Future Generation Computer Systems-The International Journal of Escien

Papers
(The TQCC of Future Generation Computer Systems-The International Journal of Escien is 16. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Improving WSN-based dataset using data augmentation for TSCH protocol performance modeling516
M2FaaS: Transparent and fault tolerant FaaSification of Node.js monolith code blocks512
An edge–fog architecture for distributed 3D reconstruction462
Bridging separate communities with common interest in distributed social networks through the use of social objects378
SPAE: Lifelong disk failure prediction via end-to-end GAN-based anomaly detection with ensemble update306
On efficient matching of spatiotemporal rules302
CLARA: A novel clustering-based resource-allocation mechanism for exploiting low-availability complementarities of voluntarily contributed nodes298
Special issue on senti-mental health: Future generation sentiment analysis systems291
STPD: Defending against 0204
Enhancing interconnection network topology for chiplet-based systems: An automated design framework183
ORION: Verification of drone trajectories via remote identification messages182
Optimizing mobile blockchain networks: A game theoretical approach to cooperative multi-terminal computation180
Scalability through Pulverisation: Declarative deployment reconfiguration at runtime153
Global reduction for geo-distributed MapReduce across cloud federation133
MIGTNet: Metapath Instance-based Graph Transformation Network for heterogeneous graph embedding133
An ultrasound standard plane detection model of fetal head based on multi-task learning and hybrid knowledge graph132
Secure blockchain-based reputation system for IIoT-enabled retail industry with resistance to sybil attack129
Benchmarking parallel programming for single-board computers124
Latency-aware scheduling for data-oriented service requests in collaborative IoT-edge-cloud networks118
Fog node discovery and selection: A Systematic literature review118
SkyFlow: Heterogeneous streaming for skyline computation using FlowGraph and SYCL117
MedT2T: An adaptive pointer constrain generating method for a new medical text-to-table task116
Privacy-preserving workflow scheduling in geo-distributed data centers116
Flight: A FaaS-based framework for complex and Hierarchical Federated Learning114
A distributed Monte Carlo based linear algebra solver applied to the analysis of large complex networks113
Reducing inference energy consumption using dual complementary CNNs107
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks103
Enforcing group fairness in privacy-preserving Federated Learning102
Trajectory privacy preservation model based on LSTM-DCGAN96
AQUA: Analytics-driven quantum neural network (QNN) user assistance for software validation94
Leveraging a visual language for the awareness-based design of interaction requirements in digital twins91
A Knapsack-based Metaheuristic for Edge Server Placement in 5G networks with heterogeneous edge capacities90
An out-of-core method for GPU image mapping on large 3D scenarios of the real world89
HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach89
Investigation on cellular LTE C-V2X network serving vehicular data traffic in realistic urban scenarios86
Learning protein language contrastive models with multi-knowledge representation84
Harnessing federated learning for anomaly detection in supercomputer nodes80
Finite-horizon energy allocation scheme in energy harvesting-based linear wireless sensor network79
FedShufde: A privacy preserving framework of federated learning for edge-based smart UAV delivery system77
Blockchain and digital twin empowered edge caching for D2D wireless networks77
Cost-efficient and Topology-aware Scheduling Algorithms in Distributed Stream Computing Systems76
CyberAIBot: Artificial Intelligence in an intrusion detection system for CyberSecurity in the IoT74
DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering74
Semi-Asynchronous Energy-Efficient Federated Prototype Learning for End-Edge-Cloud Architectures73
PPSFL: Privacy-Preserving Split Federated Learning for heterogeneous data in edge-based Internet of Things73
Autoencoder-based feature construction for IoT attacks clustering72
Special Issue on Intelligent Architectures and Platforms for Private Edge Cloud Systems71
Blockchain and timely auction mechanism-based spectrum management71
Evolutionary optimization of spatially-distributed multi-sensors placement for indoor surveillance environments with security levels70
Is quantum optimization ready? An effort towards neural network compression using adiabatic quantum computing68
Regen: An object layout regenerator on large-scale production HPC systems67
Editorial Board66
Optimizing 2-opt-based heuristics on GPU for solving the single-row facility layout problem65
Evaluating NiFi and MQTT based serverless data pipelines in fog computing environments65
Kafka-ML: Connecting the data stream with ML/AI frameworks65
An optimization framework for task allocation in the edge/hub/cloud paradigm65
A multi-output prediction model for physical machine resource usage in cloud data centers65
Editorial Board64
Consolidation of virtual machines to reduce energy consumption of data centers by using ballooning, sharing and swapping mechanisms64
Editorial Board63
EB-BFT: An elastic batched BFT consensus protocol in blockchain63
Low-cost and high-performance channel access strategies for Internet of Nano-Things applications63
Curriculum classification network based on margin balancing multi-loss and ensemble learning62
Cora: Data correlations-based storage policies for cloud object storage61
Assessing the accuracy of remote sensing data products: A multi-granular spatial sampling method61
ACMF: An Attention Collaborative Extended Matrix Factorization Based Model for MOOC course service via a heterogeneous view61
HGGN: Prediction of microRNA-Mediated drug sensitivity based on interpretable heterogeneous graph global-attention network60
Energy consumption estimation and profiling for queries in distributed database systems based on a bottom-up comprehensive energy model60
A blockchain-adaptive contractual approach for multi-contracting organizational entities60
An energy efficient and runtime-aware framework for distributed stream computing systems59
Decentralised Identity Management solution for zero-trust multi-domain Computing Continuum frameworks59
A deep reinforcement learning based algorithm for time and cost optimized scaling of serverless applications59
A collaborative semantic framework based on activities for the development of applications in Smart Home living labs58
Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges58
A novel CTGAN-ENN hybrid approach to enhance the performance and interpretability of machine learning black-box models in intrusion detection and IoT57
Principled and automated system of systems composition using an ontological architecture57
Leveraging conditional generative models in a general explanation framework of classifier decisions57
Xel: A cloud-agnostic data platform for the design-driven building of high-availability data science services56
An automated and portable method for selecting an optimal GPU frequency56
Task offloading in vehicular fog computing: State-of-the-art and open issues56
Practical volume-hiding range searchable symmetric encryption using trusted execution56
A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing55
Self-aware collaborative edge inference with embedded devices for IIoT55
Offloading dependent tasks in multi-access edge computing: A multi-objective reinforcement learning approach54
Online scheduling of coflows by attention-empowered scalable deep reinforcement learning54
Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework54
Blockchain-based trust mechanism for digital twin empowered Industrial Internet of Things54
A Q-Learning-based distributed routing protocol for frequency-switchable magnetic induction-based wireless underground sensor networks53
Lattice-based public key searchable encryption with fine-grained access control for edge computing53
Layer-wise partitioning and merging for efficient and scalable deep learning53
Multidimensional architecture using a massive and heterogeneous data: Application to drought monitoring53
PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow52
Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things52
Pedestrian safety using the Internet of Things and sensors: Issues, challenges, and open problems52
A systematic literature review of IoT time series anomaly detection solutions52
Cost-aware routing for computation offloading in knowledge-defined AIoT52
EGNN: Energy-efficient anomaly detection for IoT multivariate time series data using graph neural network52
LA-MDPF: A forwarding strategy based on learning automata and Markov decision process in named data networking52
Skip index: Supporting efficient inter-block queries and query authentication on the blockchain51
FSVNet: Federated Self-driving Vehicle Network based on decomposition global convergence51
MLQM: Machine learning approach for accelerating optimal qubit mapping51
Optimal service caching, pricing and task partitioning in mobile edge computing federation51
Recognition of Outstanding Future Generation Computer Systems Reviewers for 202250
TEEFuzzer: A fuzzing framework for trusted execution environments with heuristic seed mutation50
An extended analytical framework for heterogeneous implementations of light cryptographic algorithms49
Modeling and Energy-Optimal Control for Freight Trains based on Data-Driven Approaches49
HSCFC: High-dimensional streaming data clustering algorithm based on feedback control system48
Editorial Board48
A feature-based survey of Fog modeling languages48
Designing secure business processes for blockchains with SecBPMN2BC47
CUPID: An efficient spatio-temporal data engine47
Distributed and heterogeneous tensor–vector contraction algorithms for high performance computing47
Editorial Board47
A fusion recommendation model based on mutual information and attention learning in heterogeneous social networks46
Energy-efficient discrete Haar Wavelet Transform architectures exploring approximate adders for high-quality image compression and reconstruction46
An Anti-Malicious Task Allocation Mechanism in Crowdsensing Systems46
Comparing Adiabatic Quantum Computers for satellite images feature extraction46
Constructing a prior-dependent graph for data clustering and dimension reduction in the edge of AIoT45
A multi-hierarchy particle swarm optimization-based algorithm for cloud workflow scheduling45
A mask guided cross data augmentation method for industrial defect detection45
Expanding SafeSU capabilities by leveraging security frameworks for contention monitoring in complex SoCs45
A novel dung beetle optimization algorithm based on Lévy flight and triangle walk44
Uncertainty-aware scheduling for effective data collection from environmental IoT devices through LEO satellites44
ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing44
A framework for supporting the reproducibility of computational experiments in multiple scientific domains44
