Concurrency and Computation-Practice & Experience

Papers
(The median citation count of Concurrency and Computation-Practice & Experience is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
An Android API Recommendation Approach Based on API Dependency Paths Learning115
Modified Cryptosystem‐Based Authentication Protocol for Internet of Things in Fog Networks75
A modified graywolf‐basedchameleon swarm algorithm for minimizing energy consumption and enabling secure communication in wireless sensor network62
Issue Information52
Issue Information50
Issue Information50
Issue Information49
A smart access control mechanism based on user preference in online social networks45
Blockchain based integrity assurance framework for COVID‐19 information management & decision making at National Command Operation Center, Pakistan45
Opportunistic coding across on‐route dominating nodes in a flow‐orientedSDNenabledWSN44
Elderly Hajj pilgrims activity recognition based on candidate classification technique43
Issue Information41
Issue Information41
A new parallel tabu search algorithm for the optimization of the maximum vertex weight clique problem40
Cuckoo Search Algorithm With Ensemble Strategy for Continuous Optimization Problems40
Multi‐objective GA to schedule task graphs on heterogeneous voltage frequency islands38
Efficient task scheduling on the cloud using artificial neural network and particle swarm optimization38
An efficient machine learning based ventricular late potential detection and classification technique for cardiac healthcare36
BAC: A block alliance consensus mechanism for the mine consortium blockchain35
Quantum Computer Architecture for Quantum Error Correction With Distributing Process to Multiple Temperature Layers34
Determining approximate solution of partial differential equations using radial basis function model trained with parallel symbiotic organisms search algorithm32
Cascade Ownership Verification Framework Based on Invisible Watermark for Model Copyright Protection32
Issue Information31
Joint optimal beam forming and resource allocation in intelligent reflecting surface aided wireless power transfer rate splitting multiple access system31
Distributed low‐latency broadcast scheduling for multi‐channel duty‐cycled wireless IoT networks31
Enhancing CNN‐LSTM neural networks using jellyfish search algorithm for pandemic modeling30
A fuzzy model for generalized transportation problems in China30
A Comprehensive Review of Machine Learning Applications for Advancing Reliability and Safety: A Multi‐Method Survey of Models and Techniques29
Post‐quantum secure two‐party computing protocols against malicious adversaries29
FPHO: Fractional Pelican Hawks optimization based container consolidation in CaaS cloud29
Blue Waters system and component reliability29
A Comparative Analysis on the Services Offered by Amazon Web Services and Microsoft Azure28
Performance evaluation of accessibility checker tool for educational websites28
Application of Decision Tree Mining Algorithm Based on Information Entropy in Intelligent Power Marketing28
Issue Information27
Automated Classification of Skin Diseases Using Microscopic Images: A Machine Learning Approach27
Optimizing Node‐Level Data Access Time Using Cluster‐Based Deep Reinforcement Learning Models27
Privacy Protection During the Issuance and Revocation of Verifiable Credentials in Self‐Sovereign Identity26
Stacked ensemble modeling for improved tuberculosis treatment outcome prediction in pediatric cases26
LGRDet: A Light Object Detection Network for Gesture Recognition25
Accelerating Healthcare Data Access: A Blockchain and Decentralized Indexing Approach25
Differential privacy: Review of improving utility through cryptography‐based technologies24
A cloud service recommendation method based on extended multi‐source information fusion24
A Novel Adaptive Graph Neural Network Based on Meta‐Learning for Cross‐Domain Few‐Shot Learning24
A feed forward deep neural network model using feature selection for cloud intrusion detection system24
DWTYOLO : Wavelet‐Based Detection to Enhance Sensor Resolution for Small Targets23
Exploring human behavior patterns and socio‐demographic factors based on American Time Use Survey23
Shuffled shepherd political optimization‐based deep learning method for credit card fraud detection23
Updated delegated proof of stake and Nash equilibrium: A mining pool game model for blockchain network22
Improving the efficiency of graph algorithm executions on high‐performance computing22
Extreme learning with projection relational algebraic secured data transmission for big cloud data22
A review on optimization techniques for medical image analysis22
OCTRA‐5G: Osmotic computing based task scheduling and resource allocation framework for 5G21
Novel segmentation and classification algorithm for detection of tomato leaf disease21
21
Stackedmulti‐layersecurity for Hadoop distributed file system usingHSCTsteganography21
Multi‐objective Firefly algorithm combining logistic mapping and Cauchy mutation21
DRRMDPF : A Queue Management Strategy Based on Dynamic Resource Allocation and Markov Decision Process in Named Dat21
Non‐orthogonal multiple access‐based task processing and energy optimization in vehicular edge computing networks21
Entropy and improved k‐nearest neighbor search based under‐sampling (ENU) method to handle class overlap in imbalanced datasets21
ONOS Flood Defender: A Real‐Time Flood Attacks Detection and Mitigation System in SDN Networks21
Towards a robust scale‐free network in internet of health things against multiple attacks using an inter‐core based reconnection strategy21
Reactive power control of hybrid systems using improved coyote optimizer20
The role of image interpolation in pansharpening20
A Multidimensional Virtual Resource Allocation Framework With Energy‐Aware Physical Resource Mapping for Green Cloud Computing20
Structure‐Aware Representation Learning for Effective Performance Prediction20
Effective Cluster Head and Routing Scheme Estimation Using Mixed Attention‐Based Drift Enabled Federated Deep Reinforcement Learning in Wireless Sensor Networks19
Retraction19
NLSP: A novel lattice‐based secure primitive for privacy‐preserving smart grid communications19
Dynamic Job Scheduling for Energy Savings in YARN: A Comparative Study With Benchmark Workloads19
Power‐efficient optimized clustering method with intelligent fog computing for wireless sensor networks19
Object‐aware deep feature extraction for feature matching19
The Hawai`i Groundwater Recharge Tool19
Handoff performance analysis of PMIPv6‐based distributed mobility management protocol‐urban scenario19
Processing‐in‐memory based multilateration localization in wireless sensor networks using memristor crossbar arrays19
An intelligent signboard to assign the speed limit on ways using ANN18
PKD‐Net: Distillation of prior knowledge for image completion by multi‐level semantic attention18
Enhancing Edge Environment Scalability: Leveraging Kubernetes for Container Orchestration and Optimization18
PB3Opt: Profile‐based biased Bayesian optimization to select computing clusters on the cloud18
18
Multilayer privacy‐preserving model for security and privacy access control in edge computing18
An efficient fault tolerance scheme based enhanced firefly optimization for virtual machine placement in cloud computing18
18
A novel approach to QoS‐aware resource allocation in NOMA cellular HetNets using multi‐layer optimization18
Improving the accessibility of NUMA‐aware C++ application development based on the PGASUS framework18
Accelerating deep learning inference via layer truncation and transfer learning for fingerprint classification18
Discrete Bimodal Normal Distribution: Theory and Applications to Discrete Failure Lifetime and Count Data17
SDT‐MCS: Topology‐Aware Microservice Orchestration With Adaptive Learning in Cloud‐Edge Environments17
An Algorithm for Matching in a (3,3)‐Hypergraph With One‐Sided Preferences Having Quadratic Unpopularity Factor17
PMS‐LoFTR: A Model for Cattle Identification Based on Image Matching17
Portable PGAS ‐Based GPU ‐Accelerated Branch‐And‐Bound Algorithms at Scale17
Cloud Elasticity of Microservices‐Based Applications: A Survey17
Migration Using Context Cache for Multicore RISC‐V Processor17
Key Sequences based on Cyclic Elliptic Curves over GF(28) with Logistic Map for Cryptographic Applications16
FBO‐RNN: Fuzzy butterfly optimization‐basedRNN‐LSTMfor extracting sentiments from Twitter Emoji database16
Bitcoin price prediction using optimized multiplicative long short term memory with attention mechanism using modified cuckoo search optimization16
Community detection by influential nodes based on random walk distance16
Multi‐Robot Path Planning Based on Lens Imaging Reverse Learning Harris Hawk Algorithm in Dynamic Environment16
The blockchain conundrum: An in‐depth examination of challenges, contributing technologies, and alternatives16
Identification of influential vertices in complex networks: A hitting time‐based approach16
Online streaming feature selection for multigranularity hierarchical classification learning16
Improved Byzantine fault tolerance with fast consensus16
A location‐aware physical unclonable function and Chebyshev map‐based mutual authentication mechanism for internet of surveillance drones16
Contention Based Single‐Server Queuing Model for Efficient Data Transmission in VANETs Using Stochastic Process15
Research and Analysis of Fixed Time Positioning Algorithm Based on Local Azimuth Measurement15
Online feature selection for hierarchical classification learning based on improved ReliefF15
Object pose estimation based on stereo vision with improvedK‐DtreeICPalgorithm15
Network traffic classification based‐ masked language regression model using CNN15
Optimizing computational costs of Spark for SARS‐CoV‐2 sequences comparisons on a commercial cloud15
Secure paths based trustworthy fault‐tolerant routing in data center networks15
Explainable AI for DBA: Bridging the DBA's experience and machine learning in tuning database systems15
HIM‐PyraNet: Hierarchical Attention and Region‐Focused Lightweight Network for Micro‐Expression Recognition15
Transaction Spatio‐Temporal Distribution for Permissioned Blockchain Performance Profiling15
Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system14
A negotiation framework for the cloud using rough set theory‐based preference prediction14
Unveiling the Invisible: Powering Security Threat Detection in WSN With AI14
Retraction14
Artificial neural network‐driven federated learning for heart stroke prediction in healthcare 4.0 underlying 5G14
A generation of synthesized trajectories of free moving objects for testing a set of continuous spatio‐temporal queries14
Special Issue on International Conference on Innovations in Intelligent Systems and Applications (INISTA 2021)14
Secuyolo: Secure Object Detection Framework With Darknet‐53 and CBAM in Edge Devices14
The dummy‐based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles14
Enhancing Wildfire Preparedness and Response: A Drone Network‐Based Early Warning System for Bushfires14
DONUTS: An efficient method for checkpointing in non‐volatile memories14
An intelligent MAC protocol for mission critical applications in wireless sensor networks14
Blockchain‐based certificateless public auditing with privacy‐preserving for cloud‐based cyber‐physical systems14
Seismic P‐wave first‐arrival picking model based on EQK‐IncResNet13
Blockchain‐based transparent and certificateless data integrity auditing for cloud storage13
Whale social optimization driven deep recurrent neural network for loan eligibility prediction13
Survey on compressed sensing reconstruction method for3Ddata13
Novel hawk swarm‐optimized deep learning classification with K‐nearest neighbor based decision making for autonomous vehicle movement controller13
A Distributed Parallel Network Intrusion Detection System Based on Ray Framework With GPU Acceleration13
Correction to Parallel Symmetric Appearance‐Motion Framework with Diffusion and Refinement Blocks for Video Anomaly Detection System13
13
PointerChain : A Quantum Enabled Dual‐Layer Blockchain PHR Sharding Model13
ERL‐RTDETR: A Lightweight Transformer‐Based Framework for High‐Accuracy Apple Disease Detection in Precision Agriculture13
Classification of stochastic processes with topological data analysis13
Edge intelligence‐enabled cyber‐physical systems13
Low‐Light Image Enhancement Algorithm Based on Improved MSRCP With Chromaticity Preservation13
A holistic evaluation methodology for configuring production data centers13
A Robust Watermarking for Camera‐Captured Images Using Few‐Shot Learning and Simulated Noise Layer13
An efficient hand gesture recognition based on optimal deep embedded hybrid convolutional neural network‐long short term memory network model13
Modality aware contrastive learning for multimodal human activity recognition13
Hybrid optimization based learning technique for multi‐disease analytics from healthcare big data using optimal pre‐processing, clustering and classifier13
Deep Learning–Based Sentiment and Topic Analysis of Turkish Football Fans on X Platform13
Issue Information13
Analysis of automated guided vehicle use in health care by simulation: A case study in a university hospital13
Fair XIDS: Ensuring fairness and transparency in intrusion detection models13
Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks13
Secure lightweight multi‐party key agreement based on hyperelliptic curve Diffie–Hellman for constraint networks13
Human activity recognition based on integration of multilayer information of convolutional neural network architecture13
