Concurrency and Computation-Practice & Experience

Papers
(The TQCC of Concurrency and Computation-Practice & Experience is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Post‐quantum secure two‐party computing protocols against malicious adversaries147
Issue Information79
Issue Information66
Opportunistic coding across on‐route dominating nodes in a flow‐orientedSDNenabledWSN52
Issue Information50
49
Research of 6‐DOF pose estimation in stacked scenes46
Doughnutie: An efficient and low‐latency cloud data center network architecture45
Exploring human behavior patterns and socio‐demographic factors based on American Time Use Survey45
Determining approximate solution of partial differential equations using radial basis function model trained with parallel symbiotic organisms search algorithm45
Efficient task scheduling on the cloud using artificial neural network and particle swarm optimization44
Issue Information42
Parallel tensor decomposition with distributed memory based on hierarchical singular value decomposition40
Blockchain based integrity assurance framework for COVID‐19 information management & decision making at National Command Operation Center, Pakistan39
A smart access control mechanism based on user preference in online social networks39
Performance evaluation of accessibility checker tool for educational websites38
Investigations on the performance of distributed Raman amplifier in dense wavelength division multiplexed communication system using different modulation formats37
A framework for investigating search engines' stemming mechanisms: A case study on Bing37
Issue Information37
Elderly Hajj pilgrims activity recognition based on candidate classification technique36
Differential privacy: Review of improving utility through cryptography‐based technologies36
Issue Information36
An energy‐efficient priority‐based packet scheduling mechanism for enhancing quality of service in mobile ad hoc network34
Gene selection and classification using correlation feature selection based binary bat algorithm with greedy crossover34
Extreme learning with projection relational algebraic secured data transmission for big cloud data33
Improving the efficiency of graph algorithm executions on high‐performance computing33
A novel fuzzy and reverse auction‐based algorithm for task allocation with optimal path cost in multi‐robot systems33
Multi‐objective GA to schedule task graphs on heterogeneous voltage frequency islands33
Issue Information33
A feed forward deep neural network model using feature selection for cloud intrusion detection system32
Distributed low‐latency broadcast scheduling for multi‐channel duty‐cycled wireless IoT networks31
Stacked ensemble modeling for improved tuberculosis treatment outcome prediction in pediatric cases31
Shuffled shepherd political optimization‐based deep learning method for credit card fraud detection31
Modified Cryptosystem‐Based Authentication Protocol for Internet of Things in Fog Networks30
BAC: A block alliance consensus mechanism for the mine consortium blockchain30
Blue Waters system and component reliability29
A new parallel tabu search algorithm for the optimization of the maximum vertex weight clique problem29
ONOS Flood Defender: A Real‐Time Flood Attacks Detection and Mitigation System in SDN Networks29
FPHO: Fractional Pelican Hawks optimization based container consolidation in CaaS cloud29
Cascade Ownership Verification Framework Based on Invisible Watermark for Model Copyright Protection29
Joint optimal beam forming and resource allocation in intelligent reflecting surface aided wireless power transfer rate splitting multiple access system29
Towards a robust scale‐free network in internet of health things against multiple attacks using an inter‐core based reconnection strategy28
A serverless gateway for event‐driven machine learning inference in multiple clouds28
Enhancing CNN‐LSTM neural networks using jellyfish search algorithm for pandemic modeling28
A fuzzy model for generalized transportation problems in China28
A cloud service recommendation method based on extended multi‐source information fusion28
Quantum Computer Architecture for Quantum Error Correction With Distributing Process to Multiple Temperature Layers27
A robust multiclass 3D object recognition based on modern YOLO deep learning algorithms26
A review on optimization techniques for medical image analysis26
Performance evaluation of Java/PCJ implementation of parallel algorithms on the cloud (extended version)26
Novel segmentation and classification algorithm for detection of tomato leaf disease26
Updated delegated proof of stake and Nash equilibrium: A mining pool game model for blockchain network26
Multi‐objective Firefly algorithm combining logistic mapping and Cauchy mutation26
A modified graywolf‐basedchameleon swarm algorithm for minimizing energy consumption and enabling secure communication in wireless sensor network26
Feature extraction and enhancement for real‐time semantic segmentation25
Reinforcement learning using fully connected, attention, and transformer models in knapsack problem solving25
An efficient machine learning based ventricular late potential detection and classification technique for cardiac healthcare24
Bitcoin price prediction using optimized multiplicative long short term memory with attention mechanism using modified cuckoo search optimization23
Entropy and improved k‐nearest neighbor search based under‐sampling (ENU) method to handle class overlap in imbalanced datasets23
The Hawai`i Groundwater Recharge Tool23
Privacy Protection During the Issuance and Revocation of Verifiable Credentials in Self‐Sovereign Identity23
23
Abstractive text summarization using deep learning with a new Turkish summarization benchmark dataset23
Optimizing computational costs of Spark for SARS‐CoV‐2 sequences comparisons on a commercial cloud22
The role of image interpolation in pansharpening22
A study on VLSI implementation of image enhancement techniques22
Key Sequences based on Cyclic Elliptic Curves over GF(28) with Logistic Map for Cryptographic Applications22
Issue Information22
PB3Opt: Profile‐based biased Bayesian optimization to select computing clusters on the cloud22
EduChain: A highly available education consortium blockchain platform based on Hyperledger Fabric21
A review on security requirements specification by formal methods21
Power‐efficient optimized clustering method with intelligent fog computing for wireless sensor networks21
Improved Byzantine fault tolerance with fast consensus21
Object‐aware deep feature extraction for feature matching21
Enhanced global and local face feature extraction for effective recognition of facial emotions20
NLSP: A novel lattice‐based secure primitive for privacy‐preserving smart grid communications20
An intelligent signboard to assign the speed limit on ways using ANN20
A new model for trustworthy web service QoS prediction20
Probability and topic‐based data transmission protocol20
Online streaming feature selection for multigranularity hierarchical classification learning19
19
Community detection by influential nodes based on random walk distance19
A study on path planning optimization of mobile robots based on hybrid algorithm19
Accelerating deep learning inference via layer truncation and transfer learning for fingerprint classification19
Non‐orthogonal multiple access‐based task processing and energy optimization in vehicular edge computing networks19
Pattern2Vec: Representation of clickstream data sequences for learning user navigational behavior19
An efficient fault tolerance scheme based enhanced firefly optimization for virtual machine placement in cloud computing18
Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system18
A location‐aware physical unclonable function and Chebyshev map‐based mutual authentication mechanism for internet of surveillance drones18
Cloud Elasticity of Microservices‐Based Applications: A Survey18
Online feature selection for hierarchical classification learning based on improved ReliefF18
The blockchain conundrum: An in‐depth examination of challenges, contributing technologies, and alternatives18
Structure‐Aware Representation Learning for Effective Performance Prediction18
A novel approach to QoS‐aware resource allocation in NOMA cellular HetNets using multi‐layer optimization18
PKD‐Net: Distillation of prior knowledge for image completion by multi‐level semantic attention17
Enhancing Edge Environment Scalability: Leveraging Kubernetes for Container Orchestration and Optimization17
Secure paths based trustworthy fault‐tolerant routing in data center networks17
Improving the accessibility of NUMA‐aware C++ application development based on the PGASUS framework17
Identification of influential vertices in complex networks: A hitting time‐based approach17
Handoff performance analysis of PMIPv6‐based distributed mobility management protocol‐urban scenario17
The convolutional neural network approach from electroencephalogram signals in emotional detection17
Network traffic classification based‐ masked language regression model using CNN17
Reactive power control of hybrid systems using improved coyote optimizer17
A mobile energy trading scheme based on Lightning Network17
Retraction17
FBO‐RNN: Fuzzy butterfly optimization‐basedRNN‐LSTMfor extracting sentiments from Twitter Emoji database17
Mobility speed prediction using ARIMA and RNN for random walk mobility model in mobile ad hoc networks16
Processing‐in‐memory based multilateration localization in wireless sensor networks using memristor crossbar arrays16
Stackedmulti‐layersecurity for Hadoop distributed file system usingHSCTsteganography16
OCTRA‐5G: Osmotic computing based task scheduling and resource allocation framework for 5G16
Artificial neural network‐driven federated learning for heart stroke prediction in healthcare 4.0 underlying 5G16
16
GPU accelerated 3DES encryption16
An efficient field programmable gate array based hardware architecture for efficient motion estimation with parallel implemented genetic algorithm16
Object pose estimation based on stereo vision with improvedK‐DtreeICPalgorithm16
Explainable AI for DBA: Bridging the DBA's experience and machine learning in tuning database systems16
A Multidimensional Virtual Resource Allocation Framework With Energy‐Aware Physical Resource Mapping for Green Cloud Computing16
Multilayer privacy‐preserving model for security and privacy access control in edge computing16
Autism spectrum disorder detection using sequential minimal optimization‐support vector machine hybrid classifier according to history of jaundice and family autism in children15
LoHDP: Adaptive local differential privacy for high‐dimensional data publishing15
Chinese causal event extraction using causality‐associated graph neural network15
Issue Information15
Edge intelligence‐enabled cyber‐physical systems15
Secure personal authentication in fog devices via multimodal rank‐level fusion15
Issue Information15
Whale social optimization driven deep recurrent neural network for loan eligibility prediction15
