default search action
Journal of Cloud Computing, Volume 13
Volume 13, Number 1, December 2024
- Xin Wang, Dongsheng Yang, D. Raveena Judie Dolly, Shuang Chen, Madini O. Alassafi, Fawaz E. Alsaadi, Jianhui Lyu:
Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics. 1 - Huimin Han, Zehua Liu, Mauricio Barrios Barrios, Jiuhao Li, Zhixiong Zeng, Nadia Sarhan, Emad Mahrous Awwad:
Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling. 2 - Ke Yuan, Zilin Wang, Keyan Chen, Bingcai Zhou, Zheng Li, Chunfu Jia:
Timed-release encryption anonymous interaction protocol based on smart contract. 3 - Chang Shu, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou:
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model. 4 - Zhenyue Long, Huiru Yan, Guiquan Shen, Xiaolu Zhang, Haoyang He, Long Cheng:
A Transformer-based network intrusion detection approach for cloud security. 5 - Yu Zhang, Sijie Xu, Hongyi Chen, Uzair Aslam Bhatti, Mengxing Huang:
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach. 6 - Qiao Su, Hongsu Wang, Haiyang Zhao, Yan Chu, Jie Li, Xuan Lyu, Zijuan Li:
Edge-cloud computing cooperation detection of dust concentration for risk warning research. 7 - M. Pavithra, M. Prakash, V. Vennila:
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud. 8 - Zheng Yu, Songyu Wu, Jielin Jiang, Dongqing Liu:
A knowledge-graph based text summarization scheme for mobile edge computing. 9 - Bo Xu, Uzair Aslam Bhatti, Hao Tang, Jialin Yan, Shulei Wu, Nadia Sarhan, Emad Mahrous Awwad, Syam Melethil Sethumadhavan, Yazeed Yasin Ghadi:
Towards explainability for AI-based edge wireless signal automatic modulation classification. 10 - Jixian Zhang, Zhemin Wang, Athanasios V. Vasilakos, Weidong Li:
A resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit. 11 - Lina Dinesh, K. Gayathri Devi:
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture. 12 - Biao Dong, Jinhui Chen:
An adaptive routing strategy in P2P-based Edge Cloud. 13 - Xuefei Chen, Shouxin Sun, Chao Chen, Xinlong Song, Qiulan Wu, Feng Zhang:
Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing. 14 - Jie Huang, Jiangyi Yi:
The key security management scheme of cloud storage based on blockchain and digital twins. 15 - Zicong Miao, Weize Li, Xiaodong Pan:
Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin. 16 - Bei Liu, Wenlin Li, Xin Su, Xibin Xu:
An improved ACO based service composition algorithm in multi-cloud networks. 17 - Shizhan Lan, Zhuoxi Duan, Song Lu, Bin Tan, Shi Chen, Yeyu Liang, Shan Chen:
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems. 18 - Huimin Han, Muhammad Asif, Emad Mahrous Awwad, Nadia Sarhan, Yazeed Yasin Ghadi, Bo Xu:
Innovative deep learning techniques for monitoring aggressive behavior in social media posts. 19 - Huimin Han, Harold Neira-Molina, Asad Khan, Meie Fang, Haitham A. Mahmoud, Emad Mahrous Awwad, Bilal Ahmed, Yazeed Yasin Ghadi:
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns. 20 - Hongmin Gao, Pengfei Duan, Xiaofeng Pan, Xiaojing Zhang, Keke Ye, Ziyuan Zhong:
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0. 21 - Yun Luo, Yuling Chen, Tao Li, Chaoyue Tan, Hui Dou:
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption. 22 - Nawmi Nujhat, Fahmida Haque Shanta, Sujan Sarker, Palash Roy, Md. Abdur Razzaque, Md. Mamun-Or-Rashid, Mohammad Mehedi Hassan, Giancarlo Fortino:
Task offloading exploiting grey wolf optimization in collaborative edge computing. 23 - Chunling Dong, Yu Feng, Wenqian Shang:
A new method of dynamic network security analysis based on dynamic uncertain causality graph. 24 - Dengbo Li, Hanning Zhang, Jieren Cheng, Bernie Liu:
Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing. 25 - Gan Huang, Ihsan Ullah, Hanyao Huang, Kyung Tae Kim:
Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach. 26 - Lixiang Fu, Jinbiao Chen, Zhuoying Wang, Tao Zang, Huandong Chen, Shulei Wu, Yuchen Zhao:
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition. 27 - Jiaxing Guo, Dongliang Zhao, Chunxiang Gu, Xi Chen, Xieli Zhang, Mengcheng Ju:
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations. 28 - Shahzad Khan, Haider Abbas, Muhammad Binsawad:
Secure semantic search using deep learning in a blockchain-assisted multi-user setting. 29 - Junli Fang, Tao Feng, Xian Guo, Rong Ma, Ye Lu:
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials. 30 - Yue Yang, Jieren Cheng, Zhaowu Liu, Huimin Li, Ganglou Xu:
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching. 31 - Qi Liu, Jiawei Sun, Yonghong Zhang, Xiaodong Liu:
DenMerD: a feature enhanced approach to radar beam blockage correction with edge-cloud computing. 32 - Muhammad Asif, Muna S. Al-Razgan, Yasser A. Ali, Long Yunrong:
Graph convolution networks for social media trolls detection use deep feature extraction. 33 - Huimin Han, Zehua Liu, Jiuhao Li, Zhixiong Zeng:
Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI. 34 - Mohamed Abdel-Basset, Reda Mohamed, Ibrahim M. Hezam, Karam M. Sallam, Abdelaziz Foul, Ibrahim A. Hameed:
Multiobjective trajectory optimization algorithms for solving multi-UAV-assisted mobile edge computing problem. 35 - Hao Li, Wu Yang, Wei Wang, Huanran Wang:
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment. 36 - Mamoona Humayun, Amjad Alsirhani, Faeiz Alserhani, Momina Shaheen, Ghadah Alwakid:
Transformative synergy: SSEHCET - bridging mobile edge computing and AI for enhanced eHealth security and efficiency. 37 - Huiling Zhang, Huatao Wu, Zhengde Li, Wenwen Gong, Yan Yan:
Predicting the individual effects of team competition on college students' academic performance in mobile edge computing. 38 - Yue Pan, Andia Foroughi:
Evaluation of AI tools for healthcare networks at the cloud-edge interaction to diagnose autism in educational environments. 39 - Jing Chen, Shengyi Yang, Ting Gao, Yue Ying, Tian Li, Peng Li:
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing. 40 - Junyan Chen, Wei Xiao, Hongmei Zhang, Jiacheng Zuo, Xinmei Li:
Dynamic routing optimization in software-defined networking based on a metaheuristic algorithm. 41 - Mohammad Zunnun Khan, Mohd Shoaib, Mohammad Shahid Husain, Khair ul Nisa, Mohammad Tabrez Quasim:
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach. 42 - Noshina Tariq, Amjad Alsirhani, Mamoona Humayun, Faeiz Alserhani, Momina Shaheen:
A fog-edge-enabled intrusion detection system for smart grids. 43 - Guijiang Liu, Haibo Xie, Wenming Wang, Haiping Huang:
A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption. 44 - Paromita Goswami, Neetu Faujdar, Somen Debnath, Ajoy Kumar Khan, Ghanshyam Singh:
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. 45 - Yanal Alahmad, Anjali Agarwal:
Multiple objectives dynamic VM placement for application service availability in cloud networks. 46 - Meiyan Li, Qinyong Wang, Yuwei Liao:
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing. 47 - Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali:
Edge intelligence-assisted animation design with large models: a survey. 48 - S. Gayathri, D. Surendran:
Unified ensemble federated learning with cloud computing for online anomaly detection in energy-efficient wireless sensor networks. 49 - Rubaina Nazeer, Sajid Ali, Zhihua Hu, Ghulam Jillani Ansari, Muna S. Al-Razgan, Emad Mahrous Awwad, Yazeed Yasin Ghadi:
Detection of cotton leaf curl disease's susceptibility scale level based on deep learning. 50 - Ben Roullier, Frank McQuade, Ashiq Anjum, Craig Bower, Lu Liu:
Automated visual quality assessment for virtual and augmented reality based digital twins. 51 - Momina Shaheen, Muhammad Shoaib Farooq, Tariq Umer:
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost. 52 - Guohao Tang, Huaying Zhao, Baohua Yu:
Low-cost and high-performance abnormal trajectory detection based on the GRU model with deep spatiotemporal sequence analysis in cloud computing. 53 - Huirui Han, Bandeh Ali Talpur, Wei Liu, Limei Wang, Bilal Ahmed, Nadia Sarhan, Emad Mahrous Awwad:
RNA-RBP interactions recognition using multi-label learning and feature attention allocation. 54 - Wen Xing, Adam Slowik, J. Dinesh Peter:
Edge-cloud computing oriented large-scale online music education mechanism driven by neural networks. 55 - Yu Hu, Feipeng Qiu, Fei Zheng, Jilong Zhao:
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning. 56 - Kai Yang, Jiawei Du, Jingchao Liu, Feng Xu, Ye Tang, Ming Liu, Zhibin Li:
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records. 57 - Shun Jiao, Haiyan Wang, Jian Luo:
SRA-E-ABCO: terminal task offloading for cloud-edge-end environments. 58 - Zhiqing Bai, Caizhong Li, Javad Pourzamani, Xuan Yang, Dejuan Li:
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure. 59 - A. A. Periola:
TCP Stratos for stratosphere based computing platforms. 60 - Weiwei Miao, Yuanyi Xia, Rui Zhang, Xinjian Zhao, Qianmu Li, Tao Wang, Shunmei Meng:
A secure data interaction method based on edge computing. 61 - Huiyong Wang, Qi Wang, Yong Ding, Shijie Tang, Yujue Wang:
Privacy-preserving federated learning based on partial low-quality data. 62 - Uma Rani, Sunil Kumar, Neeraj Dahiya, Kamna Solanki, Shanu Rakesh Kuttan, Sajid Shah, Momina Shaheen, Faizan Ahmad:
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications. 63 - Asha Varma Songa, Ganesh Reddy Karri:
An integrated SDN framework for early detection of DDoS attacks in cloud computing. 64 - Mughair Aslam Bhatti, Zhiyao Song, Uzair Aslam Bhatti, Syam M. S:
AIoT-driven multi-source sensor emission monitoring and forecasting using multi-source sensor integration with reduced noise series decomposition. 65 - Qing He, Hua Zhao, Yu Feng, Zehao Wang, Zhaofeng Ning, Tingwei Luo:
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks. 66 - Mengmeng Cui, Shizhong Zhao, Jinfeng Yao:
Short-term forecasting of surface solar incident radiation on edge intelligence based on AttUNet. 67 - Kang Song, Wenqian Shang, Yong Zhang, Tong Yi, Xuan Wang:
Security issues of news data dissemination in internet environment. 68 - Gaoxian Peng, Yiping Wen, Wanchun Dou, Tiancai Li, Xiaolong Xu, Qing Ye:
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment. 69 - Lei Chen, Chong Guo, Bei Gong, Muhammad Waqas, Lihua Deng, Haowen Qin:
A secure cross-domain authentication scheme based on threshold signature for MEC. 70 - Seungyong Yang, Brent ByungHoon Kang, Jaehyun Nam:
Optimus: association-based dynamic system call filtering for container attack surface reduction. 71 - Xin He, Feifan Liang, Weibei Fan, Junchang Wang, Lei Han, Fu Xiao, Wanchun Dou:
Accurate and fast congestion feedback in MEC-enabled RDMA datacenters. 72 - Yanjie Li, Liqin Kang, Zhaojin Li, Fugao Jiang, Nan Bi, Tao Du, Maryam Abiri:
Time-aware outlier detection in health physique monitoring in edge-aided sport education decision-makings. 73 - Juan Liu, Xiaohong Deng, Wangchun Li, Kangting Li:
CG-PBFT: an efficient PBFT algorithm based on credit grouping. 74 - Kai Yang, Jiawei Du, Jingchao Liu, Feng Xu, Ye Tang, Ming Liu, Zhibin Li:
Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records. 75 - Ziwen Zhang, Qi Liu, Xiaodong Liu, Yonghong Zhang, Zihao Du, Xuefei Cao:
PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing. 76 - Huimin Han, Harold Neira-Molina, Asad Khan, Meie Fang, Haitham A. Mahmoud, Emad Mahrous Awwad, Bilal Ahmed, Yazeed Yasin Ghadi:
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns. 77 - Fanlong Zhang, Mengcheng Li, Heng Wu, Tao Wu:
Intelligent code search aids edge software development. 78 - Abdullah Lakhan, Tor-Morten Grønli, Paolo Bellavista, Sajida Memon, Maher Alharby, Orawit Thinnukool:
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks. 79 - Ridlo Sayyidina Auliya, Yen-Lin Lee, Chia-Ching Chen, Deron Liang, Wei-Jen Wang:
Analysis and prediction of virtual machine boot time on virtualized computing environments. 80 - ChuanFu Zhang, Jing Chen, Wen Li, Hao Sun, Yudong Geng, Tianxiang Zhang, Mingchao Ji, Tonglin Fu:
A cloud-edge collaborative task scheduling method based on model segmentation. 81 - Carlos Reaño, José V. Riera, Verónica Romero, Pedro Morillo, Sergio Casas-Yrurzum:
A cloud-edge computing architecture for monitoring protective equipment. 82 - Siren Zhao, Jilun Zhang, Jianbin Zhang:
Predicting UPDRS in Parkinson's disease using ensembles of self-organizing map and neuro-fuzzy. 83 - Tao Shen, Lu Zhang, Renkang Geng, Shuai Li, Bin Sun:
Traffic prediction for diverse edge IoT data using graph network. 84 - Naglaa Abdelhady, Taysir Hassan A. Soliman, Mohammed F. Farghally:
Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets. 85 - Velmurugan Sambath, Mohan Prakash, S. Neelakandan, Arun Radhakrishnan:
Provably secure data selective sharing scheme with cloud-based decentralized trust management systems. 86 - Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali:
Correction to: Edge intelligence‑assisted animation design with large models: a survey. 87 - Veni Thangaraj, Thankaraja Raja Sree:
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments. 88 - Mohammad Rostami, Salman Goli-Bidgoli:
An overview of QoS-aware load balancing techniques in SDN-based IoT networks. 89 - Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang:
Cross-chain asset trading scheme for notaries based on edge cloud storage. 90 - Chengping Zhang, Muhammad Aamir, Yurong Guan, Muna S. Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti, Yazeed Yasin Ghadi:
Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN. 91 - Sihan Chen, Wanchun Jiang:
Online dynamic multi-user computation offloading and resource allocation for HAP-assisted MEC: an energy efficient approach. 92 - Yazeed Yasin Ghadi, Syed Faisal Abbas Shah, Tehseen Mazhar, Tariq Shahzad, Khmaies Ouahada, Habib Hamam:
Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools. 93 - Gorka Nieto, Idoia de la Iglesia, Unai Lopez-Novoa, Cristina Perfecto:
Deep Reinforcement Learning techniques for dynamic task offloading in the 5G edge-cloud continuum. 94 - Shujie Tian, Yuexia Zhang, Yanxian Bi, Taifu Yuan:
Blockchain-based 6G task offloading and cooperative computing resource allocation study. 95 - Xinjian Zhao, Guoquan Yuan, Shuhan Qiu, Chenwei Xu, Shanming Wei:
A mobile edge computing-focused transferable sensitive data identification method based on product quantization. 96 - Guangshun Li, Haoyang Wu, Junhua Wu, Zhenqiang Li:
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain. 97 - Ping Liu, Dai Shi, Bin Zang, Xiang Liu:
Students health physique information sharing in publicly collaborative services over edge-cloud networks. 98 - Marta Rózanska, Geir Horn:
Constrained optimal grouping of cloud application components. 99 - Hailang Cheng, Mengmeng Cui, Yuzhe Shi:
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting. 100 - R. Julian Menezes, P. Jesu Jayarin, A. Chandra Sekar:
A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems. 101 - Yuwen Shao, Na Guo:
Recognizing online video genres using ensemble deep convolutional learning for digital media service management. 102 - Juan Chen, Rui Zhang, Peng Chen, Jianhua Ren, Zongling Wu, Yang Wang, Xi Li, Ling Xiong:
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices. 103 - Fangru Lin, Jie Yuan, Zhiwei Chen, Maryam Abiri:
Enhancing multimedia management: cloud-based movie type recognition with hybrid deep learning architecture. 104 - Karan Kumar K, Mounica Nutakki, Suprabhath Koduru, Srihari Mandava:
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models. 105 - Ping Liu, Xiang Liu, Bin Zang, Guoyan Diao:
Privacy-preserving sports data fusion and prediction with smart devices in distributed environment. 106 - Rui Huang, Tinghuai Ma, Huan Rong, Kai Huang, Nan Bi, Ping Liu, Tao Du:
Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks. 107 - Zhen Zhang, Chen Xu, Shaohua Xu, Long Huang, Jinyu Zhang:
Towards optimized scheduling and allocation of heterogeneous resource via graph-enhanced EPSO algorithm. 108 - Mohammadreza Aminian, Mehdi Jafari Shahbazzadeh, Mahdiyeh Eslami:
Distance optimization and directional overcurrent relay coordination using edge-powered biogeography-genetic algorithms. 109 - Hao Feng, Kun Cao, Gan Huang, Hao Liu:
ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction. 110 - Chengping Zhang, Muhammad Aamir, Yurong Guan, Muna S. Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti, Yazeed Yasin Ghadi:
Correction to: Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN. 111 - Danial Shiraly, Ziba Eslami, Nasrollah Pakniat:
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data. 112 - Hamza Sulimani, Rahaf Sulimani, Fahimeh Ramezani, Mohsen Naderpour, Huan Huo, Tony Jan, Mukesh Prasad:
HybOff: a Hybrid Offloading approach to improve load balancing in fog environments. 113 - Hao Zhong, Dong Yang, Shengdong Shi, Lai Wei, Yanyan Wang:
From data to insights: the application and challenges of knowledge graphs in intelligent audit. 114 - Hongxia He, Xi Li, Peng Chen, Juan Chen, Ming Liu, Lei Wu:
Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework. 115 - Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun, Sufang Zhou, Chunfu Jia:
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system. 116 - Xiao Zheng, Muhammad Tahir, Khursheed Aurangzeb, Muhammad Shahid Anwar, Muhammad Aamir, Ahmad Farzan, Rizwan Ullah:
Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems. 117 - Jiageng Yang, Chuanyi Liu, Binxing Fang:
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications. 118 - Chaoyang Zhu:
Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users. 119 - Zhichao Hu, Xiangzhan Yu, Likun Liu, Yu Zhang, Haining Yu:
ASOD: an adaptive stream outlier detection method using online strategy. 120 - Daokun Qi, Xiaojuan Xi, Yake Tang, Yuesong Zheng, Zhengwei Guo:
Real-time scheduling of power grid digital twin tasks in cloud via deep reinforcement learning. 121 - Xinying Zhu, Ran Xia, Hang Zhou, Shuo Zhou, Haoran Liu:
An intelligent decision system for virtual machine migration based on specific Q-learning. 122 - Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, Tauqeer Safdar Malik, Ali Haider Khan, Jawad Tanveer, Ateeq Ur Rehman:
Enhancing intrusion detection: a hybrid machine and deep learning approach. 123 - Jeongmin Lee, Hyeongbin Kang, Hyeon-jin Yu, Ji-Hyun Na, Jungbin Kim, Jae-Hyuck Shin, Seo-Young Noh:
MDB-KCP: persistence framework of in-memory database with CRIU-based container checkpoint in Kubernetes. 124 - Chunwang Wu, Xiaolei Liu, Kangyi Ding, Bangzhou Xin, Jiazhong Lu, Jiayong Liu, Cheng Huang:
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning. 125 - Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Neetu Faujdar, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Sultan Abdullah Algarni:
Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation. 126 - Syed Sabir Mohamed S, Gopi R, Thiruppathy Kesavan V, Karthikeyan Kaliyaperumal:
Adaptive heuristic edge assisted fog computing design for healthcare data optimization. 127 - Min Zhao, Junwen Lu:
Energy-aware tasks offloading based on DQN in medical mobile devices. 128 - Somchart Fugkeaw, Phatwasin Suksai, Lyhour Hak:
SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse. 129 - Muhammad Awais, Yousaf Saeed, Abid Ali, Sohail Jabbar, Awais Ahmad, Yazeed Alkhrijah, Umar Raza, Yasir Saleem:
Deep learning based enhanced secure emergency video streaming approach by leveraging blockchain technology for Vehicular AdHoc 5G Networks. 130 - Yujia Lin, Li-Ming Chen, Aftab Ali, Christopher Nugent, Ian Cleland, Rongyang Li, Jianguo Ding, Huansheng Ning:
Human digital twin: a survey. 131 - Syed Imran Akhtar, Abdul Rauf, Haider Abbas, Muhammad Faisal Amjad, Ifra Batool:
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins. 132 - Zhen Zhang, Chen Xu, Jinyu Zhang, Zhe Zhu, Shaohua Xu:
When wavelet decomposition meets external attention: a lightweight cloud server load prediction model. 133 - Jomina John, John Singh K:
Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation. 134 - Naif Alsharabi, Jalel Ktari, Tarek Frikha, Abdulaziz Alayba, Abdullah J. Alzahrani, Amr Jadi, Habib Hamam:
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future. 135 - Chunhong Liu, Huaichen Wang, Mengdi Zhao, Jialei Liu, Xiaoyan Zhao, Peiyan Yuan:
Dependency-aware online task offloading based on deep reinforcement learning for IoV. 136 - Lei Zhang, Shaoming Zhu, Shen Su, Xiaofeng Chen, Yan Yang, Bing Zhou:
Wind power prediction method based on cloud computing and data privacy protection. 137 - Li Ma, Binbin Duan, Bo Zhang, Yang Li, Yingxun Fu, Dongchao Ma:
A trusted IoT data sharing method based on secure multi-party computation. 138 - Arun Amaithi Rajan, V. Vetriselvi, Mayank Raikwar, Reshma Balaraman:
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud. 139 - Kan Ni, Subrota Kumar Mondal, Hussain Mohammed Dipu Kabir, Tan Tian, Hong-Ning Dai:
Toward security quantification of serverless computing. 140 - Prateek Yadav, Subrat Kar:
A cost-efficient content distribution optimization model for fog-based content delivery networks. 141 - A. Sherly Alphonse, S. Abinaya, Nishant Kumar:
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet. 142 - Yongsik Kim, Gunho Park, Huy Kang Kim:
Domain knowledge free cloud-IDS with lightweight embedding method. 143 - Fan Zhang, Peichen Yang, Rongyang Li, Sha Li, Jianguo Ding, Jiabo Xu, Huansheng Ning:
A multi-strategy ontology mapping method based on cost-sensitive SVM. 144 - Yan Zheng, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Chang Shu, Lang Chen:
Optimization model for vehicular network data queries in edge environments. 145 - Aarti Punia, Preeti Gulia, Nasib Singh Gill, Ebuka Ibeke, Celestine Iwendi, Piyush Kumar Shukla:
A systematic review on blockchain-based access control systems in cloud environment. 146 - Akif Quddus Khan, Mihhail Matskin, Radu Prodan, Christoph Bussler, Dumitru Roman, Ahmet Soylu:
Cost modelling and optimisation for cloud: a graph-based approach. 147 - Guozheng Peng, Xiaoyun Shi, Jun Zhang, Lisha Gao, Yuanpeng Tan, Nan Xiang, Wanguo Wang:
BGFL: a blockchain-enabled group federated learning at wireless industrial edges. 148 - Vankamamidi S. Naresh, Ayyappa D:
PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach. 149 - Usman Ahmed, Jiangbin Zheng, Ahmad Almogren, Sheharyar Khan, Muhammad Tariq Sadiq, Ayman Altameem, Ateeq Ur Rehman:
Explainable AI-based innovative hybrid ensemble model for intrusion detection. 150 - Md Sharafat Hossain, Md. Alamgir Hossain, Md. Saiful Islam:
I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach. 151 - Luyao Pei, Cheng Xu, Xueli Yin, Jinsong Zhang:
Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management. 152 - Yining Chen, Kai Peng, Chengfang Ling:
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories. 153 - Junli Fang, Tao Feng, Xian Guo, Xusheng Wang:
Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity. 154 - Yasir Ali, Habib Ullah Khan, Faheem Khan, Yeon-Kug Moon:
Building integrated assessment model for IoT technology deployment in the Industry 4.0. 155 - Shusmoy Chowdhury, Ajay Katangur, Alaa Sheta:
Optimization of datacenter selection through a genetic algorithm-driven service broker policy. 156 - Himani Saini, Gopal Singh, Sandeep Dalal, Iyyappan Moorthi, Sultan Mesfer Aldossary, Nasratullah Nuristani, Arshad Hashmi:
A hybrid machine learning model with self-improved optimization algorithm for trust and privacy preservation in cloud environment. 157 - Saulo Ferreira, Júlio Mendonça, Bruno Nogueira, Willy Tiengo, Ermeson C. Andrade:
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications. 158
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.