{"id":573,"date":"2025-06-21T14:09:18","date_gmt":"2025-06-21T14:09:18","guid":{"rendered":"https:\/\/services.conferences.computer.org\/2025\/?page_id=573"},"modified":"2025-07-09T18:16:06","modified_gmt":"2025-07-09T18:16:06","slug":"icws-program","status":"publish","type":"page","link":"https:\/\/services.conferences.computer.org\/2025\/icws-program\/","title":{"rendered":"ICWS Program"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"573\" class=\"elementor elementor-573\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-445267bb e-flex e-con-boxed e-con e-parent\" data-id=\"445267bb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3b4c639 e-con-full e-flex e-con e-child\" data-id=\"3b4c639\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb00906 elementor-widget elementor-widget-text-editor\" data-id=\"fb00906\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><strong>Part of the 2025 IEEE World Congress on SERVICES<\/strong><\/h5><h5><strong>July 7-12<\/strong><br \/><strong>Helsinki, Finland<\/strong><\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd67a7b elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cd67a7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/services.conferences.computer.org\/2025\/icws\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Home<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-696a095 elementor-button-info elementor-align-center elementor-widget elementor-widget-global elementor-global-574 elementor-widget-button\" data-id=\"696a095\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/services.conferences.computer.org\/2025\/icws\/icws-program\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">ICWS Program<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f28024 elementor-button-info elementor-align-center elementor-widget elementor-widget-global elementor-global-297 elementor-widget-button\" data-id=\"0f28024\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/services.conferences.computer.org\/2025\/icws-symposium-graph-data-mining-for-services\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Symposium: Graph Data Mining for Services<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ba650e elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1ba650e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/services.conferences.computer.org\/2025\/icws\/icws-call-for-papers\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Call for Papers<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b86628b elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"b86628b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/services.conferences.computer.org\/2025\/icws\/icws-organizers\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">ICWS Organizers<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-357a5bc6 e-con-full e-flex e-con e-child\" data-id=\"357a5bc6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d78d520 elementor-widget elementor-widget-heading\" data-id=\"1d78d520\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ICWS 2025 - Program<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2234442 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"2234442\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"35865666\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-358656661\" data-tab-title-id=\"e-n-tab-title-358656661\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-358656661\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tJuly 8\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-358656662\" data-tab-title-id=\"e-n-tab-title-358656662\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-358656662\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tJuly 9\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-358656663\" data-tab-title-id=\"e-n-tab-title-358656663\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-358656663\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tJuly 10\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-358656664\" data-tab-title-id=\"e-n-tab-title-358656664\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-358656664\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tJuly 11\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-358656665\" data-tab-title-id=\"e-n-tab-title-358656665\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-358656665\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tJuly 12\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-358656661\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-358656661\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-3d937ff e-con-full e-flex e-con e-child\" data-id=\"3d937ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cba0574 e-flex e-con-boxed e-con e-child\" data-id=\"cba0574\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-287675d elementor-widget elementor-widget-text-editor\" data-id=\"287675d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>CWS-CON-S1: Service Discovery, Selection and Recommendation<br \/><\/b><strong>10:50 \u2013 12:00<\/strong><br \/><strong>Room: F2044<\/strong><br \/><strong>Session Chairs: Kai Zhang, Harbin Institute of Technology<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_122: <em>TDIC: Time-aware Disentanglement of Interest and Conformity in Mobile APP Recommendations<\/em><br \/>Qibo Li, Yuqi Zhao and Yutao Ma<\/p><p style=\"padding-left: 40px\">CWS_REG_317: <em>Personalized Product Customization Service Based on Fine-Grained and Precise Perception of Supply and Demand<\/em><br \/>Kai Zhang, Yuchen Li, Bohai Zhao, Yongchao Xing, Hongliang Sun, Zhiying Tu and Dianhui Chu<\/p><p