default search action
Cluster Computing, Volume 28
Volume 28, Number 1, February 2025
- Mahmoud E. Farfoura, Ibrahim Mashal, Ahmad Alkhatib, Radwan M. Batyha:
A lightweight machine learning methods for malware classification. 1 - Yezhou Zhang, Lang Li, Yu Ou:
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis. 2 - Sunil Prajapat, Dheeraj Kumar, Pankaj Kumar:
Quantum image encryption protocol for secure communication in healthcare networks. 3 - Manish Kumar, Sunggon Kim:
Augmented access pattern-based I/O performance prediction using directed acyclic graph regression. 4 - Sunil Prajapat, Neeraj Kumar, Ashok Kumar Das, Pankaj Kumar, Rifaqat Ali:
Quantum-safe blockchain-assisted data encryption protocol for internet of things networks. 5 - Jaya Dofe, Shailesh Rajput:
Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function. 6 - Gabriel Araújo, Rayner Sousa, Iure Fé, Paulo A. L. Rego, Francisco Airton Silva:
Network service function chaining: a performance study varying topologies. 7 - Lujie Wang, Zhong Chen, Xiyu Sun, Chenchen He:
Region of interest encryption algorithm for images based on lifting scheme and object detection. 8 - Nan Li, Qianqian Su:
An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud. 9 - Guodong Ye, Zhuozhao Chen:
Authenticated reversible image hiding algorithm based on blockchain technology. 10 - Nguyen Tan Cam, Tran Duc Viet:
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models. 11 - Willian Barreiros, Jun Kong, Renato Ferreira, George Teodoro:
A hierarchical data partitioning strategy for irregular applications: a case study in digital pathology. 12 - Ardalan Ghasemzadeh, Hadi S. Aghdasi, Saeed Saeedvand:
Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism. 13 - Zeng Gao, Yi Zhuang, Jingjing Gu:
Multi-strategy arithmetic optimization algorithm for global optimization and uncertain motion tracking. 14 - Rong Gao, Zhiwei Chen, Xinyun Wu, Yonghong Yu, Li Zhang:
Dynamic deep graph convolution with enhanced transformer networks for time series anomaly detection in IoT. 15 - G. Punnam Chander, Sujit Das:
A hybrid decision support system in medical emergencies using artificial neural network and hyperbolic secant grey wolf optimization techniques. 43 - Yong He, Mingran Wang:
Dynamic step opposition-based learning sparrow search algorithm for UAV path planning. 44 - Riham Elsaadany, Guy Bégin:
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things. 45 - Leda Qu, Feng Wen, Haixin Huang, Zhuo Wang:
Aggregation-chain: a consortium blockchain based multi-chain data sharing framework with efficient query. 46 - Abdoul Fatakhou Ba, Yingchi Mao, Abdullahi Uwaisu Muhammad, Omaji Samuel, Tasiu Muazu, Umar Muhammad Mustapha Kumshe:
Blockchain federated learning with sparsity for IoMT devices. 47 - Seyed Alireza Omranian, Maziar Goudarzi:
Greedy algorithm for dynamic allocation of intelligent services in vehicular edge computing. 48 - WeiGuang Gu, Fang Wang:
A multi-strategy improved dung beetle optimisation algorithm and its application. 49 - Radjaa Bensaid, Nabila Labraoui, Hafida Saidi, Haythem Bany Salameh:
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach. 50 - Meysam Jahani, Fatemeh Raji, Zahra Zojaji:
Securing supply chain through blockchain-integrated algorithmic system: ensuring product quality and counterfeiting tags detection. 51 - Linqiu Gui, Chunnian Zeng, Jie Luo, Xiaofeng Wang, Xu Yang, Shengshi Zhong:
Graph-based robust 3D point cloud map merging approach for large scale. 52 - Bingxian Li, Lin Zhu, Long Tan:
A vehicular edge computing content caching solution based on content prediction and D4PG. 53 - Alireza Alibakhshi, Erfan Hassannayebi:
