Journal: J. Cloud Computing

Volume 13, Issue 1

1 -- 0Xin Wang, Dongsheng Yang, D. Raveena Judie Dolly, Shuang Chen, Madini O. Alassafi, Fawaz E. Alsaadi, Jianhui Lyu. Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics
2 -- 0Huimin Han, Zehua Liu, Mauricio Barrios Barrios, Jiuhao Li, Zhixiong Zeng, Nadia Sarhan, Emad Mahrous Awwad. Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling
3 -- 0Ke Yuan, Zilin Wang, Keyan Chen, Bingcai Zhou, Zheng Li, Chunfu Jia. Timed-release encryption anonymous interaction protocol based on smart contract
4 -- 0Chang Shu, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou. Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model
5 -- 0Zhenyue Long, Huiru Yan, Guiquan Shen, Xiaolu Zhang, Haoyang He, Long Cheng 0003. A Transformer-based network intrusion detection approach for cloud security
6 -- 0Yu Zhang 0071, Sijie Xu, Hongyi Chen, Uzair Aslam Bhatti, Mengxing Huang. Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach
7 -- 0Qiao Su, Hongsu Wang, Haiyang Zhao, Yan Chu, Jie Li, Xuan Lyu, Zijuan Li. Edge-cloud computing cooperation detection of dust concentration for risk warning research
8 -- 0M. Pavithra, M. Prakash, V. Vennila. BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud
9 -- 0Zheng Yu, Songyu Wu, Jielin Jiang, Dongqing Liu. A knowledge-graph based text summarization scheme for mobile edge computing
10 -- 0Bo Xu, Uzair Aslam Bhatti, Hao Tang 0004, Jialin Yan, Shulei Wu, Nadia Sarhan, Emad Mahrous Awwad, Syam Melethil Sethumadhavan, Yazeed Yasin Ghadi. Towards explainability for AI-based edge wireless signal automatic modulation classification
11 -- 0Jixian Zhang, Zhemin Wang, Athanasios V. Vasilakos, Weidong Li. A resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit
12 -- 0Lina Dinesh, K. Gayathri Devi. An efficient hybrid optimization of ETL process in data warehouse of cloud architecture
13 -- 0Biao Dong, Jinhui Chen. An adaptive routing strategy in P2P-based Edge Cloud
14 -- 0Xuefei Chen, Shouxin Sun, Chao Chen, Xinlong Song, Qiulan Wu, Feng Zhang. Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing
15 -- 0Jie Huang, Jiangyi Yi. The key security management scheme of cloud storage based on blockchain and digital twins
16 -- 0Zicong Miao, Weize Li, Xiaodong Pan. Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin
17 -- 0Bei Liu 0002, Wenlin Li, Xin Su 0001, Xibin Xu. An improved ACO based service composition algorithm in multi-cloud networks
18 -- 0Shizhan Lan, Zhuoxi Duan, Song Lu, Bin Tan, Shi Chen, Yeyu Liang, Shan Chen. SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems
19 -- 0Huimin Han, Muhammad Asif, Emad Mahrous Awwad, Nadia Sarhan, Yazeed Yasin Ghadi, Bo Xu. Innovative deep learning techniques for monitoring aggressive behavior in social media posts
20 -- 0Huimin Han, Harold Neira-Molina, Asad Khan, Meie Fang, Haitham A. Mahmoud, Emad Mahrous Awwad, Bilal Ahmed, Yazeed Yasin Ghadi. Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns
21 -- 0Hongmin Gao 0002, Pengfei Duan, Xiaofeng Pan, Xiaojing Zhang, Keke Ye, Ziyuan Zhong. Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0
22 -- 0Yun Luo, Yuling Chen, Tao Li 0043, Chaoyue Tan, Hui Dou. Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
23 -- 0Nawmi Nujhat, Fahmida Haque Shanta, Sujan Sarker, Palash Roy, Md. Abdur Razzaque, Md. Mamun-Or-Rashid, Mohammad Mehedi Hassan, Giancarlo Fortino. Task offloading exploiting grey wolf optimization in collaborative edge computing
24 -- 0Chunling Dong, Yu Feng, Wenqian Shang. A new method of dynamic network security analysis based on dynamic uncertain causality graph
25 -- 0Dengbo Li, Hanning Zhang, Jieren Cheng, Bernie Liu. Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing
26 -- 0Gan Huang, Ihsan Ullah, Hanyao Huang, Kyung Tae Kim. Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach
27 -- 0Lixiang Fu, Jinbiao Chen, Zhuoying Wang, Tao Zang, Huandong Chen, Shulei Wu, Yuchen Zhao. MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition
28 -- 0Jiaxing Guo, Dongliang Zhao, Chunxiang Gu, Xi Chen, Xieli Zhang, Mengcheng Ju. An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations
29 -- 0Shahzad Khan, Haider Abbas, Muhammad Binsawad. Secure semantic search using deep learning in a blockchain-assisted multi-user setting
30 -- 0Junli Fang, Tao Feng, Xian Guo, Rong Ma, Ye Lu. Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
31 -- 0Yue Yang, Jieren Cheng, Zhaowu Liu, Huimin Li, Ganglou Xu. A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching
32 -- 0Qi Liu, Jiawei Sun, Yonghong Zhang, Xiaodong Liu. DenMerD: a feature enhanced approach to radar beam blockage correction with edge-cloud computing
33 -- 0Muhammad Asif, Muna Al-Razgan, Yasser A. Ali, Long Yunrong. Graph convolution networks for social media trolls detection use deep feature extraction
34 -- 0Huimin Han, Zehua Liu, Jiuhao Li, Zhixiong Zeng. Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI
35 -- 0Mohamed Abdel Basset, Reda Mohamed, Ibrahim M. Hezam, Karam M. Sallam, Abdelaziz Foul, Ibrahim A. Hameed. Multiobjective trajectory optimization algorithms for solving multi-UAV-assisted mobile edge computing problem
36 -- 0Hao Li, Wu Yang, Wei Wang, Huanran Wang. Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment
37 -- 0Mamoona Humayun, Amjad Alsirhani, Faeiz Alserhani, Momina Shaheen, Ghadah Alwakid. Transformative synergy: SSEHCET - bridging mobile edge computing and AI for enhanced eHealth security and efficiency
38 -- 0Huiling Zhang, Huatao Wu, Zhengde Li, Wenwen Gong, Yan Yan. Predicting the individual effects of team competition on college students' academic performance in mobile edge computing
39 -- 0Yue Pan, Andia Foroughi. Evaluation of AI tools for healthcare networks at the cloud-edge interaction to diagnose autism in educational environments
40 -- 0Jing Chen, Shengyi Yang, Ting Gao, Yue Ying, Tian Li, Peng Li. Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing
41 -- 0Junyan Chen, Wei Xiao, Hongmei Zhang, Jiacheng Zuo, Xinmei Li. Dynamic routing optimization in software-defined networking based on a metaheuristic algorithm
42 -- 0Mohammad Zunnun Khan, Mohd Shoaib, Mohammad Shahid Husain, Khair ul Nisa, Mohammad Tabrez Quasim. Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach
43 -- 0Noshina Tariq, Amjad Alsirhani, Mamoona Humayun, Faeiz Alserhani, Momina Shaheen. A fog-edge-enabled intrusion detection system for smart grids
44 -- 0Guijiang Liu, Haibo Xie, Wenming Wang, Haiping Huang. A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
45 -- 0Paromita Goswami, Neetu Faujdar, Somen Debnath, Ajoy Kumar Khan, Ghanshyam Singh. Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
46 -- 0Yanal Alahmad, Anjali Agarwal. Multiple objectives dynamic VM placement for application service availability in cloud networks
47 -- 0Meiyan Li, Qinyong Wang, Yuwei Liao. Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing
48 -- 0Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali. Edge intelligence-assisted animation design with large models: a survey
49 -- 0S. Gayathri, D. Surendran. Unified ensemble federated learning with cloud computing for online anomaly detection in energy-efficient wireless sensor networks
50 -- 0Rubaina Nazeer, Sajid Ali, Zhihua Hu, Ghulam Jillani Ansari, Muna Al-Razgan, Emad Mahrous Awwad, Yazeed Yasin Ghadi. Detection of cotton leaf curl disease's susceptibility scale level based on deep learning
51 -- 0Ben Roullier, Frank McQuade, Ashiq Anjum, Craig Bower, Lu Liu 0001. Automated visual quality assessment for virtual and augmented reality based digital twins
52 -- 0Momina Shaheen, Muhammad Shoaib Farooq, Tariq Umer. AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost
53 -- 0Guohao Tang, Huaying Zhao, Baohua Yu. Low-cost and high-performance abnormal trajectory detection based on the GRU model with deep spatiotemporal sequence analysis in cloud computing
54 -- 0Huirui Han, Bandeh Ali Talpur, Wei Liu, Limei Wang, Bilal Ahmed, Nadia Sarhan, Emad Mahrous Awwad. RNA-RBP interactions recognition using multi-label learning and feature attention allocation
55 -- 0Wen-xing, Adam Slowik, J. Dinesh Peter. Edge-cloud computing oriented large-scale online music education mechanism driven by neural networks
56 -- 0Yu Hu, Feipeng Qiu, Fei Zheng, Jilong Zhao. Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning
57 -- 0Kai Yang, Jiawei Du, Jingchao Liu, Feng Xu, Ye Tang, Ming Liu, Zhibin Li. FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records
58 -- 0Shun Jiao, Haiyan Wang, Jian Luo. SRA-E-ABCO: terminal task offloading for cloud-edge-end environments
59 -- 0Zhiqing Bai, Caizhong Li, Javad Pourzamani, Xuan Yang, Dejuan Li. Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure
60 -- 0A. A. Periola. TCP Stratos for stratosphere based computing platforms
61 -- 0Weiwei Miao, Yuanyi Xia, Rui Zhang, Xinjian Zhao, Qianmu Li, Tao Wang, Shunmei Meng. A secure data interaction method based on edge computing
62 -- 0Huiyong Wang, Qi Wang, Yong Ding 0005, Shijie Tang, Yujue Wang. Privacy-preserving federated learning based on partial low-quality data
63 -- 0Uma Rani, Sunil Kumar, Neeraj Dahiya, Kamna Solanki, Shanu Rakesh Kuttan, Sajid Shah, Momina Shaheen, Faizan Ahmad. An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications
64 -- 0Asha Varma Songa, Ganesh Reddy Karri. An integrated SDN framework for early detection of DDoS attacks in cloud computing
65 -- 0Mughair Aslam Bhatti, Zhiyao Song, Uzair Aslam Bhatti, Syam M. S. AIoT-driven multi-source sensor emission monitoring and forecasting using multi-source sensor integration with reduced noise series decomposition
66 -- 0Qing He, Hua Zhao, Yu Feng, Zehao Wang, Zhaofeng Ning, Tingwei Luo. Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks
67 -- 0Mengmeng Cui, Shizhong Zhao, Jinfeng Yao. Short-term forecasting of surface solar incident radiation on edge intelligence based on AttUNet
68 -- 0Kang Song, Wenqian Shang, Yong Zhang, Tong Yi, Xuan Wang. Security issues of news data dissemination in internet environment
69 -- 0Gaoxian Peng, Yiping Wen, Wanchun Dou, TianCai Li, Xiaolong Xu 0001, Qing Ye. Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment
70 -- 0Lei Chen, Chong Guo, Bei Gong, Muhammad Waqas 0001, Lihua Deng, Haowen Qin. A secure cross-domain authentication scheme based on threshold signature for MEC
71 -- 0Seungyong Yang, Brent ByungHoon Kang, Jaehyun Nam. Optimus: association-based dynamic system call filtering for container attack surface reduction
72 -- 0Xin He, Feifan Liang, Weibei Fan, Junchang Wang, Lei Han, Fu Xiao 0001, Wanchun Dou. Accurate and fast congestion feedback in MEC-enabled RDMA datacenters
73 -- 0Yanjie Li, Liqin Kang, Zhaojin Li, Fugao Jiang, Nan Bi, Tao Du, Maryam Abiri. Time-aware outlier detection in health physique monitoring in edge-aided sport education decision-makings
74 -- 0Juan Liu, Xiaohong Deng, Wangchun Li, Kangting Li. CG-PBFT: an efficient PBFT algorithm based on credit grouping
75 -- 0Kai Yang, Jiawei Du, Jingchao Liu, Feng Xu, Ye Tang, Ming Liu, Zhibin Li. Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records
76 -- 0Ziwen Zhang, Qi Liu, Xiaodong Liu 0002, Yonghong Zhang, Zihao Du, Xuefei Cao. PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing
77 -- 0Huimin Han, Harold Neira-Molina, Asad Khan, Meie Fang, Haitham A. Mahmoud, Emad Mahrous Awwad, Bilal Ahmed, Yazeed Yasin Ghadi. Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns
78 -- 0Fanlong Zhang, Mengcheng Li, Heng Wu, Tao Wu. Intelligent code search aids edge software development
79 -- 0Abdullah Lakhan, Tor-Morten Grønli, Paolo Bellavista, Sajida Memon, Maher Alharby, Orawit Thinnukool. IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks
80 -- 0Ridlo Sayyidina Auliya, Yen-Lin Lee, Chia-Ching Chen, Deron Liang, Wei-Jen Wang. Analysis and prediction of virtual machine boot time on virtualized computing environments
81 -- 0Chuanfu Zhang, Jing Chen 0030, Wen Li, Hao Sun, YuDong Geng, Tianxiang Zhang, Mingchao Ji, Tonglin Fu. A cloud-edge collaborative task scheduling method based on model segmentation
82 -- 0Carlos Reaño, José V. Riera, Verónica Romero 0001, Pedro Morillo 0001, Sergio Casas-Yrurzum. A cloud-edge computing architecture for monitoring protective equipment
83 -- 0Siren Zhao, Jilun Zhang, Jianbin Zhang. Predicting UPDRS in Parkinson's disease using ensembles of self-organizing map and neuro-fuzzy
84 -- 0Tao Shen, Lu Zhang, Renkang Geng, Shuai Li, Bin Sun. Traffic prediction for diverse edge IoT data using graph network
85 -- 0Naglaa Abdelhady, Taysir Hassan A. Soliman, Mohammed F. Farghally. Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets
86 -- 0Velmurugan Sambath, Mohan Prakash 0001, S. Neelakandan, Arun Radhakrishnan. Provably secure data selective sharing scheme with cloud-based decentralized trust management systems
87 -- 0Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali. Correction to: Edge intelligence‑assisted animation design with large models: a survey
88 -- 0Veni Thangaraj, Thankaraja Raja Sree. MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments
89 -- 0Mohammad Rostami, Salman Goli-Bidgoli. An overview of QoS-aware load balancing techniques in SDN-based IoT networks
90 -- 0Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang. Cross-chain asset trading scheme for notaries based on edge cloud storage
91 -- 0Chengping Zhang, Muhammad Aamir 0002, Yurong Guan, Muna Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti, Yazeed Yasin Ghadi. Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN
93 -- 0Yazeed Yasin Ghadi, Syed Faisal Abbas Shah, Tehseen Mazhar, Tariq Shahzad, Khmaies Ouahada, Habib Hamam. Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools
94 -- 0Gorka Nieto, Idoia De-la-Iglesia, Unai Lopez-Novoa, Cristina Perfecto. Deep Reinforcement Learning techniques for dynamic task offloading in the 5G edge-cloud continuum
99 -- 0Marta Rózanska, Geir Horn. Constrained optimal grouping of cloud application components
100 -- 0Hailang Cheng, Mengmeng Cui, Yuzhe Shi. STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting
101 -- 0R. Julian Menezes, P. Jesu Jayarin, A. Chandra Sekar. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems
102 -- 0Yuwen Shao, Na Guo. Recognizing online video genres using ensemble deep convolutional learning for digital media service management
103 -- 0Juan Chen, Rui Zhang, Peng Chen 0007, Jianhua Ren, Zongling Wu, Yang Wang, Xi Li, Ling Xiong. MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices
104 -- 0Fangru Lin, Jie Yuan, Zhiwei Chen, Maryam Abiri. Enhancing multimedia management: cloud-based movie type recognition with hybrid deep learning architecture
105 -- 0Karan Kumar K, Mounica Nutakki, Suprabhath Koduru, Srihari Mandava. Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models
106 -- 0Ping Liu, Xiang Liu, Bin Zang, Guoyan Diao. Privacy-preserving sports data fusion and prediction with smart devices in distributed environment
107 -- 0Rui Huang, Tinghuai Ma, Huan Rong, Kai Huang, Nan Bi, Ping Liu, Tao Du. Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks
108 -- 0Zhen Zhang, Chen Xu, Shaohua Xu, Long Huang, Jinyu Zhang. Towards optimized scheduling and allocation of heterogeneous resource via graph-enhanced EPSO algorithm
109 -- 0Mohammadreza Aminian, Mehdi Jafari Shahbazzadeh, Mahdiyeh Eslami. Distance optimization and directional overcurrent relay coordination using edge-powered biogeography-genetic algorithms
110 -- 0Hao Feng, Kun Cao, Gan Huang, Hao Liu. ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction
111 -- 0Chengping Zhang, Muhammad Aamir 0002, Yurong Guan, Muna S. Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti, Yazeed Yasin Ghadi. Correction to: Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN
112 -- 0Danial Shiraly, Ziba Eslami, Nasrollah Pakniat. Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
113 -- 0Hamza Sulimani, Rahaf Sulimani, Fahimeh Ramezani 0001, Mohsen Naderpour, Huan Huo, Tony Jan, Mukesh Prasad. HybOff: a Hybrid Offloading approach to improve load balancing in fog environments
114 -- 0Hao Zhong, Dong Yang, Shengdong Shi, Lai Wei, Yanyan Wang. From data to insights: the application and challenges of knowledge graphs in intelligent audit
115 -- 0Hongxia He, Xi Li, Peng Chen, Juan Chen, Ming Liu, Lei Wu. Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework
116 -- 0Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun, Sufang Zhou, Chunfu Jia. Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system
117 -- 0Xiao Zheng, Muhammad Tahir, Khursheed Aurangzeb, Muhammad Shahid Anwar, Muhammad Aamir 0002, Ahmad Farzan, Rizwan Ullah. Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems
118 -- 0Jiageng Yang, Chuanyi Liu, Binxing Fang. Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications
119 -- 0Chaoyang Zhu. Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users
120 -- 0Zhichao Hu, Xiangzhan Yu, Likun Liu, Yu Zhang, Haining Yu. ASOD: an adaptive stream outlier detection method using online strategy
121 -- 0Daokun Qi, Xiaojuan Xi, Yake Tang, Yuesong Zheng, Zhengwei Guo. Real-time scheduling of power grid digital twin tasks in cloud via deep reinforcement learning
122 -- 0Xinying Zhu, Ran Xia, Hang Zhou, Shuo Zhou, Haoran Liu. An intelligent decision system for virtual machine migration based on specific Q-learning
123 -- 0Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, Tauqeer Safdar Malik, Ali Haider Khan, Jawad Tanveer, Ateeq Ur Rehman 0002. Enhancing intrusion detection: a hybrid machine and deep learning approach
125 -- 0Chunwang Wu, Xiaolei Liu, Kangyi Ding, Bangzhou Xin, Jiazhong Lu, Jiayong Liu, Cheng Huang. Attack detection model for BCoT based on contrastive variational autoencoder and metric learning
126 -- 0Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Neetu Faujdar, Roobaea Alroobaea, Majed Alsafyani, Abdullah M. Baqasah, Sultan Abdullah Algarni. Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation
127 -- 0Syed Sabir Mohamed S, Gopi R, Thiruppathy Kesavan V, Karthikeyan Kaliyaperumal. Adaptive heuristic edge assisted fog computing design for healthcare data optimization
128 -- 0Min Zhao, Junwen Lu. Energy-aware tasks offloading based on DQN in medical mobile devices
129 -- 0Somchart Fugkeaw, Phatwasin Suksai, Lyhour Hak. SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse
130 -- 0Muhammad Awais, Yousaf Saeed, Abid Ali 0001, Sohail Jabbar, Awais Ahmad 0001, Yazeed Alkhrijah, Umar Raza, Yasir Saleem 0002. Deep learning based enhanced secure emergency video streaming approach by leveraging blockchain technology for Vehicular AdHoc 5G Networks
131 -- 0Yujia Lin, Li-Ming Chen 0005, Aftab Ali, Christopher Nugent, Ian Cleland, Rongyang Li, Jianguo Ding, Huansheng Ning. Human digital twin: a survey
132 -- 0Syed Imran Akhtar, Abdul Rauf, Haider Abbas, Muhammad Faisal Amjad, Ifra Batool. Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins
133 -- 0Zhen Zhang, Chen Xu, Jinyu Zhang, Zhe Zhu, Shaohua Xu. When wavelet decomposition meets external attention: a lightweight cloud server load prediction model
135 -- 0Naif Alsharabi, Jalel Ktari, Tarek Frikha, Abdulaziz Alayba, Abdullah J. Alzahrani, Amr Jadi, Habib Hamam. Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future
136 -- 0Chunhong Liu, Huaichen Wang, Mengdi Zhao, Jialei Liu, Xiaoyan Zhao, Peiyan Yuan. Dependency-aware online task offloading based on deep reinforcement learning for IoV
137 -- 0Lei Zhang, Shaoming Zhu, Shen Su, Xiaofeng Chen, Yan Yang, Bing Zhou. Wind power prediction method based on cloud computing and data privacy protection
138 -- 0Li Ma, Binbin Duan, Bo Zhang, Yang Li, Yingxun Fu, Dongchao Ma. A trusted IoT data sharing method based on secure multi-party computation
139 -- 0Arun Amaithi Rajan, V. Vetriselvi, Mayank Raikwar, Reshma Balaraman. SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud
140 -- 0Kan Ni, Subrota Kumar Mondal, Hussain Mohammed Dipu Kabir, Tan Tian, Hong-Ning Dai. Toward security quantification of serverless computing
141 -- 0Prateek Yadav, Subrat Kar. A cost-efficient content distribution optimization model for fog-based content delivery networks
142 -- 0A. Sherly Alphonse, Shanmugasundaram Abinaya, Nishant Kumar. Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet
144 -- 0Fan Zhang 0042, Peichen Yang, Rongyang Li, Sha Li, Jianguo Ding, Jiabo Xu, Huansheng Ning. A multi-strategy ontology mapping method based on cost-sensitive SVM
146 -- 0Aarti Punia, Preeti Gulia, Nasib Singh Gill, Ebuka Ibeke, Celestine Iwendi, Piyush Kumar Shukla. A systematic review on blockchain-based access control systems in cloud environment
148 -- 0Guozheng Peng, Xiaoyun Shi, Jun Zhang, Lisha Gao, Yuanpeng Tan, Nan Xiang, Wanguo Wang. BGFL: a blockchain-enabled group federated learning at wireless industrial edges
150 -- 0Usman Ahmed, Jiangbin Zheng, Ahmad Almogren, Sheharyar Khan, Muhammad Tariq Sadiq, Ayman Altameem, Ateeq Ur Rehman 0002. Explainable AI-based innovative hybrid ensemble model for intrusion detection
151 -- 0Md Sharafat Hossain, Md. Alamgir Hossain, Md. Saiful Islam. I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach
152 -- 0Luyao Pei, Cheng Xu, Xueli Yin, Jinsong Zhang. Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management
153 -- 0Yining Chen, Kai Peng, Chengfang Ling. COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories
154 -- 0Junli Fang 0001, Tao Feng 0007, Xian Guo, Xusheng Wang. Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity
155 -- 0Yasir Ali, Habib Ullah Khan, Faheem Khan, Yeon-Kug Moon. Building integrated assessment model for IoT technology deployment in the Industry 4.0
156 -- 0Shusmoy Chowdhury, Ajay Katangur, Alaa Sheta. Optimization of datacenter selection through a genetic algorithm-driven service broker policy
157 -- 0Himani Saini, Gopal Singh, Sandeep Dalal, Iyyappan Moorthi, Sultan Mesfer Aldossary, Nasratullah Nuristani, Arshad Hashmi. A hybrid machine learning model with self-improved optimization algorithm for trust and privacy preservation in cloud environment
158 -- 0Saulo Ferreira, Júlio Mendonça, Bruno Nogueira 0001, Willy Tiengo, Ermeson C. Andrade. Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
159 -- 0S. Nandhini, Rajeswari A, N. R. Shanker. Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures
160 -- 0Xusheng Wang, Tao Feng 0007, Chunyan Liu, Junli Fang 0001. Multi party confidential verifiable electronic voting scheme based on blockchain
161 -- 0Chunmei Ma, Xiangqian Li, Baogui Huang, Guangshun Li, Fengyin Li. Personalized client-edge-cloud hierarchical federated learning in mobile edge computing