Cluster Computing-The Journal of Networks Software Tools and Applicati

Papers
(The median citation count of Cluster Computing-The Journal of Networks Software Tools and Applicati is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Design of the implementation information management platform for distributed generation in distribution network based on information integration144
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid107
An efficient firefly and honeybee based load balancing mechanism in cloud infrastructure93
Multi-ant colony optimization algorithm based on game strategy and hierarchical temporal memory model72
Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT71
Cluster based similarity extraction upon distributed datasets68
Secure electronic medical records sharing scheme based on blockchain and quantum key67
Quantification and analysis of performance fluctuation in distributed file system66
Hybrid artificial immune algorithm for energy-efficient distributed flexible job shop in semiconductor manufacturing64
RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain62
On the continuous contract verification using blockchain and real-time data61
A multiobjective decomposition evolutionary algorithm with optimal history-based neighborhood adaptation and a dual-indicator selection strategy61
ATConf: auto-tuning high dimensional configuration parameters for big data processing frameworks60
Interference-aware execution framework with Co-scheML on GPU clusters59
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review59
Correction: The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm57
Retraction Note: A dynamic clustering based method in community detection56
Retraction Note: Development of a medical big-data mining process using topic modeling52
Retraction Note: Research on the access control protocol Priccess design of network privacy protection52
Retraction Note: Improved image compression using effective lossless compression technique49
Retraction Note: Classification of malignant melanoma and benign skin lesion by using back propagation neural network and ABCD rule49
Retraction Note: Research on religious management based on big data49
Retraction Note: Development of healthcare service model using physical information data based on cluster sensing technology48
Retraction Note: Research on smart city service system based on adaptive algorithm47
Retraction Note: Classification of sentence level sentiment analysis using cloud machine learning techniques46
Retraction Note: Application of the slicing technique to extract the contour feature line45
Retraction Note: An effiecient human tracking system using Haar-like and hog feature extraction45
RETRACTED ARTICLE: Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model43
Retraction Note: Registry service selection based secured internet of things with imperative control for industrial applications43
Retraction Note: Analysis of image processing algorithm based on bionic intelligent optimization41
Retraction Note: Discussion on new media communication strategy of sports events based on large data technology41
Machine learning-based intelligent security framework for secure cloud key management40
Optimal VM-to-user mapping in cloud environment based on sustainable strategy space theory40
A survey of blockchain applications in sustainable and smart cities40
Edge computing based secure health monitoring framework for electronic healthcare system39
Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management39
YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention39
Upper confident bound advantage function proximal policy optimization38
QoS correlation-based service composition algorithm for multi-constraint optimal path selection37
Examining deep learning’s capability to spot code smells: a systematic literature review37
Enhancing constrained application protocol using message options for internet of things35
Gpu-based and streaming-enabled implementation of pre-processing flow towards enhancing optical character recognition accuracy and efficiency35
A multi-illusive voids approach for increasing base station anonymity35
Locality-aware virtual machine placement based on similarity properties in mobile edge computing34
DNA-chaos governed cryptosystem for cloud-based medical image repository34
Data fusion and network intrusion detection systems33
A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment33
A novel energy-based task scheduling in fog computing environment: an improved artificial rabbits optimization approach33
Fusion of deep and local gradient-based features for multimodal finger knuckle print identification32
Energy-delay-aware VNF scheduling: a reinforcement learning approach with hierarchical reward enhancement32
A mobility-aware task scheduling by hybrid PSO and GA for mobile edge computing32
Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning32
Design and implementation of dynamic I/O control scheme for large scale distributed file systems30
Intelligent microservices autoscaling module using reinforcement learning30
BlockTree: a nonlinear structured, scalable and distributed ledger scheme for processing digital transactions30
Research on placement of distributed SDN multiple controllers based on IAVOA30
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing30
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting29
An improved hash algorithm for monitoring network traffic in the internet of things29
Modeling the Green Cloud Continuum: integrating energy considerations into Cloud–Edge models29
The research and analysis of efficiency of hardware usage base on HDFS29
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks28
Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement28
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication28
Energy-aware parameter tuning for mixed workloads in cloud server28
Distributed medical data storage model based on blockchain technology27
Energy-efficient speed tuning for real-time applications27
Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation27
Optimizing electric vehicle routing with nonlinear charging and time windows using improved differential evolution algorithm27
Refining differential evolution with mutation rate and neighborhood weight local search27
Modeling and verification of software evolution using bigraphical reactive system26
Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization26
A Spark-based high utility itemset mining with multiple external utilities26
Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT26
A novel real-time object detection method for complex road scenes based on YOLOv7-tiny26
Analysis of NVMe over fabrics with SCinet DTN-as-a-Service26
DEA$$^2$$H$$^2$$: differential evolution architecture based adaptive hyper-heuristic algorithm for continuous optimization25
A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification25
