Journal: J. Cloud Computing

Volume 12, Issue 1

1 -- 0Babneet Singh, Ravneet Kaur, C. Murray Woodside, John W. Chinneck. Low-power multi-cloud deployment of large distributed service applications with response-time constraints
2 -- 0Taolan Jin, Bo Zhang. Intermediate data fault-tolerant method of cloud computing accounting service platform supporting cost-benefit analysis
3 -- 0Xiaomei Liu, Ailing Gao, Chengxiang Chen, Mohammad Mahdi Moghimi. Lightweight similarity checking for English literatures in mobile edge computing
4 -- 0Neelam Singh, Yasir Hamid, Sapna Juneja, Gautam Srivastava 0001, Gaurav Dhiman, Thippa Reddy Gadekallu, Mohd Asif Shah. Load balancing and service discovery using Docker Swarm for microservice based big data applications
5 -- 0Muhammet Sinan Basarslan, Fatih Kayaalp. MBi-GRUMCONV: A novel Multi Bi-GRU and Multi CNN-Based deep learning model for social media sentiment analysis
6 -- 0Juncal Alonso, Leire Orue-Echevarria, Valentina Casola, Ana I. Torre-Bastida, Maider Huarte, Eneko Osaba, Jesus L. Lobo. Understanding the challenges and novel architectural models of multi-cloud native applications - a systematic literature review
7 -- 0Ruyue Xin, Hongyun Liu, Peng Chen, Zhiming Zhao. Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework
8 -- 0Monika Yadav, Atul Mishra. An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment
9 -- 0Saima Gulzar Ahmad, Tassawar Iqbal, Ehsan Ullah Munir, Naeem Ramzan. Cost optimization in cloud environment based on task deadline
10 -- 0Hadeel T. El Kassabi, Mohamed Adel Serhani, Mohammad M. Masud, Khaled Shuaib, Khaled Khalil. Deep learning approach to security enforcement in cloud workflow orchestration
11 -- 0Jiang Li, Jing Cai, Rui Li, Qiang Li, Lina Zheng. Wavelet transforms based ARIMA-XGBoost hybrid method for layer actions response time prediction of cloud GIS services
12 -- 0Sahand Hamzehei, Omid Akbarzadeh, Hani Attar, Khosro Rezaee, Nazanin Fasihihour, Mohammad Reza Khosravi. Predicting the total Unified Parkinson's Disease Rating Scale (UPDRS) based on ML techniques and cloud-based update
13 -- 0Xi Zhang, Taesun Kim. A hybrid attention and time series network for enterprise sales forecasting under digital management and edge computing
14 -- 0Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, Bijeta Seth, Deema Mohammed alsekait, Sarita Simaiya, Mounir Hamdi, Kaamran Raahemifar. Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
15 -- 0Tao Hai, Jincheng Zhou, Dayang N. A. Jawawi, Dan Wang, Uzoma I. Oduah, Cresantus Biamba, Sanjiv Kumar Jain. Task scheduling in cloud environment: optimization, security prioritization and processor selection schemes
16 -- 0Abdullah Alsaleh. Correction: Can cloudlet coordination support cloud computing infrastructure?
17 -- 0Hongxia Zhang, Dengyue Wang, Wei Zhang, Lizhuang Tan, Godfrey kibalya, Peiying Zhang, Kostromitin Konstantin Igorevich. QoS prediction in intelligent edge computing based on feature learning
18 -- 0Ya-guang Guo, Qian Yin, Yixiong Wang, Jun Xu, Leqi Zhu. Efficiency and optimization of government service resource allocation in a cloud computing environment
19 -- 0Xiaopeng Yu, Dianhua Tang, Wei Zhao. Privacy-preserving cloud-edge collaborative learning without trusted third-party coordinator
20 -- 0Li-zhe Chen, Ji Wu 0003, Haiyan Wang, Kui Zhang. A microservice regression testing selection approach based on belief propagation
21 -- 0Jianxun Tang, Mingsong Chen, Haoyu Chen, Shenqi Zhao, Yu Huang. A new dynamic security defense system based on TCP_REPAIR and deep learning
22 -- 0Lingyun Cui, Zhihao Qu, Guomin Zhang, Bin Tang, Baoliu Ye. A bidirectional DNN partition mechanism for efficient pipeline parallel training in cloud
23 -- 0Ivana Stupar, Darko Huljenic. Model-based cloud service deployment optimisation method for minimisation of application service operational cost
24 -- 0G. Saravanan, S. Neelakandan, P. Ezhumalai, Sudhanshu Maurya. Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing
25 -- 0Jiayuan Kong, Yanjun Zhang. DU-Net-Cloud: a smart cloud-edge application with an attention mechanism and U-Net for remote sensing images and processing
26 -- 0Prabhakar Krishnan, Kurunandan Jain, Amjad Aldweesh, P. Prabu 0001, Rajkumar Buyya. OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure
27 -- 0Yaozhong Ge, Yu-Chu Tian, Zu-Guo Yu, Weizhe Zhang. Memory sharing for handling memory overload on physical machines in cloud data centers
28 -- 0Ruihua Zhang, Jincheng Zhou, Tao Hai, Shixue Zhang, Marvellous GodsPraise Iwendi, Mohd Asif Shah, Jude Osamor. A big data study of language use and impact in radio broadcasting in China
29 -- 0Chaopeng Guo, Lin Zhengqing, Jie Song. A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving
30 -- 0Xiaoming Zhang. A fine-grained task scheduling mechanism for digital economy services based on intelligent edge and cloud computing
31 -- 0Min Yang, Chengmin Ge, Xiaoran Zhao, Huaizhen Kou. FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings
32 -- 0Yang Liu, Jin Zhang. A lightweight convolutional neural network based on dense connection for open-pit coal mine service identification using the edge-cloud architecture
33 -- 0Duan Xue, Yan Guo 0002, Ning Li 0011, Xiaoxiang Song, Lixiong Zhang. Cross-domain coordination of resource allocation and route planning for the edge computing-enabled multi-connected vehicles
34 -- 0Yu Sang, Yanfei Peng, Mingde Lu, Chen Zhao, Liquan Li, Tianjiao Ma. SeisDeNet: an intelligent seismic data Denoising network for the internet of things
35 -- 0Lei Yin, Jin Liu, Fengyu Zhou, Ming Gao, Ming Li. Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform
36 -- 0Dilshad Hassan Sallo, Gabor Kecskemeti. Enriching computing simulators by generating realistic serverless traces
37 -- 0BoXue Huang, Juntao Gao, Xuelian Li. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing
38 -- 0Shitharth Selvarajan, Gautam Srivastava 0001, Alaa O. Khadidos, Adil Omar Khadidos, Mohamed Baza, Ali Alshehri, Jerry Chun-Wei Lin. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
39 -- 0Yun Wu, Liangshun Wu, Hengjin Cai. Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation
40 -- 0Gayathri S, Gowri S. Securing medical image privacy in cloud using deep learning network
41 -- 0Doaa Mohamed, Osama Ismael. Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
42 -- 0Muhammad Aaqib, Aftab Ali, Liming Chen 0001, Omar Nibouche. IoT trust and reputation: a survey and taxonomy
43 -- 0Jianmin Li, Shunzhi Zhu. Service composition considering energy consumption of users and transferring files in a multicloud environment
