Future Generation Computer Systems-The International Journal of Escien

Papers
(The median citation count of Future Generation Computer Systems-The International Journal of Escien is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
M2FaaS: Transparent and fault tolerant FaaSification of Node.js monolith code blocks585
An edge–fog architecture for distributed 3D reconstruction557
On efficient matching of spatiotemporal rules401
Enhancing interconnection network topology for chiplet-based systems: An automated design framework379
A genetic algorithm with selective repair method under combined-criteria for deadline-constrained IoT workflow scheduling in Fog–Cloud computing341
Global reduction for geo-distributed MapReduce across cloud federation220
Trajectory privacy preservation model based on LSTM-DCGAN217
Enhancing network security using knowledge graphs and large language models for explainable threat detection159
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks144
CyberAIBot: Artificial Intelligence in an intrusion detection system for CyberSecurity in the IoT134
Blockchain and timely auction mechanism-based spectrum management130
Advances in power consumption model for data centers: Analytical formulas vs. machine learning models129
Optimizing mobile blockchain networks: A game theoretical approach to cooperative multi-terminal computation124
Designing a QEMU plugin to profile multicore long vector RISC-V architectures: RAVE117
Enhancing fog IoT container deployment: A customizable Kubernetes scheduler105
ORION: Verification of drone trajectories via remote identification messages101
DART: A state-aware online co-scheduling runtime for data-parallel training99
An ultrasound standard plane detection model of fetal head based on multi-task learning and hybrid knowledge graph98
FedShufde: A privacy preserving framework of federated learning for edge-based smart UAV delivery system97
Scalability through Pulverisation: Declarative deployment reconfiguration at runtime90
PPSFL: Privacy-Preserving Split Federated Learning for heterogeneous data in edge-based Internet of Things90
A Knapsack-based Metaheuristic for Edge Server Placement in 5G networks with heterogeneous edge capacities90
DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering86
Latency-aware scheduling for data-oriented service requests in collaborative IoT-edge-cloud networks86
Dynamic characterisation of cyberattacks based on the MITRE ATT&CK framework applied to the optimisation of a mitigation selection process80
Zero-trust blockchain-enabled framework for scalable and secure IoT networks80
PCL-BPRE: privacy-preserving certificateless-based broadcast proxy re-encryption for data sharing in cloud-based IIoT79
Finite-horizon energy allocation scheme in energy harvesting-based linear wireless sensor network78
MedT2T: An adaptive pointer constrain generating method for a new medical text-to-table task78
Improving WSN-based dataset using data augmentation for TSCH protocol performance modeling78
Privacy-preserving workflow scheduling in geo-distributed data centers77
An out-of-core method for GPU image mapping on large 3D scenarios of the real world75
Investigation on cellular LTE C-V2X network serving vehicular data traffic in realistic urban scenarios74
Leveraging a visual language for the awareness-based design of interaction requirements in digital twins74
HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach73
Harnessing federated learning for anomaly detection in supercomputer nodes73
Secure blockchain-based reputation system for IIoT-enabled retail industry with resistance to sybil attack72
Benchmarking parallel programming for single-board computers72
AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation71
A comparative benchmark study of LLM-based threat elicitation tools71
Fog node discovery and selection: A Systematic literature review70
Reducing inference energy consumption using dual complementary CNNs69
Learning protein language contrastive models with multi-knowledge representation68
Flight: A FaaS-based framework for complex and Hierarchical Federated Learning68
A hybrid quantum-classical particle-in-cell method for plasma simulations66
Blockchain and digital twin empowered edge caching for D2D wireless networks66
On-device AI and digital twins: A synergistic approach to intelligent cyber-physical systems66
SPAE: Lifelong disk failure prediction via end-to-end GAN-based anomaly detection with ensemble update65
MIGTNet: Metapath Instance-based Graph Transformation Network for heterogeneous graph embedding65
Def-Ag: An energy-efficient decentralized federated learning framework via aggregator clients65
SkyFlow: Heterogeneous streaming for skyline computation using FlowGraph and SYCL62
Enforcing group fairness in privacy-preserving Federated Learning62
Consolidation of virtual machines to reduce energy consumption of data centers by using ballooning, sharing and swapping mechanisms61
Cost-aware routing for computation offloading in knowledge-defined AIoT61
Task offloading in vehicular fog computing: State-of-the-art and open issues61
Special Issue on Intelligent Architectures and Platforms for Private Edge Cloud Systems61
A collaborative semantic framework based on activities for the development of applications in Smart Home living labs60
A Q-Learning-based distributed routing protocol for frequency-switchable magnetic induction-based wireless underground sensor networks60
Evolutionary optimization of spatially-distributed multi-sensors placement for indoor surveillance environments with security levels59