style=\"padding-left: 40px\">CWS_REG_322: <em>Accurate Mobile App Recommendation via Hypergraph Contrastive Collaborative Filtering<\/em><br \/>Mingdong Tang, Yinglin Huang and Fenfang Xie<\/p><p style=\"padding-left: 40px\">CWS_SHT_153: <em>A Weighted Preference Optimization Service Recommendation Method based on Knowledge Graph and Large Language Model<\/em><br \/>Hongliang Sun, Feiyang Wang, Zhiying Tu, Dianbo Sui, Yongchao Xing, Kai Zhang, Bohai Zhao and Xiaofei Xu<\/p><p><b>CWS-CON-S2:\u00a0<\/b><b>Service Discovery, Selection and Recommendation<\/b>\u00a0<br \/><strong>10:50 \u2013 12:00<\/strong><br \/><strong>Room: F2089<\/strong><br \/><strong>Session Chairs: Zhongjie Wang, Harbin Institute of Technology<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_75: <em>Relation-aware Contrastive Learning for Knowledge-based Recommendation<\/em><br \/>Yu Zhang, Shunmei Meng, Jielong Zhou and Shanming Wei<\/p><p style=\"padding-left: 40px\">CWS_REG_81: <em>LLMGCL: Graph Contrastive Learning with Large Language Models for Recommendation<\/em><br \/>Shiqi Ge, Shunmei Meng, Jielong Zhou, Lianyong Qi, Xiaolong Xu and Xuyun Zhang<\/p><p style=\"padding-left: 40px\">CWS_REG_259: <em>Graph Neural Networks for Incremental Service Recommendation with Dynamic Interest Alignment<\/em><br \/>Yaocheng He, Zhiyong Feng, Hongqi Chen, Jingyu Li, Qinghang Gao, Houwen Yi and Haoran Zhang<\/p><p style=\"padding-left: 40px\">CWS_SHT_301: <em>Recognition Service for Named Entities via Multilayer Feature Learning for Large Web Knowledge Bases<\/em><br \/>Chan Li, Rui Li, Yinru Ma, Xinkui Zhao, Lei Hei, Yuyu Yin, Yueshen Xu and Yi Yang<\/p><p><b>CWS-CON-S3:\u00a0<\/b><b>Service Discovery, Selection and Recommendation<\/b>\u00a0<br \/><strong>13:40 \u2013 14:50<\/strong><br \/><strong>Room: F2044<\/strong><br \/><strong>Session Chair: Yogesh Simmhan, Indian Institute of Science<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_34: <em>Efficient Federated Learning with Encrypted Data Sharing for Data-Heterogeneous Edge Devices<\/em><br \/>Hangyu Li, Hongyue Wu, Guodong Fan, Shizhan Chen, Zhiyong Feng and Zhen Zhang<\/p><p style=\"padding-left: 40px\">CWS_REG_63: <em>Quality of Service Prediction via Large Language Models<\/em><br \/>Huiying Liu, Zekun Zhang, Lei Sang, Qilin Wu and Yiwen Zhang<\/p><p style=\"padding-left: 40px\">CWS_ SHT_311: <em>Autocompletion Service for Temporal Web Knowledge Bases via Multisource Semantic Feature Learning<\/em><br \/>Chan Li, Rui Li, Linfang Wang, Chen Zhi, Lei Hei, Junfeng Xing, Yueshen Xu and Sirui Yang<\/p><p style=\"padding-left: 40px\">CWS_ WIP_223:\u00a0<em>PUKF: Enhanced Vehicle Localization Services through Tightly-Coupled GNSS\/INS Integration<\/em><br \/>Yipeng Li, Binglei Yue, Jiawei Song and Yin Zhang<\/p><p><b>CWS-CON-S4:\u00a0<\/b><b>Microservices<\/b>\u00a0<br \/><strong>13:40 \u2013 14:50<\/strong><br \/><strong>Room: F2089<\/strong><br \/><strong>Session Chair: Chang-ai Sun, University of Science &amp; Technology Beijing<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_62: <em>Robust and Lightweight Root Cause Analysis for Microservice Metrics<\/em><br \/>Nobukazu Fukuda, Haruhisa Nozue, Haruo Oishi and Kenichi Tayama<\/p><p style=\"padding-left: 40px\">CWS_REG_380: <em>ReconRCA: Root Cause Analysis in Microservices with Incomplete Metrics<\/em><br \/>Zekun Zhang, Jian Wang, Bing Li and Liuxiaoxiao Zhang<\/p><p style=\"padding-left: 40px\">CWS_WIP_172: <em>Are GNNs Actually Effective for Multimodal Fault Diagnosis in Microservice Systems?<\/em><br \/>Fei Gao, Ruyue Xin, Xiaocui Li and Yaqiang Zhang<\/p><p><b>ICWS Keynote\u00a0<br \/><\/b><b>15:10 \u2013 16:20<br \/><\/b><b>Room: F2044\/2089\/3010<br \/><\/b><b>Session Chair: Walid Gaaloul, IP Paris, France<\/b><\/p><p style=\"padding-left: 40px\">Prof. Fabio Casati<br \/>Keynote Title: <em>Process discovery and recommendation at work in the age of genAI<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-358656662\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-358656662\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-29fc757 e-con-full e-flex e-con e-child\" data-id=\"29fc757\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f062d43 e-flex e-con-boxed e-con e-child\" data-id=\"f062d43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14f9b1e elementor-widget elementor-widget-text-editor\" data-id=\"14f9b1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>CWS-CON-S5: Services Security, Privacy and Trust<br \/><\/b><strong>8:30 \u2013 9:40<\/strong><br \/><strong>Room: F2044<\/strong><br \/><strong>Session Chair: Walid Gaaloul, IP Paris<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_57: <em>UIFV: Data Reconstruction Attack in Vertical Federated Learning<\/em><br \/>Jirui Yang, Peng Chen, Zhihui Lu, Qiang Duan and Yubing Bao<\/p><p style=\"padding-left: 40px\">CWS_REG_191: <em>FedMLU: Mitigating Source Inference Attacks in Federated Learning Without Losing Utility for Secure IoT Services<\/em><br \/>Mengmeng Cui, Hao Cheng, Xuanru Guo, Haolong Xiang, Kun Yi, Xiaoyong Li and Xiaolong Xu<\/p><p style=\"padding-left: 40px\">CWS_REG_229: <em>Privacy-Preserving and Efficient Offloading for Cooperative Vehicle Infrastructure Systems<\/em><br \/>Jie Zhang, Huiying Jin, Jingyi Zhao, Hai Dong and Pengcheng Zhang<\/p><p><b>CWS-CON-S6: Services Security, Privacy and Trust<br \/><\/b><strong>8:30 \u2013 9:40<\/strong><br \/><strong>Room: F2089<\/strong><br \/><strong>Session Chair: Wendi Feng, Beijing Information Science and Science University<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_136: <em>Ensuring Trust Information Availability for Ubiquitous Trustworthy IoT