Computing

Papers
(The median citation count of Computing is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
High-performance microservice differentiated domain communication technology164
A priority aware local mutual exclusion algorithm for flying ad hoc networks78
Cloud data center cost management using virtual machine consolidation with an improved artificial feeding birds algorithm68
AI Techniques in the Microservices Life-Cycle: a Systematic Mapping Study57
Daas composition: enhancing UAV delivery services via LSTM-based resource prediction and flight patterns mining54
Simulafed: an enhanced federated simulated environment for privacy and security in health54
Investigations on the effect of micro-grid using improved NFIS-PID with hybrid algorithms51
A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid50
A model-based infrastructure for the specification and runtime execution of self-adaptive IoT architectures50
Deep anomaly detection on attributed networks by graph update45
An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment44
Maintaining temporal validity of real-time data in component-based systems36
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing35
A novel and efficient salp swarm algorithm for large-scale QoS-aware service composition selection35
PP-PRNU: PRNU-based source camera attribution with privacy-preserving applications29
Task assignment strategy in LEO-muti-access edge computing based on matching game29
An online mechanism for resource provisioning and allocation in vehicle computing29
Data and resource aware incremental ML training in support of pervasive applications29
LUMF-YOLO: a lightweight object detection network integrating UAV motion features29
Heuristic algorithm for an optimal solution of fully fuzzy transportation problem28
An exploratory study of rethinking user experience in the internet of things28
Smart data flow: a trust-driven hybrid fragmentation framework for optimizing data transmission in IoT-enabled edge-fog-cloud systems25
Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion24
Intelligent and compliant dynamic software license consolidation in cloud environment23
Mobility management in space-ground-integrated networks23
Deep recommendation with iteration directional adversarial training23
Local resampling for locally weighted Naïve Bayes in imbalanced data23
Identification of trustworthy cloud services: solution approaches and research directions to build an automated cloud broker22
A proactive and uncertainty driven management mechanism for workflows of processing tasks22
A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network21
Evaluation of mobile autonomous robot in trajectory optimization21
Edge-driven Docker registry: facilitating XR application deployment21
Voluntary resource sharing at the network edge to provide cloud services: a systematic survey20
Trends in continuous evaluation of software architectures20
Edge data distribution as a network Steiner tree estimation in edge computing20
Joint task caching and privacy protecting task offloading for edge computing in industrial internet19
Employing topology modification strategies in scale-free IoT networks for robustness optimization19
Online virtual network function placement in 5G networks19
A hybrid online learning based predictive maintenance system for industry 4.018
Ethereum fraud behavior detection based on graph neural networks18
Energy-efficient scheduling based on task prioritization in mobile fog computing18
Task scheduling in edge-fog-cloud architecture: a multi-objective load balancing approach using reinforcement learning algorithm17
A review on synergizing knowledge graphs and large language models17
A multi-objective crow search algorithm for optimizing makespan and costs in scientific cloud workflows (CSAMOMC)16
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems16
Runtime verification of electronic stability control system in automated vehicles with STL3 formalism15
Optimization of heterogeneous systems with AI planning heuristics and machine learning: a performance and energy aware approach15
Corporate social responsibility disclosure prediction using LSTM neural network15
Service-oriented and cloud computing15
Stochastic model-driven capacity planning framework for multi-access edge computing15
Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net14
Congestion avoidance in wireless sensor network using software defined network14
Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline13
Deep reinforcement learning based QoE-aware actor-learner architectures for video streaming in IoT environments13
Efficient hashing technique for malicious profile detection at hypervisor environment13
A novel discrete ICO algorithm for influence maximization in complex networks13
Courier information recognition based on an improved YOLOv8 visual servoing system13
Energy-efficient virtual machine placement algorithm based on power usage12
Umpalumpa: a framework for efficient execution of complex image processing workloads on heterogeneous nodes12
Machine learning approaches to network intrusion detection for contemporary internet traffic12
Community detection of weighted complex networks via transitive closure12
Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking12
ALBLA: an adaptive load balancing approach in edge-cloud networks utilizing learning automata12
Enhancing continuous integration predictions: a hybrid LSTM-GRU deep learning framework with evolved DBSO algorithm11
Exploring the impact of chaos engineering with various user loads on cloud native applications: an exploratory empirical study11
GPU cluster dynamics: insights from Alibaba’s 2023 trace release11
Towards high-availability cyber-physical systems using a microservice architecture11
Extended efficiency and soft-fairness multiresource allocation in a cloud computing system11
A novel routing method in hybrid DTN–MANET networks in the critical situations11
Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics11
Combining unsupervised and supervised classification for customer value discovery in the telecom industry: a deep learning approach10
An effective representation learning model for link prediction in heterogeneous information networks10
A systematic mapping study on automated analysis of privacy policies10
Retraction Note: A novel PCA-DC-Bagging algorithm on yield stress prediction of RAFM steel10
CFR: collaborative feature ranking for improving the performance of credit scoring data classification10
Special issue on advances in data, information and knowledge engineering in data science era10
MARLFuzz: industrial control protocols fuzzing based on multi-agent reinforcement learning9
DIMA: machine learning based dynamic infrastructure management for containerized applications9
Balanced multi-view clustering with dynamic consistency exploration among multiple views9
Proactive missing values imputation based on reinforcement learning9
Four vector intelligent metaheuristic for data optimization9
Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies9
Impact of ML optimization tactics on greener pre-trained ML models9
A distributed task orchestration scheme in collaborative vehicular cloud edge networks8
Secured trust and reputation management framework for cloud service in cloud computing8
An adaptive online reinforcement learning approach for optimizing computation offloading in connected vehicle networks8
Achieving starvation-freedom in multi-version transactional memory systems8
MANIFESTO: a huMAN-centric explaInable approach for FakE news spreaders deTectiOn8
Sustainable energy management in the AI era: a comprehensive analysis of ML and DL approaches8
F-yolov7: fast and robust real-time UAV detection8
A V2V2I routing algorithm for Internet of Vehicles based on adaptive variable beacon power8
An enhanced whale optimization algorithm with inertia weight and dynamic parameter adaptation for wireless sensor network deployment8
FedBPM:A decentralized federated meta-method for heterogeneous and complex image classification via multi-scale feature fusion8
Mapping and just-in-time traffic congestion mitigation for emergency vehicles in smart cities7
Large language models: a new approach for privacy policy analysis at scale7
Special issue on link prediction in complex networks7
Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems7
Correction to: Special issue on “artificial intelligence in cloud computing”7
Optimal sequential computation offloading and migration in mobile edge computing with multi-task priority7
TinyML strategies for privacy-preserving and cyber threat multi-classification in edge-IoT networks7
Multi-objective cuckoo optimizer for task scheduling to balance workload in cloud computing7
VNF placement in NFV-enabled networks: considering time-varying workloads and multi-tenancy with a throughput optimization heuristic7
Correction to: Optimizing pre‑copy live virtual machine migration in cloud computing using machine learning‑based prediction model7
UAV-assisted wireless charging and data processing of power IoT devices7
Energy generation forecasting: elevating performance with machine and deep learning7
Energy-aware and trust-based cluster head selection in healthcare WBANs with enhanced GWO optimization7
Inter-mesh routing algorithms in LEO satellite constellations networks7
Edge exploration of anonymous graph by mobile agent with external help7
An ant colony path planning optimization based on opposition-based learning for AUV in irregular regions6
Deep reinforcement learning-based optimal deployment of IoT machine learning jobs in fog computing architecture6
Mpbs:research on mini-batch partitioning algorithm based on self-organizing map network6
A framework for modeling and executing task-Specific resource allocations in business processes6
An optimal sensor configuration method using genetic algorithms for a fault-tolerant energy management for smart buildings6
Dynamic attention guider network6
A systematic literature review of blockchain-based e-KYC systems6
Efficient dynamic load balancing in software-defined networks using policy gradient: a strategy for enhanced QoS and reduced energy consumption6
Scaling down to scale up: benchmarking single-machine graph processing frameworks in a hardware-constrained environment6
An energy-adaptive clustering method based on Taguchi-based-GWO optimizer for wireless sensor networks with a mobile sink6
Exploiting recurrent graph neural networks for suffix prediction in predictive monitoring6
A survey on fault diagnosis algorithms for high-speed train bearings6
An ontology-based deep belief network model6
Generalizing truth discovery by incorporating multi-truth features6
Analysis of evolutionary multi-objective algorithms for data center electrical systems6
Content-aware susceptibility estimation for influence prediction on social networks6
Enhancing sine cosine algorithm based on social learning and elite opposition-based learning5
Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain5
Resource allocation and cost optimization in relay-assisted mobile edge computing5
Approximating vision transformers for edge: variational inference and mixed-precision for multi-modal data5
A novel cheetah optimizer hybrid approach based on opposition-based learning (OBL) and diversity metrics5
VIFL: vulnerability identification using federated learning in the internet of things systems5
Consensus in anonymous asynchronous systems with crash-recovery and omission failures5
The embedded feature selection method using ANT colony optimization with structured sparsity norms5
Qos-based web service selection using time-aware collaborative filtering: a literature review5
Efficient DNN training based on backpropagation parallelization5
ST-Resnet: a deep learning-based privacy preserving differential publishing method for location statistics5
An IoT-based bag-of-tasks scheduling framework for deadline-sensitive applications in fog-cloud environment5
Identifying vital spreaders in complex networks based on the interpretative structure model and improved Kshell5
A systematic study on blockchain technology in education: initiatives, products, applications, benefits, challenges and research direction5
A novel collaborative privacy protection scheme based on verifiable secret sharing and trust mechanism5
Using a random forest to predict quantized reuse distance in an SSD write buffer5
A fast and accurate coupled meshless algorithm for the 2D/3D Gross–Pitaevskii equations on two GPUs5
Priority-based DAG task offloading and secondary resource allocation in IoT edge computing environments5
Solving dimension reduction problems for classification using Promoted Crow Search Algorithm (PCSA)5
RUCIB: a novel rule-based classifier based on BRADO algorithm5
Game-theoretic methods for edge/fog/cloud computation offloading: a systematic review4
Correction: Automatic video captioning using tree hierarchical deep convolutional neural network and ASRNN-bi-directional LSTM4
NS-OWACC: nature-inspired strategies for optimizing workload allocation in cloud computing4
InTec: integrated things-edge computing: a framework for distributing machine learning pipelines in edge AI systems4
Hierarchical traffic engineering with PSO: a path to efficient congestion management in SDN4
Image processing based data reduction technique in WVSN for smart agriculture4
Semantically realizing discovery and composition for RESTful web services4
A model-based approach for specifying changes in replications of empirical studies in computer Science4
A parallel and distributed C4.5 algorithm in cloud computing environments4
Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing4
A survey on Urban spatial computing system4
Towards secure quantum communication: a novel quantum audio watermarking based on bipolar echo hiding4
Cloud services cost comparison: a clustering analysis framework4
A GSPN-based formalism under infinite-server semantics for reconfigurable WANETs4
Cost and performance-effective dynamic VM type selection in auto-scaling using reinforcement learning4
Optimizing SDN resource allocation using fuzzy logic and VM mapping technique4
Adaptive machine learning in the IoT-edge-cloud continuum4
Many-to-many matching based task allocation for dispersed computing4
Trust-driven reinforcement selection strategy for federated learning on IoT devices4
Preference based multi-issue negotiation algorithm (PMINA) for fog resource allocation4
A novel hybrid meta heuristic approach for optimization of makespan and handling imbalance in task scheduling in cloud environments4
A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services4
Bearing fault diagnosis based on improved federated learning algorithm4
Boosting computation reuse efficiency in ICN-based edge computing via improved forwarding algorithms4
QoS and QoE in large Scale Wireless IoT Networks4
Artificial intelligence to automate the systematic review of scientific literature4
A new dynamic probabilistic broadcast in IPv6-based low-power and lossy networks for the internet of things4
SPP: stochastic process-based placement for VM consolidation in cloud environments4
Citation recommendation using modified HITS algorithm4
Adaptivity in continuous massively parallel distance-based outlier detection4
Stochastic modeling of smart street lighting systems: maintenance models assessment4
AMAE: Adversarial multimodal auto-encoder for crisis-related tweet analysis4
LESeR: LSTM-based embedding sequential recommendation4
A novel optimization approach to topology checking of pipeline vector data in browser side4
Fairness-aware throughput maximization based on network function parallelism in MEC using deep reinforcement learning4
Energy-efficient and thermal-aware routing protocol for wireless body area networks based on ant colony optimization4
Automatic video captioning using tree hierarchical deep convolutional neural network and ASRNN-bi-directional LSTM3
Interference Aware Workload Scheduling for Latency Sensitive Tasks in Cloud Environment3
Generalized hurdle count data models based on interpretable machine learning with an application to health care demand3
Illumination-robust feature detection based on adaptive threshold function3
TEDA-forecasting: an unsupervised tinyML incremental learning approach for outlier processing and forecasting3
Conversation-based multimodal abuse detection through text and graph embeddings3
DNA cryptography based security framework for health-cloud data3
AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor3
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification3
Machine learning driven intelligent and self adaptive system for traffic management in smart cities3
Correlation adaptive task scheduling3
Optimizing performance of parallel computing platforms for large-scale genome data analysis3
Empowering cloud providers: optimised locust-inspired algorithm for SLA violation mitigation in green cloud computing3
A cross-linguistic entity alignment method based on graph convolutional neural network and graph attention network3
A subgraphs-density based overlapping community detection algorithm for large-scale complex networks3
Hybrid voting-GA ensemble learning for multi-class fault detection in digital twin-driven IIoT systems3
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks3
Dynamic resource allocation in cloud computing: analysis and taxonomies3
Exact and sampling methods for mining higher-order motifs in large hypergraphs3
Optimized cooperative data transmission in two-tier NB-IoT networks3
HATMOG: an enhanced hybrid task assignment algorithm based on AHP-TOPSIS and multi-objective genetic in cloud computing3
ALLC: autonomous lightweight distributed ledger constructor for securing IoT information3
Hybrid feature selection module for improving performance of software vulnerability severity prediction model on textual dataset3
Hybrid deep learning and evolutionary algorithms for accurate cloud workload prediction3
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges3
An adversarial reinforcement learning method to enhance server energy efficiency via DVFS and dynamic fan speed management3
A survey on the cold start latency approaches in serverless computing: an optimization-based perspective3
A decentralized prediction-based workflow load balancing architecture for cloud/fog/IoT environments3
Adaptive-parameter memetic algorithm for privacy-preserving trajectory data publishing: A multi-objective optimization approach3
Towards dynamic and heterogeneous social IoT environments3
Optimizing sparse matrix partitioning in a heterogeneous CPU-GPU system for high-performance3
Parallel and distributed Processing: advances on architectures and applications of parallel systems3
Quality-of-service based multipath routing for the internet of things3
Correction to: Parallel and distributed Processing: advances on architectures and applications of parallel systems3
Data management and selectivity in collaborative pervasive edge computing3
A heterogeneous image fusion network model based on lightweight Swin+ self-learning fusion strategy2
The missing piece: a distributed system-level diagnosis model for the implementation of unreliable failure detectors2
Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches2
Contextual authentication of users and devices using machine learning2
Incorporating self-attentions into robust spatial-temporal graph representation learning against dynamic graph perturbations2
Quantifying influential nodes in complex networks using optimization and particle dynamics: a comparative study2
Community detection in multiplex continous weighted nodes networks using an extension of the stochastic block model2
Towards an efficient scheduling strategy based on multi-objective optimization in fog environments2
Secure and scalable IoT healthcare with a permissioned blockchain and encryption techniques2
ESOD-YOLO: an enhanced efficient small object detection framework for aerial images2
Improving the stability of label propagation algorithm by propagating from low-significance nodes for community detection in social networks2
Orientation aware weapons detection in visual data: a benchmark dataset2
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing2
Adaptable decentralized workflow execution with fuzzy framework in cloud computing (ADWEF.Cloud)2
Energy load forecasting: one-step ahead hybrid model utilizing ensembling2
Self-stabilizing c-wave algorithms for arbitrary networks2
VAMPIRE: vectorized automated ML pre-processing and post-processing framework for edge applications2
Fuzzy intelligence based V2V routing protocol in Internet of Vehicles: a cross-layer approach2
Osprey: a heterogeneous search framework for spatial-temporal similarity2
Special issue on Architecting Dependable Multi-paradigm Computing Systems2
Models for availability evaluation of file servers in private clouds2
Carbon prices forecasting based on sliding time window and improved support vector regression2
X-IoT: a model-driven approach to support IoT application portability across IoT platforms2
Scheduling analysis and correction for dependent real-time tasks upon heterogeneous multiprocessor architectures2
Community detection algorithms for recommendation systems: techniques and metrics2
A hybrid energy-aware algorithm for virtual machine placement in cloud computing2
A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm2
On the correctness of a lock-free compression-based elastic mechanism for a hash trie design2
Regulatory data privacy concerns in proliferating IoT era of telecommunication data monetisation: a systematic literature review2
Optimization of mitigation deployment using deep reinforcement learning over an enhanced ATT &CK2
Evaluation of fog application placement algorithms: a survey2
Scalable blockchain storage systems: research progress and models2
From collective intelligence to global optimisation: an agent-based model approach2
Correction to: A model-based approach for specifying changes in replications of empirical studies in computer Science2
Phasic parallel-network policy: a deep reinforcement learning framework based on action correlation2
0.60282588005066