Search Results - "Zhang, Xuyun"
-
1
A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data
Published in IEEE journal on selected areas in communications (01-11-2017)“…To maximize the economic benefits, a cloud service provider needs to recommend its services to as many users as possible based on the historical user-service…”
Get full text
Journal Article -
2
Using bimetallic Au@Pt nanozymes as a visual tag and as an enzyme mimic in enhanced sensitive lateral-flow immunoassays: Application for the detection of streptomycin
Published in Analytica chimica acta (22-08-2020)“…Because of the advantages of simplicity, cost-effectiveness and visibility, lateral-flow immunoassays (LFAs) have been widely used in the food safety field…”
Get full text
Journal Article -
3
A computation offloading method over big data for IoT-enabled cloud-edge computing
Published in Future generation computer systems (01-06-2019)“…The Internet of mobile things is a burgeoning technique that generates, stores and processes big real-time data to render rich services for mobile users. In…”
Get full text
Journal Article -
4
A Game-Theoretical Approach for User Allocation in Edge Computing Environment
Published in IEEE transactions on parallel and distributed systems (01-03-2020)“…Edge Computing provides mobile and Internet-of-Things (IoT) app vendors with a new distributed computing paradigm which allows an app vendor to deploy its app…”
Get full text
Journal Article -
5
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
Published in IEEE transactions on parallel and distributed systems (01-02-2014)“…A large number of cloud services require users to share private data like electronic health records for data analysis or mining, bringing privacy concerns…”
Get full text
Journal Article -
6
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems
Published in World wide web (Bussum) (01-03-2020)“…Nowadays, with the development of cyber-physical systems (CPS), there are an increasing amount of applications deployed in the CPS to connect cyber space with…”
Get full text
Journal Article -
7
External integrity verification for outsourced big data in cloud and IoT: A big picture
Published in Future generation computer systems (01-08-2015)“…As cloud computing is being widely adopted for big data processing, data security is becoming one of the major concerns of data owners. Data integrity is an…”
Get full text
Journal Article -
8
KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data Applications
Published in IEEE transactions on parallel and distributed systems (01-12-2014)“…Service recommender systems have been shown as valuable tools for providing appropriate recommendations to users. In the last decade, the amount of customers,…”
Get full text
Journal Article -
9
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
Published in IEEE transactions on computers (01-09-2015)“…Cloud computing that provides elastic computing and storage resource on demand has become increasingly important due to the emergence of "big data". Cloud…”
Get full text
Journal Article -
10
HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications
Published in IEEE transactions on parallel and distributed systems (01-02-2015)“…Cloud computing promises a scalable infrastructure for processing big data applications such as medical data analysis. Cross-cloud service composition provides…”
Get full text
Journal Article -
11
An attention‐based category‐aware GRU model for the next POI recommendation
Published in International journal of intelligent systems (01-07-2021)“…With the continuous accumulation of users' check‐in data, we can gradually capture users' behavior patterns and mine users' preferences. Based on this, the…”
Get full text
Journal Article -
12
Fast Memory Efficient Local Outlier Detection in Data Streams
Published in IEEE transactions on knowledge and data engineering (01-12-2016)“…Outlier detection is an important task in data mining, with applications ranging from intrusion detection to human gait analysis. With the growing need to…”
Get full text
Journal Article -
13
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
Published in IEEE transactions on parallel and distributed systems (01-09-2014)“…Cloud computing opens a new era in IT as it can provide various elastic and scalable IT services in a pay-as-you-go fashion, where its users can reduce the…”
Get full text
Journal Article -
14
EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment
Published in IEEE transactions on cloud computing (01-04-2016)“…Scientific workflows are often deployed across multiple cloud computing platforms due to their large-scale characteristic. This can be technically achieved by…”
Get full text
Journal Article -
15
Weighted tensor nuclear norm minimization for tensor completion using tensor-SVD
Published in Pattern recognition letters (01-02-2020)“…•This paper discusses the weighted tensor nuclear norm in the framework of tensor-SVD.•The subgradient of the weighted tensor nuclear norm is studied.•The KKT…”
Get full text
Journal Article -
16
Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing
Published in Multimedia tools and applications (01-04-2020)“…For the issue of users’ sensibility to the QoS (Quality of Service) of multimedia applications, cloudlet has emerged as a novel paradigm which provides closer…”
Get full text
Journal Article -
17
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
Published in IEEE transactions on parallel and distributed systems (01-06-2013)“…Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without…”
Get full text
Journal Article -
18
Point-of-Interest Recommendation with User’s Privacy Preserving in an IoT Environment
Published in Mobile networks and applications (01-12-2021)“…With the popularization of smart devices and the rapid development of Internet of Things (IoT), location-based social networks (LBSNs) are growing rapidly. As…”
Get full text
Journal Article -
19
An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment
Published in Sensors (Basel, Switzerland) (26-06-2018)“…Service recommendation has become an effective way to quickly extract insightful information from massive data. However, in the cloud environment, the quality…”
Get full text
Journal Article -
20
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
Published in IEEE transactions on parallel and distributed systems (01-02-2015)“…Big sensor data is prevalent in both industry and scientific research applications where the data is generated with high volume and velocity it is difficult to…”
Get full text
Journal Article