


default search action
Concurrency and Computation: Practice and Experience, Volume 37
Volume 37, Number 1, January 2025
Research Article
- Qiqi Zhang, Bohui Li, Shaojin Geng
, Xingjuan Cai
:
A Multi-Workflow Scheduling Approach With Explicit Evolutionary Multi-Objective Multi-Task Optimization Algorithm in Cloud Environment.
Special Issue Paper
- W. Pepper Marts
, Matthew G. F. Dosanjh
, Whit Schonbein
, Scott Levy
, Patrick G. Bridges
:
Measuring Thread Timing to Assess the Feasibility of Early-Bird Message Delivery Across Systems and Scales.
Volume 37, Number 2, January 2025
Special Issue Paper
- Yonghwan Kim
, Yoshiaki Katayama, Koichi Wada:
Complete Visibility Algorithms of Luminous Robots With Two-Color Lights on Grid. - Xuanzhengbo Ren
, Masatoshi Kawai, Tetsuya Hoshino, Takahiro Katagiri, Toru Nagai:
Auto-Tuning Mixed-Precision Computation by Specifying Multiple Regions.
Research Article
- Sweta Gupta
, Kamlesh Kumar Gupta, Piyush Kumar Shukla
:
Improving the End-to-End Protection in E-Voting Using BVM - Blockchain-Based E-Voting Mechanism. - Mohamed Hedi Fourati
, Soumaya Marzouk, Mohamed Jmaiel:
Cloud Elasticity of Microservices-Based Applications: A Survey.
Special Issue Paper
- Satoki Tsuji
, Yasuaki Ito
, Koji Nakano
, Akihiko Kasagi:
GPU Acceleration of the Boys Function Evaluation in Computational Quantum Chemistry.
Research Article
- T. R. Chenthil
, G. Balachandran
, S. Ranjith
, E. Sakthivel
:
A Quantum-Inspired Source-Distributed Opportunistic Routing Protocol for Reliable Routing in Underwater Wireless Sensor Networks. - Monika Dubey, Ashutosh Kumar Singh
, Richa Mishra
:
AI Based Resource Management for 5G Network Slicing: History, Use Cases, and Research Directions. - Xuanli Liu, Weibei Fan
, Jing He
, Zhijie Han
, Chi-Hung Chi:
Reliability Assessment of Multiprocessor System Based on Exchanged Crossed Cube Networks. - Subhajit Sahu
, Kishore Kothapalli
:
A Fast Parallel Approach for Neighborhood-Based Link Prediction by Disregarding Large Hubs. - Ameni Chetouane
, Kamel Karoui:
New Continual Federated Learning System for Intrusion Detection in SDN-Based Edge Computing.
Special Issue Paper
- Niclas Jansson
, Martin Karp, Jacob Wahlgren, Stefano Markidis, Philipp Schlatter:
Design of Neko - A Scalable High-Fidelity Simulation Framework With Extensive Accelerator Support.
Research Article
- Mingxiu Tuo, Chenglei Jia, Siyu Jin, Shunli Zhang
:
FPM-SSD: Fast Parallel Multi-Scale Smooth Signed Distance Surface Reconstruction. - Bin Zhang
, Yuejuan Wei, Shuqui Zang, Qing Li, Yan Qiang:
An Echo Pressure Model Based on Mutil-Gaussian Beam Theory for Measuring the Liquid Level in Special Field.
Correction
- Correction to "A DSEL for High Throughput and Low Latency Software-Defined Radio on Multicore CPUs".
Volume 37, Number 3, February 2025
Research Article
- Bhanu Pratap, Ayush Singh, Pawan Singh Mehra
:
REHAS: Robust and Efficient Hyperelliptic Curve-Based Authentication Scheme for Internet of Drones. - Heda Wang
, Shuyan Zhang:
Research on the Application of Improved BERT-DPCNN Model in Chinese News Text Classification. - Xiaowen Chen, Jian Lv, Qingsheng Xie
:
Fatigue Detection Based on Blood Volume Pulse Signal and Multi-Physical Features. - Zexin Zhang
:
Enhancing Invariant Feature Learning via Cross-Composition and Self-Enrichment Normalization for Visible-Infrared Person Re-Identification.
Special Issue Paper
- Pedro Moritz de Carvalho Neto, Márcio Castro
, Frank Siqueira:
Dynamic Load Balancing in Kubernetes Environments With Kubernetes Scheduling Extension (KSE).
Review Article
- Omar Ben Maaouia
, Hazem Fkaier, Christophe Cérin, Mohamed Jemni
:
An Efficient Services Placement for Optimizing the Energy Consumption in Volunteer Cloud Computing.
Research Article
- Qiang Li, Feng Zhao, Linlin Zhao, Maokai Liu, Yubo Wang, Shuo Zhang, Yuanyuan Guo, Shunlu Wang, Weigang Wang:
A System of Multimodal Image-Text Retrieval Based on Pre-Trained Models Fusion. - Qiang Qian, Ping Ma
, Nini Wang, Hongli Zhang, Cong Wang, Xinkai Li:
Research on Industrial Process Fault Diagnosis Based on Deep Spatiotemporal Fusion Graph Convolutional Network. - Jie Wen, Qian Wang, Haozhe Dong, Zhihua Cui
:
Personalized Indicator Based Evolutionary Algorithm for Uncertain Constrained Many-Objective Optimization Problem With Interval Functions.
Special Issue Paper
- Hüseyin Can Önel
, Ali Ata Adam
, Nilay Sezer-Uzol
:
Comparative Aerodynamic Analysis and Parallel Performance of 2D CFD Simulations of a VAWT Using Sliding Mesh Interface Method.
Research Article
- P. Vinayasree
, A. Mallikarjuna Reddy
:
A Reliable and Secure Permissioned Blockchain-Assisted Data Transfer Mechanism in Healthcare-Based Cyber-Physical Systems. - Jintao Jiao
, Lei Guo, Wensen Yu, Sheng Yang, Shaozi Li:
An Efficient Lattice-Based Heterogeneous Signcryption Scheme for VANETs.
Special Issue Paper
Research Article
- Qingpeng Li, Xinyue Hu, Jia Zhao
, Hao Cao:
Density Peak Clustering Algorithm Based on Shared Neighbors and Natural Neighbors and Analysis of Electricity Consumption Patterns.
Special Issue Paper
- Le Mai Weakley
, Scott Michael
, Laura Huber, Abhinav Thota
, Ben Fulton, Matthew Kusz:
Monitoring and Characterizing GPU Usage.
Research Article
- Jia Zhao
, Ming Chen, Jeng-Shyang Pan, Longzhe Han, Shenyu Qiu, Zhaoxiu Nie:
Contextual Information Aggregation and Multi-Scale Feature Fusion for Single Image De-Raining in Generative Adversarial Networks.
Special Issue Paper
- Tolga Büyüktanir, Mehmet S. Aktas:
On the Use of Embedding Techniques for Modeling User Navigational Behavior in Intelligent Prefetching Strategies.
Research Article
- Rupali Sachin Vairagade
, Priya Parkhi, Yogita Hande, Bhagyashree Hambarde:
Blockchain-Powered Framework for Trust Enhancement in FinTech: A Comprehensive Trust Evaluation Approach.
Special Issue Paper
- Shunsuke Tsukiyama, Koji Nakano
, Yasuaki Ito
, Takumi Kato, Yuya Kawamata:
Ising Models for Solving the N-Queens Puzzle Based on the Domain-Wall Vectors.
Research Article
- Boykuziev Ilkhom
, Angshuman Khan
, Rupayan Das
, Abdurakhimov Bakhtiyor
:
A Novel Approach to Integer Factorization: A Paradigm in Cryptography.
Special Issue Paper
- Tandac F. Guclu
, Busra Tayhan
, Ebru Çetin
, Ali Rana Atilgan
, Canan Atilgan
:
High Throughput Mutational Scanning of a Protein via Alchemistry on a High-Performance Computing Resource.
Research Article
- Abhinav Tomar
, Geetanjali Rathee:
Optimized Framework for Composite Cloud Service Selection: A Computational Intelligence-Driven Approach.
Special Issue Paper
- Mateus S. de Melo, Roberto Pinto Souto
, Lúcia M. A. Drummond
:
Optimized Execution of a Numerical Weather Forecast Model in a Cloud Cluster.
Research Article
- Raushan Kumar Singh
, Mukesh Kumar:
Optimization of Path for Road Network With Modified Ant Colony Optimization (MACO). - Pragya
, Bijendra Kumar:
Enhanced IPv6 Addressing Scheme: Irreversible Elegant Pairing for Reconnaissance Attack Prevention. - Yangyang Shen
, Jing Wu, Minfu Ma, Xiaofeng Du, Datian Niu:
Application of an Improved Differential Evolution Algorithm in Practical Engineering. - Xiaohan Wang
, Xuehui Du, Hengyi Lv, Siyuan Shang, Aodi Liu
:
Unstructured Text Data Security Attribute Mining Method Based on Multi-Model Collaboration. - Xue Li, Yang Xiang, Lan Ma, Hong Li
, Huawei Wang, Lili Cai, Shuai Lu, Chao Tang, Xilian Wei:
Probabilistic Risk Analysis for Catenary System of Heavy-Haul Railway Based on Casual Inference. - Sunil Kumar, Gaurav Mittal, Arvind Yadav
:
Three Party Post Quantum Secure Lattice Based Construction of Authenticated Key Establishment Protocol for Mobile Communication.
Special Issue Paper
- Qingquan Tong, Rongju Yao
:
Integrating Embedding and LSHiForest in English Text Anomaly Detection.
Research Article
- Changcheng Wei, Juanyan Fang
, Zhu Xu, Jinbao Meng, Zenglu Ye, Yipeng Wang, Tumennast Erdenebold
:
YOLOv8-ESW: An Improved Oncomelania hupensis Detection Model. - Hong Chen
, Jianxun Liu
, Zhifeng Zhu
:
A Dynamic Energy-Efficient Scheduling Method for Periodic Workflows Based on Collaboration of Edge-Cloud Computing Resources. - Arash Heidari
, Mohammad Ali Jabraeil Jamali, Nima Jafari Navimipour:
An Innovative Performance Assessment Method for Increasing the Efficiency of AODV Routing Protocol in VANETs Through Colored Timed Petri Nets.
Volume 37, Numbers 4-5, February 2025
Special Issue Paper
- Maxime Dresler, Sanaï Mansour, Safaâ Talhaoui, Yukiko Yamauchi
, Sébastien Tixeuil:
On Dynamics of Basic Network Creation Games With Non-Uniform Communication Interest.
Research Article
- Tao Ye, Zhihua Cui
:
Dynamic Multi-Objective Workflow Scheduling Model in Cloud Environment Based on Adaptive Mutation Strategy. - Neda Matin
, Mina Zolfy Lighvan, Najibeh Farzi Veijouyeh
:
Convolutional Neural Networks for Imbalanced Advanced Security Network Metrics and Non-Payload-Based Obfuscations Dataset to Detect Intrusion. - Remya Kommadath
, Debasis Maharana
, Prakash Kotecha:
Multiobjective Phase-Wise Teaching Learning-Based Optimization With No-Wait Time Heuristic for Job Shop Scheduling Problem.
Special Issue Paper
- Luis C. R. Alvarenga, Yuri Frota, Daniel de Oliveira
, Rafaelli Coutinho:
Optimizing Resource Estimation for Scientific Workflows in HPC Environments: A Layered-Bucket Heuristic Approach.
Research Article
- Zhixiang Zhao
, Yanxia Wu, Guoyin Zhang, Yiqing Yang, Ruize Hong:
Recursive Hybrid Compression for Sparse Matrix-Vector Multiplication on GPU. - Wenping Chen, Huibin Wang
, Zhe Chen, Lili Zhang:
Research on Multi-Scale Parallel Joint Optimization CNN for Arrhythmia Diagnosis. - Zixia Chen
, Tingquan Gu, Zelin Chen, Bingda Zhang:
Task Allocation Algorithm and Simulation Analysis for Multiple AMRs in Digital-Intelligent Warehouses. - Suhail Muhammad Kamal, Yidong Chen, Shaozi Li:
Advancing Continuous Sign Language Recognition Through Denoising Diffusion Transformer-Based Spatial-Temporal Enhancement. - Yanyan Wu, Yajun Xie, Yintao Hong:
The DeepLabV3+ Algorithm Combined With the ResNeXt Network for Medical Image Segmentation. - Hussein Younis, Mohammad M. N. Hamarsheh
:
ONOS Flood Defender: A Real-Time Flood Attacks Detection and Mitigation System in SDN Networks.
Special Issue Paper
- Guoquan Yuan, Xinjian Zhao, Shuaiqi Zhang
, Shi Chen, Shanming Wei:
A Robust Watermarking for Camera-Captured Images Using Few-Shot Learning and Simulated Noise Layer. - Ensar Atasoy
, Burhan Çuhadaroglu
:
Numerical Analysis of the Effetcs of Blended Split Winglets on Aerodynamic Performance of Aircraft.
Research Article
- Zhiwen Wang, Jiexia Huang, Junlin Huang, Yuhang Wang, Canlong Zhang
:
PM2.5 Concentration Prediction Using CNN-LSTM Model Based on Multi-Feature Fusion. - Ruoxi Wang, Yujia Zhu, Daoxun Xia
:
Cascade Ownership Verification Framework Based on Invisible Watermark for Model Copyright Protection. - Shweta Kushwaha
, Ravi Shankar Singh, Kanika Prajapati:
Multi-Objective Workflow Scheduling in Cloud Using Archimedes Optimization Algorithm. - Yashuang Mu
, Tian Liu, Wenqiang Zhang, Hongyue Guo, Lidong Wang
, Xiaodong Liu
:
A Distributed Information Granulation Method for Time Series Clustering. - Wenjian Feng, Zhiwen Wang, Chunmiao Wei, Xinhui Jiang, Yuhang Wang, Jiexia Huang:
Low-Light Image Enhancement Algorithm Based on Improved MSRCP With Chromaticity Preservation. - Mohamed Amine Laamari
, Nadjet Kamel:
A New Multi-Objective Binary Bat Algorithm for Feature Selection in Intrusion Detection Systems. - Morteza Jouyban, Soodeh Hosseini
:
Dynamic Model of Malware Propagation Based on Community Structure in Heterogeneous Networks. - Zilin Xia, Zedong Huang, Jinan Gu, Wenbo Wang:
Surface Defect Detector Based on Deformable Convolution and Lightweight Multi-Scale Attention. - Rangu Manjula
, Naveen Chauhan:
ProACT: Probabilistic Analysis and Countermeasures Tool for Blockchain Supply Chains With Smart Contracts Composition.
Special Issue Paper
- Seyma Cihan
, Adnan Ozsoy
, Oya Deniz Beyan:
Managing Clinical Research on Blockchain Using FAIR Principles. - Lucas Roges, Tiago Ferreto
:
Multi-Objective Dynamic Registry Provisioning in Edge Computing Infrastructures. - Xingyuan Kang
, Keichi Takahashi, Chawanat Nakasan, Kohei Ichikawa
, Hajimu Iida:
Load-Aware Multi-Objective Optimization of Controller and Datastore Placement in Distributed Sdns.
Research Article
- Man Zhang, Zheng Kou
:
Difference and Influencing Factors of the City Logistics Development Level in China. - N. Saravana Kumar
, S. Selvakumara Samy:
Cold Start Prediction and Provisioning Optimization in Serverless Computing Using Deep Learning.
Retraction
- RETRACTION: Brain Tumor Segmentation and Overall Survival Period Prediction in Glioblastoma Multiforme Using Radiomic Features.
