{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:03:09Z","timestamp":1743102189812,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819973552"},{"type":"electronic","value":"9789819973569"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7356-9_11","type":"book-chapter","created":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T09:03:24Z","timestamp":1697706204000},"page":"179-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On-Demand Allocation of\u00a0Cryptographic Computing Resource with\u00a0Load Prediction"],"prefix":"10.1007","author":[{"given":"Xiaogang","family":"Cao","sequence":"first","affiliation":[]},{"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Yingke","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Wenlong","family":"Kou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,20]]},"reference":[{"key":"11_CR1","unstructured":"Cloud encryttion market outlook (2023 to 2033). https:\/\/www.futuremarketinsights.com\/reports\/cloud-encryption-market. Accessed 19 Mar 2023"},{"key":"11_CR2","unstructured":"Xilinx kintex 7 FPGA product table. https:\/\/www.xilinx.com\/products\/silicon-devices\/fpga\/kintex-7.html. Accessed 19 Mar 2023"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.is.2015.04.007","volume":"53","author":"S Aghabozorgi","year":"2015","unstructured":"Aghabozorgi, S., Shirkhorshidi, A.S., Wah, T.Y.: Time-series clustering-a decade review. Inf. Syst. 53, 16\u201338 (2015)","journal-title":"Inf. Syst."},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-57301-1_5","volume":"46","author":"R Agrawal","year":"1993","unstructured":"Agrawal, R., Faloutsos, C., Swami, A.: Efficient similarity search in sequence databases. Found. Data Organ. Algorithms 46, 69\u201384 (1993)","journal-title":"Found. Data Organ. Algorithms"},{"issue":"12","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1927","DOI":"10.1016\/j.ifacol.2016.07.912","volume":"49","author":"N Bakhtadze","year":"2016","unstructured":"Bakhtadze, N., Sakrutina, E.: Applying the multi-scale wavelet-transform to the identification of non-linear time-varying plants. IFAC-PapersOnLine 49(12), 1927\u20131932 (2016)","journal-title":"IFAC-PapersOnLine"},{"issue":"8","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1911","DOI":"10.1109\/TPDS.2021.3132422","volume":"33","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Hu, J., Min, G., Luo, C., El-Ghazawi, T.: Adaptive and efficient resource allocation in cloud datacenters using actor-critic deep reinforcement learning. IEEE Trans. Parallel Distrib. Syst. 33(8), 1911\u20131923 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-1-4419-9326-7_5","volume-title":"Ensemble Machine Learning: Methods and Applications","author":"A Cutler","year":"2012","unstructured":"Cutler, A., Cutler, D.R., Stevens, J.R.: Random forests. In: Zhang, C., Ma, Y. (eds.) Ensemble Machine Learning: Methods and Applications, pp. 157\u2013175. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4419-9326-7_5"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Dambreville, A., Tomasik, J., Cohen, J., Dufoulon, F.: Load prediction for energy-aware scheduling for cloud computing platforms. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE (2017)","DOI":"10.1109\/ICDCS.2017.201"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10766-018-0590-x","volume":"48","author":"P Durgadevi","year":"2020","unstructured":"Durgadevi, P., Srinivasan, S.: Resource allocation in cloud computing using SFLA and cuckoo search hybridization. Int. J. Parallel Prog. 48, 549\u2013565 (2020)","journal-title":"Int. J. Parallel Prog."},{"issue":"2","key":"11_CR10","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1145\/191843.191925","volume":"23","author":"C Faloutsos","year":"1994","unstructured":"Faloutsos, C., Ranganathan, M., Manolopoulos, Y.: Fast subsequence matching in time-series databases. ACM SIGMOD Rec. 23(2), 419\u2013429 (1994)","journal-title":"ACM SIGMOD Rec."},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1109\/TSC.2022.3156619","volume":"16","author":"B Feng","year":"2022","unstructured":"Feng, B., Ding, Z., Jiang, C.: FAST: a forecasting model with adaptive sliding window and time locality integration for dynamic cloud workloads. IEEE Trans. Serv. Comput. 16, 1184\u20131197 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Gao, J., Wang, H., Shen, H.: Machine learning based workload prediction in cloud computing. In: 29th International Conference on Computer Communications and Networks (ICCCN). IEEE (2020)","DOI":"10.1109\/ICCCN49398.2020.9209730"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"10942","DOI":"10.1007\/s11227-021-03686-8","volume":"77","author":"MJ Gul","year":"2021","unstructured":"Gul, M.J., Urfa, G.M., Paul, A., Moon, J., Rho, S., Hwang, E.: Mid-term electricity load prediction using CNN and bi-LSTM. J. Supercomput. 77, 10942\u201310958 (2021)","journal-title":"J. Supercomput."