Pub Date : 2024-11-11DOI: 10.1109/tsc.2024.3495498
Hao Wang, Jun Wang, Chunpeng Ge, Yuhang Li, Lu Zhou, Zhe Liu, Weibin Wu, Mingsheng Cao
{"title":"ADSS: An Available-but-invisible Data Service Scheme for Fine-grained Usage Control","authors":"Hao Wang, Jun Wang, Chunpeng Ge, Yuhang Li, Lu Zhou, Zhe Liu, Weibin Wu, Mingsheng Cao","doi":"10.1109/tsc.2024.3495498","DOIUrl":"https://doi.org/10.1109/tsc.2024.3495498","url":null,"abstract":"","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"71 1","pages":""},"PeriodicalIF":8.1,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-11DOI: 10.1109/tsc.2024.3495495
Daming Zhao, Jiantao Zhou, Jidong Zhai, Keqin Li
{"title":"A Reinforcement Learning based Framework for Holistic Energy Optimization of Sustainable Cloud Data Centers","authors":"Daming Zhao, Jiantao Zhou, Jidong Zhai, Keqin Li","doi":"10.1109/tsc.2024.3495495","DOIUrl":"https://doi.org/10.1109/tsc.2024.3495495","url":null,"abstract":"","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"71 1","pages":""},"PeriodicalIF":8.1,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-11DOI: 10.1109/TSC.2024.3496333
Huijuan Zhu;Mengzhen Xia;Liangmin Wang;Zhicheng Xu;Victor S. Sheng
While the Android platform is gaining explosive popularity, the number of malicious software (malware) is also increasing sharply. Thus, numerous malware detection schemes based on deep learning have been proposed. However, they are usually suffering from the cumbersome models with complex architectures and tremendous parameters. They usually require heavy computation power support, which seriously limit their deployment on actual application environments with limited resources (e.g., mobile edge devices). To surmount this challenge, we propose a novel Knowledge Distillation (KD) structure—Knowledge Search (KS). KS exploits Neural Architecture Search (NAS) to adaptively bridge the capability gap between teacher and student networks in KD by introducing a parallelized student-wise search approach. In addition, we carefully analyze the characteristics of malware and locate three cost-effective types of features closely related to malicious attacks, namely, Application Programming Interfaces (APIs), permissions and vulnerable components, to characterize Android Applications (Apps). Therefore, based on typical samples collected in recent years, we refine features while exploiting the natural relationship between them, and construct corresponding datasets. Massive experiments are conducted to investigate the effectiveness and sustainability of KS on these datasets. Our experimental results show that the proposed method yields an accuracy of 97.89% to detect Android malware, which performs better than state-of-the-art solutions.
{"title":"A Novel Knowledge Search Structure for Android Malware Detection","authors":"Huijuan Zhu;Mengzhen Xia;Liangmin Wang;Zhicheng Xu;Victor S. Sheng","doi":"10.1109/TSC.2024.3496333","DOIUrl":"10.1109/TSC.2024.3496333","url":null,"abstract":"While the Android platform is gaining explosive popularity, the number of malicious software (malware) is also increasing sharply. Thus, numerous malware detection schemes based on deep learning have been proposed. However, they are usually suffering from the cumbersome models with complex architectures and tremendous parameters. They usually require heavy computation power support, which seriously limit their deployment on actual application environments with limited resources (e.g., mobile edge devices). To surmount this challenge, we propose a novel Knowledge Distillation (KD) structure—Knowledge Search (KS). KS exploits Neural Architecture Search (NAS) to adaptively bridge the capability gap between teacher and student networks in KD by introducing a parallelized student-wise search approach. In addition, we carefully analyze the characteristics of malware and locate three cost-effective types of features closely related to malicious attacks, namely, Application Programming Interfaces (APIs), permissions and vulnerable components, to characterize Android Applications (Apps). Therefore, based on typical samples collected in recent years, we refine features while exploiting the natural relationship between them, and construct corresponding datasets. Massive experiments are conducted to investigate the effectiveness and sustainability of KS on these datasets. Our experimental results show that the proposed method yields an accuracy of 97.89% to detect Android malware, which performs better than state-of-the-art solutions.