[1]
V. V. Mišić and G. Perakis, Data analytics in operations management: A review, Manuf. Serv. Oper. Manag., vol. 22, no. 1, pp. 158–169, 2020.
[2]
X. Zhou, W. Liang, K. Yan, W. Li, K. I. K. Wang, J. Ma, and Q. Jin, Edge-enabled two-stage scheduling based on deep reinforcement learning for Internet of everything, IEEE Internet Things J., vol. 10, no. 4, pp. 3295–3304, 2022.
[3]
X. Zhou, Y. Hu, J. Wu, W. Liang, J. Ma, and Q. Jin, Distribution bias aware collaborative generative adversarial network for imbalanced deep learning in industrial IoT, IEEE Trans. Ind. Inform., vol. 19, no. 1, pp. 570–580, 2022.
[4]
M. R. Llave, Business intelligence and analytics in small and medium-sized enterprises: A systematic literature review, Procedia Comput. Sci., vol. 121, pp. 194–205, 2017.
[5]
X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu, and K. I. K. Wang, Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system, IEEE Internet Things J., vol. 9, no. 12, pp. 9310–9319, 2021.
[6]
X. Zhou, X. Xu, W. Liang, Z. Zeng, and Z. Yan, Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT, IEEE Internet Things J., vol. 8, no. 16, pp. 12588–12596, 2021.
[7]
X. Zhou, W. Liang, K. I. K. Wang, and L. T. Yang, Deep correlation mining based on hierarchical hybrid networks for heterogeneous big data recommendations, IEEE Trans. Comput. Soc. Syst., vol. 8, no. 1, pp. 171–178, 2021.
[8]
M. I. Jordan and T. M. Mitchell, Machine learning: Trends, perspectives, and prospects, Science, vol. 349, no. 6245, pp. 255–260, 2015.
[9]
L. Qi, Y. Yang, X. Zhou, W. Rafique, and J. Ma, Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0, IEEE Trans. Ind. Inform., vol. 18, no. 9, pp. 6503–6511, 2022.
[10]
H. J. Ye, X. Yang, X. Wang, and T. C. Stratopoulos, Monetization of digital content: Drivers of revenue on Q&A platforms, J. Manag. Inf. Syst., vol. 38, no. 2, pp. 457–483, 2021.
[11]
F. Wang, H. Zhu, G. Srivastava, S. Li, M. R. Khosravi, and L. Qi, Robust collaborative filtering recommendation with user-item-trust records, IEEE Trans. Comput. Soc. Syst., vol. 9, no. 4, pp. 986–996, 2022.
[12]
F. Wang, L. Wang, G. Li, Y. Wang, C. Lv, and L. Qi, Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation, World Wide Web, vol. 25, no. 5, pp. 1809–1829, 2022.
[13]
J. Liu, C. Wu, Y. Xiong, and W. Liu, List-wise probabilistic matrix factorization for recommendation, Inf. Sci., vol. 278, pp. 434–447, 2014.
[14]
R. Salakhutdinov and A. Mnih, Probabilistic Matrix Factorization, in Proc. 20th Int Conf. on Neural Information Processing Systems, Red Hook, NY, USA, 2007, pp. 1257–1264.
[15]
Z. Cui, P. Zhao, Z. Hu, X. Cai, W. Zhang, and J. Chen, An improved matrix factorization based model for many-objective optimization recommendation, Inf. Sci., vol. 579, pp. 1–14, 2021.
[16]
W. C. Kang and J. McAuley, Self-attentive sequential recommendation, in Proc. 2018 IEEE Int. Conf. Data Mining, Singapore, Singapore, 2018, pp. 197–206.
[17]
R. He and J. McAuley, Fusing similarity models with Markov chains for sparse sequential recommendation, in Proc. 2016 IEEE 16th Int. Conf. Data Mining, Barcelona, Spain, 2017, pp. 191–200.
[18]
F. Xie, Z. Chen, H. Xu, X. Feng, and Q. Hou, TST: Threshold based similarity transitivity method in collaborative filtering with cloud computing, Tsinghua Science and Technology, vol. 18, no. 3, pp. 318–327, 2013.