44 -- 0Yuwei Du, Yao Li, Jiancai Chen, Yangyang Hao, Jiao Liu. Edge computing-based digital management system of game events in the era of Internet of Things
45 -- 0Feng Li, Caohui Wang. Artificial intelligence and edge computing for teaching quality evaluation based on 5G-enabled wireless communication technology
46 -- 0Xiaoyun Guang, Chunfeng Liu 0001, Wenyu Qu, Zhao Zhao. Dynamic data collection algorithm based on mobile edge computing in underwater internet of things
47 -- 0Ch. Rupa, Greeshmanth, Mohd Asif Shah. Novel secure data protection scheme using Martino homomorphic encryption
48 -- 0Aya Elouali, Higinio Mora Mora, Francisco José Mora-Gimeno. Data transmission reduction formalization for cloud offloading-based IoT systems
49 -- 0Liu Zhong. A convolutional neural network based online teaching method using edge-cloud computing platform
50 -- 0Ali Alzubaidi, Karan Mitra, Ellis Solaiman. A blockchain-based SLA monitoring and compliance assessment for IoT ecosystems
51 -- 0Jinping Sun, Dan Li. A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function
52 -- 0Pingping Li, Jiuxin Cao. Efficient online migration mechanism for memory write-intensive virtual machines
53 -- 0Yan Zhou, Huiling Shi, Yanling Zhao, Wei Ding, Jing Han, Hongyang Sun, Xianheng Zhang, Chang Tang, Wei Zhang. Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
54 -- 0Inayat Khan, Anwar Sadad, Gauhar Ali, Mohammed Ahmed El-Affendi, Razaullah Khan, Tariq Sadad. NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing
55 -- 0G. Saravanan, S. Neelakandan, P. Ezhumalai, Sudhanshu Maurya. Correction: Improved wild horse optimization with levy fight algorithm for effective task scheduling in cloud computing
56 -- 0Xiao Zheng, Syed Bilal Hussian Shah, Saeeda Usman, Saoucene Mahfoudh, Fathima Shemim KS, Piyush Kumar Shukla. Resource allocation and network pricing based on double auction in mobile edge computing
57 -- 0Jiangcheng Qin, Xueyuan Zhang, Baisong Liu, Jiangbo Qian. A split-federated learning and edge-cloud based efficient and privacy-preserving large-scale item recommendation model
58 -- 0Hongyun Liu, Ruyue Xin, Peng Chen 0007, Hui Gao, Paola Grosso, Zhiming Zhao. Robust-PAC time-critical workflow offloading in edge-to-cloud continuum among heterogeneous resources
59 -- 0Ningjiang Chen, Qingwei Zhong, YiFei Liu, Weitao Liu, Lin Bai, Liangqing Hu. Container cascade fault detection based on spatial-temporal correlation in cloud environment
60 -- 0Ding Hang Wang, Sile Jian. Intelligent evaluation model of basketball teaching reliability based on swarm intelligence and edge computing
61 -- 0Liang Yan, Lina Ge, Zhe Wang, Guifen Zhang, Jingya Xu, Zheng Hu. Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
62 -- 0Yuan Feng, Zhangdui Zhong, Xiaofang Sun, Lei Wang, Yunlong Lu, Yongsheng Zhu. Blockchain enabled zero trust based authentication scheme for railway communication networks
63 -- 0Urmil Bharti, Anita Goel, Suresh Chand Gupta. ReactiveFnJ: A choreographed model for Fork-Join Workflow in Serverless Computing
64 -- 0Yu Zhang, Haoyun Dong. Criminal law regulation of cyber fraud crimes - from the perspective of citizens' personal information protection in the era of edge computing
65 -- 0Manoj Kumar Patra, Bibhudatta Sahoo 0001, Ashok Kumar Turuk, Sanjay Misra. Task grouping and optimized deep learning based VM sizing for hosting containers as a service
66 -- 0Masoumeh Hajvali, Sahar Adabi, Ali Rezaee, Mehdi Hosseinzadeh. Decentralized and scalable hybrid scheduling-clustering method for real-time applications in volatile and dynamic Fog-Cloud Environments
67 -- 0Jiarui Qian, Yong Wang, Xiaoxue Wang, Peng Zhang, Xiaofeng Wang. Load balancing scheduling mechanism for OpenStack and Docker integration
68 -- 0Tao Hai, Jincheng Zhou, Ye Lu, Dayang N. A. Jawawi, Dan Wang, Edeh Michael Onyema, Cresantus Biamba. Enhanced security using multiple paths routine scheme in cloud-MANETs
69 -- 0Yangyang Hao, Zhaoyi Qiu, Qiner Xu, Qiuhong He, Xuemo Fang, Chuyun Wang. Innovation strategy design of public sports service governance based on cloud computing
70 -- 0Tiantian Wang. Effect of using 5G and cloud computing environment for independent college english vocabulary learning
71 -- 0D. Paulraj, S. Neelakandan, Mohan Prakash 0001, E. Baburaj. Admission control policy and key agreement based on anonymous identity in cloud computing
72 -- 0Qinghang Gao, Jianmao Xiao, Yuanlong Cao, ShuiGuang Deng, Chuying Ouyang, Zhiyong Feng. Blockchain-based collaborative edge computing: efficiency, incentive and trust
73 -- 0Tao Hai, Jincheng Zhou, Ye Lu, Dayang N. A. Jawawi, Dan Wang, Shitharth Selvarajan, Hariprasath Manoharan, Ebuka Ibeke. An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm
74 -- 0M. Suganya, T. Sasipraba. Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment
75 -- 0Xi Xiu, Jialun Li, Yujie Long, Weigang Wu. MRLCC: an adaptive cloud task scheduling method based on meta reinforcement learning
76 -- 0Lingkang Meng, Yingjie Wang 0002, Haipeng Wang, Xiangrong Tong, Zice Sun, Zhipeng Cai 0001. Task offloading optimization mechanism based on deep neural network in edge-cloud environment
77 -- 0Yuqin Sun, Lidong Han, Jingguo Bi, Xiao Tan, Qi Xie. Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud
78 -- 0Jinping Sun, Dan Li. Correction to: A cloud-oriented siamese network object tracking algorithm with attention network and adaptive loss function
79 -- 0Dawood Behbehani, Nikos Komninos, Khalid Al-Begain, Muttukrishnan Rajarajan. Cloud Enterprise Dynamic Risk Assessment (CEDRA): a dynamic risk assessment using dynamic Bayesian networks for cloud environment
80 -- 0Jiamuzi Xu. An accurate management method of public services based on big data and cloud computing
81 -- 0Rong Hu. Optimal urban competitiveness assessment using cloud computing and neural network
82 -- 0Chang Wang, Di Wang. Managing the integration of teaching resources for college physical education using intelligent edge-cloud computing
83 -- 0Yunxiao Wei, Chao Han, Zuolong Yu. An environment safety monitoring system for agricultural production based on artificial intelligence, cloud computing and big data networks
84 -- 0Li Mao, Rui Chen, Huiwen Cheng, Weiwei Lin 0001, Bo Liu, James Z. Wang. A resource scheduling method for cloud data centers based on thermal management
85 -- 0Jincheng Zhou, Umesh Kumar Lilhore, Poongodi M, Tao Hai, Sarita Simaiya, Dayang Norhayati Abang Jawawi, Deema Mohammed alsekait, Sachin Ahuja, Cresantus Biamba, Mounir Hamdi. Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
86 -- 0Yuan Xue, Jian Jin, Wen Sun, Weisi Lin. HVS-inspired adversarial image generation with high perceptual quality
87 -- 0Khaldoun Senjab, Sohail Abbas, Naveed Ahmed, Atta ur Rehman Khan. A survey of Kubernetes scheduling algorithms
88 -- 0Shenqiang Wang, Zhaowei Liu, Haiyang Wang, Jianping Wang. Ensuring security in edge computing through effective blockchain node detection
89 -- 0Zhaowei Liu, Weishuai Che, Shenqiang Wang, Jindong Xu, Haoyu Yin. A large-scale data security detection method based on continuous time graph embedding framework
90 -- 0Shilin Wen, Rui Han 0001, Chi Harold Liu, Lydia Y. Chen. Fast DRL-based scheduler configuration tuning for reducing tail latency in edge-cloud jobs
91 -- 0Naveed Khan, Sally I. McClean, Shuai Zhang 0001, Chris D. Nugent. Performance evaluation of multivariate statistical techniques using edge-enabled optimisation for change detection in activity monitoring
92 -- 0Ankit Kumar, Surbhi Bhatia Khan, Saroj Kumar Pandey, Achyut Shankar, Carsten Maple, Arwa A. Mashat, Areej A. Malibari. Development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities
93 -- 0Chuang Ma, Shuaiwu Liu, Guangxia Xu. HGAT: smart contract vulnerability detection method based on hierarchical graph attention network
93 -- 0Chuang Ma, Shuaiwu Liu, Guangxia Xu. HGAT: smart contract vulnerability detection method based on hierarchical graph attention network
94 -- 0Yasmina Bouizem, Djawida Dib, Nikos Parlavantzas, Christine Morin. Integrating request replication into FaaS platforms: an experimental evaluation
94 -- 0Yasmina Bouizem, Djawida Dib, Nikos Parlavantzas, Christine Morin. Integrating request replication into FaaS platforms: an experimental evaluation
95 -- 0Lei Yin, Jin Liu 0018, Yadong Fang, Ming Gao, Ming Li, Fengyu Zhou. Two-stage hybrid genetic algorithm for robot cloud service selection
95 -- 0Lei Yin, Jin Liu, Yadong Fang, Ming Gao, Ming Li, Fengyu Zhou. Two-stage hybrid genetic algorithm for robot cloud service selection
96 -- 0Waleed Alomoush, Osama Ahmed Khashan, Ayat Alrosan, Hani H. Attar, Ammar Almomani, Fuad Alhosban, Sharif Naser Makhadmeh. Digital image watermarking using discrete cosine transformation based linear modulation
97 -- 0Aya I. Maiyza, Noha O. Korany, Karim Banawan, Hanan A. Hassan, Walaa M. Sheta. VTGAN: hybrid generative adversarial networks for cloud workload prediction
98 -- 0Jianbo Du, Jiaju Lv, Guangyue Lu. Economical revenue maximization in mobile edge caching and blockchain enabled space-air-ground integrated networks
99 -- 0Tiange Zheng, Junhua Wu, Guangshun Li. IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing
100 -- 0Xiaolu Zhang, Lei Cui, Wuqiang Shen, Jijun Zeng, Li Du, Haoyang He, Long Cheng. File processing security detection in multi-cloud environments: a process mining approach
101 -- 0Naveed Khan, Jianbiao Zhang, Huhnkuk Lim, Jehad Ali, Intikhab Ullah, Muhammad Salman Pathan, Shehzad Ashraf Chaudhry. An ECC-based mutual data access control protocol for next-generation public cloud
102 -- 0Yu Xie, Qiyun Zhang, Khosro Rezaee, Yanwei Xu. Mobile computing-enabled health physique evaluation in campus based on amplified hashing
103 -- 0Adel Albshri, Ali Alzubaidi, Maher Alharby, Bakri Awaji, Karan Mitra, Ellis Solaiman. A conceptual architecture for simulating blockchain-based IoT ecosystems
104 -- 0Ankit Kumar, Surbhi Bhatia Khan, Saroj Kumar Pandey, Achyut Shankar, Carsten Maple, Arwa A. Mashat, Areej A. Malibari. Correction to: development of a cloud-assisted classification technique for the preservation of secure data storage in smart cities
105 -- 0Huan Chen 0002, Wei-Yan Chang, Tai-Lin Chiu, Ming-Chao Chiang, Chun-Wei Tsai. SEFSD: an effective deployment algorithm for fog computing systems
106 -- 0Qihui Li, Xiaohua Jia, Chuanhe Huang. A truthful dynamic combinatorial double auction model for cloud resource allocation
107 -- 0Jie Chen, Yajing Leng, Jiwei Huang. An intelligent approach of task offloading for dependent services in Mobile Edge Computing
108 -- 0Rafael Moreno-Vozmediano, Eduardo Huedo, Rubén S. Montero, Ignacio Martín Llorente. Latency and resource consumption analysis for serverless edge analytics
109 -- 0Jianlong Zhang, Tianhong Wang, Bin Wang, Chen Chen, Gang Wang. Hyperparameter optimization method based on dynamic Bayesian with sliding balance mechanism in neural network for cloud computing
110 -- 0Aijing Sun, Guoqing Wang, Qi Han. Recommend what to cache: a simple self-supervised graph-based recommendation framework for edge caching networks
111 -- 0Somchart Fugkeaw. An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain
112 -- 0Ihsan Ullah 0004, Hyun-kyo Lim, Yeong-Jun Seok, Youn-Hee Han. Optimizing task offloading and resource allocation in edge-cloud networks: a DRL approach
113 -- 0Pengfei Hu, Chunming He, Yiming Zhu, Tianhui Li. The product quality inspection scheme based on software-defined edge intelligent controller in industrial internet of things