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3052-3064"},"PeriodicalIF":5.5,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the era driven by big data and algorithms, the efficient collaboration of pervasive computing power is crucial for rapidly meeting computing demands and enhancing resource utilization. However, current mainstream end-edge-cloud collaboration faces challenges of computing isolation, adversely affecting resource efficiency and user experience. The Computing Power Network (CPN) is a novel architecture designed to sense and collaborate ubiquitous computing resources through networks. Nevertheless, the expansion of its scope and the integration of networks complicate task scheduling. To address this, we design a collaborative scheduling system that considers the joint selection of computing nodes and network links, aiming to reduce delay, enhance reliability, and ensure long-term load balance. First, we propose a delay-prioritized reliable scheduling policy based on a dual-priority mechanism for forwarding and computing. Second, we define the scheduling problem as a Constrained Markov Decision Process (CMDP) and introduce Lyapunov optimization to transform constraints into instantaneous optimizations, achieving a long-term balanced load of computing and network resources. Lastly, we employ an enhanced Deep Reinforcement Learning (DRL) approach to solve the problem. Performance evaluation demonstrates that compared to standard DRL, the proposed algorithm effectively reduces delay and improves reliability while maintaining long-term load balance, resulting in an overall performance improvement of 54.7%.
{"title":"Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks","authors":"Renchao Xie;Li Feng;Qinqin Tang;Tao Huang;Zehui Xiong;Tianjiao Chen;Ran Zhang","doi":"10.1109/TSC.2024.3495500","DOIUrl":"10.1109/TSC.2024.3495500","url":null,"abstract":"In the era driven by big data and algorithms, the efficient collaboration of pervasive computing power is crucial for rapidly meeting computing demands and enhancing resource utilization. However, current mainstream end-edge-cloud collaboration faces challenges of computing isolation, adversely affecting resource efficiency and user experience. The Computing Power Network (CPN) is a novel architecture designed to sense and collaborate ubiquitous computing resources through networks. Nevertheless, the expansion of its scope and the integration of networks complicate task scheduling. To address this, we design a collaborative scheduling system that considers the joint selection of computing nodes and network links, aiming to reduce delay, enhance reliability, and ensure long-term load balance. First, we propose a delay-prioritized reliable scheduling policy based on a dual-priority mechanism for forwarding and computing. Second, we define the scheduling problem as a Constrained Markov Decision Process (CMDP) and introduce Lyapunov optimization to transform constraints into instantaneous optimizations, achieving a long-term balanced load of computing and network resources. Lastly, we employ an enhanced Deep Reinforcement Learning (DRL) approach to solve the problem. Performance evaluation demonstrates that compared to standard DRL, the proposed algorithm effectively reduces delay and improves reliability while maintaining long-term load balance, resulting in an overall performance improvement of 54.7%.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3359-3372"},"PeriodicalIF":5.5,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-11DOI: 10.1109/TSC.2024.3495538
Shuxin Ge;Xiaobo Zhou;Tie Qiu
Mobility on-demand (MoD) systems widely use machine learning to estimate matching utilities of order-vehicle pairs to dispatch orders by bipartite matching. However, existing methods suffer from overestimation problems due to the complex interactions among order-vehicle pairs in the global bipartite graph, leading to low overall revenue and order completion rate. To fill this gap, we propose a multi-agent deep reinforcement learning (MADRL) based order dispatching method with bipartite splitting, named SplitMatch. The key idea is to split the global bipartite graph into multiple sub-bipartite graphs to overcome the overestimation problem. First, we propose a bipartite splitting theorem and prove that the optimal solution of global bipartite matching can be achieved by solving multiple sub-bipartite matching problems when certain conditions are met. Second, we design a spatial-temporal padding prediction algorithm to generate sub-bipartite graphs that satisfy this theorem, where the spatial-temporal feature of orders and vehicles is captured. Next, we propose a MADRL framework to learn the matching utility, where multi-objective, e.g., immediate revenue and quality of service (QoS), are taken into account to deal with varying action space. Finally, a series of simulations are conducted to verify the superiority of SplitMatch in terms of overall revenue and order completion rate.
