Future Generation Computer Systems-The International Journal of Escien

Papers
(The TQCC of Future Generation Computer Systems-The International Journal of Escien is 18. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Slime mould algorithm: A new method for stochastic optimization1787
A survey on the security of blockchain systems947
A survey on security and privacy of federated learning565
ABCDM: An Attention-based Bidirectional CNN-RNN Deep Model for sentiment analysis447
BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence320
Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework262
Multi-population differential evolution-assisted Harris hawks optimization: Framework and case studies260
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city258
Recent advancements and challenges of Internet of Things in smart agriculture: A survey253
An ensemble machine learning approach through effective feature extraction to classify fake news226
An intelligent healthcare monitoring framework using wearable sensors and social networking data224
A survey on blockchain for big data: Approaches, opportunities, and future directions197
Sentiment analysis of Twitter data during critical events through Bayesian networks classifiers196
Blockchain for the metaverse: A Review191
A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic183
Analysis of healthcare big data182
From blockchain consensus back to Byzantine consensus181
Privacy-preserving blockchain-based federated learning for traffic flow prediction167
A survey of human-in-the-loop for machine learning162
Big data analysis of the Internet of Things in the digital twins of smart city based on deep learning160
OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city160
Intelligent mobile malware detection using permission requests and API calls148
Multiple cloud storage mechanism based on blockchain in smart homes147
Scheduling Internet of Things requests to minimize latency in hybrid Fog–Cloud​ computing147
Transformer based Deep Intelligent Contextual Embedding for Twitter sentiment analysis143
A framework for privacy-preservation of IoT healthcare data using Federated Learning and blockchain technology133
Semantic segmentation for multiscale target based on object recognition using the improved Faster-RCNN model133
Human action recognition using attention based LSTM network with dilated CNN features131
Q-learning based dynamic task scheduling for energy-efficient cloud computing127
Iota Tangle: A cryptocurrency to communicate Internet-of-Things data127
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities123
Deep learning-based cardiovascular image diagnosis: A promising challenge123
Improving NSGA-III algorithms with information feedback models for large-scale many-objective optimization121
RETRACTED: Intelligent edge computing based on machine learning for smart city119
The application research of neural network and BP algorithm in stock price pattern classification and prediction119
TrustChain: A Sybil-resistant scalable blockchain118
DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network117
A review of sentiment analysis research in Arabic language116
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN115
Task optimization and scheduling of distributed cyber–physical system based on improved ant colony algorithm114
Detection and diagnosis of chronic kidney disease using deep learning-based heterogeneous modified artificial neural network113
Machine learning for assisting cervical cancer diagnosis: An ensemble approach112
A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework111
Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 106
Optimized container scheduling for data-intensive serverless edge computing105
From big data to smart energy services: An application for intelligent energy management104
A bibliometric analysis and visualization of blockchain102
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems101
Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection98
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)94
Emotion recognition by deeply learned multi-channel textual and EEG features94
An effective hybrid collaborative algorithm for energy-efficient distributed permutation flow-shop inverse scheduling92
Serverless execution of scientific workflows: Experiments with HyperFlow, AWS Lambda and Google Cloud Functions92
A novel trust mechanism based on Fog Computing in Sensor–Cloud System91
Advanced optimization technique for scheduling IoT tasks in cloud-fog computing environments91
Research on strong agile response task scheduling optimization enhancement with optimal resource usage in green cloud computing87
Defending network intrusion detection systems against adversarial evasion attacks86
Genetic convolutional neural network for intrusion detection systems86
Intelligent Dynamic Malware Detection using Machine Learning in IP Reputation for Forensics Data Analytics85
Heart disease identification from patients’ social posts, machine learning solution on Spark85
MCFT-CNN: Malware classification with fine-tune convolution neural networks using traditional and transfer learning in Internet of Things84
Artificial intelligence for securing industrial-based cyber–physical systems81
