Future Generation Computer Systems-The International Journal of Escien

Papers
(The median citation count of Future Generation Computer Systems-The International Journal of Escien is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks484
Improving WSN-based dataset using data augmentation for TSCH protocol performance modeling472
Reducing inference energy consumption using dual complementary CNNs445
Scalability through Pulverisation: Declarative deployment reconfiguration at runtime367
Advances in Power Consumption Model for Data Centers: Analytical Formulas vs. Machine Learning Models293
An edge–fog architecture for distributed 3D reconstruction279
Bridging separate communities with common interest in distributed social networks through the use of social objects278
SPAE: Lifelong disk failure prediction via end-to-end GAN-based anomaly detection with ensemble update258
On efficient matching of spatiotemporal rules217
Fog node discovery and selection: A Systematic literature review195
CLARA: A novel clustering-based resource-allocation mechanism for exploiting low-availability complementarities of voluntarily contributed nodes169
Special issue on senti-mental health: Future generation sentiment analysis systems168
Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge167
An out-of-core method for GPU image mapping on large 3D scenarios of the real world151
STPD: Defending against 0143
Learning protein language contrastive models with multi-knowledge representation137
Latency-aware scheduling for data-oriented service requests in collaborative IoT-edge-cloud networks127
Finite-horizon energy allocation scheme in energy harvesting-based linear wireless sensor network125
DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering118
ORION: Verification of drone trajectories via remote identification messages116
A distributed Monte Carlo based linear algebra solver applied to the analysis of large complex networks115
Blockchain and digital twin empowered edge caching for D2D wireless networks113
An ultrasound standard plane detection model of fetal head based on multi-task learning and hybrid knowledge graph113
Representing emotions with knowledge graphs for movie recommendations112
Secure blockchain-based reputation system for IIoT-enabled retail industry with resistance to sybil attack111
SkyFlow: Heterogeneous streaming for skyline computation using FlowGraph and SYCL111
PPSFL: Privacy-Preserving Split Federated Learning for heterogeneous data in edge-based Internet of Things111
MIGTNet: Metapath Instance-based Graph Transformation Network for heterogeneous graph embedding110
Blockchain-based decentralized reputation system in E-commerce environment109
Leveraging a visual language for the awareness-based design of interaction requirements in digital twins108
Investigation on cellular LTE C-V2X network serving vehicular data traffic in realistic urban scenarios104
MedT2T: An adaptive pointer constrain generating method for a new medical text-to-table task101
Optimizing mobile blockchain networks: A game theoretical approach to cooperative multi-terminal computation96
Benchmarking parallel programming for single-board computers96
Global reduction for geo-distributed MapReduce across cloud federation94
Enhancing interconnection network topology for chiplet-based systems: An automated design framework90
Harnessing federated learning for anomaly detection in supercomputer nodes89
FedShufde: A privacy preserving framework of federated learning for edge-based smart UAV delivery system88
Privacy-preserving workflow scheduling in geo-distributed data centers87
Optimizing makespan and resource utilization for multi-DNN training in GPU cluster84
Autoencoder-based feature construction for IoT attacks clustering83
Enforcing group fairness in privacy-preserving Federated Learning82
M2FaaS: Transparent and fault tolerant FaaSification of Node.js monolith code blocks82
CyberAIBot: Artificial Intelligence in an intrusion detection system for CyberSecurity in the IoT80
HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach79
Trajectory privacy preservation model based on LSTM-DCGAN76
Blockchain and timely auction mechanism-based spectrum management75
AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation75
Self-aware collaborative edge inference with embedded devices for IIoT74
Special Issue on Intelligent Architectures and Platforms for Private Edge Cloud Systems74
A Knapsack-based Metaheuristic for Edge Server Placement in 5G networks with heterogeneous edge capacities74
Temporal sensitive heterogeneous graph neural network for news recommendation73
Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges73
Energy consumption estimation and profiling for queries in distributed database systems based on a bottom-up comprehensive energy model71
Leveraging conditional generative models in a general explanation framework of classifier decisions70
A blockchain-adaptive contractual approach for multi-contracting organizational entities70
Editorial Board70
EB-BFT: An elastic batched BFT consensus protocol in blockchain69
Retraction notice to “Smart Health Monitoring and Management System: Toward autonomous wearable sensing for Internet of Things using Big Data Analytics” [Future Gener. Comput. Syst. 91 (2019) 611–619]68
Low-cost and high-performance channel access strategies for Internet of Nano-Things applications67
Editorial Board66
Cora: Data correlations-based storage policies for cloud object storage66
