Journal of Cloud Computing-Advances Systems and Applications

Papers
(The TQCC of Journal of Cloud Computing-Advances Systems and Applications is 13. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
UDL: a cloud task scheduling framework based on multiple deep neural networks521
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns124
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments103
Cloud based evaluation of databases for stock market data95
Adaptive heuristic edge assisted fog computing design for healthcare data optimization76
Efficiency and optimization of government service resource allocation in a cloud computing environment69
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet63
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations62
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.062
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems60
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning59
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure58
HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning58
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach57
Intelligent urbanism with artificial intelligence in shaping tomorrow’s smart cities: current developments, trends, and future directions48
Smart and efficient EV charging navigation scheme in vehicular edge computing networks48
Dependency-aware online task offloading based on deep reinforcement learning for IoV48
Optimal urban competitiveness assessment using cloud computing and neural network45
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm45
A multi-strategy ontology mapping method based on cost-sensitive SVM44
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times44
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment42
Identity-based remote data checking with a designated verifier41
The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things41
BGFL: a blockchain-enabled group federated learning at wireless industrial edges39
Serverless computing: a security perspective39
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm39
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing39
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing38
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds38
Voice spoofing countermeasure for voice replay attacks using deep learning37
Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis37
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning36
Edge-cloud computing cooperation detection of dust concentration for risk warning research36
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario34
Perception of premium services based on the evolution of hyper-service network in mobile edge computing34
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform33
Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems32
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing32
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture32
Automated visual quality assessment for virtual and augmented reality based digital twins31
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency30
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning30
Admission control policy and key agreement based on anonymous identity in cloud computing29
Stateless Q-learning algorithm for service caching in resource constrained edge environment29
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records29
Cloud-based blockchain technology to identify counterfeits29
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT28
NuWa: off-state tolerant backscattering system with uncontrolled excitation traffics27
A new method of dynamic network security analysis based on dynamic uncertain causality graph27
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism26
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing25
Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing24
Privacy-preserving federated learning based on partial low-quality data24
Optimizing energy task offloading technique using IoMT cloud in healthcare applications24
Efficient and scalable patients clustering based on medical big data in cloud platform24
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments24
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos24
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing23
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing23
Fog computing application of cyber-physical models of IoT devices with symbolic approximation algorithms22
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting22
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces22
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing22
A cloud-edge collaborative task scheduling method based on model segmentation22
Task grouping and optimized deep learning based VM sizing for hosting containers as a service21
Tourism cloud management system: the impact of smart tourism21
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost20
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories20
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure20
Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model20
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT19
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps19
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications19
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform19
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types19
Traffic prediction for diverse edge IoT data using graph network19
An ECC-based mutual data access control protocol for next-generation public cloud19
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment19
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions18
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure18
Energy-efficient allocation for multiple tasks in mobile edge computing18
Lightweight similarity checking for English literatures in mobile edge computing18
Enhanced security using multiple paths routine scheme in cloud-MANETs18
Virtual machine placement in energy aware load balancer using fog classifier18
A new dynamic security defense system based on TCP_REPAIR and deep learning17
Security issues of news data dissemination in internet environment17
A big data study of language use and impact in radio broadcasting in China17
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities17
AI-empowered game architecture and application for resource provision and scheduling in multi-clouds17
Software architecture for pervasive critical health monitoring system using fog computing17
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing17
Recognizing online video genres using ensemble deep convolutional learning for digital media service management16
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications16
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection16
Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning16
An energy-conscious scheduling framework for serverless edge computing in IoT16
A multi-dimensional extensible cloud-native service stack for enterprises16
Server deployment strategies considering robustness and resource constraints in edge computing15
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database15
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree15
Cross-chain asset trading scheme for notaries based on edge cloud storage15
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review15
CG-PBFT: an efficient PBFT algorithm based on credit grouping15
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures15
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing15
Efficient 3D object recognition in mobile edge environment15
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities14
Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation14
Cloud-based multiclass anomaly detection and categorization using ensemble learning14
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing14
A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function14
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing14
A novel virtual machine placement algorithm based on grey wolf optimization14
HVS-inspired adversarial image generation with high perceptual quality14
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment14
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system14
FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings14
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments14
Explainable AI-based innovative hybrid ensemble model for intrusion detection13
An adaptive routing strategy in P2P-based Edge Cloud13
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching13
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models13
Blockchain enabled zero trust based authentication scheme for railway communication networks13
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future13
Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications13
An enhanced encryption-based security framework in the CPS Cloud13
A bidirectional DNN partition mechanism for efficient pipeline parallel training in cloud13
Scalability resilience framework using application-level fault injection for cloud-based software services13
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive13
Joint DNN partitioning and task offloading in mobile edge computing via deep reinforcement learning13
A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection13
0.14933490753174