Empowering e-learning approach by the use of federated edge computing25
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study25
Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment25
A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication24
A survey on privacy-preserving federated learning against poisoning attacks24
Lightweight image super-resolution with feature cheap convolution and attention mechanism23
Quantitative and qualitative similarity measure for data clustering analysis23
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme23
Imperialist competitive based approach for efficient deployment of IoT services in fog computing23
Service selection based on blockchain smart contracts in cloud-edge environment23
Popularity-based full replica caching for erasure-coded distributed storage systems22
Implementation and evaluation of a container management platform on Docker: Hadoop deployment as an example22
Cluster mechanism for sensing data report using robust collaborative distributed spectrum sensing22
Performance modeling and analysis of Hyperledger Fabric22
ScalaParBiBit: scaling the binary biclustering in distributed-memory systems22
A survey on machine and deep learning in semiconductor industry: methods, opportunities, and challenges22
Blockchain and COVID-19 pandemic: applications and challenges21
Intelligent intrusion detection based on fuzzy Big Data classification21
MHB*T based dynamic data integrity auditing in cloud storage21
Deep learning-based modelling of pyrolysis20
cuConv: CUDA implementation of convolution for CNN inference20
Security framework for smart cyber infrastructure20
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network19
Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning19
Quantum-resistant public-key encryption and signature schemes with smaller key sizes19
IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety19
High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding19
Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud19
HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model19
Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation19
An efficient partial charging and data gathering strategy using multiple mobile vehicles in wireless rechargeable sensor networks19
STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction19
Internet of things-based secure architecture to automate industry18
Design of distributed network intrusion prevention system based on Spark and P2DR models18
Improving Oversubscribed GPU Memory Performance in the PyTorch Framework18
Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities18
HyperSegRec: enhanced hypergraph-based recommendation system with user segmentation and item similarity learning18
Multi-objective optimization-based privacy in data mining18
An intelligent mechanism for energy consumption scheduling in smart buildings18
Two-stage selection of distributed data centers based on deep reinforcement learning18
S-MPEC: Sparse Matrix Multiplication Performance Estimator on a Cloud Environment18
Video coding deep learning-based modeling for long life video streaming over next network generation17
A retrieval method of learners’ behavior features based on K-means clustering algorithm17
An efficient resource provisioning algorithm for workflow execution in cloud platform17
An adaptive and secure routes migration model for the sustainable cloud of things17
Weighted spatial skyline queries with distributed dominance tests17
Strategy-proof mechanism for time-varying batch virtual machine allocation in clouds16
High-speed hyperparameter optimization for deep ResNet models in image recognition16
Product recommendation using enhanced convolutional neural network for e-commerce platform16
Secure itemset hiding in smart city sensor data16
Orchestrating real-time IoT workflows in a fog computing environment utilizing partial computations with end-to-end error propagation16
Using FIWARE and blockchain in smart cities solutions16
Maximizing utility by optimal capacity division in P2P networks16
A cost-efficient scheduling algorithm for streaming processing applications on cloud16
Nash equilibrium and social optimization in cloud service systems with diverse users16
Parallel Version of Local Search Heuristic Algorithm to Solve Capacitated Vehicle Routing Problem15
HCIndex: a Hilbert-Curve-based clustering index for efficient multi-dimensional queries for cloud storage systems15
ProBlock: a novel approach for fake news detection15
A new traffic congestion prediction strategy (TCPS) based on edge computing15
Adaptive bandwidth adjustment for resource constrained services in fog queueing system15
Enhanced multi-objective virtual machine replacement in cloud data centers: combinations of fuzzy logic with reinforcement learning and biogeography-based optimization algorithms15
Energy efficient power cap configurations through Pareto front analysis and machine learning categorization15
Join queries optimization in the distributed databases using a hybrid multi-objective algorithm15
A method of system selection for shuttle-based storage and retrieval system considering cost and performance15
An optimized human resource management model for cloud-edge computing in the internet of things15
Joint mode selection and user association in D2D enabled multitier C-RAN14
GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model14
Dataflow-based automatic parallelization of MATLAB/Simulink models for fitting modern multicore architectures14
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks14
Video quality adaptation using CNN and RNN models for cost-effective and scalable video streaming Services14
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost14
EMR sharing system with lightweight searchable encryption and rights management14
Circulation of legitimate information over VANETs using threshold signature scheme14
Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous data14
Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing14
Memory orchestration mechanisms in serverless computing: a taxonomy, review and future directions14
A new hybrid multi-objective optimization algorithm for task scheduling in cloud systems14
MAIDS: malicious agent identification-based data security model for cloud environments14
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection14
MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement14
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks13
A data lake-based security transmission and storage scheme for streaming big data13
Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment13
Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints13
PerMl-Fed: enabling personalized multi-level federated learning within heterogenous IoT environments for activity recognition13
A comprehensive node-based botnet detection framework for IoT network13
A hybrid northern goshawk optimization algorithm based on cluster collaboration13
GT-scheduler: a hybrid graph-partitioning and tabu-search based task scheduler for distributed data stream processing systems13
AFL-HCS: asynchronous federated learning based on heterogeneous edge client selection13
SMAD: SMart assistant during and after a medical emergency case based on deep learning sentiment analysis13
Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems13
Edge intelligence-assisted smart healthcare solution for health pandemic: a federated environment approach13
Investigating large language models capabilities for automatic code repair in Python13
A deep learning approach for detecting covert timing channel attacks using sequential data13
An improved cellular goore game-based consensus protocol for blockchain13
Arrhythmia ventricular fibrillation classification on ECG signal using ensemble feature selection and deep neural network13
A coupled generative graph convolution network by capturing dynamic relationship of regional flow for traffic prediction13
Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure13
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs12
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine12
Foundation and large language models: fundamentals, challenges, opportunities, and social impacts12
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey12
A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images12
An ontology-based approach to designing a NoSQL database for semi-structured and unstructured health data12
A secure lossless recovery for medical images based on image encoding and data self-embedding12
A new approach for mechanical parameter inversion analysis of roller compacted concrete dams using modified PSO and RBFNN12
OMBM-ML: efficient memory bandwidth management for ensuring QoS and improving server utilization12
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid12
Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes12
A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach12
Fisher linear discriminant and discrete global swarm based task scheduling in cloud environment12
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units11
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments11
An extended lightweight blockchain based collaborative healthcare system for fraud prevention11
A machine learning-based optimization approach for pre-copy live virtual machine migration11
Energy efficient offloading scheme for MEC-based augmented reality system11
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model11
Correction: Towards a distributed SaaS management system in a multi-cloud environment11
Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services11
PartEclat: an improved Eclat-based frequent itemset mining algorithm on spark clusters using partition technique11
Privacy challenges of IoT-based blockchain: a systematic review11
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection11
A secure and flexible edge computing scheme for AI-driven industrial IoT11
SUACC-IoT: secure unified authentication and access control system based on capability for IoT11
Correction: Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings11
Data breaches in healthcare: security mechanisms for attack mitigation11
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis11
Performance analysis of P2p network content delivery based on queueing model11
A review of smart contract-based platforms, applications, and challenges11
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures11
Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective11
Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network11
Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges10
Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII10
Dependent task offloading for air-ground integrated MEC networks: a multi-agent collaboration approach10
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization10
Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model10
Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity10
Detection and prediction of traffic accidents using deep learning techniques10
Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management10
DNA sequences design under many objective evolutionary algorithm10
Correction to: A secure authentication technique for connecting different IoT devices in the smart city infrastructure10
Joint resource allocation and privacy protection for MEC task offloading in industrial Internet10
Practical evasion attack against neural network-based macro-malware detection method10
Deep learning fusion for effective malware detection: leveraging visual features10
A distributed algorithm with dynamic event-triggered mechanism for resource allocation problems9
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things9
RETRACTED ARTICLE: A novel approach to QoS-aware resource allocation in NOMA cellular HetNets using multi-layer optimization9
Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments9
Bppfl: a blockchain-based framework for privacy-preserving federated learning9
A secure lightweight authentication model with interference aware routing and attack detection approach in VANET9
High-performance network attack detection in unknown scenarios based on improved vertical model9
Evolution of computing energy efficiency: Koomey's law revisited9
An efficient class-dependent learning label approach using feature selection to improve multi-label classification algorithms9
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models9
A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning9
Correction to: High-performance pseudo-anonymization of virtual power plant data on a CPU cluster9
Resilient vehicular fog computing networks: an analytical approach to system reliability under breakdown and vacation interruptions9
Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT9
Privacy preserving spatio-temporal attribute-based encryption for cloud applications9
Improved snow ablation optimization for multilevel threshold image segmentation9
Graph-based robust 3D point cloud map merging approach for large scale9
Region of interest encryption algorithm for images based on lifting scheme and object detection9
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks9
Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units9
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges9
Dynamic load balancing of traffic in the IoT edge computing environment using a clustering approach based on deep learning and genetic algorithms9
Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme9
An efficient deep reinforcement learning based task scheduler in cloud-fog environment9
Adaptive virtual machine placement: a dynamic approach for energy-efficiency, QoS enhancement, and security optimization9
BGAS: blockchain-based secure and efficient group key agreement scheme for dynamic vehicular platoon9
Channel estimation for massive MIMO system using the shannon entropy function8
0.11524701118469