no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems
|
Menezes, R. Julian |
|
|
13 |
1 |
|
article |
2 |
ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction
|
Feng, Hao |
|
|
13 |
1 |
|
article |
3 |
Accurate and fast congestion feedback in MEC-enabled RDMA datacenters
|
He, Xin |
|
|
13 |
1 |
|
article |
4 |
A cloud-edge collaborative task scheduling method based on model segmentation
|
Zhang, Chuanfu |
|
|
13 |
1 |
|
article |
5 |
A cloud-edge computing architecture for monitoring protective equipment
|
Reaño, Carlos |
|
|
13 |
1 |
|
article |
6 |
A cost-efficient content distribution optimization model for fog-based content delivery networks
|
Yadav, Prateek |
|
|
13 |
1 |
|
article |
7 |
Adaptive heuristic edge assisted fog computing design for healthcare data optimization
|
S, Syed Sabir Mohamed |
|
|
13 |
1 |
|
article |
8 |
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications
|
Yang, Jiageng |
|
|
13 |
1 |
|
article |
9 |
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns
|
Han, Huimin |
|
|
13 |
1 |
|
article |
10 |
A fog-edge-enabled intrusion detection system for smart grids
|
Tariq, Noshina |
|
|
13 |
1 |
|
article |
11 |
A hybrid machine learning model with self-improved optimization algorithm for trust and privacy preservation in cloud environment
|
Saini, Himani |
|
|
13 |
1 |
|
article |
12 |
AI-empowered mobile edge computing: inducing balanced federated learning strategy over edge for balanced data and optimized computation cost
|
Shaheen, Momina |
|
|
13 |
1 |
|
article |
13 |
AIoT-driven multi-source sensor emission monitoring and forecasting using multi-source sensor integration with reduced noise series decomposition
|
Bhatti, Mughair Aslam |
|
|
13 |
1 |
|
article |
14 |
A knowledge-graph based text summarization scheme for mobile edge computing
|
Yu, Zheng |
|
|
13 |
1 |
|
article |
15 |
A mobile edge computing-focused transferable sensitive data identification method based on product quantization
|
Zhao, Xinjian |
|
|
13 |
1 |
|
article |
16 |
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching
|
Yang, Yue |
|
|
13 |
1 |
|
article |
17 |
A multi-strategy ontology mapping method based on cost-sensitive SVM
|
Zhang, Fan |
|
|
13 |
1 |
|
article |
18 |
An adaptive routing strategy in P2P-based Edge Cloud
|
Dong, Biao |
|
|
13 |
1 |
|
article |
19 |
Analysis and prediction of virtual machine boot time on virtualized computing environments
|
Auliya, Ridlo Sayyidina |
|
|
13 |
1 |
|
article |
20 |
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture
|
Dinesh, Lina |
|
|
13 |
1 |
|
article |
21 |
An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations
|
Guo, Jiaxing |
|
|
13 |
1 |
|
article |
22 |
A new method of dynamic network security analysis based on dynamic uncertain causality graph
|
Dong, Chunling |
|
|
13 |
1 |
|
article |
23 |
An improved ACO based service composition algorithm in multi-cloud networks
|
Bei, Liu |
|
|
13 |
1 |
|
article |
24 |
An integrated SDN framework for early detection of DDoS attacks in cloud computing
|
Songa, Asha Varma |
|
|
13 |
1 |
|
article |
25 |
An intelligent decision system for virtual machine migration based on specific Q-learning
|
Zhu, Xinying |
|
|
13 |
1 |
|
article |
26 |
An optimized neural network with AdaHessian for cryptojacking attack prediction for Securing Crypto Exchange Operations of MEC applications
|
Rani, Uma |
|
|
13 |
1 |
|
article |
27 |
An overview of QoS-aware load balancing techniques in SDN-based IoT networks
|
Rostami, Mohammad |
|
|
13 |
1 |
|
article |
28 |
A resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit
|
Zhang, Jixian |
|
|
13 |
1 |
|
article |
29 |
A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
|
Liu, Guijiang |
|
|
13 |
1 |
|
article |
30 |
A secure cross-domain authentication scheme based on threshold signature for MEC
|
Chen, Lei |
|
|
13 |
1 |
|
article |
31 |
A secure data interaction method based on edge computing
|
Miao, Weiwei |
|
|
13 |
1 |
|
article |
32 |
ASOD: an adaptive stream outlier detection method using online strategy
|
Hu, Zhichao |
|
|
13 |
1 |
|
article |
33 |
A systematic review on blockchain-based access control systems in cloud environment
|
Punia, Aarti |
|
|