{"title":"MADRL-Based Order Dispatching in MoD Systems With Bipartite Graph Splitting","authors":"Shuxin Ge;Xiaobo Zhou;Tie Qiu","doi":"10.1109/TSC.2024.3495538","DOIUrl":"10.1109/TSC.2024.3495538","url":null,"abstract":"Mobility on-demand (MoD) systems widely use machine learning to estimate matching utilities of order-vehicle pairs to dispatch orders by bipartite matching. However, existing methods suffer from overestimation problems due to the complex interactions among order-vehicle pairs in the global bipartite graph, leading to low overall revenue and order completion rate. To fill this gap, we propose a multi-agent deep reinforcement learning (MADRL) based order dispatching method with bipartite splitting, named SplitMatch. The key idea is to split the global bipartite graph into multiple sub-bipartite graphs to overcome the overestimation problem. First, we propose a bipartite splitting theorem and prove that the optimal solution of global bipartite matching can be achieved by solving multiple sub-bipartite matching problems when certain conditions are met. Second, we design a spatial-temporal padding prediction algorithm to generate sub-bipartite graphs that satisfy this theorem, where the spatial-temporal feature of orders and vehicles is captured. Next, we propose a MADRL framework to learn the matching utility, where multi-objective, e.g., immediate revenue and quality of service (QoS), are taken into account to deal with varying action space. Finally, a series of simulations are conducted to verify the superiority of SplitMatch in terms of overall revenue and order completion rate.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3914-3927"},"PeriodicalIF":5.5,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mobile devices commonly offload latency-sensitive applications to edge servers to meet low-latency requirements. However, existing studies overlook dependency and application hit ratio considerations, hindering effective offloading for multi-applications and multi-tasks. To this end, this article proposes a Dependent task offloading and Service placement Optimization (DSO) method to maximize the application hit ratio, thereby providing high-quality service. The proposed DSO includes Improved Multi-Agent Q-Learning (IMAQL) and greedy algorithms. IMAQL optimizes service placement via Q-learning, while the greedy algorithm schedules task offloading. Extensive experiments on public datasets demonstrate that the DSO method enhances the application hit ratio by 4.7% to 11.7% and reduces the completion time by about 3.4% to 4.9% compared to alternative approaches.
移动设备通常将对延迟敏感的应用程序卸载到边缘服务器,以满足低延迟需求。然而,现有的研究忽略了依赖关系和应用程序命中率的考虑,阻碍了多应用程序和多任务的有效卸载。为此,本文提出了一种依赖任务卸载和服务放置优化(Dependent task offloading and Service placement Optimization, DSO)方法来最大化应用程序的命中率,从而提供高质量的服务。该算法包括改进的多智能体Q-Learning (IMAQL)和贪心算法。IMAQL通过Q-learning优化服务布局,而贪婪算法调度任务卸载。在公共数据集上进行的大量实验表明,与其他方法相比,DSO方法将应用程序命中率提高了4.7%至11.7%,并将完成时间缩短了3.4%至4.9%。
{"title":"Dependency-Aware Task Offloading Based on Application Hit Ratio","authors":"Junna Zhang;Xinxin Wang;Peiyan Yuan;Hai Dong;Pengcheng Zhang;Zahir Tari","doi":"10.1109/TSC.2024.3495510","DOIUrl":"10.1109/TSC.2024.3495510","url":null,"abstract":"Mobile devices commonly offload latency-sensitive applications to edge servers to meet low-latency requirements. However, existing studies overlook dependency and application hit ratio considerations, hindering effective offloading for multi-applications and multi-tasks. To this end, this article proposes a Dependent task offloading and Service placement Optimization (DSO) method to maximize the application hit ratio, thereby providing high-quality service. The proposed DSO includes Improved Multi-Agent Q-Learning (IMAQL) and greedy algorithms. IMAQL optimizes service placement via Q-learning, while the greedy algorithm schedules task offloading. Extensive experiments on public datasets demonstrate that the DSO method enhances the application hit ratio by 4.7% to 11.7% and reduces the completion time by about 3.4% to 4.9% compared to alternative approaches.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3373-3386"},"PeriodicalIF":5.5,"publicationDate":"2024-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142596435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}