


default search action
Journal of Cloud Computing, Volume 15
Volume 15, Number 1, December 2026
- Yanjie Li, Ali Fayazi, Hossein Ghayoumi Zadeh:

Federated knowledge graph-based hybrid personalized curriculum recommendation for privacy-preserving physical education teaching systems. 1 - Yufang Han, Mengyao Gu, Xinsheng Xu:

Flexible evaluation method based on personalized evaluation requirements for cloud manufacturing services. 2 - Yangwenting Xu, Yong Wang, Feng Jiang, Fei Zhou, Junqi Chen

:
Data repair optimization method for geo-distributed fault-tolerant storage systems based on whale optimization algorithm. 3 - Xifeng Xu, Yunni Xia, Qinglan Peng, Mengdi Wang, Yang Yu, Jiale Zhao:

A novel satellite application deployment method in Satellite Constellation through Inter-Satellite Links. 4 - Nahita Pathania, Balraj Singh, Isha Batra, Deepak Prashar, Arfat Ahmad Khan, Seifedine Kadry:

FireBat: a hybrid approach for load balancing in cloud computing. 5 - Chinmayee Rout, Srinivas Sethi, Jenamani Chandrakanta Badajena

, Ramesh Kumar Sahoo
:
FSEGM: feature selection and ensemble generative model for adaptive cloud security. 6 - Peng Peng, Mohammad Mahdi Moghimi:

Hash-based lightweight recommendation in edge computing for privacy-preserving sport communities. 7 - Hazem Moh'd Said Hatamleh, As'ad Mahmoud As'ad Alnaser, Said S. Saloum, Zahi A. Abu Sarhan

, Jawdat S. Alkasassbeh:
Optimized dynamic resource allocation in quantum networks for secure and efficient wireless communication. 8 - João Carvalheiro, Rui Valadas

, Marlon Paz, Hélder Barata, Sérgio Santos:
Kubernetes-aware load balancing for leaf-spine EVPN data centers. 9 - Kai Peng, Kunkun Yue, Peiyun Xiao, Victor C. M. Leung:

Security-aware computation offloading in internet of vehicles: a multi-agent reinforcement learning algorithm with attention mechanism. 10 - Anayo Chukwu Ikegwu

, Jasmine Chifurumnanya Nnabue, Annastasia Shako Kinse, Uzoma Rita Alo:
A survey of cyber threat intelligence in embedded system driven security for mobile health systems. 11 - Zongda Wu, Jian Xie, Huawen Liu, Huxiong Li, Guandong Xu, Gang Li:

A framework based on edge computing and identity replacement for the protection of user information service privacy. 12 - Olanrewaju L. Abraham, Md. Asri Ngadi, Johan Mohamad Sharif, Mohd Kufaisal Mohd Sidik:

A chaotic local search-based dwarf mongoose optimization algorithm for multi-objective task scheduling in cloud computing. 13 - Xin Zhao, Wenhui Sun, Edris Khezri:

Edge computing-enabled scalable health training log analysis with locality-sensitive hashing for similarity search. 14 - Jingchao Tan, Tiancheng Zhang, Cheng Zhang, Chenyang Wang, Xiuhua Li, Xiaofei Wang:

Energy-efficient user allocation and cache updating in mobile edge computing networks based on user geographical aggregation. 15 - Faisal S. Alsubaei:

Luminous defense: XAI-driven adaptive security for critical IoT infrastructures. 16 - Duan Xue, Xingying Huo, Ta Li, Peng Qin:

Dynamic task assignment for edge computing-enabled vehicular mobile crowdsensing. 17 - N. Mathivanan, B. Lanitha:

An integrated methodology for intrusion detection and mitigation to optimize cloud security. 18 - Yingquan Chen, Qianmu Li, Wenhao Zhang, He Zhu, Peng Li, Wei Sun:

WSMS: weakly supervised multi-feature steganalysis with EVT calibration for cloud-edge collaborative intelligence. 19 - José A. P. Martins, Paulo A. L. Rego, José A. F. de Macêdo, Francisco Airton Silva, Vinícius Lagrota:

Matrix protocol: a comprehensive systematic mapping study. 20 - Xun Zhao, Yunping Liu, Shuaihui Zhu, Tingting Zhang, Yiguang Gong, Liansheng Li:

Multi-stage task allocation strategy for UAV clusterin multi-object tracking. 21 - Rrezearta Thaqi, Gabriele Lenzini, Marcus Völp, Blerim Rexha:

Online machine learning for proactive threat intelligence and timely DDoS attack prediction. 22 - Yike Yuan, Xinkui Zhao, Shuyi Yu, Shengye Pang, Guobing Zou:

GuardChain: multi-stage trust framework for FL-empowered AIGC. 23 - Dinesh Kumar Nishad

, Rashmi Singh, Saifullah Khalid:
A lightweight blockchain-enabled federated intrusion prevention framework for resource-constrained industrial IoT devices to detect and mitigate emerging cyberattacks. 24 - Xiaorui Song, Mingling Shang, Reza Khosravi:

Adaptive rescaling technique for portable vision devices in IoMT toward swimming workouts training and safety. 25 - Zishun Rui, Shengjie Chen, Shucun Fu, Wenzheng Sun, Shengjun Xue:

Advancing faithful KBQA services via prompt-driven knowledge graph-enhanced LLMs in cloud. 26 - Joel Herve Mboussam Emati

, Vianney Kengne Tchendji
, Mounirah Djam-Doudou
:
A zero-trust decentralized identifier specification based machine learning against cyber-attacks in blockchain based self-sovereign identity. 27 - Ankush Mehra, Gurpreet Singh, Ahmad Almogren, Sumit Badotra, Vishnu Kant, Seada Hussen, Ateeq Ur Rehman

:
SAE-CNN-LSTM-based anomaly detection and mitigation framework for cloud-centric SDN environments. 28 - Haiyang Diao, Xiang Li, Wan Zhang, Yan Sibyl Yu, Ye Wang, Jing Zhang:

Self-supervised graph neural networks for network intrusion detection in cloud-edge collaboration environments. 29 - Fang Liu, Maryam Saberi Anari, Khosro Rezaee:

Towards security and efficiency in distributed fitness recommendation with hashing. 30 - Ricardo Beck Feiten, Edison Pignaton de Freitas

, Manuel M. Oliveira
:
Comparative analysis of cloud-based AI object detection services and YOLO11: performance, cost, and usability evaluation. 31 - Xue Fan, Wei Zou, M. K. Moghimi, Wei Yi:

Integrating AI and cloud-edge technologies for music creation in educational and performance domains. 32 - Kun Meng, Mingxing Li, Jianwen Ding, Huachun Zhou:

Cloud disaster recovery model based on failure prediction. 33 - Joao Giao, Fernando Luis-Ferreira, João Sarraipa, Ricardo Jardim-Gonçalves:

Enhancing health data integrity using Distributed Ledger Technology. 34 - Junhong Li, Kaiwen Qiu, Rongju Yao, M. K. Moghimi, Dongmin Hao, Lijuan Wang, Liang Liang:

Style-aware artwork recommendation with cloud-edge collaborative knowledge graphs. 35 - Feng Xu, Qin Wang, Hossein Khosravi:

Edge intelligence for on-site risk detection in road and bridge engineering. 36 - Abdullah Alelyani, Amitava Datta, Ghulam Mubashar Hassan:

A machine learning technique for optimizing virtual machine placement in data-centres. 37 - A. Surayya, Md. Muzakkir Hussain, Anwar Ulla Khan, Leila Jamel, Ateyah Alzahrani:

Mobility aware microservice placement in vehicular edge computing. 38 - Mohamed Galal, Eman Abd El Reheem, Shawkat Guirguis:

Enhancing privacy and transparency in electronic voting: a blockchain-based cryptographic framework. 39 - Abdullah Ayub Khan, Hamad Almansour, Ahod Alghuried, Jamil Abedalrahim Jamil Alsayaydeh, Mohamad Afendee Mohamed, Sajid Ullah:

BIoT-Chain: a hyperledger blockchain cloud framework with SHA-3 keccak-enabled privacy for robust drone IoT network security. 40 - Yi Li, Mohammad Jafar Mokarram:

Distributed carbon emission prediction in edge environment considering spatial-temporal context factors. 41 - Sima Attar-Khorasani, Lincoln Sherpa, Matthias Lieber, Siavash Ghiasvand:

Seamless transitions: a comprehensive review of live migration technologies. 42 - Chao Guo, Mohammad Mehdi Ghasemi:

CloudSeqAnim: cloud-based sequential behavior modeling for large-scale animation content services. 43 - Junsan Zhang, Yudie Yan, Junxiao Han, Ao Lu, Juncai Guo, Javad Pourzamani:

Cloud-assisted LLM-enhanced datasets for AST hierarchy-aware code summarization model. 44 - Ajay Rathee, Sandeep Dalal, Kedir Botamo Adem:

Optimizing cloud resource allocation with an integrated XGBoost-RFOA model. 45 - Siyan Chen, Xueer Zhang, E. Liu, Yanjiao Xiong, Lin Wang, Xiaozhe Gu, Zhehui Wang, Jing Guo, Tao Luo:

Privacy-preserving cloud-based dermatological image processing for medical applications: a review. 46 - Faezeh Nayyeri, Ziba Eslami, Nasrollah Pakniat:

PP-WBHSTM: privacy-preserving weighted bidirectional heterogeneous spatial task matching. 47 - Almoatasem A. H. Alnaabi, Ali Abdullah Hamed Al-Mahruqi:

Artificial intelligence methods for enhancing cybersecurity in Oman: a comprehensive review. 48

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