13 |
1 |
|
article |
34 |
A Transformer-based network intrusion detection approach for cloud security
|
Long, Zhenyue |
|
|
13 |
1 |
|
article |
35 |
A trusted IoT data sharing method based on secure multi-party computation
|
Ma, Li |
|
|
13 |
1 |
|
article |
36 |
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning
|
Wu, Chunwang |
|
|
13 |
1 |
|
article |
37 |
Automated visual quality assessment for virtual and augmented reality based digital twins
|
Roullier, Ben |
|
|
13 |
1 |
|
article |
38 |
BGFL: a blockchain-enabled group federated learning at wireless industrial edges
|
Peng, Guozheng |
|
|
13 |
1 |
|
article |
39 |
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud
|
Pavithra, M. |
|
|
13 |
1 |
|
article |
40 |
Blockchain-based 6G task offloading and cooperative computing resource allocation study
|
Tian, Shujie |
|
|
13 |
1 |
|
article |
41 |
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
|
Fang, Junli |
|
|
13 |
1 |
|
article |
42 |
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0
|
Gao, Hongmin |
|
|
13 |
1 |
|
article |
43 |
Building integrated assessment model for IoT technology deployment in the Industry 4.0
|
Ali, Yasir |
|
|
13 |
1 |
|
article |
44 |
CG-PBFT: an efficient PBFT algorithm based on credit grouping
|
Liu, Juan |
|
|
13 |
1 |
|
article |
45 |
Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI
|
Han, Huimin |
|
|
13 |
1 |
|
article |
46 |
Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
|
Luo, Yun |
|
|
13 |
1 |
|
article |
47 |
Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins
|
Akhtar, Syed Imran |
|
|
13 |
1 |
|
article |
48 |
Computational intelligence-based classification system for the diagnosis of memory impairment in psychoactive substance users
|
Zhu, Chaoyang |
|
|
13 |
1 |
|
article |
49 |
Constrained optimal grouping of cloud application components
|
Różańska, Marta |
|
|
13 |
1 |
|
article |
50 |
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach
|
Zhang, Yu |
|
|
13 |
1 |
|
article |
51 |
COPSA: a computation offloading strategy based on PPO algorithm and self-attention mechanism in MEC-empowered smart factories
|
Chen, Yining |
|
|
13 |
1 |
|
article |
52 |
Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records
|
Yang, Kai |
|
|
13 |
1 |
|
article |
53 |
Correction to: Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non‑stationary data patterns
|
Han, Huimin |
|
|
13 |
1 |
|
article |
54 |
Correction to: Edge intelligence‑assisted animation design with large models: a survey
|
Zhu, Jing |
|
|
13 |
1 |
|
article |
55 |
Correction to: Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN
|
Zhang, Chengping |
|
|
13 |
1 |
|
article |
56 |
Cost modelling and optimisation for cloud: a graph-based approach
|
Khan, Akif Quddus |
|
|
13 |
1 |
|
article |
57 |
Cross-chain asset trading scheme for notaries based on edge cloud storage
|
Chen, Lang |
|
|
13 |
1 |
|
article |
58 |
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures
|
Nandhini, S. |
|
|
13 |
1 |
|
article |
59 |
Deep learning based enhanced secure emergency video streaming approach by leveraging blockchain technology for Vehicular AdHoc 5G Networks
|
Awais, Muhammad |
|
|
13 |
1 |
|
article |
60 |
Deep Reinforcement Learning techniques for dynamic task offloading in the 5G edge-cloud continuum
|
Nieto, Gorka |
|
|
13 |
1 |
|
article |
61 |
DenMerD: a feature enhanced approach to radar beam blockage correction with edge-cloud computing
|
Liu, Qi |
|
|
13 |
1 |
|
article |
62 |
Dependency-aware online task offloading based on deep reinforcement learning for IoV
|
Liu, Chunhong |
|
|
13 |
1 |
|
article |
63 |
Detection of cotton leaf curl disease’s susceptibility scale level based on deep learning
|
Nazeer, Rubaina |
|
|
13 |
1 |
|
article |
64 |
Distance optimization and directional overcurrent relay coordination using edge-powered biogeography-genetic algorithms
|
Aminian, Mohammadreza |
|
|
13 |
1 |
|
article |
65 |
Domain knowledge free cloud-IDS with lightweight embedding method
|
Kim, Yongsik |
|
|
13 |
1 |
|
article |
66 |
Dynamic routing optimization in software-defined networking based on a metaheuristic algorithm
|
Chen, Junyan |
|
|
13 |
1 |
|
article |
67 |
Edge-cloud computing cooperation detection of dust concentration for risk warning research
|
Su, Qiao |
|
|
13 |
1 |
|
article |
68 |
Edge-cloud computing oriented large-scale online music education mechanism driven by neural networks
|
Xing, Wen |
|
|
13 |
1 |
|
article |
69 |
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks
|
He, Qing |
|
|
13 |
1 |
|
article |
70 |
Edge intelligence-assisted animation design with large models: a survey
|
Zhu, Jing |
|
|
13 |
1 |
|
article |
71 |
Edge intelligence empowered delivery route planning for handling changes in uncertain supply chain environment
|
Peng, Gaoxian |
|
|
13 |
1 |
|
article |
72 |
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain
|
Li, Guangshun |
|
|
13 |
1 |
|
article |
73 |
Efficiently localizing system anomalies for cloud infrastructures: a novel Dynamic Graph Transformer based Parallel Framework
|
He, Hongxia |
|
|
13 |
1 |
|
article |
74 |
Energy-aware tasks offloading based on DQN in medical mobile devices
|
Zhao, Min |
|
|
13 |
1 |
|
article |
75 |
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach
|
Khan, Mohammad Zunnun |
|
|
13 |
1 |
|
article |
76 |
Enhancing intrusion detection: a hybrid machine and deep learning approach
|
Sajid, Muhammad |
|
|
13 |
1 |
|
article |
77 |
Enhancing lung cancer diagnosis with data fusion and mobile edge computing using DenseNet and CNN
|
Zhang, Chengping |
|
|
13 |
1 |
|
article |
78 |
Enhancing multimedia management: cloud-based movie type recognition with hybrid deep learning architecture
|
Lin, Fangru |
|
|
13 |
1 |
|
article |
79 |
Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools
|
Ghadi, Yazeed Yasin |
|
|
13 |
1 |
|
article |
80 |
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model
|
Shu, Chang |
|
|
13 |
1 |
|
article |
81 |
Evaluation of AI tools for healthcare networks at the cloud-edge interaction to diagnose autism in educational environments
|
Pan, Yue |
|
|
13 |
1 |
|
article |
82 |
Explainable AI-based innovative hybrid ensemble model for intrusion detection
|
Ahmed, Usman |
|
|
13 |
1 |
|
article |
83 |
FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records
|
Yang, Kai |
|
|
13 |
1 |
|
article |
84 |
From data to insights: the application and challenges of knowledge graphs in intelligent audit
|
Zhong, Hao |
|
|
13 |
1 |
|
article |
85 |
Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics
|
Wang, Xin |
|
|
13 |
1 |
|
article |
86 |
Graph convolution networks for social media trolls detection use deep feature extraction
|
Asif, Muhammad |
|
|
13 |
1 |
|
article |
87 |
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment
|
Li, Hao |
|
|
13 |
1 |
|
article |
88 |
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
|
Shiraly, Danial |
|
|
13 |
1 |
|
article |
89 |
Human digital twin: a survey
|
Lin, Yujia |
|
|
13 |
1 |
|
article |
90 |
HybOff: a Hybrid Offloading approach to improve load balancing in fog environments
|
Sulimani, Hamza |
|
|
13 |
1 |
|
article |
91 |
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
|
Ferreira, Saulo |
|
|
13 |
1 |
|
article |
92 |
I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach
|
Hossain, Md. Sharafat |
|
|
13 |
1 |
|
article |
93 |
Improving efficiency of DNN-based relocalization module for autonomous driving with server-side computing
|
Li, Dengbo |
|
|
13 |
1 |
|
article |
94 |
Innovative deep learning techniques for monitoring aggressive behavior in social media posts
|
Han, Huimin |
|
|
13 |
1 |
|
article |
95 |
Intelligent code search aids edge software development
|
Zhang, Fanlong |
|
|
13 |
1 |
|
article |
96 |
Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability
|
Goswami, Paromita |
|
|
13 |
1 |
|
article |
97 |
IoT workload offloading efficient intelligent transport system in federated ACNN integrated cooperated edge-cloud networks
|
Lakhan, Abdullah |
|
|
13 |
1 |
|
article |
98 |
Low-cost and high-performance abnormal trajectory detection based on the GRU model with deep spatiotemporal sequence analysis in cloud computing
|
Tang, Guohao |
|
|
13 |
1 |
|
article |
99 |
MDB-KCP: persistence framework of in-memory database with CRIU-based container checkpoint in Kubernetes
|
Lee, Jeongmin |
|
|
13 |
1 |
|
article |
100 |