Enhanced routing using recurrent neural networks in software defined‐data center network14
A generation of synthesized trajectories of free moving objects for testing a set of continuous spatio‐temporal queries14
Visualization of profiling and tracing in CPU‐GPU programs14
Controlling energy aware clustering and multihop routing protocol for IoT assisted wireless sensor networks14
Botnet attack detection in Internet of Things devices over cloud environment via machine learning14
Neighbor cleaning learning based cost‐sensitive ensemble learning approach for software defect prediction14
Special Issue on International Conference on Innovations in Intelligent Systems and Applications (INISTA 2021)14
Research on Indoor UWB Positioning Based on Expectation Maximization in NLOS Environment14
Unveiling the Invisible: Powering Security Threat Detection in WSN With AI14
Chaos teaching learning based algorithm for large‐scale global optimization problem and its application14
Human activity recognition based on integration of multilayer information of convolutional neural network architecture14
Workflow aware analytical model to predict performance and cost of serverless execution14
A Distributed Parallel Network Intrusion Detection System Based on Ray Framework With GPU Acceleration14
Compression and load balancing for efficient sparse matrix‐vector product on multicore processors and graphics processing units13
Hybrid optimization based learning technique for multi‐disease analytics from healthcare big data using optimal pre‐processing, clustering and classifier13
Secure lightweight multi‐party key agreement based on hyperelliptic curve Diffie–Hellman for constraint networks13
DONUTS: An efficient method for checkpointing in non‐volatile memories13
Capitalizing the database cost models process through a service‐based pipeline13
Ramanujan bipartite graph products for efficient block sparse neural networks13
13
Classification of stochastic processes with topological data analysis13
Seismic P‐wave first‐arrival picking model based on EQK‐IncResNet13
Retraction13
Not all applications have boring communication patterns: Profiling message matching with BMM13
Blockchain‐based certificateless public auditing with privacy‐preserving for cloud‐based cyber‐physical systems13
13
Detection of atrial fibrillation using variable length genetic algorithm and convolutional neural network13
Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks12
A comparative analysis between late fusion of features approach and ensemble of multiple classifiers approach for image classification12
Analysis of automated guided vehicle use in health care by simulation: A case study in a university hospital12
Novel hawk swarm‐optimized deep learning classification with K‐nearest neighbor based decision making for autonomous vehicle movement controller12
Deep belief network and support vector machine fusion for distributed denial of service and economical denial of service attack detection in cloud12
Dynamic load balancing assisted optimized access control mechanism for Edge‐Fog‐Cloud network in Internet of Things environment12
Survey on compressed sensing reconstruction method for3Ddata12
Improving automated Turkish text classification with learning‐based algorithms12
A Robust Watermarking for Camera‐Captured Images Using Few‐Shot Learning and Simulated Noise Layer12
Fair XIDS: Ensuring fairness and transparency in intrusion detection models12
Low‐Light Image Enhancement Algorithm Based on Improved MSRCP With Chromaticity Preservation12
A holistic evaluation methodology for configuring production data centers12
Issue Information12
12
Improved heterogeneous data fusion and multi‐scale feature selection method for lung cancer subtype classification12
An intelligent MAC protocol for mission critical applications in wireless sensor networks12
An efficient hand gesture recognition based on optimal deep embedded hybrid convolutional neural network‐long short term memory network model12
Networking in next generation disaggregated datacenters11
The dummy‐based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles11
A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era11
A hybrid HXPLS‐TMFCC parameterization and DCNN‐SFO clustering based speaker diarization system11
Multispectral hand features for secure biometric authentication systems11
Parallelization of a meteorological model using message passing interface and CUDA: A case study with the inversion estimation algorithm11
On the improved generalized linear model‐based monitoring methods for Poisson distributed processes11
Issue Information11
A negotiation framework for the cloud using rough set theory‐based preference prediction11
Modality aware contrastive learning for multimodal human activity recognition11
Internet of medical things‐based multitiered and hybrid architectural framework for effective heart disease prediction model11
A novel marble recognition system using extreme learning machine with LBP and histogram features11
duf: Dynamic uncore frequency scaling to reduce power consumption11
Performance assessment of ensembles of in situ workflows under resource constraints11
Interactive C++ code development using C++Explorer and GitHub classroom for educational purposes11
Blockchain‐based transparent and certificateless data integrity auditing for cloud storage11
A bartering double auction resource allocation model in cloud environments11
11
MaLeFICE: Machine learning support for continuous performance improvement in computational engineering11
Issue Information11
