Future Generation Computer Systems-The International Journal of Escien

Papers
(The TQCC of Future Generation Computer Systems-The International Journal of Escien is 15. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
A survey on security and privacy of federated learning686
ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis489
Recent advancements and challenges of Internet of Things in smart agriculture: A survey306
Blockchain for the metaverse: A Review266
An ensemble machine learning approach through effective feature extraction to classify fake news258
A survey of human-in-the-loop for machine learning251
A survey on blockchain for big data: Approaches, opportunities, and future directions249
An intelligent healthcare monitoring framework using wearable sensors and social networking data246
Privacy-preserving blockchain-based federated learning for traffic flow prediction204
Big data analysis of the Internet of Things in the digital twins of smart city based on deep learning191
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic188
OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city177
A framework for privacy-preservation of IoT healthcare data using Federated Learning and blockchain technology168
Transformer based Deep Intelligent Contextual Embedding for Twitter sentiment analysis167
Multiple cloud storage mechanism based on blockchain in smart homes162
Human action recognition using attention based LSTM network with dilated CNN features149
Iota Tangle: A cryptocurrency to communicate Internet-of-Things data144
Semantic segmentation for multiscale target based on object recognition using the improved Faster-RCNN model140
A state-of-the-art survey on solving non-IID data in Federated Learning132
The application research of neural network and BP algorithm in stock price pattern classification and prediction132
RETRACTED: Intelligent edge computing based on machine learning for smart city130
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network126
A review of sentiment analysis research in Arabic language123
Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection122
A bibliometric analysis and visualization of blockchain118
Optimized container scheduling for data-intensive serverless edge computing117
Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection113
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)107
Emotion recognition by deeply learned multi-channel textual and EEG features105
Advanced optimization technique for scheduling IoT tasks in cloud-fog computing environments103
Genetic convolutional neural network for intrusion detection systems103
An adaptive federated learning scheme with differential privacy preserving101
An effective hybrid collaborative algorithm for energy-efficient distributed permutation flow-shop inverse scheduling98
Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics92
Deep learning framework based on integration of S-Mask R-CNN and Inception-v3 for ultrasound image-aided diagnosis of prostate cancer92
Research on strong agile response task scheduling optimization enhancement with optimal resource usage in green cloud computing90
Design and application of fog computing and Internet of Things service platform for smart city90
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things90
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments88
Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment88
A lightweight supervised intrusion detection mechanism for IoT networks87
Lightweight cryptography in IoT networks: A survey87
Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data86
Tracking and collision avoidance of virtual coupling train control system86
Multiple improved residual networks for medical image super-resolution85
Constructing a prior-dependent graph for data clustering and dimension reduction in the edge of AIoT85
GAN augmentation to deal with imbalance in imaging-based intrusion detection84
Aggression detection through deep neural model on Twitter84
Artificial intelligence for securing industrial-based cyber–physical systems84
DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges84
Handwriting dynamics assessment using deep neural network for early identification of Parkinson’s disease80
Attention-based sentiment analysis using convolutional and recurrent neural network80
Handling missing data in near real-time environmental monitoring: A system and a review of selected methods79
LEChain: A blockchain-based lawful evidence management scheme for digital forensics78
BiLSTM deep neural network model for imbalanced medical data of IoT systems77
A framework for anomaly detection and classification in Multiple IoT scenarios76
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence75
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks75
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace75
Artificial intelligence-enabled Internet of Things-based system for COVID-19 screening using aerial thermal imaging74
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense73
Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud71
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things69
A blockchain-based preserving and sharing system for medical data privacy69
Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network69