EB-BFT: An elastic batched BFT consensus protocol in blockchain59
Regen: An object layout regenerator on large-scale production HPC systems58
Editorial Board58
A multi-output prediction model for physical machine resource usage in cloud data centers57
Practical volume-hiding range searchable symmetric encryption using trusted execution57
Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems56
Editorial Board56
Xel: A cloud-agnostic data platform for the design-driven building of high-availability data science services56
Low-cost and high-performance channel access strategies for Internet of Nano-Things applications56
Curriculum classification network based on margin balancing multi-loss and ensemble learning55
Leveraging conditional generative models in a general explanation framework of classifier decisions55
Energy consumption estimation and profiling for queries in distributed database systems based on a bottom-up comprehensive energy model55
Principled and automated system of systems composition using an ontological architecture54
DNS user profiling and risk assessment: A learning approach53
Layer-wise partitioning and merging for efficient and scalable deep learning51
LA-MDPF: A forwarding strategy based on learning automata and Markov decision process in named data networking51
Online scheduling of coflows by attention-empowered scalable deep reinforcement learning51
An automated and portable method for selecting an optimal GPU frequency51
Self-aware collaborative edge inference with embedded devices for IIoT51
Evaluating NiFi and MQTT based serverless data pipelines in fog computing environments50
Is quantum optimization ready? An effort towards neural network compression using adiabatic quantum computing50
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things50
A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing50
HGGN: Prediction of microRNA-Mediated drug sensitivity based on interpretable heterogeneous graph global-attention network50
Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges50
EGNN: Energy-efficient anomaly detection for IoT multivariate time series data using graph neural network49
A deep reinforcement learning based algorithm for time and cost optimized scaling of serverless applications49
Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things49
A novel CTGAN-ENN hybrid approach to enhance the performance and interpretability of machine learning black-box models in intrusion detection and IoT49
Assessing the accuracy of remote sensing data products: A multi-granular spatial sampling method49
A blockchain-adaptive contractual approach for multi-contracting organizational entities48
A systematic literature review of IoT time series anomaly detection solutions48
An optimization framework for task allocation in the edge/hub/cloud paradigm48
Consensus-based distributed orchestration framework for microservices in edge computing clusters48
PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow47
Cost-aware scheduling for streaming applications in geographically distributed heterogeneous cloud47
Multidimensional architecture using a massive and heterogeneous data: Application to drought monitoring47
Multi-objective optimal scheduling for multi-microgrids via hierarchical timed colored Petri net: A model-data-driven approach45
Digital twins for essential services45
Advancing towards a marine digital twin platform: Modeling the mar menor coastal lagoon ecosystem in the south western Mediterranean45
Dynamic client-resource management in federated learning over Internet of Vehicles: A Lyapunov-driven game-theoretic approach45
An energy efficient and runtime-aware framework for distributed stream computing systems44
Recognition of Outstanding Future Generation Computer Systems Reviewers for 202244
Decentralised Identity Management solution for zero-trust multi-domain Computing Continuum frameworks44
Optimal service caching, pricing and task partitioning in mobile edge computing federation44
Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework44
FSVNet: Federated Self-driving Vehicle Network based on decomposition global convergence44
HSCFC: High-dimensional streaming data clustering algorithm based on feedback control system43
Editorial Board43
A feature-based survey of Fog modeling languages43
An extended analytical framework for heterogeneous implementations of light cryptographic algorithms43
DAG-based workflows scheduling using Actor–Critic Deep Reinforcement Learning42
A multi-hierarchy particle swarm optimization-based algorithm for cloud workflow scheduling42
Enabling performance portability on the LiGen drug discovery pipeline42
A novel authentication and key agreement scheme for Internet of Vehicles42
Adversarial robustness benchmark for EEG-based brain–computer interfaces42
A fusion recommendation model based on mutual information and attention learning in heterogeneous social networks42
7 μJ/inference end-to-end gesture recognition 42
A novel dung beetle optimization algorithm based on Lévy flight and triangle walk41
Autoscaling of microservice resources based on dense connectivity spatio-temporal GNN and Q-learning41
An adaptive robust defending algorithm against backdoor attacks in federated learning41
AdaptFL: Adaptive Federated Learning Framework for Heterogeneous Devices40
Look-ahead workflow scheduling with width changing trend in clouds40
Expanding SafeSU capabilities by leveraging security frameworks for contention monitoring in complex SoCs40
CUPID: An efficient spatio-temporal data engine40
