Journal of Cloud Computing-Advances Systems and Applications

Papers
(The median citation count of Journal of Cloud Computing-Advances Systems and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns563
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet128
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations118
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems110
Cloud based evaluation of databases for stock market data84
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments77
Intelligent urbanism with artificial intelligence in shaping tomorrow’s smart cities: current developments, trends, and future directions73
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.070
HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning70
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning69
Dependency-aware online task offloading based on deep reinforcement learning for IoV65
Hybrid compression-based routing strategies for enhanced energy efficiency in wireless sensor networks65
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach61
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure60
Adaptive heuristic edge assisted fog computing design for healthcare data optimization59
UDL: a cloud task scheduling framework based on multiple deep neural networks58
Efficiency and optimization of government service resource allocation in a cloud computing environment55
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times51
The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things49
A multi-strategy ontology mapping method based on cost-sensitive SVM49
Identity-based remote data checking with a designated verifier48
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm46
Optimal urban competitiveness assessment using cloud computing and neural network45
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment45
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing43
Smart and efficient EV charging navigation scheme in vehicular edge computing networks43
Serverless computing: a security perspective43
Cloud–edge collaborative AI for symmetry and asymmetry in human motion understanding and collaboration43
Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis42
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm42
Optimized dynamic resource allocation in quantum networks for secure and efficient wireless communication41
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning39
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform38
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds37
Voice spoofing countermeasure for voice replay attacks using deep learning37
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning37
Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems36
A novel satellite application deployment method in Satellite Constellation through Inter-Satellite Links35
Edge-cloud computing cooperation detection of dust concentration for risk warning research34
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing34
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario33
Perception of premium services based on the evolution of hyper-service network in mobile edge computing33
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture33
Automated visual quality assessment for virtual and augmented reality based digital twins33
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing33
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency32
BGFL: a blockchain-enabled group federated learning at wireless industrial edges32
Admission control policy and key agreement based on anonymous identity in cloud computing31
Stateless Q-learning algorithm for service caching in resource constrained edge environment31
A new method of dynamic network security analysis based on dynamic uncertain causality graph30
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT29
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records29
Collaborative smart detectors for edge surveillance in cognitive monitoring systems using Kullback-Leibler divergence27
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism27
Cloud-based blockchain technology to identify counterfeits27
Synergistic cloud-edge intelligence for real-time multimodal entity linking and knowledge retrieval27
NuWa: off-state tolerant backscattering system with uncontrolled excitation traffics26
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing26
Efficient and scalable patients clustering based on medical big data in cloud platform26
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing25
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing25
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing24
Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing24
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments24
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting24
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos24
Privacy-preserving federated learning based on partial low-quality data24
Optimizing energy task offloading technique using IoMT cloud in healthcare applications24
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces23
Fog computing application of cyber-physical models of IoT devices with symbolic approximation algorithms23
Task grouping and optimized deep learning based VM sizing for hosting containers as a service23
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure23
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories23
Energy-efficient allocation for multiple tasks in mobile edge computing22
Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model22
Traffic prediction for diverse edge IoT data using graph network22
A cloud-edge collaborative task scheduling method based on model segmentation22
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost22
Tourism cloud management system: the impact of smart tourism22
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT21
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types21
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps21
Enhanced security using multiple paths routine scheme in cloud-MANETs21
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment21
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications20
An ECC-based mutual data access control protocol for next-generation public cloud20
An access control system for cloud-based healthcare systems driven by blockchain20
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform20
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure20
Virtual machine placement in energy aware load balancer using fog classifier20
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions20
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing19
Security issues of news data dissemination in internet environment19
Lightweight similarity checking for English literatures in mobile edge computing19
Software architecture for pervasive critical health monitoring system using fog computing18
An energy-conscious scheduling framework for serverless edge computing in IoT18
A new dynamic security defense system based on TCP_REPAIR and deep learning18
A multi-dimensional extensible cloud-native service stack for enterprises18
AI-empowered game architecture and application for resource provision and scheduling in multi-clouds18
Cross-chain asset trading scheme for notaries based on edge cloud storage18
MkRP: multiple k registry placement for fast container deployment on edge computing17
Recognizing online video genres using ensemble deep convolutional learning for digital media service management17
A big data study of language use and impact in radio broadcasting in China17
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database17
Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning16
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications16
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection16
Server deployment strategies considering robustness and resource constraints in edge computing16
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review16
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures16
A hybrid metaheuristic federated learning approach based attack detection system for multi-cloud environment16
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities16
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing16
Security-aware computation offloading in internet of vehicles: a multi-agent reinforcement learning algorithm with attention mechanism16
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree15
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment15
Cross-technology cloud offloading model15
FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings15
Efficient 3D object recognition in mobile edge environment15
Hybrid dolphin swarm sparrow search optimization based multi-objective cloud workflow scheduling15
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system15
CG-PBFT: an efficient PBFT algorithm based on credit grouping15
LLM-based cost-aware task scheduling for cloud computing systems15
A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function15
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities15
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing15
Cloud-based multiclass anomaly detection and categorization using ensemble learning15
A novel virtual machine placement algorithm based on grey wolf optimization14
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments14
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching14
Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation14
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing14
A bidirectional DNN partition mechanism for efficient pipeline parallel training in cloud14
HVS-inspired adversarial image generation with high perceptual quality14
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive14
Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications13
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models13
A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection13
Joint DNN partitioning and task offloading in mobile edge computing via deep reinforcement learning13
Explainable AI-based innovative hybrid ensemble model for intrusion detection13
An enhanced encryption-based security framework in the CPS Cloud13
Edge computing-based digital management system of game events in the era of Internet of Things13
Blockchain enabled zero trust based authentication scheme for railway communication networks13
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future13
An adaptive routing strategy in P2P-based Edge Cloud12
PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing12
Data repair optimization method for geo-distributed fault-tolerant storage systems based on whale optimization algorithm12
A virtual machine group-oriented TPM system for trusted cloud computing12
An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities12
Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users12
Scalability resilience framework using application-level fault injection for cloud-based software services12
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations12
ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction12
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain12
Making programmable packet scheduling time-sensitive with a FIFO queue12
Flexible evaluation method based on personalized evaluation requirements for cloud manufacturing services12
An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment12
A truthful dynamic combinatorial double auction model for cloud resource allocation12
PCL-RC: a parallel cloud resource load prediction model based on feature optimization11
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks11
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition11
OpenIaC: open infrastructure as code - the network is my computer11
Financial service composition with various privacy levels in multiple cloud environment11
Research study on securing the cloud: utilizing conventional and blockchain-based access control mechanisms11
Economical revenue maximization in mobile edge caching and blockchain enabled space-air-ground integrated networks11
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns11
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning11
A systematic review on effective energy utilization management strategies in cloud data centers11
Cloud failure prediction based on traditional machine learning and deep learning10
Blockchain-enhanced security and bayesian trust assessment for secure task scheduling in latency-critical fog computing environments10
In-depth analysis and open challenges of Mist Computing10
PPO-based deployment and phase control for movable intelligent reflecting surface10
Enhancing cloud security using attention-based improved RegNet with hybrid vigenere-shift transposition algorithm10
Intermediate data fault-tolerant method of cloud computing accounting service platform supporting cost-benefit analysis10
A systematic review on blockchain-based access control systems in cloud environment10
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network10
A novel vehicular task deployment method in hybrid MEC10
A survey of cyber threat intelligence in embedded system driven security for mobile health systems10
A cloud-edge computing architecture for monitoring protective equipment10
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment10
File processing security detection in multi-cloud environments: a process mining approach10
Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm10
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devices10
Look-ahead energy efficient VM allocation approach for data centers10
From data to insights: the application and challenges of knowledge graphs in intelligent audit10
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks10
Adaptive edge-fog healthcare networks: a novel framework for emergency response management9
SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation9
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes9
Optimized tourist point-of-interest recommendation through ARIMA and SVD in edge environment9
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)9
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing9
Rate-adaptive RDMA congestion control for AI clusters9
Review on the application of cloud computing in the sports industry9
A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving9
Optimus: association-based dynamic system call filtering for container attack surface reduction9
Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring9
PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks8
Correction to: A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function8
Secured transmission approach for transportation units with twin creations and artificial intelligence algorithm8
Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing8
CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution8
A secure data interaction method based on edge computing8
A resource scheduling method for cloud data centers based on thermal management8
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices8
Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network8
Improving datacenter utilization through containerized service-based architecture8
Building integrated assessment model for IoT technology deployment in the Industry 4.08
Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs8
Real-time trajectory privacy protection based on improved differential privacy method and deep learning model8
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach8
An edge server deployment method based on optimal benefit and genetic algorithm7
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model7
Wind power prediction method based on cloud computing and data privacy protection7
Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms7
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems7
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture7
Simcan2Cloud: a discrete-event-based simulator for modelling and simulating cloud computing infrastructures7
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm7
QHRMOF: A Quantum-Inspired hybrid Multi-Objective framework for Energy-Efficient task scheduling and load balancing in cloud computing7
CLQLMRS: improving cache locality in MapReduce job scheduling using Q-learning7
ASOD: an adaptive stream outlier detection method using online strategy7
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas7
Data-intensive workflow scheduling strategy based on deep reinforcement learning in multi-clouds7
Multi-Recipient encryption with keyword search without pairing for cloud storage7
Optimizing Spark job scheduling with distributional deep learning in cloud environments7
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications7
Cost modelling and optimisation for cloud: a graph-based approach7
An integrated SDN framework for early detection of DDoS attacks in cloud computing7
Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management7
MF-GCN-LSTM: a cloud-edge distributed framework for key positions prediction in grid projects7
A Review of Intelligent Verification System for Distribution Automation Terminal based on Artificial Intelligence Algorithms6
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability6
Correction: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications6
Sentence type identification-based product review sentiment analysis using BeDi-DC and Log-Squish CNN6
Innovation strategy design of public sports service governance based on cloud computing6
Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach6
Recommend what to cache: a simple self-supervised graph-based recommendation framework for edge caching networks6
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain6
Low-rate Denial of Service attack detection method based on time-frequency characteristics6
DU-Net-Cloud: a smart cloud-edge application with an attention mechanism and U-Net for remote sensing images and processing6
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing6
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins6
An accurate management method of public services based on big data and cloud computing6
The key security management scheme of cloud storage based on blockchain and digital twins6
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud6
Virtualized intelligent genetic load balancer for federated hybrid cloud environment using deep belief network classifier6
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages6
Innovative deep learning techniques for monitoring aggressive behavior in social media posts6
A convolutional neural network based online teaching method using edge-cloud computing platform6
0.12117910385132