Software-defined DDoS detection with information entropy analysis and optimized deep learning44
Efficient and privacy-preserving group signature for federated learning44
7 μJ/inference end-to-end gesture recognition 44
Adversarial robustness benchmark for EEG-based brain–computer interfaces44
AdaptFL: Adaptive Federated Learning Framework for Heterogeneous Devices43
Digital twin framework for smart greenhouse management using next-gen mobile networks and machine learning43
DAFL: Domain adaptation-based federated learning for privacy-preserving biometric recognition43
BTG: A Bridge to Graph machine learning in telecommunications fraud detection43
A fast-iterative reconstruction algorithm for sparse angle CT based on compressed sensing43
Enabling performance portability on the LiGen drug discovery pipeline42
An adaptive robust defending algorithm against backdoor attacks in federated learning42
Look-ahead workflow scheduling with width changing trend in clouds42
Autoscaling of microservice resources based on dense connectivity spatio-temporal GNN and Q-learning41
Federated Discrete Reinforcement Learning for Automatic Guided Vehicle Control41
DAG-based workflows scheduling using Actor–Critic Deep Reinforcement Learning41
A novel authentication and key agreement scheme for Internet of Vehicles41
Extreme-scale workflows: A perspective from the JLESC international community41
Hybrid deep learning-based cyberthreat detection and IoMT data authentication model in smart healthcare41
Joint optimization of multi-dimensional resource allocation and task offloading for QoE enhancement in Cloud-Edge-End collaboration41
Validating the performance of GPU ports using differential performance models41
Deep Reinforcement Learning-based scheduling for optimizing system load and response time in edge and fog computing environments40
Corrigendum to “DEEPSEL: A novel feature selection for early identification of malware in mobile applications” [Future Gener. Comput. Syst. 129 (2022) 54–63]40
Privacy and security-aware workflow scheduling in a hybrid cloud40
Blending lossy and lossless data compression methods to support health data streaming in smart cities40
A heterogeneous network embedded medicine recommendation system based on LSTM40
The utility of complexity metrics during code reviews for CSE software projects40
Editorial Board40
A Blockchain-based Digital Twin for IoT deployments in logistics and transportation40
Editorial Board39
SLO-aware dynamic self-adaptation of resources38
Dynamic weighted ensemble learning for sequential recommendation systems: The AIRE model38
Leading Smart Environments towards the Future Internet through Name Data Networking: A survey38
A package-aware scheduling strategy for edge serverless functions based on multi-stage optimization38
DeScan: Censorship-resistant indexing and search for Web338
Enabling cross-continent provider fairness in educational recommender systems38
A Bayesian game-enhanced auction model for federated cloud services using blockchain38
Outage analysis of mmWave-NOMA transmission in the presence of LOS and NLOS paths38
A self-organized MoE framework for distributed federated learning37
Retraction notice to “A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem” [Future Gener. Comput. Syst. 85 (2018) 129–145]37
A secure multi-party payment channel on-chain and off-chain supervisable scheme37
Improving self-supervised vertical federated learning with contrastive instance-wise similarity and dynamical balance pool37
Human resource recommendation algorithm based on improved frequent itemset mining37
Transplantation and optimization of molecular dynamics simulation on MT-300036
Adaptive ensemble optimization for memory-related hyperparameters in retraining DNN at edge36
A terminology for scientific workflow systems36
Deep cognitive diagnosis model for predicting students’ performance36
A guide to design uncertainty-aware self-adaptive components in Cyber–Physical Systems35
Blockchain-escorted distributed deep learning with collaborative model aggregation towards 6G networks35
Routing in LoRa for smart cities: A gossip study35
BEAST: Behavior as a Service for Trust management in IoT devices35
Robustness evaluation of large-scale machine learning-based reduced order models for reproducing flow fields34
An exploration of online-simulation-driven portfolio scheduling in Workflow Management Systems34
A novel bi-anomaly-based intrusion detection system approach for industry 4.034
Physical layer security for Internet of Things via reconfigurable intelligent surface34
Context and auto-interaction are all you need: Towards context embedding based QoS prediction via automatic feature interaction for high quality cloud API delivery34
Quantune: Post-training quantization of convolutional neural networks using extreme gradient boosting for fast deployment33
Dynamic authenticated keyword search in hybrid-storage blockchain33
Optimizing fog device deployment for maximal network connectivity and edge coverage using metaheuristic algorithm33
A feature selection-based method for DDoS attack flow classification33
A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges33
PAC: A monitoring framework for performance analysis of compression algorithms in Spark33
Resilience and performance quantification of dynamic reconfiguration33
Truthful auction mechanisms for resource allocation in the Internet of Vehicles with public blockchain networks33
DeFuseDTI: Interpretable drug target interaction prediction model with dual-branch encoder and multiview fusion33
A scalable modified deep reinforcement learning algorithm for serverless IoT microservice composition infrastructure in fog layer33
Connected vehicles’ dynamic route planning based on reinforcement learning33
An optimized feature extraction algorithm for abnormal network traffic detection33
BDPM: A secure batch dynamic password management scheme in industrial internet environments32
Special issue on co-design of data and computation management in Fog Computing32
Optimizing data placement and size configuration for morphable NVM based SPM in embedded multicore systems32
SpAIware: Uncovering a novel artificial intelligence attack vector through persistent memory in LLM applications and agents32
Reinforcement learning-based dynamic pruning for distributed inference via explainable AI in healthcare IoT systems32
APapo: An asynchronous parallel optimization method for DNN models32
Cloud-native alternating directions solver for isogeometric analysis32
Performance portability of sparse matrix–vector multiplication implemented using OpenMP, OpenACC and SYCL32
ProtoFedGAN: A Novel Federated Learning Framework for Training Generative Adversarial Networks via Dynamic Dual-Prototype Alignment32
Blockchain for the metaverse: A Review32
Mitigating bias in artificial intelligence: Fair data generation via causal models for transparent and explainable decision-making32
SDN Spotlight: A real-time OpenFlow troubleshooting framework32
Retraction notice to “Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem” [Future Gener. Comput. Syst. 89 (2018) 19–30]32
Editorial Board32
Adaptive incremental transfer learning for efficient performance modeling of big data workloads32
FLPM: A property modification scheme for data protection in federated learning32
Evaluation of Juliana Tool: A translator for Julia’s CUDA.jl code into KernelAbstraction.jl31
Low dimensional secure federated learning framework against poisoning attacks31
Connection-density-aware satellite-ground federated learning via asynchronous dynamic aggregation31
Tightly-integrated quantum–classical computing using the QHDL hardware description language31
Reliable customer analysis using federated learning and exploring deep-attention edge intelligence31
CAGO-ECIL: Cloud-Assisted Genetic Optimization for Edge-Class Incremental Learning with training acceleration31
A personalized federated cloud-edge collaboration framework via cross-client knowledge distillation31
Research on transaction allocation strategy in blockchain state sharding31
MobiPCR: Efficient, accurate, and strict ML-based mobile malware detection31
3DSGIMD: An accurate and interpretable molecular property prediction method using 3D spatial graph focusing network and structure-based feature fusion30
Trustable service discovery for highly dynamic decentralized workflows30
An interpretable deep learning model predicts RNA–small molecule binding sites30
SD-SRF: An Intelligent Service Deployment Scheme for Serverless-operated Cloud-Edge Computing in 6G Networks30
Edge aggregation placement for semi-decentralized federated learning in Industrial Internet of Things29
Regularity-driven pattern extraction and analysis approach by the pre-pruning technique without pattern loss29
A high precision intrusion detection system for network security communication based on multi-scale convolutional neural network29
End-to-end slices to orchestrate resources and services in the cloud-to-edge continuum29
AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things29
Special Issue on Machine Learning and Knowledge Graphs29
Cost-effective stochastic resource placement in edge clouds with horizontal and vertical sharing29
A recommendation management defense mechanism based on trust model in underwater acoustic sensor networks29
Prediction model of performance–energy trade-off for CFD codes on AMD-based cluster29
CTF-DDI: Constrained tensor factorization for drug–drug interactions prediction29
Geant4: A game changer in high energy physics and related applicative fields29
Multi-type task offloading for wireless Internet of Things by federated deep reinforcement learning29
Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM29
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain29
Analysis of security and data control in smart personal assistants from the user’s perspective28
Deciphering the abundance of immune cells in glomerular endothelium of Alport syndrome kidneys using the deconvolution algorithm CONVdeconv28
Explainable indoor localization of BLE devices through RSSI using recursive continuous wavelet transformation and XGBoost classifier28
Object detection/tracking toward underwater photographs by remotely operated vehicles (ROVs)28
Software Quality Assurance as a Service: Encompassing the quality assessment of software and services28
On floating point precision in computational fluid dynamics using OpenFOAM28
SCTD: A spatiotemporal correlation truth discovery scheme for security management of data platform28
Small models, big impact: A review on the power of lightweight Federated Learning28
ELECT: Energy-efficient intelligent edge–cloud c28
Energy-efficient task scheduling for mobile edge computing with virtual machine I/O interference28
Efficient and provably secured puncturable attribute-based signature for Web 3.028
ATHENA I—An architecture for near real-time physiological signal monitoring and pattern detection27
Federated learning empowered mobility-aware proactive content offloading framework for fog radio access networks27
Editorial Board27
POMF: A Privacy-preserved On-chain Matching Framework27
0.16318798065186