114 -- 0Qirui Li, Zhiping Peng, Delong Cui, Jianpeng Lin, Hao Zhang. UDL: a cloud task scheduling framework based on multiple deep neural networks
115 -- 0Qiang Hu, Haoquan Qi, Wen Huang, Minghua Liu. A method to recommend cloud manufacturing service based on the spectral clustering and improved Slope one algorithm
116 -- 0Jianbing Zhang, Shufang Ma, Zexiao Yan, Jiwei Huang. Joint DNN partitioning and task offloading in mobile edge computing via deep reinforcement learning
117 -- 0Ruonan Shi, Yuling Chen, Chaoyue Tan, Yun Luo, Tao Li. ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
118 -- 0Xiaolong Li, Tingting Wang, Wei Zhang, Xu Niu, Tingyu Zhang, Tengteng Zhao, Yongji Wang, Yufei Wang. An LSTM based cross-site scripting attack detection scheme for Cloud Computing environments
119 -- 0Yuze Huang, Beipeng Feng, Yuhui Cao, Zhenzhen Guo, Miao Zhang, Boren Zheng. Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds
120 -- 0Chunhai Li, Qiyong Chen, Mingfeng Chen, Zhaoyu Su, Yong Ding 0005, Dapeng Lan, Amir Taherkordi. Blockchain enabled task offloading based on edge cooperation in the digital twin vehicular edge network
121 -- 0Ruohan Wang, Yunlong Chen, Entang Li, Lixuan Che, Hongwei Xin, Jing Li, Xueyao Zhang. Joint optimization of energy trading and consensus mechanism in blockchain-empowered smart grids: a reinforcement learning approach
122 -- 0Nan Yang, Li Yang, Xingzhou Du, Xunyi Guo, Fanke Meng, Yuwen Zhang. Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario
123 -- 0Ruohan Shi, Qilin Fan, Shu Fu, Xu Zhang 0006, Xiuhua Li, Meng Chen. COCAM: a cooperative video edge caching and multicasting approach based on multi-agent deep reinforcement learning in multi-clouds environment
124 -- 0Arunkumar Gopu, Kalaipriyan Thirugnanasambandam, Rajakumar Ramalingam, Ahmed Saeed Alghamdi, Sultan S. Alshamrani, K. Maharajan, Mamoon Rashid. Energy-efficient virtual machine placement in distributed cloud using NSGA-III algorithm
125 -- 0Shuo Zhang, Zhuofeng Zhao, Chen Liu, Shenghui Qin. Data-intensive workflow scheduling strategy based on deep reinforcement learning in multi-clouds
126 -- 0Yunfeng Duan, Chenxu Li, Guotao Bai, Guo Chen, Fanqin Zhou, Jiaxing Chen, Zehua Gao, Chun Zhang. MFGAD-INT: in-band network telemetry data-driven anomaly detection using multi-feature fusion graph deep learning
127 -- 0Abdel-Rahman Al-Ghuwairi, Yousef Sharrab, Dimah Al-Fraihat, Ahmad Al-Elaimat, Ayoub Alsarhan, Abdulmohsen Algarni. Intrusion detection in cloud computing based on time series anomalies utilizing machine learning
128 -- 0Fatty M. Salem, Maha Safwat, Rasha Fathy, Shahira Habashy. AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments
129 -- 0Lei Yu, Yucong Duan. AI-empowered game architecture and application for resource provision and scheduling in multi-clouds
130 -- 0Suqin Zhang, Lin Zhang, Fei Xu, Song Cheng, Weiya Su, Sen Wang. Dynamic deployment method based on double deep Q-network in UAV-assisted MEC systems
131 -- 0Lili Nie, Huiqiang Wang, Guangsheng Feng, Jiayu Sun, Hongwu Lv, Hang Cui. A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection
132 -- 0Binbin Huang, Ziqi Ran, Dongjin Yu, Yuanyuan Xiang, Xiaoying Shi, Zhongjin Li, Zhengqian Xu. Stateless Q-learning algorithm for service caching in resource constrained edge environment
133 -- 0Pablo C. Cañizares, Alberto Núñez, Adrian Bernal, María-Emilia Cambronero, Adam Barker. Simcan2Cloud: a discrete-event-based simulator for modelling and simulating cloud computing infrastructures
134 -- 0Syed Mohamed Thameem Nizamudeen. Intelligent intrusion detection framework for multi-clouds - IoT environment using swarm-based deep learning classifier
135 -- 0Amjad Ullah, Tamás Kiss, József Kovács, Francesco Tusa, James DesLauriers, Huseyin Dagdeviren, Resmi Arjun, Hamed Hamzeh. Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions
136 -- 0Lei Liu, Haoran He, Fei Qi 0002, Yikun Zhao, Weiliang Xie, Fanqin Zhou, Lei Feng. HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning
137 -- 0Surjeet Dalal, Umesh Kumar Lilhore, Neetu Foujdar, Sarita Simaiya, Manel Ayadi 0001, Nouf A. Almujally, Amel Ksibi. Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree
138 -- 0S. Rajkumar, Jeevaa Katiravan. Virtualized intelligent genetic load balancer for federated hybrid cloud environment using deep belief network classifier
139 -- 0M. Sasikumar, P. Jesu Jayarin, F. Sangeetha Francelin Vinnarasi. A Hierarchical Optimized Resource Utilization based Content Placement (HORCP) model for cloud Content Delivery Networks (CDNs)
140 -- 0Zhiming Zhang, Wei Yang, Fuying Wu, Ping Li. Privacy and integrity-preserving data aggregation scheme for wireless sensor networks digital twins
141 -- 0Qianru Lv, Xuyan Jiang, Xiangrui Yang. Making programmable packet scheduling time-sensitive with a FIFO queue
142 -- 0Jianjie Ding, Lina Han, Jie Li, Dajun Zhang. Resource allocation strategy for blockchain-enabled NOMA-based MEC networks
143 -- 0Soudabeh Hedayati, Neda Maleki, Tobias Olsson, Fredrik Ahlgren, Mahdi Seyednezhad, Kamal Berahmand. MapReduce scheduling algorithms in Hadoop: a systematic study
144 -- 0Surjeet Dalal, Umesh Kumar Lilhore, Neetu Faujdar, Sarita Simaiya, Manel Ayadi 0001, Nouf Abdullah Almujally, Amel Ksibi. Correction to: Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree
145 -- 0Jie Song, Haifei Fu, Tianzhe Jiao, Dongqi Wang. AI-enabled legacy data integration with privacy protection: a case study on regional cloud arbitration court
146 -- 0Hongwei Li, Qiyuan Xu, Qilin Wang, Bin Tang. A Review of Intelligent Verification System for Distribution Automation Terminal based on Artificial Intelligence Algorithms
147 -- 0Li Zhu, Qingheng Zhuang, Hailin Jiang, Hao Liang, Xinjun Gao, Wei Wang. Reliability-aware failure recovery for cloud computing based automatic train supervision systems in urban rail transit using deep reinforcement learning
148 -- 0Hongfan Ye, Buqing Cao, Jianxun Liu 0001, Pei Li, Bing Tang, Zhenlian Peng. An edge server deployment method based on optimal benefit and genetic algorithm
149 -- 0Mingzeng Zhu, Mingzhen Liang, Hefeng Li, Ying Lu, Min Pang. Intelligent acceptance systems for distribution automation terminals: an overview of edge computing technologies and applications
150 -- 0Zequn Jia, Qiang Liu 0014, Yantao Sun. sRetor: a semi-centralized regular topology routing scheme for data center networking
151 -- 0Haibo Yi. Improving cloud storage and privacy security for digital twin based medical records
152 -- 0Lei Xiao, Yang Cao, Yihe Gai, Juntong Liu, Ping Zhong, Mohammad Mahdi Moghimi. Review on the application of cloud computing in the sports industry
153 -- 0Deyu Zhang, Wang Sun, Zi-Ang Zheng, Wenxin Chen, Shiwen He. Adaptive device sampling and deadline determination for cloud-based heterogeneous federated learning
154 -- 0Wei Gu, Yifan Zhang. FedEem: a fairness-based asynchronous federated learning mechanism
155 -- 0Minghao Zhang, Rui Song, Jun Zhang, Chenyuan Zhou, Guozheng Peng, Haoyang Tian, Tianyi Wu, Yunjia Li. Research on electromagnetic vibration energy harvester for cloud-edge-end collaborative architecture in power grid
156 -- 0Dapeng Dong. Agent-based cloud simulation model for resource management
157 -- 0Zhiyi Yang, Xin He, Guiping Lin, Weiwei Jiang 0001, Yujun Zhu, Jianfeng Sun, Yong Xu, Panlong Yang. NuWa: off-state tolerant backscattering system with uncontrolled excitation traffics
158 -- 0Mohammad Tabrez Quasim, Khair ul Nisa, Khan Muhammad 0001, Mohammad Shahid Husain, Shadab Alam, Mohammed Shuaib, Mohammad Meraj, Monir Abdullah. An internet of things enabled machine learning model for Energy Theft Prevention System (ETPS) in Smart Cities
159 -- 0Shanchen Pang, Jianyang Zheng, Min Wang, Sibo Qiao, Xiao He 0012, Changnan Gao. Minimize average tasks processing time in satellite mobile edge computing systems via a deep reinforcement learning method
160 -- 0Minglong Xue, Yanyi He, Peiqi Xie, Zhengyang He, Xin Feng. LAE-GAN: a novel cloud-based Low-light Attention Enhancement Generative Adversarial Network for unpaired text images
161 -- 0Sajid Ali, Muhammad Sharoze Khan, Asad Khan, Muhammad Abdullah Sarwar, MS Syam, Muhammad Aamir, Yazeed Yasin Ghadi, Hend Khalid Alkahtani, Samih Mohemmed Mostafa. Exploring cross-cultural and gender differences in facial expressions: a skin tone analysis using RGB Values
162 -- 0Rahman Ali, Muhammad Sadiq Hassan Zada, Asad Masood Khatak, Jamil Hussain. Algorithm selection using edge ML and case-based reasoning
163 -- 0Vivek Kumar Prasad, Debabrata Dansana, S. Gopal Krishna Patro, Ayodeji Olalekan Salau, Divyang Yadav, Madhuri D. Bhavsar. CIA-CVD: cloud based image analysis for COVID-19 vaccination distribution
164 -- 0Suresh Kumar S, Sudalai Muthu T. Volatile Kernel Rootkit hidden process detection in cloud computing
165 -- 0Qingfang Zhang, Xiaoyu Du, Jie Li, Zhijie Han 0001. Design and analysis of wireless data center network topology HCDCN based on VLC
166 -- 0Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, Bijeta Seth, Deema Mohammed alsekait, Sarita Simaiya, Mounir Hamdi, Kaamran Raahemifar. Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
167 -- 0Lei Xiao, Yang Cao, Yihe Gai, Edris Khezri, Juntong Liu, Mingzhu Yang. Recognizing sports activities from video frames using deformable convolution and adaptive multiscale features
168 -- 0Yikun Zhao, Fanqin Zhou, Huaide Liu, Lei Feng 0001, Wenjing Li 0001. PPO-based deployment and phase control for movable intelligent reflecting surface
169 -- 0Hao Yang, Xuewei Wang, Yuling Chen, Hui Dou, Yangwen Zhang. RPU-PVB: robust object detection based on a unified metric perspective with bilinear interpolation
170 -- 0Abdul Haseeb Nizamani, Zhigang Chen, Ahsan Ahmed Nizamani, Kashif Shaheed. Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation
171 -- 0Moses Ashawa, Oyakhire Douglas, Jude Osamor, Riley Jackie. Retraction Note: Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm
172 -- 0Haoran He, Fanqin Zhou, Yikun Zhao, Wenjing Li 0001, Lei Feng 0001. Hypergraph convolution mix DDPG for multi-aerial base station deployment
173 -- 0Weimin Gao, Jiawei Huang 0001, Zhaoyi Li, Shaojun Zou, Jianxin Wang 0001. PDLB: Path Diversity-aware Load Balancing with adaptive granularity in data center networks
174 -- 0Zhibao Wang, Shuaijun Chen, Lu Bai 0006, Juntao Gao, Jinhua Tao, Raymond R. Bond, Maurice D. Mulvenna. Reinforcement learning based task scheduling for environmentally sustainable federated cloud computing
175 -- 0Huixue Jia, Daomeng Cai, Jie Yang, Weidong Qian, Cong Wang, Xiaoyu Li, Shan Yang. Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network
176 -- 0Haoyu Li, Jiming Chen 0001, Chao Yang, Xin Chen, Le Chang, Jiabei Liu. Smart and efficient EV charging navigation scheme in vehicular edge computing networks
177 -- 0Jing Guo, De Yu Qi 0001. Enhancement of damaged-image prediction based on digital twin technology
178 -- 0Animesh Kuity, Sateesh Kumar Peddoju. Investigating performance metrics for container-based HPC environments using x86 and OpenPOWER systems
179 -- 0Zhenjun Yan, Ling Jiang, Xiaoli Huang, Lifang Zhang, Xinxin Zhou. Intelligent urbanism with artificial intelligence in shaping tomorrow's smart cities: current developments, trends, and future directions
180 -- 0S. Selvaganapathy, M. Chinnadurai. Virtual machine placement in energy aware load balancer using fog classifier
181 -- 0Abdulaziz A. Alsulami, Qasem Abu Al-Haija, Badraddin Alturki, Ali Alqahtani 0003, Raed Alsini. Security strategy for autonomous vehicle cyber-physical systems using transfer learning