[19]
B. Hidasi, A. Karatzoglou, L. Baltrunas, and D. Tikk, Session-based recommendations with recurrent neural networks, arXiv preprint arXiv: 1511.06939, 2015.
[20]
X. Chen, H. Xu, Y. Zhang, J. Tang, Y. Cao, Z. Qin, and H. Zha, Sequential recommendation with user memory networks, in Proc. Eleventh ACM Int. Conf. Web Search and Data Mining, Marina Del Rey, CA, USA, 2018, pp. 108–116.
[21]
L. Kong, G. Li, W. Rafique, S. Shen, Q. He, M. R. Khosravi, R. Wang, and L. Qi, Time-aware missing healthcare data prediction based on ARIMA model, IEEE/ACM Trans. Comput. Biol. Bioinform., 2022.
[22]
J. Zhang, Y. Wang, Z. Yuan, and Q. Jin, Personalized real-time movie recommendation system: Practical prototype and evaluation, Tsinghua Science and Technology, vol. 25, no. 2, pp. 180–191, 2019.
[23]
X. Ye and D. Liu, A cost-sensitive temporal-spatial three-way recommendation with multi-granularity decision, Inf. Sci., vol. 589, pp. 670–689, 2022.
[24]
S. Xu, H. Zhuang, F. Sun, S. Wang, T. Wu, and J. Dong, Recommendation algorithm of probabilistic matrix factorization based on directed trust, Comput. Electr. Eng., vol. 93, p. 107206, 2021.
[25]
T. X. Tuan and T. M. Phuong, 3D convolutional networks for session-based recommendation with content features, in Proc. Eleventh ACM Conf. Recommender Systems, Como, Italy, 2017, pp. 138–146.
[26]
J. You, Y. Wang, A. Pal, P. Eksombatchai, C. Rosenburg, and J. Leskovec, Hierarchical temporal convolutional networks for dynamic recommender systems, in Proc. World Wide Web Conf., New York, NY, USA, 2019, pp. 2236–2246.
[27]
Z. Yin and Y. Shen, On the dimensionality of word embedding, in Proc. 32th Int. Conf. on Neural Information Processing Systems, Red Hook, NY, USA, 2018, pp. 895–906. .
[28]
S. Wu, S. Shen, X. Xu, Y. Chen, X. Zhou, D. Liu, X. Xue, and L. Qi, Popularity-aware and diverse web APIs recommendation based on correlation graph, IEEE Trans. Comput. Soc. Syst., vol. 10, no. 2, pp. 771–782, 2023.
[29]
Y. Xu, Z. Feng, X. Xue, S. Chen, H. Wu, X. Zhou, M. Xing, and H. Chen, MemTrust: find deep trust in your mind, in Proc. 2021 IEEE Int. Conf. Web Services, Chicago, IL, USA, 2021, pp. 598–607.
[30]
J. C. W. Lin, Y. Shao, Y. Djenouri, and U. Yun, ASRNN: A recurrent neural network with an attention model for sequence labeling, Knowl. Based Syst., vol. 212, p. 106548, 2021.
[31]
H. Dai, J. Yu, M. Li, W. Wang, A. X. Liu, J. Ma, L. Qi, and G. Chen, Bloom filter with noisy coding framework for multi-set membership testing, IEEE Trans. Knowl. Data Eng., 2022.
[32]
S. Cheng, Y. Wu, Y. Li, F. Yao, and F. Min, TWD-SFNN: Three-way decisions with a single hidden layer feedforward neural network, Inf. Sci., vol. 579, pp. 15–32, 2021.
[33]
Y. Jin, W. Guo, and Y. Zhang, A time-aware dynamic service quality prediction approach for services, Tsinghua Science and Technology, vol. 25, no. 2, pp. 227–238, 2019.
[34]
Y. Yang, X. Yang, M. Heidari, M. A. Khan, G. Srivastava, M. Khosravi, and L. Qi, ASTREAM: data-stream-driven scalable anomaly detection with accuracy guarantee in IIoT environment, IEEE Trans. Netw. Sci. Eng., 2022.
[35]
C. Huang, Q. Zhang, D. Guo, X. Zhao, and X. Wang, Discovering association rules with graph patterns in temporal networks, Tsinghua Science and Technology, vol. 28, no. 2, pp. 344–359, 2022.
