


default search action
Cluster Computing, Volume 28
Volume 28, Number 1, February 2025
- Mahmoud E. Farfoura, Ibrahim Mashal, Ahmad A. A. Alkhatib, Radwan M. Batyha

:
A lightweight machine learning methods for malware classification. 1 - Yezhou Zhang

, Lang Li
, Yu Ou:
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis. 2 - Sunil Prajapat, Dheeraj Kumar

, Pankaj Kumar:
Quantum image encryption protocol for secure communication in healthcare networks. 3 - Manish Kumar, Sunggon Kim:

Augmented access pattern-based I/O performance prediction using directed acyclic graph regression. 4 - Sunil Prajapat, Neeraj Kumar

, Ashok Kumar Das, Pankaj Kumar, Rifaqat Ali
:
Quantum-safe blockchain-assisted data encryption protocol for internet of things networks. 5 - Jaya Dofe, Shailesh Rajput:

Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function. 6 - Gabriel Araújo, Rayner Sousa, Iure Fé, Paulo A. L. Rego, Francisco Airton Silva:

Network service function chaining: a performance study varying topologies. 7 - Lujie Wang, Zhong Chen

, Xiyu Sun, Chenchen He:
Region of interest encryption algorithm for images based on lifting scheme and object detection. 8 - Nan Li, Qianqian Su

:
An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud. 9 - Guodong Ye, Zhuozhao Chen:

Authenticated reversible image hiding algorithm based on blockchain technology. 10 - Nguyen Tan Cam, Tran Duc Viet:

uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models. 11 - Willian Barreiros

, Jun Kong, Renato Ferreira, George Teodoro:
A hierarchical data partitioning strategy for irregular applications: a case study in digital pathology. 12 - Ardalan Ghasemzadeh, Hadi S. Aghdasi, Saeed Saeedvand:

Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism. 13 - Zeng Gao

, Yi Zhuang, Jingjing Gu:
Multi-strategy arithmetic optimization algorithm for global optimization and uncertain motion tracking. 14 - Rong Gao, Zhiwei Chen, Xinyun Wu, Yonghong Yu, Li Zhang:

Dynamic deep graph convolution with enhanced transformer networks for time series anomaly detection in IoT. 15 - G. Punnam Chander, Sujit Das:

A hybrid decision support system in medical emergencies using artificial neural network and hyperbolic secant grey wolf optimization techniques. 43 - Yong He, Mingran Wang:

Dynamic step opposition-based learning sparrow search algorithm for UAV path planning. 44 - Riham Elsaadany, Guy Bégin:

An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things. 45 - Leda Qu

, Feng Wen, Haixin Huang, Zhuo Wang:
Aggregation-chain: a consortium blockchain based multi-chain data sharing framework with efficient query. 46 - Abdoul Fatakhou Ba, Yingchi Mao, Abdullahi Uwaisu Muhammad, Omaji Samuel, Tasiu Muazu, Umar Muhammad Mustapha Kumshe:

Blockchain federated learning with sparsity for IoMT devices. 47 - Seyed Alireza Omranian, Maziar Goudarzi:

Greedy algorithm for dynamic allocation of intelligent services in vehicular edge computing. 48 - WeiGuang Gu, Fang Wang:

A multi-strategy improved dung beetle optimisation algorithm and its application. 49 - Radjaa Bensaid, Nabila Labraoui

, Hafida Saidi, Haythem Bany Salameh:
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach. 50 - Meysam Jahani, Fatemeh Raji

, Zahra Zojaji:
Securing supply chain through blockchain-integrated algorithmic system: ensuring product quality and counterfeiting tags detection. 51 - Linqiu Gui

, Chunnian Zeng, Jie Luo, Xiaofeng Wang, Xu Yang, Shengshi Zhong:
Graph-based robust 3D point cloud map merging approach for large scale. 52 - Bingxian Li, Lin Zhu, Long Tan:

A vehicular edge computing content caching solution based on content prediction and D4PG. 53 - Alireza Alibakhshi

, Erfan Hassannayebi:
Towards an enhanced next activity prediction using attention based neural networks. 54 - Lei Zhou, Yanyan Dong, Bingya Ma, Zhewen Yin, Fan Lu:

Object detection in low-light conditions based on DBS-YOLOv8. 55 - Sunita Rani

, Geeta Kasana, Shalini Batra:
An efficient content based image retrieval framework using separable CNNs. 56 - Adnane Talha, Anas Bouayad:

Quasi-opposition Remora Optimizer based Nelder-Mead algorithm for tasks scheduling in cloud. 57 - Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh, Alwi M. Bamhdi, Ana Luiza Bessa Barros, Djamel Zeghida, Ahmed Patel:

Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks. 58 - Zihan Wang, Jiqun Zhang

, Yongwei Tang, Hongyuan Cheng:
BGAS: blockchain-based secure and efficient group key agreement scheme for dynamic vehicular platoon. 59 - Mohd Sakib, Shahnawaz Ahmad, Khalid Anwar

, Mohd Saqib:
Optimizing support vector regression using grey wolf optimizer for enhancing energy efficiency and building prototype architecture. 60 - Mohammed Batis, Yi Chen, Mingjing Wang, Lei Liu

, Ali Asghar Heidari, Huiling Chen:
ACGRIME: adaptive chaotic Gaussian RIME optimizer for global optimization and feature selection. 61 - Shuling Hou, Gaoshang Xiao, Huiying Zhou:

High-performance network attack detection in unknown scenarios based on improved vertical model. 62 - Hamza Hammami, Sadok Ben Yahia

, Mohammad S. Obaidat:
A Robust Mutual Authentication Scheme for Health-Focused Connected Intelligent Objects. 63 - Xun Weng, Wenke She, Hongqiang Fan, Jingtian Zhang, Lifen Yun:

Multi-depot vehicle routing problem with drones in emergency logistics. 64 - Yufeng Wang, Yong Zhang, Zhuo Shuang, Ke Chen, Chunyu Xu:

A novel hybrid differential particle swarm optimization based on particle influence. 65 - Junliang Wang, Baohong Lin, Jiao Zhang, Mengyu Sun, Yongchen Pan:

An optimized RDMA QP communication mechanism for hyperscale AI infrastructure. 66 - Prashanth Choppara, Sudheer Mangalampalli:

An efficient deep reinforcement learning based task scheduler in cloud-fog environment. 67 - Shi-Hui Zhang, Jie-Sheng Wang, Si-Wen Zhang, Yu-Xuan Xing, Xiao-Fei Sui:

Multi-strategy fusion snake optimizer on task offloading and scheduling for IoT-based fog computing multi-tasks learning. 69 - Chaimae Hazman, Azidine Guezzaz

, Said Benkirane, Mourade Azrour:
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security. 70 - Shengsheng Lin, Weiwei Lin, Feiyu Zhao, Haojun Chen:

Benchmarking and revisiting time series forecasting methods in cloud workload prediction. 71 - Emrah Aslan

, Yildirim Özüpak:
Detection of road extraction from satellite images with deep learning method. 72 - Mohd Sakib

, Suhel Mustajab
, Mahfooz Alam
:
Ensemble deep learning techniques for time series analysis: a comprehensive review, applications, open issues, challenges, and future directions. 73 - Dongxian Yu, Weiyong Zheng:

A hybrid evolutionary algorithm to improve task scheduling and load balancing in fog computing. 74 - Alberto Prieto, Beatriz Prieto, Juan José Escobar, Thomas Andrew Lampert:

Evolution of computing energy efficiency: Koomey's law revisited. 42
Volume 28, Number 2, April 2025
- Keyu Zhong, Fen Xiao, Xieping Gao:

Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII. 75 - Fengxian Wang, Dailin Li, Jie Zhang, Xiabing Wang, Linwei Li, Xiaoping Shi:

Multiple adaptive fusion network with Mittag Leffler IoU loss for aircraft detection in remote sensing images. 76 - Malha Merah, Zibouda Aliouat, Hakim Mabed:

Dynamic load balancing of traffic in the IoT edge computing environment using a clustering approach based on deep learning and genetic algorithms. 77 - Ying Qiao, Junhan Xiong, Yiguo Zhao:

Network-aware container scheduling in edge computing. 78 - Torana Kamble, Madhuri Ghuge

, Ritu Jain, Vaishali Sarbhukan Bodade:
Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application. 79 - Benyamin Abdollahzadeh, Hatef Javadi

, Oguz Toragay
, Nicola Epicoco, Nima Khodadadi:
The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm. 80 - Yuansheng Gao, Jinpeng Wang

, Changlin Li:
Escape after love: Philoponella prominens optimizer and its application to 3D path planning. 81 - Weiye Wang, Qing Li, Honglei Mu:

Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity. 82 - Roya Zareh Farkhady, Kambiz Majidzadeh, Mohammad Masdari, Ali Ghaffari:

3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT. 83 - Lingru Cai, Yuelong Liu, Jianlong Xu, Mengqing Jin:

Lcsa-fed: a low cost semi-asynchronous federated learning based on lag tolerance for services QoS prediction. 84 - Nilakshee Rajule, Mithra Venkatesan, Radhika Menon, Anju Kulkarni:

Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model. 85 - Essam H. Houssein, Someya Mohsen Zaki, Marwa M. Emam, Nagwan M. Abdel Samee, Reem Ibrahim Alkanhel, Eman M. G. Younis:

Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring. 86 - Niayesh Gharaei

, Aliaa M. Alabdali:
Optimizing smart health monitoring systems: enahancing energy efficiency and reducing latency with multi-level clustering and grey wolf optimizer. 87 - Shawal Khan, Shahzad Khan:

Latency aware graph-based microservice placement in the edge-cloud continuum. 88 - Sanaz Feizi, Hamidreza Ghaffari:

Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks. 89 - Priyadarshni, Praveen Kumar, Nilesh Arjun Gupta, Rajiv Misra:

Integrating of IOTA-based blockchain with edge computing for task offloading powering the metaverse. 90 - Ajit Kumar Mahapatra

, Nibedan Panda
, Madhumita Mahapatra
, Tarakanta Jena, Arup Kumar Mohanty:
A fast-flying particle swarm optimization for resolving constrained optimization and feature selection problems. 91 - Aymen Takie Eddine Selmi, Mohamed Faouzi Zerarka, Abdelhakim Cheriet:

Efficient technique utilizing an embedding hierarchical clustering-based representation into crossed cubes for TSP optimization. 92 - Khwaja Mansoor, Mehreen Afzal, Waseem Iqbal, Yawar Abbas:

Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices. 93 - Juan Chen, Jia Zhao, Renbin Xiao, Zhihua Cui, Hui Wang, Jeng-Shyang Pan

:
Role division approach for firefly algorithm based on t-distribution perturbation and differential mutation. 94 - Arun Mani Tripathi, Lokendra Singh Umrao:

Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT. 95 - Zhongmin Wang, Shuai Zhang, Xiaomin Jin, Yanping Chen, Chen Lu:

Joint resource allocation and privacy protection for MEC task offloading in industrial Internet. 96 - Sarika Mustyala, Manjubala Bisi:

Ensembling Harmony Search Algorithm with case-based reasoning for software development effort estimation. 97 - Hao Guo, Bin Deng, Weidong Li:

Multi-resource maximin share fair allocation in the cloud-edge collaborative computing system with bandwidth demand compression. 98 - Xiaoxu Wei, Chen Niu, Lianzheng Zhao, Yongsheng Wang:

Combination of ant colony and student psychology based optimization for the multi-depot electric vehicle routing problem with time windows. 99 - Shuangquan Xu, Xiji Li, Qing Liu, Haiyang Dong, Xiaoyan Xu, Licai Yan, Yue Zhang:

Intelligent monitoring system for environmental protection during the construction period of pumped storage power station. 100 - Yuping Wang, Peng Zhang, Bo Wang, Zhifeng Zhang, Yaoli Xu, Bin Lv:

A hybrid PSO and GA algorithm with rescheduling for task offloading in device-edge-cloud collaborative computing. 101 - Ashutosh Kumar Singh, Satender Kumar, Sarika Jain

:
A multi-agent deep reinforcement learning approach for optimal resource management in serverless computing. 102 - Ashfaq Ahmad Najar

, S. Manohar Naik
:
AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing. 103 - Mina Mohammadi, Fatemeh BahraniPour, Sepehr Ebrahimi Mood, Mohammad Farshi:

Security-aware resource allocation in fog computing using a meta-heuristic algorithm. 104 - Mohamed Farhat, Salah Kamel, Almoataz Y. Abdelaziz:

Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems. 105 - Suqian Wu, Jie Liu, Bitao He, Chuan Lin, Jing Yang, Wei Wei:

An enhanced DV-hop localization algorithm based on hop distance correction and multi-strategy modified Aquila Optimizer in HWSNs. 106 - Changjong Kim, Yongseok Son, Sunggon Kim:

Investigating the effects of SQL hints on diverse storage devices through empirical analysis. 107 - Hibat Eallah Mohtadi, Abdellah Ouammou

, Mohamed Hanini, Abdelkrim Haqiq:
Resilient vehicular fog computing networks: an analytical approach to system reliability under breakdown and vacation interruptions. 108 - Gurjot Kaur, Deepti Kakkar:

A secure lightweight authentication model with interference aware routing and attack detection approach in VANET. 109 - Yue Wang, Xiaohu Zhao:

IG-PGFT: A secure and efficient intelligent grouping PBFT consensus algorithm for the Industrial Internet of Things. 110 - Soyeon Park, Hyokyung Bahn:

Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments. 111 - Nasir Ahmad Jalali

, Hongsong Chen:
Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G. 112 - Mamoru Mimura

, Kazuyuki Kurashina:
Practical evasion attack against neural network-based macro-malware detection method. 113 - Christos Chrysanthos Nikolaidis

, Pavlos S. Efraimidis:
Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management. 114 - Qinghua Ling, Wenkai Liu

, Fei Han, Jinlong Shi, Ali Aweis Hussein, Ben Sanvee Sayway:
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization. 115 - Zhendong Wang

, Biao Xie, Shuxin Yang, Dahai Li, Junling Wang, Sammy Chan:
A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things. 116 - Shweta Kushwaha

, Ravi Shankar Singh:
Deadline and budget-constrained archimedes optimization algorithm for workflow scheduling in cloud. 117 - Shudong Wang, Yanxiang Zhang, Xiao He, Nuanlai Wang, Zhi Lu, Baoyun Chen, Shanchen Pang:

Microservice deployment in cloud-edge environment using enhanced global search grey wolf optimizer-greedy algorithm. 118 - Pan Xu, Hui Gao, Yixuan Wang:

Sparse dual-weighting ensemble clustering. 119 - Yichun Yu

, Xiaoyi Yang, Zheping Chen, Yuqing Lan, Zhihuan Xing, Dan Yu:
Fedgac: optimizing generalization in personalized federated learning via adaptive initialization and strategic client selection. 120 - Junbi Xiao, Jinhai Fan, Hao Lu:

Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning. 121 - Xiangxu Meng, Wei Li, Zhihan Liu, Junze Yang, Wenqi Zheng:

HG-Net: a novel neural network with hierarchical grouped convolution for indoor fingerprint positioning. 122 - Hanqiao Huang, Bo Du, Huan Zhou, Meng Wang, Yufei Ming, Gang Hu:

A path planning method in three-dimensional complex space based on Bézier curves and a hybrid zebra optimization algorithm. 123 - Jiawen Huang, Liyan Xiong, Xiaohui Huang, Qingsen Chen, Peng Huang:

Filter pruning via annealing decaying for deep convolutional neural networks acceleration. 124 - Junbi Xiao, Yunhuan Cong, Wenjing Zhang, Wenchao Weng

:
A cellular traffic prediction method based on diffusion convolutional GRU and multi-head attention mechanism. 125 - Muhammad Asad, Safa Otoum:

Bppfl: a blockchain-based framework for privacy-preserving federated learning. 126 - Retraction Note: Real-time network virtualization based on SDN and Docker container. 127

- Oluwatayomi Rereloluwa Adegboye, Afi Kekeli Feda

:
Improved exponential distribution optimizer: enhancing global numerical optimization problem solving and optimizing machine learning paramseters. 128 - Yuchen Wang, Zhongcheng Wei, Zishan Huang, Jian Yang, Jijun Zhao:

Dependent task offloading for air-ground integrated MEC networks: a multi-agent collaboration approach. 129 - Shobhana Kashyap, Avtar Singh, Sukhpal Singh Gill:

Machine learning-centric prediction and decision based resource management in cloud computing environments. 130 - Arabinda Pradhan, Amardeep Das, Sukant Kishoro Bisoy:

Modified parallel PSO algorithm in cloud computing for performance improvement. 131 - Henry Ohiani Ohize, Adeiza James Onumanyi, Buhari Ugbede Umar, Lukman Adewale Ajao, Rabiu O. Isah, Eustace Manayi Dogo, Bello Kontagora Nuhu, Olayemi M. Olaniyi, James Garba Ambafi

, Vincent B. Sheidu, Muhammad M. Ibrahim:
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges. 132 - Yuefeng Xu

, Rui Zhong, Yang Cao
, Chao Zhang
, Jun Yu:
Symbiotic mechanism-based honey badger algorithm for continuous optimization. 133 - Lingxi Hu, Yuanyuan Hu, Linhua Jiang, Wei Long:

Federated learning client selection algorithm based on gradient similarity. 134 - Jahez Abraham Johny

, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti
:
Deep learning fusion for effective malware detection: leveraging visual features. 135 - Afnan Al-Ali, Raseena M. Haris, Younes Akbari, Moutaz Saleh, Somaya Al-Máadeed, Rajesh Kumar Muthu:

Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach. 136 - Ali Boroumand, Mirsaeid Hosseini Shirvani, Homayun Motameni:

A heuristic task scheduling algorithm in cloud computing environment: an overall cost minimization approach. 137 - Shiva Sattarpour, Ali Barati

, Hamid Barati:
EBIDS: efficient BERT-based intrusion detection system in the network and application layers of IoT. 138 - Ravindrakumar Purohit

, Jai Prakash Verma, Rachna Jain, Ashish Kumar
:
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era. 139 - Sanket Mishra, Thangellamudi Anithakumari, Rashmi Sahay

, Rajesh Kumar Shrivastava, Sachi Nandan Mohanty, Afzal Hussain Shahid:
LIRAD: lightweight tree-based approaches on resource constrained IoT devices for attack detection. 140 - Liping Zhou, Xu Liu, Ruiqing Tian, Wuqi Wang, Guowei Jin:

A multi-strategy enhanced reptile search algorithm for global optimization and engineering optimization design problems. 141 - Pallav Gupta

, Swarab Raul, S. Shoba, Karthika Veeramani:
Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme. 142 - Aram Satouf, Ali Hamidoglu, Ömer Melih Gül, Alar Kuusik, Lütfiye Durak Ata, Seifedine Kadry:

Metaheuristic-based task scheduling for latency-sensitive IoT applications in edge computing. 143 - Ahmed Saidi

, Abdelouahab Amira, Omar Nouali:
Securing decentralized federated learning: cryptographic mechanisms for privacy and trust. 144 - Zhiyu Feng, Donglin Zhu, Huaiyu Guo, Jiankai Xue, Changjun Zhou:

A Jaya algorithm based on self-adaptive method for parameters identification of photovoltaic cell and module. 145 - Yashar Ghaemi, Hosam El-Ocla:

Time delay-based routing protocol using genetic algorithm in vehicular Ad Hoc networks. 146 - (Withdrawn) Internet of things and distributed security framework for 5G networks. 147

Volume 28, Number 3, June 2025
- Elham Asadi

, Soodeh Hosseini:
Worm propagation modeling considering green worm defense mechanism in complex networks. 148 - Mohamed Wajdi Ouertani

, Ghaith Manita, Amit Chhabra
, Ouajdi Korbaa
:
Chaotic quasi-opposition marine predator algorithm for automatic data clustering. 149 - Junbi Xiao, Wenjing Zhang, Wenchao Weng

, Yuhao Zhou, Yunhuan Cong:
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting. 150 - Haoyu Liu, Le Tian

, Maozu Guo:
ESDN: edge computing task scheduling strategy based on dilated convolutional neural network and quasi-newton algorithm. 151 - Maryam Shahzeidi, Mohammad Reza Mollahoseini Ardakani, Taghi Javdani Gandomani, Kamal Mirzaie, Mohammadreza Mollahoseini Ardakani:

A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt. 152 - Guilherme Diel, Ana Eloina Nascimento Kraus, Guilherme Piêgas Koslovski:

Knowledge-based job scheduling for HPC. 153 - Farah Fargo, Mitchell Diamond, Olivier Franza, Paul Foose, Jack Adiletta, Matthew Joseph Adiletta, Simon C. Steely Jr.:

Intelligent cache prefetchers in HPC architecture. 154 - Banavath Balaji Naik, Bollu Priyanka, Sarfaraj Alam Ansari:

Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach. 155 - De-gan Zhang, Shuai Li, Jie Zhang, Ting Zhang:

Novel offloading approach of computing task for internet of vehicles based on particle swarm optimization strategy. 156 - Niraj Prasad Bhatta, Fathi Amsaad:

Ml assisted techniques in power side channel analysis for trojan classification. 157 - Weida Xu

, Yang Xu, Sicong Zhang:
Sample-independent federated learning backdoor attack in speaker recognition. 158 - Said Al Afghani Edsa

, Khamron Sunat
:
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems. 159 - Mohammed A. Khasawneh

, Mustafa Daraghmeh
, Anjali Awasthi, Anjali Agarwal:
Multilevel learning for enhanced traffic congestion prediction using anomaly detection and ensemble learning. 160 - Sidharth Samal

, Rajashree Dash:
Developing a two stage optimized random vector functional link neural network based predictor model utilizing a swift crow search algorithm. 161 - Robertas Damasevicius, Nebojsa Bacanin

, Anand Nayyar
:
Blockchain technology for a trustworthy social credit system: implementation and enforcement perspectives. 162 - Amir Seyyedabbasi, Gang Hu, Hisham A. Shehadeh, Xiaopeng Wang, Peren Jerfi Canatalay

:
V-shaped and S-shaped binary artificial protozoa optimizer (APO) algorithm for wrapper feature selection on biological data. 163 - Haithem Mezni, Hiba Yahyaoui, Hela Elmannai

, Reem Ibrahim Alkanhel:
Personalized service recommendation in smart mobility networks. 164 - Wei Liu, Yingmeng Wang, Kaige Li, Zhao Tian

, Wei She:
Ftmoe: a federated transfer model based on mixture-of-experts for heterogeneous image classification. 165 - Hong Chen

, Jianxun Liu:
Burst load scheduling latency optimization through collaborative content caching in edge-cloud computing. 166 - Rong Zheng, Genliang Li, Ruikang Li, Yan Che, Hui Wen, Song Lu:

A new approach for fire and non-fire aerosols discrimination based on multilayer perceptron trained by modified bonobo optimizer. 167 - Javad Zarean, AmirReza Tajally, Reza Tavakkoli-Moghaddam, Reza Kia:

Robust electroencephalogram-based biometric identification against GAN-generated artificial signals using a novel end-to-end attention-based CNN-LSTM neural network. 168 - Sad-Houari Nawal, Taghezout Noria, Hadj-Sahraoui Nihad:

Expertise as a signature: continuous implicit authentication based on behavior. 169 - Senda Bouaziz, Soumaya Boukettaya

, Ahlem Nabli, Faïez Gargouri:
A formal algebra for document-oriented NoSQL data warehouses: formalisation and evaluation. 170 - Armin Choupani, Sadoon Azizi, Mohammad Sadegh Aslanpour:

Joint resource autoscaling and request scheduling for serverless edge computing. 171 - Hongming Chen, Qingli Yu, Guocai Yang, Hui Zhang, Gang Li, Qian Chen, Yonghua Li:

Compound strategy based binary willow catkin optimization for feature selection. 172 - Macilia Boukhama, Zoubeyr Farah, Lynda Alkama:

A QoS-aware IoT services composition approach based on the modified violation constraints handling technique and enhanced fireworks algorithm. 173 - Abdulvahap Kahveci

, Veysel Alcan
, Murat Uçar
, Alper Gümüstepe
, Esra Bilgin, Ismihan Sunar
, Sebnem Ataman
:
Classification of radiographic and non-radiographic axial spondylarthritis in pelvic radiography using deep convolution neural network models. 174 - Kenan Senturk

, Ahmet Faruk Gormus
, Serkan Gönen
, Mehmet Ali Bariskan, Ahmet Kaan Durmaz:
Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities. 175 - Lucileide M. D. Da Silva, Pedro V. A. Alves, Sérgio N. Silva, Marcelo A. C. Fernandes:

Adaptive horizontal scaling in kubernetes clusters with ANN-based load forecasting. 176 - Tianbao Liu, Yue Li, Xiwen Qin:

Hybrid strategy improved Harris Hawks optimization algorithm for global optimization and microgrid economic scheduling problem. 177 - Daoliang He, Pingpeng Yuan:

TDS: fast answering reachability queries with hierarchical traversal trees. 178 - Wangbo Shen, Weiwei Lin, Wentai Wu, Haijie Wu, Keqin Li:

Reinforcement learning-based task scheduling for heterogeneous computing in end-edge-cloud environment. 179 - Muhammad Muneem Shabir, Kaiwen Zhang, Bertrand Reulet, Ghyslain Gagnon:

Qaas: hybrid cryptocurrency wallet-as-a-service based on Quantum RNG. 180 - Faisal Rasheed Lone, Harsh Kumar Verma:

MP-TMD: A Multidimensional Plausibility-driven Cooperative Trust Model for Multiple Misbehaviour Detection in Intelligent Transportation Systems. 181 - Lianfu Zhang, Guangwei Fang, Zuowen Tan:

FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare. 182 - Huanhuan Zou, Kai Wang:

Improved multi-strategy beluga whale optimization algorithm: a case study for multiple engineering optimization problems. 183 - Ahmed A. Ismail, Nour El-Deen Khalifa, Reda A. El-Khoribi:

A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study. 184 - Ningtao Peng, Yu Zheng, Zhikai Xiao, Guiliang Gong, Dan Huang, Xiahui Liu, Kaikai Zhu, Qiang Luo

:
Multi-objective dynamic distributed flexible job shop scheduling problem considering uncertain processing time. 185 - Meilin Zhang, Huiling Chen, Ali Asghar Heidari, Yi Chen, Zongda Wu, Zhennao Cai

, Lei Liu:
WHHO: enhanced Harris hawks optimizer for feature selection in high-dimensional data. 186 - Wassim Abbessi

, Sofiane Ouni, Rabeb Ben Othmen
, Wafa Badreddine, Gilles Dequen:
Random cluster parallel PBFT global consensus for consistent blockchain distributed ledger. 187 - Saleem Malik, S. Gopal Krishna Patro