- RETRACTION: An Integrated Framework for COVID-19 Classification Based on Classical and Quantum Transfer Learning from a Chest Radiograph.
- RETRACTION: An Efficient Medical Image Super Resolution Based on Piecewise Linear Regression Strategy Using Domain Transform Filtering.
- RETRACTION: A Multi-modality Paradigm for CT and MRI Fusion with Applications of Quantum Image Processing.
Research Article
- Chuqi Yan
, Jianqiang Huang
:
An Efficient Parallel Ordered Depth-First Search Strategy for Directed Acyclic Graphs. - Tasnim Assali
, Zayneb Trabelsi Ayoub
, Sofiane Ouni
:
Synergistic Distributed CNN Model for Protein Classification With a Collaborative BSP Synchronization Based on LSTM Prediction. - Yuchen Hou
, Buqing Cao
, Jianxun Liu
, Changyun Li, Min Shi:
TPST: A Traffic Flow Prediction Model Based on Spatial-Temporal Identity. - Xing Lu, Fengshan Lai, Zhixiang Cao, Daoxun Xia
:
ARTransformer: An Architecture of Resolution Representation Learning for Cross-Resolution Person Re-Identification. - Yuting Zhang, Yangfeng Wu, Huang Xu, Yajun Xie, Yan Zhang:
Improved Co-DETR With Dropkey and Its Application to Hot Work Detection. - Shu-Rong Yan, Mohadeseh Nadershahi, Wei Guo, Ebrahim Ghaderpour
, Ardashir Mohammadzadeh:
A Multi-Objective Decision-Making Neural Network: Effective Structure and Learning Method. - Nengfu Cai
, Yi Jiang, Haitao Zhang, Zhiwen Yang, Laicheng Zhong, Qi Chen:
HCRP-OSD: Fine-Grained Open-Set Intrusion Detection Based on Hybrid Convolution and Adversarial Reciprocal Points Learning. - Huipeng Chen
, Xinglei Yu
, Shaopeng Zhu
, Zhijun Wu, Chou Jay Tsai Chien, Junjie Zhu, Rougang Zhou:
Adaptive Slip Control of Distributed Electric Drive Vehicles Based on Improved PSO-BPNN-PID. - S. Kanthimathi
, R. Sivakami, B. Indira:
Modified Cryptosystem-Based Authentication Protocol for Internet of Things in Fog Networks.
Special Issue Paper
- Ismail H. Toroslu, Gadir Suleymanli:
Efficient Parallel Algorithm for Approximating Betweenness Centrality Values of Top k Nodes in Large Graphs.
Research Article
- Vinu Josephraj
, S. Wilfred Franklin
:
A Comprehensive Reinforcement Learning Framework for Priority-Aware Data Center Scheduling Optimization and QOS-Defined Buffer Management. - Soumyaranjan Panda
, Vikas Pareek, Sanjay Saxena:
Fv-SFL: A Contrastive Learning-Based Feature Sharing Method for Reducing the Effect of Label Skewed Data Heterogeneity in Federated Medical Imaging.
Special Issue Paper
- Tung Nguyen
, Hideyuki Kawashima:
Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real-Time Database Systems.
Research Article
- J. C. Miraclin Joyce Pamila
, Ramar Senthamil Selvi
:
Improved SVM-Recursive Feature Elimination (ISVM-RFE) Based Feature Selection for Bigdata Classification Under Map Reduce Framework.
Volume 37, Numbers 6-8, April 2025
Research Article
- Wen Zeng, Wenjing Yan, Emily Simpson, Carlos Molina-Jiménez
:
Quantitative Risk Assessment for Cloud-Based Software Migration Processes.
Special Issue Paper
- Xue Li
, Mingxing Liu, Lanshun Nie, Wenxiao Cheng, Xiaohe Wu, Dechen Zhan:
S2C-HAR: A Semi-Supervised Human Activity Recognition Framework Based on Contrastive Learning. - Zhaokun Chen, Qin Xie, Wei Jiang
:
Hybrid Deep Learning Models for Tennis Action Recognition: Enhancing Professional Training Through CNN-BiLSTM Integration. - Baoqing Tai, Xianxian Yang, Ju Chong, Lei Chen
:
Personalized Self-Directed Learning Recommendation System Based on Social Knowledge in Distributed Web.
Research Article
- Zhaolu Zuo
, Jie Wang, Jing Wang:
Stereo Calibration of Non-Overlapping FOV Cameras With Phase-Shifting Wedge Grating. - Tianbao Liu
, Yang Li, Xiwen Qin:
Enhanced Gradient-Based Optimizer Algorithm With Multi-Strategy for Feature Selection. - Akanksha Singh, Harish Chandra
, Saurabh Rana:
A Robust Lattice-Based Post-Quantum Three-Party Key Exchange Scheme for Mobile Devices. - Girish Talmale
, Urmila Shrawankar
:
Analysis and Performance Measure of Dynamic Cluster Based Hierarchical Real Time Scheduling for Distributed Systems.
Special Issue Paper
- Hemraj Raikwar
, Harshil Sadharakiya, Sushanta Karmakar:
Dynamic Algorithms for Approximate Steiner Trees.
Research Article
- Yuan Zeng
, Hengzhou Ye, Gaoxing Li:
Adaptive Dynamic Service Placement Approach for Edge-Enabled Vehicular Networks Based on SAC and RF. - Qingqing Wu, Tinghong Gao
:
Machine Learning-Based Modeling of Clinical Diagnosis and Treatment of Patients With Hemorrhagic Stroke. - Sinchan Sengupta
, Sathya Peri:
On Reducing Stretch in Spanning Trees. - Lei Tan
, Xinmin Song:
Quadratic Estimation for Discrete Time System With State Equality Constraints and Composite Disturbances.
Special Issue Paper
- Ryuji Ukai
, Chihiro Yoshimura, Hiroyuki Mizuno:
Quantum Computer Architecture for Quantum Error Correction With Distributing Process to Multiple Temperature Layers. - Bruno Silva, Luiz Guerreiro Lopes
:
GPU Acceleration of the GWO Optimization Algorithm: Application to the Solution of Large Nonlinear Equation Systems.
Research Article
- Manvitha Gali
, Aditya Mahamkali:
Deep Learning Based Attack Detection and QoS Aware Secure Routing Protocol for SDN-IoT Network.
Special Issue Paper
- Kemal Ebcioglu, Batuhan Bulut, Atakan Dogan
, Gürhan Küçük, Ismail San
:
1,024-FPGA DES Supercomputer on the AWS Cloud. - Qiang Ren, Chengmingchan Yan, Fumin Zou, Yue Xing, Haolin Wang
, Ying Zhang
:
Real-Time Monitoring of On-Board Unit Status in Highway Electronic Toll Collection Systems Using Graphsage-Based Heterogeneous Graph Learning. - Baoqing Tai, Xianxian Yang, Ju Chong, Lei Chen
:
An Efficient Hybrid Recommender System for e-Learning Based on Cloud Content in Educational Web Services. - Wangyong Guo
, Siyang Shao, Kexin Zhang, Rongqiang Feng, Xueqiong Wu, Zhihao Zhang:
Privacy-Preserving Real-Time Smart Grid Topology Analysis: A Graph Neural Networks Approach.
Volume 37, Numbers 9-11, May 2025
Research Article
- Wenbin Yao, Longcan Hu
, Yingying Hou:
A Distributed Parallel Network Intrusion Detection System Based on Ray Framework With GPU Acceleration. - G. Arul Dalton
, Augusteen Bamila Virgin Louis
, A. Ramachandran, J. Savija
:
Modified Deep Learning Model in Proactive Decision-Making for Handover Management in 5G. - Sanfeng Zhang
, Hongzhen Xu, Xiaojun Yu:
CGKDFL: A Federated Learning Approach Based on Client Clustering and Generator-Based Knowledge Distillation for Heterogeneous Data. - Tarek Ramadan
, Nathan Pinnow, Chase Phelps, Jayaraman J. Thiagarajan, Tanzima Z. Islam
:
Structure-Aware Representation Learning for Effective Performance Prediction. - Rhauani Weber Aita Fazul
, Odorico Machado Mendizabal
, Patrícia Pitthan Barcelos:
DARB: A Dynamic Architecture for Data Replica Balancing. - Le Xu
, Yong Xu:
A Multi-Scenario Multi-Period Facility Location-Allocation Model and Algorithm for Pre-Disaster Planning. - Nupur Jangu
, Zahid Raza
:
A Modified Jellyfish Search Algorithm for Task Scheduling in Fog-Cloud Systems.
Special Issue Paper
- Caio Von Rondow Morais, Jeronimo Penha, José Augusto Miranda Nacif
, Ricardo S. Ferreira
:
Unblocking Placement and Routing in Rearrangeable Multi-Stage Networks.
Research Article
- Anita Thakur, Virender Ranga
, Ritu Agarwal:
Revocable and Privacy-Preserving CP-ABE Scheme for Secure mHealth Data Access in Blockchain. - Nadia Dahmani, Hatem Aziza
, Hajer Ben-Romdhane
, Saoussen Krichen:
Multi-Criteria Optimization of Scientific Workflow Schedules for Improved Energy Efficiency in Cloud Infrastructures. - K. Aruna:
Secure Attestation and Dynamic Load Balancing (SALB) for Optimized Container Management: Ensuring Integrity and Enhancing Resource Efficiency.
Special Issue Paper
- Meirong Zheng, Ruchun Jia
, Jing Zhu, Shaorong Zhang, Wenlong Yao, Yuanbin Li:
Intelligent Network Security Optimization Algorithm Based on Cnns. - Shugui Lin, Wei Zhang, Ruchun Jia
, Haitao Deng, Linyuan Li, Jianjun Zhou, Ze Li:
Optimization of Anti-Tampering Method for Financial Data in Edge Intelligent Systems Based on Support Vector Machine.
Research Article
- Yujia Zhu, Jia Luo, Ruoxi Wang, Xiaojie Du, Daoxun Xia
:
Multiuser Hierarchical Authorization Using Sparsity Polarization Pruning for Model Active Protection. - Zewei Zhang
, Taoshen Li, Linfeng Yang:
Adaptive Hierarchical Offloading for Mobile Edge Computing in High-Mobility SWIPT-Enabled Networks. - Yaru Zhao
, Jianbiao Zhang, Yihao Cao
, Xianqun Han:
MOFDRNet: A Model for Data Leakage Attacks in Federated Learning. - Seyed Ebrahim Dashti
, Wassan Sajit Nasser Al-Jabri, Ali Farzanehmehr
:
Detecting Network Security Bypass Threats Using Machine Learning Methods: Detecting Intruders on the Network. - Yu Mao
, Chunyu Shi, Zhiyi Cai, Hui Chen, Lei Guo
:
Hierarchical Feature Selection Based on Instance Correlation and Label Semantic Structure. - Tiantian Zhang
, Ying Wang, Bo Gong, Jianbo Xu, Junjie Wu, Changxu Wan:
Privacy Protection During the Issuance and Revocation of Verifiable Credentials in Self-Sovereign Identity. - Anuradha Banerjee
, Sachin Kumar Gupta
, Vinod Kumar
:
A Genetic Algorithm-Based Approach for Collision Avoidance in a Multi-UAV Disaster Mitigation Deployment. - Yujia Xie
, Dongmei Li, Xiaomei Zhang, Wenjing Lv:
A Traceable and Anonymous Mutual Authentication Scheme for Smart Healthcare on Elliptic Curves. - Nouf A. AlSowaygh
, Mohammed J. F. Alenazi
, Maazen Alsabaan:
SCGG: Smart City Network Topology Graph Generator. - Bin Deng, Hao Guo, Weidong Li
:
An Alternative Mechanism for Multiresource Fair Allocation in Heterogeneous Cloud Computing Systems. - Fulong Li
, Fanlong Zhang, Yuhang Wu, Zhuowei Wang
, Quan Chen
, Yuan Chai, Yongchao Tao:
Toward Latency-Efficient Multicast Coflow Scheduling for Reconfigurable Data Center Networks. - Han Wang
, Balaji Muthurathinam Panneer Chelvan, Muhammed Golec
, Sukhpal Singh Gill
, Steve Uhlig
:
HealthEdgeAI: GAI and XAI Based Healthcare System for Sustainable Edge AI and Cloud Computing Environments. - Jiawei Chen, Jiayi Zhong, Guosheng Kang
, Jianxun Liu
, Yiping Wen
:
Variantrank: Business Process Event Log Sampling Based on Importance of Trace Variants.
