Journal of Cloud Computing-Advances Systems and Applications

Papers
(The median citation count of Journal of Cloud Computing-Advances Systems and Applications is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas255
Analysis of factors affecting IoT-based smart hospital design77
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems61
Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions61
Survey on serverless computing57
Efficient task offloading using particle swarm optimization algorithm in edge computing for industrial internet of things55
A novel approach for IoT tasks offloading in edge-cloud environments53
Multi-level host-based intrusion detection system for Internet of things53
Big data analytics in Cloud computing: an overview48
An efficient population-based multi-objective task scheduling approach in fog computing systems48
Adaptive offloading in mobile-edge computing for ultra-dense cellular networks based on genetic algorithm45
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing43
Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities35
Joint optimization of network selection and task offloading for vehicular edge computing34
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing34
Enterprise adoption of cloud computing with application portfolio profiling and application portfolio assessment29
An edge-cloud collaborative computing platform for building AIoT applications efficiently28
Container orchestration on HPC systems through Kubernetes27
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues27
Federated learning in cloud-edge collaborative architecture: key technologies, applications and challenges26
Recognizing sports activities from video frames using deformable convolution and adaptive multiscale features25
A multi-objective optimization for resource allocation of emergent demands in cloud computing25
Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization23
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review22
Resource pooling in vehicular fog computing21
Cloud-based multiclass anomaly detection and categorization using ensemble learning21
An experimental study of fog and cloud computing in CEP-based Real-Time IoT applications21
Load balancing and service discovery using Docker Swarm for microservice based big data applications20
MBi-GRUMCONV: A novel Multi Bi-GRU and Multi CNN-Based deep learning model for social media sentiment analysis20
Multi-objective workflow optimization strategy (MOWOS) for cloud computing20
Serverless computing: a security perspective20
Edge intelligence-assisted animation design with large models: a survey20
Cloud-based intelligent self-diagnosis and department recommendation service using Chinese medical BERT20
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure20
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization19
A survey of Kubernetes scheduling algorithms19
Computation offloading strategy based on deep reinforcement learning for connected and autonomous vehicle in vehicular edge computing18
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning17
An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment17
A secure data deduplication system for integrated cloud-edge networks17
Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing17
EDQWS: an enhanced divide and conquer algorithm for workflow scheduling in cloud17
Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework16
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system15
Low-power multi-cloud deployment of large distributed service applications with response-time constraints15
Novel secure data protection scheme using Martino homomorphic encryption14
A blockchain index structure based on subchain query14
A threshold hybrid encryption method for integrity audit without trusted center14
Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework13
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities13
Cloud-based blockchain technology to identify counterfeits13
Identity-based remote data checking with a designated verifier13
Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a survey13
Bearing fault diagnosis method based on improved Siamese neural network with small sample12
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos12
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm12
A systematic review on effective energy utilization management strategies in cloud data centers12
Min-max exclusive virtual machine placement in cloud computing for scientific data environment12
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning12
Artificial intelligence and edge computing for teaching quality evaluation based on 5G-enabled wireless communication technology12
Digital image watermarking using discrete cosine transformation based linear modulation12
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing12
A SINS/DVL/USBL integrated navigation and positioning IoT system with multiple sources fusion and federated Kalman filter11
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT11
DSTS: A hybrid optimal and deep learning for dynamic scalable task scheduling on container cloud environment11
An enhanced encryption-based security framework in the CPS Cloud11
Optimizing task offloading and resource allocation in edge-cloud networks: a DRL approach11
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes11
Multi-Recipient encryption with keyword search without pairing for cloud storage11
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment11
Enhanced security using multiple paths routine scheme in cloud-MANETs11
Investigation into the effect of data reduction in offloadable task for distributed IoT-fog-cloud computing10
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm10
A port-based forwarding load-balancing scheduling approach for cloud datacenter networks10
Rough fuzzy model based feature discretization in intelligent data preprocess10
Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment10
IoT trust and reputation: a survey and taxonomy10
Securing medical image privacy in cloud using deep learning network10
Multi-chain and data-chains partitioning algorithm in intelligent manufacturing CPS10
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform10
Power flow adjustment for smart microgrid based on edge computing and multi-agent deep reinforcement learning10
In-depth analysis and open challenges of Mist Computing9
A trusted de-swinging k-anonymity scheme for location privacy protection9
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability9
Cloud failure prediction based on traditional machine learning and deep learning9
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree9
Flexible computation offloading in a fuzzy-based mobile edge orchestrator for IoT applications9
Software architecture for pervasive critical health monitoring system using fog computing9
Predicting the total Unified Parkinson’s Disease Rating Scale (UPDRS) based on ML techniques and cloud-based update9
Research on influencing factors of artificial intelligence multi-cloud scheduling applied talent training based on DEMATEL-TAISM9
Energy-aware adaptive offloading of soft real-time jobs in mobile edge clouds9
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions9
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)8
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT8
Dual-channel convolutional neural network for power edge image recognition8
BSS: a brokering model for service selection using integrated weighting approach in cloud environment8
Blockchain enabled zero trust based authentication scheme for railway communication networks8
Voice spoofing countermeasure for voice replay attacks using deep learning8
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages8
A cloud priority-based dynamic online double auction mechanism (PB-DODAM)8
Cloud-based bug tracking software defects analysis using deep learning8
Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment8
Joint task offloading and resource allocation in mobile edge computing with energy harvesting8
Security-Aware computation offloading for Mobile edge computing-Enabled smart city8
DRMaestro: orchestrating disaggregated resources on virtualized data-centers8
Cloud-based deep learning-assisted system for diagnosis of sports injuries8
Admission control policy and key agreement based on anonymous identity in cloud computing8
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency8
Distributed data hiding in multi-cloud storage environment7
Severity: a QoS-aware approach to cloud application elasticity7
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach7
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains7
OpenIaC: open infrastructure as code - the network is my computer7
An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches7
A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving7
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure7
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations7
A Transformer-based network intrusion detection approach for cloud security7
A user interest community evolution model based on subgraph matching for social networking in mobile edge computing environments7
Secure routing protocol based on dynamic reputation and load balancing in wireless mesh networks7
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment7
Cross-domain coordination of resource allocation and route planning for the edge computing-enabled multi-connected vehicles6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection6
File processing security detection in multi-cloud environments: a process mining approach6
An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities6
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces6
Security-driven distributed platforms for intellectual property resource provision - a case study of TSITE IP6
AIoT-driven multi-source sensor emission monitoring and forecasting using multi-source sensor integration with reduced noise series decomposition6
NIDD: an intelligent network intrusion detection model for nursing homes6
A fine-grained task scheduling mechanism for digital economy services based on intelligent edge and cloud computing6
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm6
Fintech application on banking stability using Big Data of an emerging economy6
PICF-LDA: a topic enhanced LDA with probability incremental correction factor for Web API service clustering6
A truthful dynamic combinatorial double auction model for cloud resource allocation6
MapReduce scheduling algorithms in Hadoop: a systematic study6
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds6
A differentially private distributed data mining scheme with high efficiency for edge computing6
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing6
Characterization and modeling of an edge computing mixed reality workload6
Executing cyclic scientific workflows in the cloud6
Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds6
Visibility estimation via deep label distribution learning in cloud environment6
Dynamic data collection algorithm based on mobile edge computing in underwater internet of things6
A resource scheduling method for cloud data centers based on thermal management6
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing5
Deep learning approach to security enforcement in cloud workflow orchestration5
Data transmission reduction formalization for cloud offloading-based IoT systems5
Decentralized and scalable hybrid scheduling-clustering method for real-time applications in volatile and dynamic Fog-Cloud Environments5
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing5
An environment safety monitoring system for agricultural production based on artificial intelligence, cloud computing and big data networks5
Scalability resilience framework using application-level fault injection for cloud-based software services5
Intent-driven cloud resource design framework to meet cloud performance requirements and its application to a cloud-sensor system5
Task offloading optimization mechanism based on deep neural network in edge-cloud environment5
RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks5
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing5
Advanced consistency management of highly-distributed transactional database in a hybrid cloud environment using novel R-TBC/RTA approach5
Latency and resource consumption analysis for serverless edge analytics5
Defect knowledge graph construction and application in multi-cloud IoT5
Intermediate data fault-tolerant method of cloud computing accounting service platform supporting cost-benefit analysis4
Automated all in one misspelling detection and correction system for Ethiopian languages4
Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems4
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing4
Intelligent intrusion detection framework for multi-clouds – IoT environment using swarm-based deep learning classifier4
Fine-grained load balancing with traffic-aware rerouting in datacenter networks4
SEFSD: an effective deployment algorithm for fog computing systems4
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devices4
Efficient and scalable patients clustering based on medical big data in cloud platform4
Low-rate Denial of Service attack detection method based on time-frequency characteristics4
Energy-efficient allocation for multiple tasks in mobile edge computing4
Blockchain enabled task offloading based on edge cooperation in the digital twin vehicular edge network4
Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation4
Resource allocation and network pricing based on double auction in mobile edge computing4
Application of deterministic, stochastic, and hybrid methods for cloud provider selection4
DU-Net-Cloud: a smart cloud-edge application with an attention mechanism and U-Net for remote sensing images and processing4
Effect of using 5G and cloud computing environment for independent college english vocabulary learning4
Look-ahead energy efficient VM allocation approach for data centers4
Service composition considering energy consumption of users and transferring files in a multicloud environment4
Suffix-based double reader tag movement RFID anti-collision method4
Intelligent urbanism with artificial intelligence in shaping tomorrow’s smart cities: current developments, trends, and future directions4
Blockchain-based collaborative edge computing: efficiency, incentive and trust4
ReactiveFnJ: A choreographed model for Fork-Join Workflow in Serverless Computing4
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability4
Real-time trajectory privacy protection based on improved differential privacy method and deep learning model4
Computation offloading technique for energy efficiency of smart devices4
Virtual machine placement in energy aware load balancer using fog classifier4
MRLCC: an adaptive cloud task scheduling method based on meta reinforcement learning4
Efficiency and optimization of government service resource allocation in a cloud computing environment4
Automated visual quality assessment for virtual and augmented reality based digital twins3
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture3
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform3
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment3
Design and analysis of wireless data center network topology HCDCN based on VLC3
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm3
Cost-effective land cover classification for remote sensing images3
A maturity model for AI-empowered cloud-native databases: from the perspective of resource management3
Improving cloud storage and privacy security for digital twin based medical records3
Load balancing scheduling mechanism for OpenStack and Docker integration3
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps3
A price-aware congestion control protocol for cloud services3
HTPC: heterogeneous traffic-aware partition coding for random packet spraying in data center networks3
Violence Detection Approach based on Cloud Data and Neutrosophic Cognitive Maps3
A bidirectional DNN partition mechanism for efficient pipeline parallel training in cloud3
Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling3
Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network3
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing3
Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning3
Tourism cloud management system: the impact of smart tourism3
A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system3
Method for detection of unsafe actions in power field based on edge computing architecture3
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times3
IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing3
Generic SDE and GA-based workload modeling for cloud systems3
A convolutional neural network based online teaching method using edge-cloud computing platform3
Distributed data hiding in a single cloud storage environment3
Edge computing-based digital management system of game events in the era of Internet of Things3
Quality assurance awareness in higher education in China: big data challenges3
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive3
Dynamic routing optimization in software-defined networking based on a metaheuristic algorithm3
Characterization of task response time in fog enabled networks using queueing theory under different virtualization modes3
Review on the application of cloud computing in the sports industry3
Time-series topic analysis using singular spectrum transformation for detecting political business cycles3
VTGAN: hybrid generative adversarial networks for cloud workload prediction3
The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things3
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns3
Agent-based multi-tier SLA negotiation for intercloud3
Multiple objectives dynamic VM placement for application service availability in cloud networks3
Memory sharing for handling memory overload on physical machines in cloud data centers3
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network3
PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing3
Reinforcement learning empowered multi-AGV offloading scheduling in edge-cloud IIoT3
Energy-efficient virtual machine placement in distributed cloud using NSGA-III algorithm3
Efficient 3D object recognition in mobile edge environment2
Anomaly detection in microservice environments using distributed tracing data analysis and NLP2
Double auction and profit maximization mechanism for jobs with heterogeneous durations in cloud federations2
Hyperparameter optimization method based on dynamic Bayesian with sliding balance mechanism in neural network for cloud computing2
Detection of cotton leaf curl disease’s susceptibility scale level based on deep learning2
Mobile computing-enabled health physique evaluation in campus based on amplified hashing2
Robust-PAC time-critical workflow offloading in edge-to-cloud continuum among heterogeneous resources2
Lightweight similarity checking for English literatures in mobile edge computing2
A spatio-temporal specification language and its completeness & decidability2
An overview of QoS-aware load balancing techniques in SDN-based IoT networks2
A lightweight convolutional neural network based on dense connection for open-pit coal mine service identification using the edge-cloud architecture2
A designated verifier multi-signature scheme in multi-clouds2
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption2
A new dynamic security defense system based on TCP_REPAIR and deep learning2
Optimal urban competitiveness assessment using cloud computing and neural network2
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing2
Exploring cross-cultural and gender differences in facial expressions: a skin tone analysis using RGB Values2
A split-federated learning and edge-cloud based efficient and privacy-preserving large-scale item recommendation model2
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario2
0.063203811645508