default search action
Journal of Cloud Computing, Volume 13
Volume 13, Number 1, December 2024
- Xin Wang, Dongsheng Yang, D. Raveena Judie Dolly, Shuang Chen, Madini O. Alassafi, Fawaz E. Alsaadi, Jianhui Lyu:
Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics. 1 - Huimin Han, Zehua Liu, Mauricio Barrios Barrios, Jiuhao Li, Zhixiong Zeng, Nadia Sarhan, Emad Mahrous Awwad:
Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling. 2 - Ke Yuan, Zilin Wang, Keyan Chen, Bingcai Zhou, Zheng Li, Chunfu Jia:
Timed-release encryption anonymous interaction protocol based on smart contract. 3 - Chang Shu, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou:
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model. 4 - Zhenyue Long, Huiru Yan, Guiquan Shen, Xiaolu Zhang, Haoyang He, Long Cheng:
A Transformer-based network intrusion detection approach for cloud security. 5 - Yu Zhang, Sijie Xu, Hongyi Chen, Uzair Aslam Bhatti, Mengxing Huang:
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach. 6 - Qiao Su, Hongsu Wang, Haiyang Zhao, Yan Chu, Jie Li, Xuan Lyu, Zijuan Li:
Edge-cloud computing cooperation detection of dust concentration for risk warning research. 7 - M. Pavithra, M. Prakash, V. Vennila:
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud. 8 - Zheng Yu, Songyu Wu, Jielin Jiang, Dongqing Liu:
A knowledge-graph based text summarization scheme for mobile edge computing. 9 - Bo Xu, Uzair Aslam Bhatti, Hao Tang, Jialin Yan, Shulei Wu, Nadia Sarhan, Emad Mahrous Awwad, Syam Melethil Sethumadhavan, Yazeed Yasin Ghadi:
Towards explainability for AI-based edge wireless signal automatic modulation classification. 10 - Jixian Zhang, Zhemin Wang, Athanasios V. Vasilakos, Weidong Li:
A resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit. 11 - Lina Dinesh, K. Gayathri Devi:
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture. 12 - Biao Dong, Jinhui Chen:
An adaptive routing strategy in P2P-based Edge Cloud. 13 - Xuefei Chen, Shouxin Sun, Chao Chen, Xinlong Song, Qiulan Wu, Feng Zhang:
Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing. 14 - Jie Huang, Jiangyi Yi:
The key security management scheme of cloud storage based on blockchain and digital twins. 15 - Zicong Miao, Weize Li, Xiaodong Pan:
Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin. 16 - Bei Liu, Wenlin Li, Xin Su, Xibin Xu:
An improved ACO based service composition algorithm in multi-cloud networks. 17 - Shizhan Lan, Zhuoxi Duan, Song Lu, Bin Tan, Shi Chen, Yeyu Liang, Shan Chen:
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems. 18 - Huimin Han, Muhammad Asif, Emad Mahrous Awwad, Nadia Sarhan, Yazeed Yasin Ghadi, Bo Xu:
Innovative deep learning techniques for monitoring aggressive behavior in social media posts. 19 - Huimin Han, Harold Neira-Molina, Asad Khan, Meie Fang, Haitham A. Mahmoud, Emad Mahrous Awwad, Bilal Ahmed, Yazeed Yasin Ghadi:
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns. 20 - Hongmin Gao, Pengfei Duan, Xiaofeng Pan, Xiaojing Zhang, Keke Ye, Ziyuan Zhong:
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0. 21 - Yun Luo, Yuling Chen, Tao Li, Chaoyue Tan, Hui Dou:
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption. 22 - Nawmi Nujhat, Fahmida Haque Shanta, Sujan Sarker, Palash Roy, Md. Abdur Razzaque, Md. Mamun-Or-Rashid, Mohammad Mehedi Hassan, Giancarlo Fortino:
Task offloading exploiting grey wolf optimization in collaborative edge computing. 23 - Chunling Dong, Yu Feng, Wenqian Shang:
A new method of dynamic network security analysis based on dynamic uncertain causality graph. 24 - Dengbo Li, Hanning Zhang, Jieren Cheng, Bernie Liu:
Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing. 25 - Gan Huang, Ihsan Ullah, Hanyao Huang, Kyung Tae Kim:
Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach. 26 - Lixiang Fu, Jinbiao Chen, Zhuoying Wang, Tao Zang, Huandong Chen, Shulei Wu, Yuchen Zhao:
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition. 27 - Jiaxing Guo, Dongliang Zhao, Chunxiang Gu, Xi Chen, Xieli Zhang, Mengcheng Ju:
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations. 28 - Shahzad Khan, Haider Abbas, Muhammad Binsawad:
Secure semantic search using deep learning in a blockchain-assisted multi-user setting. 29 - Junli Fang, Tao Feng, Xian Guo, Rong Ma, Ye Lu:
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials. 30 - Yue Yang, Jieren Cheng, Zhaowu Liu, Huimin Li, Ganglou Xu:
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching. 31 - Qi Liu, Jiawei Sun, Yonghong Zhang, Xiaodong Liu:
DenMerD: a feature enhanced approach to radar beam blockage correction with edge-cloud computing. 32 - Muhammad Asif, Muna S. Al-Razgan, Yasser A. Ali, Long Yunrong:
Graph convolution networks for social media trolls detection use deep feature extraction. 33 - Huimin Han, Zehua Liu, Jiuhao Li, Zhixiong Zeng:
Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI. 34 - Mohamed Abdel-Basset, Reda Mohamed, Ibrahim M. Hezam, Karam M. Sallam, Abdelaziz Foul, Ibrahim A. Hameed:
Multiobjective trajectory optimization algorithms for solving multi-UAV-assisted mobile edge computing problem. 35 - Hao Li, Wu Yang, Wei Wang, Huanran Wang:
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment. 36 - Mamoona Humayun, Amjad Alsirhani, Faeiz Alserhani, Momina Shaheen, Ghadah Alwakid:
Transformative synergy: SSEHCET - bridging mobile edge computing and AI for enhanced eHealth security and efficiency. 37 - Huiling Zhang, Huatao Wu, Zhengde Li, Wenwen Gong, Yan Yan:
Predicting the individual effects of team competition on college students' academic performance in mobile edge computing. 38 - Yue Pan, Andia Foroughi:
Evaluation of AI tools for healthcare networks at the cloud-edge interaction to diagnose autism in educational environments. 39 - Jing Chen, Shengyi Yang, Ting Gao, Yue Ying, Tian Li, Peng Li:
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing. 40 - Junyan Chen, Wei Xiao, Hongmei Zhang, Jiacheng Zuo, Xinmei Li:
Dynamic routing optimization in software-defined networking based on a metaheuristic algorithm. 41 - Mohammad Zunnun Khan, Mohd Shoaib, Mohammad Shahid Husain, Khair ul Nisa, Mohammad Tabrez Quasim:
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach. 42 - Noshina Tariq, Amjad Alsirhani, Mamoona Humayun, Faeiz Alserhani, Momina Shaheen:
A fog-edge-enabled intrusion detection system for smart grids. 43 - Guijiang Liu, Haibo Xie, Wenming Wang, Haiping Huang:
A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption. 44 - Paromita Goswami, Neetu Faujdar, Somen Debnath, Ajoy Kumar Khan, Ghanshyam Singh:
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. 45 - Yanal Alahmad, Anjali Agarwal:
Multiple objectives dynamic VM placement for application service availability in cloud networks. 46 - Meiyan Li, Qinyong Wang, Yuwei Liao:
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing. 47 - Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali:
Edge intelligence-assisted animation design with large models: a survey. 48 - S. Gayathri, D. Surendran:
Unified ensemble federated learning with cloud computing for online anomaly detection in energy-efficient wireless sensor networks. 49 - Rubaina Nazeer, Sajid Ali, Zhihua Hu, Ghulam Jillani Ansari, Muna S. Al-Razgan, Emad Mahrous Awwad, Yazeed Yasin Ghadi:
Detection of cotton leaf curl disease's susceptibility scale level based on deep learning. 50 - Ben Roullier, Frank McQuade, Ashiq Anjum, Craig Bower, Lu Liu:
Automated visual quality assessment for virtual and augmented reality based digital twins. 51 - Momina Shaheen, Muhammad Shoaib Farooq, Tariq Umer:
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost. 52 - Guohao Tang, Huaying Zhao, Baohua Yu:
Low-cost and high-performance abnormal trajectory detection based on the GRU model with deep spatiotemporal sequence analysis in cloud computing. 53 - Huirui Han, Bandeh Ali Talpur, Wei Liu, Limei Wang, Bilal Ahmed, Nadia Sarhan, Emad Mahrous Awwad:
RNA-RBP interactions recognition using multi-label learning and feature attention allocation. 54 - Wen Xing, Adam Slowik, J. Dinesh Peter:
Edge-cloud computing oriented large-scale online music education mechanism driven by neural networks. 55 - Yu Hu, Feipeng Qiu, Fei Zheng, Jilong Zhao:
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning. 56 - Kai Yang, Jiawei Du, Jingchao Liu, Feng Xu, Ye Tang, Ming Liu, Zhibin Li:
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records. 57 - Shun Jiao, Haiyan Wang, Jian Luo:
SRA-E-ABCO: terminal task offloading for cloud-edge-end environments. 58 - Zhiqing Bai, Caizhong Li, Javad Pourzamani, Xuan Yang, Dejuan Li:
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure. 59 - A. A. Periola:
TCP Stratos for stratosphere based computing platforms. 60 - Weiwei Miao, Yuanyi Xia, Rui Zhang, Xinjian Zhao, Qianmu Li, Tao Wang, Shunmei Meng:
A secure data interaction method based on edge computing. 61 - Huiyong Wang, Qi Wang, Yong Ding, Shijie Tang, Yujue Wang:
Privacy-preserving federated learning based on partial low-quality data. 62 - Uma Rani, Sunil Kumar, Neeraj Dahiya, Kamna Solanki, Shanu Rakesh Kuttan, Sajid Shah, Momina Shaheen, Faizan Ahmad:
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications. 63 - Asha Varma Songa, Ganesh Reddy Karri:
An integrated SDN framework for early detection of DDoS attacks in cloud computing. 64 - Mughair Aslam Bhatti, Zhiyao Song, Uzair Aslam Bhatti, Syam M. S:
AIoT-driven multi-source sensor emission monitoring and forecasting using multi-source sensor integration with reduced noise series decomposition. 65 - Qing He, Hua Zhao, Yu Feng, Zehao Wang, Zhaofeng Ning, Tingwei Luo:
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks. 66 - Mengmeng Cui, Shizhong Zhao, Jinfeng Yao:
Short-term forecasting of surface solar incident radiation on edge intelligence based on AttUNet. 67 - Kang Song, Wenqian Shang, Yong Zhang, Tong Yi, Xuan Wang:
Security issues of news data dissemination in internet environment. 68 - Gaoxian Peng, Yiping Wen, Wanchun Dou, Tiancai Li, Xiaolong Xu, Qing Ye:
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment. 69 - Lei Chen, Chong Guo, Bei Gong, Muhammad Waqas, Lihua Deng, Haowen Qin:
A secure cross-domain authentication scheme based on threshold signature for MEC. 70 - Seungyong Yang, Brent ByungHoon Kang, Jaehyun Nam:
Optimus: association-based dynamic system call filtering for container attack surface reduction. 71 - Xin He, Feifan Liang, Weibei Fan, Junchang Wang, Lei Han, Fu Xiao, Wanchun Dou:
Accurate and fast congestion feedback in MEC-enabled RDMA datacenters. 72 - Yanjie Li, Liqin Kang, Zhaojin Li, Fugao Jiang, Nan Bi, Tao Du, Maryam Abiri:
Time-aware outlier detection in health physique monitoring in edge-aided sport education decision-makings. 73 - Juan Liu, Xiaohong Deng, Wangchun Li, Kangting Li:
CG-PBFT: an efficient PBFT algorithm based on credit grouping. 74 - Kai Yang, Jiawei Du, Jingchao Liu, Feng Xu, Ye Tang, Ming Liu, Zhibin Li:
Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records. 75 - Ziwen Zhang, Qi Liu, Xiaodong Liu, Yonghong Zhang, Zihao Du, Xuefei Cao:
PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing. 76 - Huimin Han, Harold Neira-Molina, Asad Khan, Meie Fang, Haitham A. Mahmoud, Emad Mahrous Awwad, Bilal Ahmed, Yazeed Yasin Ghadi:
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns. 77 - Fanlong Zhang, Mengcheng Li, Heng Wu, Tao Wu:
Intelligent code search aids edge software development. 78 - Abdullah Lakhan, Tor-Morten Grønli, Paolo Bellavista, Sajida Memon, Maher Alharby, Orawit Thinnukool:
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks. 79 - Ridlo Sayyidina Auliya, Yen-Lin Lee, Chia-Ching Chen, Deron Liang, Wei-Jen Wang:
Analysis and prediction of virtual machine boot time on virtualized computing environments. 80 - ChuanFu Zhang, Jing Chen, Wen Li, Hao Sun, Yudong Geng, Tianxiang Zhang, Mingchao Ji, Tonglin Fu:
A cloud-edge collaborative task scheduling method based on model segmentation. 81 - Carlos Reaño, José V. Riera, Verónica Romero, Pedro Morillo, Sergio Casas-Yrurzum:
A cloud-edge computing architecture for monitoring protective equipment. 82 - Siren Zhao, Jilun Zhang, Jianbin Zhang:
Predicting UPDRS in Parkinson's disease using ensembles of self-organizing map and neuro-fuzzy. 83 - Tao Shen, Lu Zhang, Renkang Geng, Shuai Li, Bin Sun:
Traffic prediction for diverse edge IoT data using graph network. 84 - Naglaa Abdelhady, Taysir Hassan A. Soliman, Mohammed F. Farghally:
Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets. 85 - Velmurugan Sambath, Mohan Prakash, S. Neelakandan, Arun Radhakrishnan:
Provably secure data selective sharing scheme with cloud-based decentralized trust management systems. 86 - Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali:
Correction to: Edge intelligence‑assisted animation design with large models: a survey. 87 - Veni Thangaraj, Thankaraja Raja Sree:
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments. 88 - Mohammad Rostami, Salman Goli-Bidgoli:
An overview of QoS-aware load balancing techniques in SDN-based IoT networks. 89 - Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang:
Cross-chain asset trading scheme for notaries based on edge cloud storage. 90 - Chengping Zhang, Muhammad Aamir, Yurong Guan, Muna S. Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti, Yazeed Yasin Ghadi:
Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN. 91 - Sihan Chen, Wanchun Jiang:
Online dynamic multi-user computation offloading and resource allocation for HAP-assisted MEC: an energy efficient approach. 92 - Yazeed Yasin Ghadi, Syed Faisal Abbas Shah, Tehseen Mazhar, Tariq Shahzad, Khmaies Ouahada, Habib Hamam:
Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools. 93 - Gorka Nieto, Idoia de la Iglesia, Unai Lopez-Novoa, Cristina Perfecto:
Deep Reinforcement Learning techniques for dynamic task offloading in the 5G edge-cloud continuum. 94 - Shujie Tian, Yuexia Zhang, Yanxian Bi, Taifu Yuan:
Blockchain-based 6G task offloading and cooperative computing resource allocation study. 95 - Xinjian Zhao, Guoquan Yuan, Shuhan Qiu, Chenwei Xu, Shanming Wei:
A mobile edge computing-focused transferable sensitive data identification method based on product quantization. 96 - Guangshun Li, Haoyang Wu, Junhua Wu, Zhenqiang Li:
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain. 97 - Ping Liu, Dai Shi, Bin Zang, Xiang Liu:
Students health physique information sharing in publicly collaborative services over edge-cloud networks. 98 - Marta Rózanska, Geir Horn:
Constrained optimal grouping of cloud application components. 99 - Hailang Cheng, Mengmeng Cui, Yuzhe Shi:
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting. 100 - R. Julian Menezes, P. Jesu Jayarin, A. Chandra Sekar:
A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems. 101 - Yuwen Shao, Na Guo:
Recognizing online video genres using ensemble deep convolutional learning for digital media service management. 102 - Juan Chen, Rui Zhang, Peng Chen, Jianhua Ren, Zongling Wu, Yang Wang, Xi Li, Ling Xiong:
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices. 103 - Fangru Lin, Jie Yuan, Zhiwei Chen, Maryam Abiri:
Enhancing multimedia management: cloud-based movie type recognition with hybrid deep learning architecture. 104 - Karan Kumar K, Mounica Nutakki, Sriranga Suprabhath Koduru, Srihari Mandava:
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models. 105 - Ping Liu, Xiang Liu, Bin Zang, Guoyan Diao:
Privacy-preserving sports data fusion and prediction with smart devices in distributed environment. 106 - Rui Huang, Tinghuai Ma, Huan Rong, Kai Huang, Nan Bi, Ping Liu, Tao Du:
Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks. 107 - Zhen Zhang, Chen Xu, Shaohua Xu, Long Huang, Jinyu Zhang:
Towards optimized scheduling and allocation of heterogeneous resource via graph-enhanced EPSO algorithm. 108 - Mohammadreza Aminian, Mehdi Jafari Shahbazzadeh, Mahdiyeh Eslami:
Distance optimization and directional overcurrent relay coordination using edge-powered biogeography-genetic algorithms. 109 - Hao Feng, Kun Cao, Gan Huang, Hao Liu:
ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction. 110 - Chengping Zhang, Muhammad Aamir, Yurong Guan, Muna S. Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti, Yazeed Yasin Ghadi:
Correction to: Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN. 111 - Danial Shiraly, Ziba Eslami, Nasrollah Pakniat:
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data. 112 - Hamza Sulimani, Rahaf Sulimani, Fahimeh Ramezani, Mohsen Naderpour, Huan Huo, Tony Jan, Mukesh Prasad:
HybOff: a Hybrid Offloading approach to improve load balancing in fog environments. 113 - Hao Zhong, Dong Yang, Shengdong Shi, Lai Wei, Yanyan Wang:
From data to insights: the application and challenges of knowledge graphs in intelligent audit. 114 - Hongxia He, Xi Li, Peng Chen, Juan Chen, Ming Liu, Lei Wu:
Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework. 115 - Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun, Sufang Zhou, Chunfu Jia:
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system. 116 - Xiao Zheng, Muhammad Tahir, Khursheed Aurangzeb, Muhammad Shahid Anwar, Muhammad Aamir, Ahmad Farzan, Rizwan Ullah:
Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems. 117 - Jiageng Yang, Chuanyi Liu, Binxing Fang:
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications. 118 - Chaoyang Zhu:
Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users. 119 - Zhichao Hu, Xiangzhan Yu, Likun Liu, Yu Zhang, Haining Yu:
ASOD: an adaptive stream outlier detection method using online strategy. 120 - Daokun Qi, Xiaojuan Xi, Yake Tang, Yuesong Zheng, Zhengwei Guo:
Real-time scheduling of power grid digital twin tasks in cloud via deep reinforcement learning. 121 - Xinying Zhu, Ran Xia, Hang Zhou, Shuo Zhou, Haoran Liu:
An intelligent decision system for virtual machine migration based on specific Q-learning. 122 - Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, Tauqeer Safdar Malik, Ali Haider Khan, Jawad Tanveer, Ateeq Ur Rehman:
Enhancing intrusion detection: a hybrid machine and deep learning approach. 123 - Jeongmin Lee, Hyeongbin Kang, Hyeon-jin Yu, Ji-Hyun Na, Jungbin Kim, Jae-Hyuck Shin, Seo-Young Noh:
MDB-KCP: persistence framework of in-memory database with CRIU-based container checkpoint in Kubernetes. 124 - Chunwang Wu, Xiaolei Liu, Kangyi Ding, Bangzhou Xin, Jiazhong Lu, Jiayong Liu, Cheng Huang:
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning. 125 - Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Neetu Faujdar, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Sultan Abdullah Algarni:
Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation. 126 - Syed Sabir Mohamed S, Gopi R, Thiruppathy Kesavan V, Karthikeyan Kaliyaperumal:
Adaptive heuristic edge assisted fog computing design for healthcare data optimization. 127 - Min Zhao, Junwen Lu:
Energy-aware tasks offloading based on DQN in medical mobile devices. 128 - Somchart Fugkeaw, Phatwasin Suksai, Lyhour Hak:
SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse. 129 - Muhammad Awais, Yousaf Saeed, Abid Ali, Sohail Jabbar, Awais Ahmad, Yazeed Alkhrijah, Umar Raza, Yasir Saleem:
Deep learning based enhanced secure emergency video streaming approach by leveraging blockchain technology for Vehicular AdHoc 5G Networks. 130 - Yujia Lin, Li-Ming Chen, Aftab Ali, Christopher Nugent, Ian Cleland, Rongyang Li, Jianguo Ding, Huansheng Ning:
Human digital twin: a survey. 131 - Syed Imran Akhtar, Abdul Rauf, Haider Abbas, Muhammad Faisal Amjad, Ifra Batool:
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins. 132 - Zhen Zhang, Chen Xu, Jinyu Zhang, Zhe Zhu, Shaohua Xu:
When wavelet decomposition meets external attention: a lightweight cloud server load prediction model. 133 - Jomina John, John Singh K:
Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation. 134 - Naif Alsharabi, Jalel Ktari, Tarek Frikha, Abdulaziz Alayba, Abdullah J. Alzahrani, Amr Jadi, Habib Hamam:
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future. 135 - Chunhong Liu, Huaichen Wang, Mengdi Zhao, Jialei Liu, Xiaoyan Zhao, Peiyan Yuan:
Dependency-aware online task offloading based on deep reinforcement learning for IoV. 136 - Lei Zhang, Shaoming Zhu, Shen Su, Xiaofeng Chen, Yan Yang, Bing Zhou:
Wind power prediction method based on cloud computing and data privacy protection. 137 - Li Ma, Binbin Duan, Bo Zhang, Yang Li, Yingxun Fu, Dongchao Ma:
A trusted IoT data sharing method based on secure multi-party computation. 138 - Arun Amaithi Rajan, V. Vetriselvi, Mayank Raikwar, Reshma Balaraman:
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud. 139 - Kan Ni, Subrota Kumar Mondal, Hussain Mohammed Dipu Kabir, Tan Tian, Hong-Ning Dai:
Toward security quantification of serverless computing. 140 - Prateek Yadav, Subrat Kar:
A cost-efficient content distribution optimization model for fog-based content delivery networks. 141 - A. Sherly Alphonse, S. Abinaya, Nishant Kumar:
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet. 142 - Yongsik Kim, Gunho Park, Huy Kang Kim:
Domain knowledge free cloud-IDS with lightweight embedding method. 143 - Fan Zhang, Peichen Yang, Rongyang Li, Sha Li, Jianguo Ding, Jiabo Xu, Huansheng Ning:
A multi-strategy ontology mapping method based on cost-sensitive SVM. 144 - Yan Zheng, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Chang Shu, Lang Chen:
Optimization model for vehicular network data queries in edge environments. 145 - Aarti Punia, Preeti Gulia, Nasib Singh Gill, Ebuka Ibeke, Celestine Iwendi, Piyush Kumar Shukla:
A systematic review on blockchain-based access control systems in cloud environment. 146 - Akif Quddus Khan, Mihhail Matskin, Radu Prodan, Christoph Bussler, Dumitru Roman, Ahmet Soylu:
Cost modelling and optimisation for cloud: a graph-based approach. 147 - Guozheng Peng, Xiaoyun Shi, Jun Zhang, Lisha Gao, Yuanpeng Tan, Nan Xiang, Wanguo Wang:
BGFL: a blockchain-enabled group federated learning at wireless industrial edges. 148 - Vankamamidi S. Naresh, Ayyappa D:
PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach. 149 - Usman Ahmed, Jiangbin Zheng, Ahmad Almogren, Sheharyar Khan, Muhammad Tariq Sadiq, Ayman Altameem, Ateeq Ur Rehman:
Explainable AI-based innovative hybrid ensemble model for intrusion detection. 150 - Md Sharafat Hossain, Md. Alamgir Hossain, Md. Saiful Islam:
I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach. 151 - Luyao Pei, Cheng Xu, Xueli Yin, Jinsong Zhang:
Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management. 152 - Yining Chen, Kai Peng, Chengfang Ling:
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories. 153 - Junli Fang, Tao Feng, Xian Guo, Xusheng Wang:
Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity. 154 - Yasir Ali, Habib Ullah Khan, Faheem Khan, Yeon-Kug Moon:
Building integrated assessment model for IoT technology deployment in the Industry 4.0. 155 - Shusmoy Chowdhury, Ajay Katangur, Alaa Sheta:
Optimization of datacenter selection through a genetic algorithm-driven service broker policy. 156 - Himani Saini, Gopal Singh, Sandeep Dalal, Iyyappan Moorthi, Sultan Mesfer Aldossary, Nasratullah Nuristani, Arshad Hashmi:
A hybrid machine learning model with self-improved optimization algorithm for trust and privacy preservation in cloud environment. 157 - Saulo Ferreira, Júlio Mendonça, Bruno Nogueira, Willy Tiengo, Ermeson C. Andrade:
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications. 158 - S. Nandhini, Rajeswari A, N. R. Shanker:
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures. 159 - Xusheng Wang, Tao Feng, Chunyan Liu, Junli Fang:
Multi party confidential verifiable electronic voting scheme based on blockchain. 160 - Chunmei Ma, Xiangqian Li, Baogui Huang, Guangshun Li, Fengyin Li:
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing. 161
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.