Constructing a prior-dependent graph for data clustering and dimension reduction in the edge of AIoT81
Deep learning framework based on integration of S-Mask R-CNN and Inception-v3 for ultrasound image-aided diagnosis of prostate cancer81
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain80
Imbalanced data classification: A KNN and generative adversarial networks-based hybrid approach for intrusion detection80
Driverless vehicle security: Challenges and future research opportunities80
Heterogeneous edge computing open platforms and tools for internet of things79
Design and application of fog computing and Internet of Things service platform for smart city79
Runtime verification for business processes utilizing the Bitcoin blockchain78
Classification of optimization problems in fog computing78
Tracking and collision avoidance of virtual coupling train control system77
Transformer fault diagnosis method using IoT based monitoring system and ensemble machine learning77
An adaptive federated learning scheme with differential privacy preserving76
Attention-based sentiment analysis using convolutional and recurrent neural network75
A Stackelberg game approach to multiple resources allocation and pricing in mobile edge computing75
Handwriting dynamics assessment using deep neural network for early identification of Parkinson’s disease75
A state-of-the-art survey on solving non-IID data in Federated Learning74
Content-based multi-source encrypted image retrieval in clouds with privacy preservation74
Aggression detection through deep neural model on Twitter73
Simultaneous left atrium anatomy and scar segmentations via deep learning in multiview information with attention73
Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data73
Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach72
Agent-based middleware framework using distributed CPS for improving resource utilization in smart city72
DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges72
Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment72
Saving time and cost on the scheduling of fog-based IoT applications using deep reinforcement learning approach72
LEChain: A blockchain-based lawful evidence management scheme for digital forensics70
MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost70
A variant form of 3D-UNet for infant brain segmentation70
Multiple improved residual networks for medical image super-resolution69
Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments69
Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication69
A framework for anomaly detection and classification in Multiple IoT scenarios69
Searchain: Blockchain-based private keyword search in decentralized storage68
GAN augmentation to deal with imbalance in imaging-based intrusion detection68
Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud68
Detecting botnet by using particle swarm optimization algorithm based on voting system67
Artificial intelligence-enabled Internet of Things-based system for COVID-19 screening using aerial thermal imaging67
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace67
Lightweight cryptography in IoT networks: A survey66
A blockchain-based eHealthcare system interoperating with WBANs66
BigTrustScheduling: Trust-aware big data task scheduling approach in cloud computing environments66
Optimization of real-time traffic network assignment based on IoT data using DBN and clustering model in smart city65
A lightweight supervised intrusion detection mechanism for IoT networks65
Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes65
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense65
Real time dataset generation framework for intrusion detection systems in IoT64
Integration of Big Data analytics embedded smart city architecture with RESTful web of things for efficient service provision and energy management63
Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT62
Multi-objective scheduling of extreme data scientific workflows in Fog62
A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems62
A metaheuristic method for joint task scheduling and virtual machine placement in cloud data centers62
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks62
Enhancing cyber–physical systems with hybrid smart city cyber security architecture for secure public data-smart network61
Handling missing data in near real-time environmental monitoring: A system and a review of selected methods61
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber–physical system60
Blockchain-based data privacy management with Nudge theory in open banking59
Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis59
Privacy-preserving quality prediction for edge-based IoT services59
Slow-movement particle swarm optimization algorithms for scheduling security-critical tasks in resource-limited mobile edge computing59
Smart vehicle forensics: Challenges and case study59
Cecoin: A decentralized PKI mitigating MitM attacks58
BiLSTM deep neural network model for imbalanced medical data of IoT systems58
A two-way trust management system for fog computing58
An efficient data integrity auditing protocol for cloud computing58
Human–computer interaction-based Decision Support System with Applications in Data Mining57
Robust detection of atrial fibrillation from short-term electrocardiogram using convolutional neural networks57
A blockchain-based preserving and sharing system for medical data privacy57
Superposition Graph Neural Network for offshore wind power prediction55
Fingerprint classification and identification algorithms for criminal investigation: A survey55
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare55
Augmented whale feature selection for IoT attacks: Structure, analysis and applications55
A discrete PSO-based static load balancing algorithm for distributed simulations in a cloud environment55
Prostate cancer classification from ultrasound and MRI images using deep learning based Explainable Artificial Intelligence54
An efficient smart parking pricing system for smart city environment: A machine-learning based approach54
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data54
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications54
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs53
Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics53
IoMT-based computational approach for detecting brain tumor53
A fair protocol for data trading based on Bitcoin transactions52
Autonomous mitigation of cyber risks in the Cyber–Physical Systems52
Dynamic fog-to-fog offloading in SDN-based fog computing systems52
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications52
HealthXAI: Collaborative and explainable AI for supporting early diagnosis of cognitive decline52
An emotion and cognitive based analysis of mental health disorders from social media data51
Internet of things forensic data analysis using machine learning to identify roots of data scavenging51
Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services50
Building the Internet of Things platform for smart maternal healthcare services with wearable devices and cloud computing50
File- and API-based interoperability of digital twins by model transformation: An IIoT case study using asset administration shell50
Scheduling workflows with privacy protection constraints for big data applications on cloud50
Smart building creation in large scale HVAC environments through automated fault detection and diagnosis50
AoI-aware energy control and computation offloading for industrial IoT49
Scalable multi-channel dilated CNN–BiLSTM model with attention mechanism for Chinese textual sentiment analysis49
Novel binary logistic regression model based on feature transformation of XGBoost for type 2 Diabetes Mellitus prediction in healthcare systems49
Blockchain-enabled fraud discovery through abnormal smart contract detection on Ethereum49
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling49
The explainability paradox: Challenges for xAI in digital pathology48
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities48
Find my trustworthy fogs: A fuzzy-based trust evaluation framework47
LDC: A lightweight dada consensus algorithm based on the blockchain for the industrial Internet of Things for smart city applications47
Tikiri—Towards a lightweight blockchain for IoT47
SEENS: Nuclei segmentation in Pap smear images with selective edge enhancement47
Visualization and deep-learning-based malware variant detection using OpCode-level features47
Detecting fake images by identifying potential texture difference47
Scalable blockchains — A systematic review46
A smart energy and reliability aware scheduling algorithm for workflow execution in DVFS-enabled cloud environment46
Blockchain-based decentralized reputation system in E-commerce environment46
FLAGS: A methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learning46
GRU-based deep learning approach for network intrusion alert prediction46
Alzheimer’s disease progression detection model based on an early fusion of cost-effective multimodal data46
A double-blockchain solution for agricultural sampled data security in Internet of Things network46
Chaotic improved PICEA-g-based multi-objective optimization for workflow scheduling in cloud environment46
ICN with edge for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks45
Evaluating IoT service composition mechanisms for the scalability of IoT systems45
Ontology-driven aspect-based sentiment analysis classification: An infodemiological case study regarding infectious diseases in Latin America45
Serverless computing for Internet of Things: A systematic literature review45
SDN-based cyber defense: A survey45
REHAB-C: Recommendations for Energy HABits Change45
PUC: Packet Update Caching for energy efficient IoT-based Information-Centric Networking44
Deep reinforcement learning for traffic signal control under disturbances: A case study on Sunway city, Malaysia44
IoT embedded cloud-based intelligent power quality monitoring system for industrial drive application44
Smart data driven quality prediction for urban water source management44
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things44
A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning44
Preserving transaction privacy in bitcoin43
A unified framework for big data acquisition, storage, and analytics for demand response management in smart cities43
An efficient deep learning-based scheme for web spam detection in IoT environment43
QoS-aware placement of microservices-based IoT applications in Fog computing environments42
Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control42
Real time performance analysis of secure IoT protocols for microgrid communication42
Fetal cardiac cycle detection in multi-resource echocardiograms using hybrid classification framework42
Generating knowledge graphs by employing Natural Language Processing and Machine Learning techniques within the scholarly domain42
Research on unsupervised feature learning for Android malware detection based on Restricted Boltzmann Machines41
Design and control of soft rehabilitation robots actuated by pneumatic muscles: State of the art41
Detecting misogyny in Spanish tweets. An approach based on linguistics features and word embeddings41
Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks41
STGNN-TTE: Travel time estimation via spatial–temporal graph neural network41
Delegated content erasure in IPFS41
Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms40
An evolutionary fuzzy scheduler for multi-objective resource allocation in fog computing40
Identifying performance anomalies in fluctuating cloud environments: A robust correlative-GNN-based explainable approach40
Next-generation big data federation access control: A reference model40
Workload forecasting and energy state estimation in cloud data centres: ML-centric approach40
Graph convolutional networks for graphs containing missing features39
Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud39
Real-time epileptic seizure recognition using Bayesian genetic whale optimizer and adaptive machine learning39
Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography39
A two-stage multi-operator differential evolution algorithm for solving Resource Constrained Project Scheduling problems38
Offloading dependent tasks in multi-access edge computing: A multi-objective reinforcement learning approach38
Live forensics of software attacks on cyber–physical systems38
EdgeABC: An architecture for task offloading and resource allocation in the Internet of Things38
A Q-Learning-based distributed routing protocol for frequency-switchable magnetic induction-based wireless underground sensor networks38
An efficient novel approach for iris recognition based on stylometric features and machine learning techniques38
An online auction mechanism for time-varying multidimensional resource allocation in clouds38
FedProc: Prototypical contrastive federated learning on non-IID data38
A binary moth search algorithm based on self-learning for multidimensional knapsack problems38
Automatic feature extraction in X-ray image based on deep learning approach for determination of bone age38
Ensembles of Convolutional Neural Network models for pediatric pneumonia diagnosis37
A blockchain based certificate revocation scheme for vehicular communication systems37
Flux: Overcoming scheduling challenges for exascale workflows37
Affective database for e-learning and classroom environments using Indian students’ faces, hand gestures and body postures37
Partitioned integration and coordination via the self-organising coordination regions pattern37
A low-cost physical location discovery scheme for large-scale Internet of Things in smart city through joint use of vehicles and UAVs37
Multi-robot path planning in wireless sensor networks based on jump mechanism PSO and safety gap obstacle avoidance37
Early detection of cyberbullying on social media networks36
Exact algorithms for energy-efficient virtual machine placement in data centers36
Hybrid graph convolution neural network and branch-and-bound optimization for traffic flow forecasting36
Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography35
FedSA: A staleness-aware asynchronous Federated Learning algorithm with non-IID data35
IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging35
Multi-view face recognition using deep neural networks35
Solving the dynamic energy aware job shop scheduling problem with the heterogeneous parallel genetic algorithm35
Embedding individualized machine learning prediction models for energy efficient VM consolidation within Cloud data centers35
Multi-modal aggression identification using Convolutional Neural Network and Binary Particle Swarm Optimization35
Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion35
Robot path planning by leveraging the graph-encoded Floyd algorithm35
On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives34
DecChain: A decentralized security approach in Edge Computing based on Blockchain34
LSMD: A fast and robust local community detection starting from low degree nodes in social networks34
Intelligent security and optimization in Edge/Fog Computing34
Achieving cybersecurity in blockchain-based systems: A survey34
Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme34
A multi-device multi-tasks management and orchestration architecture for the design of enterprise IoT applications34
A hybrid personalized scholarly venue recommender system integrating social network analysis and contextual similarity34
Information security and storage of Internet of Things based on block chains34
Secure crowd-sensing protocol for fog-based vehicular cloud34
Ontology based recommender system using social network data34
Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM33
0.037106037139893