Computing

Papers
(The TQCC of Computing is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
A priority aware local mutual exclusion algorithm for flying ad hoc networks95
High-performance microservice differentiated domain communication technology69
A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid61
Simulafed: an enhanced federated simulated environment for privacy and security in health60
Deep anomaly detection on attributed networks by graph update59
Daas composition: enhancing UAV delivery services via LSTM-based resource prediction and flight patterns mining51
AI Techniques in the Microservices Life-Cycle: a Systematic Mapping Study46
A model-based infrastructure for the specification and runtime execution of self-adaptive IoT architectures46
PCA-based compression of deep LSTMs: a robust framework for uncertain industrial systems41
Cloud data center cost management using virtual machine consolidation with an improved artificial feeding birds algorithm41
Optimized embedded AI: efficient implementation of CNNs on ESP32-CAM for real-time image classification38
An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment31
One step forward, two steps back: ML-based malware detection under concept drift31
Maintaining temporal validity of real-time data in component-based systems30
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications30
Mobility management in space-ground-integrated networks29
An exploratory study of rethinking user experience in the internet of things29
Smart data flow: a trust-driven hybrid fragmentation framework for optimizing data transmission in IoT-enabled edge-fog-cloud systems29
Task assignment strategy in LEO-muti-access edge computing based on matching game28
LUMF-YOLO: a lightweight object detection network integrating UAV motion features28
Data and resource aware incremental ML training in support of pervasive applications27
Heuristic algorithm for an optimal solution of fully fuzzy transportation problem27
A novel and efficient salp swarm algorithm for large-scale QoS-aware service composition selection27
Local resampling for locally weighted Naïve Bayes in imbalanced data26
Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion25
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing24
An online mechanism for resource provisioning and allocation in vehicle computing24
Evaluation of mobile autonomous robot in trajectory optimization24
Deep recommendation with iteration directional adversarial training23
Intelligent and compliant dynamic software license consolidation in cloud environment23
Joint task caching and privacy protecting task offloading for edge computing in industrial internet22
A proactive and uncertainty driven management mechanism for workflows of processing tasks22
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems22
Employing topology modification strategies in scale-free IoT networks for robustness optimization22
A hybrid online learning based predictive maintenance system for industry 4.022
A review on synergizing knowledge graphs and large language models20
Online virtual network function placement in 5G networks20
Energy-efficient scheduling based on task prioritization in mobile fog computing19
Trends in continuous evaluation of software architectures19
TIGM: a temporal influence graph-based method for fair and diverse group recommendations19
Edge data distribution as a network Steiner tree estimation in edge computing18
Edge-driven Docker registry: facilitating XR application deployment18
Ethereum fraud behavior detection based on graph neural networks17
A multi-objective crow search algorithm for optimizing makespan and costs in scientific cloud workflows (CSAMOMC)17
A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network17
Voluntary resource sharing at the network edge to provide cloud services: a systematic survey17
Task scheduling in edge-fog-cloud architecture: a multi-objective load balancing approach using reinforcement learning algorithm16
Runtime verification of electronic stability control system in automated vehicles with STL3 formalism16
Stochastic model-driven capacity planning framework for multi-access edge computing15
Community detection of weighted complex networks via transitive closure15
ALBLA: an adaptive load balancing approach in edge-cloud networks utilizing learning automata14
A novel discrete ICO algorithm for influence maximization in complex networks14
Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking14
Efficient hashing technique for malicious profile detection at hypervisor environment14
Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net14
Service-oriented and cloud computing14
Energy-efficient virtual machine placement algorithm based on power usage14
Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline14
Deep reinforcement learning based QoE-aware actor-learner architectures for video streaming in IoT environments14
Courier information recognition based on an improved YOLOv8 visual servoing system14
GPU cluster dynamics: insights from Alibaba’s 2023 trace release13
Umpalumpa: a framework for efficient execution of complex image processing workloads on heterogeneous nodes13
Towards high-availability cyber-physical systems using a microservice architecture13
Corporate social responsibility disclosure prediction using LSTM neural network13
An experience-based classification of quantum bugs in quantum software13
A novel routing method in hybrid DTN–MANET networks in the critical situations13
Machine learning approaches to network intrusion detection for contemporary internet traffic13
Extended efficiency and soft-fairness multiresource allocation in a cloud computing system13
Enhancing continuous integration predictions: a hybrid LSTM-GRU deep learning framework with evolved DBSO algorithm12
Exploring the impact of chaos engineering with various user loads on cloud native applications: an exploratory empirical study12
Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics12
An effective representation learning model for link prediction in heterogeneous information networks11
Retraction Note: A novel PCA-DC-Bagging algorithm on yield stress prediction of RAFM steel11
Proactive missing values imputation based on reinforcement learning11
Special issue on advances in data, information and knowledge engineering in data science era11
Balanced multi-view clustering with dynamic consistency exploration among multiple views10
MARLFuzz: industrial control protocols fuzzing based on multi-agent reinforcement learning10
F-yolov7: fast and robust real-time UAV detection10
Improved NSGA-III based resource scheduling strategy for Kubernetes10
An adaptive online reinforcement learning approach for optimizing computation offloading in connected vehicle networks10
Combining unsupervised and supervised classification for customer value discovery in the telecom industry: a deep learning approach10
Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies10
DIMA: machine learning based dynamic infrastructure management for containerized applications10
Four vector intelligent metaheuristic for data optimization10
Secured trust and reputation management framework for cloud service in cloud computing10
Impact of ML optimization tactics on greener pre-trained ML models9
Achieving starvation-freedom in multi-version transactional memory systems9
Optimal sequential computation offloading and migration in mobile edge computing with multi-task priority9
An enhanced whale optimization algorithm with inertia weight and dynamic parameter adaptation for wireless sensor network deployment9
FedBPM:A decentralized federated meta-method for heterogeneous and complex image classification via multi-scale feature fusion9
TinyML strategies for privacy-preserving and cyber threat multi-classification in edge-IoT networks9
A systematic mapping study on automated analysis of privacy policies9
Sustainable energy management in the AI era: a comprehensive analysis of ML and DL approaches9
A V2V2I routing algorithm for Internet of Vehicles based on adaptive variable beacon power9
Mapping and just-in-time traffic congestion mitigation for emergency vehicles in smart cities9
Correction to: Special issue on “artificial intelligence in cloud computing”8
Multi-objective cuckoo optimizer for task scheduling to balance workload in cloud computing8
UAV-assisted wireless charging and data processing of power IoT devices8
Inter-mesh routing algorithms in LEO satellite constellations networks8
Energy generation forecasting: elevating performance with machine and deep learning8
MANIFESTO: a huMAN-centric explaInable approach for FakE news spreaders deTectiOn8
A distributed task orchestration scheme in collaborative vehicular cloud edge networks8
Large language models: a new approach for privacy policy analysis at scale8
Scaling down to scale up: benchmarking single-machine graph processing frameworks in a hardware-constrained environment7
A systematic literature review of blockchain-based e-KYC systems7
VNF placement in NFV-enabled networks: considering time-varying workloads and multi-tenancy with a throughput optimization heuristic7
Special issue on link prediction in complex networks7
A survey on fault diagnosis algorithms for high-speed train bearings7
A framework for modeling and executing task-Specific resource allocations in business processes7
Qos-based web service selection using time-aware collaborative filtering: a literature review7
An energy-adaptive clustering method based on Taguchi-based-GWO optimizer for wireless sensor networks with a mobile sink7
Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems7
An ant colony path planning optimization based on opposition-based learning for AUV in irregular regions7
Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring7
Edge exploration of anonymous graph by mobile agent with external help7
Energy-aware and trust-based cluster head selection in healthcare WBANs with enhanced GWO optimization7
Efficient dynamic load balancing in software-defined networks using policy gradient: a strategy for enhanced QoS and reduced energy consumption7
Content-aware susceptibility estimation for influence prediction on social networks7
Analysis of evolutionary multi-objective algorithms for data center electrical systems7
Generalizing truth discovery by incorporating multi-truth features7
Correction to: Optimizing pre‑copy live virtual machine migration in cloud computing using machine learning‑based prediction model7
An optimal sensor configuration method using genetic algorithms for a fault-tolerant energy management for smart buildings7
Deep reinforcement learning-based optimal deployment of IoT machine learning jobs in fog computing architecture7
Mpbs:research on mini-batch partitioning algorithm based on self-organizing map network7
Identifying vital spreaders in complex networks based on the interpretative structure model and improved Kshell6
Cost and performance-effective dynamic VM type selection in auto-scaling using reinforcement learning6
Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain6
Resource allocation and cost optimization in relay-assisted mobile edge computing6
A fast and accurate coupled meshless algorithm for the 2D/3D Gross–Pitaevskii equations on two GPUs6
Approximating vision transformers for edge: variational inference and mixed-precision for multi-modal data6
Correction: Automatic video captioning using tree hierarchical deep convolutional neural network and ASRNN-bi-directional LSTM6
Solving dimension reduction problems for classification using Promoted Crow Search Algorithm (PCSA)6
A novel collaborative privacy protection scheme based on verifiable secret sharing and trust mechanism6
Enhancing sine cosine algorithm based on social learning and elite opposition-based learning6
Using a random forest to predict quantized reuse distance in an SSD write buffer6
Priority-based DAG task offloading and secondary resource allocation in IoT edge computing environments6
Driver fatigue detection based on facial multi-feature fusion computing6
The embedded feature selection method using ANT colony optimization with structured sparsity norms6
Hierarchical traffic engineering with PSO: a path to efficient congestion management in SDN6
Citation recommendation using modified HITS algorithm6
Efficient DNN training based on backpropagation parallelization6
ST-Resnet: a deep learning-based privacy preserving differential publishing method for location statistics6
Dynamic attention guider network6
An advanced parallel hybrid metaheuristic approach for multi-objective optimization in cloud task scheduling6
A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction6
0.12018299102783