Services<\/em><br \/>Thilina Lokuruge and Athman Bouguettaya<\/p><p style=\"padding-left: 40px\">CWS_REG_387: <em>Privacy-Preserving Authentication Based on Blockchain and Implicit Certificates for Internet of Vehicles<\/em><br \/>Donghang Li, Li Duan, Wen Zhang, Yanan Wang, Chao Li and Ni Wei<\/p><p style=\"padding-left: 40px\">CWS_ SHT_155: <em>Program Verification to Defend Chain-of-Thought Attacks for LLM services<br \/><\/em>Shuo He, Jiawei Jiang, Hongbao Liu and Tao Tang<\/p><p style=\"padding-left: 40px\">CWS_ SHT_43:\u00a0TS-GNN: <em>A Temporal-Spatial Graph Neural Network for Anomaly Detection in Multiplex Industrial Information Services<\/em><br \/>Pan Li, Yuanshuang Jiang, Tienyu Zuo, Fulin Chen, Kai Di and Yichuan Jiang<\/p><p><b>CWS-CON-S7: Services Security, Privacy and Trust<br \/><\/b><strong>13:40 \u2013 14:50<br \/>Room: F2044<br \/><\/strong><strong>Session Chair: Marco Aiello<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_12:\u00a0<i>HashMVT: Accelerating Parallel Networking Services with Hardware Offloaded Hash-based Match-Value Tables<br \/><\/i>Wendi Feng and Wei Zhang<\/p><p style=\"padding-left: 40px\">CWS_REG_360: <em>Towards Adaptive Privacy-Preserving Information Diffusion in Online Social Networks<\/em><br \/>Yuzi Yi, Yehong Luo, Jingsha He, Zhongqi Lu and Jiwei Huang<\/p><p style=\"padding-left: 40px\">CWS_ SHT_65: <em>Follow Your Hidden Traces: Underground Forum-based Darknet Market Sybil Detection<\/em><br \/>Minjae Kim, Yerim Kim and Junbeom Hur<\/p><p style=\"padding-left: 40px\">CWS_SHT_231: <em>ACCESS-FL: Agile Communication and Computation for Efficient Secure Aggregation in Stable Networks for FLaaS<\/em><br \/>Nobiousha Nazemi, Omid Tavallaie, Shuaijun Chen, Anna Maria Mandalari, Kanchana Thilakarathna, Ralph Holz, Hamed Haddadi and Albert Y. Zomaya<\/p><p><b>CWS-CON-S8: Services Security, Privacy and Trust<br \/><\/b><strong>13:40 \u2013 14:50<\/strong><br \/><strong>Room: F2089<\/strong><br \/><strong>Session Chair: Wendi Feng, Beijing Information Science &amp; Science University<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_52: <em>Dynamic Model and Node Selection for Collaborative Inference of Large\/Small Models in Vehicular Networks<\/em><br \/>Mengke Zheng, Shijing Hu, Zhihui Lu, Qiang Duan and Baoqi Huang<\/p><p style=\"padding-left: 40px\">CWS_REG_232: <em>Servitizing Image Provenance for Fake Image Detection<\/em><br \/>Ethan Katte, Muhammad Umair and Athman Bouguettaya<\/p><p style=\"padding-left: 40px\">CWS_WIP_371: <em>RepuFL: Reputation-Aware Client Selection in Federated Learning for Mobile Networks<\/em><br \/>Subhash Sagar and Adnan Mahmood<\/p><p><b>ICWS Panel<br \/><\/b><b>15:10-16:20<br \/><\/b><b>Room: F2044\/2089\/3010<br \/><\/b><b>Session Chair: Boualem Benatallah, Dublin City University<\/b><\/p><p style=\"padding-left: 40px\">Title : Services\/GenAI enabled agents<\/p><p style=\"padding-left: 40px\">Panel Chair: Boualem Benatallah, Dublin City University<br \/>Panelists: Marco Aiello, University of Stuttgart<br \/>Fabio Casati, ServiceNow<br \/>Michael Sheng, Macquarie University<br \/>Petteri Nurmi, University of Helsinki<\/p><p><b>CWS-CON-S9: Services Security, Privacy and Trust<br \/><\/b><strong>16:20 \u2013 17:30<\/strong><br \/><strong>Room: F2044<\/strong><br \/><strong>Session Chair: Yuzi Yi, China University of Petroleum<\/strong><\/p><p style=\"padding-left: 40px\">CON_REG_53: <em>A Framework for Data Quality and Protection Management in Service-Based Data Pipelines<\/em><br \/>Antongiacomo Polimeno, Marco Luzzara, Marco Anisetti, Chirine Ghedira-Guegan, Claudio A. Ardagna<\/p><p style=\"padding-left: 40px\">CWS_SHT_180: <em>Service-based Interference Resolution in Multi-drone Skyway Networks<\/em><br \/>Syeda Amna Rizvi and Athman Bouguettaya<\/p><p style=\"padding-left: 40px\">CWS_REG_225: <em>Robust Evaluation of LLM-Generated GraphQL Queries for Web Services<\/em><br \/>Vansika Sonthalia, Manish Kesarwani and Sameep Mehta<\/p><p style=\"padding-left: 40px\">CWS_SHT_321: <em>Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection<\/em><br \/>Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes and Huaming Chen<\/p><p><b>CWS-CON-S10: Generative AI<br \/><\/b><b>16:20 \u2013 17:30<br \/><\/b><strong>Room: F2089<\/strong><br \/><strong>Session Chair: Massimo Mecella, Sapienza Universit\u00e0 di Roma<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_39: <em>An LLM Prompt-Driven Framework for Multi-Scale Workload Prediction<\/em><br \/>Zeyuan Ding, Dian Ding, Han Zhang, Jiannong Cao and Guangtao Xue.\u00a0LLM4Load<\/p><p style=\"padding-left: 40px\">CWS_REG_323:\u00a0<em>ServerlessPD: Fast RDMA-codesigned Disaggregated Prefill-Decoding for Serverless Inference of Large Language Models<\/em><br \/>Mingxuan Liu, Jianhua Gu and Tianhai Zhao<\/p><p style=\"padding-left: 40px\">CWS_SHT_168:\u00a0<em>CE-CoLLM: Efficient and Adaptive Large Language Models Through Cloud-Edge Collaboration<\/em><br \/>Hongpeng Jin and Yanzhao Wu<\/p><p style=\"padding-left: 40px\">CWS_WIP_16:\u00a0<em>LLMCc: Checking the Compliance of Business Process Models Using LLMs<\/em><br \/>Jinghua Tang, Wei Guan, Jian Cao, Jianqi Gao, Qiqi Cai and Jintao Chen<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-358656663\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-358656663\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-c8e24e3 e-con-full e-flex e-con e-child\" data-id=\"c8e24e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d4d3e6f e-flex e-con-boxed e-con e-child\" data-id=\"d4d3e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d816054 elementor-widget elementor-widget-text-editor\" data-id=\"d816054\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>CWS-CON-S11: Service Applications beyond the Web<br \/><\/b><strong>8:30 \u2013 9:40<\/strong><br \/><strong>Room: F2044<\/strong><br \/><strong>Session Chair: Jiwei Huang, China University of Petroleum<\/strong><\/p><p>CWS_REG_19: <em>Fall Detection as a Service (FDaaS) in Smart Homes<\/em><br \/>Abdallah Lakhdari, Jiajie Li, Amani Abusafia and Athman Bouguettaya<\/p><p>CWS_REG_206: <em>Service-Oriented Kinesthetic Interaction: A Grid Optimization Investigation for Eyes-Free 3D Interfaces<\/em><br \/>Daojun Gong, Yiran Peng and Xuewen Wang<\/p><p>CWS_ SHT_113: <em>GIWiD: Gait-based User Identification Services with WiFi Device-free Sensing<\/em><br \/>Binglei Yue, Junwei Lei, Heng Liu, Chun Yang, Aili Jiang and Yin Zhang<\/p><p><b>CWS-CON-S12: Service Applications beyond the Web<br \/><\/b><strong>8:30 &#8211; 9:40<br \/>Room: F2089<\/strong><br \/><strong>Session Chair: Hirad Baradaran Rezaei<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_379: <em>Consensus-based Decentralized Federated Learning for Model Training Services in IoV<\/em><br \/>Xiaoyan Liu, Zhiwei Xu and Jiwei Huang<\/p><p style=\"padding-left: 40px\">CWS_SHT_53: <em>GCA-YOLO: An Edge-optimized Traffic Sign Detection Model<\/em><br \/>Peiyan Yuan, Yifan Pei, Chenyang Wang, Xiaoyan Zhao, Zhou Liu, Xiaoqiang Zhu and Tarik Taleb<\/p><p style=\"padding-left: 40px\">CWS_SHT_217: <em>ReIDFaaS: An Energy-Efficient Serverless Person Re-Identification System Across the Edge-Cloud Continuum<\/em><br \/>Jianping Pei, Yanjun Shu, Zhuangyu Ma, Decheng Zuo and Zhan Zhang<\/p><p><b>CWS-CON-S13: Service Applications beyond the Web<br \/><\/b><strong>11:10 \u2013 12:20<\/strong><br \/><strong>Room: F2044<\/strong><br \/><strong>Session Chair: Deng Zhao, China University of Geosciences<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_185: <em>Dynamic Community Interest-aware Caching in Vehicular Edge Computing: A Spatio-temporal Topic Modeling and Potential Game-based Approach<\/em><br \/>Han Zhao, Yong Ma, Kunyin Guo, Yunni Xia, Yuyin Ma, Peng Chen and Yunye Wan<\/p><p style=\"padding-left: 40px\">CWS_REG_205:\u00a0<em>Causal Reasoning on Temporal Knowledge Graph with Fuzzy Logic and Graph Attention Network<\/em><br \/>Shixiang Cai, Zhirui Kuai, Li Kuang and Zhifang Liao<\/p><p style=\"padding-left: 40px\">CWS_ SHT_119: <em>Deep Reinforcement Learning-Empowered Task Offloading for Efficient DNN Partition in Vehicular Edge Computing<\/em><br \/>Huaming Wu, Fengyu Li and Huijun Tang<\/p><p style=\"padding-left: 40px\">CWS_ SHT_215: <em>USFCF: Unified State-Space Feedback Control Framework for Robust Privacy-Conscious Federated Learning in Vehicular Service Networks<\/em><br \/>Chen Li, Xuelei Qi, Xin Yuan, Kai Wu, Yang Zhang, Wei Ni, Ren Ping Liu and Quan Z. Sheng<\/p><p><b>CWS-CON-S14: Service Applications beyond the Web<br \/><\/b><strong>11:10 \u2013 12:20<\/strong><br \/><strong>Room: F2089<\/strong><br \/><strong>Session Chair: Mengyu Zhu, Zhejiang University<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_170: <em>EdgeIM: An Efficient Edge-based Process Model Discovery Technique<\/em><br \/>Xuan Su, Cong Liu, Faming Lu, Long Cheng, Qingtian Zeng and Shouli Zhang<\/p><p style=\"padding-left: 40px\">CWS_WIP_187:\u00a0<em>Enhancing Freshness and Energy Efficiency in Asynchronous Federated Learning: An AoI-Aware Online Approach<\/em><br \/>Jiebei Shi, Jie Chen, Ying Chen and Jiwei Huang<\/p><p style=\"padding-left: 40px\">CWS_ SHT_244: <em>Once-for-all: Resource-aware CNN Models for Visual Services on IoT Devices<\/em><br \/>Jinhui Yu, Chuntao Ding and Yidong Li<\/p><p><b>CWS-CON-S15: Service Applications beyond the Web<br \/><\/b><strong>13:40 \u2013 14:50<\/strong><br \/><strong>Room: F2044<br \/>Session Chair: Jiwei Huang, China University of Petroleum<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_343: <em>Heterogeneous Resources Adaptive Co-Optimization in Edge Networks<\/em><br \/>Yihong Yang, Zhangbing Zhou and Lin Meng<\/p><p style=\"padding-left: 40px\">CWS_ SHT_71: <em>A Novel User-Interest-Informed and Mobility-Aware Approach to Task Offloading in Mobile Edge Computing<\/em><br \/>Jiale Zhao, Yunni Xia, Yong Ma, Peng Chen, Yuyin Ma, Yumin Dong, Hui Liu, Tingyan Long and Xifeng Xu<\/p><p style=\"padding-left: 40px\">CWS_SHT_179: <em>Enhancing Manufacturing Process Discovery through Sub-process Optimization<\/em><br \/>Jiaxin Yan, Cong Liu, Long Cheng, Jiujun Cheng, Weijian Ni and Qingtian Zeng<\/p><p style=\"padding-left: 40px\">CWS_SHT_267: <em>A Framework for Object-centric Predictive Process Monitoring using Graph-based Process Executions<\/em><br \/>Wissam Gherissi, Joyce El Haddad and Daniela Grigori<\/p><p><b>CWS-CON-S16: Services Security, Privacy and Trust<br \/><\/b><strong>13:40 \u2013 14:50<\/strong><br \/><strong>Room: F2089<\/strong><br \/><strong>Session Chair: Guanjie Cheng, Zhejiang University<\/strong><\/p><p style=\"padding-left: 40px\">CWS_REG_312: <em>D\u00b3: Delayed Default-intention based Default Prediction in Financial Loan Service<\/em><br \/>Mengying Zhu, Guanjie Cheng, Mengyuan Yang and Guofang Ma<\/p><p style=\"padding-left: 40px\">CWS_REG_234: <em>BSTL: Bayesian Signal Temporal Logic for Predictive Edge Service Monitoring<\/em><br \/>Deng Zhao, Zhangbing Zhou, Shuiguang Deng, Xiao Xue, Ruixi Pan, Jiangwei Li and Sami Yangui<\/p><p style=\"padding-left: 40px\">CWS_WIP_45: <em>Service-Oriented Computation for Insider Trading Detection in Multiplex Networked Industrial Chains<\/em><br \/>Fulin Chen, Pan Li, Tienyu Zuo, Yuanshuang Jiang, Kai Di and Yichuan Jiang<\/p><p><b>ICWS keynote<br \/><\/b><b>15:10 \u2013 16:20<br \/><\/b><b>Room: F2044<br \/><\/b><strong>Session Chair: Zhongjie Wang, Harbin Institute of Technology<\/strong><\/p><p style=\"padding-left: 40px\">Prof. Petteri Nurmi, University of Helsinki<br \/><em>From Crowd Data to Cloud Solutions: Intelligent Services for Sustainable Smart Cities<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-358656664\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-358656664\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-7f230eb e-flex e-con-boxed e-con e-child\" data-id=\"7f230eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b30100d e-con-full e-flex e-con e-child\" data-id=\"b30100d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ba264e elementor-widget elementor-widget-text-editor\" data-id=\"6ba264e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>CWS-CON-S17: Service Applications beyond the Web<br \/><\/b><b>8:30 \u2013 9:40<br \/><\/b><b>Room: F2044<br \/>Session Chair: Deng Zhao, China University of Geosciences<\/b><\/p><p style=\"padding-left: 40px\"><b><\/b>CWS_REG_356: <i>DAG-FGL: An Enhanced Approach for Accurate Workflow Task Execution Time Prediction with Complex Dependencies<br \/><\/i>Changhong Tai, Huiying Jin, Qi Wang, Hai Dong and Pengcheng Zhang<\/p><p style=\"padding-left: 40px\">CWS_SHT_169: <i>Enhancing Healthcare Process Model Discovery through Duplicate Task Identification<br \/><\/i>Xuan Su, Cong Liu, Faming Lu, Long Cheng, Qingtian Zeng and Jiehan Zhou<\/p><p style=\"padding-left: 40px\">CWS_ SHT _138:<i> A Framework for Analyzing Abnormal Emergence in Service Ecosystems Through LLM-based Agent Intention Mining<br \/><\/i>Yifan Shen, Zihan Zhao, Xiao Xue, Yuwei Guo, Qun Ma, Deyu Zhou and Ming Zhang<\/p><p><b>CWS-CON-S18: Generative AI in Web Services<br \/><\/b><b>8:30 \u2013 9:40<\/b><b><br \/><\/b><b>Room: F2089<br \/><\/b><b>Session Chair: Junna Zhang, Henan Normal University, China<\/b><\/p><p style=\"padding-left: 40px\">CWS_ SHT_40: <i>Supervised Pretraining for In-Context Decision in Conversational Service Recommendation<br \/><\/i>Tienyu Zuo, Pan Li, Yuanshuang Jiang, Fulin Chen, Kai Di and Yichuan Jiang<\/p><p style=\"padding-left: 40px\">CWS_ SHT_196: <i>Unlocking Hidden Capabilities: A Self-Improving Workflow for Chatbots to Utilize Unintegrated Services<br \/><\/i>Can Wang, Hao Ding, Yongchao Xing, Bohai Zhao, Dianbo Sui and Zhiying Tu<\/p><p style=\"padding-left: 40px\">CWS_REG_218: <i>A Dynamic Inference Method for Autoregressive Transformer Models<br \/><\/i>Hao Tian, Sheng Lu, Hua Deng, Zheng Li and Wanchun Dou<\/p><p style=\"padding-left: 40px\">CWS_ SHT_327: <i>Generative AI-based Adaptation in Microservices Architectures: A Systematic Mapping Study<br \/><\/i>Brell Peclard Sanwouo Chekam, Paul Temple and Cl\u00e9ment Quinton<\/p><p><b>CWS-CON-S19: Service Applications beyond the Web<br \/><\/b><b>8:30 \u2013 9:40<br \/><\/b><b>Room: F3010<br \/><\/b><b>Session Chair: Yeqi Zhu, Harbin Institute of Technology<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_344: <i>A Verifiable and Low-Latency Cross-Chain IoT Service Query Scheme with Collaborative Indexing<br \/><\/i>Jiamei Liu, Chang-Ai Sun, Tong Wu and Marco Aiello<\/p><p style=\"padding-left: 40px\">CWS_ SHT_177: <i>An Explainable Emotion Alignment Framework for LLM-Empowered Agent in Metaverse Service Ecosystem<br \/><\/i>Qun Ma, Xiao Xue, Yifan Shen, Zihan Zhao and Ming Zhang<\/p><p style=\"padding-left: 40px\">CWS_SHT_283: <i>UAV-Mesh: A Graph-Based Decentralized Service Mesh Framework for UAV Swarms<br \/><\/i>Chenghang Liu, Han Yu, Nuo Chen, Bingqing Shen and Hongming Cai<\/p><p style=\"padding-left: 40px\">CWS_ SHT_284: <i>AeroDaaS: Towards an Application Programming Framework for Drones-as-a-Service<br \/><\/i>Suman Raj, Rajdeep Singh, Kautuk Astu and Yogesh Simmhan<\/p><p><b>CWS-CON-S20: Generative AI in Web Services<br \/><\/b><b>11:10 \u2013 12:20<br \/><\/b><b>Room: F2044<br \/><\/b><b>Session Chair: Prerak Srivastava, SAP Labs<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_130: <i>Scenario Generator Design Method for Service Ecosystem Governance driven by LLM-empowered Agents Simulation<br \/><\/i>Deyu Zhou, Yuqi Hou, Xiao Xue, Xudong Lu, Qingzhong Li and Lizhen Cui<\/p><p style=\"padding-left: 40px\">CWS_REG_178:\u00a0<i>CPP: Compensated Post-Training Pruning Approach for On-Device Large Language Model Services<br \/><\/i>Junna Zhang, Yifei Hu, Chuntao Ding, Xiaoyan Zhao, Peiyan Yuan and Shangguang Wang<\/p><p style=\"padding-left: 40px\">CWS_REG_280: <i>IntentContinuum: Using LLMs to Support Intent-Based Computing Across the Compute Continuum<br \/><\/i>Negin Akbari, John Grundy, Aamir Cheema and Adel N. Toosi<\/p><p style=\"padding-left: 40px\">CWS_WIP_60: <i>Revisiting Lemos\u2019 Taxonomy for Service Compositions with Large Language Models<br \/><\/i>Robin D. Pesl and Marco Aiello<\/p><p><b>CWS-CON-S21: Service Applications beyond the Web [IoT Services]<br \/><\/b><b>11:10 \u2013 12:20<br \/><\/b><b>Room: F2089<br \/><\/b><b>Session Chair: Yeqi Zhu, Harbin Institute of Technology<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_176: <i>SeFA: A Seed-Filter Adaptation Method for Robust Vision Services in IoT Devices<br \/><\/i>Chuntao Ding, Longquan Zhang, Junna Zhang, Zonghui Li and Li Zhang<\/p><p style=\"padding-left: 40px\">CWS_REG_194: <i>Adaptive Composition of Machine Learning as a Service (MLaaS) for IoT Environments<br \/><\/i>Deepak Kanneganti, Sajib Mistry, Sheik Mohammad Mostakim Fattah, Aneesh Krishna and Monowar Bhuyan<\/p><p style=\"padding-left: 40px\">CWS_REG_345: <i>SAGELY &#8211; Context-aware Holistic Service Policy Enforcement across Swarm-Edge Continuum<br \/><\/i>Hong-Tri