














