Cluster Computing-The Journal of Networks Software Tools and Applicati

Papers
(The TQCC of Cluster Computing-The Journal of Networks Software Tools and Applicati is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Design and implementation of dynamic I/O control scheme for large scale distributed file systems383
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study340
Internet of vehicles task offloading based on edge computing using double deep Q-network292
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things267
A multi-illusive voids approach for increasing base station anonymity142
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization132
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks124
RF-FedAvg: Federated learning-based random forest model for intrusion detection in wireless sensor networks117
A survey on privacy-preserving federated learning against poisoning attacks117
Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm115
Confidentiality, integrity, and non-repudiation of automobile event data: a TEE-based secure transmission scheme between automobile and cloud102
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting97
DLBW: an end-to-end multi-task adaptive gradient balancing method97
Research on inspection task allocation method of inspection robot based on improved genetic algorithm88
An efficient cross-domain mutual authentication scheme for heterogeneous signcryption in VANETs81
Autonomous underwater vehicle 3D path planning based on multiple populations for multiple objectives ant colony optimization74
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units70
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network69
DNA sequences design under many objective evolutionary algorithm68
Semi-supervised feature selection for partially labeled interval-valued information systems68
The management of energy-aware virtual machine deployment and load balancing using mapping in network-on-chip for cyber-physical systems in cloud computing66
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid64
Stellar oscillation optimizer: a nature-inspired metaheuristic optimization algorithm63
ROI-based optimized image watermarking with real-time authentication62
Examining deep learning’s capability to spot code smells: a systematic literature review62
Deep learning fusion for effective malware detection: leveraging visual features60
Data breaches in healthcare: security mechanisms for attack mitigation60
Quantification and analysis of performance fluctuation in distributed file system59
Energy-efficient edge deployment of generative AI models using federated learning57
An adaptive hybrid differential Grey Wolf Optimization algorithm for WSN coverage56
A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study55
Vividh-Vaani: Video Translation and Synchronization using Machine Learning55
Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies55
PINSA: Privacy-preserving cyber insurance framework54
Privacy preserving spatio-temporal attribute-based encryption for cloud applications54
Design of distributed network intrusion prevention system based on Spark and P2DR models53
Deep reinforcement learning-based multi-objective job scheduling scheme for load balancing53
Retraction Note: An effiecient human tracking system using Haar-like and hog feature extraction52
Retraction Note: Improved image compression using effective lossless compression technique52
A description language for enhancing transparency and interoperability in blockchain smart contracts50
Victoria Amazonica optimization algorithm based on adaptive mutation factor and mathematical distribution for solving minimum spanning tree problem50
A layered and integrative framework for Advance Persistent Threat detection and mitigation: combining AI, Zero-Trust, and Advanced Threat Intelligence50
An efficient framework to combat multidimensionality in multi-criteria recommender systems50
PSO-TK: a hybrid optimization method for the trade-off between coverage and robustness in edge service placement49
A hybrid denoising autoencoder and Query-Key attention-based framework for intrusion detection in software defined industrial networks49
Performance optimization in cloud data warehouse based on blockchain and data security using AC-AKDES approach49
An attention-augmented adaptive graph convolutional recurrent network for multi-step traffic flow prediction49
SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN49
Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management48
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks48
Global path planning method based on improved genetic algorithm48
Combining evolutionary and swarm algorithms in a hybrid subspace-wise search strategy for feature selection48
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis48
Secure electronic medical records sharing scheme based on blockchain and quantum key48
Quantitative and qualitative similarity measure for data clustering analysis47
ISDA-BAN: interoperability and security based data authentication scheme for body area network47
Improving virtualization and migration in combinatorial dynamic mapping for cloud services47
An energy-efficient black widow-based adaptive VM placement approach for cloud computing46
Learned image compression with CNN-LocalMamba architectures and multi-context entropy model46
Enhancing lane line detection transformer with frequency-assisted attention46
Game-theoretic cloud assistance strategies of end-edge-cloud systems for mitigating edge distributed denial of service attacks46
Optimizing feature selection in imbalanced intrusion detection system using hybrid metaheuristics algorithms for wireless sensor networks46
Utilizing generative adversarial networks (GANs) for realistic video stream augmentation and enhancement44
Real-time progressive compression method of massive data based on improved clustering algorithm43
Retraction Note: Development trend of sharing economy in big data era based on duplication dynamic evolution game theory43
Retraction Note: Enhanced trust based encroachment discovery system for Mobile Ad-hoc networks42
Retraction Note: Interior design and pattern innovation design study based on generic algorithm logistics information42
Quantifying the impact of data replication on error propagation41
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems41
A JAYA algorithm based on normal clouds for DNA sequence optimization40
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis40
Traffic flow forecasting based on dynamic graph convolution and triplet attention40
FedDC: a federated learning framework to enhance gradient diversity and mitigate conflicts40
A comprehensive survey on federated semi-supervised learning: applications, challenges, and future directions40
BFCL: a secure decentralized framework for chest x-ray image classification using blockchain federated contrastive learning40
A privacy-centric federated learning framework with blockchain and dynamic client selection mechanisms39
Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling38
Resource aware medical IoT data management system using Social IoT based edge computing38
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme38
An adaptive composite service deployment in mobile edge computing using MLP-based DQN38
Comparative analysis of machine learning and deep learning approaches for fault detection in industrial applications using CWRU, IMS, and TEP datasets38
Natural language why-question answering system in business intelligence context37
Research on path planning of intelligent vehicle integrated with adjacent vehicle prediction37
Temporal feature-enhanced graph Convolutional Recurrent Network for traffic forecasting36
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting36
Zebra optimization algorithm with chaos convergence factor and Gaussian mutation for MLP soft-sensor model of debutanizer column36
Enhanced security of smart contracts in fog computing: hybrid classifiers and feature selection for improved attack detection for registration and resource access granting36
SPATS: a practical system for comparative analysis of spatio-temporal graph neural networks35
Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition35
IoT botnets Unveiled: architectural analysis, threat vectors, and cutting-edge detection techniques35
Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms35
SFE-EANDS: a simple, fast, and efficient algorithm with external archive and normalized distance-based selection for high-dimensional feature selection34
A JPEG compressed image encryption method based on Shamir secret sharing scheme34
A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms34
PURKAA: privacy ensured game-based task of floading for mobile blockchains34
A traffic flow prediction model incorporating hybrid spatio-temporal features and dynamic diffusion graph convolution33
Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach33
Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems33
Recent metaheuristic algorithms for multi-objective feature selection: review, applications, open issues and challenges33
Retraction Note: Design and implementation of intelligent manufacturing project management system based on bill of material33
Two-stage hierarchical evolutionary algorithm based on multi-population for multi-objective distributed heterogeneous welding flow shop scheduling32
Metaheuristics role in image processing and computer vision applications: a comprehensive review32
A hybrid meta-heuristic algorithm for joint edge caching and task scheduling with mobility awareness32
Popularity-based data placement in erasure-coded Edge Storage Systems32
PriOT-LSH: efficient privacy-preserving WiFi localization based on oblivious transfer and locality-sensitive hashing in cloud environments32
Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems32
MTV-SCA: multi-trial vector-based sine cosine algorithm31
Digital Twin technology for multimodal-based smart mobility using hybrid Co-ABC optimization based deep CNN31
A novel hybrid improved Dung beetle optimization algorithm for robotic arm obstacle avoidance planning31
BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm31
Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization31
Intelligent monitoring system for environmental protection during the construction period of pumped storage power station31
Human activity recognition in cyber-physical systems using optimized machine learning techniques31
Federated learning for energy constrained devices: a systematic mapping study31
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset31
Enhanced obstacle detection using bilateral vision-aided transformer neural network for visually impaired persons30
Recent approaches for aspect based sentiment analysis: a review30
Enhanced zebra optimization algorithm for reliability redundancy allocation and engineering optimization problems30
Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment30
Hybrid multi-strategy optimization framework for engineering design: dynamic opposition-based STC chaos, adaptive step-size mutation, and crossover-renewal30
Cloud-edge synergistic MEC multi-task offloading and resource allocation method based on convex optimization30
An energy-aware module placement strategy in fog-based healthcare monitoring systems30
