Cluster Computing-The Journal of Networks Software Tools and Applicati

Papers
(The TQCC of Cluster Computing-The Journal of Networks Software Tools and Applicati is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units269
Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm208
Quantification and analysis of performance fluctuation in distributed file system203
SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN177
A Spark-based high utility itemset mining with multiple external utilities106
Design and implementation of dynamic I/O control scheme for large scale distributed file systems99
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study94
Design of distributed network intrusion prevention system based on Spark and P2DR models82
Retraction Note: An effiecient human tracking system using Haar-like and hog feature extraction81
Retraction Note: Improved image compression using effective lossless compression technique81
A multi-illusive voids approach for increasing base station anonymity78
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things77
Secure electronic medical records sharing scheme based on blockchain and quantum key76
An adaptive hybrid differential Grey Wolf Optimization algorithm for WSN coverage75
Examining deep learning’s capability to spot code smells: a systematic literature review73
Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies73
An efficient framework to combat multidimensionality in multi-criteria recommender systems72
Victoria Amazonica optimization algorithm based on adaptive mutation factor and mathematical distribution for solving minimum spanning tree problem72
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid71
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis69
DNA sequences design under many objective evolutionary algorithm65
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting64
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization63
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network61
A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study60
ROI-based optimized image watermarking with real-time authentication55
Stellar oscillation optimizer: a nature-inspired metaheuristic optimization algorithm54
Confidentiality, integrity, and non-repudiation of automobile event data: a TEE-based secure transmission scheme between automobile and cloud54
Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management52
Privacy preserving spatio-temporal attribute-based encryption for cloud applications52
A survey on privacy-preserving federated learning against poisoning attacks50
A cost-efficient scheduling algorithm for streaming processing applications on cloud48
Energy-efficient edge deployment of generative AI models using federated learning47
Combining evolutionary and swarm algorithms in a hybrid subspace-wise search strategy for feature selection47
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks46
DLBW: an end-to-end multi-task adaptive gradient balancing method46
Deep learning fusion for effective malware detection: leveraging visual features46
Data breaches in healthcare: security mechanisms for attack mitigation45
Quantitative and qualitative similarity measure for data clustering analysis43
Real-time progressive compression method of massive data based on improved clustering algorithm42
Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling42
Improving virtualization and migration in combinatorial dynamic mapping for cloud services42
A JAYA algorithm based on normal clouds for DNA sequence optimization42
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks42
Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach41
An energy-efficient black widow-based adaptive VM placement approach for cloud computing40
EEG-based emotion recognition model using fuzzy adjacency matrix combined with convolutional multi-head graph attention mechanism40
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting40
Human activity recognition in cyber-physical systems using optimized machine learning techniques39
SFE-EANDS: a simple, fast, and efficient algorithm with external archive and normalized distance-based selection for high-dimensional feature selection38
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme38
Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions38
Optimizing feature selection in imbalanced intrusion detection system using hybrid metaheuristics algorithms for wireless sensor networks37
FedDC: a federated learning framework to enhance gradient diversity and mitigate conflicts37
Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems37
ISDA-BAN: interoperability and security based data authentication scheme for body area network36
Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms36
Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure36
Using advanced data structures to enable responsive security monitoring36
Quantifying the impact of data replication on error propagation35
Retraction Note: Enhanced trust based encroachment discovery system for Mobile Ad-hoc networks35
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis35
Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition35
Retraction Note: Design and implementation of intelligent manufacturing project management system based on bill of material34
Natural language why-question answering system in business intelligence context34
Retraction Note: Development trend of sharing economy in big data era based on duplication dynamic evolution game theory33
A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms33
Retraction Note: Interior design and pattern innovation design study based on generic algorithm logistics information33
Netostat: analyzing dynamic flow patterns in high-speed networks32
Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems32
Intelligent monitoring system for environmental protection during the construction period of pumped storage power station32
Design and development of an intelligent transportation management system using blockchain and smart contracts32
Recent metaheuristic algorithms for multi-objective feature selection: review, applications, open issues and challenges31
An energy-aware module placement strategy in fog-based healthcare monitoring systems31
Traffic flow forecasting based on dynamic graph convolution and triplet attention31
Two-stage hierarchical evolutionary algorithm based on multi-population for multi-objective distributed heterogeneous welding flow shop scheduling31
CLARA: clustered learning automata-based routing algorithm for efficient FANET communication30
BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm30
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems30
Learned image compression with CNN-LocalMamba architectures and multi-context entropy model30
MTV-SCA: multi-trial vector-based sine cosine algorithm30
Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment30
Digital Twin technology for multimodal-based smart mobility using hybrid Co-ABC optimization based deep CNN30
Enhanced zebra optimization algorithm for reliability redundancy allocation and engineering optimization problems30
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset30
Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization30
Dynamic object removal by fusing deep learning and multiview geometry29
Federated learning for energy constrained devices: a systematic mapping study29
Game-theoretic cloud assistance strategies of end-edge-cloud systems for mitigating edge distributed denial of service attacks29
LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing29
Improving fault tolerance in LinuX container-based distributed systems using blockchain28
Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure28
Retraction Note: Continuous user authentication based score level fusion with hybrid optimization27
Single-tag and multi-tag RFID data cleaning approach in edge computing27
A thermal-aware energy-efficient virtual machine placement algorithm based on fuzzy controlled binary gravitational search algorithm (FC-BGSA)27
Retraction Note: Research on the selection model of technology-based intellectual property evaluation method based on analytic hierarchy process27
Formulating a quality model for cloud-native software architectures: conceptual and methodological considerations27
A smart contract-driven access control scheme with integrity checking for electronic health records27
Anomaly detection framework for IoT-enabled appliances using machine learning27
Retraction Note: A novel scheme for safeguarding confidentiality in public clouds for service users of cloud computing27
Retraction Note: Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring26
A novel revocation management for distributed environment: a detailed study26
Retraction Note: Optimal route selection in MANET based on particle swarm optimization utilizing expected transmission count26
High-performance reliable network-multicast over a trial deployment25
An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing25
Retraction Note: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm25
An analytical model of a cluster-based service system with application to a cloud environment25
Multi-scale attention graph convolutional recurrent network for traffic forecasting25
A near-optimal & load balanced resilient system design for high-performance computing platform25
Group intrusion detection in the Internet of Things using a hybrid recurrent neural network25
Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring24
Generalized asset fairness mechanism for multi-resource fair allocation mechanism with two different types of resources24
Federated learning for secure and efficient vehicular communications in open RAN24
CIS feature selection based dynamic ensemble selection model for human stress detection from EEG signals24
A blockchain-based framework for Academic Bank of Credit with transparent credit mobility24
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era24
Transfer learning method based on cluster for drifting data stream classification23
Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning23
Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors23
Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services23
Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm23
Community detection in attributed networks using neighborhood information23
Quantum-PSO based unsupervised clustering of users in social networks using attributes23
A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system23
Effectiveness of machine learning based android malware detectors against adversarial attacks23
P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch23
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.023
Intelligent management of supply chain logistics based on 5g LoT23
Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism22
CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud22
Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning22
Mitigating voltage fingerprint spoofing attacks on the controller area network bus22
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat21
3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT21
Toward integrating software defined networks with the Internet of Things: a review21
Ethereum smart contracts: a hierarchical analysis of vulnerability challenges and mitigation strategies21
A new binary chaos-based metaheuristic algorithm for software defect prediction21
Improving resource utilization and fault tolerance in large simulations via actors20
A feature-based processing framework for real-time implementation of muscle fatigue measurement20
Detection of road extraction from satellite images with deep learning method20
Banyan tree growth optimization and application20
Self-supervised deep subspace clustering with entropy-norm20
Ameliorating clustered federated learning using real-coded genetic algorithm20
Entity relation joint extraction method for manufacturing industry knowledge data based on improved BERT algorithm20
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices20
Resource optimization in edge and SDN-based edge computing: a comprehensive study20
Enhancing data credibility in 6G-enabled IoT-fog environment using secured blockchain scheme20
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization20
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm19
Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments19
Retraction Note: Research on intelligent city energy management based on internet of things19
Retraction Note: Investigation on application of association rule algorithm in English teaching logistics information19
AI-assisted bio-inspired algorithm for secure IoT communication networks19
Retraction Note: An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology19
Retraction Note: Analysis and study on the key factors of regional tourism development based on discrete differential algorithm19
Dimension selection: an innovative metaheuristic strategy for particle swarm optimization19
CBPNs: coloured behavioural petri nets for model-based diagnosis19
Identity-based proof of retrievability meets with identity-based network coding19
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples18
Advanced memory forensics for malware classification with deep learning algorithms18
Optimizing Client Selection in Federated Learning Base on Genetic Algorithm18
Enhanced unstructured points cloud subdivision applied for parallel Delaunay triangulation18
Parallel mutation testing for large scale systems18
Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities18
The impact of connectivity and software in Ethereum validator performance18
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs18
Federated learning for feature-fusion based requirement classification18
A new multi-population artificial bee algorithm based on global and local optima for numerical optimization18
Network Intrusion Detection System Using Convolutional Neural Networks: NIDS-DL-CNN for IoT Security18
Fog assisted data size reduction based data management system for optimizing resources in medical IoT18
Morphologically reconstructed 2-D histogram with opposition learning based optimization approach for multi-level thresholding18
Password authentication key exchange based on key consensus for IoT security18
Fungible and non-fungible tokens with snapshots in Java18
Visualization of aspect-oriented programs using city transportation metaphor18
Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems17
A container-based workflow for distributed training of deep learning algorithms in HPC clusters17
Timely detection of DDoS attacks in IoT with dimensionality reduction17
Strategic joining and optimal pricing in the hybrid cloud system with risk-sensitive service requests17
Intrusion detection in internet of things-based smart farming using hybrid deep learning framework17
Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology17
A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs17
Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments17
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks17
A hybrid Blockchain-Based framework for securing intrusion detection systems in internet of things17
Shortest node-to-node disjoint paths algorithm for symmetric networks17
Kanfilter: a simple and effective multi-module point cloud denoising model17
MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center17
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning17
Exploring the implementation of federated learning in healthcare: a comprehensive review16
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS16
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain16
Hilbert curves-based location privacy technique for vehicular cloud networks16
Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory16
Blockchain-based public auditing and secure deduplication for copyright data16
Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing16
K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing16
New Spark solutions for distributed frequent itemset and association rule mining algorithms16
Artificial intelligence and information symmetry: a path to mitigate adverse selection16
Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas16
Robust intrusion detection for unmanned aerial vehicles: a PCA-based feature extraction and ensemble learning approach16
Improved gossip protocol for blockchain applications16
Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS16
Fast-CFLB: a privacy-preserving data sharing system for Internet of Vehicles using ternary federated learning and blockchain16
Hybrid modified particle swarm optimization with genetic algorithm (GA) based workflow scheduling in cloud-fog environment for multi-objective optimization16
A new fast multiple color image encryption algorithm16
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things15
Indoor objects detection system implementation using multi-graphic processing units15
Latency aware graph-based microservice placement in the edge-cloud continuum15
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification15
Blockchain and deep learning for improving impenetrable data passage in the IoT-imbued healthcare system15
Divine Religions Algorithm: a novel social-inspired metaheuristic algorithm for engineering and continuous optimization problems15
A quantum inspired hybrid SSA–GWO algorithm for SLA based task scheduling to improve QoS parameter in cloud computing15
HPTCollector: high-performance telemetry collector15
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks15
BigRC-EML: big-data based ransomware classification using ensemble machine learning15
Improved Harris Hawks optimization for global optimization and engineering design15
Retraction Note: Edge detection of satellite image using fuzzy logic15
An adaptive vulture based deep belief mechanism for searching user's resources in mobile P2P environment15
An autonomous blockchain-based workflow execution broker for e-science15
Hybrid metaheuristic schemes with different configurations and feedback mechanisms for optimal clustering applications15
eXtreme Federated Learning (XFL): a layer-wise approach15
Enhancing collaborative detection of cyberbullying behavior in Twitter data15
Estimation of execution time for computing tasks14
Predictive analysis-based load balancing and fault tolerance in fog computing environment14
Blockchain for IoV in 6G environment: review solutions and challenges14
Optimizing service function chaining and scheduling with deep Q-learning for enhanced quality of experience in edge networks14
Simulating multi-agent-based computation offloading for autonomous cars14
F-EVM: improving routing in Internet of Things using fuzzy MAIRCA approach and fuzzy eigenvector method14
IoT data management for caching performance improvement in NDN14
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks14
Improved clustering-based hybrid recommendation system to offer personalized cloud services14
ARIR: an intent recognition-based approach for API recommendation14
A multi-strategy improved dung beetle optimisation algorithm and its application14
An efficient quantum oblivious transfer protocol14
A scalable blockchain storage scheme for VANET14
A novel CNN-enhanced detection and mitigation of DDoS attacks in SDN14
Enhancing the security of IOT enabled systems using light weight hybrid cryptography models14
Target positioning method based on B-spline level set and GC Yolo-v314
Elevating manufacturing excellence with multilevel optimization in smart factory cloud computing using hybrid model14
Adaptive parallel applications: from shared memory architectures to fog computing (2002–2022)14
Enhancing disaster readiness: a comprehensive review of IoT-enabled WSN path planning for effective emergency response14
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach14
Reinforcement learning based task offloading of IoT applications in fog computing: algorithms and optimization techniques14
Multi-stage BiLinear self-attention network for multi-sensor industrial time series classification14
Task scheduling in the internet of things: challenges, solutions, and future trends14
Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique13
An efficient improved quasi-random fractal search for hyperparameter optimization: case study with lung disease classification13
Reversible encryption and lossless data hiding for medical imaging aiding smart health care13
FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare13
Retraction Note: A novel semi supervised learning algorithm for thyroid and ulcer classification in tongue image13
0.09297513961792