{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T06:01:54Z","timestamp":1774504914143,"version":"3.50.1"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.eswa.2026.131237","type":"journal-article","created":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T11:16:24Z","timestamp":1769166984000},"page":"131237","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["MTDMS-CMOEA: A Multi-Task dynamic membrane computing framework for Tri-Objective optimization of Latency, Energy, and security in IoT edge offloading"],"prefix":"10.1016","volume":"310","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6696-0085","authenticated-orcid":false,"given":"Shouheng","family":"Tuo","sequence":"first","affiliation":[]},{"given":"Chong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yihao","family":"Huyan","sequence":"additional","affiliation":[]},{"given":"Haiyan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2026.131237_b0005","doi-asserted-by":"crossref","unstructured":"Alrowaily M, Lu Z. Secure edge computing in IoT systems: Review and case studies. 2018 IEEE ACM Symposium on Edge Computing (SEC). IEEE, 2018: 440\u2013444. DOI:10.1109\/SEC.2018.00060.","DOI":"10.1109\/SEC.2018.00060"},{"issue":"17","key":"10.1016\/j.eswa.2026.131237_b0010","doi-asserted-by":"crossref","first-page":"16546","DOI":"10.1109\/JIOT.2022.3150976","article-title":"Joint task offloading and resource allocation for IoT edge computing with sequential task dependency","volume":"9","author":"An","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2026.131237_b0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112623","article-title":"Spiking neural self-attention network for sequence recommendation","volume":"169","author":"Bai","year":"2025","journal-title":"Applied Soft Computing"},{"issue":"2","key":"10.1016\/j.eswa.2026.131237_b0020","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","article-title":"A fast and elitist multiobjective genetic algorithm: NSGA-II","volume":"6","author":"Deb","year":"2002","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"3","key":"10.1016\/j.eswa.2026.131237_b0025","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s41965-022-00105-6","article-title":"Multi-learning rate optimization spiking neural P systems for solving the discrete optimization problems","volume":"4","author":"Dong","year":"2022","journal-title":"Journal of Membrane Computing"},{"issue":"3","key":"10.1016\/j.eswa.2026.131237_b0030","doi-asserted-by":"crossref","first-page":"2146","DOI":"10.1109\/JIOT.2018.2826006","article-title":"Application aware workload allocation for edge computing-based IoT","volume":"5","author":"Fan","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2026.131237_b0035","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/j.swevo.2018.08.017","article-title":"Push and pull search for solving constrained multi-objective optimization problems","volume":"44","author":"Fan","year":"2019","journal-title":"Swarm and Evolutionary Computation"},{"issue":"3","key":"10.1016\/j.eswa.2026.131237_b0040","first-page":"2153","article-title":"Scheduling precedence constrained tasks for mobile applications in fog computing","volume":"16","author":"Li","year":"2022","journal-title":"IEEE Transactions on Services Computing"},{"issue":"14","key":"10.1016\/j.eswa.2026.131237_b0055","doi-asserted-by":"crossref","first-page":"8021","DOI":"10.3390\/app13148021","article-title":"Q-MeaMetaVC: An MVC Solver of a Large-Scale Graph based on Membrane Evolutionary Algorithms","volume":"13","author":"Liao","year":"2023","journal-title":"Applied Sciences"},{"issue":"2","key":"10.1016\/j.eswa.2026.131237_b0045","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/TEVC.2018.2855411","article-title":"Two-archive evolutionary algorithm for constrained multiobjective optimization","volume":"23","author":"Li","year":"2018","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"5","key":"10.1016\/j.eswa.2026.131237_b0050","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/TEVC.2019.2894743","article-title":"Handling constrained multiobjective optimization problems with constraints in both the decision and objective spaces","volume":"23","author":"Liu","year":"2019","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"3","key":"10.1016\/j.eswa.2026.131237_b0060","doi-asserted-by":"crossref","first-page":"4307","DOI":"10.1109\/JIOT.2018.2875926","article-title":"Learning-based privacy-aware offloading for healthcare IoT with energy harvesting","volume":"6","author":"Min","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"10.1016\/j.eswa.2026.131237_b0065","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1109\/JAS.2023.123687","article-title":"Constrained multi-objective optimization with deep reinforcement learning assisted operator selection","volume":"11","author":"Ming","year":"2024","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"10.1016\/j.eswa.2026.131237_b0070","doi-asserted-by":"crossref","unstructured":"Mo C, Chen J, Liao W. Graph Convolutional Network Augmented Deep Reinforcement Learning for Dependent Task Offloading in Mobile Edge Computing. 