Journal of Cloud Computing-Advances Systems and Applications

Papers
(The median citation count of Journal of Cloud Computing-Advances Systems and Applications is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
UDL: a cloud task scheduling framework based on multiple deep neural networks521
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns124
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments103
Cloud based evaluation of databases for stock market data95
Adaptive heuristic edge assisted fog computing design for healthcare data optimization76
Efficiency and optimization of government service resource allocation in a cloud computing environment69
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet63
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations62
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.062
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems60
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning59
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure58
HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning58
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach57
Intelligent urbanism with artificial intelligence in shaping tomorrow’s smart cities: current developments, trends, and future directions48
Smart and efficient EV charging navigation scheme in vehicular edge computing networks48
Dependency-aware online task offloading based on deep reinforcement learning for IoV48
Optimal urban competitiveness assessment using cloud computing and neural network45
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm45
A multi-strategy ontology mapping method based on cost-sensitive SVM44
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times44
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment42
Identity-based remote data checking with a designated verifier41
The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things41
BGFL: a blockchain-enabled group federated learning at wireless industrial edges39
Serverless computing: a security perspective39
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm39
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing39
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing38
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds38
Voice spoofing countermeasure for voice replay attacks using deep learning37
Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis37
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning36
Edge-cloud computing cooperation detection of dust concentration for risk warning research36
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario34
Perception of premium services based on the evolution of hyper-service network in mobile edge computing34
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform33
Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems32
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing32
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture32
Automated visual quality assessment for virtual and augmented reality based digital twins31
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency30
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning30
Admission control policy and key agreement based on anonymous identity in cloud computing29
Stateless Q-learning algorithm for service caching in resource constrained edge environment29
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records29
Cloud-based blockchain technology to identify counterfeits29
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT28
NuWa: off-state tolerant backscattering system with uncontrolled excitation traffics27
A new method of dynamic network security analysis based on dynamic uncertain causality graph27
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism26
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing25
Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing24
Privacy-preserving federated learning based on partial low-quality data24
Optimizing energy task offloading technique using IoMT cloud in healthcare applications24
Efficient and scalable patients clustering based on medical big data in cloud platform24
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments24
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos24
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing23
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing23
Fog computing application of cyber-physical models of IoT devices with symbolic approximation algorithms22
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting22
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces22
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing22
A cloud-edge collaborative task scheduling method based on model segmentation22
Task grouping and optimized deep learning based VM sizing for hosting containers as a service21
Tourism cloud management system: the impact of smart tourism21
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost20
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories20
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure20
Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model20
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT19
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps19
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications19
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform19
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types19
Traffic prediction for diverse edge IoT data using graph network19
An ECC-based mutual data access control protocol for next-generation public cloud19
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment19
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions18
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure18
Energy-efficient allocation for multiple tasks in mobile edge computing18
Lightweight similarity checking for English literatures in mobile edge computing18
Enhanced security using multiple paths routine scheme in cloud-MANETs18
Virtual machine placement in energy aware load balancer using fog classifier18
Security issues of news data dissemination in internet environment17
A new dynamic security defense system based on TCP_REPAIR and deep learning17
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities17
A big data study of language use and impact in radio broadcasting in China17
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing17
AI-empowered game architecture and application for resource provision and scheduling in multi-clouds17
Software architecture for pervasive critical health monitoring system using fog computing17
An energy-conscious scheduling framework for serverless edge computing in IoT16
A multi-dimensional extensible cloud-native service stack for enterprises16
Recognizing online video genres using ensemble deep convolutional learning for digital media service management16
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications16
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection16
Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning16
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures15
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing15
Efficient 3D object recognition in mobile edge environment15
Server deployment strategies considering robustness and resource constraints in edge computing15
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database15
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree15
Cross-chain asset trading scheme for notaries based on edge cloud storage15
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review15
CG-PBFT: an efficient PBFT algorithm based on credit grouping15
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments14
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities14
Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation14
Cloud-based multiclass anomaly detection and categorization using ensemble learning14
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing14
A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function14
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing14
A novel virtual machine placement algorithm based on grey wolf optimization14
HVS-inspired adversarial image generation with high perceptual quality14
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment14
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system14
FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings14
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive13
Joint DNN partitioning and task offloading in mobile edge computing via deep reinforcement learning13
A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection13
Explainable AI-based innovative hybrid ensemble model for intrusion detection13
An adaptive routing strategy in P2P-based Edge Cloud13
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching13
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models13
Blockchain enabled zero trust based authentication scheme for railway communication networks13
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future13
Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications13
An enhanced encryption-based security framework in the CPS Cloud13
A bidirectional DNN partition mechanism for efficient pipeline parallel training in cloud13
Scalability resilience framework using application-level fault injection for cloud-based software services13
Edge computing-based digital management system of game events in the era of Internet of Things12
PCL-RC: a parallel cloud resource load prediction model based on feature optimization12
Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users12
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain12
Financial service composition with various privacy levels in multiple cloud environment12
PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing12
Making programmable packet scheduling time-sensitive with a FIFO queue12
An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment12
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition11
ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction11
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns11
A systematic review on effective energy utilization management strategies in cloud data centers11
Economical revenue maximization in mobile edge caching and blockchain enabled space-air-ground integrated networks11
Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm11
OpenIaC: open infrastructure as code - the network is my computer11
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations11
A truthful dynamic combinatorial double auction model for cloud resource allocation11
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks11
A novel vehicular task deployment method in hybrid MEC11
In-depth analysis and open challenges of Mist Computing11
An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities11
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning11
File processing security detection in multi-cloud environments: a process mining approach11
PPO-based deployment and phase control for movable intelligent reflecting surface10
A cloud-edge computing architecture for monitoring protective equipment10
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment10
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network10
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks10
Cloud failure prediction based on traditional machine learning and deep learning10
From data to insights: the application and challenges of knowledge graphs in intelligent audit10
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devices10
Look-ahead energy efficient VM allocation approach for data centers10
A systematic review on blockchain-based access control systems in cloud environment10
Intermediate data fault-tolerant method of cloud computing accounting service platform supporting cost-benefit analysis10
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing9
A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving9
Optimus: association-based dynamic system call filtering for container attack surface reduction9
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes9
Adaptive edge-fog healthcare networks: a novel framework for emergency response management9
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)9
SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation9
PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks9
Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring9
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices9
Review on the application of cloud computing in the sports industry9
Blockchain-enhanced security and bayesian trust assessment for secure task scheduling in latency-critical fog computing environments9
Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing8
CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution8
A secure data interaction method based on edge computing8
Building integrated assessment model for IoT technology deployment in the Industry 4.08
QHRMOF: A Quantum-Inspired hybrid Multi-Objective framework for Energy-Efficient task scheduling and load balancing in cloud computing8
A resource scheduling method for cloud data centers based on thermal management8
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach8
Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms8
Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs8
Correction to: A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function8
Cost modelling and optimisation for cloud: a graph-based approach8
Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network8
Secured transmission approach for transportation units with twin creations and artificial intelligence algorithm8
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model8
Improving datacenter utilization through containerized service-based architecture8
Real-time trajectory privacy protection based on improved differential privacy method and deep learning model8
Optimizing Spark job scheduling with distributional deep learning in cloud environments8
Wind power prediction method based on cloud computing and data privacy protection7
An edge server deployment method based on optimal benefit and genetic algorithm7
CLQLMRS: improving cache locality in MapReduce job scheduling using Q-learning7
Simcan2Cloud: a discrete-event-based simulator for modelling and simulating cloud computing infrastructures7
Toward security quantification of serverless computing7
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm7
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications7
Data-intensive workflow scheduling strategy based on deep reinforcement learning in multi-clouds7
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture7
An integrated SDN framework for early detection of DDoS attacks in cloud computing7
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems7
ASOD: an adaptive stream outlier detection method using online strategy7
Multi-Recipient encryption with keyword search without pairing for cloud storage7
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas7
Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management7
A Review of Intelligent Verification System for Distribution Automation Terminal based on Artificial Intelligence Algorithms6
Virtualized intelligent genetic load balancer for federated hybrid cloud environment using deep belief network classifier6
Privacy-aware and Efficient Student Clustering for Sport Training with Hash in Cloud Environment6
Enhancement of damaged-image prediction based on digital twin technology6
MF-GCN-LSTM: a cloud-edge distributed framework for key positions prediction in grid projects6
Graph convolution networks for social media trolls detection use deep feature extraction6
SEFSD: an effective deployment algorithm for fog computing systems6
Innovation strategy design of public sports service governance based on cloud computing6
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud6
Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records6
Multiple objectives dynamic VM placement for application service availability in cloud networks6
Cost-effective land cover classification for remote sensing images6
Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing6
Prediction and diagnosis of cardiovascular disease using cloud and machine learning design6
Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI6
Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach6
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm6
A convolutional neural network based online teaching method using edge-cloud computing platform6
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins6
Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering6
Research on electromagnetic vibration energy harvester for cloud-edge-end collaborative architecture in power grid6
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree6
Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments6
Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework6
Sentence type identification-based product review sentiment analysis using BeDi-DC and Log-Squish CNN6
An accurate management method of public services based on big data and cloud computing6
ArtifactOps and ArtifactDL: a methodology and a language for conceptualizing and operationalising different types of pipelines5
Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation5
SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse5
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption5
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability5
Optimization model for vehicular network data queries in edge environments5
Integration of wearable technology and artificial intelligence in digital health for remote patient care5
Resource allocation strategy for blockchain-enabled NOMA-based MEC networks5
Constrained optimal grouping of cloud application components5
Detection of cotton leaf curl disease’s susceptibility scale level based on deep learning5
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud5
Robust-PAC time-critical workflow offloading in edge-to-cloud continuum among heterogeneous resources5
Mobile computing-enabled health physique evaluation in campus based on amplified hashing5
Cloud-based analysis of aerial imagery for unveiling ancient archaeological patterns5
0.17688417434692