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments
|
Thangaraj, Veni |
|
|
13 |
1 |
|
article |
101 |
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition
|
Fu, Lixiang |
|
|
13 |
1 |
|
article |
102 |
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices
|
Chen, Juan |
|
|
13 |
1 |
|
article |
103 |
Multi-agent Deep Reinforcement Learning for cloud-based digital twins in power grid management
|
Pei, Luyao |
|
|
13 |
1 |
|
article |
104 |
Multi-dimensional resource allocation strategy for LEO satellite communication uplinks based on deep reinforcement learning
|
Hu, Yu |
|
|
13 |
1 |
|
article |
105 |
Multiobjective trajectory optimization algorithms for solving multi-UAV-assisted mobile edge computing problem
|
Abdel-Basset, Mohamed |
|
|
13 |
1 |
|
article |
106 |
Multi party confidential verifiable electronic voting scheme based on blockchain
|
Wang, Xusheng |
|
|
13 |
1 |
|
article |
107 |
Multiple objectives dynamic VM placement for application service availability in cloud networks
|
Alahmad, Yanal |
|
|
13 |
1 |
|
article |
108 |
Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system
|
Yuan, Ke |
|
|
13 |
1 |
|
article |
109 |
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing
|
Chen, Jing |
|
|
13 |
1 |
|
article |
110 |
Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin
|
Miao, Zicong |
|
|
13 |
1 |
|
article |
111 |
Non-orthogonal multiple access-based MEC for energy-efficient task offloading in e-commerce systems
|
Zheng, Xiao |
|
|
13 |
1 |
|
article |
112 |
Online dynamic multi-user computation offloading and resource allocation for HAP-assisted MEC: an energy efficient approach
|
Chen, Sihan |
|
|
13 |
1 |
|
article |
113 |
Optimization model for vehicular network data queries in edge environments
|
Zheng, Yan |
|
|
13 |
1 |
|
article |
114 |
Optimization of datacenter selection through a genetic algorithm-driven service broker policy
|
Chowdhury, Shusmoy |
|
|
13 |
1 |
|
article |
115 |
Optimizing energy efficiency in MEC networks: a deep learning approach with Cybertwin-driven resource allocation
|
Lilhore, Umesh Kumar |
|
|
13 |
1 |
|
article |
116 |
Optimizing the resource allocation in cyber physical energy systems based on cloud storage and IoT infrastructure
|
Bai, Zhiqing |
|
|
13 |
1 |
|
article |
117 |
Optimus: association-based dynamic system call filtering for container attack surface reduction
|
Yang, Seungyong |
|
|
13 |
1 |
|
article |
118 |
Pain assessment from facial expression images utilizing Statistical Frei-Chen Mask (SFCM)-based features and DenseNet
|
Alphonse, Sherly |
|
|
13 |
1 |
|
article |
119 |
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing
|
Ma, Chunmei |
|
|
13 |
1 |
|
article |
120 |
PMNet: a multi-branch and multi-scale semantic segmentation approach to water extraction from high-resolution remote sensing images with edge-cloud computing
|
Zhang, Ziwen |
|
|
13 |
1 |
|
article |
121 |
PPDNN-CRP: privacy-preserving deep neural network processing for credit risk prediction in cloud: a homomorphic encryption-based approach
|
Naresh, Vankamamidi S. |
|
|
13 |
1 |
|
article |
122 |
Predicting the individual effects of team competition on college students’ academic performance in mobile edge computing
|
Zhang, Huiling |
|
|
13 |
1 |
|
article |
123 |
Predicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy
|
Zhao, Siren |
|
|
13 |
1 |
|
article |
124 |
Predictive digital twin driven trust model for cloud service providers with Fuzzy inferred trust score calculation
|
John, Jomina |
|
|
13 |
1 |
|
article |
125 |
Predictive mobility and cost-aware flow placement in SDN-based IoT networks: a Q-learning approach
|
Huang, Gan |
|
|
13 |
1 |
|
article |
126 |
Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity
|
Fang, Junli |
|
|
13 |
1 |
|
article |
127 |
Privacy-preserving federated learning based on partial low-quality data
|
Wang, Huiyong |
|
|
13 |
1 |
|
article |
128 |
Privacy-preserving sports data fusion and prediction with smart devices in distributed environment
|
Liu, Ping |
|
|
13 |
1 |
|
article |
129 |
Provably secure data selective sharing scheme with cloud-based decentralized trust management systems
|
Velmurugan, S. |
|
|
13 |
1 |
|
article |
130 |
Quantum support vector machine for forecasting house energy consumption: a comparative study with deep learning models
|
K, Karan Kumar |
|
|
13 |
1 |
|
article |
131 |
Real-time scheduling of power grid digital twin tasks in cloud via deep reinforcement learning
|
Qi, Daokun |
|
|
13 |
1 |
|
article |
132 |
Recognizing online video genres using ensemble deep convolutional learning for digital media service management
|
Shao, Yuwen |
|
|
13 |
1 |
|
article |
133 |
RNA-RBP interactions recognition using multi-label learning and feature attention allocation
|
Han, Huirui |
|
|
13 |
1 |
|
article |
134 |
Secure semantic search using deep learning in a blockchain-assisted multi-user setting
|
Khan, Shahzad |
|
|
13 |
1 |
|
article |
135 |
Security issues of news data dissemination in internet environment
|
Song, Kang |
|
|
13 |
1 |
|
article |
136 |
Short-term forecasting of surface solar incident radiation on edge intelligence based on AttUNet
|
Cui, Mengmeng |
|
|
13 |
1 |
|
article |
137 |
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems
|
Lan, Shizhan |
|
|
13 |
1 |
|
article |
138 |
Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing
|
Chen, Xuefei |
|
|
13 |
1 |
|
article |
139 |
SMedIR: secure medical image retrieval framework with ConvNeXt-based indexing and searchable encryption in the cloud
|
Amaithi Rajan, Arun |
|
|
13 |
1 |
|
article |
140 |
SRA-E-ABCO: terminal task offloading for cloud-edge-end environments
|
Jiao, Shun |
|
|
13 |
1 |
|
article |
141 |
SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse
|
Fugkeaw, Somchart |
|
|
13 |
1 |
|
article |
142 |
Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets
|
Abdelhady, Naglaa |
|
|
13 |
1 |
|
article |
143 |
STAM-LSGRU: a spatiotemporal radar echo extrapolation algorithm with edge computing for short-term forecasting
|
Cheng, Hailang |
|
|
13 |
1 |
|
article |
144 |
Students health physique information sharing in publicly collaborative services over edge-cloud networks
|
Liu, Ping |
|
|
13 |
1 |
|
article |
145 |
Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing
|
Li, Meiyan |
|
|
13 |
1 |
|
article |
146 |
Task offloading exploiting grey wolf optimization in collaborative edge computing
|
Nujhat, Nawmi |
|
|
13 |
1 |
|
article |
147 |
TCP Stratos for stratosphere based computing platforms
|
Periola, A. A. |
|
|
13 |
1 |
|
article |
148 |
The key security management scheme of cloud storage based on blockchain and digital twins
|
Huang, Jie |
|
|
13 |
1 |
|
article |
149 |
Time-aware outlier detection in health physique monitoring in edge-aided sport education decision-makings
|
Li, Yanjie |
|
|
13 |
1 |
|
article |
150 |
Timed-release encryption anonymous interaction protocol based on smart contract
|
Yuan, Ke |
|
|
13 |
1 |
|
article |
151 |
Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling
|
Han, Huimin |
|
|
13 |
1 |
|
article |
152 |
Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks
|
Huang, Rui |
|
|
13 |
1 |
|
article |
153 |
Toward security quantification of serverless computing
|
Ni, Kan |
|
|
13 |
1 |
|
article |
154 |
Towards explainability for AI-based edge wireless signal automatic modulation classification
|
Xu, Bo |
|
|
13 |
1 |
|
article |
155 |
Towards optimized scheduling and allocation of heterogeneous resource via graph-enhanced EPSO algorithm
|
Zhang, Zhen |
|
|
13 |
1 |
|
article |
156 |
Traffic prediction for diverse edge IoT data using graph network
|
Shen, Tao |
|
|
13 |
1 |
|
article |
157 |
Transformative synergy: SSEHCET—bridging mobile edge computing and AI for enhanced eHealth security and efficiency
|
Humayun, Mamoona |
|
|
13 |
1 |
|
article |
158 |
Unified ensemble federated learning with cloud computing for online anomaly detection in energy-efficient wireless sensor networks
|
Gayathri, S. |
|
|
13 |
1 |
|
article |
159 |
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future
|
Alsharabi, Naif |
|
|
13 |
1 |
|
article |
160 |
When wavelet decomposition meets external attention: a lightweight cloud server load prediction model
|
Zhang, Zhen |
|
|
13 |
1 |
|
article |
161 |
Wind power prediction method based on cloud computing and data privacy protection
|
Zhang, Lei |
|
|
13 |
1 |
|
article |