The explainability paradox: Challenges for xAI in digital pathology68
Robust detection of atrial fibrillation from short-term electrocardiogram using convolutional neural networks67
A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers66
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data66
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare65
Superposition Graph Neural Network for offshore wind power prediction65
FedProc: Prototypical contrastive federated learning on non-IID data64
Slow-movement particle swarm optimization algorithms for scheduling security-critical tasks in resource-limited mobile edge computing64
HealthXAI: Collaborative and explainable AI for supporting early diagnosis of cognitive decline64
Augmented whale feature selection for IoT attacks: Structure, analysis and applications64
File- and API-based interoperability of digital twins by model transformation: An IIoT case study using asset administration shell63
A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems63
Scalable blockchains — A systematic review63
Blockchain-enabled fraud discovery through abnormal smart contract detection on Ethereum62
AoI-aware energy control and computation offloading for industrial IoT62
Privacy-preserving quality prediction for edge-based IoT services61
Human–computer interaction-based Decision Support System with Applications in Data Mining61
A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment61
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications61
Integration of blockchain and edge computing in internet of things: A survey58
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs58
Scalable multi-channel dilated CNN–BiLSTM model with attention mechanism for Chinese textual sentiment analysis58
Blockchain-based decentralized reputation system in E-commerce environment57
Autonomous mitigation of cyber risks in the Cyber–Physical Systems57
Detecting fake images by identifying potential texture difference57
Dynamic fog-to-fog offloading in SDN-based fog computing systems56
GRU-based deep learning approach for network intrusion alert prediction56
Building the Internet of Things platform for smart maternal healthcare services with wearable devices and cloud computing56
FLAGS: A methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learning55
An emotion and cognitive based analysis of mental health disorders from social media data55
Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework54
Chaotic improved PICEA-g-based multi-objective optimization for workflow scheduling in cloud environment54
A double-blockchain solution for agricultural sampled data security in Internet of Things network54
Internet of things forensic data analysis using machine learning to identify roots of data scavenging54
Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services53
Alzheimer’s disease progression detection model based on an early fusion of cost-effective multimodal data53
A fast and accurate circle detection algorithm based on random sampling53
Visualization and deep-learning-based malware variant detection using OpCode-level features53
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities53
Serverless computing for Internet of Things: A systematic literature review52
Novel binary logistic regression model based on feature transformation of XGBoost for type 2 Diabetes Mellitus prediction in healthcare systems52
Generating knowledge graphs by employing Natural Language Processing and Machine Learning techniques within the scholarly domain52
Tikiri—Towards a lightweight blockchain for IoT51
QoS-aware placement of microservices-based IoT applications in Fog computing environments51
SEENS: Nuclei segmentation in Pap smear images with selective edge enhancement51
Identifying performance anomalies in fluctuating cloud environments: A robust correlative-GNN-based explainable approach49
STGNN-TTE: Travel time estimation via spatial–temporal graph neural network49
Workload forecasting and energy state estimation in cloud data centres: ML-centric approach49
A smart energy and reliability aware scheduling algorithm for workflow execution in DVFS-enabled cloud environment49
Ontology-driven aspect-based sentiment analysis classification: An infodemiological case study regarding infectious diseases in Latin America48
On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives48
A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning48
SDN-based cyber defense: A survey48
Graph convolutional networks for graphs containing missing features47
Real time performance analysis of secure IoT protocols for microgrid communication47
REHAB-C: Recommendations for Energy HABits Change47
Real-time epileptic seizure recognition using Bayesian genetic whale optimizer and adaptive machine learning47
Delegated content erasure in IPFS46
Offloading dependent tasks in multi-access edge computing: A multi-objective reinforcement learning approach46
Early detection of cyberbullying on social media networks45
IoT embedded cloud-based intelligent power quality monitoring system for industrial drive application45
Research on unsupervised feature learning for Android malware detection based on Restricted Boltzmann Machines44
Design and control of soft rehabilitation robots actuated by pneumatic muscles: State of the art44
Detecting misogyny in Spanish tweets. An approach based on linguistics features and word embeddings43
Towards Smart Farming: Fog-enabled intelligent irrigation system using deep neural networks43
A systematic literature review of IoT time series anomaly detection solutions43
A binary moth search algorithm based on self-learning for multidimensional knapsack problems43
Multi-robot path planning in wireless sensor networks based on jump mechanism PSO and safety gap obstacle avoidance43
A Q-Learning-based distributed routing protocol for frequency-switchable magnetic induction-based wireless underground sensor networks43
Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion42
Hybrid graph convolution neural network and branch-and-bound optimization for traffic flow forecasting42
Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud42
Energy-aware workflow scheduling and optimization in clouds using bat algorithm42
An evolutionary fuzzy scheduler for multi-objective resource allocation in fog computing42
FedSA: A staleness-aware asynchronous Federated Learning algorithm with non-IID data42
Host-based IDS: A review and open issues of an anomaly detection system in IoT42
Research on structure optimization and motion characteristics of wearable medical robotics based on Improved Particle Swarm Optimization Algorithm41
Partitioned integration and coordination via the self-organising coordination regions pattern41
Ensembles of Convolutional Neural Network models for pediatric pneumonia diagnosis41
Review on security of federated learning and its application in healthcare41
Robot path planning by leveraging the graph-encoded Floyd algorithm40
Multi-modal aggression identification using Convolutional Neural Network and Binary Particle Swarm Optimization40
Explainable framework for Glaucoma diagnosis by image processing and convolutional neural network synergy: Analysis with doctor evaluation39
Task offloading in vehicular fog computing: State-of-the-art and open issues39
Model aggregation techniques in federated learning: A comprehensive survey39
LSMD: A fast and robust local community detection starting from low degree nodes in social networks39
Deadline-constrained energy-aware workflow scheduling in geographically distributed cloud data centers38
Deep reinforcement learning for energy and time optimized scheduling of precedence-constrained tasks in edge–cloud computing environments38
Secure crowd-sensing protocol for fog-based vehicular cloud38
Learning behaviours data in programming education: Community analysis and outcome prediction with cleaned data38
Ontology based recommender system using social network data38
Developing accurate and scalable simulators of production workflow management systems with WRENCH37
Achieving cybersecurity in blockchain-based systems: A survey37
Energy-aware scheduling in edge computing with a clustering method37
A multi-stage denoising framework for ambulatory ECG signal based on domain knowledge and motion artifact detection37
A low-cost physical location discovery scheme for large-scale Internet of Things in smart city through joint use of vehicles and UAVs37
A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network37
BSMD:A blockchain-based secure storage mechanism for big spatio-temporal data37
Human activity recognition using marine predators algorithm with deep learning37
Deep Reinforcement Learning for energy-aware task offloading in join SDN-Blockchain 5G massive IoT edge network37
Android malware obfuscation variants detection method based on multi-granularity opcode features37
PACO-VMP: Parallel Ant Colony Optimization for Virtual Machine Placement36
Big data driven Internet of Things for credit evaluation and early warning in finance36
DecChain: A decentralized security approach in Edge Computing based on Blockchain36
Identifying fraud in medical insurance based on blockchain and deep learning36
SecFedNIDS: Robust defense for poisoning attack against federated learning-based network intrusion detection system36
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection technique for Crypto-ransomware early detection36
An AI-enabled lightweight data fusion and load optimization approach for Internet of Things36
Event prediction based on evolutionary event ontology knowledge36
Automated evolutionary approach for the design of composite machine learning pipelines36
Opportunistic capacity based resource allocation for 6G wireless systems with network slicing35
Vision-based personalized Wireless Capsule Endoscopy for smart healthcare: Taxonomy, literature review, opportunities and challenges35
High-quality face image generation using particle swarm optimization-based generative adversarial networks35
A blockchain-based trust system for decentralised applications: When trustless needs trust35
QoE-aware user allocation in edge computing systems with dynamic QoS35
Explicit aspects extraction in sentiment analysis using optimal rules combination35
Complex event detection for commodity distribution Internet of Things model incorporating radio frequency identification and Wireless Sensor Network34
BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem34
AFCL: An Abstract Function Choreography Language for serverless workflow specification34
Energy-efficient VM scheduling based on deep reinforcement learning34
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System34