[36]
X. Xu, T. Gao, Y. Wang, and X. Xuan, Event temporal relation extraction with attention mechanism and graph neural network, Tsinghua Science and Technology, vol. 27, no. 1, pp. 79–90, 2021.
[37]
Y. Zhang, C. Yin, Z. Lu, D. Yan, M. Qiu, and Q. Tang, Recurrent Tensor Factorization for time-aware service recommendation, Appl. Soft Comput., vol. 85, p. 105762, 2019.
[38]
M. Ayub, M. Ali Ghazanfar, M. Maqsood, and A. Saleem, A Jaccard base similarity measure to improve performance of CF based recommender systems, in Proc. 2018 Int. Conf. Information Networking, Chiang Mai, Thailand, 2018, pp. 1–6.
[39]
E. B. Barker and J. Kelsey, Recommendation for random bit generator (RBG) constructions, Gaithersburg, MD, USA: NIST, 2012.
[40]
D. Ma, Y. Wang, J. Ma, and Q. Jin, SGNR: A social graph neural network based interactive recommendation scheme for E-commerce, Tsinghua Science and Technology, vol. 28, no. 4, pp. 786–798, 2023.
[41]
L. Qi, W. Lin, X. Zhang, W. Dou, X. Xu, and J. Chen, A correlation graph based approach for personalized and compatible web APIs recommendation in mobile APP development, IEEE Trans. Knowl. Data Eng., vol. 35, no. 6, pp. 5444–5457, 2023.
[42]
L. Zhang, C. Xu, Y. Gao, Y. Han, X. Du, and Z. Tian, Improved Dota2 lineup recommendation model based on a bidirectional LSTM, Tsinghua Science and Technology, vol. 25, no. 6, pp. 712–720, 2020.
[43]
M. Jamali and M. Ester, TrustWalker: a random walk model for combining trust-based and item-based recommendation, in Proc. 15th ACM SIGKDD Int. Conf. Knowledge discovery and data mining, Paris, France, 2009, pp. 397–406.
[44]
C. Yan, Y. Zhang, W. Zhong, C. Zhang, and B. Xin, A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing, Tsinghua Science and Technology, vol. 27, no. 2, pp. 315–324, 2021.
[45]
H. Dai, Y. Xu, G. Chen, W. Dou, C. Tian, X. Wu, and T. He, ROSE: robustly safe charging for wireless power transfer, IEEE Trans. Mob. Comput., vol. 21, no. 6, pp. 2180–2197, 2022.
[46]
R. Gu, Y. Chen, S. Liu, H. Dai, G. Chen, K. Zhang, Y. Che, and Y. Huang, Liquid: Intelligent resource estimation and network-efficient scheduling for deep learning jobs on distributed GPU clusters, IEEE Trans. Parallel Distributed Syst., vol. 33, no. 11, pp. 2808–2820, 2022.
[47]
H. Dai, X. Wang, X. Lin, R. Gu, S. Shi, Y. Liu, W. Dou, and G. Chen, Placing wireless chargers with limited mobility, IEEE Trans. Mob. Comput., vol. 22, no. 6, pp. 3589-3603, 2023.
[48]
R. Gu, K. Zhang, Z. Xu, Y. Che, B. Fan, H. Hou, H. Dai, L. Yi, Y. Ding, G. Chen et al., Fluid: Dataset abstraction and elastic acceleration for cloud-native deep learning training jobs, in Proc. 2022 IEEE 38th Int. Conf. Data Engineering, Kuala Lumpur, Malaysia, 2022, pp. 2182–2195.
[49]
Y. Li, J. Liu, B. Cao, and C. Wang, Joint optimization of radio and virtual machine resources with uncertain user demands in mobile cloud computing, IEEE Trans. Multimed., vol. 20, no. 9, pp. 2427–2438, 2018.
[50]
Y. Li, C. Liao, Y. Wang, and C. Wang, Energy-efficient optimal relay selection in cooperative cellular networks based on double auction, IEEE Trans. Wirel. Commun., vol. 14, no. 8, pp. 4093–4104, 2015.
[51]
Y. Li, S. Xia, M. Zheng, B. Cao, and Q. Liu, Lyapunov optimization-based trade-off policy for mobile cloud offloading in heterogeneous wireless networks, IEEE Trans. Cloud Comput., vol. 10, no. 1, pp. 491–505, 2022.
[52]
D. Zhou, X. Xue, and Z. Zhou, SLE2: the improved social learning evolution model of cloud manufacturing service ecosystem, IEEE Trans. Ind. Inform., vol. 18, no. 12, pp. 9017–9026, 2022.
[53]
X. Xue, S. Wang, L. Zhang, Z. Feng, and Y. Guo, Social learning evolution (SLE): Computational experiment-based modeling framework of social manufacturing, IEEE Trans. Ind. Inform., vol. 15, no. 6, pp. 3343–3355, 2019.
[54]
X. Xue, G. D. Li, D. Y. Zhou, Y. P. Zhang, L. Zhang, Y. Zhao, Z. Y. Feng, L. Z. Cui, Z. B. Zhou, X. Sun, X. D. Lu, and S. Z. Chen, The Research Roadmap of Service Ecosystem: A Crowd Intelligence Perspective, International Journal of Crowd Science, vol. 6, no. 4, pp. 195–222, 2022.
[55]
Z. Xie, Y. Huang, D. Yu, R. M. Parizi, Y. Zheng, and J. Pang, FedEE: A federated graph learning solution for extended enterprise collaboration, IEEE Trans. Ind. Inform., 2022.
[56]
D. Yu, Z. Zou, S. Chen, Y. Tao, B. Tian, W. Lv, and X. Cheng, Decentralized parallel SGD with privacy preservation in vehicular networks, IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 5211–5220, 2021.
[57]
L. Yang, Y. Zou, M. Xu, Y. Xu, D. Yu, and X. Cheng, Distributed consensus for blockchains in internet-of-things networks, Tsinghua Science and Technology, vol. 27, no. 5, pp. 817–831, 2022.
[58]
D. Yu, D. Wang, Q. Luo, Y. Zheng, G. Wang, and Z. Cai, Stable structural clustering in uncertain graphs, Inf. Sci., vol. 586, pp. 596–610, 2022.
[59]
Q. Luo, D. X. Yu, Z. P. Cai, X. M. Lin, G. H. Wang, X. Z. Cheng, Towards Maintenance of k-Hypercores in Large-Scale Dynamic Hypergraphs, VLDB, vol. 32, no. 3, pp. 647–664. 2023.
[60]
W. Wang, Y. Wang, P. Duan, T. Liu, X. Tong, and Z. Cai, A Triple Real-time Trajectory Privacy Protection mechanism Based on Edge computing and Blockchain in Mobile Crowdsourcing, IEEE Trans. Mob. Comput., 2022.
[61]
Q. Zhang, Y. Wang, G. Yin, X. Tong, A. M. V. V. Sai, and Z. Cai, Two-stage bilateral online priority assignment in spatio-temporal crowdsourcing, IEEE Trans. Serv. Comput., 2022.
[62]
Y. Xu, Z. Liu, C. Zhang, J. Ren, Y. Zhang, and X. Shen, Blockchain-based Trustworthy Energy Dispatching Approach for High Renewable Energy Penetrated Power Systems, IEEE Internet Things J., vol. 9, no. 12, pp. 10036–10047, 2022.
[63]
Y. Xu, C. Zhang, G. Wang, Z. Qin, and Q. Zeng, A blockchain-enabled deduplicatable data auditing mechanism for network storage services, IEEE Trans. Emerg. Top. Comput., vol. 9, no. 3, pp. 1421–1432, 2021.
[64]
C. Zhang, Y. Xu, Y. Hu, J. Wu, J. Ren, and Y. Zhang, A blockchain-based multi-cloud storage data auditing scheme to locate faults, IEEE Trans. Cloud Comput., vol. 10, no. 4, pp. 2252–2263, 2022.
[65]
Y. Xu, J. Ren, Y. Zhang, C. Zhang, B. Shen, and Y. Zhang, Blockchain empowered arbitrable data auditing scheme for network storage as a service, IEEE Trans. Serv. Comput., vol. 13, no. 2, pp. 289–300, 2020.