2023 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2023: 1\u20136. DOI: 10.1109\/WCNC55385.2023.10119034.","DOI":"10.1109\/WCNC55385.2023.10119034"},{"issue":"1","key":"10.1016\/j.eswa.2026.131237_b0075","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1006\/jcss.1999.1693","article-title":"Computing with membranes","volume":"61","author":"Paun","year":"2000","journal-title":"Journal of Computer and System Sciences"},{"issue":"17","key":"10.1016\/j.eswa.2026.131237_b0080","doi-asserted-by":"crossref","first-page":"13723","DOI":"10.1109\/JIOT.2021.3067732","article-title":"Constrained multiobjective optimization for IoT-enabled computation offloading in collaborative edge and cloud computing","volume":"8","author":"Peng","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2026.131237_b0085","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2021.107142","article-title":"Joint optimization of service chain caching and task offloading in mobile edge computing","volume":"103","author":"Peng","year":"2021","journal-title":"Applied Soft Computing"},{"issue":"2","key":"10.1016\/j.eswa.2026.131237_b0105","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/TEVC.2022.3145582","article-title":"An evolutionary multitasking optimization framework for constrained multiobjective optimization problems","volume":"26","author":"Qiao","year":"2022","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"4","key":"10.1016\/j.eswa.2026.131237_b0090","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1109\/TETCI.2023.3236633","article-title":"A self-adaptive evolutionary multi-task based constrained multi-objective evolutionary algorithm","volume":"7","author":"Qiao","year":"2023","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"key":"10.1016\/j.eswa.2026.131237_b0095","doi-asserted-by":"crossref","DOI":"10.1016\/j.swevo.2024.101504","article-title":"Benchmark problems for large-scale constrained multi-objective optimization with baseline results","volume":"86","author":"Qiao","year":"2024","journal-title":"Swarm and Evolutionary Computation"},{"issue":"4","key":"10.1016\/j.eswa.2026.131237_b0100","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1109\/TEVC.2023.3281666","article-title":"Evolutionary constrained multiobjective optimization: Scalable high-dimensional constraint benchmarks and algorithm","volume":"28","author":"Qiao","year":"2024","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10.1016\/j.eswa.2026.131237_b0110","series-title":"2021 6th International Conference on Intelligent Computing and Signal Processing (ICSP)","first-page":"10","article-title":"Optimizing energy consumption and latency based on computation offloading and cell association in MEC enabled Industrial IoT environment","author":"Rafiq","year":"2021"},{"issue":"5","key":"10.1016\/j.eswa.2026.131237_b0115","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge computing: Vision and challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"10.1016\/j.eswa.2026.131237_b0120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3431234","article-title":"A survey of nature-inspired computing: Membrane computing","volume":"54","author":"Song","year":"2021","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.1016\/j.eswa.2026.131237_b0125","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsp.2024.104470","article-title":"Industrial defect detection and location based on greedy membrane clustering algorithm","volume":"149","author":"Tang","year":"2024","journal-title":"Digital Signal Processing"},{"key":"10.1016\/j.eswa.2026.131237_b0130","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.109869","article-title":"Multi-stages attention breast cancer classification based on nonlinear spiking neural P neurons with autapses","volume":"142","author":"Tang","year":"2025","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"1","key":"10.1016\/j.eswa.2026.131237_b0135","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/TEVC.2020.3004012","article-title":"A coevolutionary framework for constrained multiobjective optimization problems","volume":"25","author":"Tian","year":"2020","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"9","key":"10.1016\/j.eswa.2026.131237_b0140","doi-asserted-by":"crossref","first-page":"9559","DOI":"10.1109\/TCYB.2020.3021138","article-title":"Balancing objective optimization and constraint satisfaction in constrained evolutionary multiobjective optimization","volume":"52","author":"Tian","year":"2021","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"4","key":"10.1016\/j.eswa.2026.131237_b0145","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s41965-022-00111-8","article-title":"Membrane computing with harmony search algorithm for gene selection from expression and methylation data","volume":"4","author":"Tuo","year":"2022","journal-title":"Journal of Membrane Computing"},{"issue":"4","key":"10.1016\/j.eswa.2026.131237_b0150","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1109\/COMST.2020.3020854","article-title":"Architectural design alternatives based on cloud\/edge\/fog computing for connected vehicles","volume":"22","author":"Wang","year":"2020","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"13","key":"10.1016\/j.eswa.2026.131237_b0160","doi-asserted-by":"crossref","first-page":"7755","DOI":"10.3390\/app13137755","article-title":"An Extended Membrane System with Monodirectional Tissue-like P Systems and Enhanced Particle Swarm Optimization for Data Clustering","volume":"13","author":"Wang","year":"2023","journal-title":"Applied Sciences"},{"key":"10.1016\/j.eswa.2026.131237_b0155","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.127351","article-title":"Spiking neural p systems with neuron permeability","volume":"576","author":"Wang","year":"2024","journal-title":"Neurocomputing"},{"issue":"3","key":"10.1016\/j.eswa.2026.131237_b0165","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1109\/TEVC.2008.2009032","article-title":"Constraint handling in multiobjective evolutionary optimization","volume":"13","author":"Woldesenbet","year":"2009","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10.1016\/j.eswa.2026.131237_b0170","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120240","article-title":"An improved hybrid membrane algorithm based on hormone modulation mechanism for engineering design problems","volume":"227","author":"Xiao","year":"2023","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"10.1016\/j.eswa.2026.131237_b0180","doi-asserted-by":"crossref","first-page":"2622","DOI":"10.1109\/JIOT.2019.2944007","article-title":"Joint optimization of offloading utility and privacy for edge computing enabled IoT","volume":"7","author":"Xu","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.eswa.2026.131237_b0175","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2021.107022","article-title":"Deep reinforcement learning assisted edge-terminal collaborative offloading algorithm of blockchain computing tasks for energy internet","volume":"131","author":"Xu","year":"2021","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"10.1016\/j.eswa.2026.131237_b0185","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.ins.2020.06.001","article-title":"Task offloading for directed acyclic graph applications based on edge computing in industrial internet","volume":"540","author":"Yang","year":"2020","journal-title":"Information Sciences"},{"key":"10.1016\/j.eswa.2026.131237_b0190","series-title":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE","first-page":"872","article-title":"Intelligent Task Offloading Method using Deep Q-Network for Collaborative Edge Computing System","author":"Youn","year":"2023"},{"issue":"2","key":"10.1016\/j.eswa.2026.131237_b0195","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1109\/TEVC.2021.3089155","article-title":"Indicator-based evolutionary algorithm for solving constrained multiobjective optimization problems","volume":"26","author":"Yuan","year":"2021","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"4","key":"10.1016\/j.eswa.2026.131237_b0200","first-page":"1","article-title":"An overview of hardware implementation of membrane computing models","volume":"53","author":"Zhang","year":"2020","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"10","key":"10.1016\/j.eswa.2026.131237_b0210","doi-asserted-by":"crossref","first-page":"8119","DOI":"10.1109\/JIOT.2020.3042433","article-title":"Secure and optimized load balancing for multitier IoT and edge-cloud computing systems","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"issue":"06","key":"10.1016\/j.eswa.2026.131237_b0205","doi-asserted-by":"crossref","DOI":"10.1142\/S0129065724500230","article-title":"An asynchronous spiking neural membrane system for edge detection","volume":"34","author":"Zhang","year":"2024","journal-title":"International Journal of Neural Systems"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S095741742600151X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S095741742600151X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T04:01:37Z","timestamp":1774497697000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S095741742600151X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":42,"alternative-id":["S095741742600151X"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131237","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"MTDMS-CMOEA: A Multi-Task dynamic membrane computing framework for Tri-Objective optimization of Latency, Energy, and security in IoT edge offloading","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131237","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"131237"}}