Towards an enhanced next activity prediction using attention based neural networks. 54 - Lei Zhou, Yanyan Dong, Bingya Ma, Zhewen Yin, Fan Lu:
Object detection in low-light conditions based on DBS-YOLOv8. 55 - Sunita Rani, Geeta Kasana, Shalini Batra:
An efficient content based image retrieval framework using separable CNNs. 56 - Adnane Talha, Anas Bouayad:
Quasi-opposition Remora Optimizer based Nelder-Mead algorithm for tasks scheduling in cloud. 57 - Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh, Alwi M. Bamhdi, Ana Luiza Bessa Barros, Djamel Zeghida, Ahmed Patel:
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks. 58 - Zihan Wang, Jiqun Zhang, Yongwei Tang, Hongyuan Cheng:
BGAS: blockchain-based secure and efficient group key agreement scheme for dynamic vehicular platoon. 59 - Mohd Sakib, Shahnawaz Ahmad, Khalid Anwar, Mohd Saqib:
Optimizing support vector regression using grey wolf optimizer for enhancing energy efficiency and building prototype architecture. 60 - Mohammed Batis, Yi Chen, Mingjing Wang, Lei Liu, Ali Asghar Heidari, Huiling Chen:
ACGRIME: adaptive chaotic Gaussian RIME optimizer for global optimization and feature selection. 61 - Shuling Hou, Gaoshang Xiao, Huiying Zhou:
High-performance network attack detection in unknown scenarios based on improved vertical model. 62 - Hamza Hammami, Sadok Ben Yahia, Mohammad S. Obaidat:
A Robust Mutual Authentication Scheme for Health-Focused Connected Intelligent Objects. 63 - Xun Weng, Wenke She, Hongqiang Fan, Jingtian Zhang, Lifen Yun:
Multi-depot vehicle routing problem with drones in emergency logistics. 64 - Yufeng Wang, Yong Zhang, Zhuo Shuang, Ke Chen, Chunyu Xu:
A novel hybrid differential particle swarm optimization based on particle influence. 65 - Junliang Wang, Baohong Lin, Jiao Zhang, Mengyu Sun, Yongchen Pan:
An optimized RDMA QP communication mechanism for hyperscale AI infrastructure. 66 - Prashanth Choppara, Sudheer Mangalampalli:
An efficient deep reinforcement learning based task scheduler in cloud-fog environment. 67 - Shi-Hui Zhang, Jie-Sheng Wang, Si-Wen Zhang, Yu-Xuan Xing, Xiao-Fei Sui:
Multi-strategy fusion snake optimizer on task offloading and scheduling for IoT-based fog computing multi-tasks learning. 69 - Chaimae Hazman, Azidine Guezzaz, Said Benkirane, Mourade Azrour:
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security. 70 - Shengsheng Lin, Weiwei Lin, Feiyu Zhao, Haojun Chen:
Benchmarking and revisiting time series forecasting methods in cloud workload prediction. 71 - Emrah Aslan, Yildirim Özüpak:
Detection of road extraction from satellite images with deep learning method. 72 - Mohd Sakib, Suhel Mustajab, Mahfooz Alam:
Ensemble deep learning techniques for time series analysis: a comprehensive review, applications, open issues, challenges, and future directions. 73 - Dongxian Yu, Weiyong Zheng:
A hybrid evolutionary algorithm to improve task scheduling and load balancing in fog computing. 74
Volume 28, Number 2, April 2025
- Keyu Zhong, Fen Xiao, Xieping Gao:
Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII. 75 - Fengxian Wang, Dailin Li, Jie Zhang, Xiabing Wang, Linwei Li, Xiaoping Shi:
Multiple adaptive fusion network with Mittag Leffler IoU loss for aircraft detection in remote sensing images. 76 - Malha Merah, Zibouda Aliouat, Hakim Mabed:
Dynamic load balancing of traffic in the IoT edge computing environment using a clustering approach based on deep learning and genetic algorithms. 77 - Ying Qiao, Junhan Xiong, Yiguo Zhao:
Network-aware container scheduling in edge computing. 78 - Torana Kamble, Madhuri Ghuge, Ritu Jain, Vaishali Sarbhukan Bodade:
Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application. 79 - Benyamin Abdollahzadeh, Hatef Javadi, Oguz Toragay, Nicola Epicoco, Nima Khodadadi:
The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm. 80 - Yuansheng Gao, Jinpeng Wang, Changlin Li:
Escape after love: Philoponella prominens optimizer and its application to 3D path planning. 81 - Weiye Wang, Qing Li, Honglei Mu:
Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity. 82 - Roya Zareh Farkhady, Kambiz Majidzadeh, Mohammad Masdari, Ali Ghaffari:
3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT. 83 - Lingru Cai, Yuelong Liu, Jianlong Xu, Mengqing Jin:
Lcsa-fed: a low cost semi-asynchronous federated learning based on lag tolerance for services QoS prediction. 84 - Nilakshee Rajule, Mithra Venkatesan, Radhika Menon, Anju Kulkarni:
Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model. 85 - Essam H. Houssein, Someya Mohsen Zaki, Marwa M. Emam, Nagwan M. Abdel Samee, Reem Ibrahim Alkanhel, Eman M. G. Younis:
Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring. 86 - Niayesh Gharaei, Aliaa M. Alabdali:
Optimizing smart health monitoring systems: enahancing energy efficiency and reducing latency with multi-level clustering and grey wolf optimizer. 87 - Shawal Khan, Shahzad Khan:
Latency aware graph-based microservice placement in the edge-cloud continuum. 88 - Sanaz Feizi, Hamidreza Ghaffari:
Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks. 89 - Priyadarshni, Praveen Kumar, Nilesh Arjun Gupta, Rajiv Misra:
Integrating of IOTA-based blockchain with edge computing for task offloading powering the metaverse. 90 - Ajit Kumar Mahapatra, Nibedan Panda, Madhumita Mahapatra, Tarakanta Jena, Arup Kumar Mohanty:
A fast-flying particle swarm optimization for resolving constrained optimization and feature selection problems. 91 - Aymen Takie Eddine Selmi, Mohamed Faouzi Zerarka, Abdelhakim Cheriet:
Efficient technique utilizing an embedding hierarchical clustering-based representation into crossed cubes for TSP optimization. 92 - Khwaja Mansoor, Mehreen Afzal, Waseem Iqbal, Yawar Abbas:
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices. 93 - Juan Chen, Jia Zhao, Renbin Xiao, Zhihua Cui, Hui Wang, Jeng-Shyang Pan:
Role division approach for firefly algorithm based on t-distribution perturbation and differential mutation. 94 - Arun Mani Tripathi, Lokendra Singh Umrao:
Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT. 95 - Zhongmin Wang, Shuai Zhang, Xiaomin Jin, Yanping Chen, Chen Lu:
Joint resource allocation and privacy protection for MEC task offloading in industrial Internet. 96 - Sarika Mustyala, Manjubala Bisi:
Ensembling Harmony Search Algorithm with case-based reasoning for software development effort estimation. 97 - Hao Guo, Bin Deng, Weidong Li:
Multi-resource maximin share fair allocation in the cloud-edge collaborative computing system with bandwidth demand compression. 98 - Xiaoxu Wei, Chen Niu, Lianzheng Zhao, Yongsheng Wang:
Combination of ant colony and student psychology based optimization for the multi-depot electric vehicle routing problem with time windows. 99 - Shuangquan Xu, Xiji Li, Qing Liu, Haiyang Dong, Xiaoyan Xu, Licai Yan, Yue Zhang:
Intelligent monitoring system for environmental protection during the construction period of pumped storage power station. 100 - Yuping Wang, Peng Zhang, Bo Wang, Zhifeng Zhang, Yaoli Xu, Bin Lv:
A hybrid PSO and GA algorithm with rescheduling for task offloading in device-edge-cloud collaborative computing. 101 - Ashutosh Kumar Singh, Satender Kumar, Sarika Jain:
A multi-agent deep reinforcement learning approach for optimal resource management in serverless computing. 102 - Ashfaq Ahmad Najar, S. Manohar Naik:
AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing. 103 - Mina Mohammadi, Fatemeh BahraniPour, Sepehr Ebrahimi Mood, Mohammad Farshi:
Security-aware resource allocation in fog computing using a meta-heuristic algorithm. 104 - Mohamed Farhat, Salah Kamel, Almoataz Y. Abdelaziz:
Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems. 105 - Suqian Wu, Jie Liu, Bitao He, Chuan Lin, Jing Yang, Wei Wei:
An enhanced DV-hop localization algorithm based on hop distance correction and multi-strategy modified Aquila Optimizer in HWSNs. 106 - Changjong Kim, Yongseok Son, Sunggon Kim:
Investigating the effects of SQL hints on diverse storage devices through empirical analysis. 107 - Hibat Eallah Mohtadi, Abdellah Ouammou, Mohamed Hanini, Abdelkrim Haqiq:
Resilient vehicular fog computing networks: an analytical approach to system reliability under breakdown and vacation interruptions. 108 - Gurjot Kaur, Deepti Kakkar:
A secure lightweight authentication model with interference aware routing and attack detection approach in VANET. 109 - Yue Wang, Xiaohu Zhao:
IG-PGFT: A secure and efficient intelligent grouping PBFT consensus algorithm for the Industrial Internet of Things. 110 - Soyeon Park, Hyokyung Bahn:
Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments. 111 - Nasir Ahmad Jalali, Hongsong Chen:
Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G. 112 - Mamoru Mimura, Kazuyuki Kurashina:
Practical evasion attack against neural network-based macro-malware detection method. 113 - Christos Chrysanthos Nikolaidis, Pavlos S. Efraimidis:
Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management. 114 - Qinghua Ling, Wenkai Liu, Fei Han, Jinlong Shi, Ali Aweis Hussein, Ben Sanvee Sayway:
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization. 115 - Zhendong Wang, Biao Xie, Shuxin Yang, Dahai Li, Junling Wang, Sammy Chan:
A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things. 116 - Shweta Kushwaha, Ravi Shankar Singh:
Deadline and budget-constrained archimedes optimization algorithm for workflow scheduling in cloud. 117 - Shudong Wang, Yanxiang Zhang, Xiao He, Nuanlai Wang, Zhi Lu, Baoyun Chen, Shanchen Pang:
Microservice deployment in cloud-edge environment using enhanced global search grey wolf optimizer-greedy algorithm. 118 - Pan Xu, Hui Gao, Yixuan Wang:
Sparse dual-weighting ensemble clustering. 119 - Yichun Yu, Xiaoyi Yang, Zheping Chen, Yuqing Lan, Zhihuan Xing, Dan Yu:
Fedgac: optimizing generalization in personalized federated learning via adaptive initialization and strategic client selection. 120 - Junbi Xiao, Jinhai Fan, Hao Lu:
Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning. 121 - Xiangxu Meng, Wei Li, Zhihan Liu, Junze Yang, Wenqi Zheng:
HG-Net: a novel neural network with hierarchical grouped convolution for indoor fingerprint positioning. 122 - Hanqiao Huang, Bo Du, Huan Zhou, Meng Wang, Yufei Ming, Gang Hu:
A path planning method in three-dimensional complex space based on Bézier curves and a hybrid zebra optimization algorithm. 123 - Jiawen Huang, Liyan Xiong, Xiaohui Huang, Qingsen Chen, Peng Huang:
Filter pruning via annealing decaying for deep convolutional neural networks acceleration. 124 - Junbi Xiao, Yunhuan Cong, Wenjing Zhang, Wenchao Weng:
A cellular traffic prediction method based on diffusion convolutional GRU and multi-head attention mechanism. 125 - Muhammad Asad, Safa Otoum:
Bppfl: a blockchain-based framework for privacy-preserving federated learning. 126 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang, Zhen Li, Dongli Duan:
Retraction Note: Real-time network virtualization based on SDN and Docker container. 127 - Oluwatayomi Rereloluwa Adegboye, Afi Kekeli Feda:
Improved exponential distribution optimizer: enhancing global numerical optimization problem solving and optimizing machine learning paramseters. 128 - Yuchen Wang, Zhongcheng Wei, Zishan Huang, Jian Yang, Jijun Zhao:
Dependent task offloading for air-ground integrated MEC networks: a multi-agent collaboration approach. 129 - Shobhana Kashyap, Avtar Singh, Sukhpal Singh Gill:
Machine learning-centric prediction and decision based resource management in cloud computing environments. 130 - Arabinda Pradhan, Amardeep Das, Sukant Kishoro Bisoy:
Modified parallel PSO algorithm in cloud computing for performance improvement. 131 - Henry Ohiani Ohize, Adeiza James Onumanyi, Buhari Ugbede Umar, Lukman Adewale Ajao, Rabiu O. Isah, Eustace Manayi Dogo, Bello Kontagora Nuhu, Olayemi M. Olaniyi, James Garba Ambafi, Vincent B. Sheidu, Muhammad M. Ibrahim:
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges. 132 - Yuefeng Xu, Rui Zhong, Yang Cao, Chao Zhang, Jun Yu:
Symbiotic mechanism-based honey badger algorithm for continuous optimization. 133 - Lingxi Hu, Yuanyuan Hu, Linhua Jiang, Wei Long:
Federated learning client selection algorithm based on gradient similarity. 134 - Jahez Abraham Johny, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti:
Deep learning fusion for effective malware detection: leveraging visual features. 135 - Afnan Al-Ali, Raseena M. Haris, Younes Akbari, Moutaz Saleh, Somaya Al-Máadeed, Rajesh Kumar Muthu:
Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach. 136 - Ali Boroumand, Mirsaeid Hosseini Shirvani, Homayun Motameni:
A heuristic task scheduling algorithm in cloud computing environment: an overall cost minimization approach. 137 - Shiva Sattarpour, Ali Barati, Hamid Barati:
EBIDS: efficient BERT-based intrusion detection system in the network and application layers of IoT. 138 - Ravindrakumar Purohit, Jai Prakash Verma, Rachna Jain, Ashish Kumar:
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era. 139 - Sanket Mishra, Thangellamudi Anithakumari, Rashmi Sahay, Rajesh Kumar Shrivastava, Sachi Nandan Mohanty, Afzal Hussain Shahid:
LIRAD: lightweight tree-based approaches on resource constrained IoT devices for attack detection. 140 - Liping Zhou, Xu Liu, Ruiqing Tian, Wuqi Wang, Guowei Jin:
A multi-strategy enhanced reptile search algorithm for global optimization and engineering optimization design problems. 141 - Pallav Gupta, Swarab Raul, S. Shoba, Karthika Veeramani:
Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme. 142 - Aram Satouf, Ali Hamidoglu, Ömer Melih Gül, Alar Kuusik, Lütfiye Durak Ata, Seifedine Kadry:
Metaheuristic-based task scheduling for latency-sensitive IoT applications in edge computing. 143 - Ahmed Saidi, Abdelouahab Amira, Omar Nouali:
Securing decentralized federated learning: cryptographic mechanisms for privacy and trust. 144 - Zhiyu Feng, Donglin Zhu, Huaiyu Guo, Jiankai Xue, Changjun Zhou:
A Jaya algorithm based on self-adaptive method for parameters identification of photovoltaic cell and module. 145 - Yashar Ghaemi, Hosam El-Ocla:
Time delay-based routing protocol using genetic algorithm in vehicular Ad Hoc networks. 146 - Rui Lu, Lei Shi, Kuangyi Sun, Dong lv:
Internet of things and distributed security framework for 5G networks. 147
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.