An ultrasound standard plane detection model of fetal head based on multi-task learning and hybrid knowledge graph34
PSO and K-means-based semantic segmentation toward agricultural products34
Software-defined DDoS detection with information entropy analysis and optimized deep learning34
Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains33
Neural machine translating from natural language to SPARQL33
Kafka-ML: Connecting the data stream with ML/AI frameworks33
Virtualizing mixed-criticality systems: A survey on industrial trends and issues33
Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems33
A secure localization scheme based on trust assessment for WSNs using blockchain technology33
A self structuring artificial intelligence framework for deep emotions modeling and analysis on the social web33
A novel method for identifying the damage assessment tweets during disaster33
Multimodal semantic communication accelerated bidirectional caching for 6G MEC33
Detecting anomalies in microservices with execution trace comparison32
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System32
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control32
Performance optimization of serverless edge computing function offloading based on deep reinforcement learning32
A novel offloading approach of IoT user perception task based on quantum behavior particle swarm optimization32
Energy-efficient and secure mobile fog-based cloud for the Internet of Things32
Self-improving system integration: Mastering continuous change32
DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks31
Establishing effective communications in disaster affected areas and artificial intelligence based detection using social media platform31
MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields31
Enhanced Lightning Network (off-chain)-based micropayment in IoT ecosystems31
A big data-centric architecture metamodel for Industry 4.031
Deep cognitive diagnosis model for predicting students’ performance31
FGMD: A robust detector against adversarial attacks in the IoT network31
TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems31
Lightweight self-organising distributed monitoring of Fog infrastructures31
Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision31
MultiCNN-FilterLSTM: Resource-efficient sensor-based human activity recognition in IoT applications31
PAChain: Private, authenticated & auditable consortium blockchain and its implementation31
On IoT intrusion detection based on data augmentation for enhancing learning on unbalanced samples31
A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things30
A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges30
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption30
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis30
Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing30
A platform for integrating heterogeneous data and developing smart city applications30
Target localization using Multi-Agent Deep Reinforcement Learning with Proximal Policy Optimization30
Predictive methods in cyber defense: Current experience and research challenges30
Identifying patterns in multiple biomarkers to diagnose diabetic foot using an explainable genetic programming-based approach29
Panoramic visual perception and identification of architectural cityscape elements in a virtual-reality environment29
Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems29
Lightweight privacy preserving data aggregation with batch verification for smart grid29
CODE-V: Multi-hop computation offloading in Vehicular Fog Computing29
A novel Machine Learning-based approach for the detection of SSH botnet infection29
Performance evaluation of real-time stream processing systems for Internet of Things applications29
Intrusion and anomaly detection for the next-generation of industrial automation and control systems29
Reliable customer analysis using federated learning and exploring deep-attention edge intelligence29
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices29
Internet of Thing (IoT) review of review: Bibliometric overview since its foundation29
Randomized nonlinear one-class support vector machines with bounded loss function to detect of outliers for large scale IoT data28
Practical AgentChain: A compatible cross-chain exchange system28
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme28
Programming framework and infrastructure for self-adaptation and optimized evolution method for microservice systems in cloud–edge environments28
Hybrid genetic algorithm with variable neighborhood search for multi-scale multiple bottleneck traveling salesmen problem28
Novelty detection in continuously changing environments28
A theoretical method to evaluate honeynet potency28
Empathic conversational agents for real-time monitoring and co-facilitation of patient-centered healthcare28
Measuring the short text similarity based on semantic and syntactic information28
Truthful auction mechanisms for resource allocation in the Internet of Vehicles with public blockchain networks28
A fully automated approach to a complete Semantic Table Interpretation28
Stable federated fog formation: An evolutionary game theoretical approach28
Hybrid surrogate model for online temperature and pressure predictions in data centers28
0.062987804412842