Journal of Cloud Computing-Advances Systems and Applications

Papers
(The median citation count of Journal of Cloud Computing-Advances Systems and Applications is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Sign detection and comparison for wireless sensor data based on subtractive homomorphism and privacy-preserving deep learning model638
A trustworthy cybersecurity model for transparent cyberattack detection using Bald Eagle Search tuned XGBoost and explainable AI183
Adaptive heuristic edge assisted fog computing design for healthcare data optimization140
Topology control for multi-layer LEO networks: towards a reliable space edge-cloud architecture129
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet95
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations94
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments92
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns89
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure77
Cloud based evaluation of databases for stock market data74
Intelligent urbanism with artificial intelligence in shaping tomorrow’s smart cities: current developments, trends, and future directions73
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.071
Efficiency and optimization of government service resource allocation in a cloud computing environment71
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems70
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach69
UDL: a cloud task scheduling framework based on multiple deep neural networks68
Hybrid compression-based routing strategies for enhanced energy efficiency in wireless sensor networks68
Dependency-aware online task offloading based on deep reinforcement learning for IoV67
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning67
HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning61
Style-aware artwork recommendation with cloud-edge collaborative knowledge graphs56
The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things55
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing55
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm54
Optimal urban competitiveness assessment using cloud computing and neural network54
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm54
Serverless computing: a security perspective52
Smart and efficient EV charging navigation scheme in vehicular edge computing networks52
Cloud–edge collaborative AI for symmetry and asymmetry in human motion understanding and collaboration51
A multi-strategy ontology mapping method based on cost-sensitive SVM50
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment50
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform49
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning48
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing48
Edge-cloud computing cooperation detection of dust concentration for risk warning research48
Energy-and-deadline-aware optimal resource management and task consolidation using a hybrid Adaptive Neuro-Fuzzy Inference System with binary Chaotic Jaya optimization for cloud-based systems45
Optimized dynamic resource allocation in quantum networks for secure and efficient wireless communication45
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds45
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture43
A novel satellite application deployment method in Satellite Constellation through Inter-Satellite Links43
Automated visual quality assessment for virtual and augmented reality based digital twins42
Voice spoofing countermeasure for voice replay attacks using deep learning42
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario41
Comparative analysis of cloud-based AI object detection services and YOLO11: performance, cost, and usability evaluation40
Perception of premium services based on the evolution of hyper-service network in mobile edge computing40
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning39
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing39
A framework for the predictive monitoring and data quality assurance in the cloud continuum37
Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis37
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency37
Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems36
BGFL: a blockchain-enabled group federated learning at wireless industrial edges36
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records35
Collaborative smart detectors for edge surveillance in cognitive monitoring systems using Kullback-Leibler divergence35
Stateless Q-learning algorithm for service caching in resource constrained edge environment35
Synergistic cloud-edge intelligence for real-time multimodal entity linking and knowledge retrieval34
Admission control policy and key agreement based on anonymous identity in cloud computing34
FedRAS: a dual-strategy framework for federated learning on heterogeneous devices33
Cloud-based blockchain technology to identify counterfeits33
A new method of dynamic network security analysis based on dynamic uncertain causality graph33
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT32
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism32
Efficient and scalable patients clustering based on medical big data in cloud platform30
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos29
NuWa: off-state tolerant backscattering system with uncontrolled excitation traffics29
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments29
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing29
Privacy-preserving federated learning based on partial low-quality data28
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing28
WSMS: weakly supervised multi-feature steganalysis with EVT calibration for cloud-edge collaborative intelligence28
Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing27
Optimizing energy task offloading technique using IoMT cloud in healthcare applications27
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing27
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting26
A cloud-edge collaborative task scheduling method based on model segmentation26
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces26
Task grouping and optimized deep learning based VM sizing for hosting containers as a service26
Fog computing application of cyber-physical models of IoT devices with symbolic approximation algorithms26
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure25
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost25