Algebraic Connectivity Maximizing Regular Graphs: Special Case Analysis and Depth‐First Search13
TAFLE: Task‐Aware Flow Scheduling in Spine‐Leaf Network via Hierarchical Auto‐Associative Polynomial Reg Net12
Interactive C++ code development using C++Explorer and GitHub classroom for educational purposes12
Controlling energy aware clustering and multihop routing protocol for IoT assisted wireless sensor networks12
Neighbor cleaning learning based cost‐sensitive ensemble learning approach for software defect prediction12
Enhanced routing using recurrent neural networks in software defined‐data center network12
Privacy‐Secure Asynchronous Federated Multimodal Pedestrian Trajectory Prediction Models12
LoHDP: Adaptive local differential privacy for high‐dimensional data publishing12
Visualization of profiling and tracing in CPU‐GPU programs12
A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era12
12
Secure personal authentication in fog devices via multimodal rank‐level fusion12
Workflow aware analytical model to predict performance and cost of serverless execution12
GSRC2N: Graph Feature Extracted Spar‐Raven Optimized CNN Based Crypto Mining Framework12
Improving automated Turkish text classification with learning‐based algorithms11
Retraction11
Quasi‐identifier recognition with echo chamber optimization‐based anonymization for privacy preservation of cloud storage11
Implementation and evaluation of two parallel computational models for the simulation of a long‐haul DWDM system limited by FWM11
Issue Information11
CFISRO : Cross‐Modal Feature Interaction and Similarity Ranking Optimization for Image‐Text Retrieval11
Noise‐robust neural networks for medical image segmentation by dual‐strategy sample selection11
A Multi‐Objective Decision‐Making Neural Network: Effective Structure and Learning Method11
An efficient front‐to‐back depth‐buffer algorithm for real‐time rendering of partially occluded game objects in absence of GPU11
Creating orthophotos with unmanned aerial vehicles and examining its accuracy and usability in geodetic applications11
Networking in next generation disaggregated datacenters11
Multilevel security for medical image using heterogeneous chaotic map and deoxyribonucleic acid sequence operations11
Modified generalized confidence interval for the stress‐strength reliability from exponentiated Weibull distribution11
Generating Robotic Control Strategies With LLMs : Via Human–Robot Voice Interaction11
TPST: A Traffic Flow Prediction Model Based on Spatial–Temporal Identity11
Security Defense Strategy for Dispersed Computing Based on Backward Mean Field Games11
Context‐Aware Prompt Engineering for Large Language Models in Autonomous Vehicles11
HRCUNet: Hierarchical Region Contrastive Learning for Segmentation of Breast Tumors in DCEMRI11
Issue Information11
On the security of fully homomorphic encryption for data privacy in Internet of Things11
Medical concept integrated residual short‐long temporal convolutional networks for predicting clinical events11
Multi‐Strategy Fusion Binary Zebra Optimization Algorithm for Solving Complex Industrial Process Data Feature Selection and Prediction Models11
Object detection and estimation: A hybrid image segmentation technique using convolutional neural network model11
Privacy‐Preserving Real‐Time Smart Grid Topology Analysis: A Graph Neural Networks Approach11
Issue Information11
11
Issue Information11
Issue Information11
Detection of zero‐day attacks in computer networks using combined classification11
A novel optimized intelligent green signal timing system for urban corridor11
MetaLP‐DGI: Meta‐Learning‐Based Link Prediction With Centrality‐Aware Deep Graph Infomax Embeddings11
Learning multi‐organ and tumor segmentation from partially labeled datasets by a conditional dynamic attention network11
Early experiences on the OLCF Frontier system with AthenaPK and Parthenon‐Hydro11
A hybrid HXPLS‐TMFCC parameterization and DCNN‐SFO clustering based speaker diarization system11
Correction to “Secure Data Authentication for Remotely Stored Data Using Bilinear Pairing on Elliptic Curves With Optimized Data Block Size”11
Detection and categorization of acute intracranial hemorrhage subtypes using a multilayer DenseNet‐ResNet architecture with improved random forest classifier10
On the improved generalized linear model‐based monitoring methods for Poisson distributed processes10
A Quantum‐Inspired Source‐Distributed Opportunistic Routing Protocol for Reliable Routing in Underwater Wireless Sensor Networks10
Provably secure lightweight certificateless lattice‐based authenticated key exchange scheme for IIoT10
COVID‐19: Machine learning for safe transportation10
AWC‐NIDS: Attack‐wise customized network intrusion detection system using machine learning, concurrency, and distributed systems10
A Multi‐Strategy Fusion for Mobile Robot Path Planning via Dung Beetle Optimization10
Machine learning and IoT‐based model for patient monitoring and early prediction of diabetes10
Diverse and styled image captioning using singular value decomposition‐based mixture of recurrent experts10
Internet of medical things‐based multitiered and hybrid architectural framework for effective heart disease prediction model10
Adaptive Parallelization Based on Frame‐Level and Tile‐Level Parallelisms for VVC Encoding10
Extended particle swarm optimization for feature selection of high‐dimensional biomedical data10
A bartering double auction resource allocation model in cloud environments10
A multi‐queue priority‐based task scheduling algorithm in fog computing environment10
Hybrid deep‐Q Elman neural network for crop prediction and recommendation based on environmental changes10
Research on frequency band sparse optimization algorithm in health index of rolling bearing10
Multi‐Criteria Optimization of Scientific Workflow Schedules for Improved Energy Efficiency in Cloud Infrastructures10
Parallel aeroacoustic computation of unsteady transonic weapon bay using detached‐eddy simulation via open computational fluid dynamics source codes10
Feature selection‐integrated classifier optimisation algorithm for network intrusion detection10
A taxonomy and survey of big data in social media10
Intrusion Detection System in IoT 5G Networks Based on LSSVM and Harmony Search Optimization10
Improving cancer prediction using feature selection in spark environment10
Comparing Machine Learning Models for Short‐Term U.S. Treasury Yield Forecasting10
Performance assessment of ensembles of in situ workflows under resource constraints10
Multi‐User Boolean Keyword Searchable Encryption With Fine‐Grained Access Control for Cloud Storage10
DMoiSDN: A defensive mechanism of object integrity for SDN10
EEG‐Based Epilepsy Recognition via Federated Learning With Differential Privacy10
Toward a reference architecture based science gateway framework with embedded e‐learning support10
Smart bin: Waste segregation system using deep learning‐Internet of Things for sustainable smart cities10
Real‐time prediction of horizontal drilling pressure based on convolutional Transformer10
A Secure and Communication‐Efficient Federated Recommendation Method With Blockchain10
9
An Innovative Performance Assessment Method for Increasing the Efficiency of AODV Routing Protocol in VANETs Through Colored Timed Petri Nets9
Comparative parotid gland segmentation by using ResNet‐18 and MobileNetV2 based DeepLab v3+ architectures from magnetic resonance images9
Object detection and multi‐object tracking based on optimized deep convolutional neural network and unscented Kalman filtering9
Transparent subsidized agri‐product distribution during pandemics with reputation based PoA blockchain9
Time‐based DDoS attack detection through hybrid LSTM‐CNN model architectures: An investigation of many‐to‐one and many‐to‐many approaches9
9
Short‐Term Power Load Prediction Based on Cluster Analysis and Temporal Convolutional Networks of Attention Mechanism9
Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems9
Combining bidirectional long short‐term memory and self‐attention mechanism for code search9
AMter: An end‐to‐end model for transcriptional terminators prediction by extracting semantic feature automatically based on attention mechanism9
DLDC: Deep learning‐based deadline constrained load balancing technique9
Intrusion detection framework using stacked auto encoder based deep neural network in IOT network9
Secure reputation and morphism‐based offloading scheme: A veritable tool for multi‐party computation in Industrial Internet of Things9
An automation query expansion strategy for information retrieval by using fuzzy based grasshopper optimization algorithm on medical datasets9
Multi‐task deep neural networks for just‐in‐time software defect prediction on mobile apps9
Analysis and Fuzzy Neural Networks‐Based Inertia Coefficient Adjustment Strategy of Power Converters9
Evaluating the potential of disaggregated memory systems for HPC applications9
Vupsi: Verifiable Unbalanced Private Set Intersection Based on Homomorphic Encryption9
0.079687833786011