Journal of Cloud Computing-Advances Systems and Applications

Papers
(The TQCC of Journal of Cloud Computing-Advances Systems and Applications is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas255
Analysis of factors affecting IoT-based smart hospital design77
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems61
Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions61
Survey on serverless computing57
Efficient task offloading using particle swarm optimization algorithm in edge computing for industrial internet of things55
Multi-level host-based intrusion detection system for Internet of things53
A novel approach for IoT tasks offloading in edge-cloud environments53
Big data analytics in Cloud computing: an overview48
An efficient population-based multi-objective task scheduling approach in fog computing systems48
Adaptive offloading in mobile-edge computing for ultra-dense cellular networks based on genetic algorithm45
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing43
Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities35
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing34
Joint optimization of network selection and task offloading for vehicular edge computing34
Enterprise adoption of cloud computing with application portfolio profiling and application portfolio assessment29
An edge-cloud collaborative computing platform for building AIoT applications efficiently28
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues27
Container orchestration on HPC systems through Kubernetes27
Federated learning in cloud-edge collaborative architecture: key technologies, applications and challenges26
A multi-objective optimization for resource allocation of emergent demands in cloud computing25
Recognizing sports activities from video frames using deformable convolution and adaptive multiscale features25
Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization23
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review22
Cloud-based multiclass anomaly detection and categorization using ensemble learning21
An experimental study of fog and cloud computing in CEP-based Real-Time IoT applications21
Resource pooling in vehicular fog computing21
Serverless computing: a security perspective20
Edge intelligence-assisted animation design with large models: a survey20
Cloud-based intelligent self-diagnosis and department recommendation service using Chinese medical BERT20
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure20
Load balancing and service discovery using Docker Swarm for microservice based big data applications20
MBi-GRUMCONV: A novel Multi Bi-GRU and Multi CNN-Based deep learning model for social media sentiment analysis20
Multi-objective workflow optimization strategy (MOWOS) for cloud computing20
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization19
A survey of Kubernetes scheduling algorithms19
Computation offloading strategy based on deep reinforcement learning for connected and autonomous vehicle in vehicular edge computing18
EDQWS: an enhanced divide and conquer algorithm for workflow scheduling in cloud17
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning17
An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment17
A secure data deduplication system for integrated cloud-edge networks17
Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing17
Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework16
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system15
Low-power multi-cloud deployment of large distributed service applications with response-time constraints15
A blockchain index structure based on subchain query14
A threshold hybrid encryption method for integrity audit without trusted center14
Novel secure data protection scheme using Martino homomorphic encryption14
Cloud-based blockchain technology to identify counterfeits13
Identity-based remote data checking with a designated verifier13
Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a survey13
Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework13
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities13
A systematic review on effective energy utilization management strategies in cloud data centers12
Min-max exclusive virtual machine placement in cloud computing for scientific data environment12
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning12
Artificial intelligence and edge computing for teaching quality evaluation based on 5G-enabled wireless communication technology12
Digital image watermarking using discrete cosine transformation based linear modulation12
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing12
Bearing fault diagnosis method based on improved Siamese neural network with small sample12
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos12
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm12
Multi-Recipient encryption with keyword search without pairing for cloud storage11
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment11
Enhanced security using multiple paths routine scheme in cloud-MANETs11
A SINS/DVL/USBL integrated navigation and positioning IoT system with multiple sources fusion and federated Kalman filter11
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT11
DSTS: A hybrid optimal and deep learning for dynamic scalable task scheduling on container cloud environment11
An enhanced encryption-based security framework in the CPS Cloud11
Optimizing task offloading and resource allocation in edge-cloud networks: a DRL approach11
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes11
IoT trust and reputation: a survey and taxonomy10
Securing medical image privacy in cloud using deep learning network10
Multi-chain and data-chains partitioning algorithm in intelligent manufacturing CPS10
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform10
Power flow adjustment for smart microgrid based on edge computing and multi-agent deep reinforcement learning10
Investigation into the effect of data reduction in offloadable task for distributed IoT-fog-cloud computing10
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm10
A port-based forwarding load-balancing scheduling approach for cloud datacenter networks10
Rough fuzzy model based feature discretization in intelligent data preprocess10
Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment10
Flexible computation offloading in a fuzzy-based mobile edge orchestrator for IoT applications9
Software architecture for pervasive critical health monitoring system using fog computing9
Predicting the total Unified Parkinson’s Disease Rating Scale (UPDRS) based on ML techniques and cloud-based update9
Research on influencing factors of artificial intelligence multi-cloud scheduling applied talent training based on DEMATEL-TAISM9
Energy-aware adaptive offloading of soft real-time jobs in mobile edge clouds9
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions9
In-depth analysis and open challenges of Mist Computing9
A trusted de-swinging k-anonymity scheme for location privacy protection9
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability9
Cloud failure prediction based on traditional machine learning and deep learning9
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree9
Cloud-based bug tracking software defects analysis using deep learning8
Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment8
Joint task offloading and resource allocation in mobile edge computing with energy harvesting8
Security-Aware computation offloading for Mobile edge computing-Enabled smart city8
DRMaestro: orchestrating disaggregated resources on virtualized data-centers8
Cloud-based deep learning-assisted system for diagnosis of sports injuries8
Admission control policy and key agreement based on anonymous identity in cloud computing8
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency8
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)8
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT8
Dual-channel convolutional neural network for power edge image recognition8
BSS: a brokering model for service selection using integrated weighting approach in cloud environment8
Blockchain enabled zero trust based authentication scheme for railway communication networks8
Voice spoofing countermeasure for voice replay attacks using deep learning8
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages8
A cloud priority-based dynamic online double auction mechanism (PB-DODAM)8
OpenIaC: open infrastructure as code - the network is my computer7
An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches7
A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving7
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure7
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations7
A Transformer-based network intrusion detection approach for cloud security7
A user interest community evolution model based on subgraph matching for social networking in mobile edge computing environments7
Secure routing protocol based on dynamic reputation and load balancing in wireless mesh networks7
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment7
Distributed data hiding in multi-cloud storage environment7
Severity: a QoS-aware approach to cloud application elasticity7
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach7
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains7
PICF-LDA: a topic enhanced LDA with probability incremental correction factor for Web API service clustering6
A truthful dynamic combinatorial double auction model for cloud resource allocation6
MapReduce scheduling algorithms in Hadoop: a systematic study6
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds6
A differentially private distributed data mining scheme with high efficiency for edge computing6
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing6
Characterization and modeling of an edge computing mixed reality workload6
Executing cyclic scientific workflows in the cloud6
Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds6
Visibility estimation via deep label distribution learning in cloud environment6
Dynamic data collection algorithm based on mobile edge computing in underwater internet of things6
A resource scheduling method for cloud data centers based on thermal management6
Cross-domain coordination of resource allocation and route planning for the edge computing-enabled multi-connected vehicles6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection6
File processing security detection in multi-cloud environments: a process mining approach6
An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities6
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces6
Security-driven distributed platforms for intellectual property resource provision - a case study of TSITE IP6
AIoT-driven multi-source sensor emission monitoring and forecasting using multi-source sensor integration with reduced noise series decomposition6
NIDD: an intelligent network intrusion detection model for nursing homes6
A fine-grained task scheduling mechanism for digital economy services based on intelligent edge and cloud computing6
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm6
Fintech application on banking stability using Big Data of an emerging economy6
0.04810905456543