Detecting malicious behavior in social platforms via hybrid knowledge- and data-driven systems65
Regen: An object layout regenerator on large-scale production HPC systems63
Curriculum classification network based on margin balancing multi-loss and ensemble learning63
Editorial Board62
Xel: A cloud-agnostic data platform for the design-driven building of high-availability data science services62
A secure localization scheme based on trust assessment for WSNs using blockchain technology62
An optimization framework for task allocation in the edge/hub/cloud paradigm62
A collaborative semantic framework based on activities for the development of applications in Smart Home living labs60
Multi-Objective Optimal Scheduling for Multi-Microgrids via Hierarchical Timed Colored Petri Net: A Model-Data-Driven Approach60
A multi-output prediction model for physical machine resource usage in cloud data centers59
Kafka-ML: Connecting the data stream with ML/AI frameworks59
Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems58
Evaluating NiFi and MQTT based serverless data pipelines in fog computing environments58
Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things58
Multidimensional architecture using a massive and heterogeneous data: Application to drought monitoring58
Layer-wise partitioning and merging for efficient and scalable deep learning57
Assessing the accuracy of remote sensing data products: A multi-granular spatial sampling method56
LA-MDPF: A forwarding strategy based on learning automata and Markov decision process in named data networking56
Evolutionary optimization of spatially-distributed multi-sensors placement for indoor surveillance environments with security levels56
Offloading dependent tasks in multi-access edge computing: A multi-objective reinforcement learning approach55
ACMF: An Attention Collaborative Extended Matrix Factorization Based Model for MOOC course service via a heterogeneous view55
PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow55
A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing54
Motion recognition technology of badminton players in sports video images54
A novel study on deep learning framework to predict and analyze the financial time series information53
Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework53
Optimizing 2-opt-based heuristics on GPU for solving the single-row facility layout problem53
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things53
An energy efficient and runtime-aware framework for distributed stream computing systems52
Decentralised Identity Management solution for zero-trust multi-domain Computing Continuum frameworks52
Consensus-Based Distributed Orchestration Framework for Microservices in Edge Computing Clusters52
Online scheduling of coflows by attention-empowered scalable deep reinforcement learning51
A Q-Learning-based distributed routing protocol for frequency-switchable magnetic induction-based wireless underground sensor networks51
Task offloading in vehicular fog computing: State-of-the-art and open issues51
An automated and portable method for selecting an optimal GPU frequency51
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things51
EGNN: Energy-efficient anomaly detection for IoT multivariate time series data using graph neural network51
Principled and automated system of systems composition using an ontological architecture51
Lattice-based public key searchable encryption with fine-grained access control for edge computing51
HGGN: Prediction of microRNA-Mediated drug sensitivity based on interpretable heterogeneous graph global-attention network50
Distributed and heterogeneous tensor–vector contraction algorithms for high performance computing50
Integration of type-2 fuzzy logic and Dempster–Shafer Theory for accurate inference of IoT-based health-care system50
A systematic literature review of IoT time series anomaly detection solutions50
FSVNet: Federated Self-driving Vehicle Network based on decomposition global convergence49
A fusion recommendation model based on mutual information and attention learning in heterogeneous social networks49
DR-BFT: A consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system49
Optimal service caching, pricing and task partitioning in mobile edge computing federation49
Look-ahead workflow scheduling with width changing trend in clouds49
Enabling performance portability on the LiGen drug discovery pipeline48
Federated Discrete Reinforcement Learning for Automatic Guided Vehicle Control48
Joint optimization of multi-dimensional resource allocation and task offloading for QoE enhancement in Cloud-Edge-End collaboration48
DAG-based workflows scheduling using Actor–Critic Deep Reinforcement Learning48
AdaptFL: Adaptive Federated Learning Framework for Heterogeneous Devices47
A heterogeneous network embedded medicine recommendation system based on LSTM47
Efficient dynamic multi-replica auditing for the cloud with geographic location47
TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation46
Modeling and Energy-Optimal Control for Freight Trains based on Data-Driven Approaches46
Skip index: Supporting efficient inter-block queries and query authentication on the blockchain46
7 μJ/inference end-to-end gesture recognition 46
Editorial Board46
A fast-iterative reconstruction algorithm for sparse angle CT based on compressed sensing46
Recognition of Outstanding Future Generation Computer Systems Reviewers for 202246
