Journal of Cloud Computing-Advances Systems and Applications

Papers
(The median citation count of Journal of Cloud Computing-Advances Systems and Applications is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Low-cost and high-performance abnormal trajectory detection based on the GRU model with deep spatiotemporal sequence analysis in cloud computing367
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning90
Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm79
PPO-based deployment and phase control for movable intelligent reflecting surface78
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions73
Innovation strategy design of public sports service governance based on cloud computing73
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment70
Hyperparameter optimization method based on dynamic Bayesian with sliding balance mechanism in neural network for cloud computing64
An overview of QoS-aware load balancing techniques in SDN-based IoT networks52
Dependency-aware online task offloading based on deep reinforcement learning for IoV48
Exploring cross-cultural and gender differences in facial expressions: a skin tone analysis using RGB Values45
Look-ahead energy efficient VM allocation approach for data centers40
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins40
An ECC-based mutual data access control protocol for next-generation public cloud39
UDL: a cloud task scheduling framework based on multiple deep neural networks39
Intermediate data fault-tolerant method of cloud computing accounting service platform supporting cost-benefit analysis38
Container cascade fault detection based on spatial–temporal correlation in cloud environment37
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems37
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.035
An accurate management method of public services based on big data and cloud computing34
Service composition considering energy consumption of users and transferring files in a multicloud environment33
TCP Stratos for stratosphere based computing platforms32
Cloud based evaluation of databases for stock market data32
Virtualized intelligent genetic load balancer for federated hybrid cloud environment using deep belief network classifier30
sRetor: a semi-centralized regular topology routing scheme for data center networking30
Adaptive heuristic edge assisted fog computing design for healthcare data optimization28
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications27
Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment27
Welcome to the new Journal of Cloud Computing by Springer27
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm25
Low-rate Denial of Service attack detection method based on time-frequency characteristics25
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure25
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks24
Fintech application on banking stability using Big Data of an emerging economy24
A Review of Intelligent Verification System for Distribution Automation Terminal based on Artificial Intelligence Algorithms23
Innovative deep learning techniques for monitoring aggressive behavior in social media posts23
File processing security detection in multi-cloud environments: a process mining approach23
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages22
A novel vehicular task deployment method in hybrid MEC22
Cloud failure prediction based on traditional machine learning and deep learning21
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach20
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT20
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network20
HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning20
A cost-efficient content distribution optimization model for fog-based content delivery networks20
A cloud-edge computing architecture for monitoring protective equipment19
When wavelet decomposition meets external attention: a lightweight cloud server load prediction model19
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment18
Blockchain-based 6G task offloading and cooperative computing resource allocation study18
Enhanced security using multiple paths routine scheme in cloud-MANETs17
Traffic prediction for diverse edge IoT data using graph network16
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet16
A convolutional neural network based online teaching method using edge-cloud computing platform16
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud16
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns15
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps14
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types14
A hybrid machine learning model with self-improved optimization algorithm for trust and privacy preservation in cloud environment14
A systematic review on blockchain-based access control systems in cloud environment14
Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records14
Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions14
An efficient population-based multi-objective task scheduling approach in fog computing systems13
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform13
Multiple objectives dynamic VM placement for application service availability in cloud networks13
A survey of Kubernetes scheduling algorithms13
From data to insights: the application and challenges of knowledge graphs in intelligent audit12
Analyzing the trend of government support for cloud computing usage in e-government architecture12
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations12
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments12
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure12
Intelligent urbanism with artificial intelligence in shaping tomorrow’s smart cities: current developments, trends, and future directions12
Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach12
IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing12
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devices12
Energy-efficient allocation for multiple tasks in mobile edge computing12
Efficient task offloading using particle swarm optimization algorithm in edge computing for industrial internet of things12
Server deployment strategies considering robustness and resource constraints in edge computing11
Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin11
Intelligent acceptance systems for distribution automation terminals: an overview of edge computing technologies and applications11
Efficiency and optimization of government service resource allocation in a cloud computing environment11
Enhancing configuration security with heterogeneous read points11
Agent-based multi-tier SLA negotiation for intercloud11
Joint optimization of energy trading and consensus mechanism in blockchain-empowered smart grids: a reinforcement learning approach11
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing11
Cross-chain asset trading scheme for notaries based on edge cloud storage11
Virtual machine placement in energy aware load balancer using fog classifier11
Correction to: Edge intelligence‑assisted animation design with large models: a survey10
A big data study of language use and impact in radio broadcasting in China10
DU-Net-Cloud: a smart cloud-edge application with an attention mechanism and U-Net for remote sensing images and processing10
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database10
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain10
Software architecture for pervasive critical health monitoring system using fog computing10
Recommend what to cache: a simple self-supervised graph-based recommendation framework for edge caching networks10
A new dynamic security defense system based on TCP_REPAIR and deep learning10
A multi-dimensional extensible cloud-native service stack for enterprises10
Lightweight similarity checking for English literatures in mobile edge computing10
The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things10
The key security management scheme of cloud storage based on blockchain and digital twins10
LAE-GAN: a novel cloud-based Low-light Attention Enhancement Generative Adversarial Network for unpaired text images10
Minimize average tasks processing time in satellite mobile edge computing systems via a deep reinforcement learning method10
DSTS: A hybrid optimal and deep learning for dynamic scalable task scheduling on container cloud environment10
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)9
A knowledge-graph based text summarization scheme for mobile edge computing9
BTP: automatic identification and prediction of tasks in data center networks9
Anomaly detection in microservice environments using distributed tracing data analysis and NLP9
AI-empowered game architecture and application for resource provision and scheduling in multi-clouds9
Double auction and profit maximization mechanism for jobs with heterogeneous durations in cloud federations9
Fine-grained load balancing with traffic-aware rerouting in datacenter networks9
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times9
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm9
An experimental study of fog and cloud computing in CEP-based Real-Time IoT applications9
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains9
Optimus: association-based dynamic system call filtering for container attack surface reduction8
Smart and efficient EV charging navigation scheme in vehicular edge computing networks8
A maturity model for AI-empowered cloud-native databases: from the perspective of resource management8
Defect knowledge graph construction and application in multi-cloud IoT8
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing8
Security issues of news data dissemination in internet environment8
Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity8
Recognizing online video genres using ensemble deep convolutional learning for digital media service management8
Secure routing protocol based on dynamic reputation and load balancing in wireless mesh networks8
A blockchain-based SLA monitoring and compliance assessment for IoT ecosystems8
Improving cloud storage and privacy security for digital twin based medical records8
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices8
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm8
Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools8
Identity-based remote data checking with a designated verifier7
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications7
Review on the application of cloud computing in the sports industry7
Correction: Improved wild horse optimization with levy fight algorithm for effective task scheduling in cloud computing7
A multi-strategy ontology mapping method based on cost-sensitive SVM7
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability7
Evaluation of AI tools for healthcare networks at the cloud-edge interaction to diagnose autism in educational environments7
RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks7
Optimal urban competitiveness assessment using cloud computing and neural network7
Correction to: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications7
Adaptive device sampling and deadline determination for cloud-based heterogeneous federated learning7
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures7
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment6
PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks6
Low-power multi-cloud deployment of large distributed service applications with response-time constraints6
Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning6
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing6
A novel virtual machine placement algorithm based on grey wolf optimization6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection6
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities6
Task offloading optimization mechanism based on deep neural network in edge-cloud environment6
MBi-GRUMCONV: A novel Multi Bi-GRU and Multi CNN-Based deep learning model for social media sentiment analysis6
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing6
A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving6
Serverless computing: a security perspective6
Enhancing multimedia management: cloud-based movie type recognition with hybrid deep learning architecture6
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes6
FedEem: a fairness-based asynchronous federated learning mechanism6
Deep Reinforcement Learning techniques for dynamic task offloading in the 5G edge-cloud continuum6
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review6
A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system6
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing6
Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems6
A large-scale data security detection method based on continuous time graph embedding framework5
BGFL: a blockchain-enabled group federated learning at wireless industrial edges5
A resource scheduling method for cloud data centers based on thermal management5
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption5