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing25
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories25
Tourism cloud management system: the impact of smart tourism25
AI-powered dynamic queue optimization in bursty multi traffic environment24
Energy-efficient allocation for multiple tasks in mobile edge computing24
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT24
Traffic prediction for diverse edge IoT data using graph network24
An access control system for cloud-based healthcare systems driven by blockchain24
Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model24
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps24
A latency-aware cloud–edge architecture for real-time injury risk early warning using wearable and training-load data24
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications24
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types23
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure23
An ECC-based mutual data access control protocol for next-generation public cloud23
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions23
Enhanced security using multiple paths routine scheme in cloud-MANETs23
Seamless transitions: a comprehensive review of live migration technologies23
Virtual machine placement in energy aware load balancer using fog classifier22
Security issues of news data dissemination in internet environment22
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform22
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures22
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment22
AI-empowered game architecture and application for resource provision and scheduling in multi-clouds22
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection21
Cross-chain asset trading scheme for notaries based on edge cloud storage21
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications21
MkRP: multiple k registry placement for fast container deployment on edge computing21
A big data study of language use and impact in radio broadcasting in China21
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database21
Server deployment strategies considering robustness and resource constraints in edge computing20
Adaptive rescaling technique for portable vision devices in IoMT toward swimming workouts training and safety20
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities20
Security-aware computation offloading in internet of vehicles: a multi-agent reinforcement learning algorithm with attention mechanism20
Lightweight similarity checking for English literatures in mobile edge computing20
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing20
Recognizing online video genres using ensemble deep convolutional learning for digital media service management19
Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning19
A multi-dimensional extensible cloud-native service stack for enterprises19
A hybrid metaheuristic federated learning approach based attack detection system for multi-cloud environment19
An energy-conscious scheduling framework for serverless edge computing in IoT19
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing19
Privacy-preserving cloud-based dermatological image processing for medical applications: a review19
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review18
Cross-technology cloud offloading model18
Software architecture for pervasive critical health monitoring system using fog computing18
Efficient 3D object recognition in mobile edge environment18
FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings18
A new dynamic security defense system based on TCP_REPAIR and deep learning18
A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function18
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing18
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system17
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing17
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment17
Hybrid dolphin swarm sparrow search optimization based multi-objective cloud workflow scheduling17
CG-PBFT: an efficient PBFT algorithm based on credit grouping17
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree17
LLM-based cost-aware task scheduling for cloud computing systems16
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments16
A novel virtual machine placement algorithm based on grey wolf optimization16
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities16
Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications16
Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation16
Transformative impact of edge computing with 6G network using cloud computing16
Cloud-based multiclass anomaly detection and categorization using ensemble learning16
A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection15
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future15
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching15
An enhanced encryption-based security framework in the CPS Cloud15
ERecommend: a search scheme for encrypted storage supporting association analysis and active recommendation15
HVS-inspired adversarial image generation with high perceptual quality15
Blockchain enabled zero trust based authentication scheme for railway communication networks15
Joint DNN partitioning and task offloading in mobile edge computing via deep reinforcement learning14
An adaptive routing strategy in P2P-based Edge Cloud14
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models14
Explainable AI-based innovative hybrid ensemble model for intrusion detection14
Making programmable packet scheduling time-sensitive with a FIFO queue14
A bidirectional DNN partition mechanism for efficient pipeline parallel training in cloud14
Dynamic task assignment for edge computing-enabled vehicular mobile crowdsensing14
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain14
ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction13
Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users13
Flexible evaluation method based on personalized evaluation requirements for cloud manufacturing services13
Research study on securing the cloud: utilizing conventional and blockchain-based access control mechanisms13
Kubernetes-aware load balancing for leaf-spine EVPN data centers13
Edge computing-based digital management system of game events in the era of Internet of Things13
PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing13
Enhancing cloud security using attention-based improved RegNet with hybrid vigenere-shift transposition algorithm13
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations13
An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment13
A virtual machine group-oriented TPM system for trusted cloud computing13
Data repair optimization method for geo-distributed fault-tolerant storage systems based on whale optimization algorithm13
In-depth analysis and open challenges of Mist Computing13
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks12
A systematic review on effective energy utilization management strategies in cloud data centers12
OpenIaC: open infrastructure as code - the network is my computer12
Federated edge intelligence for carbon emission forecasting using deep neural networks: a privacy-preserving approach12
Economical revenue maximization in mobile edge caching and blockchain enabled space-air-ground integrated networks12
QoE-driven cloud intelligence for personalized visual art recommendation12
PCL-RC: a parallel cloud resource load prediction model based on feature optimization12
An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities12
Financial service composition with various privacy levels in multiple cloud environment12
A truthful dynamic combinatorial double auction model for cloud resource allocation12
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning12
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition12
An integrated methodology for intrusion detection and mitigation to optimize cloud security12
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns12
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devices11
Feature resonance classifier: a novel neural network for efficient network traffic classification11
A survey of cyber threat intelligence in embedded system driven security for mobile health systems11
A cloud-edge computing architecture for monitoring protective equipment11
Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm11
From data to insights: the application and challenges of knowledge graphs in intelligent audit11
Cloud disaster recovery model based on failure prediction11
Optimizing cloud resource allocation with an integrated XGBoost–RFOA model11
A novel vehicular task deployment method in hybrid MEC11
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment11
Cloud failure prediction based on traditional machine learning and deep learning11
PPO-based deployment and phase control for movable intelligent reflecting surface11
Luminous defense: XAI-driven adaptive security for critical IoT infrastructures11
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network10
Blockchain-enhanced security and bayesian trust assessment for secure task scheduling in latency-critical fog computing environments10
Rate-adaptive RDMA congestion control for AI clusters10
Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring10
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks10
A systematic review on blockchain-based access control systems in cloud environment10
Intermediate data fault-tolerant method of cloud computing accounting service platform supporting cost-benefit analysis10
Matrix protocol: a comprehensive systematic mapping study10
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)10
File processing security detection in multi-cloud environments: a process mining approach10
Optimized tourist point-of-interest recommendation through ARIMA and SVD in edge environment10
A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving10
Optimus: association-based dynamic system call filtering for container attack surface reduction10
PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks9
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes9
SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation9
CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution9
Optimizing Spark job scheduling with distributional deep learning in cloud environments9
Building integrated assessment model for IoT technology deployment in the Industry 4.09
A machine learning technique for optimizing virtual machine placement in data-centres9
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices9
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing9
Cost modelling and optimisation for cloud: a graph-based approach9
Energy-efficient user allocation and cache updating in mobile edge computing networks based on user geographical aggregation9
Real-time trajectory privacy protection based on improved differential privacy method and deep learning model9
Review on the application of cloud computing in the sports industry9
Adaptive edge-fog healthcare networks: a novel framework for emergency response management9
Secured transmission approach for transportation units with twin creations and artificial intelligence algorithm9
A secure data interaction method based on edge computing9
QHRMOF: A Quantum-Inspired hybrid Multi-Objective framework for Energy-Efficient task scheduling and load balancing in cloud computing9
A lightweight blockchain-enabled federated intrusion prevention framework for resource-constrained industrial IoT devices to detect and mitigate emerging cyberattacks9
Wind power prediction method based on cloud computing and data privacy protection8
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications8
An integrated SDN framework for early detection of DDoS attacks in cloud computing8
An edge server deployment method based on optimal benefit and genetic algorithm8
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model8
Correction to: A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function8
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems8
ASOD: an adaptive stream outlier detection method using online strategy8
Data-intensive workflow scheduling strategy based on deep reinforcement learning in multi-clouds8
CLQLMRS: improving cache locality in MapReduce job scheduling using Q-learning8
A resource scheduling method for cloud data centers based on thermal management8
Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing8
Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs8
Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network8
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas8
Simcan2Cloud: a discrete-event-based simulator for modelling and simulating cloud computing infrastructures8
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm8
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach8
Improving datacenter utilization through containerized service-based architecture8
0.16133117675781