Future Generation Computer Systems-The International Journal of Escien

Papers
(The TQCC of Future Generation Computer Systems-The International Journal of Escien is 18. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Slime mould algorithm: A new method for stochastic optimization1722
A survey on the security of blockchain systems939
An overview on smart contracts: Challenges, advances and platforms571
A survey on security and privacy of federated learning541
ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis429
BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence314
Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework259
Multi-population differential evolution-assisted Harris hawks optimization: Framework and case studies256
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city254
Recent advancements and challenges of Internet of Things in smart agriculture: A survey243
An intelligent healthcare monitoring framework using wearable sensors and social networking data218
An ensemble machine learning approach through effective feature extraction to classify fake news216
Sentiment analysis of Twitter data during critical events through Bayesian networks classifiers191
A survey on blockchain for big data: Approaches, opportunities, and future directions191
Analysis of healthcare big data181
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic179
From blockchain consensus back to Byzantine consensus179
Blockchain for the metaverse: A Review177
Privacy-preserving blockchain-based federated learning for traffic flow prediction159
OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city158
Big data analysis of the Internet of Things in the digital twins of smart city based on deep learning156
A survey of human-in-the-loop for machine learning149
Securing internet of medical things systems: Limitations, issues and recommendations146
Intelligent mobile malware detection using permission requests and API calls145
Scheduling Internet of Things requests to minimize latency in hybrid Fog–Cloud​ computing144
Multiple cloud storage mechanism based on blockchain in smart homes141
Transformer based Deep Intelligent Contextual Embedding for Twitter sentiment analysis138
Semantic segmentation for multiscale target based on object recognition using the improved Faster-RCNN model127
A survey: Cyber-physical-social systems and their system-level design methodology124
Deep learning-based cardiovascular image diagnosis: A promising challenge121
Human action recognition using attention based LSTM network with dilated CNN features121
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities121
Iota Tangle: A cryptocurrency to communicate Internet-of-Things data121
Q-learning based dynamic task scheduling for energy-efficient cloud computing120
A framework for privacy-preservation of IoT healthcare data using Federated Learning and blockchain technology119
Improving NSGA-III algorithms with information feedback models for large-scale many-objective optimization119
Similarity-based Android malware detection using Hamming distance of static binary features119
Intelligent edge computing based on machine learning for smart city117
TrustChain: A Sybil-resistant scalable blockchain116
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network114
The application research of neural network and BP algorithm in stock price pattern classification and prediction114
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN112
Task optimization and scheduling of distributed cyber–physical system based on improved ant colony algorithm110
A review of sentiment analysis research in Arabic language110
Detection and diagnosis of chronic kidney disease using deep learning-based heterogeneous modified artificial neural network109
Machine learning for assisting cervical cancer diagnosis: An ensemble approach108
A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework107
Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 105
From big data to smart energy services: An application for intelligent energy management100
Optimized container scheduling for data-intensive serverless edge computing100
Data collection from WSNs to the cloud based on mobile Fog elements99
Self-adaptive resource allocation for cloud-based software services based on iterative QoS prediction model99
Investigating performance constraints for blockchain based secure e-voting system98
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems98
A bibliometric analysis and visualization of blockchain97
An effective hybrid collaborative algorithm for energy-efficient distributed permutation flow-shop inverse scheduling92
Serverless execution of scientific workflows: Experiments with HyperFlow, AWS Lambda and Google Cloud Functions92
Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection91
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)90
A novel trust mechanism based on Fog Computing in Sensor–Cloud System89
Emotion recognition by deeply learned multi-channel textual and EEG features89
Research on strong agile response task scheduling optimization enhancement with optimal resource usage in green cloud computing85
Advanced optimization technique for scheduling IoT tasks in cloud-fog computing environments85
Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics85
Heart disease identification from patients’ social posts, machine learning solution on Spark85
Defending network intrusion detection systems against adversarial evasion attacks82
Genetic convolutional neural network for intrusion detection systems81
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things80
Artificial intelligence for securing industrial-based cyber–physical systems80
Deep learning framework based on integration of S-Mask R-CNN and Inception-v3 for ultrasound image-aided diagnosis of prostate cancer80
Driverless vehicle security: Challenges and future research opportunities79
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain79
Runtime verification for business processes utilizing the Bitcoin blockchain79
Design and application of fog computing and Internet of Things service platform for smart city78
A Blockchain Tokenizer for Industrial IOT trustless applications78
Constructing a prior-dependent graph for data clustering and dimension reduction in the edge of AIoT78
Big Data analytics and Computational Intelligence for Cyber–Physical Systems: Recent trends and state of the art applications77
Heterogeneous edge computing open platforms and tools for internet of things76
Classification of optimization problems in fog computing75
Transformer fault diagnosis method using IoT based monitoring system and ensemble machine learning74
Offloading decision methods for multiple users with structured tasks in edge computing for smart cities74
LGIEM: Global and local node influence based community detection74
Tracking and collision avoidance of virtual coupling train control system74
Content-based multi-source encrypted image retrieval in clouds with privacy preservation73
Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection73
Simultaneous left atrium anatomy and scar segmentations via deep learning in multiview information with attention72
Agent-based middleware framework using distributed CPS for improving resource utilization in smart city72
A task scheduling algorithm considering game theory designed for energy management in cloud computing72
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach71
Attention-based sentiment analysis using convolutional and recurrent neural network71
A Stackelberg game approach to multiple resources allocation and pricing in mobile edge computing71
Handwriting dynamics assessment using deep neural network for early identification of Parkinson’s disease71
Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data70
Saving time and cost on the scheduling of fog-based IoT applications using deep reinforcement learning approach70
A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems70
A variant form of 3D-UNet for infant brain segmentation69
Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication69
Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment69
Aggression detection through deep neural model on Twitter69
An adaptive federated learning scheme with differential privacy preserving69
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments68
Multiple improved residual networks for medical image super-resolution68
Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud67
Searchain: Blockchain-based private keyword search in decentralized storage67
MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost67
LEChain: A blockchain-based lawful evidence management scheme for digital forensics67
Detecting botnet by using particle swarm optimization algorithm based on voting system66
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace66
A framework for anomaly detection and classification in Multiple IoT scenarios66
A blockchain-based eHealthcare system interoperating with WBANs66
DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges65
A state-of-the-art survey on solving non-IID data in Federated Learning65
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense64
Artificial intelligence-enabled Internet of Things-based system for COVID-19 screening using aerial thermal imaging64
Optimization of real-time traffic network assignment based on IoT data using DBN and clustering model in smart city64
Integration of Big Data analytics embedded smart city architecture with RESTful web of things for efficient service provision and energy management63
Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes63
Lightweight cryptography in IoT networks: A survey63
Real time dataset generation framework for intrusion detection systems in IoT61
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks61
Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT61
BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments61
GAN augmentation to deal with imbalance in imaging-based intrusion detection61
Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network60
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber–physical system60
A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems60
A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers60
A lightweight supervised intrusion detection mechanism for IoT networks60
Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis58
SenseChain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers58
Fuzzy-based Driver Monitoring System (FDMS): Implementation of two intelligent FDMSs and a testbed for safe driving in VANETs58
A two-way trust management system for fog computing58
Privacy-preserving quality prediction for edge-based IoT services58
Multi-objective scheduling of extreme data scientific workflows in Fog58
Slow-movement particle swarm optimization algorithms for scheduling security-critical tasks in resource-limited mobile edge computing58
Blockchain-based data privacy management with Nudge theory in open banking57
Cecoin: A decentralized PKI mitigating MitM attacks57
Handling missing data in near real-time environmental monitoring: A system and a review of selected methods57
An efficient data integrity auditing protocol for cloud computing56
Smart vehicle forensics: Challenges and case study56
Robust detection of atrial fibrillation from short-term electrocardiogram using convolutional neural networks55
Human–computer interaction-based Decision Support System with Applications in Data Mining55
A blockchain-based preserving and sharing system for medical data privacy55
Evaluation of IoT stream processing at edge computing layer for semantic data enrichment55
An efficient smart parking pricing system for smart city environment: A machine-learning based approach53
Context-aware collect data with energy efficient in Cyber–physical cloud systems53
Fingerprint classification and identification algorithms for criminal investigation: A survey53
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare53
Augmented whale feature selection for IoT attacks: Structure, analysis and applications53
A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment53
Superposition Graph Neural Network for offshore wind power prediction52
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications52
IoMT-based computational approach for detecting brain tumor52
A fair protocol for data trading based on Bitcoin transactions51
Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics51
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs51
Internet of things forensic data analysis using machine learning to identify roots of data scavenging51
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications50
Smart building creation in large scale HVAC environments through automated fault detection and diagnosis50
Scheduling workflows with privacy protection constraints for big data applications on cloud50
Dynamic fog-to-fog offloading in SDN-based fog computing systems50
BiLSTM deep neural network model for imbalanced medical data of IoT systems50
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence50
File- and API-based interoperability of digital twins by model transformation: An IIoT case study using asset administration shell50
Novel binary logistic regression model based on feature transformation of XGBoost for type 2 Diabetes Mellitus prediction in healthcare systems49
Building the Internet of Things platform for smart maternal healthcare services with wearable devices and cloud computing49
Scalable multi-channel dilated CNN–BiLSTM model with attention mechanism for Chinese textual sentiment analysis49
Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services49
Towards energy efficient service composition in green energy powered Cyber–Physical Fog Systems48
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data48
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling48
Blockchain-enabled fraud discovery through abnormal smart contract detection on Ethereum47
HealthXAI: Collaborative and explainable AI for supporting early diagnosis of cognitive decline47
Find my trustworthy fogs: A fuzzy-based trust evaluation framework47
LDC: A lightweight dada consensus algorithm based on the blockchain for the industrial Internet of Things for smart city applications47
A double-blockchain solution for agricultural sampled data security in Internet of Things network46
Detecting fake images by identifying potential texture difference46
Alzheimer’s disease progression detection model based on an early fusion of cost-effective multimodal data46
Autonomous mitigation of cyber risks in the Cyber–Physical Systems46
Evaluating IoT service composition mechanisms for the scalability of IoT systems45
A smart energy and reliability aware scheduling algorithm for workflow execution in DVFS-enabled cloud environment45
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities45
Visualization and deep-learning-based malware variant detection using OpCode-level features45
AoI-aware energy control and computation offloading for industrial IoT45
An emotion and cognitive based analysis of mental health disorders from social media data45
Tikiri—Towards a lightweight blockchain for IoT45
SDN-based cyber defense: A survey45
Chaotic improved PICEA-g-based multi-objective optimization for workflow scheduling in cloud environment45
The explainability paradox: Challenges for xAI in digital pathology44
SEENS: Nuclei segmentation in Pap smear images with selective edge enhancement44
GRU-based deep learning approach for network intrusion alert prediction44
A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning44
REHAB-C: Recommendations for Energy HABits Change44
ICN with edge for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks44
Deep reinforcement learning for traffic signal control under disturbances: A case study on Sunway city, Malaysia44
PUC: Packet Update Caching for energy efficient IoT-based Information-Centric Networking44
Ontology-driven aspect-based sentiment analysis classification: An infodemiological case study regarding infectious diseases in Latin America44
IoT embedded cloud-based intelligent power quality monitoring system for industrial drive application44
Smart data driven quality prediction for urban water source management44
Blockchain-based decentralized reputation system in E-commerce environment43
Scalable blockchains — A systematic review43
An efficient deep learning-based scheme for web spam detection in IoT environment43
FLAGS: A methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learning43
A short-term traffic prediction model in the vehicular cyber–physical systems42
Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework42
Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control42
Preserving transaction privacy in bitcoin42
Research on unsupervised feature learning for Android malware detection based on Restricted Boltzmann Machines41
Real time performance analysis of secure IoT protocols for microgrid communication41
Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks41
Energy management for multiple real-time workflows on cyber–physical cloud systems41
A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities41
Detecting misogyny in Spanish tweets. An approach based on linguistics features and word embeddings40
Delegated content erasure in IPFS40
Workload forecasting and energy state estimation in cloud data centres: ML-centric approach40
Next-generation big data federation access control: A reference model40
QoS-aware placement of microservices-based IoT applications in Fog computing environments40
Design and control of soft rehabilitation robots actuated by pneumatic muscles: State of the art40
Serverless computing for Internet of Things: A systematic literature review39
Generating knowledge graphs by employing Natural Language Processing and Machine Learning techniques within the scholarly domain39
Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography39
Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms39
An online auction mechanism for time-varying multidimensional resource allocation in clouds38
Live forensics of software attacks on cyber–physical systems38
A Q-Learning-based distributed routing protocol for frequency-switchable magnetic induction-based wireless underground sensor networks38
Real-time epileptic seizure recognition using Bayesian genetic whale optimizer and adaptive machine learning38
A binary moth search algorithm based on self-learning for multidimensional knapsack problems38
Automatic feature extraction in X-ray image based on deep learning approach for determination of bone age38
STGNN-TTE: Travel time estimation via spatial–temporal graph neural network38
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things38
An efficient novel approach for iris recognition based on stylometric features and machine learning techniques38
A blockchain based certificate revocation scheme for vehicular communication systems37
EdgeABC: An architecture for task offloading and resource allocation in the Internet of Things37
Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud37
A low-cost physical location discovery scheme for large-scale Internet of Things in smart city through joint use of vehicles and UAVs37
A two-stage multi-operator differential evolution algorithm for solving Resource Constrained Project Scheduling problems37
Identifying performance anomalies in fluctuating cloud environments: A robust correlative-GNN-based explainable approach37
Offloading dependent tasks in multi-access edge computing: A multi-objective reinforcement learning approach36
Partitioned integration and coordination via the self-organising coordination regions pattern36
Flux: Overcoming scheduling challenges for exascale workflows36
FedProc: Prototypical contrastive federated learning on non-IID data36
An evolutionary fuzzy scheduler for multi-objective resource allocation in fog computing36
Multi-robot path planning in wireless sensor networks based on jump mechanism PSO and safety gap obstacle avoidance36
A novel customer-centric Methodology for Optimal Service Selection (MOSS) in a cloud environment35
Early detection of cyberbullying on social media networks35
Graph convolutional networks for graphs containing missing features35
Exact algorithms for energy-efficient virtual machine placement in data centers35
Affective database for e-learning and classroom environments using Indian students’ faces, hand gestures and body postures35
Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion34
Multi-modal aggression identification using Convolutional Neural Network and Binary Particle Swarm Optimization34
0.035054922103882