Extreme-scale workflows: A perspective from the JLESC international community40
Editorial Board40
ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing39
DAFL: Domain adaptation-based federated learning for privacy-preserving biometric recognition39
SNI-CIDS: Collaborative intrusion detection using modified ensemble stacking deep neural networks for new network integration in heterogeneous networks39
Uncertainty-aware scheduling for effective data collection from environmental IoT devices through LEO satellites39
Energy-efficient discrete Haar Wavelet Transform architectures exploring approximate adders for high-quality image compression and reconstruction39
A heterogeneous network embedded medicine recommendation system based on LSTM38
Validating the performance of GPU ports using differential performance models38
On-device derivation of IoT usage control policies: Automating U-XACML policy generation from natural language with LLMs in smart homes environments38
Comparing Adiabatic Quantum Computers for satellite images feature extraction38
miniLB: Benchmarking Lattice Boltzmann simulations on AMD, Intel, and NVIDIA GPUs38
Engineering opportunistic digital twins with lingua franca38
Modeling and Energy-Optimal Control for Freight Trains based on Data-Driven Approaches38
Skip index: Supporting efficient inter-block queries and query authentication on the blockchain38
A framework for supporting the reproducibility of computational experiments in multiple scientific domains37
Deep Reinforcement Learning-based scheduling for optimizing system load and response time in edge and fog computing environments37
A Blockchain-based Digital Twin for IoT deployments in logistics and transportation37
Vehicular-NDN: Geo-Anchored Datasets37
Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare37
Designing secure business processes for blockchains with SecBPMN2BC37
Distributed and heterogeneous tensor–vector contraction algorithms for high performance computing37
TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation37
Digital twin framework for smart greenhouse management using next-gen mobile networks and machine learning37
Editorial Board36
Joint optimization of multi-dimensional resource allocation and task offloading for QoE enhancement in Cloud-Edge-End collaboration36
Efficient and privacy-preserving group signature for federated learning36
A mask guided cross data augmentation method for industrial defect detection36
Privacy and security-aware workflow scheduling in a hybrid cloud36
BTG: A Bridge to Graph machine learning in telecommunications fraud detection36
Editorial Board36
Federated Discrete Reinforcement Learning for Automatic Guided Vehicle Control36
MLQM: Machine learning approach for accelerating optimal qubit mapping36
Adaptive incremental transfer learning for efficient performance modeling of big data workloads35
Truthful auction mechanisms for resource allocation in the Internet of Vehicles with public blockchain networks35
Blockchain-escorted distributed deep learning with collaborative model aggregation towards 6G networks35
APapo: An asynchronous parallel optimization method for DNN models35
A secure multi-party payment channel on-chain and off-chain supervisable scheme35
Bridging usability and performance: High-level abstractions for advanced accelerator cluster programming35
Blending lossy and lossless data compression methods to support health data streaming in smart cities35
DeFuseDTI: Interpretable drug target interaction prediction model with dual-branch encoder and multiview fusion34
A package-aware scheduling strategy for edge serverless functions based on multi-stage optimization34
Connected vehicles’ dynamic route planning based on reinforcement learning34
A Bayesian game-enhanced auction model for federated cloud services using blockchain34
Quantune: Post-training quantization of convolutional neural networks using extreme gradient boosting for fast deployment34
Editorial Board34
A feature selection-based method for DDoS attack flow classification33
Corrigendum to “DEEPSEL: A novel feature selection for early identification of malware in mobile applications” [Future Gener. Comput. Syst. 129 (2022) 54–63]33
PAC: A monitoring framework for performance analysis of compression algorithms in Spark33
Assuming the best: Towards a reliable protocol for resource usage prediction for high-performance computing based on machine learning33
Improving self-supervised vertical federated learning with contrastive instance-wise similarity and dynamical balance pool33
A self-organized MoE framework for distributed federated learning33
DeScan: Censorship-resistant indexing and search for Web333
Transplantation and optimization of molecular dynamics simulation on MT-300033
Robustness evaluation of large-scale machine learning-based reduced order models for reproducing flow fields33
A terminology for scientific workflow systems33
SpAIware: Uncovering a novel artificial intelligence attack vector through persistent memory in LLM applications and agents32
An exploration of online-simulation-driven portfolio scheduling in Workflow Management Systems32
An optimized feature extraction algorithm for abnormal network traffic detection32
The utility of complexity metrics during code reviews for CSE software projects32
Memory access optimization for the dynamics EVP model of the sea ice model on the SW39000 on-chip heterogeneous many-core processor32
Dynamic weighted ensemble learning for sequential recommendation systems: The AIRE model32
Resilience and performance quantification of dynamic reconfiguration32
A scalable modified deep reinforcement learning algorithm for serverless IoT microservice composition infrastructure in fog layer31
Routing in LoRa for smart cities: A gossip study31
FLPM: A property modification scheme for data protection in federated learning31
Reinforcement learning-based dynamic pruning for distributed inference via explainable AI in healthcare IoT systems31
Leading Smart Environments towards the Future Internet through Name Data Networking: A survey31
A novel bi-anomaly-based intrusion detection system approach for industry 4.031
Formal specification and executable analysis of digital twin systems using Maude rewriting logic31
Adaptive ensemble optimization for memory-related hyperparameters in retraining DNN at edge31
A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges31
BEAST: Behavior as a Service for Trust management in IoT devices31
SLO-aware dynamic self-adaptation of resources31
Dynamic authenticated keyword search in hybrid-storage blockchain31
Distributed cache optimization for Metaverse scenarios under 3D Gaussian Splatting rendering31
Mitigating bias in artificial intelligence: Fair data generation via causal models for transparent and explainable decision-making30
Editorial Board30
Blockchain for the metaverse: A Review30
Combining declarative and linear programming for application management in the cloud-edge continuum30
Optimizing fog device deployment for maximal network connectivity and edge coverage using metaheuristic algorithm30
SDN Spotlight: A real-time OpenFlow troubleshooting framework30
Performance portability of sparse matrix–vector multiplication implemented using OpenMP, OpenACC and SYCL30
Analysis of security and data control in smart personal assistants from the user’s perspective30
BDPM: A secure batch dynamic password management scheme in industrial internet environments30
Cloud-native alternating directions solver for isogeometric analysis30
EADRAN: An edge marketplace for federated learning30
Optimizing data placement and size configuration for morphable NVM based SPM in embedded multicore systems30
An interpretable deep learning model predicts RNA–small molecule binding sites29
3DSGIMD: An accurate and interpretable molecular property prediction method using 3D spatial graph focusing network and structure-based feature fusion29
CAGO-ECIL: Cloud-Assisted Genetic Optimization for Edge-Class Incremental Learning with training acceleration29
SCTD: A spatiotemporal correlation truth discovery scheme for security management of data platform29
Regularity-driven pattern extraction and analysis approach by the pre-pruning technique without pattern loss29
DynFed: Dynamic test-time adaptation for federated learning with adaptive rate networks29
Multi-type task offloading for wireless Internet of Things by federated deep reinforcement learning29
Prediction model of performance–energy trade-off for CFD codes on AMD-based cluster29
Software Quality Assurance as a Service: Encompassing the quality assessment of software and services29
Energy-efficient task scheduling for mobile edge computing with virtual machine I/O interference29
Research on transaction allocation strategy in blockchain state sharding29
Deciphering the abundance of immune cells in glomerular endothelium of Alport syndrome kidneys using the deconvolution algorithm CONVdeconv29
Tightly-integrated quantum–classical computing using the QHDL hardware description language28
A personalized federated cloud-edge collaboration framework via cross-client knowledge distillation28
Efficient and provably secured puncturable attribute-based signature for Web 3.028
A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks28
Low dimensional secure federated learning framework against poisoning attacks28
Trustable service discovery for highly dynamic decentralized workflows28
Edge aggregation placement for semi-decentralized federated learning in Industrial Internet of Things28
End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum28
A sparse attack method on skeleton-based human action recognition for intelligent metaverse application28
Evaluation of Juliana Tool: A translator for Julia’s CUDA.jl code into KernelAbstraction.jl28
On floating point precision in computational fluid dynamics using OpenFOAM27
SD-SRF: An Intelligent Service Deployment Scheme for Serverless-operated Cloud-Edge Computing in 6G Networks27
Small models, big impact: A review on the power of lightweight Federated Learning27
CTF-DDI: Constrained tensor factorization for drug–drug interactions prediction27
ELECT: Energy-efficient intelligent edge–cloud c27
Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM27
MobiPCR: Efficient, accurate, and strict ML-based mobile malware detection27
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain27
Geant4: A game changer in high energy physics and related applicative fields27
AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things27
EVRM: Elastic Virtual Resource Management framework for cloud virtual instances27
A generative AI-based approach for resilient service composition under cybersecurity attacks in cloud-fog networks27
Collaborative anomaly detection in log data: Comparative analysis and evaluation framework27
Lightweight block ciphers for resource-constrained environments: A comprehensive survey27
Cost-effective stochastic resource placement in edge clouds with horizontal and vertical sharing27
Analyzing inference workloads for spatiotemporal modeling27
0.17133498191833