An extended analytical framework for heterogeneous implementations of light cryptographic algorithms46
HSCFC: High-dimensional streaming data clustering algorithm based on feedback control system45
A feature-based survey of Fog modeling languages44
DAFL: Domain adaptation-based federated learning for privacy-preserving biometric recognition44
ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing44
Comparing Adiabatic Quantum Computers for satellite images feature extraction43
Research on calculation model of bottom of the well pressure based on machine learning43
A multi-hierarchy particle swarm optimization-based algorithm for cloud workflow scheduling43
A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls43
Editorial Board43
Constructing a prior-dependent graph for data clustering and dimension reduction in the edge of AIoT42
Extreme-scale workflows: A perspective from the JLESC international community42
Cloud-based privacy- and integrity-protecting density peaks clustering42
Expanding SafeSU capabilities by leveraging security frameworks for contention monitoring in complex SoCs42
An Anti-Malicious Task Allocation Mechanism in Crowdsensing Systems42
CUPID: An efficient spatio-temporal data engine42
A mask guided cross data augmentation method for industrial defect detection41
Uncertainty-aware scheduling for effective data collection from environmental IoT devices through LEO satellites41
An adaptive robust defending algorithm against backdoor attacks in federated learning41
A novel authentication and key agreement scheme for Internet of Vehicles40
Digital twin framework for smart greenhouse management using next-gen mobile networks and machine learning40
Designing secure business processes for blockchains with SecBPMN2BC40
A Blockchain-based Digital Twin for IoT deployments in logistics and transportation40
Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare40
Privacy and security-aware workflow scheduling in a hybrid cloud40
Adversarial robustness benchmark for EEG-based brain–computer interfaces40
Software-defined DDoS detection with information entropy analysis and optimized deep learning40
Robustness evaluation of large-scale machine learning-based reduced order models for reproducing flow fields39
The utility of complexity metrics during code reviews for CSE software projects39
Improving self-supervised vertical federated learning with contrastive instance-wise similarity and dynamical balance pool39
Editorial Board39
Deep cognitive diagnosis model for predicting students’ performance39
Efficient and privacy-preserving group signature for federated learning39
Blending lossy and lossless data compression methods to support health data streaming in smart cities39
An exploration of online-simulation-driven portfolio scheduling in Workflow Management Systems39
Blockchain-escorted distributed deep learning with collaborative model aggregation towards 6G networks39
BTG: A Bridge to Graph machine learning in telecommunications fraud detection39
Deep Reinforcement Learning-based scheduling for optimizing system load and response time in edge and fog computing environments39
BEAST: Behavior as a Service for Trust management in IoT devices39
A novel bi-anomaly-based intrusion detection system approach for industry 4.039
Adaptive ensemble optimization for memory-related hyperparameters in retraining DNN at edge38
Human resource recommendation algorithm based on improved frequent itemset mining38
Retraction notice to “A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem” [Future Gener. Comput. Syst. 85 (2018) 129–145]37
A guide to design uncertainty-aware self-adaptive components in Cyber–Physical Systems37
Analysis and experimental research on stability characteristics of squatting posture of wearable lower limb exoskeleton robot37
A secure multi-party payment channel on-chain and off-chain supervisable scheme37
Corrigendum to “DEEPSEL: A novel feature selection for early identification of malware in mobile applications” [Future Gener. Comput. Syst. 129 (2022) 54–63]37
A fuzzy based Co-Operative Blackmailing Attack detection scheme for Edge Computing nodes in MANET-IOT environment37
PAC: A monitoring framework for performance analysis of compression algorithms in Spark37
Massive-scale complicated human action recognition: Theory and applications37
Editorial Board37
Outage analysis of mmWave-NOMA transmission in the presence of LOS and NLOS paths36
APapo: An asynchronous parallel optimization method for DNN models36
FLPM: A property modification scheme for data protection in federated learning36
DeScan: Censorship-resistant indexing and search for Web336
Reinforcement learning-based dynamic pruning for distributed inference via explainable AI in healthcare IoT systems36
A scalable modified deep reinforcement learning algorithm for serverless IoT microservice composition infrastructure in fog layer36
Transplantation and optimization of molecular dynamics simulation on MT-300036
Dynamic weighted ensemble learning for sequential recommendation systems: The AIRE model36
Dynamic authenticated keyword search in hybrid-storage blockchain36
A Bayesian game-enhanced auction model for federated cloud services using blockchain36
Leading Smart Environments towards the Future Internet through Name Data Networking: A survey35
A package-aware scheduling strategy for edge serverless functions based on multi-stage optimization35
SLO-aware dynamic self-adaptation of resources35