Special Issue Paper
- Yonghao Yu
, Dawei Zhao, Yongwei Tang, WengTak Kuok, Wei Ding:
High-Precision Indoor Visible Light Positioning Method for Line-Of-Sight Scenes Based on a Spatiotemporal Sequence Attention Mechanism.
Research Article
- Anupam Yadav, Ashish Sharma
:
A New Approach to Cloud Resource Scheduling Using Genetic Reinforcement Kernel Optimization and Machine Learning Model. - Siyi Chen, Haiyang Kuang
, Jiaxin Zhou, Jin Liu:
Customer-Satisfaction and Risk-Aware Pricing Policy for Profit Maximization in Cloud Computing. - K. P. Uvarajan, Kishore Balasubramanian
, C. Gowri Shankar:
Unveiling the Invisible: Powering Security Threat Detection in WSN With AI. - Junhu Peng
, Tao Peng
, Can Tang, Xingxing Xie:
A Multi-Strategy Fusion for Mobile Robot Path Planning via Dung Beetle Optimization. - Rahul Singh, Laxminarayan Das, Dharminder Chaudhary
:
Building Scalable and Quantum Attack Resistant Authenticated Message Delivery System for Internet of Vehicles With Blockchain Consensus Mechanism.
Special Issue Paper
- Xin Zhao, Haotian Zheng, Qiyun Zhang
:
Modern Advances in Artificial Intelligence Across the Athletic Domain.
Research Article
- Gezi Shi
, Jing Li, Tangbao Zou, Haiyan Yu, Feng Zhao:
Density Viewpoint Clustering Outlier Detection Algorithm With Feature Weight and Entropy. - Yuling Luo, Bingxiong Jiang, Sheng Qin
, Qiang Fu, Shunsheng Zhang:
EEG-Based Epilepsy Recognition via Federated Learning With Differential Privacy. - Mohamed Lehsaini
, Anas Nawfel Saidi, Tawfiq Nebbou, Pascal Lorenz:
Efficient Routing Protocol Using Fresh Vehicular Traffic Information for VANETs. - Qiang Peng, Renjun Zhan, Husheng Wu
, Aiai Wang, Yuanda Lai:
A Multi-Strategy Enhanced Wolf Pack Algorithm for Three-Dimensional Path Planning of Unmanned Aerial Vehicles. - Shuilin Chen
, Jianguo Zheng:
Discrete Gray Wolf Optimizer for Solving Distributed Permutation Flowshop Scheduling Problem. - K. Viswanathan Iyer
, Karthick Seshadri
, K. Srinivasulu
:
An Advancement in Huffman Coding With a Potential for Parallel Decoding. - Gubao Mao
, Xianwen Fang
, Ke Lu
:
Business Process Anomaly Behavior Detection Method Based on Multiperspective Association Rules. - Shuqi Niu, Zhao Zhang
, Hongyan Zhou
, Xue-Bo Chen
:
Short-Term Power Load Prediction Based on Cluster Analysis and Temporal Convolutional Networks of Attention Mechanism. - Minni Jain
, Aditya Gupta, Aaryan Arora, Aayush Patel:
Ranking Influential Nodes in Social Networks Based on the Game of Thieves Algorithm.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.