Journal of Cloud Computing-Advances Systems and Applications

Papers
(The TQCC of Journal of Cloud Computing-Advances Systems and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas143
Analysis of factors affecting IoT-based smart hospital design59
An efficient task offloading scheme in vehicular edge computing48
Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions45
Survey on serverless computing44
Multi-level host-based intrusion detection system for Internet of things44
A novel approach for IoT tasks offloading in edge-cloud environments42
Adaptive offloading in mobile-edge computing for ultra-dense cellular networks based on genetic algorithm40
Intelligent algorithms for cold chain logistics distribution optimization based on big data cloud computing analysis39
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems38
Efficient task offloading using particle swarm optimization algorithm in edge computing for industrial internet of things37
Cloud resource orchestration in the multi-cloud landscape: a systematic review of existing frameworks33
An efficient population-based multi-objective task scheduling approach in fog computing systems33
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing31
Deep learning-driven wireless communication for edge-cloud computing: opportunities and challenges31
Big data analytics in Cloud computing: an overview30
Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities28
Joint optimization of network selection and task offloading for vehicular edge computing28
CNN based lane detection with instance segmentation in edge-cloud computing28
Energy-efficient sensory data gathering based on compressed sensing in IoT networks27
An active and verifiable trust evaluation approach for edge computing26
A learning style classification approach based on deep belief network for large-scale online education26
Enterprise adoption of cloud computing with application portfolio profiling and application portfolio assessment24
An edge-cloud collaborative computing platform for building AIoT applications efficiently23
Container orchestration on HPC systems through Kubernetes23
A multi-objective optimization for resource allocation of emergent demands in cloud computing21
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing21
Energy-aware MAC protocol for data differentiated services in sensor-cloud computing21
An experimental study of fog and cloud computing in CEP-based Real-Time IoT applications21
A novel privacy-preserving speech recognition framework using bidirectional LSTM20
Dynamic resource provisioning for cyber-physical systems in cloud-fog-edge computing20
Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization20
Near real-time optimization of fog service placement for responsive edge computing19
Resource pooling in vehicular fog computing18
A joint optimization scheme of content caching and resource allocation for internet of vehicles in mobile edge computing17
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers17
Multi-objective workflow optimization strategy (MOWOS) for cloud computing16
Computation offloading strategy based on deep reinforcement learning for connected and autonomous vehicle in vehicular edge computing16
An efficient and secure data sharing scheme for mobile devices in cloud computing15
Cloud-based multiclass anomaly detection and categorization using ensemble learning15
Cloud-based intelligent self-diagnosis and department recommendation service using Chinese medical BERT15
Serverless computing: a security perspective14
Categorizing Malware via A Word2Vec-based Temporal Convolutional Network Scheme14
Low-power multi-cloud deployment of large distributed service applications with response-time constraints14
A threshold hybrid encryption method for integrity audit without trusted center13
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review13
A secure data deduplication system for integrated cloud-edge networks13
Lightweight image classifier using dilated and depthwise separable convolutions13
Load balancing and service discovery using Docker Swarm for microservice based big data applications12
Federated learning in cloud-edge collaborative architecture: key technologies, applications and challenges12
A hybrid recommendation model in social media based on deep emotion analysis and multi-source view fusion12
A blockchain index structure based on subchain query12
Intelligent cloud workflow management and scheduling method for big data applications12
Identity-based remote data checking with a designated verifier11
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues11
MBi-GRUMCONV: A novel Multi Bi-GRU and Multi CNN-Based deep learning model for social media sentiment analysis11
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization10
Min-max exclusive virtual machine placement in cloud computing for scientific data environment10
Multi-chain and data-chains partitioning algorithm in intelligent manufacturing CPS10
A collaborative scheduling strategy for IoV computing resources considering location privacy protection in mobile edge computing environment10
Ground radar precipitation estimation with deep learning approaches in meteorological private cloud10
A port-based forwarding load-balancing scheduling approach for cloud datacenter networks10
DSTS: A hybrid optimal and deep learning for dynamic scalable task scheduling on container cloud environment10
Novel secure data protection scheme using Martino homomorphic encryption9
Energy-aware adaptive offloading of soft real-time jobs in mobile edge clouds9
Bearing fault diagnosis method based on improved Siamese neural network with small sample9
Flexible computation offloading in a fuzzy-based mobile edge orchestrator for IoT applications9
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system9
Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework9
Rough fuzzy model based feature discretization in intelligent data preprocess9
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure9
Power flow adjustment for smart microgrid based on edge computing and multi-agent deep reinforcement learning9
EDQWS: an enhanced divide and conquer algorithm for workflow scheduling in cloud8
Studying gas exceptions in blockchain-based cloud applications8
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT8
Security-Aware computation offloading for Mobile edge computing-Enabled smart city8
An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment8
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm8
A SINS/DVL/USBL integrated navigation and positioning IoT system with multiple sources fusion and federated Kalman filter8
A cloud priority-based dynamic online double auction mechanism (PB-DODAM)8
Dual-channel convolutional neural network for power edge image recognition8
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos8
Investigation into the effect of data reduction in offloadable task for distributed IoT-fog-cloud computing8
CRUPA: collusion resistant user revocable public auditing of shared data in cloud8
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform7
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages7
An enhanced encryption-based security framework in the CPS Cloud7
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities7
Approximation analysis of ontology learning algorithm in linear combination setting7
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm7
DRMaestro: orchestrating disaggregated resources on virtualized data-centers7
Cloud-based deep learning-assisted system for diagnosis of sports injuries7
Multi-Recipient encryption with keyword search without pairing for cloud storage7
Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a survey7
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing7
Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment7
OpenIaC: open infrastructure as code - the network is my computer7
Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing7
Network perception task migration in cloud-edge fusion computing7
Visibility estimation via deep label distribution learning in cloud environment6
A security event description of intelligent applications in edge-cloud environment6
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning6
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability6
Cloud failure prediction based on traditional machine learning and deep learning6
Distributed data hiding in multi-cloud storage environment6
Severity: a QoS-aware approach to cloud application elasticity6
Admission control policy and key agreement based on anonymous identity in cloud computing6
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)6
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection6
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning6
Assessing the suitability of the Greenhouse Gas Protocol for calculation of emissions from public cloud computing workloads6
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment6
Characterization and modeling of an edge computing mixed reality workload6
Enhanced security using multiple paths routine scheme in cloud-MANETs6
RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks5
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm5
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure5
Security-driven distributed platforms for intellectual property resource provision - a case study of TSITE IP5
A systematic review on effective energy utilization management strategies in cloud data centers5
Cloud-based bug tracking software defects analysis using deep learning5
Advanced consistency management of highly-distributed transactional database in a hybrid cloud environment using novel R-TBC/RTA approach5
Dynamic data collection algorithm based on mobile edge computing in underwater internet of things5
Joint task offloading and resource allocation in mobile edge computing with energy harvesting5
Revisiting the power of reinsertion for optimal targets of network attack5
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains5
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT5
Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds5
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations5
A truthful dynamic combinatorial double auction model for cloud resource allocation5
An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches5
A user interest community evolution model based on subgraph matching for social networking in mobile edge computing environments5
A trusted de-swinging k-anonymity scheme for location privacy protection5
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing5
Software architecture for pervasive critical health monitoring system using fog computing5
2PC*: a distributed transaction concurrency control protocol of multi-microservice based on cloud computing platform5
A multi-fault diagnosis method of gear-box running on edge equipment5
Executing cyclic scientific workflows in the cloud5
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree5
BSS: a brokering model for service selection using integrated weighting approach in cloud environment5
Cloud-based blockchain technology to identify counterfeits5
A differentially private distributed data mining scheme with high efficiency for edge computing5
0.036658048629761