A feature selection-based method for DDoS attack flow classification34
Efficient heterogeneous matrix profile on a CPU + High Performance FPGA with integrated HBM34
Enabling cross-continent provider fairness in educational recommender systems34
Truthful auction mechanisms for resource allocation in the Internet of Vehicles with public blockchain networks34
Optimizing fog device deployment for maximal network connectivity and edge coverage using metaheuristic algorithm34
Physical layer security for Internet of Things via reconfigurable intelligent surface34
Bridging Usability and Performance: High-Level Abstractions for Advanced Accelerator Cluster Programming33
Adaptive incremental transfer learning for efficient performance modeling of big data workloads33
DeFuseDTI: Interpretable drug target interaction prediction model with dual-branch encoder and multiview fusion33
An optimized feature extraction algorithm for abnormal network traffic detection33
Quantune: Post-training quantization of convolutional neural networks using extreme gradient boosting for fast deployment33
Detecting covert communities in multi-layer networks: A network embedding approach33
Connected vehicles’ dynamic route planning based on reinforcement learning33
Context and auto-interaction are all you need: Towards context embedding based QoS prediction via automatic feature interaction for high quality cloud API delivery33
Resilience and performance quantification of dynamic reconfiguration32
A self-organized MoE framework for distributed federated learning32
Routing in LoRa for smart cities: A gossip study32
A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges32
Mitigating bias in artificial intelligence: Fair data generation via causal models for transparent and explainable decision-making32
Blockchain for the metaverse: A Review32
Special issue on co-design of data and computation management in Fog Computing31
Editorial Board31
Cloud-native alternating directions solver for isogeometric analysis31
Optimizing data placement and size configuration for morphable NVM based SPM in embedded multicore systems31
SD-SRF: An Intelligent Service Deployment Scheme for Serverless-operated Cloud-Edge Computing in 6G Networks31
Low dimensional secure federated learning framework against poisoning attacks31
SDD: A trusted display of FIDO2 transaction confirmation without trusted execution environment31
End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum31
MobiPCR: Efficient, accurate, and strict ML-based mobile malware detection31
Retraction notice to “Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem” [Future Gener. Comput. Syst. 89 (2018) 19–30]31
BDPM: A secure batch dynamic password management scheme in industrial internet environments31
SDN Spotlight: A real-time OpenFlow troubleshooting framework31
A sparse attack method on skeleton-based human action recognition for intelligent metaverse application31
Cost-effective stochastic resource placement in edge clouds with horizontal and vertical sharing31
Small models, big impact: A review on the power of lightweight Federated Learning30
Edge aggregation placement for semi-decentralized federated learning in Industrial Internet of Things30
Multi-type task offloading for wireless Internet of Things by federated deep reinforcement learning30
3DSGIMD: An accurate and interpretable molecular property prediction method using 3D spatial graph focusing network and structure-based feature fusion30
Energy-efficient task scheduling for mobile edge computing with virtual machine I/O interference30
Evaluation of Juliana Tool: A translator for Julia’s CUDA.jl code into KernelAbstraction.jl30
An interpretable deep learning model predicts RNA–small molecule binding sites30
Performance portability of sparse matrix–vector multiplication implemented using OpenMP, OpenACC and SYCL30
Geant4: A game changer in high energy physics and related applicative fields29
Reliable customer analysis using federated learning and exploring deep-attention edge intelligence29
Efficient and provably secured puncturable attribute-based signature for Web 3.029
Software Quality Assurance as a Service: Encompassing the quality assessment of software and services29
A wearable-based posture recognition system with AI-assisted approach for healthcare IoT29
Connection-density-aware satellite-ground federated learning via asynchronous dynamic aggregation29
AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things29
A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks29
Energy-efficient VM scheduling based on deep reinforcement learning29
SCTD: A spatiotemporal correlation truth discovery scheme for security management of data platform29
Deciphering the abundance of immune cells in glomerular endothelium of Alport syndrome kidneys using the deconvolution algorithm CONVdeconv29
Trustable service discovery for highly dynamic decentralized workflows29
Regularity-driven pattern extraction and analysis approach by the pre-pruning technique without pattern loss28
Special Issue on Machine Learning and Knowledge Graphs28
Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM28
A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network28
CoNet: Co-occurrence neural networks for recommendation28
Prediction model of performance–energy trade-off for CFD codes on AMD-based cluster28
CTF-DDI: Constrained tensor factorization for drug–drug interactions prediction28
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain28
0.30159592628479