Implementation and evaluation of two parallel computational models for the simulation of a long‐haul DWDM system limited by FWM10
On the security of fully homomorphic encryption for data privacy in Internet of Things10
A Quantum‐Inspired Source‐Distributed Opportunistic Routing Protocol for Reliable Routing in Underwater Wireless Sensor Networks10
High‐performance anomaly intrusion detection system with ensemble neural networks on reconfigurable hardware10
Issue Information10
10
Modeling belief‐desire‐intention reasoning agents for situation‐aware formalisms10
A Multi‐Objective Decision‐Making Neural Network: Effective Structure and Learning Method10
TPST: A Traffic Flow Prediction Model Based on Spatial–Temporal Identity10
Quasi‐identifier recognition with echo chamber optimization‐based anonymization for privacy preservation of cloud storage10
Modified generalized confidence interval for the stress‐strength reliability from exponentiated Weibull distribution10
Analysis and classification of drone sounds from digital media10
A novel optimized intelligent green signal timing system for urban corridor10
Hybrid recommender system based on fuzzy neural algorithm10
Creating orthophotos with unmanned aerial vehicles and examining its accuracy and usability in geodetic applications10
Issue Information10
Real‐time prediction of horizontal drilling pressure based on convolutional Transformer10
Early experiences on the OLCF Frontier system with AthenaPK and Parthenon‐Hydro10
Improving cancer prediction using feature selection in spark environment10
Toward more efficient locality‐sensitive hashing via constructing novel hash function cluster10
Provably secure lightweight certificateless lattice‐based authenticated key exchange scheme for IIoT10
Oppositional tunicate fuzzy C‐means algorithm and logistic regression for intrusion detection on cloud10
Multilevel security for medical image using heterogeneous chaotic map and deoxyribonucleic acid sequence operations10
3D reconstruction based on photoelastic fringes10
Object detection and estimation: A hybrid image segmentation technique using convolutional neural network model10
Medical concept integrated residual short‐long temporal convolutional networks for predicting clinical events10
Detection of zero‐day attacks in computer networks using combined classification10
An efficient front‐to‐back depth‐buffer algorithm for real‐time rendering of partially occluded game objects in absence of GPU10
Blockchain assisted encryption scheme for intellectual share estimation using medical research data9
Architecture‐oriented security strategy determination for cyber‐physical systems9
DLDC: Deep learning‐based deadline constrained load balancing technique9
Smart bin: Waste segregation system using deep learning‐Internet of Things for sustainable smart cities9
Privacy‐Preserving Real‐Time Smart Grid Topology Analysis: A Graph Neural Networks Approach9
A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence9
Hybrid deep‐Q Elman neural network for crop prediction and recommendation based on environmental changes9
On enhanced exponential‐cum‐ratio estimators using robust measures of location9
Blockchain‐based framework for secured storage, sharing, and querying of electronic healthcare records9
Selective counter design in quantum‐dot cellular automata nanotechnology9
MABC‐EPF: Video in‐painting technique with enhanced priority function and optimal patch search algorithm9
Improved mayfly optimization deep stacked sparse auto encoder feature selection scorched gradient descent driven dropout XLM learning framework for software defect prediction9
A proficient approach for face detection and recognition using machine learning and high‐performance computing9
AWC‐NIDS: Attack‐wise customized network intrusion detection system using machine learning, concurrency, and distributed systems9
Edge intelligence‐enabled dynamic overlapping community discovery and evolution prediction in social media data streams9
Machine learning and IoT‐based model for patient monitoring and early prediction of diabetes9
A taxonomy and survey of big data in social media9
Detection and categorization of acute intracranial hemorrhage subtypes using a multilayer DenseNet‐ResNet architecture with improved random forest classifier9
QoS for best‐effort batch jobs in container‐based cloud9
Learning multi‐organ and tumor segmentation from partially labeled datasets by a conditional dynamic attention network9
An effective way for Taiwanese stock price prediction: Boosting the performance with machine learning techniques9
Combining bidirectional long short‐term memory and self‐attention mechanism for code search9
Building a smart traffic light system based on Internet of Things using ‐calculus9
Transparent subsidized agri‐product distribution during pandemics with reputation based PoA blockchain9
A multi‐queue priority‐based task scheduling algorithm in fog computing environment9
Extended particle swarm optimization for feature selection of high‐dimensional biomedical data9
Characterization of data compression across CPU platforms and accelerators9
Noise‐robust neural networks for medical image segmentation by dual‐strategy sample selection9
Elastic deployment of container clusters across geographically distributed cloud data centers for web applications9
Retraction9
Feature selection‐integrated classifier optimisation algorithm for network intrusion detection9
HRCUNet: Hierarchical Region Contrastive Learning for Segmentation of Breast Tumors in DCEMRI9
0.23212099075317