CLARA: clustered learning automata-based routing algorithm for efficient FANET communication30
A memory-guided adaptive niching evolutionary framework for scalable and robust multi-root solving of nonlinear equation systems: Theoretical and real-world validation30
Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure29
Hierarchical admission control in multi-cloud systems: integrating reinforcement learning, nash bargaining, and predictive state modeling29
Benchmarking binary classification of Johne’s disease using a multi-resolution histopathological image dataset29
Integrated GA-based charging station distribution and ML-driven UAV-based real-time security monitoring in consumer environments29
EEG-based emotion recognition model using fuzzy adjacency matrix combined with convolutional multi-head graph attention mechanism29
Pa-Stream: pattern-aware scheduling for distributed stream computing systems29
Improving fault tolerance in LinuX container-based distributed systems using blockchain28
Transfer learning method based on cluster for drifting data stream classification28
3-Path Vertex Cover Problem based on the Variable Neighborhood Search algorithm and the Artificial Bee Colony algorithm28
Enhancing data credibility in 6G-enabled IoT-fog environment using secured blockchain scheme28
Cloud workload prediction based on wavelet transform noise reduction and a TCN-GRU hybrid model28
Formulating a quality model for cloud-native software architectures: conceptual and methodological considerations28
Dynamic object removal by fusing deep learning and multiview geometry28
Ameliorating clustered federated learning using real-coded genetic algorithm28
Density peaks clustering algorithm with neighborhood optimization and micro-cluster merging28
A new quantum differential squirrel search algorithm for global optimization problem27
Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning27
P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch27
Single-tag and multi-tag RFID data cleaning approach in edge computing27
Fedmkd: multi-teacher knowledge distillation for communication-efficient federated learning27
Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure27
A near-optimal & load balanced resilient system design for high-performance computing platform27
Mobile device-target association optimization for connectivity enhancement in wireless IoT sensor networks27
A novel revocation management for distributed environment: a detailed study27
Multi-scale attention graph convolutional recurrent network for traffic forecasting27
Dimension selection: an innovative metaheuristic strategy for particle swarm optimization27
A new binary chaos-based metaheuristic algorithm for software defect prediction27
Anomaly-free federated access control policy enforcement framework for ethereum26
Artificial intelligence assisted framework for detecting offensive posters on the premises of educational institutions26
Automated question generation for Arabic language26
Towards verifiable updatable attribute-based Boolean keywords search sharing of PHRs in cloud environment26
Mitigating voltage fingerprint spoofing attacks on the controller area network bus26
A novel fine-grained intelligent framework for mitigating cyber-attacks through hybrid chaos-triggered tasmanian devil feature optimization and feedforward learning networks26
Dynamic multi-key FHE from LWE under new working mode26
Efficient deadline-aware Non-Clairvoyant bag-of-tasks scheduling for edge computing using an enhanced SPEA225
OTST: an optimal transport based spatial-temporal graph attention model for traffic flow prediction25
An analytical model of a cluster-based service system with application to a cloud environment25
Community detection in attributed networks using neighborhood information25
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.025
Comprehensive AI-driven privacy risk assessment in mobile apps and social networks25
BIARO: an improved artificial rabbit optimization algorithm for feature selection in high-dimensional data24
Integrating hybrid deep learning architecture with enhanced feature selection techniques to mitigate the multiple attacks24
Detection of road extraction from satellite images with deep learning method24
CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud24
Group intrusion detection in the Internet of Things using a hybrid recurrent neural network24
Banyan tree growth optimization and application24
A diversity-enhanced framework for multimodal optimization: utilizating niching and differential evolution operator24
QoS-aware multi-objective SaaS selection system in cloud computing using intelligent learning algorithm24
Quantum-PSO based unsupervised clustering of users in social networks using attributes24
A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system24
Multi-strategy improved coatis optimization algorithm: enhancing global exploration and local exploitation abilities24
Retraction Note: Research on the selection model of technology-based intellectual property evaluation method based on analytic hierarchy process24
A smart contract-driven access control scheme with integrity checking for electronic health records24
CIS feature selection based dynamic ensemble selection model for human stress detection from EEG signals24
Privacy-preserving autoencoder-based collaborative filtering24
Ant colony optimization using eight-neighborhood search with dual pheromone updating strategy and continuous image edge generation strategy for license plate recognition23
A blockchain-based framework for Academic Bank of Credit with transparent credit mobility23
Ethereum smart contracts: a hierarchical analysis of vulnerability challenges and mitigation strategies23
Federated learning for secure and efficient vehicular communications in open RAN23
Retraction Note: Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring23
Enhanced anomaly detection in log-based systems using GAN-based models23
Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring23
Retraction Note: Continuous user authentication based score level fusion with hybrid optimization23
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat23
Retraction Note: Optimal route selection in MANET based on particle swarm optimization utilizing expected transmission count23
Entity relation joint extraction method for manufacturing industry knowledge data based on improved BERT algorithm23
Retraction Note: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm23
Retraction Note: A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing23
Blockchain-enabled secure data transmission for personalized e-healthcare and digital twin well-being23
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples22
Improving resource utilization and fault tolerance in large simulations via actors22
Anomaly detection framework for IoT-enabled appliances using machine learning22
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices22
Resource optimization in edge and SDN-based edge computing: a comprehensive study22
L-xaids: A LIME-based eXplainable AI framework for intrusion detection systems22
A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs22
Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism22
3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT22
Fine-tuning and prompting: a strategy for mitigating societal biases in large language models22
Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services22
Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning22
Self-supervised deep subspace clustering with entropy-norm22
Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors22
CBPNs: coloured behavioural petri nets for model-based diagnosis22
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization22
Effectiveness of machine learning based android malware detectors against adversarial attacks22
An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing22
Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm22
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era22
Morphologically reconstructed 2-D histogram with opposition learning based optimization approach for multi-level thresholding22
Visualization of aspect-oriented programs using city transportation metaphor21
Parallel mutation testing for large scale systems21
A novel dual-archive multi-objective algorithm for hybrid flow shop scheduling problems with missing operations21
Shortest node-to-node disjoint paths algorithm for symmetric networks21
Hilbert curves-based location privacy technique for vehicular cloud networks21
Fast-CFLB: a privacy-preserving data sharing system for Internet of Vehicles using ternary federated learning and blockchain21
Simplified harmony search: novel algorithm design and its applications in engineering design optimization problems21
Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments20
Robust intrusion detection for unmanned aerial vehicles: a PCA-based feature extraction and ensemble learning approach20
Multi-threshold image segmentation based on historical variation self-learning equilibrium optimizer20
SafeSurf Darknet 2025: A novel dataset for darknet traffic detection and analysis20
Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing20
Password authentication key exchange based on key consensus for IoT security20
A two-phase streaming edge partitioning algorithm for large-scale uncertain graphs20
Federated learning with user incentives for enhanced resource consumption forecasting in urban IoT systems20
Correction: Dynamic privacy budget allocation for enhanced differential privacy in federated learning20
Fungible and non-fungible tokens with snapshots in Java20
FedFCA: Federated Formal Concept Analysis Framework20
A modified wind driven optimization algorithm and its applications in hardware-software partitioning20
Adaptive success history adaptive differential evolution with multi-agent participated competition mechanism20
Fog assisted data size reduction based data management system for optimizing resources in medical IoT20
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs19
Impact factor-based improved association rule mining-based privacy preservation model for IoT with hybrid optimal key generation19
Improved Harris Hawk optimization for multilevel thresholding image segmentation19
Retraction Note: An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology19
Retraction Note: Analysis and study on the key factors of regional tourism development based on discrete differential algorithm19
Timely detection of DDoS attacks in IoT with dimensionality reduction19
Kanfilter: a simple and effective multi-module point cloud denoising model19
Enhanced unstructured points cloud subdivision applied for parallel Delaunay triangulation19
Retraction Note: Research on intelligent city energy management based on internet of things19
Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities19
Adaptive sand cat swarm optimization algorithm for unmanned ground vehicle path planning19
Strategic joining and optimal pricing in the hybrid cloud system with risk-sensitive service requests19
Intrusion detection in internet of things-based smart farming using hybrid deep learning framework19
Retraction Note: Investigation on application of association rule algorithm in English teaching logistics information19
Federated learning for feature-fusion based requirement classification19
0.27282786369324