Journal of Cloud Computing-Advances Systems and Applications

Papers
(The median citation count of Journal of Cloud Computing-Advances Systems and Applications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet444
UDL: a cloud task scheduling framework based on multiple deep neural networks110
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations92
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns77
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach65
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.064
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning58
Adaptive heuristic edge assisted fog computing design for healthcare data optimization58
Dependency-aware online task offloading based on deep reinforcement learning for IoV53
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments51
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems51
Cloud based evaluation of databases for stock market data49
HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning49
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure49
Intelligent urbanism with artificial intelligence in shaping tomorrow’s smart cities: current developments, trends, and future directions48
Efficiency and optimization of government service resource allocation in a cloud computing environment45
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm42
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times41
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing41
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm38
Optimal urban competitiveness assessment using cloud computing and neural network36
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment36
A multi-strategy ontology mapping method based on cost-sensitive SVM36
Identity-based remote data checking with a designated verifier34
The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things33
Smart and efficient EV charging navigation scheme in vehicular edge computing networks32
Serverless computing: a security perspective31
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario31
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture30
Automated visual quality assessment for virtual and augmented reality based digital twins30
BGFL: a blockchain-enabled group federated learning at wireless industrial edges30
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning30
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning29
Edge-cloud computing cooperation detection of dust concentration for risk warning research29
Correction to: Severity: a QoS-aware approach to cloud application elasticity29
Perception of premium services based on the evolution of hyper-service network in mobile edge computing28
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform28
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds27
Voice spoofing countermeasure for voice replay attacks using deep learning27
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing27
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing27
Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems27
A new method of dynamic network security analysis based on dynamic uncertain causality graph25
Admission control policy and key agreement based on anonymous identity in cloud computing25
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency25
Stateless Q-learning algorithm for service caching in resource constrained edge environment25
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records24
Cloud-based blockchain technology to identify counterfeits23
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism23
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT23
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing22
NuWa: off-state tolerant backscattering system with uncontrolled excitation traffics22
Efficient and scalable patients clustering based on medical big data in cloud platform21
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing21
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos21
Optimizing energy task offloading technique using IoMT cloud in healthcare applications21
Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing21
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing20
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing20
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments20
Privacy-preserving federated learning based on partial low-quality data20
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories19
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces19
Fog computing application of cyber-physical models of IoT devices with symbolic approximation algorithms19
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting19
Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model18
A cloud-edge collaborative task scheduling method based on model segmentation18
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost18
Tourism cloud management system: the impact of smart tourism17
Power flow adjustment for smart microgrid based on edge computing and multi-agent deep reinforcement learning17
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure17
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications16
Task grouping and optimized deep learning based VM sizing for hosting containers as a service16
Traffic prediction for diverse edge IoT data using graph network16
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment15
Enhanced security using multiple paths routine scheme in cloud-MANETs15
Energy-efficient allocation for multiple tasks in mobile edge computing15
An ECC-based mutual data access control protocol for next-generation public cloud15
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure15
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps15
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types14
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database14
A big data study of language use and impact in radio broadcasting in China14
Lightweight similarity checking for English literatures in mobile edge computing14
Security issues of news data dissemination in internet environment14
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform14
Virtual machine placement in energy aware load balancer using fog classifier14
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions14
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities14
AI-empowered game architecture and application for resource provision and scheduling in multi-clouds14
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT14
Server deployment strategies considering robustness and resource constraints in edge computing14
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing14
FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings13
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment13
Cross-chain asset trading scheme for notaries based on edge cloud storage13
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures13
A multi-dimensional extensible cloud-native service stack for enterprises13
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree13
A novel virtual machine placement algorithm based on grey wolf optimization13
Recognizing online video genres using ensemble deep convolutional learning for digital media service management13
Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning13
Software architecture for pervasive critical health monitoring system using fog computing13
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review13
A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function13
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing13
A new dynamic security defense system based on TCP_REPAIR and deep learning13
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications13
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection13
Efficient 3D object recognition in mobile edge environment12
Security-Aware computation offloading for Mobile edge computing-Enabled smart city12
Cloud-based multiclass anomaly detection and categorization using ensemble learning12
Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation12
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities12
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing12
HVS-inspired adversarial image generation with high perceptual quality12
CG-PBFT: an efficient PBFT algorithm based on credit grouping12
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing12
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system12
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments12
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive11
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models11
Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications11
A bidirectional DNN partition mechanism for efficient pipeline parallel training in cloud11
Blockchain enabled zero trust based authentication scheme for railway communication networks11
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future11
Joint DNN partitioning and task offloading in mobile edge computing via deep reinforcement learning11
An enhanced encryption-based security framework in the CPS Cloud11
A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection11
An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities10
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching10
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain10
Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users10
Financial service composition with various privacy levels in multiple cloud environment10
ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction10
An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment10
Explainable AI-based innovative hybrid ensemble model for intrusion detection10
An adaptive routing strategy in P2P-based Edge Cloud10
Edge computing-based digital management system of game events in the era of Internet of Things10
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition10
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations10
Making programmable packet scheduling time-sensitive with a FIFO queue10
Scalability resilience framework using application-level fault injection for cloud-based software services10
PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing10
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns10
Economical revenue maximization in mobile edge caching and blockchain enabled space-air-ground integrated networks9
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks9
PPO-based deployment and phase control for movable intelligent reflecting surface9
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devices9
Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm9
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning9
A systematic review on effective energy utilization management strategies in cloud data centers9
A cloud-edge computing architecture for monitoring protective equipment9
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks9
Welcome to the new Journal of Cloud Computing by Springer9
OpenIaC: open infrastructure as code - the network is my computer9
A truthful dynamic combinatorial double auction model for cloud resource allocation9
In-depth analysis and open challenges of Mist Computing9
Cloud failure prediction based on traditional machine learning and deep learning9
A novel vehicular task deployment method in hybrid MEC9
File processing security detection in multi-cloud environments: a process mining approach9
Optimus: association-based dynamic system call filtering for container attack surface reduction8
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment8
From data to insights: the application and challenges of knowledge graphs in intelligent audit8
SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation8
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing8
Intermediate data fault-tolerant method of cloud computing accounting service platform supporting cost-benefit analysis8
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network8
Review on the application of cloud computing in the sports industry8
Look-ahead energy efficient VM allocation approach for data centers8
A systematic review on blockchain-based access control systems in cloud environment8
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)7
Cost modelling and optimisation for cloud: a graph-based approach7
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach7
Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network7
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices7
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes7
A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving7
Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs7
Improving datacenter utilization through containerized service-based architecture7
PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks7
Correction to: A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function7
Building integrated assessment model for IoT technology deployment in the Industry 4.07
Real-time trajectory privacy protection based on improved differential privacy method and deep learning model7
CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution7
A secure data interaction method based on edge computing7
Data-intensive workflow scheduling strategy based on deep reinforcement learning in multi-clouds6
CLQLMRS: improving cache locality in MapReduce job scheduling using Q-learning6
An integrated SDN framework for early detection of DDoS attacks in cloud computing6
ASOD: an adaptive stream outlier detection method using online strategy6
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas6
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree6
Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments6
MF-GCN-LSTM: a cloud-edge distributed framework for key positions prediction in grid projects6
A resource scheduling method for cloud data centers based on thermal management6
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications6
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm6
Multi-Recipient encryption with keyword search without pairing for cloud storage6
Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing6
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems6
Toward security quantification of serverless computing6
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture6
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model6
An edge server deployment method based on optimal benefit and genetic algorithm6
Wind power prediction method based on cloud computing and data privacy protection6
Simcan2Cloud: a discrete-event-based simulator for modelling and simulating cloud computing infrastructures6
Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI6
Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management6
Prediction and diagnosis of cardiovascular disease using cloud and machine learning design6
LAE-GAN: a novel cloud-based Low-light Attention Enhancement Generative Adversarial Network for unpaired text images5
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud5
Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records5
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm5
Research on electromagnetic vibration energy harvester for cloud-edge-end collaborative architecture in power grid5
Enhancement of damaged-image prediction based on digital twin technology5
SEFSD: an effective deployment algorithm for fog computing systems5
A convolutional neural network based online teaching method using edge-cloud computing platform5
Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin5
Recommend what to cache: a simple self-supervised graph-based recommendation framework for edge caching networks5
Innovation strategy design of public sports service governance based on cloud computing5
Innovative deep learning techniques for monitoring aggressive behavior in social media posts5
Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach5
Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework5
Cost-effective land cover classification for remote sensing images5
Computation offloading technique for energy efficiency of smart devices5
Sentence type identification-based product review sentiment analysis using BeDi-DC and Log-Squish CNN5
Task offloading optimization mechanism based on deep neural network in edge-cloud environment5
DU-Net-Cloud: a smart cloud-edge application with an attention mechanism and U-Net for remote sensing images and processing5
Multiple objectives dynamic VM placement for application service availability in cloud networks5
An accurate management method of public services based on big data and cloud computing5
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing5
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages5
Virtualized intelligent genetic load balancer for federated hybrid cloud environment using deep belief network classifier5
Privacy-aware and Efficient Student Clustering for Sport Training with Hash in Cloud Environment5
Graph convolution networks for social media trolls detection use deep feature extraction5
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins5
Low-rate Denial of Service attack detection method based on time-frequency characteristics5
A Review of Intelligent Verification System for Distribution Automation Terminal based on Artificial Intelligence Algorithms5
The key security management scheme of cloud storage based on blockchain and digital twins5
Energy-efficient virtual machine placement in distributed cloud using NSGA-III algorithm4
Efficient online migration mechanism for memory write-intensive virtual machines4
Load balancing and service discovery using Docker Swarm for microservice based big data applications4
Algorithm selection using edge ML and case-based reasoning4
The least-used key selection method for information retrieval in large-scale Cloud-based service repositories4
A trusted de-swinging k-anonymity scheme for location privacy protection4
Robust-PAC time-critical workflow offloading in edge-to-cloud continuum among heterogeneous resources4
Intelligent code search aids edge software development4
A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems4
Detection of cotton leaf curl disease’s susceptibility scale level based on deep learning4
Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing4
0.036841154098511