},{"issue":"5","key":"11_CR14","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TPDS.2020.3040800","volume":"32","author":"S Ilager","year":"2020","unstructured":"Ilager, S., Ramamohanarao, K., Buyya, R.: Thermal prediction for efficient energy management of clouds using machine learning. IEEE Trans. Parallel Distrib. Syst. 32(5), 1044\u20131056 (2020)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"11_CR15","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1016\/j.patcog.2010.09.022","volume":"44","author":"YS Jeong","year":"2011","unstructured":"Jeong, Y.S., Jeong, M.K., Omitaomu, O.A.: Weighted dynamic time warping for time series classification. Pattern Recogn. 44(9), 2231\u20132240 (2011)","journal-title":"Pattern Recogn."},{"key":"11_CR16","unstructured":"Keogh, E.: An enhanced representation of time series which allows fast and accurate classification, clustering and relevance feedback. In: Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (1998)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/3-540-45571-X_14","volume-title":"Knowledge Discovery and Data Mining. Current Issues and New Applications","author":"EJ Keogh","year":"2000","unstructured":"Keogh, E.J., Pazzani, M.J.: A simple dimensionality reduction technique for fast similarity search in large time series databases. In: Terano, T., Liu, H., Chen, A.L.P. (eds.) PAKDD 2000. LNCS (LNAI), vol. 1805, pp. 122\u2013133. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45571-X_14"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Keogh, E.J., Pazzani, M.J.: Derivative dynamic time warping (2002)","DOI":"10.1137\/1.9781611972719.1"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.future.2017.10.047","volume":"81","author":"J Kumar","year":"2018","unstructured":"Kumar, J., Singh, A.K.: Workload prediction in cloud using artificial neural network and adaptive differential evolution. Futur. Gener. Comput. Syst. 81, 41\u201352 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TPDS.2015.2393868","volume":"27","author":"Y Li","year":"2015","unstructured":"Li, Y., Tang, X., Cai, W.: Dynamic bin packing for on-demand cloud resource allocation. IEEE Trans. Parallel Distrib. Syst. 27(1), 157\u2013170 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"11_CR21","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/TPDS.2020.3024068","volume":"32","author":"Y Li","year":"2020","unstructured":"Li, Y., et al.: Towards minimizing resource usage with QoS guarantee in cloud gaming. IEEE Trans. Parallel Distrib. Syst. 32(2), 426\u2013440 (2020)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"11","key":"11_CR22","doi-asserted-by":"publisher","first-page":"2503","DOI":"10.1109\/TPDS.2018.2836452","volume":"29","author":"C Liu","year":"2018","unstructured":"Liu, C., Li, K., Li, K.: Minimal cost server configuration for meeting time-varying resource demands in cloud centers. IEEE Trans. Parallel Distrib. Syst. 29(11), 2503\u20132513 (2018)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Liu, N., et al.: A hierarchical framework of cloud resource allocation and power management using deep reinforcement learning. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE (2017)","DOI":"10.1109\/ICDCS.2017.123"},{"key":"11_CR24","unstructured":"M\u00e4ki, J.: Advanced telecom computing architecture. Innov. Telecommun. 78 (2006)"},{"issue":"5","key":"11_CR25","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1007\/s11227-018-2626-9","volume":"75","author":"J Meshkati","year":"2019","unstructured":"Meshkati, J., Safi-Esfahani, F.: Energy-aware resource utilization based on particle swarm optimization and artificial bee colony algorithms in cloud computing. J. Supercomput. 75(5), 2455\u20132496 (2019)","journal-title":"J. Supercomput."},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"7592","DOI":"10.1007\/s11227-019-02967-7","volume":"75","author":"HM Nguyen","year":"2019","unstructured":"Nguyen, H.M., Kalra, G., Kim, D.: Host load prediction in cloud computing using long short-term memory encoder-decoder. J. Supercomput. 75, 7592\u20137605 (2019)","journal-title":"J. Supercomput."},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Njilla, L.L., Kamhoua, C.A., Kwiat, K.A., Hurley, P., Pissinou, N.: Cyber security resource allocation: a Markov decision process approach. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE (2017)","DOI":"10.1109\/HASE.2017.30"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Oddi, G., Panfili, M., Pietrabissa, A., Zuccaro, L., Suraci, V.: A resource allocation algorithm of multi-cloud resources based on Markov decision process. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (2013)","DOI":"10.1109\/CloudCom.2013.24"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Paparrizos, J., Gravano, L.: k-shape: efficient and accurate clustering of time series. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data (2015)","DOI":"10.1145\/2723372.2737793"},{"issue":"2","key":"11_CR30","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/JSAC.2019.2959181","volume":"38","author":"J Pei","year":"2019","unstructured":"Pei, J., Hong, P., Pan, M., Liu, J., Zhou, J.: Optimal VNF placement via deep reinforcement learning in SDN\/NFV-enabled networks. IEEE J. Sel. Areas Commun. 38(2), 263\u2013278 (2019)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"11_CR31","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/j.protcy.2013.12.314","volume":"11","author":"H Rahmani","year":"2013","unstructured":"Rahmani, H., Sundararajan, E., Ali, Z.M., Zin, A.M.: Encryption as a service (EaaS) as a solution for cryptography in cloud. Procedia Technol. 11, 1202\u20131210 (2013)","journal-title":"Procedia Technol."},{"key":"11_CR32","unstructured":"Robinson, P.: Cryptography as a service. RSAConference Europe 2013 (2013)"},{"issue":"2","key":"11_CR33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCI.2009.932254","volume":"4","author":"NI Sapankevych","year":"2009","unstructured":"Sapankevych, N.I., Sankar, R.: Time series prediction using support vector machines: a survey. IEEE Comput. Intell. Mag. 4(2), 24\u201338 (2009)","journal-title":"IEEE Comput. Intell. Mag."},{"issue":"12","key":"11_CR34","doi-asserted-by":"publisher","first-page":"2893","DOI":"10.1109\/TPDS.2021.3079341","volume":"32","author":"AK Singh","year":"2021","unstructured":"Singh, A.K., Saxena, D., Kumar, J., Gupta, V.: A quantum approach towards the adaptive prediction of cloud workloads. IEEE Trans. Parallel Distrib. Syst. 32(12), 2893\u20132905 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR35","doi-asserted-by":"publisher","first-page":"6554","DOI":"10.1007\/s11227-017-2044-4","volume":"74","author":"B Song","year":"2018","unstructured":"Song, B., Yu, Y., Zhou, Y., Wang, Z., Du, S.: Host load prediction with long short-term memory in cloud computing. J. Supercomput. 74, 6554\u20136568 (2018)","journal-title":"J. Supercomput."},{"key":"11_CR36","doi-asserted-by":"publisher","first-page":"61184","DOI":"10.1109\/ACCESS.2018.2876544","volume":"6","author":"L Tang","year":"2018","unstructured":"Tang, L., Tan, Q., Shi, Y., Wang, C., Chen, Q.: Adaptive virtual resource allocation in 5G network slicing using constrained Markov decision process. IEEE Access 6, 61184\u201361195 (2018)","journal-title":"IEEE Access"},{"key":"11_CR37","unstructured":"Tang, Y., Agrawal, S., Faenza, Y.: Reinforcement learning for integer programming: learning to cut. In: International Conference on Machine Learning. PMLR (2020)"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Tavard, F., Simon, A., Hernandez, A.I., Betancur, J., Donal, E., Garreau, M.: Dynamic time warping, pp. 198\u2013203 (2012)","DOI":"10.1109\/IPTA.2012.6469516"},{"issue":"3","key":"11_CR39","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1109\/TMC.2020.3017079","volume":"21","author":"S Tuli","year":"2020","unstructured":"Tuli, S., Ilager, S., Ramamohanarao, K., Buyya, R.: Dynamic scheduling for stochastic edge-cloud computing environments using A3C learning and residual recurrent neural networks. IEEE Trans. Mob. Comput. 21(3), 940\u2013954 (2020)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"11_CR40","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhou, C., He, H., Wu, W., Zhuang, W., Shen, X.: Cellular traffic load prediction with LSTM and gaussian process regression. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9148738"},{"issue":"10","key":"11_CR41","first-page":"55","volume":"42","author":"W Kou","year":"2021","unstructured":"Kou, W., Li, F.: Differentiated and negotiable mechanism for data communication. J. Commun. 42(10), 55\u201366 (2021)","journal-title":"J. Commun."},{"issue":"11","key":"11_CR42","first-page":"3003","volume":"33","author":"Y Yang","year":"2021","unstructured":"Yang, Y., Shen, H.: Deep reinforcement learning enhanced greedy optimization for online scheduling of batched tasks in cloud HPC systems. IEEE Trans. Parallel Distrib. Syst. 33(11), 3003\u20133014 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Zhu, H., Gupta, V., Ahuja, S.S., Tian, Y., Zhang, Y., Jin, X.: Network planning with deep reinforcement learning. In: Proceedings of the 2021 ACM SIGCOMM 2021 Conference (2021)","DOI":"10.1145\/3452296.3472902"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7356-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:18:53Z","timestamp":1730344733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7356-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819973552","9789819973569"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7356-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icics23.nankai.edu.cn\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"181","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.33","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.93","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}