2313 | -- | 2327 | Yizhuo Yang, Hongjin Zeng, Tingping Chen, Meng Lv. Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks |
2329 | -- | 2344 | Shilong Zhao, Gang Li, Mingle Zhou, Min Li. YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention |
2345 | -- | 2363 | Mohit, Sanmeet Kaur, Maninder Singh. Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership |
2365 | -- | 2379 | Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran. Machine learning-based intrusion detection: feature selection versus feature extraction |
2381 | -- | 2398 | Damon Alsup, Mohan Putluru, Suxia Cui, Yunpeng Zhang. Cloud security game theory scoring from predation models in simulation |
2399 | -- | 2426 | Olesia Pozdniakova, Aurimas Cholomskis, Dalius Mazeika. Self-adaptive autoscaling algorithm for SLA-sensitive applications running on the Kubernetes clusters |
2427 | -- | 2445 | Lamis Abdo, Imtiaz Ahmad, Sa'ed Abed. A smart admission control and cache replacement approach in content delivery networks |
2447 | -- | 2464 | Ali Siddique, Mang I Vai, Sio-Hang Pun. A low-cost, high-throughput neuromorphic computer for online SNN learning |
2465 | -- | 2488 | Bahman Varastan, Shahram Jamali, Reza Fotohi. Hardening of the Internet of Things by using an intrusion detection system based on deep learning |
2489 | -- | 2504 | Hani Al-Balasmeh, Maninder Singh, Raman Singh. Hilbert curves-based location privacy technique for vehicular cloud networks |
2505 | -- | 2523 | Chaira Mahmoud, Sofiane Aouag, Hadda Cherroun, Bouziane Brik, Abdelmounaam Rezgui. A decentralized blockchain-based authentication scheme for cross-communication in IoT networks |
2525 | -- | 2548 | Arslan Nedhir Malti, Mourad Hakem, Badr Benmammar. A new hybrid multi-objective optimization algorithm for task scheduling in cloud systems |
2549 | -- | 2569 | Jyothish A., Ashik Mathew, P. Vinod 0001. Effectiveness of machine learning based android malware detectors against adversarial attacks |
2571 | -- | 2591 | Shuai Chang, Chunlin Li 0001, ChunPing Deng, Youlong Luo. Low-latency controller load balancing strategy and offloading decision generation algorithm based on lyapunov optimization in SDN mobile edge computing environment |
2593 | -- | 2609 | Deepika Kumari, Pankaj Kumar, Sunil Prajapat. A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services |
2611 | -- | 2634 | Animesh Kuity, Sateesh Kumar Peddoju. pHPCe: a hybrid power conservation approach for containerized HPC environment |
2635 | -- | 2651 | Amer Al-Rahayfeh, Saleh Atiewi, Muder Almiani, Mohammad Jararweh, Miad Faezipour. Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer's Disease diagnosis |
2653 | -- | 2671 | Shaoyong Li, Xueshu Hong, Yao Feng. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile |
2673 | -- | 2690 | Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, Aida Valipour, Bahman Arasteh. Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM |
2691 | -- | 2713 | Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tai-Hoon Kim. RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things |
2715 | -- | 2740 | Reyhaneh Ameri, Mohammad Reza Meybodi. The cellular goore game-based consensus protocol: a cognitive model for blockchain consensus |
2741 | -- | 2759 | Bing Tang, Huiyuan Han, Qing Yang, Wei Xu. Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure |
2761 | -- | 2773 | Yihong Liu, Xuchang Liu, Bo Zhang. RetinaNet-vline: a flexible small target detection algorithm for efficient aggregation of information |
2775 | -- | 2784 | Xiao Zhang. Mixtran: an efficient and fair scheduler for mixed deep learning workloads in heterogeneous GPU environments |
2785 | -- | 2803 | Hemant Mahajan, K. T. V. Reddy. Secure gene profile data processing using lightweight cryptography and blockchain |
2805 | -- | 2827 | Ankita Srivastava, Narander Kumar. An efficient firefly and honeybee based load balancing mechanism in cloud infrastructure |
2829 | -- | 2843 | Biroju Papachary, Rajeev Arya 0001, Bhasker Dappuri. Efficient resource allocation with dynamic traffic arrivals on D2D communication for beyond 5G networks |
2845 | -- | 2874 | Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor. Improved clustering-based hybrid recommendation system to offer personalized cloud services |
2875 | -- | 0 | Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor. Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services |
2877 | -- | 2900 | Kariyappa Janani, Sriramulu Ramamoorthy. A security framework to enhance IoT device identity and data access through blockchain consensus model |
2901 | -- | 2915 | Zhanyou Ma, Miao Yan, Rong Wang, Shunzhi Wang. Performance analysis of P2p network content delivery based on queueing model |
2917 | -- | 2929 | Thanasis Moustakas, Kostas Kolomvatsos. Cluster based similarity extraction upon distributed datasets |
2931 | -- | 2946 | Yi Wan. The balance of utility, privacy, and trust in network services |
2947 | -- | 2958 | M. Gayathri Santhosh, T. R. Reshmi. A novel revocation management for distributed environment: a detailed study |
2959 | -- | 2970 | Gongbo Liang, Mohammad Salem Atoum, Xin-xing, Izzat Alsmadi. Benchmark assessment for the DeepSpeed acceleration library on image classification |
2971 | -- | 2982 | Abdelaziz Mokhnache, Lahcene Ziet, Fayçal Radjah. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context |
2983 | -- | 2998 | K. T. Jafseer, S. Shailesh, A. Sreekumar. CPOCEDS-concept preserving online clustering for evolving data streams |
2999 | -- | 3016 | D. Balakrishnan, T. Dhiliphan Rajkumar, S. Dhanasekaran, B. S. Murugan. Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC |
3017 | -- | 3035 | Ning Xie, Jixian Zhang, Xuejie Zhang 0002, Weidong Li. Double auction mechanisms in edge computing resource allocation for blockchain networks |
3037 | -- | 3054 | Dexin Zhu, Yu Sun, Nianfeng Li, Lijun Song, Jun Zheng. Secure electronic medical records sharing scheme based on blockchain and quantum key |
3055 | -- | 3073 | Rami Al-Jarrah, Hitham Tlilan, Abdallah Khreishah. Exploiting the adaptive neural fuzzy inference system for predicting the effect of notch depth on elastic new strain-concentration factor under combined loading |
3075 | -- | 3098 | Chen Xiaolong, Du Yu. Hybrid artificial immune algorithm for energy-efficient distributed flexible job shop in semiconductor manufacturing |
3099 | -- | 3111 | Ahmet Vedat Tokmak, Akhan Akbulut, Cagatay Catal. Boosting the visibility of services in microservice architecture |
3113 | -- | 3133 | Qihuan Wu, Xiaoming You, Sheng Liu. Multi-ant colony optimization algorithm based on game strategy and hierarchical temporal memory model |
3135 | -- | 3148 | Prabhjot Kaur, Nitin Kumar 0001. BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS |
3149 | -- | 3162 | Yuchen Zhang, Xiao Zhang, Jinyang Yu, Yulong Shi, Linxuan Su. Quantification and analysis of performance fluctuation in distributed file system |
3163 | -- | 3177 | Mahmoud Darwich, Taghreed Alghamdi, Kasem Khalil, Yasser Ismail, Magdy A. Bayoumi. Cost-optimized cloud resource management for video streaming: ARIMA predictive approach |
3179 | -- | 3201 | Neha Gahlan, Divyashikha Sethia. Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors |
3203 | -- | 3218 | Attia Qammar, Abdenacer Naouri, Jianguo Ding, Huansheng Ning. Blockchain-based optimized edge node selection and privacy preserved framework for federated learning |
3219 | -- | 3231 | Ju-Won Park, Xin Huang, Jae Kook Lee, Taeyoung Hong. I/O-signature-based feature analysis and classification of high-performance computing applications |
3233 | -- | 3257 | Jeong-Hoon Kim, Sun-Hyun Kim, Charn-Doh Bak, Seung-Jae Han. Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services |
3259 | -- | 3275 | Abdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi, Kegong Diao. Energy data classification at the edge: a comparative studyfor energy efficiency applications |
3277 | -- | 3291 | Liyan Xiong, Zhuyi Hu, Xinhua Yuan, Weihua Ding, Xiaohui Huang, Yuanchun Lan. Multi-scale attention graph convolutional recurrent network for traffic forecasting |
3293 | -- | 3305 | YuPing Yan, Yutian Hong. Design of the implementation information management platform for distributed generation in distribution network based on information integration |
3307 | -- | 3322 | Rami Mohawesh, Muna Al-Hawawreh, Sumbal Maqsood, Omar AlQudah. Factitious or fact? Learning textual representations for fake online review detection |
3323 | -- | 3339 | Hui Xiang, Meiyu Zhang, Chengfeng Jian. Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment |
3341 | -- | 3362 | Zeynep Garip, Ekin Ekinci, Murat Erhan Çimen. A comparative study of optimization algorithms for feature selection on ML-based classification of agricultural data |
3363 | -- | 3378 | Sana Aurangzeb, Muhammad Aleem, Muhammad Taimoor Khan 0001, Haris Anwar, Muhammad Shaoor Siddique. Cybersecurity for autonomous vehicles against malware attacks in smart-cities |
3379 | -- | 3395 | Olfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sèdes. Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications |
3397 | -- | 3416 | Ruiwen Wang, Jihong Liu, Qiang Zhang, Chao Fu, Yongzhu Hou. Federated learning for feature-fusion based requirement classification |
3417 | -- | 3432 | Shruti Arora, Rinkle Rani, Nitin Saxena 0002. SETL: a transfer learning based dynamic ensemble classifier for concept drift detection in streaming data |
3433 | -- | 3449 | Alberto Cabrera, Francisco Almeida, Dagoberto Castellanos Nieves, Ariel Oleksiak, Vicente Blanco Pérez. Energy efficient power cap configurations through Pareto front analysis and machine learning categorization |
3451 | -- | 3469 | Eduru Harindra Venkatesh, Yelleti Vivek, Vadlamani Ravi, Shiva Shankar Orsu. Parallel and streaming wavelet neural networks for classification and regression under apache spark |
3471 | -- | 3479 | Anirudh Kasturi, Akshat Agrawal, Chittaranjan Hota. Secure peer-to-peer learning using feature embeddings |
3481 | -- | 3498 | Tao Shen 0004, Qianqi Sun, Chi Zhang, Fenhua Bai. SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency |
3499 | -- | 3519 | Guilherme Andrade, Willian Barreiros, Leonardo Rocha 0001, Renato Ferreira, George Teodoro. Large-scale response-aware online ANN search in dynamic datasets |
3521 | -- | 3535 | Sara Amaouche, Azidine Guezzaz, Said Benkirane, Mourade Azrour. IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety |
3537 | -- | 3557 | Avtar Singh, Harpreet Kaur, Navjot Kaur. A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network |
3559 | -- | 3573 | Guoao Zhou, Lijuan Yu, Yixin Su, Bingrong Xu, Guoyuan Zhou. Lightweight PCB defect detection algorithm based on MSD-YOLO |
3575 | -- | 3591 | Lin Zhang, Lizhen Ji, Zongfang Ma. Target positioning method based on B-spline level set and GC Yolo-v3 |
3593 | -- | 3613 | Anusha Nalajala, Thirumalaisamy Ragunathan, Ranesh Naha, Sudheer Kumar Battula. Application and user-specific data prefetching and parallel read algorithms for distributed file systems |
3615 | -- | 3638 | Nasraldeen Alnor Adam Khleel, Károly Nehéz. Software defect prediction using a bidirectional LSTM network combined with oversampling techniques |
3639 | -- | 3655 | Alireza Souri, Monire Norouzi, Yousef Alsenani. A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things |
3657 | -- | 3682 | Vidyapati Jha, Priyanka Tripathi. Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT |
3683 | -- | 3702 | Mohd Akbar, Irshad Ahmad, Mohsina Mirza, Manavver Ali, Praveen Barmavatu. Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach |
3703 | -- | 3716 | Dong Yang, Ruyan Ren. A method of system selection for shuttle-based storage and retrieval system considering cost and performance |
3717 | -- | 3739 | Hussam N. Fakhouri, Sadi Alawadi, Feras M. Awaysheh, Faten Hamad. Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning |
3741 | -- | 3752 | Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, Marwa S. Moustafa, Mohamed Nabil Hassan. Blockchain-based biometric identity management |
3753 | -- | 3769 | Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis |
3771 | -- | 3798 | Farah Jemili, Rahma Meddeb, Ouajdi Korbaa. Intrusion detection based on ensemble learning for big data classification |
3799 | -- | 3817 | Mohammad Ali Alizadeh, Somayyeh Jafarali Jassbi, Ahmad Khademzadeh, Majid Haghparast. Novel lightweight and fine-grained fast access control using RNS properties in fog computing |
3819 | -- | 3836 | Somnath Chatterjee, Vaibhav Shaw, Ranit Das. Multi-stage intrusion detection system aided by grey wolf optimization algorithm |
3837 | -- | 3851 | Faquan Chen, Miaolei Deng, Hui Gao, Xiaoya Yang, Dexian Zhang. AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid |
3853 | -- | 3874 | Kheireddine Zaghouani, Badis Djamaa, Ali Yachir. DRDChain: a blockchain-based distributed resource directory for the internet of things |
3875 | -- | 3892 | Chanyoung Oh, Saehanseul Yi, Jongkyu Seok, Hyeonjin Jung, Illo Yoon, Youngmin Yi. Hybridhadoop: CPU-GPU hybrid scheduling in hadoop |
3893 | -- | 3910 | Zhengtao Jiang, Kai Li, Yong Wang, Meilin Liu, Huiqiang Li. A task allocation schema based on response time optimization in cloud computing |