Real-time trajectory privacy protection based on improved differential privacy method and deep learning model5
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning5
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model5
A designated verifier multi-signature scheme in multi-clouds5
Optimization model for vehicular network data queries in edge environments5
Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics5
Intelligent evaluation model of basketball teaching reliability based on swarm intelligence and edge computing5
Voice spoofing countermeasure for voice replay attacks using deep learning5
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing5
Detection of cotton leaf curl disease’s susceptibility scale level based on deep learning5
Two-stage hybrid genetic algorithm for robot cloud service selection5
NIDD: an intelligent network intrusion detection model for nursing homes5
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system5
A lightweight convolutional neural network based on dense connection for open-pit coal mine service identification using the edge-cloud architecture5
Efficient 3D object recognition in mobile edge environment5
Predicting the individual effects of team competition on college students’ academic performance in mobile edge computing5
Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling5
Characterization of task response time in fog enabled networks using queueing theory under different virtualization modes5
Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing5
A secure data interaction method based on edge computing5
Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems4
PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach4
CG-PBFT: an efficient PBFT algorithm based on credit grouping4
FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings4
Edge-cloud computing cooperation detection of dust concentration for risk warning research4
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning4
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree4
Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing4
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach4
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud4
Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation4
An improved ACO based service composition algorithm in multi-cloud networks4
Automated visual quality assessment for virtual and augmented reality based digital twins4
CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution4
A fine-grained task scheduling mechanism for digital economy services based on intelligent edge and cloud computing4
Correction to: Severity: a QoS-aware approach to cloud application elasticity4
Multi party confidential verifiable electronic voting scheme based on blockchain4
Correction to: A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function4
A trusted IoT data sharing method based on secure multi-party computation4
Resource allocation strategy for blockchain-enabled NOMA-based MEC networks4
Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network4
Resource allocation and network pricing based on double auction in mobile edge computing4
Privacy-preserving sports data fusion and prediction with smart devices in distributed environment4
Towards optimized scheduling and allocation of heterogeneous resource via graph-enhanced EPSO algorithm4
QoS prediction in intelligent edge computing based on feature learning4
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities4
Building integrated assessment model for IoT technology deployment in the Industry 4.04
A novel approach for IoT tasks offloading in edge-cloud environments3
Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation3
A split-federated learning and edge-cloud based efficient and privacy-preserving large-scale item recommendation model3
Robust-PAC time-critical workflow offloading in edge-to-cloud continuum among heterogeneous resources3
Security-Aware computation offloading for Mobile edge computing-Enabled smart city3
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform3
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing3
Cross-domain coordination of resource allocation and route planning for the edge computing-enabled multi-connected vehicles3
Cloud-based multiclass anomaly detection and categorization using ensemble learning3
Cloud-based blockchain technology to identify counterfeits3
Load balancing and service discovery using Docker Swarm for microservice based big data applications3
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment3
Cost modelling and optimisation for cloud: a graph-based approach3
Mobile computing-enabled health physique evaluation in campus based on amplified hashing3
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment3
Dynamic routing optimization in software-defined networking based on a metaheuristic algorithm3
A trusted de-swinging k-anonymity scheme for location privacy protection3
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture3
Improving datacenter utilization through containerized service-based architecture3
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing3
Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a survey3
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing3
Intent-driven cloud resource design framework to meet cloud performance requirements and its application to a cloud-sensor system3
Big data analytics in Cloud computing: an overview3
Recognizing sports activities from video frames using deformable convolution and adaptive multiscale features3
An edge server deployment method based on optimal benefit and genetic algorithm3
An intelligent approach of task offloading for dependent services in Mobile Edge Computing3
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning3
Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN3
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability3
A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function3
Constrained optimal grouping of cloud application components3
Energy-aware adaptive offloading of soft real-time jobs in mobile edge clouds3
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario3
A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique3
Simcan2Cloud: a discrete-event-based simulator for modelling and simulating cloud computing infrastructures3
Data-intensive workflow scheduling strategy based on deep reinforcement learning in multi-clouds3
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds3
SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse3
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency3
0.11501097679138