Cluster Computing-The Journal of Networks Software Tools and Applicati

Papers
(The TQCC of Cluster Computing-The Journal of Networks Software Tools and Applicati is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-10-01 to 2025-10-01.)
ArticleCitations
Design and implementation of dynamic I/O control scheme for large scale distributed file systems289
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study221
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units217
Quantification and analysis of performance fluctuation in distributed file system189
Combining evolutionary and swarm algorithms in a hybrid subspace-wise search strategy for feature selection110
Energy-efficient edge deployment of generative AI models using federated learning105
Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm96
SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN87
A description language for enhancing transparency and interoperability in blockchain smart contracts85
Victoria Amazonica optimization algorithm based on adaptive mutation factor and mathematical distribution for solving minimum spanning tree problem84
An adaptive hybrid differential Grey Wolf Optimization algorithm for WSN coverage82
An efficient framework to combat multidimensionality in multi-criteria recommender systems81
ROI-based optimized image watermarking with real-time authentication78
Confidentiality, integrity, and non-repudiation of automobile event data: a TEE-based secure transmission scheme between automobile and cloud78
A Spark-based high utility itemset mining with multiple external utilities75
Privacy preserving spatio-temporal attribute-based encryption for cloud applications75
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks75
Examining deep learning’s capability to spot code smells: a systematic literature review74
DLBW: an end-to-end multi-task adaptive gradient balancing method74
Quantitative and qualitative similarity measure for data clustering analysis74
Stellar oscillation optimizer: a nature-inspired metaheuristic optimization algorithm69
Autonomous underwater vehicle 3D path planning based on multiple populations for multiple objectives ant colony optimization69
An efficient cross-domain mutual authentication scheme for heterogeneous signcryption in VANETs68
Research on inspection task allocation method of inspection robot based on improved genetic algorithm64
The management of energy-aware virtual machine deployment and load balancing using mapping in network-on-chip for cyber-physical systems in cloud computing62
Internet of vehicles task offloading based on edge computing using double deep Q-network59
A layered and integrative framework for Advance Persistent Threat detection and mitigation: combining AI, Zero-Trust, and Advanced Threat Intelligence57
Secure electronic medical records sharing scheme based on blockchain and quantum key54
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis53
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting52
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization52
DNA sequences design under many objective evolutionary algorithm52
RF-FedAvg: Federated learning-based random forest model for intrusion detection in wireless sensor networks51
A survey on privacy-preserving federated learning against poisoning attacks49
Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management49
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks48
Retraction Note: Improved image compression using effective lossless compression technique47
Design of distributed network intrusion prevention system based on Spark and P2DR models47
A multi-illusive voids approach for increasing base station anonymity46
Retraction Note: An effiecient human tracking system using Haar-like and hog feature extraction46
A cost-efficient scheduling algorithm for streaming processing applications on cloud45
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network44
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things44
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid44
Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies43
Data breaches in healthcare: security mechanisms for attack mitigation43
A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study41
Deep learning fusion for effective malware detection: leveraging visual features40
Improving virtualization and migration in combinatorial dynamic mapping for cloud services40
Retraction Note: Development trend of sharing economy in big data era based on duplication dynamic evolution game theory39
Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization39
Retraction Note: Design and implementation of intelligent manufacturing project management system based on bill of material39
Zebra optimization algorithm with chaos convergence factor and Gaussian mutation for MLP soft-sensor model of debutanizer column38
An adaptive composite service deployment in mobile edge computing using MLP-based DQN38
Enhanced security of smart contracts in fog computing: hybrid classifiers and feature selection for improved attack detection for registration and resource access granting38
ISDA-BAN: interoperability and security based data authentication scheme for body area network38
PriOT-LSH: efficient privacy-preserving WiFi localization based on oblivious transfer and locality-sensitive hashing in cloud environments38
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems37
Digital Twin technology for multimodal-based smart mobility using hybrid Co-ABC optimization based deep CNN37
Optimizing feature selection in imbalanced intrusion detection system using hybrid metaheuristics algorithms for wireless sensor networks36
Game-theoretic cloud assistance strategies of end-edge-cloud systems for mitigating edge distributed denial of service attacks36
FedDC: a federated learning framework to enhance gradient diversity and mitigate conflicts36
Learned image compression with CNN-LocalMamba architectures and multi-context entropy model35
Two-stage hierarchical evolutionary algorithm based on multi-population for multi-objective distributed heterogeneous welding flow shop scheduling35
Recent metaheuristic algorithms for multi-objective feature selection: review, applications, open issues and challenges35
EEG-based emotion recognition model using fuzzy adjacency matrix combined with convolutional multi-head graph attention mechanism35
Traffic flow forecasting based on dynamic graph convolution and triplet attention35
Cloud-edge synergistic MEC multi-task offloading and resource allocation method based on convex optimization35
An energy-efficient black widow-based adaptive VM placement approach for cloud computing34
Research on path planning of intelligent vehicle integrated with adjacent vehicle prediction33
Metaheuristics role in image processing and computer vision applications: a comprehensive review33
SFE-EANDS: a simple, fast, and efficient algorithm with external archive and normalized distance-based selection for high-dimensional feature selection33
A novel hybrid improved Dung beetle optimization algorithm for robotic arm obstacle avoidance planning33
MTV-SCA: multi-trial vector-based sine cosine algorithm32
Quantifying the impact of data replication on error propagation32
Design and development of an intelligent transportation management system using blockchain and smart contracts32
Retraction Note: Enhanced trust based encroachment discovery system for Mobile Ad-hoc networks31
A JAYA algorithm based on normal clouds for DNA sequence optimization31
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting31
Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition31
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis31
Real-time progressive compression method of massive data based on improved clustering algorithm31
Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms31
Using advanced data structures to enable responsive security monitoring31
Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling31
PURKAA: privacy ensured game-based task of floading for mobile blockchains30
Utilizing generative adversarial networks (GANs) for realistic video stream augmentation and enhancement30
Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach30
Netostat: analyzing dynamic flow patterns in high-speed networks30
Retraction Note: Interior design and pattern innovation design study based on generic algorithm logistics information29
Federated learning for energy constrained devices: a systematic mapping study29
Natural language why-question answering system in business intelligence context29
Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems29
Resource aware medical IoT data management system using Social IoT based edge computing29
SPATS: a practical system for comparative analysis of spatio-temporal graph neural networks29
A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms29
Intelligent monitoring system for environmental protection during the construction period of pumped storage power station28
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset28
BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm28
Human activity recognition in cyber-physical systems using optimized machine learning techniques28
Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment28
Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems27
Temporal feature-enhanced graph Convolutional Recurrent Network for traffic forecasting27
Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions27
Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure27
An energy-aware module placement strategy in fog-based healthcare monitoring systems27
CLARA: clustered learning automata-based routing algorithm for efficient FANET communication27
A smart contract-driven access control scheme with integrity checking for electronic health records26
LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing26
Improving fault tolerance in LinuX container-based distributed systems using blockchain26
Enhancing lane line detection transformer with frequency-assisted attention26
Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm26
Enhanced zebra optimization algorithm for reliability redundancy allocation and engineering optimization problems26
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme26
Fedmkd: multi-teacher knowledge distillation for communication-efficient federated learning25
A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system25
L-xaids: A LIME-based eXplainable AI framework for intrusion detection systems25
A diversity-enhanced framework for multimodal optimization: utilizating niching and differential evolution operator25
Enhancing data credibility in 6G-enabled IoT-fog environment using secured blockchain scheme25
CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud24
Enhanced anomaly detection in log-based systems using GAN-based models24
Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning24
Cloud workload prediction based on wavelet transform noise reduction and a TCN-GRU hybrid model24
Ethereum smart contracts: a hierarchical analysis of vulnerability challenges and mitigation strategies24
Ameliorating clustered federated learning using real-coded genetic algorithm23
A thermal-aware energy-efficient virtual machine placement algorithm based on fuzzy controlled binary gravitational search algorithm (FC-BGSA)23
An analytical model of a cluster-based service system with application to a cloud environment23
A near-optimal & load balanced resilient system design for high-performance computing platform23
Detection of road extraction from satellite images with deep learning method23
Entity relation joint extraction method for manufacturing industry knowledge data based on improved BERT algorithm23
Retraction Note: Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring22
Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring22
Retraction Note: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm22
Generalized asset fairness mechanism for multi-resource fair allocation mechanism with two different types of resources22
Retraction Note: Research on the selection model of technology-based intellectual property evaluation method based on analytic hierarchy process22
High-performance reliable network-multicast over a trial deployment22
Quantum-PSO based unsupervised clustering of users in social networks using attributes22
Retraction Note: Continuous user authentication based score level fusion with hybrid optimization22
Formulating a quality model for cloud-native software architectures: conceptual and methodological considerations21
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.021
A blockchain-based framework for Academic Bank of Credit with transparent credit mobility21
Retraction Note: Optimal route selection in MANET based on particle swarm optimization utilizing expected transmission count21
Retraction Note: A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing21
Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services21
Single-tag and multi-tag RFID data cleaning approach in edge computing21
A novel revocation management for distributed environment: a detailed study21
Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors21
Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism20
BIARO: an improved artificial rabbit optimization algorithm for feature selection in high-dimensional data20
Multi-scale attention graph convolutional recurrent network for traffic forecasting20
Dynamic object removal by fusing deep learning and multiview geometry20
Mitigating voltage fingerprint spoofing attacks on the controller area network bus20
Effectiveness of machine learning based android malware detectors against adversarial attacks20
Self-supervised deep subspace clustering with entropy-norm20
A novel fine-grained intelligent framework for mitigating cyber-attacks through hybrid chaos-triggered tasmanian devil feature optimization and feedforward learning networks20
Federated learning for secure and efficient vehicular communications in open RAN20
A feature-based processing framework for real-time implementation of muscle fatigue measurement20
Improving resource utilization and fault tolerance in large simulations via actors20
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices20
A new binary chaos-based metaheuristic algorithm for software defect prediction20
Community detection in attributed networks using neighborhood information19
A new quantum differential squirrel search algorithm for global optimization problem19
Towards verifiable updatable attribute-based Boolean keywords search sharing of PHRs in cloud environment19
Comprehensive AI-driven privacy risk assessment in mobile apps and social networks19
Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning19
Efficient deadline-aware Non-Clairvoyant bag-of-tasks scheduling for edge computing using an enhanced SPEA219
Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure19
Anomaly-free federated access control policy enforcement framework for ethereum19
Dimension selection: an innovative metaheuristic strategy for particle swarm optimization19
P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch19
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat19
Morphologically reconstructed 2-D histogram with opposition learning based optimization approach for multi-level thresholding18
A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs18
Group intrusion detection in the Internet of Things using a hybrid recurrent neural network18
Ant colony optimization using eight-neighborhood search with dual pheromone updating strategy and continuous image edge generation strategy for license plate recognition18
An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing18
Intelligent management of supply chain logistics based on 5g LoT18
Optimizing Client Selection in Federated Learning Base on Genetic Algorithm18
Retraction Note: An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology18
3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT18
CIS feature selection based dynamic ensemble selection model for human stress detection from EEG signals18
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era18
Transfer learning method based on cluster for drifting data stream classification18
Advanced memory forensics for malware classification with deep learning algorithms18
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization18
Banyan tree growth optimization and application18
Anomaly detection framework for IoT-enabled appliances using machine learning18
Resource optimization in edge and SDN-based edge computing: a comprehensive study18
A new multi-population artificial bee algorithm based on global and local optima for numerical optimization17
Retraction Note: Investigation on application of association rule algorithm in English teaching logistics information17
Federated learning for feature-fusion based requirement classification17
A hybrid Blockchain-Based framework for securing intrusion detection systems in internet of things17
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs17
Simplified harmony search: novel algorithm design and its applications in engineering design optimization problems17
Retraction Note: Research on intelligent city energy management based on internet of things17
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks17
Visualization of aspect-oriented programs using city transportation metaphor17
Fungible and non-fungible tokens with snapshots in Java17
Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities17
Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems17
Artificial intelligence and information symmetry: a path to mitigate adverse selection17
Retraction Note: Analysis and study on the key factors of regional tourism development based on discrete differential algorithm17
CBPNs: coloured behavioural petri nets for model-based diagnosis17
Identity-based proof of retrievability meets with identity-based network coding17
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples17
Shortest node-to-node disjoint paths algorithm for symmetric networks17
Lattice-based cryptographic technique to preserve data confidentiality in edge computing17
Parallel mutation testing for large scale systems17
MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center16
Blockchain-based public auditing and secure deduplication for copyright data16
A two-phase streaming edge partitioning algorithm for large-scale uncertain graphs16
Improved dung beetle optimization algorithm based on multi-strategy collaborative mechanisms for global optimization and engineering optimization design problems16
Kanfilter: a simple and effective multi-module point cloud denoising model16
Divine Religions Algorithm: a novel social-inspired metaheuristic algorithm for engineering and continuous optimization problems16
Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas16
Fast-CFLB: a privacy-preserving data sharing system for Internet of Vehicles using ternary federated learning and blockchain16
Adaptive machine learning-enhanced channel estimation for RIS-assisted mmWave systems: a hybrid approach16
Exploring the implementation of federated learning in healthcare: a comprehensive review16
Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory16
Fog assisted data size reduction based data management system for optimizing resources in medical IoT16
Multi-threshold image segmentation based on historical variation self-learning equilibrium optimizer16
Strategic joining and optimal pricing in the hybrid cloud system with risk-sensitive service requests16
AI-assisted bio-inspired algorithm for secure IoT communication networks16
Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing15
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain15
Hilbert curves-based location privacy technique for vehicular cloud networks15
Improved gossip protocol for blockchain applications15
Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments15
Optimizing machine learning operations in multi-cloud infrastructure: a framework for unified deployment management and topology discovery15
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS15
Password authentication key exchange based on key consensus for IoT security15
Improved Harris Hawk optimization for multilevel thresholding image segmentation15
A novel dual-archive multi-objective algorithm for hybrid flow shop scheduling problems with missing operations15
The impact of connectivity and software in Ethereum validator performance15
Intrusion detection in internet of things-based smart farming using hybrid deep learning framework15
Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS15
Network Intrusion Detection System Using Convolutional Neural Networks: NIDS-DL-CNN for IoT Security15
Timely detection of DDoS attacks in IoT with dimensionality reduction15
A container-based workflow for distributed training of deep learning algorithms in HPC clusters15
Enhanced unstructured points cloud subdivision applied for parallel Delaunay triangulation15
Robust intrusion detection for unmanned aerial vehicles: a PCA-based feature extraction and ensemble learning approach15
Hybrid modified particle swarm optimization with genetic algorithm (GA) based workflow scheduling in cloud-fog environment for multi-objective optimization15
New Spark solutions for distributed frequent itemset and association rule mining algorithms15
A new fast multiple color image encryption algorithm15
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning15
K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing15
Adaptive parallel applications: from shared memory architectures to fog computing (2002–2022)14
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification14
BlockPres IPFS: performance evaluation of blockchain based secure patients prescription record storage using IPFS for smart prescription management system14
Framework for prediction and classification of non functional requirements: a novel vision14
0.83610415458679