Cluster Computing-The Journal of Networks Software Tools and Applicati

Papers
(The median citation count of Cluster Computing-The Journal of Networks Software Tools and Applicati is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Design of the implementation information management platform for distributed generation in distribution network based on information integration195
An efficient firefly and honeybee based load balancing mechanism in cloud infrastructure137
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review131
Correction: The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm126
Retraction Note: A dynamic clustering based method in community detection125
Retraction Note: Development of a medical big-data mining process using topic modeling81
Retraction Note: Improved image compression using effective lossless compression technique79
Retraction Note: Research on religious management based on big data79
Retraction Note: Classification of malignant melanoma and benign skin lesion by using back propagation neural network and ABCD rule71
Retraction Note: Development of healthcare service model using physical information data based on cluster sensing technology69
Retraction Note: Application of the slicing technique to extract the contour feature line67
Retraction Note: Research on smart city service system based on adaptive algorithm67
Retraction Note: Registry service selection based secured internet of things with imperative control for industrial applications66
Retraction Note: An effiecient human tracking system using Haar-like and hog feature extraction66
RETRACTED ARTICLE: Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model65
Retraction Note: Discussion on new media communication strategy of sports events based on large data technology65
Retraction Note: Analysis of image processing algorithm based on bionic intelligent optimization62
Securing internet of vehicles: a blockchain-based federated learning approach for enhanced intrusion detection61
Intelligent multipath congestion control algorithm based on subflow coupling perception61
K-PAKE: post quantum password authentication key exchange protocol for satellite networks60
An efficient framework to combat multidimensionality in multi-criteria recommender systems60
Optimal VM-to-user mapping in cloud environment based on sustainable strategy space theory58
Coati optimization algorithm for node localization in sensor enabled-IoT58
Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management57
YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention56
Victoria Amazonica optimization algorithm based on adaptive mutation factor and mathematical distribution for solving minimum spanning tree problem55
Blockchain-enhanced secure guard: a deep Q network framework for robust IoT surveillance person detection55
A hybrid approach based on tuna swarm and equilibrium optimizers for parameter estimation of different PV models50
A new hybrid multi-objective optimization algorithm for task scheduling in cloud systems49
An adaptive hybrid differential Grey Wolf Optimization algorithm for WSN coverage49
Deep learning-based modelling of pyrolysis48
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey46
Product recommendation using enhanced convolutional neural network for e-commerce platform46
Locality-aware virtual machine placement based on similarity properties in mobile edge computing45
Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes45
A novel energy-based task scheduling in fog computing environment: an improved artificial rabbits optimization approach44
A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment43
Intelligent microservices autoscaling module using reinforcement learning41
Data fusion and network intrusion detection systems41
Energy-delay-aware VNF scheduling: a reinforcement learning approach with hierarchical reward enhancement41
Fusion of deep and local gradient-based features for multimodal finger knuckle print identification41
Personalized service recommendation in smart mobility networks40
Sample-independent federated learning backdoor attack in speaker recognition40
Adaptive horizontal scaling in kubernetes clusters with ANN-based load forecasting39
Expertise as a signature: continuous implicit authentication based on behavior39
Hybrid strategy improved Harris Hawks optimization algorithm for global optimization and microgrid economic scheduling problem39
Joint resource autoscaling and request scheduling for serverless edge computing39
A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study38
Qaas: hybrid cryptocurrency wallet-as-a-service based on Quantum RNG38
Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies38
IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety37
Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning37
Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation37
Design of distributed network intrusion prevention system based on Spark and P2DR models36
An intelligent mechanism for energy consumption scheduling in smart buildings35
Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities35
The research and analysis of efficiency of hardware usage base on HDFS34
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication34
HyperSegRec: enhanced hypergraph-based recommendation system with user segmentation and item similarity learning34
EMR sharing system with lightweight searchable encryption and rights management33
GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model33
Dataflow-based automatic parallelization of MATLAB/Simulink models for fitting modern multicore architectures33
Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement33
Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing32
MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement32
Circulation of legitimate information over VANETs using threshold signature scheme32
Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous data32
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection32
Edge intelligence-assisted smart healthcare solution for health pandemic: a federated environment approach31
SMAD: SMart assistant during and after a medical emergency case based on deep learning sentiment analysis31
An improved cellular goore game-based consensus protocol for blockchain31
Service selection based on blockchain smart contracts in cloud-edge environment30
Modeling and verification of software evolution using bigraphical reactive system30
Quantitative and qualitative similarity measure for data clustering analysis30
Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT30
A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication30
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks29
MAIDS: malicious agent identification-based data security model for cloud environments29
Energy efficient offloading scheme for MEC-based augmented reality system29
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme29
A cost-efficient auto-scaling mechanism for IoT applications in fog computing environment: a deep learning-based approach28
Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment28
Evolution of computing energy efficiency: Koomey's law revisited28
Privacy preserving spatio-temporal attribute-based encryption for cloud applications28
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things27
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks27
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models27
An efficient deep reinforcement learning based task scheduler in cloud-fog environment27
A retrieval method of learners’ behavior features based on K-means clustering algorithm26
BGAS: blockchain-based secure and efficient group key agreement scheme for dynamic vehicular platoon26
Adaptive virtual machine placement: a dynamic approach for energy-efficiency, QoS enhancement, and security optimization26
An efficient class-dependent learning label approach using feature selection to improve multi-label classification algorithms26
Graph-based robust 3D point cloud map merging approach for large scale26
Maximizing utility by optimal capacity division in P2P networks25
RETRACTED ARTICLE: A novel approach to QoS-aware resource allocation in NOMA cellular HetNets using multi-layer optimization25
A method of system selection for shuttle-based storage and retrieval system considering cost and performance24
Two-stage selection of distributed data centers based on deep reinforcement learning24
cuConv: CUDA implementation of convolution for CNN inference24
PartEclat: an improved Eclat-based frequent itemset mining algorithm on spark clusters using partition technique23
Retraction Note: Classification of sentence level sentiment analysis using cloud machine learning techniques23
Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective23
Intelligent intrusion detection based on fuzzy Big Data classification23
An adaptive and secure routes migration model for the sustainable cloud of things23
Correction to: High-performance pseudo-anonymization of virtual power plant data on a CPU cluster23
RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain23
A survey of blockchain applications in sustainable and smart cities22
Quantum-resistant public-key encryption and signature schemes with smaller key sizes22
Correction: Towards a distributed SaaS management system in a multi-cloud environment22
An improved hash algorithm for monitoring network traffic in the internet of things22
A distributed algorithm with dynamic event-triggered mechanism for resource allocation problems21
Lightweight image super-resolution with feature cheap convolution and attention mechanism21
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost21
Enhancing constrained application protocol using message options for internet of things21
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection21
Weighted spatial skyline queries with distributed dominance tests21
Cluster mechanism for sensing data report using robust collaborative distributed spectrum sensing20
Analysis of NVMe over fabrics with SCinet DTN-as-a-Service20
A secure lossless recovery for medical images based on image encoding and data self-embedding20
Interference-aware execution framework with Co-scheML on GPU clusters20
ProBlock: a novel approach for fake news detection20
A Spark-based high utility itemset mining with multiple external utilities20
Energy-efficient speed tuning for real-time applications20
High-performance network attack detection in unknown scenarios based on improved vertical model20
Adaptive bandwidth adjustment for resource constrained services in fog queueing system20
Strategy-proof mechanism for time-varying batch virtual machine allocation in clouds20
Security framework for smart cyber infrastructure20
Empowering e-learning approach by the use of federated edge computing19
Memory orchestration mechanisms in serverless computing: a taxonomy, review and future directions19
QoS correlation-based service composition algorithm for multi-constraint optimal path selection19
A multi-illusive voids approach for increasing base station anonymity19
A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning19
A secure and flexible edge computing scheme for AI-driven industrial IoT19
Examining deep learning’s capability to spot code smells: a systematic literature review19
An efficient resource provisioning algorithm for workflow execution in cloud platform19
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs19
Video coding deep learning-based modeling for long life video streaming over next network generation18
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks18
Multi-ant colony optimization algorithm based on game strategy and hierarchical temporal memory model18
A new approach for mechanical parameter inversion analysis of roller compacted concrete dams using modified PSO and RBFNN18
Secure electronic medical records sharing scheme based on blockchain and quantum key18
Blockchain and COVID-19 pandemic: applications and challenges18
ATConf: auto-tuning high dimensional configuration parameters for big data processing frameworks18
Energy efficient power cap configurations through Pareto front analysis and machine learning categorization18
DNA sequences design under many objective evolutionary algorithm17
Retraction Note: Research on the access control protocol Priccess design of network privacy protection17
Region of interest encryption algorithm for images based on lifting scheme and object detection17
STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction17
Distributed medical data storage model based on blockchain technology17
A comprehensive node-based botnet detection framework for IoT network17
Internet of things-based secure architecture to automate industry17
Improving Oversubscribed GPU Memory Performance in the PyTorch Framework17
Refining differential evolution with mutation rate and neighborhood weight local search16
Performance modeling and analysis of Hyperledger Fabric16
S-MPEC: Sparse Matrix Multiplication Performance Estimator on a Cloud Environment16
Secure itemset hiding in smart city sensor data16
A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification16
Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning16
Research on placement of distributed SDN multiple controllers based on IAVOA16
A coupled generative graph convolution network by capturing dynamic relationship of regional flow for traffic prediction15
Optimizing electric vehicle routing with nonlinear charging and time windows using improved differential evolution algorithm15
Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure15
Parallel Version of Local Search Heuristic Algorithm to Solve Capacitated Vehicle Routing Problem15
PerMl-Fed: enabling personalized multi-level federated learning within heterogenous IoT environments for activity recognition15
Correction to: A secure authentication technique for connecting different IoT devices in the smart city infrastructure15
Popularity-based full replica caching for erasure-coded distributed storage systems15
A new traffic congestion prediction strategy (TCPS) based on edge computing15
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid15
High-speed hyperparameter optimization for deep ResNet models in image recognition15
Orchestrating real-time IoT workflows in a fog computing environment utilizing partial computations with end-to-end error propagation15
GT-scheduler: a hybrid graph-partitioning and tabu-search based task scheduler for distributed data stream processing systems15
A deep learning approach for detecting covert timing channel attacks using sequential data15
Modeling the Green Cloud Continuum: integrating energy considerations into Cloud–Edge models15
Quantification and analysis of performance fluctuation in distributed file system15
A cost-efficient scheduling algorithm for streaming processing applications on cloud15
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid15
Investigating large language models capabilities for automatic code repair in Python15
A hybrid northern goshawk optimization algorithm based on cluster collaboration15
HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model14
Joint mode selection and user association in D2D enabled multitier C-RAN14
Energy-aware parameter tuning for mixed workloads in cloud server14
An efficient partial charging and data gathering strategy using multiple mobile vehicles in wireless rechargeable sensor networks14
Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems14
Performance analysis of P2p network content delivery based on queueing model14
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network14
AFL-HCS: asynchronous federated learning based on heterogeneous edge client selection14
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study14
Multi-objective optimization-based privacy in data mining14
Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation14
Design and implementation of dynamic I/O control scheme for large scale distributed file systems14
Using FIWARE and blockchain in smart cities solutions13
Join queries optimization in the distributed databases using a hybrid multi-objective algorithm13
Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network13
Correction: Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings13
Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment13
DNA-chaos governed cryptosystem for cloud-based medical image repository13
BlockTree: a nonlinear structured, scalable and distributed ledger scheme for processing digital transactions13
A multiobjective decomposition evolutionary algorithm with optimal history-based neighborhood adaptation and a dual-indicator selection strategy13
Fisher linear discriminant and discrete global swarm based task scheduling in cloud environment13
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis13
Gpu-based and streaming-enabled implementation of pre-processing flow towards enhancing optical character recognition accuracy and efficiency13
An optimized human resource management model for cloud-edge computing in the internet of things13
Upper confident bound advantage function proximal policy optimization13
Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services13
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing13
An extended lightweight blockchain based collaborative healthcare system for fraud prevention13
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units13
Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units13
SUACC-IoT: secure unified authentication and access control system based on capability for IoT13
HCIndex: a Hilbert-Curve-based clustering index for efficient multi-dimensional queries for cloud storage systems13
A mobility-aware task scheduling by hybrid PSO and GA for mobile edge computing12
Implementation and evaluation of a container management platform on Docker: Hadoop deployment as an example12
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model12
Optimizing medical data classification: integrating hybrid fuzzy joint mutual information with binary Cheetah optimizer algorithm12
A machine learning-based optimization approach for pre-copy live virtual machine migration12
A survey on machine and deep learning in semiconductor industry: methods, opportunities, and challenges12
Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud12
Imperialist competitive based approach for efficient deployment of IoT services in fog computing12
Hybrid artificial immune algorithm for energy-efficient distributed flexible job shop in semiconductor manufacturing12
Arrhythmia ventricular fibrillation classification on ECG signal using ensemble feature selection and deep neural network12
Machine learning-based intelligent security framework for secure cloud key management12
Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges12
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine12
A novel real-time object detection method for complex road scenes based on YOLOv7-tiny12
Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints12
Correction: A new quantum-enhanced approach to AI-driven medical imaging system11
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges11
Video quality adaptation using CNN and RNN models for cost-effective and scalable video streaming Services11
A secure lightweight authentication model with interference aware routing and attack detection approach in VANET11
Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model11
Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme11
Edge computing based secure health monitoring framework for electronic healthcare system11
Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity11
Detection and prediction of traffic accidents using deep learning techniques11
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization11
Practical evasion attack against neural network-based macro-malware detection method11
Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments11
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting11
High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding11
DEA$$^2$$H$$^2$$: differential evolution architecture based adaptive hyper-heuristic algorithm for continuous optimization11
Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management11
Bppfl: a blockchain-based framework for privacy-preserving federated learning11
Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII11
Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization10
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures10
GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems10
An ontology-based approach to designing a NoSQL database for semi-structured and unstructured health data10
Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network10
Improving UWB ranging accuracy via multiple network model with second order motion prediction10
Enhanced multi-objective virtual machine replacement in cloud data centers: combinations of fuzzy logic with reinforcement learning and biogeography-based optimization algorithms10
Replication management in peer-to-peer cloud storage systems10
0.1383159160614