Nguyen, Liang Yuan, Anh-Dung Nguyen, Ali Babar and Hong-Linh Truong<\/p><p style=\"padding-left: 40px\">CWS_SHT_306:<i> Minimizing the Number of Mobile Chargers in Wireless Rechargeable Sensor Networks<br \/><\/i>Ting Li, Quanlong Niu, Riheng Jia, Zhonglong Zheng and Minglu Li<\/p><p><b>CWS-CON-S22: Services Composition<br \/><\/b><b>11:10 \u2013 12:20<br \/><\/b><b>Room: F3010<br \/><\/b><b>Session Chair: Arif Wider, HTW Berlin<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_248: <i>Data Service Composition in Cyber-Physical Systems Adopting LLMs<br \/><\/i>Adriano Izzi, Jerin George Mathew, Flavia Monti, Donatella Firmani, Francesco Leotta, Federica Mandreoli and Massimo Mecella<\/p><p style=\"padding-left: 40px\">CWS_SHT_364: <i>Cross-chain IoT Service Composition: An Adaptive QoS <\/i>Constraint-based Approach<br \/>Jiamei Liu, Chang-Ai Sun, Tong Wu and Marco Aiello<\/p><p style=\"padding-left: 40px\">CWS_SHT_73:\u00a0<i>WebCoder: Multimodal Approach for Automated Web Service UI Code Generation<br \/><\/i>Huafeng Su, Lei Yu and Conghui Yang<\/p><p><b>CWS-CON-S23: Service Applications beyond the Web<br \/><\/b><b>13:40 \u2013 14:50<br \/><\/b><b>Room: F2044<br \/><\/b><b>Session Chair: Deng Zhao, China University of Geosciences<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_161: <i>A Novel Self-Attention-Enhanced Multi-Neighborhood PPO Scheduling Approach for Satellite Edge Computing<br \/><\/i>Xifeng Xu, Yunni Xia, Qinglan Peng, Xingli Zhong, Song Zhou, Kai Peng, Mengdi Wang and Jiale Zhao<\/p><p style=\"padding-left: 40px\">CWS_REG_103: <i>Enhancing Conditional Diffusion Model Robustness in Inference through Optimal Combination Factor<br \/><\/i>Weifeng Xu, Xiang Zhu and Xiaoyong Li<\/p><p style=\"padding-left: 40px\">CWS_REG_96: <i>SABER: A MAPE-K-based Self-Adaptive Framework for Microservice Bad Smell Refactoring<br \/><\/i>Yongchao Xing, Yiming Lv, Xianglin Zeng, Bohai Zhao, Kai Zhang, Hongliang Sun, Weipan Yang and Zhiying Tu<\/p><p style=\"padding-left: 40px\">CWS_SHT_93:\u00a0<i>Backoff Reveals Priority: A Distributed Status-aware Response Method for Device-assisted Task Offloading<br \/><\/i>Tianchun Gan, Shan Zhang, Wenbin Xu, Xiang Li, Zhiyuan Wang and Hongbin Luo<\/p><p><b>CWS-CON-S24: Machine Learning and AI in Service Systems<br \/><\/b><b>13:40 \u2013 14:50<br \/><\/b><b>Room: F2089<br \/><\/b><b>Session Chair: Flavia Monti, Sapienza Universit\u00e0 di Roma<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_192: <i>Layer-wise Decoupling for Personalized Federated Learning in Web-sourced Non-IID Data<br \/><\/i>Yong Cheng, Fengyu Dong, Ruoshui Wang, Haolong Xiang, Guoqiang Liu, Xiaoyong Li and Xu Xiaolong<\/p><p style=\"padding-left: 40px\">CWS_REG_82: <i>FedSKC: Federated Learning with Non-IID Data via Structural Knowledge Collaboration<br \/><\/i>Huan Wang, Haoran Li, Huaming Chen, Jun Yan, Lijuan Wang, Jiahua Shi, Shiping Chen and Jun Shen<\/p><p style=\"padding-left: 40px\">CWS_SHT_214: <i>A Cost-aware Approach for Collaborating Large Language Models and Small Language Models<br \/><\/i>Zheng Li, Hua Deng, Sheng Lu, Hao Tian and Wanchun Dou<\/p><p style=\"padding-left: 40px\">CWS_SHT_324: <i>HAPFL: Heterogeneity-aware Personalized Federated Learning via Hierarchical RL and Model Distillation<br \/><\/i>Xi Chen, Ting Wang, Qin Li and Haibin Cai<\/p><p><b>CWS-CON-S25: Services QoS Management<br \/><\/b><b>13:40 \u2013 14:50<br \/><\/b><b>Room: F3010<br \/><\/b><b>Session Chair: Zekun Zhang, Wuhan University<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_50: <i>POI-Based Edge Service Deployment With Topology-Aware Optimization<br \/><\/i>Guobing Zou, Mengjia Yang, Song Yang, Shengye Pang, Sen Niu, Yanglan Gan and Bofeng Zhang<\/p><p style=\"padding-left: 40px\">CWS_ REG_373: <i>MGG-AD: Multi-Granularity Graph-Based Anomaly Detection in IIoT Systems<br \/><\/i>Yi Li, Zhangbing Zhou, Boris Sedlak and Schahram Dustdar<\/p><p style=\"padding-left: 40px\">CWS_REG_85: <i>EdgePro: Adaptive Edge Service Provision via Safe Deep Reinforcement Learning<br \/><\/i>Lu Zhao, Zhuang Wu, Jian Zhou, Hui Cai, Bo Li and Fu Xiao<\/p><p style=\"padding-left: 40px\">CWS_WIP_20: <i>LDP-QWSP: A General Local Differential Privacy Framework for QoS-based Web Service Prediction<br \/><\/i>Fuchang Luo, Haonan Wu, Shunshun Peng, Quanwang Wu, Hongbing Wang and Taolin Guo<\/p><p><b>CWS-CON-S26: Service Adaptability and Management<br \/><\/b><b>15:10 \u2013 16:20<br \/><\/b><b>Room: F2044<br \/><\/b><b>Session Chair: Boualem Benatallah, Jacky Cao<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_188: <i>PreFabric: Eliminating Conflicts for High-Throughput Permissioned Blockchains<br \/><\/i>Junxiong Lin, Yiguang Zhang, Zhihui Lu, Ruijun Deng, Qiang Duan, Hengqi Guo, Xu Guo and Baoqi Huang<\/p><p style=\"padding-left: 40px\">CWS_REG_256: <i>Learning-based Automated Generation of Critical Workload Configurations for Microservices Performance Testing<br \/><\/i>Luca Giamattei, Antonio Guerriero, Cristian Mascia, Roberto Pietrantuono and Stefano Russo<\/p><p style=\"padding-left: 40px\">CWS_SHT_377: <i>ServerlessLSM: Disaggregated Compaction for Elastic Serverless LSM-tree Key-value Store<br \/><\/i>Mingxuan Liu, Jianhua Gu and Tianhai Zhao<\/p><p><b>CWS-CON-S27: Services QoS Management<br \/><\/b><b>15:10 \u2013 16:20<br \/><\/b><b>Room: F2089<br \/>Session Chair: Junna Zhang, Henan Normal University<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_95: <i>In\u00b3Edge: Interest-Driven Service Incentive Mechanism Based on Stackelberg Game in Edge-Empowered IIoT<br \/><\/i>Bohai Zhao, Zhiying Tu, Kai Peng, Yongchao Xing, Kai Zhang, Hongliang Sun and Dianhui Chu<\/p><p style=\"padding-left: 40px\">CWS_REG_140: <i>Reliability-aware Resource Allocation for Vehicular Services in Mobile Edge Computing<br \/><\/i>Lipei Yang, Sisi Li, Ao Zhou, Xiao Ma, Yiran Zhang and Shangguang Wang<\/p><p style=\"padding-left: 40px\">CWS_REG_146: <i>A Two-Stage Predictive Process Monitoring Approach with Enabled State Filtering for Variable Suffix Scenarios<br \/><\/i>Chao Zheng, Jian Wang, Chong Wang and Bing Li<\/p><p><b>CWS-CON-S28: Microservices\u00a0<br \/><\/b><b>15:10 \u2013 16:20<br \/><\/b><b>Room: F3010<br \/><\/b><b>Session Chair: Prerak Srivastava, SAP Labs<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_7: <i>AMSES: A Novel Autonomic Model Construction Framework for System Fault Diagnosis of Microservice Architecture<br \/><\/i>Yujia Song, Yunni Xia, Peng Chen, Hui Liu, Yong Ma and Xiqiao Lin<\/p><p style=\"padding-left: 40px\">CWS_REG_22:<i> DistriAD: Distributed Anomaly Detection for Large-Scale Microservice Systems<br \/><\/i>Yaxiao Li, Qingshan Li, Chenxi Zhang, Lu Wang, Chenyi Wang, Zhongliang Bai, Haixing Luo, Tianyuan Gao, Kun Ma and Lingfeng Pan<\/p><p style=\"padding-left: 40px\">CWS_WIP_268: <i>Log-driven Testing of Microservice Systems with Transformers<br \/><\/i>Raffaele Della Corte, Roberto Pietrantuono and Stefano Russo<\/p><p><b>CWS-CON-S29: Services Composition<br \/><\/b><b>16:20 \u2013 17:30<br \/><\/b><b>Room: F2044<br \/><\/b><b>Session Chair: Robin Pesl, University of Stuttgart<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_260: <i>liBERTa: Local Intelligence via Browser Extensions for Real-Time Applications<br \/><\/i>Francesco De Feudis, Ivano Bilenchi, Corrado Fasciano, Filippo Gramegna, Floriano Scioscia and Michele Ruta<\/p><p style=\"padding-left: 40px\">CWS_WIP_74: <i>APICoder: A Multi-Role Large Language Model Framework for API Service Call Code Generation<br \/><\/i>Conghui Yang, Lei Yu, Huafeng Su and Xiang Zhou<\/p><p style=\"padding-left: 40px\">CWS_WIP_129: <i>ServerlessIE: A Reusable Information Extraction System with Serverless Function<br \/><\/i>Jingru Yang, Lingran Bu, Di Wu, Jinfeng Wen and Yi Liu<\/p><p><b>CWS-CON-S30: Services Security, Privacy and Trust<br \/><\/b><b>16:20 \u2013 17:30<br \/><\/b><b>Room: F2089<br \/><\/b><b>Session Chair: TBA<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_370: <i>KubeGuard: A Systematic Permission-Oriented Risk Detection Approach for Kubernetes Applications<br \/><\/i>Chang-Ai Sun, Xiaoyan Han and Yufei Gong<\/p><p style=\"padding-left: 40px\">CWS_SHT_365: <i>SAGA: A Lightweight Authentication and Key Agreement Protocol for Resource-Asymmetric Smart Environments with Safe Service<br \/><\/i>Junfeng Tian, Jian Geng and Siyi Zhang<\/p><p style=\"padding-left: 40px\">CWS_SHT_318:\u00a0<i>Revisiting NFT Transactions in Web 3.0 Service Through the Lenses of Higher-Order Network<br \/><\/i>Hao Ding, Can Wang, Jiasi Li, Hongmei Ren, Xuefeng Piao, Huihui Song and Zhenzhou Ji<\/p><p style=\"padding-left: 40px\">CWS_WIP_386: <i>Enhancing Service Observability Through Bytecode-Level Variable Monitoring<br \/><\/i>Taizheng Wang, Wei Chang, Chaoyi Li, Chunyang Ye and Hui Zhou<\/p><p><b>CWS-CON-S31: Services Composition<br \/><\/b><b>16:20 \u2013 17:30<br \/><\/b><b>Room: F3010<br \/><\/b><b>Session Chair: Yongchao Xing, Harbin Institute of Technology<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_123: <i>DIJS: A Dual Interference-aware Job Scheduling Framework for Co-located Data Centers<br \/><\/i>Qin Hua, Yufeng Deng, Kaixuan Zhang, Shiyou Qian, Dingyu Yang, Jian Cao and Guangtao Xue<\/p><p style=\"padding-left: 40px\">CWS_WIP_332: <i>SimSched: Optimized Service Scheduling in Heterogeneous CPU Clusters via Program Similarity Analysis<br \/><\/i>Jiayin Luo, Yuxin Ma, Xinkui Zhao, Guanjie Cheng, Chen Zhi, Yueshen Xu, Shuiguang Deng and Jianwei Yin<\/p><p style=\"padding-left: 40px\">CWS_WIP_133: <i>A Word is Worth 4-bit: Efficient Log Parsing with Binary Coded Decimal Recognition<br \/><\/i>Prerak Srivastava, Giulio Corallo and Sergey Rybalko<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-358656665\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-358656665\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\" elementor-element elementor-element-eef57db e-flex e-con-boxed e-con e-child\" data-id=\"eef57db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4503884 e-con-full e-flex e-con e-child\" data-id=\"4503884\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a27c322 elementor-widget elementor-widget-text-editor\" data-id=\"a27c322\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>CWS-CON-S32: Service Optimization<br \/><\/b><b>8:30 \u2013 9:40<br \/><\/b><b>Room: F2044<br \/><\/b><b>Session Chair: Sami Yangui, Alexander Engelhardt<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_120:\u00a0<i>FedDSSL: Decentralized Federated Semi-Supervised Learning for Limitedly Annotated Data<br \/><\/i>Yue Huang, Baochen Zhang, Lanju Kong, Qingzhong Li and Lizhen Cui<\/p><p style=\"padding-left: 40px\">CWS_SHT_51: <i>STGNN-Based Microservice Autoscaling and Placement for Fast QoS Recovery at the Edge<br \/><\/i>Yue Wu, Haitao Zhang and Yepeng Zhang<\/p><p style=\"padding-left: 40px\">CWS_WIP_304: <i>Scheduling Strategy for Deep Learning Training Jobs Based on Multi-Resource Interleaving<br \/><\/i>Yuheng Zheng, Jienan Lin, Xing Chen, Bin Lin and Yun Ma<\/p><p><b>CWS-CON-S33: Service Optimization<br \/><\/b><b>8:30 \u2013 9:40<br \/><\/b><b>Room F2089<br \/><\/b><b>Session Chair: Hong-Tri Nguyen, Aalto University<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_110: <i>Cross-Chain Options: A Bridgeless, Universal, and Efficient Approach<br \/><\/i>Zifan Peng, Yingjie Xue and Jingyu Liu<\/p><p style=\"padding-left: 40px\">CWS_REG_46:\u00a0<i>DecoupleChain: A Two-Layer Blockchain Sharding System Enabling Frequent Shard Reconfiguration<br \/><\/i>Huawei Huang, Miaoyong Xu, Chenlin Wu, Xiaofei Luo, Jian Zheng, Jianru Lin and Zibin Zheng<\/p><p style=\"padding-left: 40px\">CWS_SHT_375:\u00a0<i>Scalable Policy-as-Code Decision Points for Data Products<br \/><\/i>Matteo Brambilla and Pierluigi Plebani<\/p><p><b>CWS-CON-S34: Services Discovery, Selection and Recommendation<br \/><\/b><b>8:30 \u2013 9:40<br \/><\/b><b>Room: F3010<br \/><\/b><b>Session Chair: Yi Li<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_18: \u00a0<i>Hypergraph-based De-conjecture Knowledge Tracing for Intelligent Educational Services<br \/><\/i>Chenyu Hou, Aochen You, Bin Cao, Dongjing Wang and Jing Fan<\/p><p style=\"padding-left: 40px\">CWS_ SHT_294: <i>Knowledge-Enhanced Conversational Service with Proactive Interaction for Disease Diagnosis<br \/><\/i>Bolin Zhang, Weihao Lian, Yunmeng Zhou, Bei Li, Zhiying Tu, Dianhui Chu and Naishu Zhang<\/p><p style=\"padding-left: 40px\">CWS_WIP_55: <i>HGAE: Heterogeneous Graph Auto-Encoder-based Service Bundle Recommendations for Efficient Mashup Development<br \/><\/i>Kaipu Sun, Xuanye Wang, Meng Xi, Yangyang Wu, Xiaohua Pan, Jinshan Zhang, Ying Li, Kun Ma and Jianwei Yin<\/p><p><b>CWS-CON-S35: Generative AI in Web Services<br \/><\/b><b>10:00 \u2013 11:10<br \/><\/b><b>Room: F2044<br \/><\/b><b>Session Chair: Michael Sheng<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_13: <i>EvoAPR: Enhancing Large Language Models for Automatic Program Repair with Genetic Algorithm and Dynamic LoRA<br \/><\/i>Huan Zhang, Qingyang Yan, Weihuan Min, Chenyuan Zhang, Li Kuang and Yingjie Xia<\/p><p style=\"padding-left: 40px\">CWS_WIP_84: <i>ChainAttack: Black-Box Adversarial Attacks on Generative AI Services via Chain-of-Thought<br \/><\/i>Xixi Zheng, Zihao Xu, Xuhao Ren, Chuan Zhang and Liehuang Zhu<\/p><p style=\"padding-left: 40px\">CWS_WIP_80: <i>A Hybrid Approach Combining LLMs and Web-Based Information for Automated Fact-Checking<br \/><\/i>Kenji Oki, Kazuhiro Yamashita and Shinya Kitajima<\/p><p style=\"padding-left: 40px\">CWS_WIP_89: <i>Automating Data Governance with Generative AI<br \/><\/i>Linus W. Dietz, Arif Wider and Simon Harrer<\/p><p><b>CWS-CON-S37: Service Recommendation &amp; Classification<br \/><\/b><b>10:00 \u2013 11:10<br \/><\/b><b>Room: F3010<br \/><\/b><b>Session Chair: Sami Yangui, Alexander Engelhardt<\/b><\/p><p style=\"padding-left: 40px\">CWS_ SHT_42: <i>Managing Hybrid Dynamics in Multiplex Service Networks: A Group-based Task Migration Approach<br \/><\/i>Kai Di, Pan Li, Tienyu Zuo, Yuanshuang Jiang, Fulin Chen and Yichuan Jiang<\/p><p style=\"padding-left: 40px\">CWS_ SHT_67:\u00a0<i>GGRME: A GGNN-based Graph Reconstruction Method for Microservice Extraction<br \/><\/i>Ying Xu, Ying Li, Suxiang Wu, Linghao Li, Xinzhou Zhu, Meng Xi and Jianwei Yin<\/p><p style=\"padding-left: 40px\">CON_REG_12: <em>Availability Guaranteed and Resource Efficient VNF Placement in SDN\/NFV-Enabled Network Through Traffic Forecasting<\/em><br \/>Yi Yue, Bo Cheng, Shiding Sun, Wencong Yang, Xiongyan Tang<\/p><p style=\"padding-left: 40px\">CON_REG_31: <em>Latent Graph Structure Learning for Service-Oriented Complex Network: Task Definition, Data Simulation, and Applications in Service Ecosystem<\/em><br \/>Tianyu Jiang, Zhongjie Wang, Mingyi Liu<\/p><p><b>CWS-CON-S38: Services Security, Privacy and Trust<br \/><\/b><b>11:10 \u2013 12:20<br \/><\/b><b>Room: 2044<br \/><\/b><b>Session Chair: Yi Li<\/b><\/p><p style=\"padding-left: 40px\">CWS_REG_147:\u00a0<i>Knowledge-augmented Contrastive Learning and Multi-modal Fusion for Fake News Detection Service in Social Network<br \/><\/i>Zhen Xia, Shuai Zhao, Jiale Han and Junliang Chen<\/p><p style=\"padding-left: 40px\">CWS_SHT_358:<i> StealthHub: UTXO-Based Stealth Address Protocol<br \/><\/i>Hanze Guo, Yebo Feng, Cong Wu, Zengpeng Li and Jiahua Xu<\/p><p style=\"padding-left: 40px\">CWS_WIP_148: <i>SharedRXC: A Trustless Privacy-Preserving Asset Cross-Chain Scheme by Liability Equalization<br \/><\/i>Jitao Wang, Nong Tang, Kai Wang and Weili Han<\/p><p style=\"padding-left: 40px\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Part of the 2025 IEEE World Congress on SERVICES July 7-12Helsinki, Finland Home ICWS Program Symposium: Graph Data Mining for Services Call for Papers ICWS Organizers ICWS 2025 &#8211; Program July 8 July 9 July 10 July 11 July 12 CWS-CON-S1: Service Discovery, Selection and Recommendation10:50 \u2013 12:00Room: F2044Session Chairs: Kai Zhang, Harbin Institute of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-573","page","type-page","status-publish","hentry"],"featured_image_src":null,"featured_image_src_square":null,"_links":{"self":[{"href":"https:\/\/services.conferences.computer.org\/2025\/wp-json\/wp\/v2\/pages\/573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/services.conferences.computer.org\/2025\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/services.conferences.computer.org\/2025\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/services.conferences.computer.org\/2025\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/services.conferences.computer.org\/2025\/wp-json\/wp\/v2\/comments?post=573"}],"version-history":[{"count":0,"href":"https:\/\/services.conferences.computer.org\/2025\/wp-json\/wp\/v2\/pages\/573\/revisions"}],"wp:attachment":[{"href":"https:\/\/services.conferences.computer.org\/2025\/wp-json\/wp\/v2\/media?parent=573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}