Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             161 results found
no title author magazine year volume issue page(s) type
1 A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems Menezes, R. Julian

13 1 article
2 ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction Feng, Hao

13 1 article
3 Accurate and fast congestion feedback in MEC-enabled RDMA datacenters He, Xin

13 1 article
4 A cloud-edge collaborative task scheduling method based on model segmentation Zhang, Chuanfu

13 1 article
5 A cloud-edge computing architecture for monitoring protective equipment Reaño, Carlos

13 1 article
6 A cost-efficient content distribution optimization model for fog-based content delivery networks Yadav, Prateek

13 1 article
7 Adaptive heuristic edge assisted fog computing design for healthcare data optimization S, Syed Sabir Mohamed

13 1 article
8 Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications Yang, Jiageng

13 1 article
9 Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns Han, Huimin

13 1 article
10 A fog-edge-enabled intrusion detection system for smart grids Tariq, Noshina

13 1 article
11 A hybrid machine learning model with self-improved optimization algorithm for trust and privacy preservation in cloud environment Saini, Himani

13 1 article
12 AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost Shaheen, Momina

13 1 article
13 AIoT-driven multi-source sensor emission monitoring and forecasting using multi-source sensor integration with reduced noise series decomposition Bhatti, Mughair Aslam

13 1 article
14 A knowledge-graph based text summarization scheme for mobile edge computing Yu, Zheng

13 1 article
15 A mobile edge computing-focused transferable sensitive data identification method based on product quantization Zhao, Xinjian

13 1 article
16 A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching Yang, Yue

13 1 article
17 A multi-strategy ontology mapping method based on cost-sensitive SVM Zhang, Fan

13 1 article
18 An adaptive routing strategy in P2P-based Edge Cloud Dong, Biao

13 1 article
19 Analysis and prediction of virtual machine boot time on virtualized computing environments Auliya, Ridlo Sayyidina

13 1 article
20 An efficient hybrid optimization of ETL process in data warehouse of cloud architecture Dinesh, Lina

13 1 article
21 An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations Guo, Jiaxing

13 1 article
22 A new method of dynamic network security analysis based on dynamic uncertain causality graph Dong, Chunling

13 1 article
23 An improved ACO based service composition algorithm in multi-cloud networks Bei, Liu

13 1 article
24 An integrated SDN framework for early detection of DDoS attacks in cloud computing Songa, Asha Varma

13 1 article
25 An intelligent decision system for virtual machine migration based on specific Q-learning Zhu, Xinying

13 1 article
26 An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications Rani, Uma

13 1 article
27 An overview of QoS-aware load balancing techniques in SDN-based IoT networks Rostami, Mohammad

13 1 article
28 A resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit Zhang, Jixian

13 1 article
29 A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption Liu, Guijiang

13 1 article
30 A secure cross-domain authentication scheme based on threshold signature for MEC Chen, Lei

13 1 article
31 A secure data interaction method based on edge computing Miao, Weiwei

13 1 article
32 ASOD: an adaptive stream outlier detection method using online strategy Hu, Zhichao

13 1 article
33 A systematic review on blockchain-based access control systems in cloud environment Punia, Aarti

13 1 article
34 A Transformer-based network intrusion detection approach for cloud security Long, Zhenyue

13 1 article
35 A trusted IoT data sharing method based on secure multi-party computation Ma, Li

13 1 article
36 Attack detection model for BCoT based on contrastive variational autoencoder and metric learning Wu, Chunwang

13 1 article
37 Automated visual quality assessment for virtual and augmented reality based digital twins Roullier, Ben

13 1 article
38 BGFL: a blockchain-enabled group federated learning at wireless industrial edges Peng, Guozheng

13 1 article
39 BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud Pavithra, M.

13 1 article
40 Blockchain-based 6G task offloading and cooperative computing resource allocation study Tian, Shujie

13 1 article
41 Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials Fang, Junli

13 1 article
42 Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0 Gao, Hongmin

13 1 article
43 Building integrated assessment model for IoT technology deployment in the Industry 4.0 Ali, Yasir

13 1 article
44 CG-PBFT: an efficient PBFT algorithm based on credit grouping Liu, Juan

13 1 article
45 Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI Han, Huimin

13 1 article
46 Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption Luo, Yun

13 1 article
47 Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins Akhtar, Syed Imran

13 1 article
48 Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users Zhu, Chaoyang

13 1 article
49 Constrained optimal grouping of cloud application components Różańska, Marta

13 1 article
50 Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach Zhang, Yu

13 1 article
51 COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories Chen, Yining

13 1 article
52 Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records Yang, Kai

13 1 article
53 Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns Han, Huimin

13 1 article
54 Correction to: Edge intelligence‑assisted animation design with large models: a survey Zhu, Jing

13 1 article
55 Correction to: Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN Zhang, Chengping

13 1 article
56 Cost modelling and optimisation for cloud: a graph-based approach Khan, Akif Quddus

13 1 article
57 Cross-chain asset trading scheme for notaries based on edge cloud storage Chen, Lang

13 1 article
58 Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures Nandhini, S.

13 1 article
59 Deep learning based enhanced secure emergency video streaming approach by leveraging blockchain technology for Vehicular AdHoc 5G Networks Awais, Muhammad

13 1 article
60 Deep Reinforcement Learning techniques for dynamic task offloading in the 5G edge-cloud continuum Nieto, Gorka

13 1 article
61 DenMerD: a feature enhanced approach to radar beam blockage correction with edge-cloud computing Liu, Qi

13 1 article
62 Dependency-aware online task offloading based on deep reinforcement learning for IoV Liu, Chunhong

13 1 article
63 Detection of cotton leaf curl disease’s susceptibility scale level based on deep learning Nazeer, Rubaina

13 1 article
64 Distance optimization and directional overcurrent relay coordination using edge-powered biogeography-genetic algorithms Aminian, Mohammadreza

13 1 article
65 Domain knowledge free cloud-IDS with lightweight embedding method Kim, Yongsik

13 1 article
66 Dynamic routing optimization in software-defined networking based on a metaheuristic algorithm Chen, Junyan

13 1 article
67 Edge-cloud computing cooperation detection of dust concentration for risk warning research Su, Qiao

13 1 article
68 Edge-cloud computing oriented large-scale online music education mechanism driven by neural networks Xing, Wen

13 1 article
69 Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks He, Qing

13 1 article
70 Edge intelligence-assisted animation design with large models: a survey Zhu, Jing

13 1 article
71 Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment Peng, Gaoxian

13 1 article
72 Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain Li, Guangshun

13 1 article
73 Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework He, Hongxia

13 1 article
74 Energy-aware tasks offloading based on DQN in medical mobile devices Zhao, Min

13 1 article
75 Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach Khan, Mohammad Zunnun

13 1 article
76 Enhancing intrusion detection: a hybrid machine and deep learning approach Sajid, Muhammad

13 1 article
77 Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN Zhang, Chengping

13 1 article
78 Enhancing multimedia management: cloud-based movie type recognition with hybrid deep learning architecture Lin, Fangru

13 1 article
79 Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools Ghadi, Yazeed Yasin

13 1 article
80 Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model Shu, Chang

13 1 article
81 Evaluation of AI tools for healthcare networks at the cloud-edge interaction to diagnose autism in educational environments Pan, Yue

13 1 article
82 Explainable AI-based innovative hybrid ensemble model for intrusion detection Ahmed, Usman

13 1 article
83 FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records Yang, Kai

13 1 article
84 From data to insights: the application and challenges of knowledge graphs in intelligent audit Zhong, Hao

13 1 article
85 Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics Wang, Xin

13 1 article
86 Graph convolution networks for social media trolls detection use deep feature extraction Asif, Muhammad

13 1 article
87 Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment Li, Hao

13 1 article
88 Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data Shiraly, Danial

13 1 article
89 Human digital twin: a survey Lin, Yujia

13 1 article
90 HybOff: a Hybrid Offloading approach to improve load balancing in fog environments Sulimani, Hamza

13 1 article
91 Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications Ferreira, Saulo

13 1 article
92 I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach Hossain, Md. Sharafat

13 1 article
93 Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing Li, Dengbo

13 1 article
94 Innovative deep learning techniques for monitoring aggressive behavior in social media posts Han, Huimin

13 1 article
95 Intelligent code search aids edge software development Zhang, Fanlong

13 1 article
96 Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability Goswami, Paromita

13 1 article
97 IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks Lakhan, Abdullah

13 1 article
98 Low-cost and high-performance abnormal trajectory detection based on the GRU model with deep spatiotemporal sequence analysis in cloud computing Tang, Guohao

13 1 article
99 MDB-KCP: persistence framework of in-memory database with CRIU-based container checkpoint in Kubernetes Lee, Jeongmin

13 1 article
100 MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments Thangaraj, Veni

13 1 article
101 MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition Fu, Lixiang

13 1 article
102 MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices Chen, Juan

13 1 article
103 Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management Pei, Luyao

13 1 article
104 Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning Hu, Yu

13 1 article
105 Multiobjective trajectory optimization algorithms for solving multi-UAV-assisted mobile edge computing problem Abdel-Basset, Mohamed

13 1 article
106 Multi party confidential verifiable electronic voting scheme based on blockchain Wang, Xusheng

13 1 article
107 Multiple objectives dynamic VM placement for application service availability in cloud networks Alahmad, Yanal

13 1 article
108 Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system Yuan, Ke

13 1 article
109 Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing Chen, Jing

13 1 article
110 Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin Miao, Zicong

13 1 article
111 Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems Zheng, Xiao

13 1 article
112 Online dynamic multi-user computation offloading and resource allocation for HAP-assisted MEC: an energy efficient approach Chen, Sihan

13 1 article
113 Optimization model for vehicular network data queries in edge environments Zheng, Yan

13 1 article
114 Optimization of datacenter selection through a genetic algorithm-driven service broker policy Chowdhury, Shusmoy

13 1 article
115 Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation Lilhore, Umesh Kumar

13 1 article
116 Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure Bai, Zhiqing

13 1 article
117 Optimus: association-based dynamic system call filtering for container attack surface reduction Yang, Seungyong

13 1 article
118 Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet Alphonse, Sherly

13 1 article
119 Personalized client-edge-cloud hierarchical federated learning in mobile edge computing Ma, Chunmei

13 1 article
120 PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing Zhang, Ziwen

13 1 article
121 PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach Naresh, Vankamamidi S.

13 1 article
122 Predicting the individual effects of team competition on college students’ academic performance in mobile edge computing Zhang, Huiling

13 1 article
123 Predicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy Zhao, Siren

13 1 article
124 Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation John, Jomina

13 1 article
125 Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach Huang, Gan

13 1 article
126 Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity Fang, Junli

13 1 article
127 Privacy-preserving federated learning based on partial low-quality data Wang, Huiyong

13 1 article
128 Privacy-preserving sports data fusion and prediction with smart devices in distributed environment Liu, Ping

13 1 article
129 Provably secure data selective sharing scheme with cloud-based decentralized trust management systems Velmurugan, S.

13 1 article
130 Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models K, Karan Kumar

13 1 article
131 Real-time scheduling of power grid digital twin tasks in cloud via deep reinforcement learning Qi, Daokun

13 1 article
132 Recognizing online video genres using ensemble deep convolutional learning for digital media service management Shao, Yuwen

13 1 article
133 RNA-RBP interactions recognition using multi-label learning and feature attention allocation Han, Huirui

13 1 article
134 Secure semantic search using deep learning in a blockchain-assisted multi-user setting Khan, Shahzad

13 1 article
135 Security issues of news data dissemination in internet environment Song, Kang

13 1 article
136 Short-term forecasting of surface solar incident radiation on edge intelligence based on AttUNet Cui, Mengmeng

13 1 article
137 SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems Lan, Shizhan

13 1 article
138 Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing Chen, Xuefei

13 1 article
139 SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud Amaithi Rajan, Arun

13 1 article
140 SRA-E-ABCO: terminal task offloading for cloud-edge-end environments Jiao, Shun

13 1 article
141 SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse Fugkeaw, Somchart

13 1 article
142 Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets Abdelhady, Naglaa

13 1 article
143 STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting Cheng, Hailang

13 1 article
144 Students health physique information sharing in publicly collaborative services over edge-cloud networks Liu, Ping

13 1 article
145 Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing Li, Meiyan

13 1 article
146 Task offloading exploiting grey wolf optimization in collaborative edge computing Nujhat, Nawmi

13 1 article
147 TCP Stratos for stratosphere based computing platforms Periola, A. A.

13 1 article
148 The key security management scheme of cloud storage based on blockchain and digital twins Huang, Jie

13 1 article
149 Time-aware outlier detection in health physique monitoring in edge-aided sport education decision-makings Li, Yanjie

13 1 article
150 Timed-release encryption anonymous interaction protocol based on smart contract Yuan, Ke

13 1 article
151 Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling Han, Huimin

13 1 article
152 Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks Huang, Rui

13 1 article
153 Toward security quantification of serverless computing Ni, Kan

13 1 article
154 Towards explainability for AI-based edge wireless signal automatic modulation classification Xu, Bo

13 1 article
155 Towards optimized scheduling and allocation of heterogeneous resource via graph-enhanced EPSO algorithm Zhang, Zhen

13 1 article
156 Traffic prediction for diverse edge IoT data using graph network Shen, Tao

13 1 article
157 Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency Humayun, Mamoona

13 1 article
158 Unified ensemble federated learning with cloud computing for online anomaly detection in energy-efficient wireless sensor networks Gayathri, S.

13 1 article
159 Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future Alsharabi, Naif

13 1 article
160 When wavelet decomposition meets external attention: a lightweight cloud server load prediction model Zhang, Zhen

13 1 article
161 Wind power prediction method based on cloud computing and data privacy protection Zhang, Lei

13 1 article
                             161 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands