


default search action
Cluster Computing, Volume 28
Volume 28, Number 1, February 2025
- Mahmoud E. Farfoura, Ibrahim Mashal, Ahmad A. A. Alkhatib, Radwan M. Batyha

:
A lightweight machine learning methods for malware classification. 1 - Yezhou Zhang

, Lang Li
, Yu Ou:
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis. 2 - Sunil Prajapat, Dheeraj Kumar

, Pankaj Kumar:
Quantum image encryption protocol for secure communication in healthcare networks. 3 - Manish Kumar, Sunggon Kim:

Augmented access pattern-based I/O performance prediction using directed acyclic graph regression. 4 - Sunil Prajapat, Neeraj Kumar

, Ashok Kumar Das, Pankaj Kumar, Rifaqat Ali
:
Quantum-safe blockchain-assisted data encryption protocol for internet of things networks. 5 - Jaya Dofe, Shailesh Rajput:

Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function. 6 - Gabriel Araújo, Rayner Sousa, Iure Fé, Paulo A. L. Rego, Francisco Airton Silva

:
Network service function chaining: a performance study varying topologies. 7 - Lujie Wang, Zhong Chen

, Xiyu Sun, Chenchen He:
Region of interest encryption algorithm for images based on lifting scheme and object detection. 8 - Nan Li, Qianqian Su

:
An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud. 9 - Guodong Ye, Zhuozhao Chen:

Authenticated reversible image hiding algorithm based on blockchain technology. 10 - Nguyen Tan Cam, Tran Duc Viet:

uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models. 11 - Willian Barreiros

, Jun Kong, Renato Ferreira, George Teodoro:
A hierarchical data partitioning strategy for irregular applications: a case study in digital pathology. 12 - Ardalan Ghasemzadeh, Hadi S. Aghdasi, Saeed Saeedvand:

Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism. 13 - Zeng Gao

, Yi Zhuang, Jingjing Gu:
Multi-strategy arithmetic optimization algorithm for global optimization and uncertain motion tracking. 14 - Rong Gao, Zhiwei Chen, Xinyun Wu, Yonghong Yu, Li Zhang:

Dynamic deep graph convolution with enhanced transformer networks for time series anomaly detection in IoT. 15 - G. Punnam Chander, Sujit Das:

A hybrid decision support system in medical emergencies using artificial neural network and hyperbolic secant grey wolf optimization techniques. 43 - Yong He, Mingran Wang:

Dynamic step opposition-based learning sparrow search algorithm for UAV path planning. 44 - Riham Elsaadany, Guy Bégin:

An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things. 45 - Leda Qu

, Feng Wen, Haixin Huang, Zhuo Wang:
Aggregation-chain: a consortium blockchain based multi-chain data sharing framework with efficient query. 46 - Abdoul Fatakhou Ba, Yingchi Mao, Abdullahi Uwaisu Muhammad, Omaji Samuel, Tasiu Muazu, Umar Muhammad Mustapha Kumshe:

Blockchain federated learning with sparsity for IoMT devices. 47 - Seyed Alireza Omranian, Maziar Goudarzi:

Greedy algorithm for dynamic allocation of intelligent services in vehicular edge computing. 48 - WeiGuang Gu, Fang Wang:

A multi-strategy improved dung beetle optimisation algorithm and its application. 49 - Radjaa Bensaid, Nabila Labraoui

, Hafida Saidi, Haythem Bany Salameh:
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach. 50 - Meysam Jahani, Fatemeh Raji

, Zahra Zojaji:
Securing supply chain through blockchain-integrated algorithmic system: ensuring product quality and counterfeiting tags detection. 51 - Linqiu Gui

, Chunnian Zeng, Jie Luo, Xiaofeng Wang, Xu Yang, Shengshi Zhong:
Graph-based robust 3D point cloud map merging approach for large scale. 52 - Bingxian Li, Lin Zhu, Long Tan:

A vehicular edge computing content caching solution based on content prediction and D4PG. 53 - Alireza Alibakhshi

, Erfan Hassannayebi:
Towards an enhanced next activity prediction using attention based neural networks. 54 - Lei Zhou, Yanyan Dong, Bingya Ma, Zhewen Yin, Fan Lu:

Object detection in low-light conditions based on DBS-YOLOv8. 55 - Sunita Rani

, Geeta Kasana, Shalini Batra:
An efficient content based image retrieval framework using separable CNNs. 56 - Adnane Talha, Anas Bouayad:

Quasi-opposition Remora Optimizer based Nelder-Mead algorithm for tasks scheduling in cloud. 57 - Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh, Alwi M. Bamhdi, Ana Luiza Bessa Barros, Djamel Zeghida, Ahmed Patel:

Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks. 58 - Zihan Wang, Jiqun Zhang

, Yongwei Tang, Hongyuan Cheng:
BGAS: blockchain-based secure and efficient group key agreement scheme for dynamic vehicular platoon. 59 - Mohd Sakib, Shahnawaz Ahmad, Khalid Anwar

, Mohd Saqib:
Optimizing support vector regression using grey wolf optimizer for enhancing energy efficiency and building prototype architecture. 60 - Mohammed Batis, Yi Chen, Mingjing Wang, Lei Liu

, Ali Asghar Heidari
, Huiling Chen:
ACGRIME: adaptive chaotic Gaussian RIME optimizer for global optimization and feature selection. 61 - Shuling Hou, Gaoshang Xiao, Huiying Zhou:

High-performance network attack detection in unknown scenarios based on improved vertical model. 62 - Hamza Hammami, Sadok Ben Yahia

, Mohammad S. Obaidat:
A Robust Mutual Authentication Scheme for Health-Focused Connected Intelligent Objects. 63 - Xun Weng, Wenke She, Hongqiang Fan, Jingtian Zhang, Lifen Yun:

Multi-depot vehicle routing problem with drones in emergency logistics. 64 - Yufeng Wang, Yong Zhang, Zhuo Shuang, Ke Chen, Chunyu Xu:

A novel hybrid differential particle swarm optimization based on particle influence. 65 - Junliang Wang, Baohong Lin, Jiao Zhang, Mengyu Sun, Yongchen Pan

:
An optimized RDMA QP communication mechanism for hyperscale AI infrastructure. 66 - Prashanth Choppara, Sudheer Mangalampalli:

An efficient deep reinforcement learning based task scheduler in cloud-fog environment. 67 - Shi-Hui Zhang, Jie-Sheng Wang, Si-Wen Zhang, Yu-Xuan Xing, Xiao-Fei Sui:

Multi-strategy fusion snake optimizer on task offloading and scheduling for IoT-based fog computing multi-tasks learning. 69 - Chaimae Hazman, Azidine Guezzaz

, Said Benkirane
, Mourade Azrour:
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security. 70 - Shengsheng Lin, Weiwei Lin, Feiyu Zhao, Haojun Chen:

Benchmarking and revisiting time series forecasting methods in cloud workload prediction. 71 - Emrah Aslan

, Yildirim Özüpak:
Detection of road extraction from satellite images with deep learning method. 72 - Mohd Sakib

, Suhel Mustajab
, Mahfooz Alam
:
Ensemble deep learning techniques for time series analysis: a comprehensive review, applications, open issues, challenges, and future directions. 73 - Dongxian Yu, Weiyong Zheng:

A hybrid evolutionary algorithm to improve task scheduling and load balancing in fog computing. 74 - Alberto Prieto, Beatriz Prieto, Juan José Escobar, Thomas Andrew Lampert:

Evolution of computing energy efficiency: Koomey's law revisited. 42
Volume 28, Number 2, April 2025
- Keyu Zhong, Fen Xiao, Xieping Gao:

Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII. 75 - Fengxian Wang, Dailin Li, Jie Zhang, Xiabing Wang, Linwei Li, Xiaoping Shi:

Multiple adaptive fusion network with Mittag Leffler IoU loss for aircraft detection in remote sensing images. 76 - Malha Merah, Zibouda Aliouat, Hakim Mabed:

Dynamic load balancing of traffic in the IoT edge computing environment using a clustering approach based on deep learning and genetic algorithms. 77 - Ying Qiao, Junhan Xiong, Yiguo Zhao:

Network-aware container scheduling in edge computing. 78 - Torana Kamble, Madhuri Ghuge

, Ritu Jain, Vaishali Sarbhukan Bodade:
Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application. 79 - Benyamin Abdollahzadeh, Hatef Javadi

, Oguz Toragay
, Nicola Epicoco, Nima Khodadadi:
The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm. 80 - Yuansheng Gao, Jinpeng Wang

, Changlin Li:
Escape after love: Philoponella prominens optimizer and its application to 3D path planning. 81 - Weiye Wang, Qing Li, Honglei Mu:

Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity. 82 - Roya Zareh Farkhady, Kambiz Majidzadeh, Mohammad Masdari

, Ali Ghaffari:
3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT. 83 - Lingru Cai, Yuelong Liu, Jianlong Xu, Mengqing Jin:

Lcsa-fed: a low cost semi-asynchronous federated learning based on lag tolerance for services QoS prediction. 84 - Nilakshee Rajule, Mithra Venkatesan, Radhika Menon, Anju Kulkarni:

Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model. 85 - Essam H. Houssein, Someya Mohsen Zaki, Marwa M. Emam, Nagwan M. Abdel Samee, Reem Ibrahim Alkanhel, Eman M. G. Younis:

Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring. 86 - Niayesh Gharaei

, Aliaa M. Alabdali:
Optimizing smart health monitoring systems: enahancing energy efficiency and reducing latency with multi-level clustering and grey wolf optimizer. 87 - Shawal Khan, Shahzad Khan:

Latency aware graph-based microservice placement in the edge-cloud continuum. 88 - Sanaz Feizi, Hamidreza Ghaffari

:
Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks. 89 - Priyadarshni, Praveen Kumar, Nilesh Arjun Gupta, Rajiv Misra:

Integrating of IOTA-based blockchain with edge computing for task offloading powering the metaverse. 90 - Ajit Kumar Mahapatra

, Nibedan Panda
, Madhumita Mahapatra
, Tarakanta Jena, Arup Kumar Mohanty:
A fast-flying particle swarm optimization for resolving constrained optimization and feature selection problems. 91 - Aymen Takie Eddine Selmi, Mohamed Faouzi Zerarka, Abdelhakim Cheriet:

Efficient technique utilizing an embedding hierarchical clustering-based representation into crossed cubes for TSP optimization. 92 - Khwaja Mansoor, Mehreen Afzal, Waseem Iqbal, Yawar Abbas:

Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices. 93 - Juan Chen, Jia Zhao, Renbin Xiao, Zhihua Cui, Hui Wang, Jeng-Shyang Pan

:
Role division approach for firefly algorithm based on t-distribution perturbation and differential mutation. 94 - Arun Mani Tripathi, Lokendra Singh Umrao:

Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT. 95 - Zhongmin Wang, Shuai Zhang, Xiaomin Jin, Yanping Chen, Chen Lu:

Joint resource allocation and privacy protection for MEC task offloading in industrial Internet. 96 - Sarika Mustyala, Manjubala Bisi:

Ensembling Harmony Search Algorithm with case-based reasoning for software development effort estimation. 97 - Hao Guo, Bin Deng, Weidong Li:

Multi-resource maximin share fair allocation in the cloud-edge collaborative computing system with bandwidth demand compression. 98 - Xiaoxu Wei, Chen Niu, Lianzheng Zhao, Yongsheng Wang:

Combination of ant colony and student psychology based optimization for the multi-depot electric vehicle routing problem with time windows. 99 - Shuangquan Xu, Xiji Li, Qing Liu, Haiyang Dong, Xiaoyan Xu, Licai Yan, Yue Zhang:

Intelligent monitoring system for environmental protection during the construction period of pumped storage power station. 100 - Yuping Wang, Peng Zhang, Bo Wang, Zhifeng Zhang, Yaoli Xu, Bin Lv:

A hybrid PSO and GA algorithm with rescheduling for task offloading in device-edge-cloud collaborative computing. 101 - Ashutosh Kumar Singh, Satender Kumar, Sarika Jain

:
A multi-agent deep reinforcement learning approach for optimal resource management in serverless computing. 102 - Ashfaq Ahmad Najar

, S. Manohar Naik
:
AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing. 103 - Mina Mohammadi, Fatemeh BahraniPour, Sepehr Ebrahimi Mood, Mohammad Farshi:

Security-aware resource allocation in fog computing using a meta-heuristic algorithm. 104 - Mohamed Farhat, Salah Kamel, Almoataz Y. Abdelaziz:

Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems. 105 - Suqian Wu, Jie Liu, Bitao He, Chuan Lin, Jing Yang, Wei Wei:

An enhanced DV-hop localization algorithm based on hop distance correction and multi-strategy modified Aquila Optimizer in HWSNs. 106 - Changjong Kim, Yongseok Son, Sunggon Kim:

Investigating the effects of SQL hints on diverse storage devices through empirical analysis. 107 - Hibat Eallah Mohtadi, Abdellah Ouammou

, Mohamed Hanini, Abdelkrim Haqiq:
Resilient vehicular fog computing networks: an analytical approach to system reliability under breakdown and vacation interruptions. 108 - Gurjot Kaur, Deepti Kakkar:

A secure lightweight authentication model with interference aware routing and attack detection approach in VANET. 109 - Yue Wang, Xiaohu Zhao:

IG-PGFT: A secure and efficient intelligent grouping PBFT consensus algorithm for the Industrial Internet of Things. 110 - Soyeon Park, Hyokyung Bahn:

Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments. 111 - Nasir Ahmad Jalali

, Hongsong Chen:
Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G. 112 - Mamoru Mimura

, Kazuyuki Kurashina:
Practical evasion attack against neural network-based macro-malware detection method. 113 - Christos Chrysanthos Nikolaidis

, Pavlos S. Efraimidis:
Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management. 114 - Qinghua Ling, Wenkai Liu

, Fei Han, Jinlong Shi, Ali Aweis Hussein, Ben Sanvee Sayway:
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization. 115 - Zhendong Wang

, Biao Xie, Shuxin Yang, Dahai Li, Junling Wang, Sammy Chan:
A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things. 116 - Shweta Kushwaha

, Ravi Shankar Singh:
Deadline and budget-constrained archimedes optimization algorithm for workflow scheduling in cloud. 117 - Shudong Wang, Yanxiang Zhang, Xiao He, Nuanlai Wang, Zhi Lu, Baoyun Chen, Shanchen Pang:

Microservice deployment in cloud-edge environment using enhanced global search grey wolf optimizer-greedy algorithm. 118 - Pan Xu, Hui Gao, Yixuan Wang:

Sparse dual-weighting ensemble clustering. 119 - Yichun Yu

, Xiaoyi Yang, Zheping Chen, Yuqing Lan, Zhihuan Xing, Dan Yu:
Fedgac: optimizing generalization in personalized federated learning via adaptive initialization and strategic client selection. 120 - Junbi Xiao, Jinhai Fan, Hao Lu:

Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning. 121 - Xiangxu Meng, Wei Li, Zhihan Liu, Junze Yang, Wenqi Zheng:

HG-Net: a novel neural network with hierarchical grouped convolution for indoor fingerprint positioning. 122 - Hanqiao Huang, Bo Du, Huan Zhou, Meng Wang, Yufei Ming, Gang Hu:

A path planning method in three-dimensional complex space based on Bézier curves and a hybrid zebra optimization algorithm. 123 - Jiawen Huang, Liyan Xiong, Xiaohui Huang, Qingsen Chen, Peng Huang:

Filter pruning via annealing decaying for deep convolutional neural networks acceleration. 124 - Junbi Xiao, Yunhuan Cong, Wenjing Zhang, Wenchao Weng

:
A cellular traffic prediction method based on diffusion convolutional GRU and multi-head attention mechanism. 125 - Muhammad Asad, Safa Otoum:

Bppfl: a blockchain-based framework for privacy-preserving federated learning. 126 - Retraction Note: Real-time network virtualization based on SDN and Docker container. 127

- Oluwatayomi Rereloluwa Adegboye, Afi Kekeli Feda

:
Improved exponential distribution optimizer: enhancing global numerical optimization problem solving and optimizing machine learning paramseters. 128 - Yuchen Wang, Zhongcheng Wei, Zishan Huang, Jian Yang, Jijun Zhao:

Dependent task offloading for air-ground integrated MEC networks: a multi-agent collaboration approach. 129 - Shobhana Kashyap, Avtar Singh

, Sukhpal Singh Gill:
Machine learning-centric prediction and decision based resource management in cloud computing environments. 130 - Arabinda Pradhan, Amardeep Das, Sukant Kishoro Bisoy:

Modified parallel PSO algorithm in cloud computing for performance improvement. 131 - Henry Ohiani Ohize, Adeiza James Onumanyi, Buhari Ugbede Umar, Lukman Adewale Ajao, Rabiu O. Isah, Eustace Manayi Dogo, Bello Kontagora Nuhu, Olayemi M. Olaniyi, James Garba Ambafi

, Vincent B. Sheidu, Muhammad M. Ibrahim:
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges. 132 - Yuefeng Xu

, Rui Zhong, Yang Cao
, Chao Zhang
, Jun Yu:
Symbiotic mechanism-based honey badger algorithm for continuous optimization. 133 - Lingxi Hu, Yuanyuan Hu, Linhua Jiang, Wei Long:

Federated learning client selection algorithm based on gradient similarity. 134 - Jahez Abraham Johny

, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti
:
Deep learning fusion for effective malware detection: leveraging visual features. 135 - Afnan Al-Ali, Raseena M. Haris, Younes Akbari, Moutaz Saleh, Somaya Al-Máadeed, Rajesh Kumar Muthu:

Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach. 136 - Ali Boroumand, Mirsaeid Hosseini Shirvani, Homayun Motameni:

A heuristic task scheduling algorithm in cloud computing environment: an overall cost minimization approach. 137 - Shiva Sattarpour, Ali Barati

, Hamid Barati:
EBIDS: efficient BERT-based intrusion detection system in the network and application layers of IoT. 138 - Ravindrakumar Purohit

, Jai Prakash Verma, Rachna Jain, Ashish Kumar
:
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era. 139 - Sanket Mishra, Thangellamudi Anithakumari, Rashmi Sahay

, Rajesh Kumar Shrivastava, Sachi Nandan Mohanty, Afzal Hussain Shahid:
LIRAD: lightweight tree-based approaches on resource constrained IoT devices for attack detection. 140 - Liping Zhou, Xu Liu, Ruiqing Tian, Wuqi Wang, Guowei Jin:

A multi-strategy enhanced reptile search algorithm for global optimization and engineering optimization design problems. 141 - Pallav Gupta

, Swarab Raul, S. Shoba, Karthika Veeramani:
Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme. 142 - Aram Satouf, Ali Hamidoglu, Ömer Melih Gül, Alar Kuusik, Lütfiye Durak Ata, Seifedine Kadry:

Metaheuristic-based task scheduling for latency-sensitive IoT applications in edge computing. 143 - Ahmed Saidi

, Abdelouahab Amira, Omar Nouali:
Securing decentralized federated learning: cryptographic mechanisms for privacy and trust. 144 - Zhiyu Feng, Donglin Zhu, Huaiyu Guo, Jiankai Xue, Changjun Zhou:

A Jaya algorithm based on self-adaptive method for parameters identification of photovoltaic cell and module. 145 - Yashar Ghaemi, Hosam El-Ocla:

Time delay-based routing protocol using genetic algorithm in vehicular Ad Hoc networks. 146 - (Withdrawn) Internet of things and distributed security framework for 5G networks. 147

Volume 28, Number 3, June 2025
- Elham Asadi

, Soodeh Hosseini:
Worm propagation modeling considering green worm defense mechanism in complex networks. 148 - Mohamed Wajdi Ouertani

, Ghaith Manita, Amit Chhabra
, Ouajdi Korbaa
:
Chaotic quasi-opposition marine predator algorithm for automatic data clustering. 149 - Junbi Xiao, Wenjing Zhang, Wenchao Weng

, Yuhao Zhou
, Yunhuan Cong:
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting. 150 - Haoyu Liu, Le Tian

, Maozu Guo:
ESDN: edge computing task scheduling strategy based on dilated convolutional neural network and quasi-newton algorithm. 151 - Maryam Shahzeidi, Mohammad Reza Mollahoseini Ardakani, Taghi Javdani Gandomani, Kamal Mirzaie, Mohammadreza Mollahoseini Ardakani:

A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt. 152 - Guilherme Diel, Ana Eloina Nascimento Kraus, Guilherme Piêgas Koslovski:

Knowledge-based job scheduling for HPC. 153 - Farah Fargo, Mitchell Diamond, Olivier Franza, Paul Foose, Jack Adiletta, Matthew Joseph Adiletta, Simon C. Steely Jr.:

Intelligent cache prefetchers in HPC architecture. 154 - Banavath Balaji Naik, Bollu Priyanka, Sarfaraj Alam Ansari:

Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach. 155 - De-gan Zhang, Shuai Li, Jie Zhang, Ting Zhang:

Novel offloading approach of computing task for internet of vehicles based on particle swarm optimization strategy. 156 - Niraj Prasad Bhatta, Fathi Amsaad:

Ml assisted techniques in power side channel analysis for trojan classification. 157 - Weida Xu

, Yang Xu, Sicong Zhang:
Sample-independent federated learning backdoor attack in speaker recognition. 158 - Said Al Afghani Edsa

, Khamron Sunat
:
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems. 159 - Mohammed A. Khasawneh

, Mustafa Daraghmeh
, Anjali Awasthi, Anjali Agarwal:
Multilevel learning for enhanced traffic congestion prediction using anomaly detection and ensemble learning. 160 - Sidharth Samal

, Rajashree Dash:
Developing a two stage optimized random vector functional link neural network based predictor model utilizing a swift crow search algorithm. 161 - Robertas Damasevicius, Nebojsa Bacanin

, Anand Nayyar
:
Blockchain technology for a trustworthy social credit system: implementation and enforcement perspectives. 162 - Amir Seyyedabbasi, Gang Hu, Hisham A. Shehadeh, Xiaopeng Wang, Peren Jerfi Canatalay

:
V-shaped and S-shaped binary artificial protozoa optimizer (APO) algorithm for wrapper feature selection on biological data. 163 - Haithem Mezni, Hiba Yahyaoui, Hela Elmannai

, Reem Ibrahim Alkanhel:
Personalized service recommendation in smart mobility networks. 164 - Wei Liu, Yingmeng Wang, Kaige Li, Zhao Tian

, Wei She:
Ftmoe: a federated transfer model based on mixture-of-experts for heterogeneous image classification. 165 - Hong Chen

, Jianxun Liu:
Burst load scheduling latency optimization through collaborative content caching in edge-cloud computing. 166 - Rong Zheng, Genliang Li, Ruikang Li, Yan Che, Hui Wen, Song Lu:

A new approach for fire and non-fire aerosols discrimination based on multilayer perceptron trained by modified bonobo optimizer. 167 - Javad Zarean, AmirReza Tajally, Reza Tavakkoli-Moghaddam, Reza Kia:

Robust electroencephalogram-based biometric identification against GAN-generated artificial signals using a novel end-to-end attention-based CNN-LSTM neural network. 168 - Sad-Houari Nawal, Taghezout Noria, Hadj-Sahraoui Nihad:

Expertise as a signature: continuous implicit authentication based on behavior. 169 - Senda Bouaziz, Soumaya Boukettaya

, Ahlem Nabli, Faïez Gargouri:
A formal algebra for document-oriented NoSQL data warehouses: formalisation and evaluation. 170 - Armin Choupani, Sadoon Azizi, Mohammad Sadegh Aslanpour:

Joint resource autoscaling and request scheduling for serverless edge computing. 171 - Hongming Chen, Qingli Yu, Guocai Yang, Hui Zhang, Gang Li, Qian Chen, Yonghua Li:

Compound strategy based binary willow catkin optimization for feature selection. 172 - Macilia Boukhama, Zoubeyr Farah, Lynda Alkama:

A QoS-aware IoT services composition approach based on the modified violation constraints handling technique and enhanced fireworks algorithm. 173 - Abdulvahap Kahveci

, Veysel Alcan
, Murat Uçar
, Alper Gümüstepe
, Esra Bilgin, Ismihan Sunar
, Sebnem Ataman
:
Classification of radiographic and non-radiographic axial spondylarthritis in pelvic radiography using deep convolution neural network models. 174 - Kenan Senturk

, Ahmet Faruk Gormus
, Serkan Gönen
, Mehmet Ali Bariskan, Ahmet Kaan Durmaz:
Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities. 175 - Lucileide M. D. Da Silva, Pedro V. A. Alves, Sérgio N. Silva, Marcelo A. C. Fernandes:

Adaptive horizontal scaling in kubernetes clusters with ANN-based load forecasting. 176 - Tianbao Liu, Yue Li, Xiwen Qin:

Hybrid strategy improved Harris Hawks optimization algorithm for global optimization and microgrid economic scheduling problem. 177 - Daoliang He, Pingpeng Yuan:

TDS: fast answering reachability queries with hierarchical traversal trees. 178 - Wangbo Shen, Weiwei Lin, Wentai Wu

, Haijie Wu, Keqin Li:
Reinforcement learning-based task scheduling for heterogeneous computing in end-edge-cloud environment. 179 - Muhammad Muneem Shabir, Kaiwen Zhang, Bertrand Reulet, Ghyslain Gagnon:

Qaas: hybrid cryptocurrency wallet-as-a-service based on Quantum RNG. 180 - Faisal Rasheed Lone, Harsh Kumar Verma:

MP-TMD: A Multidimensional Plausibility-driven Cooperative Trust Model for Multiple Misbehaviour Detection in Intelligent Transportation Systems. 181 - Lianfu Zhang, Guangwei Fang, Zuowen Tan:

FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare. 182 - Huanhuan Zou, Kai Wang:

Improved multi-strategy beluga whale optimization algorithm: a case study for multiple engineering optimization problems. 183 - Ahmed A. Ismail, Nour El-Deen Khalifa, Reda A. El-Khoribi:

A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study. 184 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID