Journal of Cloud Computing-Advances Systems and Applications

Papers
(The median citation count of Journal of Cloud Computing-Advances Systems and Applications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
UDL: a cloud task scheduling framework based on multiple deep neural networks465
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations114
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns96
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach80
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments70
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.068
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning64
Adaptive heuristic edge assisted fog computing design for healthcare data optimization61
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure56
HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning55
Cloud based evaluation of databases for stock market data54
Efficiency and optimization of government service resource allocation in a cloud computing environment54
Intelligent urbanism with artificial intelligence in shaping tomorrow’s smart cities: current developments, trends, and future directions52
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems52
Dependency-aware online task offloading based on deep reinforcement learning for IoV51
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet45
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm44
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times43
A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm42
Optimal urban competitiveness assessment using cloud computing and neural network41
A multi-strategy ontology mapping method based on cost-sensitive SVM39
Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing39
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment37
Identity-based remote data checking with a designated verifier37
Smart and efficient EV charging navigation scheme in vehicular edge computing networks36
The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things34
Automated visual quality assessment for virtual and augmented reality based digital twins33
Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario33
Serverless computing: a security perspective33
BGFL: a blockchain-enabled group federated learning at wireless industrial edges32
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning32
Correction to: Severity: a QoS-aware approach to cloud application elasticity32
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing32
Edge-cloud computing cooperation detection of dust concentration for risk warning research32
Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems31
Perception of premium services based on the evolution of hyper-service network in mobile edge computing31
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing30
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency28
Voice spoofing countermeasure for voice replay attacks using deep learning28
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture28
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning28
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform28
Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds27
A new method of dynamic network security analysis based on dynamic uncertain causality graph27
Stateless Q-learning algorithm for service caching in resource constrained edge environment26
Cloud-based blockchain technology to identify counterfeits25
Admission control policy and key agreement based on anonymous identity in cloud computing25
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT24
NuWa: off-state tolerant backscattering system with uncontrolled excitation traffics24
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records24
ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism24
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing23
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing22
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments22
Optimizing energy task offloading technique using IoMT cloud in healthcare applications22
Privacy-preserving federated learning based on partial low-quality data22
Efficient and scalable patients clustering based on medical big data in cloud platform22
Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing21
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing21
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos21
Fog computing application of cyber-physical models of IoT devices with symbolic approximation algorithms20
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories20
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing20
Power flow adjustment for smart microgrid based on edge computing and multi-agent deep reinforcement learning20
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting20
Task grouping and optimized deep learning based VM sizing for hosting containers as a service19
Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model19
A cloud-edge collaborative task scheduling method based on model segmentation19
Tourism cloud management system: the impact of smart tourism18
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost18
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure18
Traffic prediction for diverse edge IoT data using graph network17
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces17
An ECC-based mutual data access control protocol for next-generation public cloud17
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT17
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps17
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications17
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types16
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform16
Energy-efficient allocation for multiple tasks in mobile edge computing16
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment16
A big data study of language use and impact in radio broadcasting in China15
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure15
Virtual machine placement in energy aware load balancer using fog classifier15
Enhanced security using multiple paths routine scheme in cloud-MANETs15
Server deployment strategies considering robustness and resource constraints in edge computing15
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database15
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions15
AI-empowered game architecture and application for resource provision and scheduling in multi-clouds15
Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities14
A new dynamic security defense system based on TCP_REPAIR and deep learning14
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection14
Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree14
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures14
NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing14
Cross-chain asset trading scheme for notaries based on edge cloud storage14
A multi-dimensional extensible cloud-native service stack for enterprises14
Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review14
Recognizing online video genres using ensemble deep convolutional learning for digital media service management14
Lightweight similarity checking for English literatures in mobile edge computing14
Security issues of news data dissemination in internet environment14
Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning14
Software architecture for pervasive critical health monitoring system using fog computing14
Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing14
Cloud-based multiclass anomaly detection and categorization using ensemble learning13
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system13
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment13
Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities13
FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings13
Efficient 3D object recognition in mobile edge environment13
A novel virtual machine placement algorithm based on grey wolf optimization13
Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation13
A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing13
A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function13
CG-PBFT: an efficient PBFT algorithm based on credit grouping13
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments12
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models12
An enhanced encryption-based security framework in the CPS Cloud12
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing12
A bidirectional DNN partition mechanism for efficient pipeline parallel training in cloud12
A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection12
HVS-inspired adversarial image generation with high perceptual quality12
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive12
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future12
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching11
Joint DNN partitioning and task offloading in mobile edge computing via deep reinforcement learning11
An adaptive routing strategy in P2P-based Edge Cloud11
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain11
Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications11
Making programmable packet scheduling time-sensitive with a FIFO queue11
Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users11
Blockchain enabled zero trust based authentication scheme for railway communication networks11
Explainable AI-based innovative hybrid ensemble model for intrusion detection11
Scalability resilience framework using application-level fault injection for cloud-based software services11
PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing11
OpenIaC: open infrastructure as code - the network is my computer10
PCL-RC: a parallel cloud resource load prediction model based on feature optimization10
An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment10
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns10
Intrusion detection in cloud computing based on time series anomalies utilizing machine learning10
ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction10
A truthful dynamic combinatorial double auction model for cloud resource allocation10
Financial service composition with various privacy levels in multiple cloud environment10
An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities10
In-depth analysis and open challenges of Mist Computing10
A systematic review on effective energy utilization management strategies in cloud data centers10
Edge computing-based digital management system of game events in the era of Internet of Things10
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition10
Economical revenue maximization in mobile edge caching and blockchain enabled space-air-ground integrated networks10
PPO-based deployment and phase control for movable intelligent reflecting surface9
A novel vehicular task deployment method in hybrid MEC9
Look-ahead energy efficient VM allocation approach for data centers9
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment9
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks9
File processing security detection in multi-cloud environments: a process mining approach9
Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm9
Intermediate data fault-tolerant method of cloud computing accounting service platform supporting cost-benefit analysis9
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network9
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations9
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devices9
Welcome to the new Journal of Cloud Computing by Springer9
A cloud-edge computing architecture for monitoring protective equipment9
Cloud failure prediction based on traditional machine learning and deep learning8
A systematic review on blockchain-based access control systems in cloud environment8
A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving8
PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks8
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks8
Review on the application of cloud computing in the sports industry8
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)8
Optimus: association-based dynamic system call filtering for container attack surface reduction8
From data to insights: the application and challenges of knowledge graphs in intelligent audit8
SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation8
Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes8
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices8
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing8
Correction to: A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function7
CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution7
Real-time trajectory privacy protection based on improved differential privacy method and deep learning model7
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model7
A secure data interaction method based on edge computing7
Building integrated assessment model for IoT technology deployment in the Industry 4.07
Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs7
Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network7
Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing7
Cost modelling and optimisation for cloud: a graph-based approach7
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach7
A resource scheduling method for cloud data centers based on thermal management7
Improving datacenter utilization through containerized service-based architecture7
Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree6
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications6
Simcan2Cloud: a discrete-event-based simulator for modelling and simulating cloud computing infrastructures6
CLQLMRS: improving cache locality in MapReduce job scheduling using Q-learning6
Wind power prediction method based on cloud computing and data privacy protection6
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas6
Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI6
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture6
Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management6
Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms6
An edge server deployment method based on optimal benefit and genetic algorithm6
Data-intensive workflow scheduling strategy based on deep reinforcement learning in multi-clouds6
RETRACTED ARTICLE: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm6
Enhancement of damaged-image prediction based on digital twin technology6
Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments6
Toward security quantification of serverless computing6
ASOD: an adaptive stream outlier detection method using online strategy6
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems6
An integrated SDN framework for early detection of DDoS attacks in cloud computing6
Multi-Recipient encryption with keyword search without pairing for cloud storage6
Prediction and diagnosis of cardiovascular disease using cloud and machine learning design6
MF-GCN-LSTM: a cloud-edge distributed framework for key positions prediction in grid projects6
Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing6
Task offloading optimization mechanism based on deep neural network in edge-cloud environment5
The key security management scheme of cloud storage based on blockchain and digital twins5
Innovation strategy design of public sports service governance based on cloud computing5
An accurate management method of public services based on big data and cloud computing5
Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records5
An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm5
Privacy-aware and Efficient Student Clustering for Sport Training with Hash in Cloud Environment5
Graph convolution networks for social media trolls detection use deep feature extraction5
Multiple objectives dynamic VM placement for application service availability in cloud networks5
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain5
LAE-GAN: a novel cloud-based Low-light Attention Enhancement Generative Adversarial Network for unpaired text images5
Recommend what to cache: a simple self-supervised graph-based recommendation framework for edge caching networks5
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud5
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing5
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins5
Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach5
Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework5
SEFSD: an effective deployment algorithm for fog computing systems5
Innovative deep learning techniques for monitoring aggressive behavior in social media posts5
A convolutional neural network based online teaching method using edge-cloud computing platform5
Sentence type identification-based product review sentiment analysis using BeDi-DC and Log-Squish CNN5
DU-Net-Cloud: a smart cloud-edge application with an attention mechanism and U-Net for remote sensing images and processing5
Correction: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications5
A Review of Intelligent Verification System for Distribution Automation Terminal based on Artificial Intelligence Algorithms5
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages5
Virtualized intelligent genetic load balancer for federated hybrid cloud environment using deep belief network classifier5
Cost-effective land cover classification for remote sensing images5
Research on electromagnetic vibration energy harvester for cloud-edge-end collaborative architecture in power grid5
Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering5
Low-rate Denial of Service attack detection method based on time-frequency characteristics5
Deep learning based enhanced secure emergency video streaming approach by leveraging blockchain technology for Vehicular AdHoc 5G Networks4
Intelligent code search aids edge software development4
Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing4
Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets4
The least-used key selection method for information retrieval in large-scale Cloud-based service repositories4
Latency and resource consumption analysis for serverless edge analytics4
Algorithm selection using edge ML and case-based reasoning4
Efficient online migration mechanism for memory write-intensive virtual machines4
0.058342933654785