, Chandrakanta Mahanty
, Ayodele Lasisi, Osamah J. Al-sareji:
MutaSwarmClus: enhancing data clustering efficiency with mutation-enhanced swarm algorithm. 188 - Vinita Bhandiwad, Lakshmappa K. Ragha:

Enhancing the security of IOT enabled systems using light weight hybrid cryptography models. 189 - Shuwei Zhu, Wenping Wang, Wei Fang, Meiji Cui:

Critical vector based evolutionary algorithm for large-scale multi-objective optimization. 190 - Ahmed M. Tawfik

, Ayman Al-Ahwal, Adly S. Tag Eldien, Hala H. Zayed:
PriCollabAnalysis: privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation. 191 - Ravikumar Sethuraman

, Kiruthika Venkataramani, Malu Manickam Yamuna Devi, Surendran Subbaraj:
Enhancing autonomous vehicle performance with ensemble weighted support vector-based optimization in cloud. 192 - Fei Peng, Rui Zhong, Chao Zhang, Jun Yu:

Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies. 193 - Mohd Anas Wajid

, Mohammad Saif Wajid
, Aasim Zafar, Hugo Terashima-Marín:
Digital Twin technology for multimodal-based smart mobility using hybrid Co-ABC optimization based deep CNN. 194 - Ran Zhang, Xiao Chen, Maoyuan Li:

Multi-UAV cooperative task assignment based on multi-strategy improved DBO. 195 - Demetrio Deanda, Izzat Alsmadi, Jesus Guerrero, Gongbo Liang:

Defending mutation-based adversarial text perturbation: a black-box approach. 196 - Yinghui Meng, Nuo Zhu, Duan Li, Jiaofen Nan, Yongquan Xia, Ni Yao, Chuang Han

:
Stepwise discriminant analysis based optimal frequency band selection and ensemble learning for same limb MI recognition. 197 - Ashwini Pithani, Rashmi Ranjan Rout:

CFL-ATELM: an approach to detect botnet traffic by analyzing non-IID and imbalanced data in IoT-edge based 6G networks. 198 - Mohammad Faraji Mehmandar

, Mostafa Ghobaei-Arani
, Ali Shakarami:
A cost-aware IoT application deployment approach in fog computing. 199 - Rui Zhong, Shilong Zhang, Yujun Zhang, Jun Yu:

A novel adjacent matrix-based probabilistic selection mechanism for differential evolution. 200 - Abdellah Amzil, Mohamed Hanini, Abdellah Zaaloul:

Modeling and analysis of LoRa-enabled task offloading in edge computing for enhanced battery life in wearable devices. 201 - Zhaojun Zhang, Simeng Tan, Jiale Qin, Kuansheng Zou, Shengwu Zhou:

Multi-strategy ant colony optimization with k-means clustering algorithm for capacitated vehicle routing problem. 202 - Abdelkarim Ait Temghart

, Mbarek Marwan, Mohamed Baslam:
Optimization of computational offloading in the mobile edge: a game theoretic approach. 203 - Robert Antwi

, James Dzisi Gadze, Eric Tutu Tchao, Axel Sikora, Kwame Opuni-Boachie Obour Agyekum
, Henry Nunoo-Mensah, Andrew Selasi Agbemenu, Justice Owusu Agyemang
, Dominik Welte, Abdul-Rahman Ahmed, Eliel Keelson
:
Optimising peer-to-peer topology for blockchain-based industrial internet of things networks using particle swarm optimisation. 204 - Isaac D. Sánchez-García, Tomás San Feliu, José A. Calvo-Manzano:

Building a cyber risk treatment taxonomy. 205 - Abdul Razaque, Gulnara Bektemyssova, Joon Yoo, Salim Hariri, Meer Jaro Khan

, Nurgul Nalgozhina, Jaeryong Hwang, M. Ajmal Khan:
Review of malicious code detection in data mining applications: challenges, algorithms, and future direction. 206 - Guikun Wang, Bin Wen, Jingtao He, Qingbin Meng:

A new approach to reduce energy consumption in priority live migration of services based on green cloud computing. 207 - Iraq Ahmad Reshi

, Sahil Sholla:
IBF network: enhancing network privacy with IoT, blockchain, and fog computing on different consensus mechanisms. 208 - Abdulrahman K. Al-Qadhi

, Rohaya Latip, Raymond Chiong, Rukshan Athauda
, Masnida Hussin:
Independent task scheduling algorithms in fog environments from users' and service providers' perspectives: a systematic review. 209 - Subbulakshmi Pasupathi, Raushan Kumar, L. K. Pavithra:

Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security. 210 - Muhammad Asad

, Saima Shaukat, Jin Nakazato, Ehsan Javanmardi, Manabu Tsukada:
Federated learning for secure and efficient vehicular communications in open RAN. 211 - Iqra Jan, Shabir Ahmad Sofi

:
Fog assisted data size reduction based data management system for optimizing resources in medical IoT. 212 - Seyed-Sajad Ahmadpour, Danial Bakhshayeshi Avval, Mehdi Darbandi, Nima Jafari Navimipour, Noor Ul Ain, Sankit Ramkrishna Kassa:

A new quantum-enhanced approach to AI-driven medical imaging system. 213 - Lin Zhang, Wenqing Zhang, Zhenghao Xu:

Automatic liver tumor segmentation based on improved Yolo-v5 and B-spline level set. 214 - Fengtao Wei, Yue Feng, Xin Shi, Kai Hou:

Improved sparrow search algorithm with adaptive multi-strategy hierarchical mechanism for global optimization and engineering problems. 215 - Benyamin Abdollahzadeh, Hatef Javadi, Oguz Toragay, Nicola Epicoco, Nima Khodadadi:

Correction: The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm. 216 - Retraction Note: Internet of things and distributed security framework for 5G networks. 217

Volume 28, Number 4, August 2025
- Kadda Benyahia, Abdelkader Khobzaoui

, Samir Benbakreti:
Hybrid image encryption: leveraging DNA sequencing and Lorenz chaotic dynamics for enhanced security. 218 - Kamir Kharoubi, Sarra Cherbal, Djamila Mechta, Amjad Gawanmeh:

Network Intrusion Detection System Using Convolutional Neural Networks: NIDS-DL-CNN for IoT Security. 219 - Hossein Abbasimehr

, Ali Noshad
:
Big time series data forecasting based on deep autoencoding and clustering. 220 - Indu Dohare, Karan Singh, Tayyab Khan, Yogendra Mohan, Intyaz Alam:

Coati optimization algorithm for node localization in sensor enabled-IoT. 221 - Xiaole Li, Jinwei Tian, Cuiping Wang, Yinghui Jiang, Xing Wang, Jiuru Wang:

Multi-objective multicast optimization with deep reinforcement learning. 222 - Yatao Yang, Ruoyan Zhao, Fangrui Yin, Ke Wang:

K-PAKE: post quantum password authentication key exchange protocol for satellite networks. 223 - Hong Huang, Weitao Huang

, Yinghang Zhou, Wengang Luo, Yunfei Wang:
FEdroid: a lightweight and interpretable machine learning-based android malware detection system. 224 - Abdul Mazid

, Sheeraz Kirmani, Manaullah, Vijayant Pawar:
A secure and efficient framework for internet of medical things through blockchain driven customized federated learning. 225 - Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard:

Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain. 226 - Saeed Shokrollahi, Mahtab Dehghan:

CTVAN: a cooperation-based RSU-assisted trust management model for reliable communication in VANETs. 227 - Yanyan Xu, Bingqi Wang, Shaoming Pan, Shihe Chen:

Intelligent multipath congestion control algorithm based on subflow coupling perception. 228 - Yuting Yuan, Yuelin Gao:

An adaptive hybrid differential Grey Wolf Optimization algorithm for WSN coverage. 229 - Surbhi, Nuparam Chauhan

, Neeraj Dahiya:
Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT). 230 - Shashi Raj, Dharavath Ramesh

, Prabhakar Gantela:
CrossFIM: a spark-based hybrid frequent itemset mining algorithm for large datasets. 231 - Yongqi Chen, Xianwen Fang

, Huijing Hao
, Daoyu Kan:
A probabilistic optimization-based event-correlated log repair method using data constraints. 232 - Supriya Kumari Prasad, Young-Bae Ko:

Model-contrastive federated learning entrenched UWB bi-direction localization through dynamic hexagonal grid construction in indoor WSN environment. 233 - Muqadar Ali, Hongjie He, Abid Hussain, Mehboob Hussain, Yuan Yuan:

TMABKS: a traceable multi authority attribute-based Boolean keywords search authorization for e-health records in cloud. 234 - Gokapay Dilip Kumar, Sachi Nandan Mohanty:

Precise brain tumor classification from MRI images with hybrid recurrent neural network-bidirectional LSTM and humming bird optimization. 235 - Zhengfeng Li, Wengpeng Gu, Huichao Shang, Guohui Zhang, Gaofeng Zhou:

Research on dynamic job shop scheduling problem with AGV based on DQN. 236 - Hisham A. Kholidy:

Dynamic network slicing orchestration in open 5G networks using multi-criteria decision making and secure federated learning techniques. 237 - Amjad Alsirhani

, Noshina Tariq, Mamoona Humayun, Ghadah Alwakid, Hassan Sanaullah:
Intrusion detection in smart grids using artificial intelligence-based ensemble modelling. 238 - Mingli Song, Xinyu Zhao, Witold Pedrycz:

A robust federated biased learning algorithm for time series forecasting. 239 - Saurabh Gupta, Rajendra Prasad Mahapatra:

Hyex-net: hybrid efficient Xception network for human activity recognition using multimodalities. 240 - Maryam Hassanali, Mohammadreza Soltanaghaei, Taghi Javdani Gandomani, Farsad Zamani Boroujeni:

Exploring stacking methods for software effort estimation with hyperparameter tuning. 241 - Xin-Ru Ma, Jie-Sheng Wang, Yong-Cheng Sun, Yi-Xuan Li, Si-Wen Zhang, Shi-Hui Zhang:

Victoria Amazonica optimization algorithm based on adaptive mutation factor and mathematical distribution for solving minimum spanning tree problem. 242 - Mohamed H. Hassan

, Salah Kamel:
A hybrid approach based on tuna swarm and equilibrium optimizers for parameter estimation of different PV models. 243 - Shi-Hui Zhang, Jie-Sheng Wang, Si-Wen Zhang, Yu-Xuan Xing, Xiao-Tian Wang, Xiao-Fei Sui:

MOSO: multi-objective snake optimizer with density estimation and grid indexing mechanism for edge computing task offloading and scheduling optimization. 244 - Khalid Anwar

, Mohammed Wasid, Aasim Zafar, Arshad Iqbal:
An efficient framework to combat multidimensionality in multi-criteria recommender systems. 245 - Heming Jia

, Xuelian Zhou, Jinrui Zhang, Seyedali Mirjalili:
Superb Fairy-wren Optimization Algorithm: a novel metaheuristic algorithm for solving feature selection problems. 246 - Runxia Guo, Jingxu Yi:

Improved Aquila optimizer and its applications. 247 - Saif Ur Rehman Khan

, Ming Zhao, Yangfan Li:
Detection of MRI brain tumor using residual skip block based modified MobileNet model. 248 - Srikanth Bethu, Erukala Suresh Babu:

Blockchain-enhanced secure guard: a deep Q network framework for robust IoT surveillance person detection. 249 - Ah. E. Hegazy, B. Hafiz, M. A. Makhlouf, Omar A. M. Salem:

Optimizing medical data classification: integrating hybrid fuzzy joint mutual information with binary Cheetah optimizer algorithm. 250 - Saima Farhan, Jovaria Mubashir, Yasin Ul Haq, Tariq Mahmood

, Amjad Rehman:
Enhancing network security: an intrusion detection system using residual network-based convolutional neural network. 251 - HaoJi Xia, Jinyan Cao:

An energy-aware technique for solving the offloading problem of mobile internet of things using an enhanced neural network-based optimization algorithm. 252 - Ali Toufanzadeh Mozhdehi, Nima Khodadadi, Mohaddeseh Aboutalebi, El-Sayed M. El-Kenawy, Abdelazim G. Hussien, Weiguo Zhao

, Mohammad H. Nadimi-Shahraki, Seyedali Mirjalili:
Divine Religions Algorithm: a novel social-inspired metaheuristic algorithm for engineering and continuous optimization problems. 253 - Siamak Solat:

Parallel Committees: a scalable, secure, and fault-tolerant distributed NoSQL database architecture. 254 - Arshad Khan

, Alan T. Litchfield, Abdulatif Alabdulatif, Faheem Khan:
BlockPres IPFS: performance evaluation of blockchain based secure patients prescription record storage using IPFS for smart prescription management system. 255 - Irshad Ullah, Xiaoheng Deng, Xinjun Pei, Husnain Mushtaq

, Zia Khan:
Securing internet of vehicles: a blockchain-based federated learning approach for enhanced intrusion detection. 256 - Qusay M. Alzubi

, Yousef K. Sanjalawe, Sharif Naser Makhadmeh, Hussam N. Fakhouri
:
An enhanced method for intrusion detection systems in IoT environment. 257 - Andrea Rossi, Andrea Visentin

, Diego Carraro, Steven D. Prestwich, Kenneth N. Brown:
Forecasting workload in cloud computing: towards uncertainty-aware predictions and transfer learning. 258 - Selcuk Aslan, Tevfik Erkin:

DUALIPA: a new immune plasma algorithm for path planning of unmanned aerial vehicles. 259 - Mohamed Fazil Hussain, Salwa Sayeedul Hasan, Hasan Rauf:

Cloud security modeling: using TCP deltas with data analytics and machine learning techniques. 260 - Binrong Liao, Yongkuan Yang, Jianlong Xu, Xiangsong Kong

, Jun Su:
A constrained multi-objective evolutionary algorithm with tri-populations assisted by an additional objective function. 261 - Mantosh Kumar

, Kumari Namrata, Akshit Samadhiya:
Deep learning assisted optimal dispatch for renewable-based energy system considering consumer incentive scheme. 262 - Zhilin Liao, Zengtong Lu, Xinyu Cai:

MEARO: A multi-strategy enhanced artificial rabbits optimization for global optimization problems. 263 - Xin Luo, Yage Yuan, Youfa Fu, Haisong Huang, Jianan Wei:

A multi-strategy improved Coati optimization algorithm for solving global optimization problems. 264 - Mohammad Hossein Khalifeh, Mehdi Taghizadeh, Mohammad Mehdi Ghanbarian, Jasem Jamali:

A new hybrid framework for medical image retrieval and compression using neural networks. 265 - Shubhkirti Sharma, Vijay Kumar:

Grid-based multi-objective cheetah optimization for engineering applications. 266 - Parul Punia, Amit Raj, Pawan Kumar:

Enhanced zebra optimization algorithm for reliability redundancy allocation and engineering optimization problems. 267 - Guangming Gong, Shengwei Fu, Haisong Huang, Hefan Huang, Xin Luo:

Multi-strategy improved snake optimizer based on adaptive lévy flight and dual-lens fusion. 268 - Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi:

An efficient task scheduling algorithm leveraging fuzzy quantum atom search optimizer with innovative migration for cloud computing. 269 - Hemant Ramdas Kumbhar, S. Srinivasa Rao:

Chronological Drawer puzzle algorithm based multi-key generation and Lenet Kronecker network enabled privacy protected data classification. 270 - Yu Liu, Qicheng Liu:

SMOTE oversampling algorithm based on generative adversarial network. 271 - Osama I. Salameh, Sabine Wittevrongel:

An analytical model of a cluster-based service system with application to a cloud environment. 272 - Ivson Borges, Ermeson C. Andrade, Francisco Airton Silva, Gustavo Callou

:
Availability evaluation of a video surveillance system with distributed storage. 273 - Mingwei Cao, Yindong Dong, Deli Chen, Guodong Wu, Gaojian Xu, Jun Zhang:

EEG-based emotion recognition model using fuzzy adjacency matrix combined with convolutional multi-head graph attention mechanism. 274 - Israel Araújo, Vandirleya Barbosa, Luiz Nelson Lima, Luis Guilherme Silva, Carlos Brito, Iure Fé, Lucas A. Lopes, Ermeson C. Andrade, Érico Leão, Francisco Airton Silva:

Assessing the performance of a fault tolerant LoRaWAN architecture with a focus on the sensor layer and data retransmission strategy. 275 - Guiling Long, Shaorong Wang, Cong Lv:

QoS-aware resource management in cloud computing based on fuzzy meta-heuristic method. 276 - Bisma Gulzar, Shabir Ahmad Sofi

, Sahil Sholla:
Convergence of personal internet of things into social internet of things. 277 - Banavath Balaji Naik, Bollu Priyanka, Md. Sarfaraj Alam Ansari:

Correction: Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach. 278 - Maryam Shahzeidi, Mohammad Reza Mollahoseini Ardakani

, Taghi Javdani Gandomani, Kamal Mirzaie:
Correction: A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt. 279 - Seyed-Sajad Ahmadpour, Danial Bakhshayeshi Avval, Mehdi Darbandi, Nima Jafari Navimipour, Noor Ul Ain, Sankit Ramkrishna Kassa:

Correction: A new quantum-enhanced approach to AI-driven medical imaging system. 280
Volume 28, Number 5, October 2025
- Yan Du, Zhiming Ding, Zhi Cai, Yuanying Chi:

Join query optimization in distributed database based on multi-source mating selection evolutionary algorithm. 281 - Arjun Singh Rawat

, Maroti Deshmukh, Maheep Singh:
Visually enhanced multi-secret sharing scheme with arithmetic modulo, DWT, and particle swarm optimization for Meaningful Shares. 282 - Lintao Hu, Zhao-Min Chen, Huiling Chen, Ruoxi Deng, Jie Hu:

Hierarchical style transfer for enhancing feature diversity in long-tailed visual recognition. 283 - Vijaita Kashyap, Rakesh Ahuja, Ashok Kumar:

Predictive analysis-based load balancing and fault tolerance in fog computing environment. 284 - Rui Zhong, Yang Cao

, Essam H. Houssein, Jun Yu, Masaharu Munetomo:
SFE-EANDS: a simple, normalized distance-based selectionfast, and efficient algorithm with external archive and normalized distance-based selection for high-dimensional feature selection. 285 - Afef Walha, Hana Mallek, Faiza Ghozzi, Faïez Gargouri:

Tweets opinion analysis integration: ETL modeling with MapReduce. 286 - Mahsa Mohammadi, Mohsen Ramezani, Fardin Akhlaghian Tab, Fardin Ahmadizar:

Combining evolutionary and swarm algorithms in a hybrid subspace-wise search strategy for feature selection. 287 - SeokHee Kim, Changhee Hahn

:
DOBEL: detecting backdoors in ensemble learning. 288 - Xuewen Li, Liangyan Chen, Tong Huang, An Yang, Weihua Liu:

YOLO-edge: real-time vehicle detection for edge devices. 289 - Jianlin Liu, Haisong Huang, Qingsong Fan

, Chi Ma:
A multi-strategy enhanced moth-flame optimization algorithm for complex inverse kinematics problems in series robots. 290 - Zhixiang Zhao, Yanxia Wu, Guoyin Zhang, Yiqing Yang, Haibo Liu:

Block strategy and adaptive storage for sparse matrix-vector multiplication on GPU. 291 - Malik Braik, Heba Al-Hiary:

Rüppell's fox optimizer: A novel meta-heuristic approach for solving global optimization problems. 292 - Saloua Hendaoui, Nawel Zangar:

Improved SDN-hybrid satellite-terrestrial architecture integrating intelligent fine-grained traffic slicing. 293 - Priyanka Patil, Vaibhav S. Hendre:

Modified archimedes optimization algorithm-based resources allocation in multicell D2D communications. 294 - Qiuxian Chen, Yizheng Tao:

Mdsd: a multi-dimensional scaling-based defensive mechanism against backdoor attacks on federated learning. 295 - Heng Zhang, Wei Fu, Xiaoming Wang, Dong Li, Danchen Zhu, Xingwang Su:

An improved and lightweight small-scale foreign object debris detection model. 296 - Pham Vu Hong Son

, Luu Ngoc Quynh Khoi
:
Balancing the trade-off between quad-factors in construction management: a opposition-based Giant Pacific Octopus optimizer method. 297 - Mohd Rafi Lone:

A high-throughput unified transform architecture for Versatile Video Coding. 298 - Mohamed H. Hassan

, Salah Kamel, Ehab Mahmoud Mohamed
:
Accurate modeling of various proton exchange membrane fuel cell models using an effective algorithm based on artificial gorilla troops optimizer. 299 - Heba Youssef, Salah Kamel, Mohamed H. Hassan

, Ehab Mahmoud Mohamed
, Souhil Mouassa:
Cost-efficient smart home energy management with hybrid quadratic interpolation tuna swarm optimization. 300 - Haythem Bany Salameh, Yaser Jararweh:

Efficient charging station deployment in unmanned aerial vehicle systems for enhanced mission efficiency. 301 - Amjad Hudaib, Nadim Obeid, Amjad Albashayreh, Hebah Mosleh

, Yahya M. Tashtoush
, Georgi Hristov:
Exploring the implementation of federated learning in healthcare: a comprehensive review. 302 - Rahul Haripriya

, Nilay Khare, Manish Pandey
, Sreemoyee Biswas:
Navigating the fusion of federated learning and big data: a systematic review for the AI landscape. 303 - Junjie Liao, Syam Melethil Sethumadhavan, Rui Ke, Zheng-Ming Gao, Juan Zhao:

A leaded sine-cosine artificial protozoa optimizer algorithm for solving multi-objective optimization problems. 304 - Hamza Elhaou

, Youssef Oukissou, Driss Ait Omar
, Hicham Zougagh:
Machine learning for user mobility management in a mobile fog computing environment. 305 - Anmol Kumar

, Mayank Agarwal:
A multi-level DDoS defense mechanism in container based cloud environment. 306 - Mounira Tarhouni, Ibrahim Aloui:

Towards smart home automation based on containerization. 307 - Muhammad Bilal, Rongfei Zeng, Owais Muhammad, Muhammad Adil, Shifa Shoukat:

A cyber-resilient and explainable intrusion detection system for Internet of Things networks. 308 - Ruisheng Li, Huimin Shen, Qilong Zhang, Huimin Duan:

An edge-enhanced graphSAGE-based intrusion detection model for the internet of things. 309 - Munir Hussain, Amjad Mehmood, Muhammad Altaf Khan

, Huihui Wang, Houbing Herbert Song, Carsten Maple:
ReCaLS-in-DLT: resilient consensus algorithm for leader selection in distributed ledger technology. 310 - Dusan Morhác, Kristián Kostál, Viktor Valastín, Ivan Kotuliak:

Unispell: universal adapter for interoperability in Polkadot Paraverse. 311 - Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan

, Insaf Ullah:
Provably secure multilayers certificateless proxy signature for industrial internet of things. 312 - Neha Sharma

, Pankaj Dhiman
:
A survey on IoT security: challenges and their solutions using machine learning and blockchain technology. 313 - Jiaxing Zhou, Youxin Yao, Xiang Chen, Hanlin Guo, Qing Li, Zhao Deng:

Triplet relationship guided density clustering for feature matching with a large number of outliers. 314 - Shadi AlZu'bi, Tarek Kanan, Mohammed W. Elbes, Ghassan Kanaan, Issam Trrad:

Energy-efficient edge deployment of generative AI models using federated learning. 315 - Abeer Ayoub

, Walid El-Shafai
, Fathi E. Abd El-Samie
, Ehab K. I. Hamad
, El-Sayed M. El-Rabaie:
High quality dehazed image and video based on enhanced multi-scale guided filtering dehazing technique. 316 - Junlei Dong, Haichang Jiang, Zaihui Cao:

Maximizing penetration in complex networks via the discretization of a new continuous meta-heuristic algorithm. 317 - Vinolia Alexander Moudiappa, Kanya Nataraj, Veeramalai Natarajan Rajavarman:

An advanced attack categorization in NIDS using enhanced deep learning based EOptResfEANet methodology with hybrid feature extraction. 318 - Yue Liu, Jiale Zhang, Shimiao Liu, Linjun Xu, Yafei Wang:

Aams-yolo: a small object detection method for UAV capture scenes based on YOLOv7. 319 - Wenjie Wang, Boqin Zhang, Zhao Liu, Ping Zhu:

Diversity-enhanced adaptive golden jackal optimization based on multi-strategy and its engineering applications. 320 - Chengtian Ouyang, Xin Liu, Donglin Zhu, Yehong Li

, Jihong Mao, Changjun Zhou, Jiankai Xue:
Hierarchical adaptive cuckoo search algorithm for global optimization. 321 - Bin Zhuge, Xiaodan Cai, Zitian Zhang, Qianye Ren, Ligang Dong, Xian Jiang, Yueqian Xu, Lingrong Lu:

Service function chain mapping method based on delay guarantee. 322 - Seyedehraziyeh Khastar, Farahnaz Bashirizadeh, Jafar Jafari-Asl, Naser Safaeian Hamzehkolaei:

Predicting the cooling and heating loads of energy efficient buildings: a hybrid machine learning approach. 323 - Pham Vu Hong Son

, Luu Ngoc Quynh Khoi
:
Multi-objective giant Pacific octopus optimizer. 324 - Wassim Alexan, Khalid M. Hosny

, Mohamed Gabr:
A new fast multiple color image encryption algorithm. 325 - Guangfu Chen, Bin Xie, Xiaofei Li, Jizhi Zhao:

Pairwisely constrained symmetric non-negative matrix factorization for link prediction in complex networks using degree-related clustering coefficient and improved closeness centrality. 326 - Yifan Sui, Meng Cai, Jianxun Li:

GuardGrid: a high-availability cloud platform for deep learning applications. 327 - Arman Foroughi, Jaime Lloret, José Miguel Jiménez, Sandra Sendra:

An edge computing wireless sensor network for diagnosing orange fruit disease. 328 - Wei Wang, Yinan Lu, Shengsheng Wang:

A multi-strategy enhanced circle search algorithm based on adaptive evolutionary framework and its application in image segmentation. 329 - Mokhtar Sellami, Haithem Mezni, Hela Elmannai

, Reem Alkanhel:
Drone-as-a-Service: proximity-aware composition of UAV-based delivery services. 330 - Dandugudum Mahesh

, Sampath Kumar Tallapally:
Advanced SDN-based network security: an ensemble optimized deep learning-based framework for mitigating DDoS attacks with intrusion detection. 331 - Heba Youssef, Salah Kamel, Mohamed H. Hassan:

Smart home energy management with long-term memory artificial rabbit algorithm for cost and load optimization. 332 - Sarada Mohapatra, Priteesha Sarangi

, Prabhujit Mohapatra:
A novel reward-based golden jackal optimization algorithm uses mix-weighted dynamic and random opposition learning to solve optimization problems. 333 - Oluwatayomi Rereloluwa Adegboye, Afi Kekeli Feda

, Abosede Omowunmi Tibetan, Ephraim Bonah Agyekum:
Enhanced global optimization using quadratically interpolated hybrid pathfinder algorithm. 334 - Mohannad Z. Naser, Ahmad Z. Naser:

SPINEX-clustering: similarity-based predictions with explainable neighbors exploration for clustering problems. 335 - Surjit Singh

, Aman Arora, Girik Garg, Anushka Goyal, Nipun Gandhi:
Performance analysis of blockchain-based secured distributed deep federated learning for wearable internet of things. 336 - Ghazi Mergani Ahmead Ali, Hongsong Chen

:
MLFuzzer: a fuzzing approach based on generative adversarial networks and BiLSTM for detecting vulnerabilities in smart contracts. 337 - Rachit Jain

, Vandana Vikas Thakare, Pramod Kumar Singhal:
Design and analysis of UWB antenna using machine learning for next-generation communications. 338 - Zeqing Wan, Wei Wu:

A robust approach to deformed pedestrian tracking with multi-trajectory prediction. 339 - Muhammad Zohaib, Nima Jafari Navimipour, Mehmet Timur Aydemir, Seyed-Sajad Ahmadpour:

A nano-scale design of arithmetic and logic unit for energy-efficient signal processing devices based on a quantum-based technology. 340 - Abdallah Aldosary, Walid El-Shafai, Ehab Mahmoud Mohamed

, Heba M. Emara:
Enhancing PCOS diagnosis accuracy with modified Giza Pyramids Optimizer, SLOGPO, and PCOSNet: advanced classification and optimization techniques. 341 - Saurabh Vaidya, Gordhan Jethava:

Elevating manufacturing excellence with multilevel optimization in smart factory cloud computing using hybrid model. 342 - Usman Ahmed

, Jiangbin Zheng, Sheharyar Khan
, Muhammad Tariq Sadiq:
HCIVAD: Explainable hybrid voting classifier for network intrusion detection systems. 343 - John Owoicho Odeh

, Xiaolong Yang
, Oluwarotimi Williams Samuel, Sahraoui Dhelim
, Cosmas Ifeanyi Nwakanma
:
A secure federated learning privacy method for industrial IoT edge networks. 344 - Ali Toufanzadeh Mozhdehi, Nima Khodadadi, Mohaddeseh Aboutalebi, El-Sayed M. El-Kenawy, Abdelazim G. Hussien, Weiguo Zhao

, Mohammad H. Nadimi-Shahraki, Seyed Mohammad Mirjalili:
Correction: Divine Religions algorithm: a novel social-inspired metaheuristic algorithm for engineering and continuous optimization problems. 345 - Thien Van Luong, Van-Cuong Pham, Thi Thanh Huyen Le, Xuan-Nam Tran:

Robust intrusion detection for unmanned aerial vehicles: a PCA-based feature extraction and ensemble learning approach. 346
Volume 28, Number 6, October 2025
- Ashfaq Ahmad Najar, S. Manohar Naik

, Faisal Rasheed Lone, Azra Nazir:
A novel CNN-enhanced detection and mitigation of DDoS attacks in SDN. 347 - HaoLang Huang, Xiongwen Pang, ChunYa Zou, Xiangru Li, Jun Ai:

Multi-stage BiLinear self-attention network for multi-sensor industrial time series classification. 348 - Amin Karami, Fahimeh Jafari:

Leveraging big data characteristics for enhanced healthcare fraud detection. 349 - Majid Abdulsatar, Hussain Ahmad

, Diksha Goel, Faheem Ullah:
Towards deep learning enabled cybersecurity risk assessment for microservice architectures. 350 - Qikai Wei, Mingzhi Yang, Jinqiang Wang

, Wenwei Mao, Jiabo Xu, Huansheng Ning:
CTourLLM: enhancing LLMs with Chinese tourism knowledge. 351 - Jiqun Zhang

, Zihan Wang:
A data trading platform based on Ethereum and IPFS. 352 - Ammar Odeh, Anas Abu Taleb, Tareq AlHajahjeh, Francisco Navarro:

Advanced memory forensics for malware classification with deep learning algorithms. 353 - Asuman Günay Yilmaz

, Eyüp Gedikli, Sefa Aras, Hamdi Tolga Kahraman:
A comprehensive analytical study on meta-heuristic based optimal thresholding using two-stage multi-level image segmentation (TSMIS) approach. 354 - Priyanka Ashok Birajdar, Divya Meena, Anurag Satpathy, Sourav Kanti Addya:

DCRDA: deadline-constrained function scheduling in serverless-cloud platform. 355 - Chinnakka Sudha, Sreenivasulu Bolla:

Intelligent intrusion forecasting framework for distributed environment using federated learning. 356 - Kadhim Hayawi, Junaid Sajid

, Asad Waqar Malik, Zouheir Trabelsi:
Revolutionizing electric robot charging infrastructure through federated transfer learning and data route optimization. 357 - Srinivas Babu Gottipati, Thumbur Gowri:

A unified hybrid framework for accurate and early brain tumor diagnosis through MRI analysis. 358 - Mohammed GH. I. A. L. Zamil, Samer M. J. Samarah:

Privacy preserving activity recognition framework for high performance smart systems. 359 - Hossein Zehtab Azari, Saeed Jalili:

Energy-aware self-adaptive real-time job scheduling in a cloud environment using deep reinforcement learning focused on quality of service. 360 - Houssem Eddine Mohamadi, Laaziz Lahlou

, Abdelouahed Gherbi, Nadjia Kara:
Seraph: a stochastic operational approach for the deployment of multi-antenna UAV-assisted networks. 361 - Ali Rodan

, Abdel Karim Al Tamimi
, Loai M. Alnemer, Seyedali Mirjalili
:
Stellar oscillation optimizer: a nature-inspired metaheuristic optimization algorithm. 362 - Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo:

Tracking top-k structural hole spanners in dynamic networks. 363 - Lydia Douaidi

, Sidi-Mohammed Senouci
, Inès El Korbi, Fouzi Harrou, Ahmet Yazici:
Federated deep learning for enhanced prediction of electric vehicle charging station availability. 364 - Aihua Yu, Yisong Wang, Panfeng Chen, Qi Wang, Hui Li, Xibin Wang, Xin Zhou, Guojun Chen, Xingzhi Deng:

Mutural and deep features driven recommender system. 365 - Mikel Cortes-Goicoechea, Tarun Mohandas-Daryanani, Jose Luis Muñoz-Tapia

, Leonardo Bautista-Gomez:
The impact of connectivity and software in Ethereum validator performance. 366 - Madhu Sharma

, Priyanka Chawla:
An image encryption algorithm using a XOR enhanced 2D-Henon map. 367 - Ahmet Akkaya

, Cemil Közkurt:
An effective approach for adaptive operator selection and comparison for PSO algorithm. 368 - K. Ghamya, K. Reddy Madhavi

:
Internet of medical things-based ECG monitoring for arrhythmia classification utilizing metaheuristic optimization with ensemble deep learning model. 369 - Sumbal Maqsood

, Shuxiang Xu, Matthew Springer, Rami Mohawesh, Haythem Bany Salameh, Shivangi Gheewala:
Temporal attention to estimate continuous blood pressure using photoplethysmography signals. 370 - Tariq Ahamed Ahanger, Munish Bhatia, Abdulrahman Alabduljabbar, Abdullah Albanyan, Imdad Ullah:

A hybrid framework for malware determination: generative pre-trained transformer-inspired approach. 371 - Nour El Houda Sayah Ben Aissa, Chaker Abdelaziz Kerrache, Ahmed Korichi, Abderrahmane Lakas, Enrique Hernández-Orallo, Carlos T. Calafate:

Adversarial resilience in EEG-based BCI systems: a two-tiered approach using GANs and transfer learning. 372 - Manal Ayadi, Atta Ur Rahman, Amel Ksisbi, Fatimah Alhayan, Salam Ullah Khan:

Improving M-Health applications recommendation using fine-tune graph neural networks. 373 - Nguyen Thi My Binh, Ho Viet Duc Luong

, Mai Dang Quan Anh, Khanh-Duy Le:
An efficient discretization and transformation scheme for maximizing secure lifetime problem in heterogeneous wireless rotatable camera sensor networks with barrier coverage. 374 - Ganesan Nagabushnam

, Yundo Choi
, Kyong Hoon Kim
:
Energizing the fog: a systematic survey on task scheduling strategies for energy optimization. 375 - Jian Zhu, Sanmin Liu, Subin Huang, Ping Zhang, Xinquan Chen, Tuyi Zhang, Wentao Yu, Guoyi Zhang:

Transfer learning method based on cluster for drifting data stream classification. 376 - Osama Drogham, Mohammad Hashem Ryalat, Nijad Al-Najdawi

, Rami S. Alkhawaldeh, Jamil Alshaqsi, Mohammed Azmi Al-Betar:
Dynamic colormap visualization integrated with Harris hawks optimization for enhanced lung CT segmentation and diagnostic precision. 377 - Faris A. Almalki, Marios C. Angelides:

Integrating machine learning with a positioning mechanism for managing interference and power consumption in a multilayer fleet of unmanned aerial platforms. 378 - Tareq M. Shami, Qasem Al-Tashi, Nima Khodadadi, Said Jadid Abdulkadir, Abdulaziz Ahmed, Seyedali Mirjalili:

Dimension selection: an innovative metaheuristic strategy for particle swarm optimization. 379 - Yang Li, Hong He, Xiaohong Li:

Software defect detection via deep convolutional RBM network and kernel enhanced dragonfly PCA approach. 380 - Mohammad Reza Pour-Hosseini, Mahdi Abbasi, Atefeh Salimi, Erik Elmroth, Hassan Haghighi, Parham Moradi, Bahman Javadi:

Tiny machine learning models for autonomous workload distribution across cloud-edge computing continuum. 381 - Samiulla Itoo, Vinod Kumar, Musheer Ahmad:

A secure and energy-efficient authentication framework for the internet of electric things. 382 - Pablo Vazquez Caderno, Feras M. Awaysheh, Jose C. Cabaleiro, Tomás F. Pena

:
BigOPERA: An OPportunistic and Elastic Resource Allocation for big data frameworks. 383 - Abhishek Narwaria

, Arka Prokash Mazumdar:
SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN. 384 - Ganesan Nagabushnam

, Kyong Hoon Kim:
Faddeer: a deep multi-agent reinforcement learning-based scheduling algorithm for aperiodic tasks in heterogeneous fog computing networks. 385 - Bonnie Yam, Ruochen Zhao, Maher Elshakankiri

:
Aqua garbage collector: utilizing AI and IoT for efficient underwater garbage classification. 386 - Xiaohua Wu, Tingbo Zhang, Lei Chen, Zirui Wang:

Privacy-preserving cross-chain asset transfers using notary schemes and zero-knowledge proofs. 387 - Xuncai Zhang, Heng Zhang:

A novel image encryption scheme using both pixel-level and bit-level permutations with an improved hyperchaotic system. 388 - Muhammad Umair Safdar, Tariq Shah, Asif Ali:

The class of bivariate non-chain rings and its application to data security. 389 - Fatima Shibli, Burak Tufekci, Cihan Tunc, Renée C. Bryce:

Streamlined internet of drone things (IoDT) simulator. 390 - Debao Wang

, Shaopeng Guan
, Ruikang Sun:
Wafl-tscs: an effective strategy to reduce communication costs in federated learning. 391 - Eleonora Stadtmüller Caballero, Jaren Ramirez, Sai Vamsi Alisetti, Shanelle Almario, Pradeeban Kathiravelu:

Network measurements for telehealth optimizations understanding internet paths in remote regions. 392 - Ilyasse Aboussaleh, Jamal Riffi, Khalid El Fazazy, Mohamed Adnane Mahraz, Hamid Tairi:

3D-SELTML: stacking ensemble learning based on transformer meta-learner for 3D brain tumor segmentation. 393 - Shveta Verma Bansal, Anju Bala:

FEAST: Fog enabled auto-scaling technique for IoT-based cloud application. 394 - Hoang-Hai Huynh, Xuan-Ha Nguyen, Xuan-Duong Nguyen, Kim-Hung Le:

Bigsids: an efficient SDN-based network intrusion detection systems for big data environments. 395 - Li Zhao, Zhenhua Lin, Hongfei Shao, Wei Zheng, Shihong Zhang, Yongjie Wang, Qinghua Li:

Improved task scheduling and load balancing in fog computing infrastructure using hybrid evolutionary method. 396 - Hui Xiong, Chenyang Yao, Jinzhen Liu, Xiuzhi Shi:

Improved multi-objective gray wolf optimization for task allocation in multi-UAV heterogeneous targets reconnaissance. 397 - Subhash Yadav, Shubham Shukla, Ritu Tiwari, Mahendra Pratap Yadav:

Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm. 398 - Debjani Mallick, Ashok Kumar Das, Uma Sankararao Varri, Youngho Park:

Public key-based search on encrypted data using blockchain and non-blockchain enabled cloud storage: a comprehensive survey, analysis and future research scopes. 399 - Jiagao Wu, Hongyan Ji, Jing Yi, Linfeng Liu:

Optimizing Client Selection in Federated Learning Base on Genetic Algorithm. 400 - Yingcang Ma, Jinlin Zou, Xiaofei Yang, Zhiwei Xing, Yongmei Deng:

Multi-view unsupervised feature selection based on consensus indicator graph learning with adaptive similarity. 401 - Krishna Gopal Dhal, Arunita Das, Swarnajit Ray:

Morphologically reconstructed 2-D histogram with opposition learning based optimization approach for multi-level thresholding. 402 - Rabaie Benameur

, Amine Dahane:
Sfedrl-ids: secure federated deep reinforcement learning-based intrusion detection system for agricultural internet of things. 403 - Fadi Barbàra, Mirko Zichichi, Stefano Ferretti, Claudio Schifanella:

DLT-based personal data access control with key-redistribution. 404 - Alia Nabil Mahmoud, Vítor Santos

, Mário M. Freire, Ahmed Abdelaziz:
Enhancing software defect prediction with a hybrid convolutional neural network and antlion optimization model. 405 - Aihua Wu, Chunyang Hua:

ALB-Chain: achieving scalability and load balance blockchain sharding. 406 - John Owoicho Odeh

, Xiaolong Yang
, Oluwarotimi Williams Samuel, Sahraoui Dhelim
, Cosmas Ifeanyi Nwakanma
:
Systematic investigation of privacy preservation techniques for industrial IoT-enabled critical edge network Infrastructure. 407 - Shaha T. Al-Otaibi

, Sarra Ayouni
, Nadeem Sarwar
, Asma Irshad
, Faizan Ullah
:
AI-driven security framework for medical sensor networks: enhancing privacy and trust in smart healthcare systems. 408 - Kanchan Namdev

, Ranjit Rajak:
Enhancing heuristic workflow scheduling algorithms using Q-learning technique in cloud computing. 409 - Zhendong Wang, Jiaqi Bao, Zhiyuan Zeng, Sammy Chan:

Application of dual-channel high-order graph neural network for intrusion detection with semisupervised learning. 410 - Maroua Abdelhafidh, Adel Ben Mnaouer

:
A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs. 411 - Kapil Kumar, Manju Khari:

Intrusion detection system based on federated learning using layer-based privacy obfuscation. 413 - Shefaa Alzoubi, Amal Rassas, Mohammad AlYamani, Mohammad Alshboul

:
An efficient low aggressiveness portion (ELAP) cache replacement policy for systems with non-volatile main memory. 414 - Rajesh Kumar Chaudhary, Ravinder Kumar, Nitin Saxena:

Ameliorating clustered federated learning using real-coded genetic algorithm. 415 - Jai Prakash Kushwaha, Saumya Bhadauria, Shashikala Tapaswi:

mFCBF based lightweight intrusion detection system for IoT networks. 416
Volume 28, Number 7, September 2025
- Ali Kadhum M. Al-Qurabat, Alyaa Kadhim Mohammed, Ali Z. K. Matloob, Suha Abdulhussein Abdulzahra:

Integrating weighted visibility graphs with IoMT for epileptic seizure detection: a machine learning approach. 417 - Sheng Wang, Yumei Shi, Shiping Chen, Meng Liu:

Forecasting GPU type allocation via demand feature extraction in heterogeneous clusters. 418 - Haidong Huang, Youfa Fu, Dan Liu, Jiadui Chen, Ling He:

Adaptive Gazelle optimization algorithm: a novel solution for complex optimization problems. 419 - Kyuli Park, Dongjae Lee, Yeonwoo Jeong, Salim Hariri, Sungyong Park:

Towards an asynchronous commit in micro-batch streaming systems with log-structured merge-tree based key-value store. 420 - Yiming Yin, Jianxun Liu, Yi Liu, Jia Deng:

Advancing code completion through rotary position embedding. 421 - Sumedha Seniaray, Rajni Jindal:

Enhanced anomaly-based network intrusion detection leveraging a modified picture fuzzy clustering approach. 422 - Xiaoyu Zhou, Chenyang Shi, Donglin Zhu, Changjun Zhou:

Kanfilter: a simple and effective multi-module point cloud denoising model. 423 - Yuansheng Gao

, Jinpeng Wang
, Lang Qin, Jiahui Zhang, Yulin Wang:
Freedom from inspiration! Achieving efficient metaheuristic optimization with delta plus. 424 - Hong Zhang, Min Yi, Xijun Zhang:

Traffic flow forecasting based on dynamic graph convolution and triplet attention. 425 - Yiqian Zhao, Sheng Zhu, Jinting Wang:

Strategic joining and optimal pricing in the hybrid cloud system with risk-sensitive service requests. 426 - Saqib Ali, Sakhawat Ali, Syed Fakhar Bilal, Khalil ur Rehman

, Zeeshan Shaukat, Ahmed Khan, Rooha Khurram:
A robust U-net-based cascaded model for brain tumor substructures segmentation using magnetic resonance imaging. 427 - Laixiang Xu

, Bei Li, Jingfeng Su, Yongfeng Fan, Junmin Zhao:
RSCNet: an integrated deep learning classification model for tomato leaf diseases. 428 - Xinyi Hu, Siyuan Chen, Kai Zhang

, Lifei Wei, Jianting Ning:
Time-controllable keyword search with aggregate keys and multi-delegation for secure cloud storage. 429 - Bnyad O. Mohammed

, Hadi S. Aghdasi, Pedram Salehpour:
Dhole optimization algorithm: a new metaheuristic algorithm for solving optimization problems. 430 - Sourabh Bhaskar

, Keyur Parmar, Devesh C. Jinwala:
Comparative evaluation of pairing-free and pairing-based CP-ABE schemes for resource constrained environments. 431 - E. Mosavi, Seyed Abolfazl Shahzadeh Fazeli, Elham Abbasi, Fatemeh Kaveh-Yazdy

:
Using hybrid mountain gazelle optimization and particle swarm optimization algorithms to improve clustering. 432 - Chao Chen, Zhenghua Wang, Chen Jiang, Zheng Wang:

Nime: a native in-memory compute framework for cluster computing. 434 - Zhennan Wang, Lei Wang, Qiaoyong Jiang, Zhaoqi Wang, Wenqian Zhu, Liangliang Wang:

A particle swarm optimizer with a scoring-based multi-neighborhood selection mechanism for multimodal multi-objective problems. 435 - Gabriel Pereira, Willian Barreiros, Renato Ferreira, George Teodoro:

Spatial-aware and load balancing distributed data partitioning strategies for content-based multimedia retrieval. 436 - Zeeshan Hameed, Hamid R. Barzegar, Nabil El Ioini, Claus Pahl:

BE-DSN: leveraging blockchain for improving data availability and security in distributed storage networks. 437 - Zhaoxin Zhang

, Shize Huang, Qianhui Fan, Decun Dong:
Adversarial examples detection for object detectors using consistency check framework. 438 - Zigang Chen, Danlong Li, Fan Liu, Xingchun Yang, Haihua Zhu, Xiaoyong Li:

Confidentiality, integrity, and non-repudiation of automobile event data: a TEE-based secure transmission scheme between automobile and cloud. 439 - Kalyan Kumar Jena, Sourav Kumar Bhoi, Sanjaya Kumar Panda:

Enhancing data credibility in 6G-enabled IoT-fog environment using secured blockchain scheme. 440 - Xiaohan Yu

, Zebin Hu, Seungjun Baek
, Chen Shen, Chao Chen
:
Apstgcn: adaptive parallel spatio-temporal graph convolution network for traffic forecasting. 441 - Liangcai Xia, Shijun Chen:

Two-stage hierarchical evolutionary algorithm based on multi-population for multi-objective distributed heterogeneous welding flow shop scheduling. 442 - Zhenyu Yin, Zhiying Bi, Junyao Xue, Lei Wu:

An improved heuristic service deployment algorithm based on multi-parameter priority in edge computing. 443 - Fen Zhao, Jun Guo, Hongan Pan, Yong Tang:

Using spatial-frequency features for visible and infrared image fusion. 444 - Sarah Hussein Toman

, Zinah Hussein Toman:
Formal service conflict detection through abstraction and refinement. 445 - Qian Zhang, Huijin Li, Mingwen Shao, Hong Liang:

Learned image compression with CNN-LocalMamba architectures and multi-context entropy model. 446 - Jie Ling, Runlong Duan:

Privacy preserving technology for data sharing in cloud-assisted internet of medical things. 447 - Safa Boumiza, Rafik Braham:

A deep learning-based anomaly detector for CAN bus networks in autonomous cars. 448 - Billy Pik Lik Lau, Jatinder Kumar, Ashutosh Kumar Singh, Terence Peng Lian Tan:

Join coalition mechanism for enhancing idle agents' utility in a macroscopic coalition. 449 - Sourav

, Rifaqat Ali:
Post-quantum secure health records: a blockchain-based lattice threshold signcryption scheme. 450 - Muhammad Waseem Akhtar, Zia Bashir, M. G. Abbas Malik:

Modeling and analysis of variable fractional order hyper-chaotic Lü system with radial basis function neural networks. 451 - Yang Chen, Mahdi Mir:

An intrusion detection system for industrial IoT using CNN-LSTM and reptile search algorithm. 452 - Junhong Yang, Ruiping Xiong, Xing Hu, Zhongping Zhao, Lin Li:

An evolutionary algorithm with enhanced clustering genetic strategies and its application to double-layer spraying trajectory planning. 453 - Liming Sun, Ming Zhu, Jing Li, Haotian Zhang:

Adaptive annealing dynamic Q-learning based on subroute optimization for solving the traveling salesman problem. 454 - Ahmad Nasayreh, Noor Aldeen Alawad, Ameera Jaradat

:
Enhanced chimp optimization algorithm using crossover and mutation techniques with machine learning for IoT intrusion detection system. 455 - Usman Humayun

, Mosab Hamdan, Mohammed Sultan Mohammed, Hashim Elshafie
, Muhammad N. Marsono:
Dynamic-timeout prediction and proactive eviction for SDN flow table overflow mitigation. 456 - Jan Fesl, Michal Polák, Daniel Sedlak

:
Tcp-based network communication optimized for green cloud computing. 457 - Azadeh Sadat Miraftab, Ahmadreza Montazerolghaem

, Behrad Mahboobi:
Improving performance of content-centric networks via decentralized coded caching for multi-level popularity and access. 458 - Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan:

Explainable AI for enhancing IDS against advanced persistent kill chain. 459 - Sili Wang, Te Ma:

A two-way trust-based routing approach to identify malicious and energy-aware nodes in fog computing. 460 - Damiano Azzolini

, Stefano Forti
, Antonio Ielo:
Continuous reasoning for adaptive container image distribution in the cloud-edge continuum. 461 - Samah A. Zakaryia, Mohamed A. Mead, Tamer Nabil, Mohamed K. Hussein:

Task offloading for multi-UAV asset edge computing with deep reinforcement learning. 462 - Divyanshu Awasthi, Vinay Kumar Srivastava

:
ROI-based optimized image watermarking with real-time authentication. 463 - Nitesh Bharot, Nakul Mehta, John G. Breslin, Priyanka Verma:

Cloudlock: secure data sharing using a hybrid cryptosystem in multi-cloud data storage. 464 - Pedro Escaleira, Vitor A. Cunha

, João Paulo Barraca, Diogo Gomes, Rui L. Aguiar:
A systematic review on security mechanisms for serverless computing. 465 - Rohit Shorya

, Priti Jagwani
:
FEED: Fair and Equitable Energy Distribution based on permissioned blockchain and predictive analytics. 466 - Haibin Ouyang, Xuyu Lin, Steven Li, Liqun Gao, Essam H. Houssein:

Recent metaheuristic algorithms for multi-objective feature selection: review, applications, open issues and challenges. 467 - Essam H. Houssein, Eman Saber

, Yaser Maher Wazery, Abdelmgeid A. Ali:
An efficient improved quasi-random fractal search for hyperparameter optimization: case study with lung disease classification. 468 - Essam H. Houssein, Amr M. Gamal, Eman M. G. Younis, Ebtsam Mohamed:

Explainable artificial intelligence for medical imaging systems using deep learning: a comprehensive review. 469 - Haixin Jia, Zhaoxuan Chen, Guoying Zhang, Wenzhuo Liu, Zirui Zhang:

Ms-unet:coal-rock crack image segmentation based on attention mechanism and multi-scale features. 470 - Himanshu Nandanwar, Rahul Katarya:

A hybrid Blockchain-Based framework for securing intrusion detection systems in internet of things. 471 - Kewen Wang, Ting Shu

, Xuesong Yin, Jinsong Xia:
A multi-strategy improved manta ray foraging optimization for engineering applications. 472 - Busra Buyuktanir, Sahsene Altinkaya, Gozde Karatas Baydogmus

, Kazim Yildiz:
Federated learning in intrusion detection: advancements, applications, and future directions. 473 - P. Chinnasamy, Logeshwari Dhavamani, Ramesh Kumar Ayyasamy

, B. Santhosh Kumar, Ajmeera Kiran:
QuantumBlock health records: enhancing healthcare data security with quantum cryptography and blockchain technology. 474 - Pengwei Yan, Yesong Guo, Jing Wen, Jingjing Han, Yanxin Fan, Yanhong Luo, Pudong Qian, Qian Zhang:

Optimizing cardiac radiation therapy in left breast cancer patients using an intelligent hybrid fuzzy model and differential genetic evolution. 475 - Idriss Dagal

, Ambe Harrison
, Al-Wesabi Ibrahim
, Wulfran Fendzi Mbasso
:
Comprehensive evaluation of data preprocessing and visualization techniques for enhanced classification and sampling. 476 - Loubna Moujoud, Meryeme Ayache, Abdelhamid Belmekki:

Enhancing malware detection through ensemble learning techniques. 477 - Nour El Islem Karabadji, Abdelaziz Amara Korba, Ali Assi, Hassina Seridi, Mohamed Aimen Karabadji, Yacine Ghamri-Doudane, Abdelghani Lakhdari, Mohamed Elati, Wajdi Dhifli:

A genetic and graph-guided feature learning strategy for improving decision tree construction. 478 - Jing-An Cheng, Qilei Li, Alireza Souri, Xiang Lei, Chen Zhang, Mingliang Gao:

Towards trustworthy crowd counting by distillation hierarchical mixture of experts for edge-based cluster computing. 479 - Zuheng Yin, Hongzhen Xu, Aihua Liu:

A graph neural networks and improved whale optimization algorithm-based approach for cloud service composition. 480 - Isaac Osei Asante, Libing Wu:

Blockchain and deep learning for improving impenetrable data passage in the IoT-imbued healthcare system. 481 - Mohamed Wajdi Ouertani

, Ghaith Manita, Ouajdi Korbaa
:
Hannibal Barca optimizer: the power of the pincer movement for global optimization and multilevel image thresholding. 482
Volume 28, Number 8, September 2025
- Jingling Yang, Huayou Chen:

Multi-objective optimization empowered spatiotemporal parallel network for online $\hbox {PM}_{2.5}$ interval prediction. 483 - Meijia Song, Jun Lin, Xiangrong Liu, Heming Jia

, Shuyuan Luo:
Octopus optimization algorithm: a novel single- and multi-objective optimization algorithm for optimization problems. 484 - Vijaykumar Mamidala, Akhil Raj Gaius Yallamelli, Mohanarangan Veerappermal Devarajan, Thirusubramanian Ganesan, Rama Krishna Mani Kanta Yalla, Aceng Sambas:

Hybrid anomaly-based cloud security and machine learning-based behavioral analysis for threat intelligence detection in cloud environment. 485 - Shriniwas Patil

, Keyur Parmar:
MedReward: privacy preservation of electronic health records (EHR) and secure incentive distribution in the presence of active insider and outsider adversaries using blockchain. 486 - Vidyapati Jha

, Priyanka Tripathi:
Abductive hypothesis testing in cognitive IoT sensor network. 487 - Suryakant Prasad, Y. Sreenivasa Rao:

SPySAVer: efficient signature-policy attribute-based server-aided verification signature for industrial-internet-of-things. 488 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang:

Optimization of maximum parallel K-means algorithm based on GPU cluster. 489 - Yanmei Shen, Yabiao Sang, Hui Wang, Zihao Shen, Peiqian Liu:

HSLRL-DP: based on Hasse sensitivity levels and reinforcement learning trajectory privacy enhancement mechanism. 490 - Yana Lv, Haomiao Bao, Xiuli Du, Shaoming Qiu:

Relation cross-fusion attention assistance networks for multi-hop question answering over knowledge graphs. 491 - Lihong Li, Hongyao Dong, Hang Li:

Selective ensemble classification algorithm based on neighborhood-tolerance mutual information. 492 - Sepehr Ganji, Shirin Behnaminia, Ali Ahangarpour, Erfan Mazaheri, Sara Baradaran, Zeinab Zali, Mohammad Reza Heidarpour, Ali Rakhshan, Mahsa Faraji Shoyari:

CN2F: a cloud-native cellular network framework. 493 - Delin Wang, Xiangshun Li

:
Enhanced detection, isolation, and accommodation scheme for concurrent sensor failures in industrial processes. 494 - Mahendra Kumar Jhariya

, Vasudev Dehalwar
, Jyoti Bharti:
SDIdA-IoT: self-sovereign digital identification and authentication framework for IoT devices using blockchain. 495 - M. Saryazdizade, Z. Nikooeinejad, Ali Delavarkhalafi:

A stochastic differential oligopoly game for risk management of resource mining in blockchain. 496 - Bin Li, Tianwei Shi, Wenhua Cui, Teng Xu:

SFENet:RGB-D salient detection network enhanced by specific features. 497 - Liyuan Guo, Song Gao, Weigang Pan, Fei Xu:

A novel container scheduling algorithm for edge computing: integrating entropy weight method and multi-strategy particle swarm optimization. 498 - Jiaheng Li, Qinmu Wu:

Fast-CFLB: a privacy-preserving data sharing system for Internet of Vehicles using ternary federated learning and blockchain. 499 - Zhiyuan Li, Yuqi Jiang, Jingyu Zhao, Liang Zhang, Lin Tan, Fanliang Bu:

UBI-STA: spatiotemporal correlation analysis for user behavior identification in network encrypted traffic. 500 - Hui Li, Hezong Li, Leina Shi, Taoming Yu, Yixu Su:

YOLOv8-SST lightweight small target fault detection system integrating SENet attention mechanism and Tr-OCR. 501 - Yuyao Huang, Yuhang Wang, Li He, Zhiqin He, Lin Xiao:

Spinal segmentation based on heatmap regression positioning and improved UNet. 502 - Xufeng Liu, Zupeng Zhou, Yongquan Zhou:

Multi-strategy butterfly optimization algorithm for state estimation in sandwich systems. 503 - Fan Yang

, Yilin Yuan, Zhaoqian Zhang, Zichen Li:
Blockchain-based public auditing and secure deduplication for copyright data. 504 - Yazhi Liu, Haonan Xia, Wei Li:

FedDC: a federated learning framework to enhance gradient diversity and mitigate conflicts. 505 - Fahad Rahman, Chafiq Titouna, Farid Naït-Abdesselam:

Efficient shard load balancing for scalable blockchain systems. 506 - Xiaoming Wang, Mingzhan Dai:

Privacy-preserving and robust federated learning scheme with high efficiency through ciphertext filtering. 507 - Prasanth Kumar Bevara, Ravi Shankar Singh

, Rambabu Medera, V. V. D. Prasad Chelluri:
Optimizing scientific workflow scheduling in cloud environments: a hybrid PSO-EWWO. 508 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang:

Design and implementation of fully distributed heterogeneous resource management system. 509 - Lihong Zhang, Chongxin Xu, Yingbo Liang, Yuzhuo Li, Tong Liu:

TransMA-Unet: transformer and multi-scale residual connection attention network for vessel segmentation. 510 - Emran Younesi, Ebrahim Akbari, Homayun Motameni:

A study on discriminative power of stylistic features in affect analysis. 511 - Bahareh Bagheralmoosavi, Seyed Erfan Fatemieh, Mohammad Reza Reshadinezhad, Antonio Rubio:

Power-area efficient serial IMPLY-based 4:2 compressor applied in data-intensive applications. 512 - Shanchen Pang, XiaoRan Zhu, Haiyuan Gui, Yanxiang Zhang:

A Multi-layer heterogeneous task scheduling strategy in UAVs-assisted MEC networks. 513 - Xin Chen, Yuejin Zhang, Zhongyuan Gong, Qi Shi, Shuying Gong, Zhuo Li, Dixin Huang, Nan Jiang:

Agm-c3banet: a network intrusion detection model for imbalanced data. 514 - Mohemmed Yousuf Rahamathulla, Mangayarkarasi Ramaiah:

Building robust lightweight network intrusion detection: a multi-pronged approach with DSSTE and deep learning for securing edge-enabled industrial IoT applications. 515 - Jian Yu, Xiangmei Xiao:

A cloud service security risk measurement method based on information entropy and Markov chain. 516 - Mahendra Kumar Gurve, Sankar Behera, Yamuna Prasad, Nitin:

Integrating YOLOv9 and image enhancement on UAV-derived data enhances precision in potato disease detection. 517 - Qichang Li, Bing Bu, Junyi Zhao:

An enhanced blockchain-based collaborative intrusion detection approach for CBTC systems. 518 - Leyi Shi, Yuchen Zhao:

Modeling and analysis of worm computing systems based on stochastic petri nets. 519 - Muath AlShaikh, Mostefa Kara, Farid Binbeshr, Mustafa Ghaleb:

An OTP and watermarking based partial homomorphic approach to authenticated and integrated cloud computing. 520 - Xiubao Zheng, Jing Li, Ming Zhu, Jie Dai:

A multi-objective pareto optimization service selection approach considering cloud manufacturing production constraints. 521 - Wei Fan, Jing Li:

Joint device assignment and resource allocation for hierarchical semi-asynchronous federated learning over wireless networks. 522 - Zhihua Li, Shuli Ning, Zhongcheng Wei, Jijun Zhao:

Dbn-igr: dual-branch network for identification and gesture recognition with WiFi signals. 523 - Siddharth Gautam, Amarjit Malhotra, Sanjay Kumar Dhurandher:

A blockchain framework for enhancing data security and intrusion detection in the internet of things environment using hybrid deep learning model. 524 - Bingxian Li, Lin Zhu, Long Tan:

Optimizing task offloading and resource allocation in latency-constrained vehicular edge computing. 525 - Chuhang Wang, Si Chen, Huangshui Hu, Xinji Fan:

A distributed cluster-based routing protocol using fuzzy logic and deep reinforcement learning for wireless sensor networks. 526 - Madhusudan Naik, Akhilendra Pratap Singh, Nihar Ranjan Pradhan:

TBSSMC: a trusted blockchain solution for social media content integrity and performance simulation. 527 - Ghazi Mergani Ahmead Ali, Hongsong Chen:

Contract-guardian: a bagging-based gradient boosting decision tree for detection vulnerability in smart contract. 528 - Ahmed M. Tawfik, Ayman Al-Ahwal, Adly S. Tag Eldien, Hala H. Zayed:

Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey. 529 - Saba Inam, Shamsa Kanwal

, Fariha Nawaz, Amal K. Alkhalifa:
Enhanced medical image security: a chaotic map and laplace transform-based encryption scheme. 530 - Alessio Viticchié, Alberto Salvatore Colletto, Giulio Sunder, Cataldo Basile, Alessandro Aliberti

:
Advanced attack graph framework for operational technology: scalable modeling, validation, and risk mitigation. 531 - Walid K. Ghamry, Suzan Shukry:

Joint optimization of energy harvesting and data transmission in SWIPT-enabled hybrid precoding mmWave massive MIMO-NOMA systems. 532 - Ganesan Nagabushnam

, Kyong Hoon Kim
, Yundo Choi
:
FAMASO: fog-adaptive multi-agent scheduling optimization. 533 - Feifei Niu, Arindam Sarkar, Sarbajit Manna, Soumya Chatterjee, Abdulfattah Noorwali, Kamal M. Othman:

Differential privacy-enabled federated learning for secure neural synchronization in protecting industrial data streams. 534 - Aouatef Mahani, Okba Kazar:

Defenses against model stealing attacks in MLaaS: literature review and challenges. 535 - Wei-Kuo Chiang, Yuan-Hsiang Chih:

A pareto-optimal heuristic algorithm to refactor IMS core for cloud-native NFV. 536 - Jhalak Dutta, Smita Das

:
Enhancing disaster readiness: a comprehensive review of IoT-enabled WSN path planning for effective emergency response. 537 - Yue Zhang, Wei Liu

, Jiayi Song, Ke Chen, Qian Wang:
Cloud-assisted updatable private set intersection cardinality. 538 - Rohit Malik

, Sakshi Dua, Preety Shoran:
Blockchain-based node authentication algorithm for securing electronic health record data transmission. 539 - Xinyu Lei, Jiatang Cheng:

A multi-layered artificial electric field algorithm for numerical optimization and path planning. 540 - Xueqi Peng, Wenting Shen, Yuan Gao, Ye Su:

Blockchain-based secure deduplication and cloud storage auditing with fair arbitration and privacy protection. 541 - Zhipeng Lai, Jiabin Ding, Hanfeng Yin, Lijia Wu, Jie Liu, Wei He:

Bitterling Colony Optimization: a bio-inspired algorithm for global search. 542 - Salma Soofiyan, Amin Karami:

Ethereum smart contracts: a hierarchical analysis of vulnerability challenges and mitigation strategies. 543 - Jinshou Chen, Wenxuan Yao, Jianjiang Li:

Parallel optimization techniques for ultra-large scale refined numerical simulations on Chinese supercomputers. 544 - Mu Chen, Sarbajit Manna, Arindam Sarkar, Abdulfattah Noorwali, Kamal M. Othman:

Quantum neural computing enhanced five-dimensional hyperchaotic framework for secured and reliable communication on the Internet of Things systems. 545 - Narendra Kumar, Sunil Kumar, Rajeev Kumar Sharma, Rupak Sharma, Kapil Tomar:

A decentralized blockchain based privacy preservation scheme for healthcare data security enhancement in cloud. 546 - Biao Li, Bing Wang, Xiong Hu:

An industrial small surface defect detection technique based on CEYolo model. 547 - Ritesh Chandra, Shashi Shekhar Kumar, Rushil Patra, Sonali Agarwal:

Decision support system for Forest fire management using Ontology with Big Data and LLMs. 548 - Sihem Benfriha, Nabila Labraoui

, Haythem Ahmad Bany Salameh, Radjaa Bensaid:
Reinforcement learning-based drone-client selection for efficient federated learning-based intrusion detection in FANETs. 549 - Aya G. Ayad

, Nehal A. Sakr, Noha A. Hikal:
Fog-empowered anomaly detection in IoT networks using one-class asymmetric stacked autoencoder. 550 - Ziyi Meng, Jing Li, Ming Zhu, Yuhong Yan:

Energy service selection method based on blockchain smart contract and improved polar bear algorithm. 551 - Bing Tang, Jiayao Li, Yujun Cao, Qing Yang:

QoS-driven reinforcement learning-based resource allocation in space-air-ground-sea integrated networks. 552 - Yi Wang, Shicheng Zhong, Zheng Zhang:

Game-theoretic cloud assistance strategies of end-edge-cloud systems for mitigating edge distributed denial of service attacks. 553 - Yongxing Lin, Yan Shi:

A novel sustainable approach for developing internet of things-based transportation networks based on a hybrid energy-aware algorithm. 554
Volume 28, Number 9, October 2025
- Zonghui Li, Bowei Zheng, Youfa Fu, Xiaoming Liu:

Adaptive walrus optimization algorithm for unmanned aerial vehicle path planning and engineering optimization problems. 555 - Salah Kamel, Mansur Khasanov, Mohamed H. Haasan, Jasur Abdubannaev, José Luis Domínguez-García:

Quadratic interpolation manta ray foraging optimization: a meta-heuristic approach for simultaneous DG allocation and distribution system reconfiguration. 556 - Seoyoung Kim, Jiwon Ha, Yoonhee Kim:

Oltunes: Online learning-based auto-tuning system for DL inference in heterogeneous GPU cluster. 557 - Huiyan Han, Wanning Li, Xie Han, Liqun Kuang, Xiaowen Yang:

Indoor object detection algorithm based on SBP-YOLOv7. 558 - Guoqing Jin, Shibing Zhou, Yihao Zhu:

Auto-tuning density peak clustering without parameters. 559 - Chunmao Jiang, Wei Wu:

A fine-grained task-aware scaling mechanism for dynamic cloud workloads. 560 - Doaa Aloqoul

, Manal Al-Bzoor, Hisham Almasaeid, Tasneem Dawahdeh:
Multi-AUV trajectory optimization for data collection in the internet of underwater things (IoUT). 562 - Maira Khalid, Ahmed Raza Mohsin, Jehad Ali, Byeong-Hee Roh:

Optimization of recurrent neural networks for high-performance intrusion detection in network traffic. 563 - Yanjin Cheng, Wenmin Li, Pengfei Gong, Huimin Zhang, Fei Gao, Sujuan Qin, Tengfei Tu:

Personalized federated learning based on dual adaptive aggregation in the IoT environments. 564 - Yang Wang, Xinwen Zou, Yingmin Wu:

Deep neural network-based surrogate-assisted evolutionary algorithm for expensive constrained optimization. 565 - Yunlong Wang, Hong Liang, Mingwen Shao, Qian Zhang:

Kdhiera: boosting self-supervised masked video modeling via hierarchical knowledge distillation. 566 - Mariano Albaladejo-González, Pantaleone Nespoli, Félix Gómez Mármol, José A. Ruipérez-Valiente:

A multimodal and adaptive gamified system to improve cybersecurity competence training. 567 - Yang Chen, Jia Hao, Yu Peng, Hongyan Xia:

Transformer-based performance prediction and proactive resource allocation for cloud-native microservices. 568 - Yan Zeng, Chengchuang Huang, Siyuan Teng, Meiting Xue, Yukun Shi, Jilin Zhang, Jian Wan, Gangyong Jia:

FedAEF: optimizing federated learning with mining and enhancing local data features. 569 - Mehdi Karami, Amin Karami:

Harmony in federated larning: a comprehensive review of techniques to tackle heterogeneity and non-IID data. 570 - Vo Truong Trung Hieu, Nguyen Huu Quyen, Hien Do Hoang, Phan The Duy, Van-Hau Pham:

PoFQ: a blockchain consensus protocol for decentralized federated learning-based threat hunting approach in a trustless computing landscape. 571 - Himan Namdari, Victor Morales Avalos, Amal Alshehri, Cihan Tunc, Ram Dantu:

Enhanced trust in IoT environments: utilizing perfect Bayesian equilibrium, exponential smoothing, and machine learning. 572 - Tai-Shan Lou, Guang-sheng Guan, Zhe-peng Yue, Yu Wang, Ren-long Qi, Shi-hao Tong:

A competitive game optimization algorithm for unmanned aerial vehicle path planning. 573 - Hao-Ming Song, Yu-Cai Wang, Jie-Sheng Wang, Jia-Ning Hou, Yu-Wei Song, Xin-Ru Ma, Yu-Liang Qi:

Ensemble filter RL feature selection method based on MW-shaped transfer function for high-dimensional cancer gene expression data. 574 - Kunda Suresh Babu

, Lakshmi Revathi Krosuri
, Nirmalajyothi Narisetty
, Chandrika Dadhirao
:
Optimizing feature selection in imbalanced intrusion detection system using hybrid metaheuristics algorithms for wireless sensor networks. 575 - Safia Gul

, Bilal Ahmad Malik
, M. Tariq Banday
, Zahrah Ayub
:
LQE-DT: a machine learning approach to proactive link quality prediction in IoT networks. 576 - Bouchra El Akraoui, Imane Chakour, Cherki Daoui:

Effective summarization of ChatGPT user feedback: integrating topic detection with Markov chains. 577 - Aminu Onimisi Abdulsalami, Farhad Soleimanian Gharehchopogh, Mohamed Abd El Aziz, Shengwu Xiong:

Multi-objective heterogeneous comprehensive learning symbiotic organism search with application to convolutional neural network pruning. 578 - Sandeep Singh Sikarwar, Rakesh Kumar, Benay Kumar Ray:

Multi-attribute based double auction for virtual machine trading in federated cloud environment. 579 - Yuechao Bian, Haorong Wu, Fuchun Sun

, Qiurong Lv, Xiaoxiao Li
:
An improved lightweight metal sheets surface defect detection algorithm based on YOLOv8. 580 - Rahat Ullah, Mubashar Sarfraz, Muhammad Farhan Sohail, Sheraz Alam, Sajjad Ahmed Ghauri, Nauman Anwar Baig:

Maximizing energy efficiency through joint resource optimization in NOMA-assisted UAV-enabled next-generation wireless networks. 581 - Zilun Xiong, Buqing Cao, Shanpeng Liu, Zhenlian Peng, Min Shi, Shangli Liu:

UMar: unbiased stratified knowledge distillation-based mobile application recommendation. 582 - Longhui Niu, Yunsheng Fan, Ting Liu, Qi Han:

Mlvit-YoloX: a lightweight maritime surface object detector based transformer for unmanned surface vehicles. 583 - Dudu Guo, Ke Zhao, Linbo Li

:
A traffic state discrimination method based on machine learning and multistrategy dung beetle optimization algorithm. 584 - Poonam Rani, Harkesh Sehrawat, Amandeep Kaur, Robertas Damasevicius:

Emergent defenders: generative AI's role in safeguarding IoT ecosystems. 585 - Shuzhi Su, Chao Wang, Yanmin Zhu, Yang Xu:

Region-aware unknown information enhancement for open world object detection. 586 - Rania Mzid, Bakhta Haouari, Olfa Mosbahi:

User comfort or sustainability? A multi-objective reinforcement learning strategy for the IoMT with harvesting energy. 587 - Ahmed S. Alwakeel, Abdullah M. Shaheen, Ghareeb Moustafa

, Badr Al Faiya, Idris H. Smaili:
Integrated fluid antenna systems with reconfigurable intelligent surfaces via quadratic interpolation optimization. 588 - Hafsteinn Hjartarson

, Fjolnir Thrastarson, Anna Sigridur Islind, Gísli Hjálmtýsson:
Dynamic membership management for a permissioned blockchain. 589 - Fatima Zahrae El-Hassani, Abderrahmane Ed-daoudy, Nour-Eddine Joudar, Khalid Haddouch:

Improving early breast cancer detection: a hybrid approach with convolutional neural networks and genetic algorithm-based optimization. 590 - Sheng Hao, Yong Hong, Jianqun Cui, Rui Chen, Li Zhen:

A biodynamic-inspired routing algorithm for energy harvesting-aided 3-D wireless sensor networks. 591 - Shixing Zheng, Suyang Ma, Xu Jin:

Time series prediction with transformer neural network optimized by IFE and hunger-driven DMOA. 592 - Qilin Li

, Chunyan Zhang, Qihua Ma
, Xin Weng
:
MESO: a multi-strategy enhanced snake optimizer applied to autonomous vehicle motion planning. 593 - Jiangxue Xie

, Haisong Huang, Shengwei Fu, Ziten Lu, Feifei Li, Man Su:
Enhanced crayfish optimization algorithm for global optimization and real-world applications. 594 - Mahmoud Abdel-Salam, Diego Oliva, Marco Pérez-Cisneros, Ibrahim M. El-Hasnony:

Advanced feature selection approach with Halton-based enhanced adaptive dung beetle algorithm. 595 - Sasan Harifi

, Reza Eghbali
, Seyed Mohsen Mirhosseini
:
Star Death: a novel lightweight metaheuristic algorithm and its application for dynamic load-balancing in cluster computing. 596 - Scott Fowler

, Sami Souihi:
Multi-user QoE optimization in virtual reality gaming using RL on mobile edge networks. 597 - Marwah A. Helaly, Sherine Rady, Mohamed Mabrouk, Mostafa M. Aref, Sebastián Villarroya, José Manuel Cotos, David Mera:

Advancements in water quality prediction: a practical review of machine learning and deep learning approaches. 598 - Fatima Daqaq, Salah Kamel, Mohamed H. Hassan, Rachid Ellaia, Mohammed Ouassaid:

Enhancing large-scale power flow optimization through an advanced coati optimization algorithm. 599 - Faiz Alshrouf, Shadi Masadeh, Dimah Al-Fraihat, Raed Al-Nsoor:

Improving BIRCH hierarchical clustering algorithms for enhanced partitioning of medical data. 600 - Haythem Bany Salameh, Ghaleb A. El Refae

, Shorouq Eletter:
Artificial intelligence and information symmetry: a path to mitigate adverse selection. 601 - Ziren Luo

, Di Li, Ge Wang
, Shiyong Wang, Minghao Cheng, Ting Li, Zi'ang Lei:
Service orchestration of customized production with automated workflow systems. 602 - Caixia Li, Guoping Kong, Xiaolin Lin:

Multi-view clustering algorithm based on sparse regression and structure learning. 603 - C. V. Manjushree, H. Aruna Reddy, D. C. Chandana, C. A. Subasini:

Mitigating data leaks and optimizing task scheduling in cloud computing using EfficientNetV2 with federated learning and blockchain. 604 - Abdelghani Krinah, Yacine Challal, Mawloud Omar, Omar Nouali:

Enhancing fine-grained access control in fog-based e-health applications. 605 - Seyed Naghi Seyedaghaee, Ali Broumandnia, Reza Tavakkoli-Moghaddam:

Adaptive multiobjective differential evolution based on parallel cell coordinate system. 606 - Zhaoye Chen, Jiaqi Liu, Lu Ding, Zhihua Liu:

Global path panning for AUV based on chaos mapping and iterative improved salp swarm algorithm. 607 - Theodora Adufu, Yoonhee Kim:

Dyna-P: placement-aware dynamic partitioning for lightweight applications with modern GPUs. 608 - Yaning Xiao

, Ruba Abu Khurma
, Hao Cui, David Camacho:
MAROAOA: A joint opposite selection-based arithmetic artificial rabbits optimization algorithm for solving engineering problems. 609 - Yayong Shi, Zenghao Cui, Yida Zhang, Rui Wang, Haiyan Zhu:

DLBW: an end-to-end multi-task adaptive gradient balancing method. 610 - Xuan Liu, Mengnan Tian, Xinduan Wang:

Enhanced particle swarm algorithm with diversity-based adaptive predicted learning strategy for numerical optimization. 611 - Jiaying Shen, Donglin Zhu, Wenqing Xiong, Leyi Wang, Jialing Hu, Changjun Zhou, Shi Cheng, Taiyong Li:

DNA sequence-driven multi-strategy particle swarm optimization for global optimization. 612 - Edixon Párraga, Betzabeth León

, Sandra Méndez, Dolores Rexachs
, Daniel Franco, Emilio Luque
:
Deep learning data handling: exploring file formats and access strategies. 613 - N. Naveen Kumar, S. Suresh, S. Balamurugan, Seshu Kumar Penumarti, Maruthamuthu Ramasamy, P. P. Devi, Jude Moses Anto Devakanth:

Optimized intention-adaptive graph neural network for robust failure diagnosis of microservice system using multimodal data. 614 - Libo Feng

, Xian Deng:
An efficient hot/cold data separation scheme for storage optimization in consortium blockchain full nodes. 615 - Tajul Azhar Mohd Tajul Ariffin, Siti Norul Huda Sheikh Abdullah, Fariza Fauzi, Mohd Zamri Murah, Mohammad Kamrul Hasan:

Review on honeynet analysis: can LSTM and shot learning drive intelligent cyber threat modelling and automation? 616
Volume 28, Number 10, October 2025
- Rahul Haripriya

, Nilay Khare, Manish Pandey, Sreemoyee Biswas:
Federated adaptive aggregation: improving privacy and scalability in healthcare AI. 617 - Li Yang, Yunxiao Yang, Yang Xiang:

An improved deep reinforcement learning method for flink configuration parameter tuning. 618 - Liang Xu

, Xingshi He, Jingjing Xue, Qingqing Zhang:
Joint clustering and feature selection based on trace ratio model and coordinate descent method. 619 - Wei Xu, Bing Tang, Yujun Cao, Qing Yang:

Availability-constrained microservice deployment in hybrid cloud-edge infrastructure. 620 - Wei Sun, Kaiqi Deng, Junbo Gao:

Traffic flow prediction based on generative adversarial network with hybrid spatio temporal features learning. 621 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID