


default search action
Cluster Computing, Volume 28
Volume 28, Number 1, February 2025
- Mahmoud E. Farfoura, Ibrahim Mashal, Ahmad Alkhatib, Radwan M. Batyha

:
A lightweight machine learning methods for malware classification. 1 - Yezhou Zhang

, Lang Li
, Yu Ou:
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis. 2 - Sunil Prajapat, Dheeraj Kumar

, Pankaj Kumar:
Quantum image encryption protocol for secure communication in healthcare networks. 3 - Manish Kumar, Sunggon Kim:

Augmented access pattern-based I/O performance prediction using directed acyclic graph regression. 4 - Sunil Prajapat, Neeraj Kumar

, Ashok Kumar Das, Pankaj Kumar, Rifaqat Ali
:
Quantum-safe blockchain-assisted data encryption protocol for internet of things networks. 5 - Jaya Dofe, Shailesh Rajput:

Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function. 6 - Gabriel Araújo, Rayner Sousa, Iure Fé, Paulo A. L. Rego, Francisco Airton Silva:

Network service function chaining: a performance study varying topologies. 7 - Lujie Wang, Zhong Chen

, Xiyu Sun, Chenchen He:
Region of interest encryption algorithm for images based on lifting scheme and object detection. 8 - Nan Li, Qianqian Su

:
An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud. 9 - Guodong Ye, Zhuozhao Chen:

Authenticated reversible image hiding algorithm based on blockchain technology. 10 - Nguyen Tan Cam, Tran Duc Viet:

uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models. 11 - Willian Barreiros

, Jun Kong, Renato Ferreira, George Teodoro:
A hierarchical data partitioning strategy for irregular applications: a case study in digital pathology. 12 - Ardalan Ghasemzadeh, Hadi S. Aghdasi, Saeed Saeedvand:

Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism. 13 - Zeng Gao

, Yi Zhuang, Jingjing Gu:
Multi-strategy arithmetic optimization algorithm for global optimization and uncertain motion tracking. 14 - Rong Gao, Zhiwei Chen, Xinyun Wu, Yonghong Yu, Li Zhang:

Dynamic deep graph convolution with enhanced transformer networks for time series anomaly detection in IoT. 15 - G. Punnam Chander, Sujit Das:

A hybrid decision support system in medical emergencies using artificial neural network and hyperbolic secant grey wolf optimization techniques. 43 - Yong He, Mingran Wang:

Dynamic step opposition-based learning sparrow search algorithm for UAV path planning. 44 - Riham Elsaadany, Guy Bégin:

An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things. 45 - Leda Qu

, Feng Wen, Haixin Huang, Zhuo Wang:
Aggregation-chain: a consortium blockchain based multi-chain data sharing framework with efficient query. 46 - Abdoul Fatakhou Ba, Yingchi Mao, Abdullahi Uwaisu Muhammad, Omaji Samuel, Tasiu Muazu, Umar Muhammad Mustapha Kumshe:

Blockchain federated learning with sparsity for IoMT devices. 47 - Seyed Alireza Omranian, Maziar Goudarzi:

Greedy algorithm for dynamic allocation of intelligent services in vehicular edge computing. 48 - WeiGuang Gu, Fang Wang:

A multi-strategy improved dung beetle optimisation algorithm and its application. 49 - Radjaa Bensaid, Nabila Labraoui

, Hafida Saidi, Haythem Bany Salameh:
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach. 50 - Meysam Jahani, Fatemeh Raji

, Zahra Zojaji:
Securing supply chain through blockchain-integrated algorithmic system: ensuring product quality and counterfeiting tags detection. 51 - Linqiu Gui

, Chunnian Zeng, Jie Luo, Xiaofeng Wang, Xu Yang, Shengshi Zhong:
Graph-based robust 3D point cloud map merging approach for large scale. 52 - Bingxian Li, Lin Zhu, Long Tan:

A vehicular edge computing content caching solution based on content prediction and D4PG. 53 - Alireza Alibakhshi

, Erfan Hassannayebi:
Towards an enhanced next activity prediction using attention based neural networks. 54 - Lei Zhou, Yanyan Dong, Bingya Ma, Zhewen Yin, Fan Lu:

Object detection in low-light conditions based on DBS-YOLOv8. 55 - Sunita Rani

, Geeta Kasana, Shalini Batra:
An efficient content based image retrieval framework using separable CNNs. 56 - Adnane Talha, Anas Bouayad:

Quasi-opposition Remora Optimizer based Nelder-Mead algorithm for tasks scheduling in cloud. 57 - Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh, Alwi M. Bamhdi, Ana Luiza Bessa Barros, Djamel Zeghida, Ahmed Patel:

Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks. 58 - Zihan Wang, Jiqun Zhang

, Yongwei Tang, Hongyuan Cheng:
BGAS: blockchain-based secure and efficient group key agreement scheme for dynamic vehicular platoon. 59 - Mohd Sakib, Shahnawaz Ahmad, Khalid Anwar

, Mohd Saqib:
Optimizing support vector regression using grey wolf optimizer for enhancing energy efficiency and building prototype architecture. 60 - Mohammed Batis, Yi Chen, Mingjing Wang, Lei Liu

, Ali Asghar Heidari, Huiling Chen:
ACGRIME: adaptive chaotic Gaussian RIME optimizer for global optimization and feature selection. 61 - Shuling Hou, Gaoshang Xiao, Huiying Zhou:

High-performance network attack detection in unknown scenarios based on improved vertical model. 62 - Hamza Hammami, Sadok Ben Yahia

, Mohammad S. Obaidat:
A Robust Mutual Authentication Scheme for Health-Focused Connected Intelligent Objects. 63 - Xun Weng, Wenke She, Hongqiang Fan, Jingtian Zhang, Lifen Yun:

Multi-depot vehicle routing problem with drones in emergency logistics. 64 - Yufeng Wang, Yong Zhang, Zhuo Shuang, Ke Chen, Chunyu Xu:

A novel hybrid differential particle swarm optimization based on particle influence. 65 - Junliang Wang, Baohong Lin, Jiao Zhang, Mengyu Sun, Yongchen Pan:

An optimized RDMA QP communication mechanism for hyperscale AI infrastructure. 66 - Prashanth Choppara, Sudheer Mangalampalli:

An efficient deep reinforcement learning based task scheduler in cloud-fog environment. 67 - Shi-Hui Zhang, Jie-Sheng Wang, Si-Wen Zhang, Yu-Xuan Xing, Xiao-Fei Sui:

Multi-strategy fusion snake optimizer on task offloading and scheduling for IoT-based fog computing multi-tasks learning. 69 - Chaimae Hazman, Azidine Guezzaz

, Said Benkirane, Mourade Azrour:
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security. 70 - Shengsheng Lin, Weiwei Lin, Feiyu Zhao, Haojun Chen:

Benchmarking and revisiting time series forecasting methods in cloud workload prediction. 71 - Emrah Aslan

, Yildirim Özüpak:
Detection of road extraction from satellite images with deep learning method. 72 - Mohd Sakib

, Suhel Mustajab
, Mahfooz Alam
:
Ensemble deep learning techniques for time series analysis: a comprehensive review, applications, open issues, challenges, and future directions. 73 - Dongxian Yu, Weiyong Zheng:

A hybrid evolutionary algorithm to improve task scheduling and load balancing in fog computing. 74 - Alberto Prieto, Beatriz Prieto, Juan José Escobar, Thomas Andrew Lampert:

Evolution of computing energy efficiency: Koomey's law revisited. 42
Volume 28, Number 2, April 2025
- Keyu Zhong, Fen Xiao, Xieping Gao:

Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII. 75 - Fengxian Wang, Dailin Li, Jie Zhang, Xiabing Wang, Linwei Li, Xiaoping Shi:

Multiple adaptive fusion network with Mittag Leffler IoU loss for aircraft detection in remote sensing images. 76 - Malha Merah, Zibouda Aliouat, Hakim Mabed:

Dynamic load balancing of traffic in the IoT edge computing environment using a clustering approach based on deep learning and genetic algorithms. 77 - Ying Qiao, Junhan Xiong, Yiguo Zhao:

Network-aware container scheduling in edge computing. 78 - Torana Kamble, Madhuri Ghuge

, Ritu Jain, Vaishali Sarbhukan Bodade:
Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application. 79 - Benyamin Abdollahzadeh, Hatef Javadi

, Oguz Toragay
, Nicola Epicoco, Nima Khodadadi:
The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm. 80 - Yuansheng Gao, Jinpeng Wang

, Changlin Li:
Escape after love: Philoponella prominens optimizer and its application to 3D path planning. 81 - Weiye Wang, Qing Li, Honglei Mu:

Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity. 82 - Roya Zareh Farkhady, Kambiz Majidzadeh, Mohammad Masdari, Ali Ghaffari:

3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT. 83 - Lingru Cai, Yuelong Liu, Jianlong Xu, Mengqing Jin:

Lcsa-fed: a low cost semi-asynchronous federated learning based on lag tolerance for services QoS prediction. 84 - Nilakshee Rajule, Mithra Venkatesan, Radhika Menon, Anju Kulkarni:

Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model. 85 - Essam H. Houssein, Someya Mohsen Zaki, Marwa M. Emam, Nagwan M. Abdel Samee, Reem Ibrahim Alkanhel, Eman M. G. Younis:

Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring. 86 - Niayesh Gharaei

, Aliaa M. Alabdali:
Optimizing smart health monitoring systems: enahancing energy efficiency and reducing latency with multi-level clustering and grey wolf optimizer. 87 - Shawal Khan, Shahzad Khan:

Latency aware graph-based microservice placement in the edge-cloud continuum. 88 - Sanaz Feizi, Hamidreza Ghaffari:

Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks. 89 - Priyadarshni, Praveen Kumar, Nilesh Arjun Gupta, Rajiv Misra:

Integrating of IOTA-based blockchain with edge computing for task offloading powering the metaverse. 90 - Ajit Kumar Mahapatra

, Nibedan Panda, Madhumita Mahapatra
, Tarakanta Jena, Arup Kumar Mohanty:
A fast-flying particle swarm optimization for resolving constrained optimization and feature selection problems. 91 - Aymen Takie Eddine Selmi, Mohamed Faouzi Zerarka, Abdelhakim Cheriet:

Efficient technique utilizing an embedding hierarchical clustering-based representation into crossed cubes for TSP optimization. 92 - Khwaja Mansoor, Mehreen Afzal, Waseem Iqbal, Yawar Abbas:

Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices. 93 - Juan Chen, Jia Zhao, Renbin Xiao, Zhihua Cui, Hui Wang, Jeng-Shyang Pan

:
Role division approach for firefly algorithm based on t-distribution perturbation and differential mutation. 94 - Arun Mani Tripathi, Lokendra Singh Umrao:

Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT. 95 - Zhongmin Wang, Shuai Zhang, Xiaomin Jin, Yanping Chen, Chen Lu:

Joint resource allocation and privacy protection for MEC task offloading in industrial Internet. 96 - Sarika Mustyala, Manjubala Bisi:

Ensembling Harmony Search Algorithm with case-based reasoning for software development effort estimation. 97 - Hao Guo, Bin Deng, Weidong Li:

Multi-resource maximin share fair allocation in the cloud-edge collaborative computing system with bandwidth demand compression. 98 - Xiaoxu Wei, Chen Niu, Lianzheng Zhao, Yongsheng Wang:

Combination of ant colony and student psychology based optimization for the multi-depot electric vehicle routing problem with time windows. 99 - Shuangquan Xu, Xiji Li, Qing Liu, Haiyang Dong, Xiaoyan Xu, Licai Yan, Yue Zhang:

Intelligent monitoring system for environmental protection during the construction period of pumped storage power station. 100 - Yuping Wang, Peng Zhang, Bo Wang, Zhifeng Zhang, Yaoli Xu, Bin Lv:

A hybrid PSO and GA algorithm with rescheduling for task offloading in device-edge-cloud collaborative computing. 101 - Ashutosh Kumar Singh, Satender Kumar, Sarika Jain:

A multi-agent deep reinforcement learning approach for optimal resource management in serverless computing. 102 - Ashfaq Ahmad Najar

, S. Manohar Naik
:
AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing. 103 - Mina Mohammadi, Fatemeh BahraniPour, Sepehr Ebrahimi Mood, Mohammad Farshi:

Security-aware resource allocation in fog computing using a meta-heuristic algorithm. 104 - Mohamed Farhat, Salah Kamel, Almoataz Y. Abdelaziz:

Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems. 105 - Suqian Wu, Jie Liu, Bitao He, Chuan Lin, Jing Yang, Wei Wei:

An enhanced DV-hop localization algorithm based on hop distance correction and multi-strategy modified Aquila Optimizer in HWSNs. 106 - Changjong Kim, Yongseok Son, Sunggon Kim:

Investigating the effects of SQL hints on diverse storage devices through empirical analysis. 107 - Hibat Eallah Mohtadi, Abdellah Ouammou

, Mohamed Hanini, Abdelkrim Haqiq:
Resilient vehicular fog computing networks: an analytical approach to system reliability under breakdown and vacation interruptions. 108 - Gurjot Kaur, Deepti Kakkar:

A secure lightweight authentication model with interference aware routing and attack detection approach in VANET. 109 - Yue Wang, Xiaohu Zhao:

IG-PGFT: A secure and efficient intelligent grouping PBFT consensus algorithm for the Industrial Internet of Things. 110 - Soyeon Park, Hyokyung Bahn:

Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments. 111 - Nasir Ahmad Jalali

, Hongsong Chen:
Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G. 112 - Mamoru Mimura

, Kazuyuki Kurashina:
Practical evasion attack against neural network-based macro-malware detection method. 113 - Christos Chrysanthos Nikolaidis

, Pavlos S. Efraimidis:
Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management. 114 - Qinghua Ling, Wenkai Liu

, Fei Han, Jinlong Shi, Ali Aweis Hussein, Ben Sanvee Sayway:
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization. 115 - Zhendong Wang

, Biao Xie, Shuxin Yang, Dahai Li, Junling Wang, Sammy Chan:
A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things. 116 - Shweta Kushwaha

, Ravi Shankar Singh:
Deadline and budget-constrained archimedes optimization algorithm for workflow scheduling in cloud. 117 - Shudong Wang, Yanxiang Zhang, Xiao He, Nuanlai Wang, Zhi Lu, Baoyun Chen, Shanchen Pang:

Microservice deployment in cloud-edge environment using enhanced global search grey wolf optimizer-greedy algorithm. 118 - Pan Xu, Hui Gao, Yixuan Wang:

Sparse dual-weighting ensemble clustering. 119 - Yichun Yu

, Xiaoyi Yang, Zheping Chen, Yuqing Lan, Zhihuan Xing, Dan Yu:
Fedgac: optimizing generalization in personalized federated learning via adaptive initialization and strategic client selection. 120 - Junbi Xiao, Jinhai Fan, Hao Lu:

Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning. 121 - Xiangxu Meng, Wei Li, Zhihan Liu, Junze Yang, Wenqi Zheng:

HG-Net: a novel neural network with hierarchical grouped convolution for indoor fingerprint positioning. 122 - Hanqiao Huang, Bo Du, Huan Zhou, Meng Wang, Yufei Ming, Gang Hu:

A path planning method in three-dimensional complex space based on Bézier curves and a hybrid zebra optimization algorithm. 123 - Jiawen Huang, Liyan Xiong, Xiaohui Huang, Qingsen Chen, Peng Huang:

Filter pruning via annealing decaying for deep convolutional neural networks acceleration. 124 - Junbi Xiao, Yunhuan Cong, Wenjing Zhang, Wenchao Weng

:
A cellular traffic prediction method based on diffusion convolutional GRU and multi-head attention mechanism. 125 - Muhammad Asad, Safa Otoum:

Bppfl: a blockchain-based framework for privacy-preserving federated learning. 126 - Retraction Note: Real-time network virtualization based on SDN and Docker container. 127

- Oluwatayomi Rereloluwa Adegboye, Afi Kekeli Feda

:
Improved exponential distribution optimizer: enhancing global numerical optimization problem solving and optimizing machine learning paramseters. 128 - Yuchen Wang, Zhongcheng Wei, Zishan Huang, Jian Yang, Jijun Zhao:

Dependent task offloading for air-ground integrated MEC networks: a multi-agent collaboration approach. 129 - Shobhana Kashyap, Avtar Singh, Sukhpal Singh Gill:

Machine learning-centric prediction and decision based resource management in cloud computing environments. 130 - Arabinda Pradhan, Amardeep Das, Sukant Kishoro Bisoy:

Modified parallel PSO algorithm in cloud computing for performance improvement. 131 - Henry Ohiani Ohize, Adeiza James Onumanyi, Buhari Ugbede Umar, Lukman Adewale Ajao, Rabiu O. Isah, Eustace Manayi Dogo, Bello Kontagora Nuhu, Olayemi M. Olaniyi, James Garba Ambafi

, Vincent B. Sheidu, Muhammad M. Ibrahim:
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges. 132 - Yuefeng Xu

, Rui Zhong, Yang Cao
, Chao Zhang
, Jun Yu:
Symbiotic mechanism-based honey badger algorithm for continuous optimization. 133 - Lingxi Hu, Yuanyuan Hu, Linhua Jiang, Wei Long:

Federated learning client selection algorithm based on gradient similarity. 134 - Jahez Abraham Johny

, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti
:
Deep learning fusion for effective malware detection: leveraging visual features. 135 - Afnan Al-Ali, Raseena M. Haris, Younes Akbari, Moutaz Saleh, Somaya Al-Máadeed, Rajesh Kumar Muthu:

Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach. 136 - Ali Boroumand, Mirsaeid Hosseini Shirvani, Homayun Motameni:

A heuristic task scheduling algorithm in cloud computing environment: an overall cost minimization approach. 137 - Shiva Sattarpour, Ali Barati

, Hamid Barati:
EBIDS: efficient BERT-based intrusion detection system in the network and application layers of IoT. 138 - Ravindrakumar Purohit

, Jai Prakash Verma, Rachna Jain, Ashish Kumar
:
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era. 139 - Sanket Mishra, Thangellamudi Anithakumari, Rashmi Sahay

, Rajesh Kumar Shrivastava, Sachi Nandan Mohanty, Afzal Hussain Shahid:
LIRAD: lightweight tree-based approaches on resource constrained IoT devices for attack detection. 140 - Liping Zhou, Xu Liu, Ruiqing Tian, Wuqi Wang, Guowei Jin:

A multi-strategy enhanced reptile search algorithm for global optimization and engineering optimization design problems. 141 - Pallav Gupta, Swarab Raul, S. Shoba, Karthika Veeramani:

Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme. 142 - Aram Satouf, Ali Hamidoglu, Ömer Melih Gül, Alar Kuusik, Lütfiye Durak Ata, Seifedine Kadry:

Metaheuristic-based task scheduling for latency-sensitive IoT applications in edge computing. 143 - Ahmed Saidi

, Abdelouahab Amira, Omar Nouali:
Securing decentralized federated learning: cryptographic mechanisms for privacy and trust. 144 - Zhiyu Feng, Donglin Zhu, Huaiyu Guo, Jiankai Xue, Changjun Zhou:

A Jaya algorithm based on self-adaptive method for parameters identification of photovoltaic cell and module. 145 - Yashar Ghaemi, Hosam El-Ocla:

Time delay-based routing protocol using genetic algorithm in vehicular Ad Hoc networks. 146 - (Withdrawn) Internet of things and distributed security framework for 5G networks. 147

Volume 28, Number 3, June 2025
- Elham Asadi

, Soodeh Hosseini:
Worm propagation modeling considering green worm defense mechanism in complex networks. 148 - Mohamed Wajdi Ouertani

, Ghaith Manita, Amit Chhabra
, Ouajdi Korbaa
:
Chaotic quasi-opposition marine predator algorithm for automatic data clustering. 149 - Junbi Xiao, Wenjing Zhang, Wenchao Weng

, Yuhao Zhou, Yunhuan Cong:
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting. 150 - Haoyu Liu, Le Tian

, Maozu Guo:
ESDN: edge computing task scheduling strategy based on dilated convolutional neural network and quasi-newton algorithm. 151 - Maryam Shahzeidi, Mohammad Reza Mollahoseini Ardakani, Taghi Javdani Gandomani, Kamal Mirzaie, Mohammadreza Mollahoseini Ardakani:

A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt. 152 - Guilherme Diel, Ana Eloina Nascimento Kraus, Guilherme Piêgas Koslovski:

Knowledge-based job scheduling for HPC. 153 - Farah Fargo, Mitchell Diamond, Olivier Franza, Paul Foose, Jack Adiletta, Matthew Joseph Adiletta, Simon C. Steely Jr.:

Intelligent cache prefetchers in HPC architecture. 154 - Banavath Balaji Naik, Bollu Priyanka, Sarfaraj Alam Ansari:

Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach. 155 - De-gan Zhang, Shuai Li, Jie Zhang, Ting Zhang:

Novel offloading approach of computing task for internet of vehicles based on particle swarm optimization strategy. 156 - Niraj Prasad Bhatta, Fathi Amsaad:

Ml assisted techniques in power side channel analysis for trojan classification. 157 - Weida Xu

, Yang Xu, Sicong Zhang:
Sample-independent federated learning backdoor attack in speaker recognition. 158 - Said Al Afghani Edsa

, Khamron Sunat
:
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems. 159 - Mohammed A. Khasawneh

, Mustafa Daraghmeh
, Anjali Awasthi, Anjali Agarwal:
Multilevel learning for enhanced traffic congestion prediction using anomaly detection and ensemble learning. 160 - Sidharth Samal

, Rajashree Dash:
Developing a two stage optimized random vector functional link neural network based predictor model utilizing a swift crow search algorithm. 161 - Robertas Damasevicius, Nebojsa Bacanin, Anand Nayyar

:
Blockchain technology for a trustworthy social credit system: implementation and enforcement perspectives. 162 - Amir Seyyedabbasi, Gang Hu, Hisham A. Shehadeh, Xiaopeng Wang, Peren Jerfi Canatalay

:
V-shaped and S-shaped binary artificial protozoa optimizer (APO) algorithm for wrapper feature selection on biological data. 163 - Haithem Mezni, Hiba Yahyaoui, Hela Elmannai, Reem Ibrahim Alkanhel:

Personalized service recommendation in smart mobility networks. 164 - Wei Liu, Yingmeng Wang, Kaige Li, Zhao Tian

, Wei She:
Ftmoe: a federated transfer model based on mixture-of-experts for heterogeneous image classification. 165 - Hong Chen

, Jianxun Liu:
Burst load scheduling latency optimization through collaborative content caching in edge-cloud computing. 166 - Rong Zheng, Genliang Li, Ruikang Li, Yan Che, Hui Wen, Song Lu:

A new approach for fire and non-fire aerosols discrimination based on multilayer perceptron trained by modified bonobo optimizer. 167 - Javad Zarean, AmirReza Tajally, Reza Tavakkoli-Moghaddam, Reza Kia:

Robust electroencephalogram-based biometric identification against GAN-generated artificial signals using a novel end-to-end attention-based CNN-LSTM neural network. 168 - Sad-Houari Nawal, Taghezout Noria, Hadj-Sahraoui Nihad:

Expertise as a signature: continuous implicit authentication based on behavior. 169 - Senda Bouaziz, Soumaya Boukettaya

, Ahlem Nabli, Faïez Gargouri:
A formal algebra for document-oriented NoSQL data warehouses: formalisation and evaluation. 170 - Armin Choupani, Sadoon Azizi, Mohammad Sadegh Aslanpour:

Joint resource autoscaling and request scheduling for serverless edge computing. 171 - Hongming Chen, Qingli Yu, Guocai Yang, Hui Zhang, Gang Li, Qian Chen, Yonghua Li:

Compound strategy based binary willow catkin optimization for feature selection. 172 - Macilia Boukhama, Zoubeyr Farah, Lynda Alkama:

A QoS-aware IoT services composition approach based on the modified violation constraints handling technique and enhanced fireworks algorithm. 173 - Abdulvahap Kahveci

, Veysel Alcan
, Murat Uçar
, Alper Gümüstepe
, Esra Bilgin, Ismihan Sunar
, Sebnem Ataman
:
Classification of radiographic and non-radiographic axial spondylarthritis in pelvic radiography using deep convolution neural network models. 174 - Kenan Senturk

, Ahmet Faruk Gormus, Serkan Gönen
, Mehmet Ali Bariskan, Ahmet Kaan Durmaz:
Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities. 175 - Lucileide M. D. Da Silva, Pedro V. A. Alves, Sérgio N. Silva, Marcelo A. C. Fernandes:

Adaptive horizontal scaling in kubernetes clusters with ANN-based load forecasting. 176 - Tianbao Liu, Yue Li, Xiwen Qin:

Hybrid strategy improved Harris Hawks optimization algorithm for global optimization and microgrid economic scheduling problem. 177 - Daoliang He, Pingpeng Yuan:

TDS: fast answering reachability queries with hierarchical traversal trees. 178 - Wangbo Shen, Weiwei Lin, Wentai Wu, Haijie Wu, Keqin Li:

Reinforcement learning-based task scheduling for heterogeneous computing in end-edge-cloud environment. 179 - Muhammad Muneem Shabir, Kaiwen Zhang, Bertrand Reulet, Ghyslain Gagnon:

Qaas: hybrid cryptocurrency wallet-as-a-service based on Quantum RNG. 180 - Faisal Rasheed Lone, Harsh Kumar Verma:

MP-TMD: A Multidimensional Plausibility-driven Cooperative Trust Model for Multiple Misbehaviour Detection in Intelligent Transportation Systems. 181 - Lianfu Zhang, Guangwei Fang, Zuowen Tan:

FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare. 182 - Huanhuan Zou, Kai Wang:

Improved multi-strategy beluga whale optimization algorithm: a case study for multiple engineering optimization problems. 183 - Ahmed A. Ismail, Nour El-Deen Khalifa, Reda A. El-Khoribi:

A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study. 184 - Ningtao Peng, Yu Zheng, Zhikai Xiao, Guiliang Gong, Dan Huang, Xiahui Liu, Kaikai Zhu, Qiang Luo

:
Multi-objective dynamic distributed flexible job shop scheduling problem considering uncertain processing time. 185 - Meilin Zhang, Huiling Chen, Ali Asghar Heidari, Yi Chen, Zongda Wu, Zhennao Cai, Lei Liu:

WHHO: enhanced Harris hawks optimizer for feature selection in high-dimensional data. 186 - Wassim Abbessi

, Sofiane Ouni, Rabeb Ben Othmen
, Wafa Badreddine, Gilles Dequen:
Random cluster parallel PBFT global consensus for consistent blockchain distributed ledger. 187 - Saleem Malik, S. Gopal Krishna Patro

, Chandrakanta Mahanty
, Ayodele Lasisi, Osamah J. Al-sareji:
MutaSwarmClus: enhancing data clustering efficiency with mutation-enhanced swarm algorithm. 188 - Vinita Bhandiwad, Lakshmappa K. Ragha:

Enhancing the security of IOT enabled systems using light weight hybrid cryptography models. 189 - Shuwei Zhu, Wenping Wang, Wei Fang, Meiji Cui:

Critical vector based evolutionary algorithm for large-scale multi-objective optimization. 190 - Ahmed M. Tawfik

, Ayman Al-Ahwal, Adly S. Tag Eldien, Hala H. Zayed:
PriCollabAnalysis: privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation. 191 - Ravikumar Sethuraman

, Kiruthika Venkataramani, Malu Manickam Yamuna Devi, Surendran Subbaraj:
Enhancing autonomous vehicle performance with ensemble weighted support vector-based optimization in cloud. 192 - Fei Peng, Rui Zhong, Chao Zhang, Jun Yu:

Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies. 193 - Mohd Anas Wajid

, Mohammad Saif Wajid
, Aasim Zafar, Hugo Terashima-Marín:
Digital Twin technology for multimodal-based smart mobility using hybrid Co-ABC optimization based deep CNN. 194 - Ran Zhang, Xiao Chen, Maoyuan Li:

Multi-UAV cooperative task assignment based on multi-strategy improved DBO. 195 - Demetrio Deanda, Izzat Alsmadi, Jesus Guerrero, Gongbo Liang:

Defending mutation-based adversarial text perturbation: a black-box approach. 196 - Yinghui Meng, Nuo Zhu, Duan Li, Jiaofen Nan, Yongquan Xia, Ni Yao, Chuang Han

:
Stepwise discriminant analysis based optimal frequency band selection and ensemble learning for same limb MI recognition. 197 - Ashwini Pithani, Rashmi Ranjan Rout:

CFL-ATELM: an approach to detect botnet traffic by analyzing non-IID and imbalanced data in IoT-edge based 6G networks. 198 - Mohammad Faraji Mehmandar

, Mostafa Ghobaei-Arani
, Ali Shakarami:
A cost-aware IoT application deployment approach in fog computing. 199 - Rui Zhong, Shilong Zhang, Yujun Zhang, Jun Yu:

A novel adjacent matrix-based probabilistic selection mechanism for differential evolution. 200 - Abdellah Amzil, Mohamed Hanini, Abdellah Zaaloul:

Modeling and analysis of LoRa-enabled task offloading in edge computing for enhanced battery life in wearable devices. 201 - Zhaojun Zhang, Simeng Tan, Jiale Qin, Kuansheng Zou, Shengwu Zhou:

Multi-strategy ant colony optimization with k-means clustering algorithm for capacitated vehicle routing problem. 202 - Abdelkarim Ait Temghart

, Mbarek Marwan, Mohamed Baslam:
Optimization of computational offloading in the mobile edge: a game theoretic approach. 203 - Robert Antwi

, James Dzisi Gadze, Eric Tutu Tchao, Axel Sikora, Kwame Opuni-Boachie Obour Agyekum
, Henry Nunoo-Mensah, Andrew Selasi Agbemenu, Justice Owusu Agyemang
, Dominik Welte, Abdul-Rahman Ahmed, Eliel Keelson
:
Optimising peer-to-peer topology for blockchain-based industrial internet of things networks using particle swarm optimisation. 204 - Isaac D. Sánchez-García, Tomás San Feliu, José A. Calvo-Manzano:

Building a cyber risk treatment taxonomy. 205 - Abdul Razaque, Gulnara Bektemyssova, Joon Yoo, Salim Hariri, Meer Jaro Khan

, Nurgul Nalgozhina, Jaeryong Hwang, M. Ajmal Khan:
Review of malicious code detection in data mining applications: challenges, algorithms, and future direction. 206 - Guikun Wang, Bin Wen, Jingtao He, Qingbin Meng:

A new approach to reduce energy consumption in priority live migration of services based on green cloud computing. 207 - Iraq Ahmad Reshi

, Sahil Sholla:
IBF network: enhancing network privacy with IoT, blockchain, and fog computing on different consensus mechanisms. 208 - Abdulrahman K. Al-Qadhi

, Rohaya Latip, Raymond Chiong, Rukshan Athauda
, Masnida Hussin:
Independent task scheduling algorithms in fog environments from users' and service providers' perspectives: a systematic review. 209 - Subbulakshmi Pasupathi, Raushan Kumar, L. K. Pavithra:

Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security. 210 - Muhammad Asad

, Saima Shaukat, Jin Nakazato, Ehsan Javanmardi, Manabu Tsukada:
Federated learning for secure and efficient vehicular communications in open RAN. 211 - Iqra Jan, Shabir Sofi:

Fog assisted data size reduction based data management system for optimizing resources in medical IoT. 212 - Seyed-Sajad Ahmadpour, Danial Bakhshayeshi Avval, Mehdi Darbandi, Nima Jafari Navimipour, Noor Ul Ain, Sankit Ramkrishna Kassa:

A new quantum-enhanced approach to AI-driven medical imaging system. 213 - Lin Zhang, Wenqing Zhang, Zhenghao Xu:

Automatic liver tumor segmentation based on improved Yolo-v5 and B-spline level set. 214 - Fengtao Wei, Yue Feng, Xin Shi, Kai Hou:

Improved sparrow search algorithm with adaptive multi-strategy hierarchical mechanism for global optimization and engineering problems. 215 - Benyamin Abdollahzadeh, Hatef Javadi, Oguz Toragay, Nicola Epicoco, Nima Khodadadi:

Correction: The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm. 216 - Retraction Note: Internet of things and distributed security framework for 5G networks. 217

Volume 28, Number 4, August 2025
- Kadda Benyahia, Abdelkader Khobzaoui

, Samir Benbakreti:
Hybrid image encryption: leveraging DNA sequencing and Lorenz chaotic dynamics for enhanced security. 218 - Kamir Kharoubi, Sarra Cherbal, Djamila Mechta, Amjad Gawanmeh:

Network Intrusion Detection System Using Convolutional Neural Networks: NIDS-DL-CNN for IoT Security. 219 - Hossein Abbasimehr

, Ali Noshad
:
Big time series data forecasting based on deep autoencoding and clustering. 220 - Indu Dohare, Karan Singh, Tayyab Khan, Yogendra Mohan, Intyaz Alam:

Coati optimization algorithm for node localization in sensor enabled-IoT. 221 - Xiaole Li, Jinwei Tian, Cuiping Wang, Yinghui Jiang, Xing Wang, Jiuru Wang:

Multi-objective multicast optimization with deep reinforcement learning. 222 - Yatao Yang, Ruoyan Zhao, Fangrui Yin, Ke Wang:

K-PAKE: post quantum password authentication key exchange protocol for satellite networks. 223 - Hong Huang, Weitao Huang

, Yinghang Zhou, Wengang Luo, Yunfei Wang:
FEdroid: a lightweight and interpretable machine learning-based android malware detection system. 224 - Abdul Mazid

, Sheeraz Kirmani, Manaullah, Vijayant Pawar:
A secure and efficient framework for internet of medical things through blockchain driven customized federated learning. 225 - Abdolmanan Babaei Goushlavandani, Peyman Bayat, Gholamhossein Ekbatanifard:

Detecting attacks on the internet of things network in the computing fog layer with an embedded learning approach based on clustering and blockchain. 226 - Saeed Shokrollahi, Mahtab Dehghan:

CTVAN: a cooperation-based RSU-assisted trust management model for reliable communication in VANETs. 227 - Yanyan Xu, Bingqi Wang, Shaoming Pan, Shihe Chen:

Intelligent multipath congestion control algorithm based on subflow coupling perception. 228 - Yuting Yuan, Yuelin Gao:

An adaptive hybrid differential Grey Wolf Optimization algorithm for WSN coverage. 229 - Surbhi, Nuparam Chauhan

, Neeraj Dahiya:
Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT). 230 - Shashi Raj, Dharavath Ramesh

, Prabhakar Gantela:
CrossFIM: a spark-based hybrid frequent itemset mining algorithm for large datasets. 231 - Yongqi Chen, Xianwen Fang

, Huijing Hao
, Daoyu Kan:
A probabilistic optimization-based event-correlated log repair method using data constraints. 232 - Supriya Kumari Prasad, Young-Bae Ko:

Model-contrastive federated learning entrenched UWB bi-direction localization through dynamic hexagonal grid construction in indoor WSN environment. 233 - Muqadar Ali, Hongjie He, Abid Hussain, Mehboob Hussain, Yuan Yuan:

TMABKS: a traceable multi authority attribute-based Boolean keywords search authorization for e-health records in cloud. 234 - Gokapay Dilip Kumar, Sachi Nandan Mohanty:

Precise brain tumor classification from MRI images with hybrid recurrent neural network-bidirectional LSTM and humming bird optimization. 235 - Zhengfeng Li, Wengpeng Gu, Huichao Shang, Guohui Zhang, Gaofeng Zhou:

Research on dynamic job shop scheduling problem with AGV based on DQN. 236 - Hisham A. Kholidy:

Dynamic network slicing orchestration in open 5G networks using multi-criteria decision making and secure federated learning techniques. 237 - Amjad Alsirhani

, Noshina Tariq, Mamoona Humayun, Ghadah Alwakid, Hassan Sanaullah:
Intrusion detection in smart grids using artificial intelligence-based ensemble modelling. 238 - Mingli Song, Xinyu Zhao, Witold Pedrycz:

A robust federated biased learning algorithm for time series forecasting. 239 - Saurabh Gupta, Rajendra Prasad Mahapatra:

Hyex-net: hybrid efficient Xception network for human activity recognition using multimodalities. 240 - Maryam Hassanali, Mohammadreza Soltanaghaei, Taghi Javdani Gandomani, Farsad Zamani Boroujeni:

Exploring stacking methods for software effort estimation with hyperparameter tuning. 241 - Xin-Ru Ma, Jie-Sheng Wang, Yong-Cheng Sun, Yi-Xuan Li, Si-Wen Zhang, Shi-Hui Zhang:

Victoria Amazonica optimization algorithm based on adaptive mutation factor and mathematical distribution for solving minimum spanning tree problem. 242 - Mohamed H. Hassan

, Salah Kamel:
A hybrid approach based on tuna swarm and equilibrium optimizers for parameter estimation of different PV models. 243 - Shi-Hui Zhang, Jie-Sheng Wang, Si-Wen Zhang, Yu-Xuan Xing, Xiao-Tian Wang, Xiao-Fei Sui:

MOSO: multi-objective snake optimizer with density estimation and grid indexing mechanism for edge computing task offloading and scheduling optimization. 244 - Khalid Anwar

, Mohammed Wasid, Aasim Zafar, Arshad Iqbal:
An efficient framework to combat multidimensionality in multi-criteria recommender systems. 245 - Heming Jia

, Xuelian Zhou, Jinrui Zhang, Seyedali Mirjalili:
Superb Fairy-wren Optimization Algorithm: a novel metaheuristic algorithm for solving feature selection problems. 246 - Runxia Guo, Jingxu Yi:

Improved Aquila optimizer and its applications. 247 - Saif Ur Rehman Khan

, Ming Zhao, Yangfan Li:
Detection of MRI brain tumor using residual skip block based modified MobileNet model. 248 - Srikanth Bethu, Erukala Suresh Babu:

Blockchain-enhanced secure guard: a deep Q network framework for robust IoT surveillance person detection. 249 - Ah. E. Hegazy, B. Hafiz, M. A. Makhlouf, Omar A. M. Salem:

Optimizing medical data classification: integrating hybrid fuzzy joint mutual information with binary Cheetah optimizer algorithm. 250 - Saima Farhan, Jovaria Mubashir, Yasin Ul Haq, Tariq Mahmood

, Amjad Rehman:
Enhancing network security: an intrusion detection system using residual network-based convolutional neural network. 251 - HaoJi Xia, Jinyan Cao:

An energy-aware technique for solving the offloading problem of mobile internet of things using an enhanced neural network-based optimization algorithm. 252 - Ali Toufanzadeh Mozhdehi, Nima Khodadadi, Mohaddeseh Aboutalebi, El-Sayed M. El-Kenawy, Abdelazim G. Hussien, Weiguo Zhao

, Mohammad H. Nadimi-Shahraki, Seyedali Mirjalili:
Divine Religions Algorithm: a novel social-inspired metaheuristic algorithm for engineering and continuous optimization problems. 253 - Siamak Solat:

Parallel Committees: a scalable, secure, and fault-tolerant distributed NoSQL database architecture. 254 - Arshad Khan

, Alan T. Litchfield, Abdulatif Alabdulatif, Faheem Khan:
BlockPres IPFS: performance evaluation of blockchain based secure patients prescription record storage using IPFS for smart prescription management system. 255 - Irshad Ullah, Xiaoheng Deng, Xinjun Pei, Husnain Mushtaq

, Zia Khan:
Securing internet of vehicles: a blockchain-based federated learning approach for enhanced intrusion detection. 256 - Qusay M. Alzubi

, Yousef K. Sanjalawe, Sharif Naser Makhadmeh, Hussam N. Fakhouri
:
An enhanced method for intrusion detection systems in IoT environment. 257 - Andrea Rossi, Andrea Visentin

, Diego Carraro, Steven D. Prestwich, Kenneth N. Brown:
Forecasting workload in cloud computing: towards uncertainty-aware predictions and transfer learning. 258 - Selcuk Aslan, Tevfik Erkin:

DUALIPA: a new immune plasma algorithm for path planning of unmanned aerial vehicles. 259 - Mohamed Fazil Hussain, Salwa Sayeedul Hasan, Hasan Rauf:

Cloud security modeling: using TCP deltas with data analytics and machine learning techniques. 260 - Binrong Liao, Yongkuan Yang, Jianlong Xu, Xiangsong Kong

, Jun Su:
A constrained multi-objective evolutionary algorithm with tri-populations assisted by an additional objective function. 261 - Mantosh Kumar

, Kumari Namrata, Akshit Samadhiya:
Deep learning assisted optimal dispatch for renewable-based energy system considering consumer incentive scheme. 262 - Zhilin Liao, Zengtong Lu, Xinyu Cai:

MEARO: A multi-strategy enhanced artificial rabbits optimization for global optimization problems. 263 - Xin Luo, Yage Yuan, Youfa Fu, Haisong Huang, Jianan Wei:

A multi-strategy improved Coati optimization algorithm for solving global optimization problems. 264 - Mohammad Hossein Khalifeh, Mehdi Taghizadeh, Mohammad Mehdi Ghanbarian, Jasem Jamali:

A new hybrid framework for medical image retrieval and compression using neural networks. 265 - Shubhkirti Sharma, Vijay Kumar:

Grid-based multi-objective cheetah optimization for engineering applications. 266 - Parul Punia, Amit Raj, Pawan Kumar:

Enhanced zebra optimization algorithm for reliability redundancy allocation and engineering optimization problems. 267 - Guangming Gong, Shengwei Fu, Haisong Huang, Hefan Huang, Xin Luo:

Multi-strategy improved snake optimizer based on adaptive lévy flight and dual-lens fusion. 268 - Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi:

An efficient task scheduling algorithm leveraging fuzzy quantum atom search optimizer with innovative migration for cloud computing. 269 - Hemant Ramdas Kumbhar, S. Srinivasa Rao:

Chronological Drawer puzzle algorithm based multi-key generation and Lenet Kronecker network enabled privacy protected data classification. 270 - Yu Liu, Qicheng Liu:

SMOTE oversampling algorithm based on generative adversarial network. 271 - Osama I. Salameh, Sabine Wittevrongel:

An analytical model of a cluster-based service system with application to a cloud environment. 272 - Ivson Borges, Ermeson C. Andrade, Francisco Airton Silva, Gustavo Callou:

Availability evaluation of a video surveillance system with distributed storage. 273 - Mingwei Cao, Yindong Dong, Deli Chen, Guodong Wu, Gaojian Xu, Jun Zhang:

EEG-based emotion recognition model using fuzzy adjacency matrix combined with convolutional multi-head graph attention mechanism. 274 - Israel Araújo, Vandirleya Barbosa, Luiz Nelson Lima, Luis Guilherme Silva, Carlos Brito, Iure Fé, Lucas A. Lopes, Ermeson C. Andrade, Érico Leão, Francisco Airton Silva:

Assessing the performance of a fault tolerant LoRaWAN architecture with a focus on the sensor layer and data retransmission strategy. 275 - Guiling Long, Shaorong Wang, Cong Lv:

QoS-aware resource management in cloud computing based on fuzzy meta-heuristic method. 276 - Bisma Gulzar, Shabir A. Sofi, Sahil Sholla:

Convergence of personal internet of things into social internet of things. 277 - Banavath Balaji Naik, Bollu Priyanka, Md. Sarfaraj Alam Ansari:

Correction: Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach. 278 - Maryam Shahzeidi, Mohammad Reza Mollahoseini Ardakani

, Taghi Javdani Gandomani, Kamal Mirzaie:
Correction: A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt. 279 - Seyed-Sajad Ahmadpour, Danial Bakhshayeshi Avval, Mehdi Darbandi, Nima Jafari Navimipour, Noor Ul Ain, Sankit Ramkrishna Kassa:

Correction: A new quantum-enhanced approach to AI-driven medical imaging system. 280
Volume 28, Number 5, October 2025
- Yan Du, Zhiming Ding, Zhi Cai, Yuanying Chi:

Join query optimization in distributed database based on multi-source mating selection evolutionary algorithm. 281 - Arjun Singh Rawat

, Maroti Deshmukh, Maheep Singh:
Visually enhanced multi-secret sharing scheme with arithmetic modulo, DWT, and particle swarm optimization for Meaningful Shares. 282 - Lintao Hu, Zhao-Min Chen, Huiling Chen, Ruoxi Deng, Jie Hu:

Hierarchical style transfer for enhancing feature diversity in long-tailed visual recognition. 283 - Vijaita Kashyap, Rakesh Ahuja, Ashok Kumar:

Predictive analysis-based load balancing and fault tolerance in fog computing environment. 284 - Rui Zhong, Yang Cao

, Essam H. Houssein, Jun Yu, Masaharu Munetomo:
SFE-EANDS: a simple, normalized distance-based selectionfast, and efficient algorithm with external archive and normalized distance-based selection for high-dimensional feature selection. 285 - Afef Walha, Hana Mallek, Faiza Ghozzi, Faïez Gargouri:

Tweets opinion analysis integration: ETL modeling with MapReduce. 286 - Mahsa Mohammadi, Mohsen Ramezani, Fardin Akhlaghian Tab, Fardin Ahmadizar:

Combining evolutionary and swarm algorithms in a hybrid subspace-wise search strategy for feature selection. 287 - SeokHee Kim, Changhee Hahn

:
DOBEL: detecting backdoors in ensemble learning. 288 - Xuewen Li, Liangyan Chen, Tong Huang, An Yang, Weihua Liu:

YOLO-edge: real-time vehicle detection for edge devices. 289 - Jianlin Liu, Haisong Huang, Qingsong Fan

, Chi Ma:
A multi-strategy enhanced moth-flame optimization algorithm for complex inverse kinematics problems in series robots. 290 - Zhixiang Zhao, Yanxia Wu, Guoyin Zhang, Yiqing Yang, Haibo Liu:

Block strategy and adaptive storage for sparse matrix-vector multiplication on GPU. 291 - Malik Braik, Heba Al-Hiary:

Rüppell's fox optimizer: A novel meta-heuristic approach for solving global optimization problems. 292 - Saloua Hendaoui, Nawel Zangar:

Improved SDN-hybrid satellite-terrestrial architecture integrating intelligent fine-grained traffic slicing. 293 - Priyanka Patil, Vaibhav S. Hendre:

Modified archimedes optimization algorithm-based resources allocation in multicell D2D communications. 294 - Qiuxian Chen, Yizheng Tao:

Mdsd: a multi-dimensional scaling-based defensive mechanism against backdoor attacks on federated learning. 295 - Heng Zhang, Wei Fu, Xiaoming Wang, Dong Li, Danchen Zhu, Xingwang Su:

An improved and lightweight small-scale foreign object debris detection model. 296 - Pham Vu Hong Son

, Luu Ngoc Quynh Khoi
:
Balancing the trade-off between quad-factors in construction management: a opposition-based Giant Pacific Octopus optimizer method. 297 - Mohd Rafi Lone:

A high-throughput unified transform architecture for Versatile Video Coding. 298 - Mohamed H. Hassan

, Salah Kamel, Ehab Mahmoud Mohamed:
Accurate modeling of various proton exchange membrane fuel cell models using an effective algorithm based on artificial gorilla troops optimizer. 299 - Heba Youssef, Salah Kamel, Mohamed H. Hassan

, Ehab Mahmoud Mohamed, Souhil Mouassa:
Cost-efficient smart home energy management with hybrid quadratic interpolation tuna swarm optimization. 300 - Haythem Bany Salameh, Yaser Jararweh:

Efficient charging station deployment in unmanned aerial vehicle systems for enhanced mission efficiency. 301 - Amjad Hudaib, Nadim Obeid, Amjad Albashayreh, Hebah Mosleh

, Yahya M. Tashtoush
, Georgi Hristov:
Exploring the implementation of federated learning in healthcare: a comprehensive review. 302 - Rahul Haripriya

, Nilay Khare, Manish Pandey
, Sreemoyee Biswas:
Navigating the fusion of federated learning and big data: a systematic review for the AI landscape. 303 - Junjie Liao, Syam Melethil Sethumadhavan, Rui Ke, Zheng-Ming Gao, Juan Zhao:

A leaded sine-cosine artificial protozoa optimizer algorithm for solving multi-objective optimization problems. 304 - Hamza Elhaou

, Youssef Oukissou, Driss Ait Omar
, Hicham Zougagh:
Machine learning for user mobility management in a mobile fog computing environment. 305 - Anmol Kumar

, Mayank Agarwal:
A multi-level DDoS defense mechanism in container based cloud environment. 306 - Mounira Tarhouni, Ibrahim Aloui:

Towards smart home automation based on containerization. 307 - Muhammad Bilal, Rongfei Zeng, Owais Muhammad, Muhammad Adil, Shifa Shoukat:

A cyber-resilient and explainable intrusion detection system for Internet of Things networks. 308 - Ruisheng Li, Huimin Shen, Qilong Zhang, Huimin Duan:

An edge-enhanced graphSAGE-based intrusion detection model for the internet of things. 309 - Munir Hussain, Amjad Mehmood, Muhammad Altaf Khan

, Huihui Wang, Houbing Herbert Song, Carsten Maple:
ReCaLS-in-DLT: resilient consensus algorithm for leader selection in distributed ledger technology. 310 - Dusan Morhác, Kristián Kostál, Viktor Valastín, Ivan Kotuliak:

Unispell: universal adapter for interoperability in Polkadot Paraverse. 311 - Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan

, Insaf Ullah:
Provably secure multilayers certificateless proxy signature for industrial internet of things. 312 - Neha Sharma

, Pankaj Dhiman
:
A survey on IoT security: challenges and their solutions using machine learning and blockchain technology. 313 - Jiaxing Zhou, Youxin Yao, Xiang Chen, Hanlin Guo, Qing Li, Zhao Deng:

Triplet relationship guided density clustering for feature matching with a large number of outliers. 314 - Shadi AlZu'bi, Tarek Kanan, Mohammed W. Elbes, Ghassan Kanaan, Issam Trrad:

Energy-efficient edge deployment of generative AI models using federated learning. 315 - Abeer Ayoub

, Walid El-Shafai
, Fathi E. Abd El-Samie
, Ehab K. I. Hamad
, El-Sayed M. El-Rabaie:
High quality dehazed image and video based on enhanced multi-scale guided filtering dehazing technique. 316 - Junlei Dong, Haichang Jiang, Zaihui Cao:

Maximizing penetration in complex networks via the discretization of a new continuous meta-heuristic algorithm. 317 - Vinolia Alexander Moudiappa, Kanya Nataraj, Veeramalai Natarajan Rajavarman:

An advanced attack categorization in NIDS using enhanced deep learning based EOptResfEANet methodology with hybrid feature extraction. 318 - Yue Liu, Jiale Zhang, Shimiao Liu, Linjun Xu, Yafei Wang:

Aams-yolo: a small object detection method for UAV capture scenes based on YOLOv7. 319 - Wenjie Wang, Boqin Zhang, Zhao Liu, Ping Zhu:

Diversity-enhanced adaptive golden jackal optimization based on multi-strategy and its engineering applications. 320 - Chengtian Ouyang, Xin Liu, Donglin Zhu, Yehong Li

, Jihong Mao, Changjun Zhou, Jiankai Xue:
Hierarchical adaptive cuckoo search algorithm for global optimization. 321 - Bin Zhuge, Xiaodan Cai, Zitian Zhang, Qianye Ren, Ligang Dong, Xian Jiang, Yueqian Xu, Lingrong Lu:

Service function chain mapping method based on delay guarantee. 322 - Seyedehraziyeh Khastar, Farahnaz Bashirizadeh, Jafar Jafari-Asl, Naser Safaeian Hamzehkolaei:

Predicting the cooling and heating loads of energy efficient buildings: a hybrid machine learning approach. 323 - Pham Vu Hong Son

, Luu Ngoc Quynh Khoi
:
Multi-objective giant Pacific octopus optimizer. 324 - Wassim Alexan, Khalid M. Hosny

, Mohamed Gabr:
A new fast multiple color image encryption algorithm. 325 - Guangfu Chen, Bin Xie, Xiaofei Li, Jizhi Zhao:

Pairwisely constrained symmetric non-negative matrix factorization for link prediction in complex networks using degree-related clustering coefficient and improved closeness centrality. 326 - Yifan Sui, Meng Cai, Jianxun Li:

GuardGrid: a high-availability cloud platform for deep learning applications. 327 - Arman Foroughi, Jaime Lloret, José Miguel Jiménez, Sandra Sendra:

An edge computing wireless sensor network for diagnosing orange fruit disease. 328 - Wei Wang, Yinan Lu, Shengsheng Wang:

A multi-strategy enhanced circle search algorithm based on adaptive evolutionary framework and its application in image segmentation. 329 - Mokhtar Sellami, Haithem Mezni, Hela Elmannai, Reem Alkanhel:

Drone-as-a-Service: proximity-aware composition of UAV-based delivery services. 330 - Dandugudum Mahesh, Sampath Kumar Tallapally:

Advanced SDN-based network security: an ensemble optimized deep learning-based framework for mitigating DDoS attacks with intrusion detection. 331 - Heba Youssef, Salah Kamel, Mohamed H. Hassan:

Smart home energy management with long-term memory artificial rabbit algorithm for cost and load optimization. 332 - Sarada Mohapatra, Priteesha Sarangi

, Prabhujit Mohapatra:
A novel reward-based golden jackal optimization algorithm uses mix-weighted dynamic and random opposition learning to solve optimization problems. 333 - Oluwatayomi Rereloluwa Adegboye, Afi Kekeli Feda

, Abosede Omowunmi Tibetan, Ephraim Bonah Agyekum:
Enhanced global optimization using quadratically interpolated hybrid pathfinder algorithm. 334 - Mohannad Z. Naser, Ahmad Z. Naser:

SPINEX-clustering: similarity-based predictions with explainable neighbors exploration for clustering problems. 335 - Surjit Singh

, Aman Arora, Girik Garg, Anushka Goyal, Nipun Gandhi:
Performance analysis of blockchain-based secured distributed deep federated learning for wearable internet of things. 336 - Ghazi Mergani Ahmead Ali, Hongsong Chen

:
MLFuzzer: a fuzzing approach based on generative adversarial networks and BiLSTM for detecting vulnerabilities in smart contracts. 337 - Rachit Jain

, Vandana Vikas Thakare, Pramod Kumar Singhal:
Design and analysis of UWB antenna using machine learning for next-generation communications. 338 - Zeqing Wan, Wei Wu:

A robust approach to deformed pedestrian tracking with multi-trajectory prediction. 339 - Muhammad Zohaib, Nima Jafari Navimipour, Mehmet Timur Aydemir, Seyed-Sajad Ahmadpour:

A nano-scale design of arithmetic and logic unit for energy-efficient signal processing devices based on a quantum-based technology. 340 - Abdallah Aldosary, Walid El-Shafai, Ehab Mahmoud Mohamed, Heba M. Emara:

Enhancing PCOS diagnosis accuracy with modified Giza Pyramids Optimizer, SLOGPO, and PCOSNet: advanced classification and optimization techniques. 341 - Saurabh Vaidya, Gordhan Jethava:

Elevating manufacturing excellence with multilevel optimization in smart factory cloud computing using hybrid model. 342 - Usman Ahmed

, Jiangbin Zheng, Sheharyar Khan
, Muhammad Tariq Sadiq:
HCIVAD: Explainable hybrid voting classifier for network intrusion detection systems. 343 - John Owoicho Odeh

, Xiaolong Yang
, Oluwarotimi Williams Samuel, Sahraoui Dhelim
, Cosmas Ifeanyi Nwakanma
:
A secure federated learning privacy method for industrial IoT edge networks. 344 - Ali Toufanzadeh Mozhdehi, Nima Khodadadi, Mohaddeseh Aboutalebi, El-Sayed M. El-Kenawy, Abdelazim G. Hussien, Weiguo Zhao

, Mohammad H. Nadimi-Shahraki, Seyed Mohammad Mirjalili:
Correction: Divine Religions algorithm: a novel social-inspired metaheuristic algorithm for engineering and continuous optimization problems. 345 - Thien Van Luong, Van-Cuong Pham, Thi Thanh Huyen Le, Xuan-Nam Tran:

Robust intrusion detection for unmanned aerial vehicles: a PCA-based feature extraction and ensemble learning approach. 346
Volume 28, Number 6, October 2025
- Ashfaq Ahmad Najar, S. Manohar Naik

, Faisal Rasheed Lone, Azra Nazir:
A novel CNN-enhanced detection and mitigation of DDoS attacks in SDN. 347 - HaoLang Huang, Xiongwen Pang, ChunYa Zou, Xiangru Li, Jun Ai:

Multi-stage BiLinear self-attention network for multi-sensor industrial time series classification. 348 - Amin Karami, Fahimeh Jafari:

Leveraging big data characteristics for enhanced healthcare fraud detection. 349 - Majid Abdulsatar, Hussain Ahmad

, Diksha Goel, Faheem Ullah:
Towards deep learning enabled cybersecurity risk assessment for microservice architectures. 350 - Qikai Wei, Mingzhi Yang, Jinqiang Wang

, Wenwei Mao, Jiabo Xu, Huansheng Ning:
CTourLLM: enhancing LLMs with Chinese tourism knowledge. 351 - Jiqun Zhang

, Zihan Wang:
A data trading platform based on Ethereum and IPFS. 352 - Ammar Odeh, Anas Abu Taleb, Tareq AlHajahjeh, Francisco Navarro:

Advanced memory forensics for malware classification with deep learning algorithms. 353 - Asuman Günay Yilmaz

, Eyüp Gedikli, Sefa Aras, Hamdi Tolga Kahraman:
A comprehensive analytical study on meta-heuristic based optimal thresholding using two-stage multi-level image segmentation (TSMIS) approach. 354 - Priyanka Ashok Birajdar, Divya Meena, Anurag Satpathy, Sourav Kanti Addya:

DCRDA: deadline-constrained function scheduling in serverless-cloud platform. 355 - Chinnakka Sudha, Sreenivasulu Bolla:

Intelligent intrusion forecasting framework for distributed environment using federated learning. 356 - Kadhim Hayawi, Junaid Sajid

, Asad Waqar Malik, Zouheir Trabelsi:
Revolutionizing electric robot charging infrastructure through federated transfer learning and data route optimization. 357 - Srinivas Babu Gottipati, Thumbur Gowri:

A unified hybrid framework for accurate and early brain tumor diagnosis through MRI analysis. 358 - Mohammed GH. I. A. L. Zamil, Samer M. J. Samarah:

Privacy preserving activity recognition framework for high performance smart systems. 359 - Hossein Zehtab Azari, Saeed Jalili:

Energy-aware self-adaptive real-time job scheduling in a cloud environment using deep reinforcement learning focused on quality of service. 360 - Houssem Eddine Mohamadi, Laaziz Lahlou

, Abdelouahed Gherbi, Nadjia Kara:
Seraph: a stochastic operational approach for the deployment of multi-antenna UAV-assisted networks. 361 - Ali Rodan

, Abdel Karim Al Tamimi
, Loai M. Alnemer, Seyedali Mirjalili
:
Stellar oscillation optimizer: a nature-inspired metaheuristic optimization algorithm. 362 - Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo:

Tracking top-k structural hole spanners in dynamic networks. 363 - Lydia Douaidi

, Sidi-Mohammed Senouci
, Inès El Korbi, Fouzi Harrou, Ahmet Yazici:
Federated deep learning for enhanced prediction of electric vehicle charging station availability. 364 - Aihua Yu, Yisong Wang, Panfeng Chen, Qi Wang, Hui Li, Xibin Wang, Xin Zhou, Guojun Chen, Xingzhi Deng:

Mutural and deep features driven recommender system. 365 - Mikel Cortes-Goicoechea, Tarun Mohandas-Daryanani, Jose Luis Muñoz-Tapia

, Leonardo Bautista-Gomez:
The impact of connectivity and software in Ethereum validator performance. 366 - Madhu Sharma, Priyanka Chawla:

An image encryption algorithm using a XOR enhanced 2D-Henon map. 367 - Ahmet Akkaya, Cemil Közkurt:

An effective approach for adaptive operator selection and comparison for PSO algorithm. 368 - K. Ghamya, K. Reddy Madhavi

:
Internet of medical things-based ECG monitoring for arrhythmia classification utilizing metaheuristic optimization with ensemble deep learning model. 369 - Sumbal Maqsood

, Shuxiang Xu, Matthew Springer, Rami Mohawesh, Haythem Bany Salameh, Shivangi Gheewala:
Temporal attention to estimate continuous blood pressure using photoplethysmography signals. 370 - Tariq Ahamed Ahanger, Munish Bhatia, Abdulrahman Alabduljabbar, Abdullah Albanyan, Imdad Ullah:

A hybrid framework for malware determination: generative pre-trained transformer-inspired approach. 371 - Nour El Houda Sayah Ben Aissa, Chaker Abdelaziz Kerrache, Ahmed Korichi, Abderrahmane Lakas, Enrique Hernández-Orallo, Carlos T. Calafate:

Adversarial resilience in EEG-based BCI systems: a two-tiered approach using GANs and transfer learning. 372 - Manal Ayadi, Atta Ur Rahman, Amel Ksisbi, Fatimah Alhayan, Salam Ullah Khan:

Improving M-Health applications recommendation using fine-tune graph neural networks. 373 - Nguyen Thi My Binh, Ho Viet Duc Luong

, Mai Dang Quan Anh, Khanh-Duy Le:
An efficient discretization and transformation scheme for maximizing secure lifetime problem in heterogeneous wireless rotatable camera sensor networks with barrier coverage. 374 - Ganesan Nagabushnam

, Yundo Choi
, Kyong Hoon Kim
:
Energizing the fog: a systematic survey on task scheduling strategies for energy optimization. 375 - Jian Zhu, Sanmin Liu, Subin Huang, Ping Zhang, Xinquan Chen, Tuyi Zhang, Wentao Yu, Guoyi Zhang:

Transfer learning method based on cluster for drifting data stream classification. 376 - Osama Drogham, Mohammad Hashem Ryalat, Nijad Al-Najdawi

, Rami S. Alkhawaldeh, Jamil Alshaqsi, Mohammed Azmi Al-Betar:
Dynamic colormap visualization integrated with Harris hawks optimization for enhanced lung CT segmentation and diagnostic precision. 377 - Faris A. Almalki, Marios C. Angelides:

Integrating machine learning with a positioning mechanism for managing interference and power consumption in a multilayer fleet of unmanned aerial platforms. 378 - Tareq M. Shami, Qasem Al-Tashi, Nima Khodadadi, Said Jadid Abdulkadir, Abdulaziz Ahmed, Seyedali Mirjalili:

Dimension selection: an innovative metaheuristic strategy for particle swarm optimization. 379 - Yang Li, Hong He, Xiaohong Li:

Software defect detection via deep convolutional RBM network and kernel enhanced dragonfly PCA approach. 380 - Mohammad Reza Pour-Hosseini, Mahdi Abbasi, Atefeh Salimi, Erik Elmroth, Hassan Haghighi, Parham Moradi, Bahman Javadi:

Tiny machine learning models for autonomous workload distribution across cloud-edge computing continuum. 381 - Samiulla Itoo, Vinod Kumar, Musheer Ahmad:

A secure and energy-efficient authentication framework for the internet of electric things. 382 - Pablo Vazquez Caderno, Feras M. Awaysheh, Jose C. Cabaleiro, Tomás F. Pena:

BigOPERA: An OPportunistic and Elastic Resource Allocation for big data frameworks. 383 - Abhishek Narwaria

, Arka Prokash Mazumdar:
SD-MoMa: ANN-based mobility prediction and adaptive handover management in SDWSN. 384 - Ganesan Nagabushnam

, Kyong Hoon Kim:
Faddeer: a deep multi-agent reinforcement learning-based scheduling algorithm for aperiodic tasks in heterogeneous fog computing networks. 385 - Bonnie Yam, Ruochen Zhao, Maher Elshakankiri

:
Aqua garbage collector: utilizing AI and IoT for efficient underwater garbage classification. 386 - Xiaohua Wu, Tingbo Zhang, Lei Chen, Zirui Wang:

Privacy-preserving cross-chain asset transfers using notary schemes and zero-knowledge proofs. 387 - Xuncai Zhang, Heng Zhang:

A novel image encryption scheme using both pixel-level and bit-level permutations with an improved hyperchaotic system. 388 - Muhammad Umair Safdar, Tariq Shah, Asif Ali:

The class of bivariate non-chain rings and its application to data security. 389 - Fatima Shibli, Burak Tufekci, Cihan Tunc, Renée C. Bryce:

Streamlined internet of drone things (IoDT) simulator. 390 - Debao Wang

, Shaopeng Guan
, Ruikang Sun:
Wafl-tscs: an effective strategy to reduce communication costs in federated learning. 391 - Eleonora Stadtmüller Caballero, Jaren Ramirez, Sai Vamsi Alisetti, Shanelle Almario, Pradeeban Kathiravelu:

Network measurements for telehealth optimizations understanding internet paths in remote regions. 392 - Ilyasse Aboussaleh, Jamal Riffi, Khalid El Fazazy, Mohamed Adnane Mahraz, Hamid Tairi:

3D-SELTML: stacking ensemble learning based on transformer meta-learner for 3D brain tumor segmentation. 393 - Shveta Verma Bansal, Anju Bala:

FEAST: Fog enabled auto-scaling technique for IoT-based cloud application. 394 - Hoang-Hai Huynh, Xuan-Ha Nguyen, Xuan-Duong Nguyen, Kim-Hung Le:

Bigsids: an efficient SDN-based network intrusion detection systems for big data environments. 395 - Li Zhao, Zhenhua Lin, Hongfei Shao, Wei Zheng, Shihong Zhang, Yongjie Wang, Qinghua Li:

Improved task scheduling and load balancing in fog computing infrastructure using hybrid evolutionary method. 396 - Hui Xiong, Chenyang Yao, Jinzhen Liu, Xiuzhi Shi:

Improved multi-objective gray wolf optimization for task allocation in multi-UAV heterogeneous targets reconnaissance. 397 - Subhash Yadav, Shubham Shukla, Ritu Tiwari, Mahendra Pratap Yadav:

Path planning for mobile robots with waypoint management using a hybrid nature inspired optimization algorithm. 398 - Debjani Mallick, Ashok Kumar Das, Uma Sankararao Varri, Youngho Park:

Public key-based search on encrypted data using blockchain and non-blockchain enabled cloud storage: a comprehensive survey, analysis and future research scopes. 399 - Jiagao Wu, Hongyan Ji, Jing Yi, Linfeng Liu:

Optimizing Client Selection in Federated Learning Base on Genetic Algorithm. 400 - Yingcang Ma, Jinlin Zou, Xiaofei Yang, Zhiwei Xing, Yongmei Deng:

Multi-view unsupervised feature selection based on consensus indicator graph learning with adaptive similarity. 401 - Krishna Gopal Dhal, Arunita Das, Swarnajit Ray:

Morphologically reconstructed 2-D histogram with opposition learning based optimization approach for multi-level thresholding. 402 - Rabaie Benameur

, Amine Dahane:
Sfedrl-ids: secure federated deep reinforcement learning-based intrusion detection system for agricultural internet of things. 403 - Fadi Barbàra, Mirko Zichichi, Stefano Ferretti, Claudio Schifanella:

DLT-based personal data access control with key-redistribution. 404 - Alia Nabil Mahmoud, Vítor Santos

, Mário M. Freire, Ahmed Abdelaziz:
Enhancing software defect prediction with a hybrid convolutional neural network and antlion optimization model. 405 - Aihua Wu, Chunyang Hua:

ALB-Chain: achieving scalability and load balance blockchain sharding. 406 - John Owoicho Odeh

, Xiaolong Yang
, Oluwarotimi Williams Samuel, Sahraoui Dhelim
, Cosmas Ifeanyi Nwakanma
:
Systematic investigation of privacy preservation techniques for industrial IoT-enabled critical edge network Infrastructure. 407 - Shaha T. Al-Otaibi

, Sarra Ayouni
, Nadeem Sarwar
, Asma Irshad
, Faizan Ullah
:
AI-driven security framework for medical sensor networks: enhancing privacy and trust in smart healthcare systems. 408 - Kanchan Namdev, Ranjit Rajak:

Enhancing heuristic workflow scheduling algorithms using Q-learning technique in cloud computing. 409 - Zhendong Wang, Jiaqi Bao, Zhiyuan Zeng, Sammy Chan:

Application of dual-channel high-order graph neural network for intrusion detection with semisupervised learning. 410 - Maroua Abdelhafidh, Adel Ben Mnaouer

:
A novel communication resources-aware consensus algorithm for blockchain-based key management scheme to secure clustered FANETs. 411 - Kapil Kumar, Manju Khari:

Intrusion detection system based on federated learning using layer-based privacy obfuscation. 413 - Shefaa Alzoubi, Amal Rassas, Mohammad AlYamani, Mohammad Alshboul

:
An efficient low aggressiveness portion (ELAP) cache replacement policy for systems with non-volatile main memory. 414 - Rajesh Kumar Chaudhary, Ravinder Kumar, Nitin Saxena:

Ameliorating clustered federated learning using real-coded genetic algorithm. 415 - Jai Prakash Kushwaha, Saumya Bhadauria, Shashikala Tapaswi:

mFCBF based lightweight intrusion detection system for IoT networks. 416
Volume 28, Number 7, September 2025
- Ali Kadhum M. Al-Qurabat, Alyaa Kadhim Mohammed, Ali Z. K. Matloob, Suha Abdulhussein Abdulzahra:

Integrating weighted visibility graphs with IoMT for epileptic seizure detection: a machine learning approach. 417 - Sheng Wang, Yumei Shi, Shiping Chen, Meng Liu:

Forecasting GPU type allocation via demand feature extraction in heterogeneous clusters. 418 - Haidong Huang, Youfa Fu, Dan Liu, Jiadui Chen, Ling He:

Adaptive Gazelle optimization algorithm: a novel solution for complex optimization problems. 419 - Kyuli Park, Dongjae Lee, Yeonwoo Jeong, Salim Hariri, Sungyong Park:

Towards an asynchronous commit in micro-batch streaming systems with log-structured merge-tree based key-value store. 420 - Yiming Yin, Jianxun Liu, Yi Liu, Jia Deng:

Advancing code completion through rotary position embedding. 421 - Sumedha Seniaray, Rajni Jindal:

Enhanced anomaly-based network intrusion detection leveraging a modified picture fuzzy clustering approach. 422 - Xiaoyu Zhou, Chenyang Shi, Donglin Zhu, Changjun Zhou:

Kanfilter: a simple and effective multi-module point cloud denoising model. 423 - Yuansheng Gao

, Jinpeng Wang
, Lang Qin, Jiahui Zhang, Yulin Wang:
Freedom from inspiration! Achieving efficient metaheuristic optimization with delta plus. 424 - Hong Zhang, Min Yi, Xijun Zhang:

Traffic flow forecasting based on dynamic graph convolution and triplet attention. 425 - Yiqian Zhao, Sheng Zhu, Jinting Wang:

Strategic joining and optimal pricing in the hybrid cloud system with risk-sensitive service requests. 426 - Saqib Ali, Sakhawat Ali, Syed Fakhar Bilal, Khalil ur Rehman, Zeeshan Shaukat, Ahmed Khan, Rooha Khurram:

A robust U-net-based cascaded model for brain tumor substructures segmentation using magnetic resonance imaging. 427 - Laixiang Xu, Bei Li, Jingfeng Su, Yongfeng Fan, Junmin Zhao:

RSCNet: an integrated deep learning classification model for tomato leaf diseases. 428 - Xinyi Hu, Siyuan Chen, Kai Zhang

, Lifei Wei, Jianting Ning:
Time-controllable keyword search with aggregate keys and multi-delegation for secure cloud storage. 429 - Bnyad O. Mohammed, Hadi S. Aghdasi, Pedram Salehpour:

Dhole optimization algorithm: a new metaheuristic algorithm for solving optimization problems. 430 - Sourabh Bhaskar

, Keyur Parmar, Devesh C. Jinwala:
Comparative evaluation of pairing-free and pairing-based CP-ABE schemes for resource constrained environments. 431 - E. Mosavi, Seyed Abolfazl Shahzadeh Fazeli, Elham Abbasi, Fatemeh Kaveh-Yazdy:

Using hybrid mountain gazelle optimization and particle swarm optimization algorithms to improve clustering. 432 - Chao Chen, Zhenghua Wang, Chen Jiang, Zheng Wang:

Nime: a native in-memory compute framework for cluster computing. 434 - Zhennan Wang, Lei Wang, Qiaoyong Jiang, Zhaoqi Wang, Wenqian Zhu, Liangliang Wang:

A particle swarm optimizer with a scoring-based multi-neighborhood selection mechanism for multimodal multi-objective problems. 435 - Gabriel Pereira, Willian Barreiros, Renato Ferreira, George Teodoro:

Spatial-aware and load balancing distributed data partitioning strategies for content-based multimedia retrieval. 436 - Zeeshan Hameed, Hamid R. Barzegar, Nabil El Ioini, Claus Pahl:

BE-DSN: leveraging blockchain for improving data availability and security in distributed storage networks. 437 - Zhaoxin Zhang, Shize Huang, Qianhui Fan, Decun Dong:

Adversarial examples detection for object detectors using consistency check framework. 438 - Zigang Chen, Danlong Li, Fan Liu, Xingchun Yang, Haihua Zhu, Xiaoyong Li:

Confidentiality, integrity, and non-repudiation of automobile event data: a TEE-based secure transmission scheme between automobile and cloud. 439 - Kalyan Kumar Jena, Sourav Kumar Bhoi, Sanjaya Kumar Panda:

Enhancing data credibility in 6G-enabled IoT-fog environment using secured blockchain scheme. 440 - Xiaohan Yu

, Zebin Hu, Seungjun Baek
, Chen Shen, Chao Chen
:
Apstgcn: adaptive parallel spatio-temporal graph convolution network for traffic forecasting. 441 - Liangcai Xia, Shijun Chen:

Two-stage hierarchical evolutionary algorithm based on multi-population for multi-objective distributed heterogeneous welding flow shop scheduling. 442 - Zhenyu Yin, Zhiying Bi, Junyao Xue, Lei Wu:

An improved heuristic service deployment algorithm based on multi-parameter priority in edge computing. 443 - Fen Zhao, Jun Guo, Hongan Pan, Yong Tang:

Using spatial-frequency features for visible and infrared image fusion. 444 - Sarah Hussein Toman

, Zinah Hussein Toman:
Formal service conflict detection through abstraction and refinement. 445 - Qian Zhang, Huijin Li, Mingwen Shao, Hong Liang:

Learned image compression with CNN-LocalMamba architectures and multi-context entropy model. 446 - Jie Ling, Runlong Duan:

Privacy preserving technology for data sharing in cloud-assisted internet of medical things. 447 - Safa Boumiza, Rafik Braham:

A deep learning-based anomaly detector for CAN bus networks in autonomous cars. 448 - Billy Pik Lik Lau, Jatinder Kumar, Ashutosh Kumar Singh, Terence Peng Lian Tan:

Join coalition mechanism for enhancing idle agents' utility in a macroscopic coalition. 449 - Sourav

, Rifaqat Ali:
Post-quantum secure health records: a blockchain-based lattice threshold signcryption scheme. 450 - Muhammad Waseem Akhtar, Zia Bashir, M. G. Abbas Malik:

Modeling and analysis of variable fractional order hyper-chaotic Lü system with radial basis function neural networks. 451 - Yang Chen, Mahdi Mir:

An intrusion detection system for industrial IoT using CNN-LSTM and reptile search algorithm. 452 - Junhong Yang, Ruiping Xiong, Xing Hu, Zhongping Zhao, Lin Li:

An evolutionary algorithm with enhanced clustering genetic strategies and its application to double-layer spraying trajectory planning. 453 - Liming Sun, Ming Zhu, Jing Li, Haotian Zhang:

Adaptive annealing dynamic Q-learning based on subroute optimization for solving the traveling salesman problem. 454 - Ahmad Nasayreh, Noor Aldeen Alawad, Ameera Jaradat

:
Enhanced chimp optimization algorithm using crossover and mutation techniques with machine learning for IoT intrusion detection system. 455 - Usman Humayun, Mosab Hamdan, Mohammed Sultan Mohammed, Hashim Elshafie, Muhammad N. Marsono:

Dynamic-timeout prediction and proactive eviction for SDN flow table overflow mitigation. 456 - Jan Fesl, Michal Polák, Daniel Sedlak

:
Tcp-based network communication optimized for green cloud computing. 457 - Azadeh Sadat Miraftab, Ahmadreza Montazerolghaem

, Behrad Mahboobi:
Improving performance of content-centric networks via decentralized coded caching for multi-level popularity and access. 458 - Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan:

Explainable AI for enhancing IDS against advanced persistent kill chain. 459 - Sili Wang, Te Ma:

A two-way trust-based routing approach to identify malicious and energy-aware nodes in fog computing. 460 - Damiano Azzolini, Stefano Forti

, Antonio Ielo:
Continuous reasoning for adaptive container image distribution in the cloud-edge continuum. 461 - Samah A. Zakaryia, Mohamed A. Mead, Tamer Nabil, Mohamed K. Hussein:

Task offloading for multi-UAV asset edge computing with deep reinforcement learning. 462 - Divyanshu Awasthi, Vinay Kumar Srivastava

:
ROI-based optimized image watermarking with real-time authentication. 463 - Nitesh Bharot, Nakul Mehta, John G. Breslin, Priyanka Verma:

Cloudlock: secure data sharing using a hybrid cryptosystem in multi-cloud data storage. 464 - Pedro Escaleira, Vitor A. Cunha

, João Paulo Barraca, Diogo Gomes, Rui L. Aguiar:
A systematic review on security mechanisms for serverless computing. 465 - Rohit Shorya

, Priti Jagwani
:
FEED: Fair and Equitable Energy Distribution based on permissioned blockchain and predictive analytics. 466 - Haibin Ouyang, Xuyu Lin, Steven Li, Liqun Gao, Essam H. Houssein:

Recent metaheuristic algorithms for multi-objective feature selection: review, applications, open issues and challenges. 467 - Essam H. Houssein, Eman Saber

, Yaser Maher Wazery, Abdelmgeid A. Ali:
An efficient improved quasi-random fractal search for hyperparameter optimization: case study with lung disease classification. 468 - Essam H. Houssein, Amr M. Gamal, Eman M. G. Younis, Ebtsam Mohamed:

Explainable artificial intelligence for medical imaging systems using deep learning: a comprehensive review. 469 - Haixin Jia, Zhaoxuan Chen, Guoying Zhang, Wenzhuo Liu, Zirui Zhang:

Ms-unet:coal-rock crack image segmentation based on attention mechanism and multi-scale features. 470 - Himanshu Nandanwar, Rahul Katarya:

A hybrid Blockchain-Based framework for securing intrusion detection systems in internet of things. 471 - Kewen Wang, Ting Shu

, Xuesong Yin, Jinsong Xia:
A multi-strategy improved manta ray foraging optimization for engineering applications. 472 - Busra Buyuktanir, Sahsene Altinkaya, Gozde Karatas Baydogmus

, Kazim Yildiz:
Federated learning in intrusion detection: advancements, applications, and future directions. 473 - P. Chinnasamy, Logeshwari Dhavamani, Ramesh Kumar Ayyasamy

, B. Santhosh Kumar, Ajmeera Kiran:
QuantumBlock health records: enhancing healthcare data security with quantum cryptography and blockchain technology. 474 - Pengwei Yan, Yesong Guo, Jing Wen, Jingjing Han, Yanxin Fan, Yanhong Luo, Pudong Qian, Qian Zhang:

Optimizing cardiac radiation therapy in left breast cancer patients using an intelligent hybrid fuzzy model and differential genetic evolution. 475 - Idriss Dagal

, Ambe Harrison
, Al-Wesabi Ibrahim
, Wulfran Fendzi Mbasso
:
Comprehensive evaluation of data preprocessing and visualization techniques for enhanced classification and sampling. 476 - Loubna Moujoud, Meryeme Ayache, Abdelhamid Belmekki:

Enhancing malware detection through ensemble learning techniques. 477 - Nour El Islem Karabadji, Abdelaziz Amara Korba, Ali Assi, Hassina Seridi, Mohamed Aimen Karabadji, Yacine Ghamri-Doudane, Abdelghani Lakhdari, Mohamed Elati, Wajdi Dhifli:

A genetic and graph-guided feature learning strategy for improving decision tree construction. 478 - Jing-An Cheng, Qilei Li, Alireza Souri, Xiang Lei, Chen Zhang, Mingliang Gao:

Towards trustworthy crowd counting by distillation hierarchical mixture of experts for edge-based cluster computing. 479 - Zuheng Yin, Hongzhen Xu, Aihua Liu:

A graph neural networks and improved whale optimization algorithm-based approach for cloud service composition. 480 - Isaac Osei Asante, Libing Wu:

Blockchain and deep learning for improving impenetrable data passage in the IoT-imbued healthcare system. 481 - Mohamed Wajdi Ouertani

, Ghaith Manita, Ouajdi Korbaa
:
Hannibal Barca optimizer: the power of the pincer movement for global optimization and multilevel image thresholding. 482
Volume 28, Number 8, September 2025
- Jingling Yang, Huayou Chen:

Multi-objective optimization empowered spatiotemporal parallel network for online $\hbox {PM}_{2.5}$ interval prediction. 483 - Meijia Song, Jun Lin, Xiangrong Liu, Heming Jia

, Shuyuan Luo:
Octopus optimization algorithm: a novel single- and multi-objective optimization algorithm for optimization problems. 484 - Vijaykumar Mamidala, Akhil Raj Gaius Yallamelli, Mohanarangan Veerappermal Devarajan, Thirusubramanian Ganesan, Rama Krishna Mani Kanta Yalla, Aceng Sambas:

Hybrid anomaly-based cloud security and machine learning-based behavioral analysis for threat intelligence detection in cloud environment. 485 - Shriniwas Patil, Keyur Parmar:

MedReward: privacy preservation of electronic health records (EHR) and secure incentive distribution in the presence of active insider and outsider adversaries using blockchain. 486 - Vidyapati Jha

, Priyanka Tripathi:
Abductive hypothesis testing in cognitive IoT sensor network. 487 - Suryakant Prasad, Y. Sreenivasa Rao:

SPySAVer: efficient signature-policy attribute-based server-aided verification signature for industrial-internet-of-things. 488 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang:

Optimization of maximum parallel K-means algorithm based on GPU cluster. 489 - Yanmei Shen, Yabiao Sang, Hui Wang, Zihao Shen, Peiqian Liu:

HSLRL-DP: based on Hasse sensitivity levels and reinforcement learning trajectory privacy enhancement mechanism. 490 - Yana Lv, Haomiao Bao, Xiuli Du, Shaoming Qiu:

Relation cross-fusion attention assistance networks for multi-hop question answering over knowledge graphs. 491 - Lihong Li, Hongyao Dong, Hang Li:

Selective ensemble classification algorithm based on neighborhood-tolerance mutual information. 492 - Sepehr Ganji, Shirin Behnaminia, Ali Ahangarpour, Erfan Mazaheri, Sara Baradaran, Zeinab Zali, Mohammad Reza Heidarpour, Ali Rakhshan, Mahsa Faraji Shoyari:

CN2F: a cloud-native cellular network framework. 493 - Delin Wang, Xiangshun Li

:
Enhanced detection, isolation, and accommodation scheme for concurrent sensor failures in industrial processes. 494 - Mahendra Kumar Jhariya

, Vasudev Dehalwar
, Jyoti Bharti:
SDIdA-IoT: self-sovereign digital identification and authentication framework for IoT devices using blockchain. 495 - M. Saryazdizade, Z. Nikooeinejad, Ali Delavarkhalafi:

A stochastic differential oligopoly game for risk management of resource mining in blockchain. 496 - Bin Li, Tianwei Shi, Wenhua Cui, Teng Xu:

SFENet:RGB-D salient detection network enhanced by specific features. 497 - Liyuan Guo, Song Gao, Weigang Pan, Fei Xu:

A novel container scheduling algorithm for edge computing: integrating entropy weight method and multi-strategy particle swarm optimization. 498 - Jiaheng Li, Qinmu Wu:

Fast-CFLB: a privacy-preserving data sharing system for Internet of Vehicles using ternary federated learning and blockchain. 499 - Zhiyuan Li, Yuqi Jiang, Jingyu Zhao, Liang Zhang, Lin Tan, Fanliang Bu:

UBI-STA: spatiotemporal correlation analysis for user behavior identification in network encrypted traffic. 500 - Hui Li, Hezong Li, Leina Shi, Taoming Yu, Yixu Su:

YOLOv8-SST lightweight small target fault detection system integrating SENet attention mechanism and Tr-OCR. 501 - Yuyao Huang, Yuhang Wang, Li He, Zhiqin He, Lin Xiao:

Spinal segmentation based on heatmap regression positioning and improved UNet. 502 - Xufeng Liu, Zupeng Zhou, Yongquan Zhou:

Multi-strategy butterfly optimization algorithm for state estimation in sandwich systems. 503 - Fan Yang

, Yilin Yuan, Zhaoqian Zhang, Zichen Li:
Blockchain-based public auditing and secure deduplication for copyright data. 504 - Yazhi Liu, Haonan Xia, Wei Li:

FedDC: a federated learning framework to enhance gradient diversity and mitigate conflicts. 505 - Fahad Rahman, Chafiq Titouna, Farid Naït-Abdesselam:

Efficient shard load balancing for scalable blockchain systems. 506 - Xiaoming Wang, Mingzhan Dai:

Privacy-preserving and robust federated learning scheme with high efficiency through ciphertext filtering. 507 - Prasanth Kumar Bevara, Ravi Shankar Singh

, Rambabu Medera, V. V. D. Prasad Chelluri:
Optimizing scientific workflow scheduling in cloud environments: a hybrid PSO-EWWO. 508 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang:

Design and implementation of fully distributed heterogeneous resource management system. 509 - Lihong Zhang, Chongxin Xu, Yingbo Liang, Yuzhuo Li, Tong Liu:

TransMA-Unet: transformer and multi-scale residual connection attention network for vessel segmentation. 510 - Emran Younesi, Ebrahim Akbari, Homayun Motameni:

A study on discriminative power of stylistic features in affect analysis. 511 - Bahareh Bagheralmoosavi, Seyed Erfan Fatemieh, Mohammad Reza Reshadinezhad, Antonio Rubio:

Power-area efficient serial IMPLY-based 4:2 compressor applied in data-intensive applications. 512 - Shanchen Pang, XiaoRan Zhu, Haiyuan Gui, Yanxiang Zhang:

A Multi-layer heterogeneous task scheduling strategy in UAVs-assisted MEC networks. 513 - Xin Chen, Yuejin Zhang, Zhongyuan Gong, Qi Shi, Shuying Gong, Zhuo Li, Dixin Huang, Nan Jiang:

Agm-c3banet: a network intrusion detection model for imbalanced data. 514 - Mohemmed Yousuf Rahamathulla, Mangayarkarasi Ramaiah:

Building robust lightweight network intrusion detection: a multi-pronged approach with DSSTE and deep learning for securing edge-enabled industrial IoT applications. 515 - Jian Yu, Xiangmei Xiao:

A cloud service security risk measurement method based on information entropy and Markov chain. 516 - Mahendra Kumar Gurve, Sankar Behera, Yamuna Prasad, Nitin:

Integrating YOLOv9 and image enhancement on UAV-derived data enhances precision in potato disease detection. 517 - Qichang Li, Bing Bu, Junyi Zhao:

An enhanced blockchain-based collaborative intrusion detection approach for CBTC systems. 518 - Leyi Shi, Yuchen Zhao:

Modeling and analysis of worm computing systems based on stochastic petri nets. 519 - Muath AlShaikh, Mostefa Kara, Farid Binbeshr, Mustafa Ghaleb:

An OTP and watermarking based partial homomorphic approach to authenticated and integrated cloud computing. 520 - Xiubao Zheng, Jing Li, Ming Zhu, Jie Dai:

A multi-objective pareto optimization service selection approach considering cloud manufacturing production constraints. 521 - Wei Fan, Jing Li:

Joint device assignment and resource allocation for hierarchical semi-asynchronous federated learning over wireless networks. 522 - Zhihua Li, Shuli Ning, Zhongcheng Wei, Jijun Zhao:

Dbn-igr: dual-branch network for identification and gesture recognition with WiFi signals. 523 - Siddharth Gautam, Amarjit Malhotra, Sanjay Kumar Dhurandher:

A blockchain framework for enhancing data security and intrusion detection in the internet of things environment using hybrid deep learning model. 524 - Bingxian Li, Lin Zhu, Long Tan:

Optimizing task offloading and resource allocation in latency-constrained vehicular edge computing. 525 - Chuhang Wang, Si Chen, Huangshui Hu, Xinji Fan:

A distributed cluster-based routing protocol using fuzzy logic and deep reinforcement learning for wireless sensor networks. 526 - Madhusudan Naik, Akhilendra Pratap Singh, Nihar Ranjan Pradhan:

TBSSMC: a trusted blockchain solution for social media content integrity and performance simulation. 527 - Ghazi Mergani Ahmead Ali, Hongsong Chen:

Contract-guardian: a bagging-based gradient boosting decision tree for detection vulnerability in smart contract. 528 - Ahmed M. Tawfik, Ayman Al-Ahwal, Adly S. Tag Eldien, Hala H. Zayed:

Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey. 529 - Saba Inam, Shamsa Kanwal

, Fariha Nawaz, Amal K. Alkhalifa:
Enhanced medical image security: a chaotic map and laplace transform-based encryption scheme. 530 - Alessio Viticchié, Alberto Salvatore Colletto, Giulio Sunder, Cataldo Basile, Alessandro Aliberti

:
Advanced attack graph framework for operational technology: scalable modeling, validation, and risk mitigation. 531 - Walid K. Ghamry, Suzan Shukry:

Joint optimization of energy harvesting and data transmission in SWIPT-enabled hybrid precoding mmWave massive MIMO-NOMA systems. 532 - Ganesan Nagabushnam

, Kyong Hoon Kim
, Yundo Choi
:
FAMASO: fog-adaptive multi-agent scheduling optimization. 533 - Feifei Niu, Arindam Sarkar, Sarbajit Manna, Soumya Chatterjee, Abdulfattah Noorwali, Kamal M. Othman:

Differential privacy-enabled federated learning for secure neural synchronization in protecting industrial data streams. 534 - Aouatef Mahani, Okba Kazar:

Defenses against model stealing attacks in MLaaS: literature review and challenges. 535 - Wei-Kuo Chiang, Yuan-Hsiang Chih:

A pareto-optimal heuristic algorithm to refactor IMS core for cloud-native NFV. 536 - Jhalak Dutta, Smita Das

:
Enhancing disaster readiness: a comprehensive review of IoT-enabled WSN path planning for effective emergency response. 537 - Yue Zhang, Wei Liu

, Jiayi Song, Ke Chen, Qian Wang:
Cloud-assisted updatable private set intersection cardinality. 538 - Rohit Malik

, Sakshi Dua, Preety Shoran:
Blockchain-based node authentication algorithm for securing electronic health record data transmission. 539 - Xinyu Lei, Jiatang Cheng:

A multi-layered artificial electric field algorithm for numerical optimization and path planning. 540 - Xueqi Peng, Wenting Shen, Yuan Gao, Ye Su:

Blockchain-based secure deduplication and cloud storage auditing with fair arbitration and privacy protection. 541 - Zhipeng Lai, Jiabin Ding, Hanfeng Yin, Lijia Wu, Jie Liu, Wei He:

Bitterling Colony Optimization: a bio-inspired algorithm for global search. 542 - Salma Soofiyan, Amin Karami:

Ethereum smart contracts: a hierarchical analysis of vulnerability challenges and mitigation strategies. 543 - Jinshou Chen, Wenxuan Yao, Jianjiang Li:

Parallel optimization techniques for ultra-large scale refined numerical simulations on Chinese supercomputers. 544 - Mu Chen, Sarbajit Manna, Arindam Sarkar, Abdulfattah Noorwali, Kamal M. Othman:

Quantum neural computing enhanced five-dimensional hyperchaotic framework for secured and reliable communication on the Internet of Things systems. 545 - Narendra Kumar, Sunil Kumar, Rajeev Kumar Sharma, Rupak Sharma, Kapil Tomar:

A decentralized blockchain based privacy preservation scheme for healthcare data security enhancement in cloud. 546 - Biao Li, Bing Wang, Xiong Hu:

An industrial small surface defect detection technique based on CEYolo model. 547 - Ritesh Chandra, Shashi Shekhar Kumar, Rushil Patra, Sonali Agarwal:

Decision support system for Forest fire management using Ontology with Big Data and LLMs. 548 - Sihem Benfriha, Nabila Labraoui

, Haythem Ahmad Bany Salameh, Radjaa Bensaid:
Reinforcement learning-based drone-client selection for efficient federated learning-based intrusion detection in FANETs. 549 - Aya G. Ayad

, Nehal A. Sakr, Noha A. Hikal:
Fog-empowered anomaly detection in IoT networks using one-class asymmetric stacked autoencoder. 550 - Ziyi Meng, Jing Li, Ming Zhu, Yuhong Yan:

Energy service selection method based on blockchain smart contract and improved polar bear algorithm. 551 - Bing Tang, Jiayao Li, Yujun Cao, Qing Yang:

QoS-driven reinforcement learning-based resource allocation in space-air-ground-sea integrated networks. 552 - Yi Wang, Shicheng Zhong, Zheng Zhang:

Game-theoretic cloud assistance strategies of end-edge-cloud systems for mitigating edge distributed denial of service attacks. 553 - Yongxing Lin, Yan Shi:

A novel sustainable approach for developing internet of things-based transportation networks based on a hybrid energy-aware algorithm. 554
Volume 28, Number 9, October 2025
- Zonghui Li, Bowei Zheng, Youfa Fu, Xiaoming Liu:

Adaptive walrus optimization algorithm for unmanned aerial vehicle path planning and engineering optimization problems. 555 - Salah Kamel, Mansur Khasanov, Mohamed H. Haasan, Jasur Abdubannaev, José Luis Domínguez-García:

Quadratic interpolation manta ray foraging optimization: a meta-heuristic approach for simultaneous DG allocation and distribution system reconfiguration. 556 - Seoyoung Kim, Jiwon Ha, Yoonhee Kim:

Oltunes: Online learning-based auto-tuning system for DL inference in heterogeneous GPU cluster. 557 - Huiyan Han, Wanning Li, Xie Han, Liqun Kuang, Xiaowen Yang:

Indoor object detection algorithm based on SBP-YOLOv7. 558 - Guoqing Jin, Shibing Zhou, Yihao Zhu:

Auto-tuning density peak clustering without parameters. 559 - Chunmao Jiang, Wei Wu:

A fine-grained task-aware scaling mechanism for dynamic cloud workloads. 560 - Doaa Aloqoul

, Manal Al-Bzoor, Hisham Almasaeid, Tasneem Dawahdeh:
Multi-AUV trajectory optimization for data collection in the internet of underwater things (IoUT). 562 - Maira Khalid, Ahmed Raza Mohsin, Jehad Ali, Byeong-Hee Roh:

Optimization of recurrent neural networks for high-performance intrusion detection in network traffic. 563 - Yanjin Cheng, Wenmin Li, Pengfei Gong, Huimin Zhang, Fei Gao, Sujuan Qin, Tengfei Tu:

Personalized federated learning based on dual adaptive aggregation in the IoT environments. 564 - Yang Wang, Xinwen Zou, Yingmin Wu:

Deep neural network-based surrogate-assisted evolutionary algorithm for expensive constrained optimization. 565 - Yunlong Wang, Hong Liang, Mingwen Shao, Qian Zhang:

Kdhiera: boosting self-supervised masked video modeling via hierarchical knowledge distillation. 566 - Mariano Albaladejo-González, Pantaleone Nespoli, Félix Gómez Mármol, José A. Ruipérez-Valiente:

A multimodal and adaptive gamified system to improve cybersecurity competence training. 567 - Yang Chen, Jia Hao, Yu Peng, Hongyan Xia:

Transformer-based performance prediction and proactive resource allocation for cloud-native microservices. 568 - Yan Zeng, Chengchuang Huang, Siyuan Teng, Meiting Xue, Yukun Shi, Jilin Zhang, Jian Wan, Gangyong Jia:

FedAEF: optimizing federated learning with mining and enhancing local data features. 569 - Mehdi Karami, Amin Karami:

Harmony in federated larning: a comprehensive review of techniques to tackle heterogeneity and non-IID data. 570 - Vo Truong Trung Hieu, Nguyen Huu Quyen, Hien Do Hoang, Phan The Duy, Van-Hau Pham:

PoFQ: a blockchain consensus protocol for decentralized federated learning-based threat hunting approach in a trustless computing landscape. 571 - Himan Namdari, Victor Morales Avalos, Amal Alshehri, Cihan Tunc, Ram Dantu:

Enhanced trust in IoT environments: utilizing perfect Bayesian equilibrium, exponential smoothing, and machine learning. 572 - Tai-Shan Lou, Guang-sheng Guan, Zhe-peng Yue, Yu Wang, Ren-long Qi, Shi-hao Tong:

A competitive game optimization algorithm for unmanned aerial vehicle path planning. 573 - Hao-Ming Song, Yu-Cai Wang, Jie-Sheng Wang, Jia-Ning Hou, Yu-Wei Song, Xin-Ru Ma, Yu-Liang Qi:

Ensemble filter RL feature selection method based on MW-shaped transfer function for high-dimensional cancer gene expression data. 574 - Kunda Suresh Babu

, Lakshmi Revathi Krosuri
, Nirmalajyothi Narisetty
, Chandrika Dadhirao
:
Optimizing feature selection in imbalanced intrusion detection system using hybrid metaheuristics algorithms for wireless sensor networks. 575 - Safia Gul

, Bilal Ahmad Malik
, M. Tariq Banday
, Zahrah Ayub
:
LQE-DT: a machine learning approach to proactive link quality prediction in IoT networks. 576 - Bouchra El Akraoui, Imane Chakour, Cherki Daoui:

Effective summarization of ChatGPT user feedback: integrating topic detection with Markov chains. 577 - Aminu Onimisi Abdulsalami, Farhad Soleimanian Gharehchopogh, Mohamed Abd El Aziz, Shengwu Xiong:

Multi-objective heterogeneous comprehensive learning symbiotic organism search with application to convolutional neural network pruning. 578 - Sandeep Singh Sikarwar, Rakesh Kumar, Benay Kumar Ray:

Multi-attribute based double auction for virtual machine trading in federated cloud environment. 579 - Yuechao Bian, Haorong Wu, Fuchun Sun

, Qiurong Lv, Xiaoxiao Li
:
An improved lightweight metal sheets surface defect detection algorithm based on YOLOv8. 580 - Rahat Ullah, Mubashar Sarfraz, Muhammad Farhan Sohail, Sheraz Alam, Sajjad Ahmed Ghauri, Nauman Anwar Baig:

Maximizing energy efficiency through joint resource optimization in NOMA-assisted UAV-enabled next-generation wireless networks. 581 - Zilun Xiong, Buqing Cao, Shanpeng Liu, Zhenlian Peng, Min Shi, Shangli Liu:

UMar: unbiased stratified knowledge distillation-based mobile application recommendation. 582 - Longhui Niu, Yunsheng Fan, Ting Liu, Qi Han:

Mlvit-YoloX: a lightweight maritime surface object detector based transformer for unmanned surface vehicles. 583 - Dudu Guo, Ke Zhao, Linbo Li:

A traffic state discrimination method based on machine learning and multistrategy dung beetle optimization algorithm. 584 - Poonam Rani, Harkesh Sehrawat, Amandeep Kaur, Robertas Damasevicius:

Emergent defenders: generative AI's role in safeguarding IoT ecosystems. 585 - Shuzhi Su, Chao Wang, Yanmin Zhu, Yang Xu:

Region-aware unknown information enhancement for open world object detection. 586 - Rania Mzid, Bakhta Haouari, Olfa Mosbahi:

User comfort or sustainability? A multi-objective reinforcement learning strategy for the IoMT with harvesting energy. 587 - Ahmed S. Alwakeel, Abdullah M. Shaheen, Ghareeb Moustafa, Badr Al Faiya, Idris H. Smaili:

Integrated fluid antenna systems with reconfigurable intelligent surfaces via quadratic interpolation optimization. 588 - Hafsteinn Hjartarson

, Fjolnir Thrastarson, Anna Sigridur Islind, Gísli Hjálmtýsson:
Dynamic membership management for a permissioned blockchain. 589 - Fatima Zahrae El-Hassani, Abderrahmane Ed-daoudy, Nour-Eddine Joudar, Khalid Haddouch:

Improving early breast cancer detection: a hybrid approach with convolutional neural networks and genetic algorithm-based optimization. 590 - Sheng Hao, Yong Hong, Jianqun Cui, Rui Chen, Li Zhen:

A biodynamic-inspired routing algorithm for energy harvesting-aided 3-D wireless sensor networks. 591 - Shixing Zheng, Suyang Ma, Xu Jin:

Time series prediction with transformer neural network optimized by IFE and hunger-driven DMOA. 592 - Qilin Li

, Chunyan Zhang, Qihua Ma
, Xin Weng
:
MESO: a multi-strategy enhanced snake optimizer applied to autonomous vehicle motion planning. 593 - Jiangxue Xie

, Haisong Huang, Shengwei Fu, Ziten Lu, Feifei Li, Man Su:
Enhanced crayfish optimization algorithm for global optimization and real-world applications. 594 - Mahmoud Abdel-Salam, Diego Oliva, Marco Pérez-Cisneros, Ibrahim M. El-Hasnony:

Advanced feature selection approach with Halton-based enhanced adaptive dung beetle algorithm. 595 - Sasan Harifi

, Reza Eghbali
, Seyed Mohsen Mirhosseini
:
Star Death: a novel lightweight metaheuristic algorithm and its application for dynamic load-balancing in cluster computing. 596 - Scott Fowler

, Sami Souihi:
Multi-user QoE optimization in virtual reality gaming using RL on mobile edge networks. 597 - Marwah A. Helaly, Sherine Rady, Mohamed Mabrouk, Mostafa M. Aref, Sebastián Villarroya, José Manuel Cotos, David Mera:

Advancements in water quality prediction: a practical review of machine learning and deep learning approaches. 598 - Fatima Daqaq, Salah Kamel, Mohamed H. Hassan, Rachid Ellaia, Mohammed Ouassaid:

Enhancing large-scale power flow optimization through an advanced coati optimization algorithm. 599 - Faiz Alshrouf, Shadi Masadeh, Dimah Al-Fraihat, Raed Al-Nsoor:

Improving BIRCH hierarchical clustering algorithms for enhanced partitioning of medical data. 600 - Haythem Bany Salameh, Ghaleb A. El Refae

, Shorouq Eletter:
Artificial intelligence and information symmetry: a path to mitigate adverse selection. 601 - Ziren Luo

, Di Li, Ge Wang
, Shiyong Wang, Minghao Cheng, Ting Li, Zi'ang Lei:
Service orchestration of customized production with automated workflow systems. 602 - Caixia Li, Guoping Kong, Xiaolin Lin:

Multi-view clustering algorithm based on sparse regression and structure learning. 603 - C. V. Manjushree, H. Aruna Reddy, D. C. Chandana, C. A. Subasini:

Mitigating data leaks and optimizing task scheduling in cloud computing using EfficientNetV2 with federated learning and blockchain. 604 - Abdelghani Krinah, Yacine Challal, Mawloud Omar, Omar Nouali:

Enhancing fine-grained access control in fog-based e-health applications. 605 - Seyed Naghi Seyedaghaee, Ali Broumandnia, Reza Tavakkoli-Moghaddam:

Adaptive multiobjective differential evolution based on parallel cell coordinate system. 606 - Zhaoye Chen, Jiaqi Liu, Lu Ding, Zhihua Liu:

Global path panning for AUV based on chaos mapping and iterative improved salp swarm algorithm. 607 - Theodora Adufu, Yoonhee Kim:

Dyna-P: placement-aware dynamic partitioning for lightweight applications with modern GPUs. 608 - Yaning Xiao

, Ruba Abu Khurma
, Hao Cui, David Camacho:
MAROAOA: A joint opposite selection-based arithmetic artificial rabbits optimization algorithm for solving engineering problems. 609 - Yayong Shi, Zenghao Cui, Yida Zhang, Rui Wang, Haiyan Zhu:

DLBW: an end-to-end multi-task adaptive gradient balancing method. 610 - Xuan Liu, Mengnan Tian, Xinduan Wang:

Enhanced particle swarm algorithm with diversity-based adaptive predicted learning strategy for numerical optimization. 611 - Jiaying Shen, Donglin Zhu, Wenqing Xiong, Leyi Wang, Jialing Hu, Changjun Zhou, Shi Cheng, Taiyong Li:

DNA sequence-driven multi-strategy particle swarm optimization for global optimization. 612 - Edixon Párraga, Betzabeth León

, Sandra Méndez, Dolores Rexachs
, Daniel Franco, Emilio Luque
:
Deep learning data handling: exploring file formats and access strategies. 613 - N. Naveen Kumar, S. Suresh, S. Balamurugan, Seshu Kumar Penumarti, Maruthamuthu Ramasamy, P. P. Devi, Jude Moses Anto Devakanth:

Optimized intention-adaptive graph neural network for robust failure diagnosis of microservice system using multimodal data. 614 - Libo Feng

, Xian Deng:
An efficient hot/cold data separation scheme for storage optimization in consortium blockchain full nodes. 615 - Tajul Azhar Mohd Tajul Ariffin, Siti Norul Huda Sheikh Abdullah, Fariza Fauzi, Mohd Zamri Murah, Mohammad Kamrul Hasan:

Review on honeynet analysis: can LSTM and shot learning drive intelligent cyber threat modelling and automation? 616
Volume 28, Number 10, October 2025
- Rahul Haripriya

, Nilay Khare, Manish Pandey, Sreemoyee Biswas:
Federated adaptive aggregation: improving privacy and scalability in healthcare AI. 617 - Li Yang, Yunxiao Yang, Yang Xiang:

An improved deep reinforcement learning method for flink configuration parameter tuning. 618 - Liang Xu

, Xingshi He, Jingjing Xue, Qingqing Zhang:
Joint clustering and feature selection based on trace ratio model and coordinate descent method. 619 - Wei Xu, Bing Tang, Yujun Cao, Qing Yang:

Availability-constrained microservice deployment in hybrid cloud-edge infrastructure. 620 - Wei Sun, Kaiqi Deng, Junbo Gao:

Traffic flow prediction based on generative adversarial network with hybrid spatio temporal features learning. 621 - Rasoul Jafari Gohari, Laya Aliahmadipour, Ezat Valipour:

Tpfl: tsetlin-personalized federated learning with confidence-based clustering. 622 - Taiyong Li, Tianhao Yi

, Donglin Zhu, Wu Deng, Min Zhou, Zhilong Xie, Jiang Wu:
Gradient fractional-order particle swarm optimization with social learning and terminal replacement mechanisms for numerical optimization. 623 - Zaid Albataineh, Khaled Farouq Hayajneh, Hazim Shakhatreh, Raed Al-Athamneh, Mohammad Al Bataineh:

Adaptive machine learning-enhanced channel estimation for RIS-assisted mmWave systems: a hybrid approach. 624 - Zheng Wu, Lai Wei:

Temporal feature-enhanced graph Convolutional Recurrent Network for traffic forecasting. 625 - Kaikai Zhu, Guiliang Gong, Xiaobin Li, Ningtao Peng, Jiuqiang Tang:

Dynamic scheduling for flexible job-shop with quality abnormality caused by machine fault. 626 - Amir Mollanejad, Ali Ghaffari, Amir Seyyedabbasi, Ahmad Habibizad Navin:

Fairness-based federated learning in autonomous vehicles with exponential moving average loss weighting. 627 - Hao Wu, Jun Liu, Hao Liu, Jiuzhen Liang:

Lighter, faster, more focused YOLO fabric defect detection model. 628 - Nan Wang, Yan Wang, Teng Gao, Fanyang Bu, Xiqian Zhu:

Empowering marine ranching networks: a study on resource allocation and pricing strategy for multi-unmanned surface vessels-assisted edge computing. 629 - Dharma Teja Valivarthi, Sreekar Peddi, Swapna Narla, Sai Sathish Kethu, Durai Rajesh Natarajan, Dede Kurniadi:

SDN layers verification and secure IoT data transmisson using HFYMAC and GLE-GRU. 630 - Rachid Bourigue, Driss Ait Omar

, Hicham Zougagh:
Improving online security: a deep learning model for phishing URL detection. 631 - Chahna Meka, Keerthi Reddy Palakollu, Maria Azees, Arun Sekar Rajasekaran, Ashok Kumar Das, Marko Hölbl:

A comprehensive survey on integration of machine learning with secure blockchain-based applications. 632 - Weijie Zhang, Ting Chen, Teng Li, Ze Wang, Zhichao Zhu, Hangbin Shen:

Analyzing and detecting four types of critical security vulnerabilities in move smart contracts. 633 - Zhi Zhou, Guanyan He, Yuqiang Dou:

Advanced image encryption algorithm for Web3.0. 634 - Yu-Liang Qi, Yu-Wei Song, Jie-Sheng Wang, Yu-Cai Wang, Hao-Ming Song, Yi-Peng Shang-Guan:

EQUILIBRIUM optimizer with integrated M-shaped transfer function family for solving feature selection problems. 635 - Yuhao Tang, Fei Tao:

From coarse to grain: automated medical report generation based on fine-grained semantic alignment and cross-modal enhancement. 636 - Georges Da Costa, Atom Deutsch-Filippi, Igor Fontana De Nardin, Jean-Marc Nicod, Veronika Rehn-Sonigo, Patricia Stolf:

Cooperative vs. non-cooperative marketplace for computing jobs to be run on geo-distributed data centers only supplied by renewable energies. 637 - Huifang Sun, Jiaming Pei, Xiaoqing Xu, Rubing Xue, Lingyun Zhao, Qihang Sun, Longfei Li, Lukun Wang:

Fedmkd: multi-teacher knowledge distillation for communication-efficient federated learning. 638 - Zaineb Sakhrawi, Taher Labidi, Asma Sellami, Nadia Bouassida:

Ontology inference for data quality improvement: a support vector regression-based test effort estimation model. 639 - Jianzhuo Li, Weiwei Lin, Xinhua Wang, Huikang Huang:

SIMPLO: a reinforcement learning-based long-running container scheduling algorithm with interference awareness for performance and power efficiency optimization. 640 - Cheng Tang, Lang Li, Yu Ou:

NPSCA-CGAN: a signal processing framework for enhanced non-profiled side-channel attacks. 641 - Kai Pan, Jiadong Dong, Chunxiang Zheng, Xiaoxiao Wang:

Integrated task offloading scheduling and trajectory optimization for UAV-MEC using SAC-UTO. 642 - Qi Diao, Chengyue Xie, Yuchen Yin, Hoileong Lee

, Haolong Yang:
A multi-strategy improved gazelle optimization algorithm for solving numerical optimization and engineering applications. 643 - Zhijian Li, Guanxin Chen, Yipeng Liu, Jianting Yuan:

An efficient multi-institution collaborative learning framework based on knowledge filtering and data sharing. 644 - Yijiang Zhao, Yahan Ning, Zhuhua Liao, Yizhi Liu:

A road type prediction method based on xDeepFM and multi-class classifier. 645 - Zhicheng Yin, Lang Li, Yu Ou:

A novel feature selection method based on mutual information and label distribution for side-channel analysis. 646 - Selma Amrani

, Khedidja Medani, Chirihane Gherbi, Hakim Mabed:
Machine learning application in software-defined networking based agricultural Internet of Things: a systematic literature review. 647 - Chang Chen, Zhen Wu, Hui Yang, Hongyuan Cheng:

Pvre: privacy-preserving and verifiable reputation evaluation scheme for VANETs. 648 - Trong-Minh Hoang, Van-Nhan Nguyen, Trang-Linh Le Thi, Minh-Hoang Nguyen, Nam-Hoang Nguyen:

A hybrid intrusion detection system model integrated explainable AI and multi expert systems to adapt edge computing. 649 - Zouheir Belfeki, Moez Krichen, Mondher Bouazizi, Salah Zidi:

Federated learning for natural disaster management: challenges, opportunities, and future directions. 650 - Ziming Xie, Buqing Cao, Yanxinwen Li, Shangpeng Liu, Guosheng Kang, Zhenlian Peng:

Pre-trained representation and negative sampling-based service recommendation. 651 - Qian Zhang, Zuosui Yang, Mingwen Shao, Hong Liang:

Midframe-centric token merging for efficient video transformer. 652 - Zakaria Maamar, Noura Faci, Fadwa Yahya, Ejub Kajan:

Time-constrained concurrent data-offloading in the cloud and fog. 653 - Aoun E. Muhammad, Kin Choong Yow, Nebojsa Bacanin-Dzakula, Muhammad Attique Khan:

L-xaids: A LIME-based eXplainable AI framework for intrusion detection systems. 654 - Maroua Akkal, Sarra Cherbal, Boubakeur Annane

, Hicham Lakhlef, Kamir Kharoubi:
Quantum, post-quantum, and blockchain approaches for securing the internet of medical things: a systematic review. 655 - Haitao He, Shibo Li, Yuxiang Li, Yang Li:

GTVD: a multi-level aggregation vulnerability detection method based on full-dependency program graph. 656 - Azra Nazir, Faisal Rasheed Lone, Ashfaq Ahmad Najar:

Adaptive partitioning of DNNs for resource-efficient inference on edge clusters. 657 - Shangqing Shi, Luoxiao Zhang, Yuchen Yin, Xiong Yang

, Hoileong Lee
:
A modified RIME algorithm with covariance learning and diversity enhancement for numerical optimization. 658 - Omar M. Bawazeer, Md. Mahfuzur Rahman, Omer S. Alkhnbashi

, Mohammad Hammoudeh:
A description language for enhancing transparency and interoperability in blockchain smart contracts. 659 - Mohammad Sadegh Sirjani, Ali Maleki

, Amir Pakmehr, Maedeh Abedini Bagha, Ali Ghaffari, Ali Asghar Pourhaji Kazem:
Controller placement in software-defined networks using reinforcement learning and metaheuristics. 660 - Tianzi Zheng, Jianchang Liu:

A diversity-enhanced framework for multimodal optimization: utilizating niching and differential evolution operator. 661 - Xu Chen, Xuesong Yin, Qi Huang, Ting Shu, Jianhao Ding, Yigang Wang:

CMFuse: a hierarchical feature fusion model combining convolution and Mamba for medical image classification. 662 - Nemalikanti Anand

, Sreenija Kaki
, Ambati Rami Reddy, Raveendra Babu Ponnuru:
Enhancing intrusion detection: protocol-based security using a hybrid RIDGE classifier on InSDN, UNSW-NB15, BoT-IoT, and ToN-IoT datasets. 663 - Santosh Kumar Birthriya, Priyanka Ahlawat, Ankit Kumar Jain:

A novel multi-objective optimization- XGBoost based feature selection and optimization for enhanced phishing website detection. 664 - R. Alexander, K. Pradeep Mohan Kumar:

BOTSIAM-DRL-Botnet detection using a few shot active matching siamese network deep reinforcement learning in IoT networks. 665 - Sanjaya Kumar Panda, Aditya Srivastav, Aniket Singh, Kuan-Ching Li:

A renewable energy-based virtual machine placement algorithm for managing energy and carbon in geographically distributed datacenters. 666 - Xiaoxuan Luo, Weiwei Lin, Fan Chen, Haocheng Zhong, Keqin Li:

An organizational framework for multiple monitoring tools to improve the correctness of high performance computing datasets. 667 - Collins Chimezie Obidiagha, Mohamed Rahouti, Hamza Drid, Khaled Hamouid, Yasmine Medjadba, Senthil Kumar Jagatheesaperumal

:
Iforestexplain: a dual-stage isolation forest framework with explainable AI for DoS/DDoS anomaly detection in IoT networks. 668 - Neha Kaushik, Harish Kumar, Vinay Raj:

A novel approach for enhancing reliability of microservices applications under dynamic workloads. 669 - Sohail Saif, Ramesh Saha:

M-EEMH: an energy-efficient mobility aware multi-hop protocol for QoS-driven WBAN applications. 670 - Essam H. Houssein, Mohamed A. Mahdy, Mohammed Kayed, Waleed M. Mohamed:

An efficient Warlus optimizer for solving multi-objective optimization problems: case study with action recognition. 671 - Hongchuan Cheng

, Guohui Ma, Xinhai Li, Yu Cui, Zhiwu Shang, Xiafei Shi:
Enhanced residual life prediction of rolling bearings based on Gamma process and improved BiLSTM of parrot optimizer optimization. 672 - Zongshan Wang, Ali Ala

, Lei Qin, Fangliang Kong, Qiang Zhao, Vladimir Simic, Gaurav Dhiman:
An adaptive equilibrium optimizer with information enhancement for global optimization. 673 - Seongmin Kim, Saerom Park, Yeon-sup Lim:

HACOE: hierarchical attack classification with outlier exposure. 674 - S. Manimaran, Uma Priya D, Maria Azees, Arun Sekar Rajasekaran:

Exploring the potential of artificial intelligence and machine learning in healthcare: challenges and research directions. 675 - Shuang Qin, Ji Feng, Degang Yang, Zhongshang Chen:

Hierarchical clustering algorithm based on an adaptive purified neighborhood graph. 676 - Shuai Huang, Youfa Fu, Dan Liu, Jiadui Chen, Ling He, Jie Zhang:

DLC-NGO: an enhanced northern goshawk optimization for 3D UAV path planning in complex environments with multiple threats. 677 - Fei Xue, Jinbu Wen, Peiwen Wang, Wenyu Fan, Yuge Geng, Tingting Dong:

A decomposition-based multi-objective evolutionary algorithm with reinforcement learning for workflow scheduling in cloud computing environment. 678 - Reza Mohammadi, Fabrice Theoleyre, Mohammad Nassiri:

An ML/fuzzy based flooding attack mitigation mechanism for industrial internet of things. 679 - Mohammad Zolghadri

, Parvaneh Asghari, Seyed Ebrahim Dashti, Alireza Hedayati:
Ai-driven energy-aware task offloading with network traffic considerations in fog-cloud environments. 680 - Faming Gong, Yi Yu, Chengze Du, Junjie Hao, Yingchao Feng, Ya Li:

A channel attention memory selection network for unsupervised anomaly detection. 681 - Libo Feng

, Peng Wu, Kai Hu, Shaowen Yao:
Secure cross-chain interactions: a relay chain framework with privacy and auditability solutions. 682 - Fatma Hendaoui, Lamia Trabelsi, Ahlem Ferchichi, Rahma Meddeb, Rawia Ahmed:

EPAD: empowering privacy-preserving anomaly detection through homomorphic encryption and machine learning. 683 - P. Akanksha, S. Manohar Naik

:
TCSO-KD: a novel technique for optimal feature selection and knowledge distillation for efficient IoT intrusion detection systems. 684
Volume 28, Number 11, October 2025
- Ying Wu, Ziyan Liu, Shitong Cheng, Banghai He:

Admm-based learnable channel estimation for RIS-aided mmWave massive MIMO systems. 685 - Zhenjie Huang, Yuying Xue, Zeyu Song, Yiping Cai:

Fine-grained access control schemes with fully hidden attributes for cloud systems. 686 - Shanchen Pang, Zixuan Fan, Haiyuan Gui, Xiao He, Zhi Lu, Shengzhe Zhao, Baoyun Chen:

Reputation-based federated learning and blockchain for trustworthy service recommendations in edge computing. 687 - Zilong Wang, Peng Shao, Shaoping Zhang:

A multi-population evolutionary algorithm integrating special selection methods and refraction-based grey wolf optimization for multi-objective problems. 688 - Huiyong Wang, Meiling Bu, Jielian Feng, Yong Ding, Shijie Tang, Yujue Wang:

Privacy-preserving data aggregation in smart grid based on multi-key homomorphic encryption and blockchain. 689 - Abdullah Aljumah, Tariq Ahamed Ahanger, Imdad Ullah, Munish Bhatia:

Smart methodology for defence asset management in blockchain environment. 690 - Prokash Barman, Ratul Chowdhury, Banani Saha:

Multi-channel secure communication framework for wireless IoT (MCSC-WoT): enhancing security in Internet of Things. 691 - Isha Sharma, Ruchika Gupta, Pardeep Singh:

Task scheduling in cloud using multi-objective hybrid approach. 692 - Tair Askar

, Martin Lukac, Bekdaulet Shukirgaliyev, Ernazar Abdikamalov:
Evaluating multi-GPU computing capabilities of Numba and CuPy. 693 - Shaocong Guo, Junhao Wang, Zhenfeng Zhu:

Role Model Learning Algorithm: a human-inspired approach with dynamic motivational mechanism for complex system optimization problems. 694 - Abida Naz

, Irshad Ullah, Kwizera K. Jonath, Muhammad Uzair, Abdul Haseeb Nizamani, Husnain Mushtaq:
Innovative cybersecurity solutions: a deep learning-driven model for accurate intrusion detection in network traffic. 695 - Shubin Su, Limin Xiao, Shupan Li, Zongliang Zhang, Xiaoxi Guo, Xingwang Huang:

An efficient distance based outlier detection method for batch-processed data streams. 696 - Pradeeban Kathiravelu, Mark G. Arnold, Shivang Vijay, Rahul Jagwani, Parteek Goyal, Aviral Kumar Goel, Nan Li, Charles Horn, Tony Pan, Mayuresh V. Kothare, Babak Mahmoudi:

Distributed executions with CONTROL-CORE: integrated development environment (IDE) for cosed-loop neuromodulation control systems. 697 - Fangfang Shan, Shuaifeng Li, Yanlong Lu, Shiqi Mao, Xinbo Wang:

SAFL-KCS: federated learning methods based on client selection and semi-asynchronous communication. 698 - Asmatullah Khan, Yang Li, Shifa Shoukat, Danish Javeed, Muhammad Adil:

Towards secure IoT-enabled transportation: an explainable AI and deep learning-based approach for efficient threat detection. 699 - Deepak Gupta, Shikha Gupta:

PV-DVMC: a novel path visibility based reliable data dissemination in VANETs using machine learning with layered clustering. 700 - Essam H. Houssein, Eman Saber

, Yaser Maher Wazery, Abdelmgeid A. Ali:
Improved electric eel foraging optimization boosted support vector machine for biomedical classification. 701 - Yingyu He, Zhuoran Dai, Meiyu Zhang, Chengfeng Jian:

A real-time hybrid task resilient collaborative scheduling strategy in the industry 5.0. 702 - Lu Jiang, Di Zhang, Fan Yang

, Xiaofeng Liao:
A novel search approach for secure and flexible sharing of hierarchical EHR based on blockchain. 703 - Keke Yang, Wei Fan, Zheyuan Shen, Xiangyu Fan, Jing Li:

Adaptive data pruning for efficient federated learning on heterogeneous clients. 704 - Miodrag Zivkovic, Luka Jovanovic, Vladimir Jocovic, Bosko Nikolic, Vico Zeljkovic, Mahmoud Abdel-Salam, Milos Mravik, Suresh Muthusamy, Nebojsa Bacanin:

Addressing smart city security: machine and deep learning methodology combining feature selection and two-tier cooperative framework tuned by metaheuristics. 705 - Fengtao Wei, Kai Hou, Yue Feng, Xin Shi:

Improved dung beetle optimization algorithm based on multi-strategy collaborative mechanisms for global optimization and engineering optimization design problems. 706 - Kun Li, Xu Zhong

, Ying Han:
Pcb defect detection based on a novel dual-domain high-frequency adaptive enhanced pooling method. 707 - Reza Mohammadifar, Reza Javidan, Reza Akbari:

Efficient DDoS detection in advanced mobile networks using P4 programmability and federated learning. 708 - Chengang Dong

, Yongkang Ding, Li Wang, Jianwei Hu:
HFE-YOLO: a hierarchical feature enhancement approach for non-salient object detection. 709 - Zohre Shoaei, Rasool Esmaeilyfard, Reza Javidan, Ahmad Jalili:

A new adaptive neuro-fuzzy trust-based routing for dynamic IoT networks. 710 - Rashmi Raj, Mohona Ghosh

:
Mitigating conflict resolution in IoT-enabled supply chain through blockchain-based lightweight access control. 711 - Priyadarshni, Dhruvan Kadavala, Shivani Tripathi, Praveen Kumar, Rajiv Misra:

Deep meta reinforcement learning for efficient task offloading in edge computing environments. 712 - Sakshi Singh, Shampa Chakraverty:

BCTrust: a dual-network crowdsourcing framework enhancing validation through the behavioural consensus-based trust model. 713 - Huaping Zhou, Zhiyong Sun, Kelei Sun:

A UAV image small object detection approach with enhanced feature pyramid and receptive field. 714 - Fernando Rodrigues Trindade Ferreira, Loena Marins do Couto, Matheus Alves Matos, João Victor de Oliveira Ribeiro Pinto, Guilherme Rodrigues Pensabem:

Brain Tumor detection and classification in magnetic resonance imaging using AT-YOLOv10 based on Mobilenetv3 and NAM. 715 - Fenhua Bai, Tongyu Pu, Tao Shen, Chi Zhang, Xiaohui Zhang:

PriOT-LSH: efficient privacy-preserving WiFi localization based on oblivious transfer and locality-sensitive hashing in cloud environments. 716 - Nasir Ahmad Jalali

, Hongsong Chen:
Securing social network user data in large language model deployments: challenges and best practices. 717 - Lahmar Hanine, Hilal Naimi:

Improved brain tumor segmentation using a modified VGG-Unet with depth-wise convolutions in decoder and Laplacian filter. 718 - Jinmeng Zhang, Hao Liu

:
Mhoa: multi-strategy Hiking Optimization Algorithm for solving engineering and numerical optimization problems. 719 - Ebrahim Farjamfard, Alireza Shameli-Sendi:

Enhanced anomaly detection in log-based systems using GAN-based models. 720 - C. Tripti, Preetha K. G., S. Saritha, K. R. Remesh Babu, Sangeetha U.:

ACO-CMAC: a novel ant colony optimization and priority-based MAC protocol for enhancing the performance of VANETs. 721 - Zhichao Gao, Qianqian Su:

Enabling verifiable and traceable distributed outsourced matrix multiplication in neural networks. 722 - Isaac Osei Asante, Libing Wu:

Smoke and mirrors: A variational optuna autoencoder with reinforcement learning for intrusion detection in IoT networks. 723 - Arieb Ashraf Sofi, Ajaz Hussain Mir, Zamrooda Jabeen:

Effect of hash functions on speed and security within Bitcoin's proof-of-work (PoW). 724 - Wenjie Wang, Boqin Zhang, Zhao Liu, Ping Zhu:

Dynamic multiple GAN for missing data imputation with awareness of sample distribution and attribute characteristics. 725 - Xin Liu, Xinyuan Guo, Dan Luo, Ji Wang, Shuo Liu, Gang Xu, Xiubo Chen, Xiaohong Li:

Privacy-preserving computation protocol of multi-party sets intersection and union for internet of things environments. 726 - Chen Ouyang, Yi-Wen Zhang:

Multi-objective cloud scheduling based on particle swarm optimization algorithm with deadline and budget constraints. 727 - Yuan Sun, Binyao Ma, Lahuan Li:

Enhanced clustering ensemble method by using improved Hamming distance. 728 - Hufsa Khan

, Muhammad Tahir Rasheed
, Shengli Zhang
:
Illuminating the darkness: experimental review of cutting-edge deep learning techniques for low-light image enhancement. 729 - Junwen Chu, Xiaoxia Han, Jinde Wu, Wenjie Zhang:

Multimodal multi-objective state transition algorithm. 730 - Zhongming Han, Qiwen Hu, Ziying Han, Weijie Yang, Yuqi An:

HHGNN: a novel framework for node influence ranking in heterogeneous networks. 731 - Narinder Verma, Neerendra Kumar, Chaman Verma, Zoltán Illés, Zakir Ahmad Sheikh:

LSFRS: a lightweight framework for efficient and secure communication in IoT-based robotic surveillance. 732 - Zahia Lalama, Lakhdar Goudjil

, Sarra Cherbal, Lemia Louail:
Integration of metaheuristic and machine learning in Cloud-Fog-Edge IoMT applications: a survey. 733 - Hüseyin Küçükerdem

, Cemal Yilmaz
, Hamdi Tolga Kahraman
, Yusuf Sönmez
:
Autonomous control of unmanned aerial vehicles: applications, requirements, challenges. 734 - Tahmina Ehsan, Muhammad Usman Sana, Alvena Ehsan, Mustabeen Aziz, Tahir Khurshaid, Nagwan M. Abdel Samee, Imran Ashraf:

Enhanced security of smart contracts in fog computing: hybrid classifiers and feature selection for improved attack detection for registration and resource access granting. 735 - Mürsel Ozan Incetas, Mahmut Kiliçaslan

:
Image watermarking based on spiking neural networks. 736 - Vinod Kumar Verma, Manpreet Kaur, Klimis S. Ntalianis, Carlos Manuel Moreno, Chao-Tung Yang, Mónica-Karel Huerta, Vimal Rau Aparow:

Sensor enabled internet of things based evaluations on novel pioneering trustworthy accord system. 737 - Wenbin Xie, Shuilang He, Jun Ge, Changwu Li:

Cost-effective edge container deployment strategy. 738 - Md. Alamin Talukder, Mohsin Kazi, Md. Ashraf Uddin:

HARNet: an enhanced deep learning-based human activity recognition model. 739 - Manish Khule

, Deepak Motwani, Dipti Chauhan:
A layered and integrative framework for Advance Persistent Threat detection and mitigation: combining AI, Zero-Trust, and Advanced Threat Intelligence. 740 - Karam M. Sallam, Ibrahim Alrashdi, Ahmed M. Ali

, Ibrahim Radwan, Mohamed Abdel-Basset:
A robust framework utilizing artificial intelligence to enhance services in smart city environments. 741 - Yi-Peng Shang-Guan, Yu-Feng Sun, Jie-Sheng Wang, Yuan-Zheng Gao, Bing Yan:

Zebra optimization algorithm with chaos convergence factor and Gaussian mutation for MLP soft-sensor model of debutanizer column. 742 - Xiangyu Zhao, Zipeng Zhao, Yu Wan, Jun Tang:

Autonomous collaborative rescue of drone swarms in cluttered environments. 743 - Thandava Purandeswar Reddy, Gokarakonda Nikhil Sri Sai Teja, Bhukya Dayanand, A. Swamy Goud, Banavath Balaji Naik, Gopa Bhaumik, Bhabani Shankar Das:

Disaster management with efficient user allocation using quantum-inspired cuckoo search and UAV-edge computing. 744 - Yang Cao

, Xingbang Du
, Jun Yu
, Rui Zhong
, Masaharu Munetomo
:
Dynamic fitness-distance balance competitive swarm optimizer: performance investigation, engineering Simulation, and application in superconductor critical temperature prediction. 745 - Huanqing Cui, Anfu Chang, Kekun Hu, Gang Dong, Jinbin Zhu:

A two-phase streaming edge partitioning algorithm for large-scale uncertain graphs. 746 - Azra Seyyedi, Sina Dortaj, Mahdi Bohlouli, Seyyed Ehsan Nedaaee Oskoee:

Self-organizing topology control in distributed spatial networks: a structural optimization framework. 747 - Mouaad Mohy-Eddine, Kamal Bella, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Youssef Kerfi:

Optimizing abnormal activities in IoT networks using IDS with deep learning and feature engineering. 748 - Umer Nauman

, Miaolei Deng, Yuhong Zhang, Sheheryar Khan:
FSDS-OTS: A quantum-resistant, AI-optimized one-time signature scheme for secure distributed ledgers. 749 - Chaima Derouiche, Abdallah Bensayah, Khadra Bouanane, Oussama Aiadi, Belal Khaldi, Mohammed Lamine Kherfi:

Deep fuzzy clustering neural network (DFC-NN): fast convergence and enhanced clustering performance. 750 - Khalid Elghazi, Bakhouya Mostafa, Hassan Ramchoun, Tawfik Masrour:

Multiobjective pruning for sparse deep neural networks: leveraging L0 regularization on batch normalization scaling factors. 751
Volume 28, Number 12, November 2025
- Feiyang Huang, Ruihan Hu, Qiming Cao, Xiangdong He:

HGN-MAAERL: Hetergeneous graph neighborhood-based multi-agent asynchronous edge reinforcement learning for efficient multiple unmanned vehicles collaboration. 752 - Vinayak A. Telsang, Mahabaleshwar S. Kakkasageri, Anil D. Devangavi, Rajani S. Pujar:

Lattice-based cryptographic technique to preserve data confidentiality in edge computing. 753 - Wenyan Guo, Shenglong Li, Fang Dai, Junfeng Wang, Mengzhen Zhang:

A hybrid-strategy multi-objective grey wolf optimizer based on diversity ranking. 754 - Himani Bhatt, Saurabh Rana, Sudhanshu Shekhar Dubey:

Blockchain-driven decentralized data and access control services for smart grid. 755 - Salwa Shakir Baawi, Mustafa Noaman Kadhim, Dhiah Al-Shammary:

Efficient clustering approach based on Gower distance for high-dimensional medical datasets. 756 - Rahul Yadav, U. Kumaran, V. P. Meena, Wei Li, Guangsheng Feng, Mohamed Abd Elaziz:

Federated deep learning for malware detection and data protection in edge-enabled IoMT. 757 - Takreem Fatima Khan, Swaleha Zubair:

Optimizing lung nodule classification through the integration of image processing and transfer learning techniques. 758 - Sandeep Mahato

, Subrata Dutta:
Ensemble based meta-heuristic optimized approach for network intrusion detection using LightGBM. 759 - Vipin Kumar, Rifaqat Ali, Pawan Kumar Sharma:

HM-6G+: A Secure Real-time E-healthcare Monitoring Framework using Smart-contract over 6G Tactile-internet. 760 - Durai Rajesh Natarajan, Swapna Narla, Sai Sathish Kethu, Sreekar Peddi, Dharma Teja Valivarthi, Purandhar Nandikonda:

Device-aware phishing attack detection in cloud environments using an enhanced DBS-BiLSTM model. 761 - Olfa Ben Rhaiem, Wajdi Farhat, Radhia Zaghdoud, Yahia F. Said:

Securing IoV environments with blockchain-integrated detection systems. 762 - Haruki Kurisaka, Yue Su, Phi Le Nguyen, Kien Nguyen, Hiroo Sekiya:

Performance evaluation of ethereum consensus mechanisms in IoT-blockchain systems using resource-constrained devices. 763 - Hatem Dumlu, Gurcan Yavuz:

Self equation based differential evolution for big optimization. 764 - Changjun Wu, Qingzhen Li, Qiaohua Wang, Huanlong Zhang, Xiaohui Song:

Salp improved Northern Goshawk optimization algorithm and its application to robot path planning. 765 - Yuanzhao Deng

, Yao Jiang, Shuting Zheng, Jixin Ma:
Adams-Bashforth-Moulton optimizer: a novel metaheuristic algorithm for solving engineering optimization problems. 766 - Jingmeng Li, Biying Zhang:

Cloud workload prediction based on wavelet transform noise reduction and a TCN-GRU hybrid model. 767 - Adil Badreddine, Naceur-Eddine Boukezzoula, Tewfik Bekkouche:

Enhancing multimodal biometric security through fundamental transforms and modified sigmoid fusion. 768 - Donghui Dai, Zhendong Wang

, Zhiyuan Zeng, Daojing He, Sammy Chan:
Sand cat swarm optimization combining Adam and Monte Carlo tree search is used to solve complex optimization problems. 769 - Yongquan Zhou, Hongji Huang, Yuanfei Wei, Qifang Luo:

Multi-strategy gorilla troops optimizer for global optimization and 3D UAV path planning. 770 - Fei Qiu, Libo Feng, Jinli Wang:

CABR: a cross-domain authentication method combines blockchain and ring signatures. 771 - Chun-Cheng Lin, Shi-Yu Zhang, Zhen-Yin Annie Chen:

Simplified harmony search: novel algorithm design and its applications in engineering design optimization problems. 772 - Junpeng Cai, Yingbo Wu:

Scheduling dependent-tasks over cloud-edge-end: a mutant Grey Wolf optimization approach with levy flight and random walk. 773 - Majid Mohammadpour, Seyedakbar Mostafavi:

Privacy-preserving federated learning with adaptive resource allocation in internet of things. 774 - Haradhan Ghosh, Pramod Kumar Maurya, Satya Bagchi:

SKAP: secure blockchain-based key agreement protocol for healthcare environment. 775 - Kexin Wu, Yueqin Li, Jixu Sun, Qiurong Qin, Jinlong Li:

An ensemble framework with improved grey wolf optimization algorithm and multi-level feature selection for IoT intrusion detection. 776 - Amina Eldjou, Ilham Kitouni, Zakaria Benmounah, Samir Bennacer:

Enhancing cloud native security: a knowledge graph approach for securing container runtimes. 777 - Da Feng, Jianchang Liu, Haibin Ouyang:

A dual-archive evolutionary algorithm based on multitasking for multimodal multi-objective optimization with local Pareto solutions. 778 - Héctor Martínez, Sandra Catalán, Francisco D. Igual, José R. Herrero, Rafael Rodríguez-Sánchez, Enrique S. Quintana-Ortí:

Cache-aware optimization of matrix multiplication and matrix factorizations on multicore processors. 779 - Ahmed Saidane, Ali El Kamel, Habib Youssef:

MAEL: meta-active semi-supervised ensemble learning model for DDoS attack detection. 780 - Wu Tao, Tang ShanLin, Qizhao Zhou, Xi Chen:

Cloud-edge synergistic MEC multi-task offloading and resource allocation method based on convex optimization. 781 - Muyao Liu, Jinlong Wang, Zhihan Lyu:

A flight delay prediction model featuring a multi-strategy enhanced golf optimization algorithm integrated with LightGBM. 782 - Orieb AbuAlghanam, Hadeel Alazzam

, Wesam Almobaideen:
Hierarchical lightweight intrusion detection system using deep learning in the context of IoT. 783 - Majid Ilchi Ghazaan

, Parnian Mirghazanfari:
Multi-phase ensemble-RBF-assisted differential evolution for high-dimensional expensive optimization. 784 - Xing Zhang, Jun Liang, Ning Chen, Liu Xiang, Lizhuang Tan, Peiying Zhang:

Internet of vehicles task offloading based on edge computing using double deep Q-network. 785 - Yu Peng, Jia Hao, Yang Chen:

Performance prediction and resource adaptive adjustment for cloud-native microservices. 786 - Mengkun Li, Yijie Liu, Ziwei Yang, Xiaoliang Zhu:

Multi-threshold image segmentation based on historical variation self-learning equilibrium optimizer. 787 - Fenhua Bai, Zhilong Jiao, Tao Shen, Kai Zeng, Chi Zhang, Xiaohui Zhang, Bei Gong:

RGCA: a reusable garbled circuit-based authentication for VANETs. 788 - Liyun Su

, Chunquan Pan, Lang Xiong:
Time-mixing broad learning system for predicting multidimensional chaotic time series. 789 - Zeinab Raeisi, Hamid Reza Maleki, Reza Akbari:

An entropy-based multi-objective feature selection method for network intrusion detection. 790 - Binhao Huang, Jian Lv, Ligang Qiang:

A more efficient and transparent product evaluation system: based on an improved LightGBM algorithm and interpretable machine learning methods. 791 - Seyed Salar Sefati, Bahman Arasteh, Simona Halunga, Octavian Fratu:

A comprehensive survey of cybersecurity techniques based on quality of service (QoS) on the Internet of Things (IoT). 792 - Alireza Mahjoub, Madjid Khalilian, Javad Mohammadzadeh

:
The management of energy-aware virtual machine deployment and load balancing using mapping in network-on-chip for cyber-physical systems in cloud computing. 793 - Satish Kumar, J. Sathish Kumar:

Federated blockchain and IPFS based secure interoperable healthcare system. 794 - Ibrahim Obeidat, Rabee Alqura'n, Ala Mughaid, Ala Obeidat:

Adding extra security layer to chatGPT: machine learning based model to detect malicious cybersecurity prompts. 795 - Sajjad Momeny, Mohamad Robatmily, Amir Masoud Rahmani:

Multi-objective optimization for the performance of task scheduling in homogeneous fog networks. 796 - Chao Xu, Jiyuan Cheng, Yong Chen, Jiajia Huang, Defeng Hu:

ACFFSL:a federated few-shot learning framework with contrastive learning and lightweight multi-scale attention. 797 - Hadi Ghahremani, Masumeh Damrudi, Ali Ghaffari, Kamal Jadidy Aval:

ADOPT - the aquila-differential optimizer for efficient task allocation and QoS enhancement in mobile crowdsensing. 798 - Atefeh Nekouie, Majid Vafaei Jahan, Mohammad Hossein Moattar, Reza Sheibani:

Highly-efficient escrow-less blockchain-assisted attribute-based encryption scheme for secure fine-grained medical data sharing in the cloud. 799 - Jiwu Li, Zhiyuan Li, Renjie He, Xiaohua Zhou, Zubin Chen:

Seismic Exploration Optimizer: a novel meta-heuristic algorithm for solving engineering problems. 800 - Yangzhi Lin, Xiaoli Zhao, Zilong Yin:

Dynamic weight federated client selection using adaptive genetic algorithm. 801 - Zhongcheng Wei, Jiacheng Li, Bin Lian, Wei Wang, Jijun Zhao:

Winal: Joint feature fusion and adversarial training for non line of sight WiFi localization. 802 - Anu Priya, Ritu Tiwari, Pooja Agrawal, Sushant Kumar:

A reward shaping approach used for end-to-end mapless navigation using deep reinforcement learning algorithm. 803 - Xingyu Pan, Qihang Liang, Guodong Sun, Shijia Chen, Bo Wu:

Feature Interconnection for Fault Detection with Inaccurate Bounding Boxes. 804 - Yangyang Zheng, Leyi Wang, Jiaying Shen, Xiaoyi Yu, Jialing Hu, Zhaolong Ouyang:

Block-type reinforcement learning based on matrix-based particle swarm optimization for base station deployment. 805 - Ankit Bisht

, Vandana Khaitan
:
Stochastic network model for performance analysis of cloud-fog-enabled intelligent vehicular network. 806 - Jingkun Fan, Yingjuan Jia, Liangdong Qu, Xiaoqin Li:

A novel unmanned combat aerial vehicle path planning method: multi-strategy improved salp swarm algorithm with bi-stage model. 807 - Rahul Singh, Laxminarayan Das:

A smart contract based 6G-enabled authentication framework for cloud-integrated internet of vehicles. 808 - Pengtao Yuan, Shengchao Su, Wenlong Fu:

Deep reinforcement learning with attention mechanisms for edge user allocation in internet of vehicles. 809 - Majid Ayoubi

, Mingchu Li
, Javid Enayat, Abdulgbar A. R. Farea, Lutf Ul Rahman Haqmal:
An adaptive composite service deployment in mobile edge computing using MLP-based DQN. 810 - Zahim Chared, Clément Jantet, Calliste Ravix, Robin Salmi, Ehtesham Hashmi

, Sule Yildirim Yayilgan:
AI-driven detection of hate speech on social media: a case study in the French language. 811 - Kexuan Zong, Jie Zhang:

A novelty method for solving the multi-objective problem of industrial internet of things service placement in fog computing. 812 - V. Sumithra, R. Shashidhara, Singh Akansha:

A secure and blockchain-based approach to TMIS authentication using account bound tokens. 813
Volume 28, Number 13, November 2025
- Zhaojun Zhang, Shun Lu, Jiawei Lu, Simeng Tan, Kuansheng Zou:

Autonomous underwater vehicle 3D path planning based on multiple populations for multiple objectives ant colony optimization. 814 - Xuhui Zhu, Guocan Ma, Vedpal Arya, Pingfan Xia, Tingting Zhu:

A novel dual-archive multi-objective algorithm for hybrid flow shop scheduling problems with missing operations. 815 - Mohamed A. G. Hazber, Abdulrahman Albarrak, Mohammed Altamimi, Anandhavalli Muniasamy, Asharul Islam, Mohammed Altaf Ahmed, Khaled M. Alalayah, Shahid Hussain, Reyazur Rashid Irshad:

A blockchain-enabled edge computing framework leveraging artificial neural network and aquila optimization to enhance security and scalability of cloud-based IoT platforms. 816 - Yongbin Zhao, Cong Men:

Research on multi-key fully homomorphic encryption algorithms suitable for blockchain. 817 - Swagatika Sahoo, Raju Halder, Samrat Mondal:

Anomaly-free federated access control policy enforcement framework for ethereum. 818 - Salah El Hajla

, El Mahfoud Ennaji, Yassine Maleh, Soufyane Mounir:
HFEL: A hybrid federated ensemble learning framework for intrusion detection in IoT networks. 819 - Sepehr Ebrahimi Mood, Alireza Souri, Nihat Inanç, Mu-Yen Chen:

A novel gallop operator for horse herd optimization algorithm: application to feature selection of safety defect prediction in UAV. 820 - Kanchan Namdev, Ranjit Rajak:

Enhancing fork and join based workflow scheduling model in cloud computing. 821 - Antônio Sérgio de S. Vieira, Alisson Barbosa de Souza

, Joaquim Celestino Júnior:
FOFF: an energy-efficient task offloading in VEC-enabled vehicular networks using fuzzy TOPSIS. 822 - Langlang Zhang, Ben Niu, Haisong Huang, Yongpeng Zhao, Jianlin Liu:

AITTAO: an improved triangular topology aggregation optimizer for parameter optimization and real-world problem processing. 823 - Zhengzhi Luo, Yike Han, Yubo Zou, Xin Zhang, Jianing Zhang:

Research on inspection task allocation method of inspection robot based on improved genetic algorithm. 824 - John Agyekum, Somnath Mazumdar, Christoph Scheich:

ADAPT: An effective data-aware multicloud data placement framework. 825 - Heeyong Yoon

, Kang-Wook Chon
, Min-Soo Kim
:
SPATS: a practical system for comparative analysis of spatio-temporal graph neural networks. 826 - Ghada Al-Mukhaini, Mohammed Anbar, Selvakumar Manickam, Tamarah A. Shurbaji:

Optimized feature selection for IoT intrusion detection using firefly and Harris Hawk Optimization algorithms with a new multi-objective fitness function. 827 - Safae Rbihou, Houssam Hamdouch, Nour-Eddine Joudar, Khalid Haddouch:

Optimal parameter tuning in continuous hopfield neural networks using an exact approach. 828 - Bharath Kumar Reddy Soma Venkata, Ummadisetty Sreenivasulu, Ramesh Potluri, N. V. L. M. Krishna Munagala, Santosh Kumar Velagala:

Fortifying the future of connectivity: cutting-edge Resi-PAN model for advanced intrusion detection and classification in 6G networks. 829 - Mahmoud Darwich, Magdy A. Bayoumi:

Utilizing generative adversarial networks (GANs) for realistic video stream augmentation and enhancement. 830 - Kyrian Adimora

, Sai Rithvik Gundla, Hongyang Sun:
Machine learning approaches for optimizing high-performance computing scheduling: a comprehensive survey and analysis. 831 - Muhammed Tmeizeh, Carlos Rodríguez-Domínguez, María Visitación Hurtado-Torres:

Optimizing blockchain file storage: enhancing performance and reducing ledger size with adaptive compression and advanced data structures. 832 - Iqra Jan, Shabir Sofi:

Resource aware medical IoT data management system using Social IoT based edge computing. 833 - Kolluru Suresh Babu, R. Srilakshmi, Suneetha Davuluri, Venugopal Boppana, Sanjay Gandhi Gundabatini, Sri Hari Nallamala:

Optimizing security and performance in NOMA networks using machine learning. 834 - Luyao Yang, Jinyong Chang, Yuhang Zhang, Yurong Liu:

The hybrid-encryption-based data sharing scheme with keyword-based auditing function in cloud storage setting. 835 - Jiaxing Chen, Xiaoqian Liu, Jiaqi Liu, Mengnan Hao, Zhihua Liu:

Full-coverage obstacle avoidance path planning based on RF-SMO for AUV in irregular regions. 836 - Yan Che, Jiaxin Wang, Abdelazim G. Hussien, Shuang Wang, Rong Zheng:

ESHO: improved seahorse optimization using restart and adaptive mutation strategies. 837 - Wael Khalafalla, Wen-Xing Zhu, Ahmed Elkhalil, Chenyang Yan:

An efficient cross-domain mutual authentication scheme for heterogeneous signcryption in VANETs. 838 - Jaber Pournazari, Amjad Ullah, Ahmed Al-Dubai, Xiaodong Liu:

Computation offloading in the edge-to-cloud compute continuum: a survey of federated architectural solutions. 839 - Vandana Dharmapuri

, Sushama Rani Dutta:
A novel fine-grained intelligent framework for mitigating cyber-attacks through hybrid chaos-triggered tasmanian devil feature optimization and feedforward learning networks. 840 - Xuwei Du, Peng Yao, Qilin Wang, Xiang Liu, Mingwu Hao, Dongkai Chu, Shuoshuo Qu:

Improved Harris Hawk optimization for multilevel thresholding image segmentation. 841 - Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim, In Seop Na, Vaibhav Markandey:

PURKAA: privacy ensured game-based task of floading for mobile blockchains. 842 - Satish Chaurasiya, Neelu Nihalani:

Enhanced multimodal medical image fusion using adaptive channel regularized attention mechanism with convolutional neural network. 843 - Banavath Balaji Naik, Md. Sarfaraj Alam Ansari:

Level-wise earliest finish time based workflow scheduling for heterogeneous computing systems. 844 - Hui Zeng, Qiang Cui, Xiaohui Huang, Xuewei Duan:

ASTE: adaptive spatial-temporal enhanced graph convolution network for traffic flow prediction. 845 - Jiangkun Lin, Shouheng Tuo:

PLMCCL-TP: The protein language model and clustering method based on contrastive learning applied to the multifunctional therapeutic peptide identification model. 846 - Seyed Hossein Ahmadpanah, Meghdad Mirabi, Amir Sahafi, Seyed Hossein Erfani:

FlexiMigrate: enhancing live container migration in heterogeneous computing environments. 847 - Ali Gunduz

, Sibel Senan, Zeynep Gürkas Aydin
:
A hybrid DECSO algorithm for efficient multi objective task scheduling in cloud computing environments. 848 - Bankapalli Jyothi, Sumalatha Lingamgunta, Suneetha Eluri:

Unstructured data clustering based on layer improved transformer features connected with deep neural network-based adaptive clustering. 849 - Yuan Ju Teoh, Huo-Chong Ling

, Wei Kitt Wong, Ing Ming Chew, Thomas Anung Basuki
, Hezerul Abdul Karim:
A robust SVD-based watermarking scheme using orthogonal vectors and PSO-enhanced scaling factor. 850 - Xiuli Xu, Rui Wang, Yonghua Zhang:

Optimization analysis of scheduling strategy for cloud storage architecture based on hierarchical service mechanism. 851 - Darya Azharshokoufeh, Nahideh Derakhshanfard, Ali Ghaffari:

FICAD: federated learning-based clustering for IoT data aggregation. 852 - Ali El Romeh

, Václav Snásel
, Seyedali Mirjalili
:
Dholes-inspired optimization (DIO): a nature-inspired algorithm for engineering optimization problems. 853 - Muhammad Sajid, Kaleem Razzaq Malik, Ali Haider Khan, Muhammad Fuzail, Jianqiang Li:

TVAE-3D: Efficient multi-view 3D shape reconstruction with diffusion models and transformer based VAE. 854 - Talin Azarian

, Meisam Yadollahzadeh Tabari, Seyed Yaser Bozorgi Rad:
CBA-HDL: A hybrid deep learning model for scalable and efficient cloud workload forecasting with enhanced accuracy. 855 - Muqadar Ali, Hongjie He, Abid Hussain, Mao Niaxiong, Mehboob Hussain:

Towards verifiable updatable attribute-based Boolean keywords search sharing of PHRs in cloud environment. 856 - Qingzhou Chen, Liguo Yao, Taihua Zhang, Yao Lu, Zhenggong Han, Han Zhao:

Multi-strategy improved Parrot optimization for feature engineering in machine learning. 857 - Dong Chen, Wuyin Jin, Zhiyuan Rui, Lan Luo, Jiazhen Li, Wentao Wang:

A novel hybrid improved Dung beetle optimization algorithm for robotic arm obstacle avoidance planning. 858 - Anupam Yadav, Ashish Sharma:

Enhancing cloud orchestration using hybrid scheduling for QoS-aware and energy-efficient task allocation. 859 - Dario Muñoz-Muñoz, Félix García Carballeira, Diego Camarmas-Alonso

, Alejandro Calderón Mateos
, Jesús Carretero:
Malleability and fault tolerance in ad-hoc parallel file systems. 860 - Xiang Fu, Qianfeng Ruan, Maojia Tang, Jiaqi Wan, Zitai Xiao, Yipeng Yin, Xilong Zhang, Tianqi Yang:

Research on path planning of intelligent vehicle integrated with adjacent vehicle prediction. 861 - Mohamed Hedi Djemaa

, Farah Jemili
, Imen Megdiche
, Rafika Thabet
, Elyes Lamine
, Ouajdi Korbaa
:
Improved human activity recognition through controllable GAN-Generated synthetic data and large Language models for classification. 862 - Xijun Zhang, Ziyao Xia, Hong Zhang, Xianli Zhang:

Spatial-temporal fusion short-term traffic flow prediction model based on mode decomposition algorithm. 863 - Hongchen Wu, Zhaorong Jing, Xiaochang Fang, Hongxuan Li, Meng Li, Hongzhu Yu, Bing Yu, Huaxiang Zhang:

Combating deepfakes: an entropy-aware framework for detecting forged visual and textual information. 864 - Laleh Khajehzadeh, Hamid Barati, Ali Barati:

L2AI: lightweight three-factor authentication and authorization in an IoMT blockchain-based environment with unsecure channel communication. 865 - Haifeng Yuan, Xiaoli Qin, Anshun Zhou, Yanzhao Tian:

A data sharing scheme for IoT devices based on blockchain and zk-SNARK. 866 - Mahmoud Darwich, Magdy A. Bayoumi:

Enhancing personalized video streaming through contextual information and support for emerging video formats. 867 - Esraa Al-Daom, Bilal H. Abed-alguni:

BIARO: an improved artificial rabbit optimization algorithm for feature selection in high-dimensional data. 868 - Zhao Xu, Zhiyang Jia, Xu Kang, Yichang Li, Luyu Tian, Jiakang Liu:

SS-DDPM: A novel denoising diffusion probabilistic model for industrial sensor signal data augmentation. 869 - Hamid Moradi, Seyed Ahmad Shayannia, Amir Gholam Abri, Mehdi Amirmiandaragh:

A new design of an IoT-based industrial data management for smart manufacturing based on quantum circuits. 870 - M. Faruk Sahin, Ferzat Anka

:
Metaheuristics role in image processing and computer vision applications: a comprehensive review. 871 - Ziyu Guan

, Chenhua Liu, Tao Wang
, Haomin Cui, Changjiang Ren, Changhai Qin:
Multi-strategy evolutionary enhanced particle swarm optimizer with adaptive morphology for engineering example. 872 - Ansam Khraisat, Md. Alamin Talukder, Md. Ashraf Uddin, Ammar Alazab:

RF-FedAvg: Federated learning-based random forest model for intrusion detection in wireless sensor networks. 873 - Jafar Ahmad Abed Alzubi, Omar A. Alzubi, Issa Qiqieh:

A feature-learning-enabled malware analysis for enhanced IoT-centric cybersecurity. 874
Volume 28, Number 14, November 2025
- Mays Alshaikhli, Somaya Al-Máadeed, Moutaz Saleh:

Enhancing fairness and scalability in IOTA tangle networks: a POMDP-based tip selection algorithm for decentralized systems. 875 - Shanwen Hu, Linkai Zhu, Zeyu Zhang, Yukun Zheng, Maoyi Huang, Changpu Meng:

Adaptive DNS resolution via cross-chain blockchain: advancing scalability and interoperability. 876 - Yu Liu

, Li Fu, Penghui Ma:
ServerlessPGO: enhancing serverless cold starts through PGO. 877 - Salahuddin Unar, Mobeen Nazar, Farooque Hassan Kumbhar, Salah-ud-din Khokhar, Delanyo Kwame Bensah Kulevome, Ahmed Elkhalil:

A conflict-aware learning network in generative models for enhancing retrieval efficiency of remote sensing images. 878 - Maryam Masihi, Amin Mehranzadeh, Hamid Barati, Ali Barati, Mohsen Chekin:

Proposing a dynamic clustering algorithm to improve routing performance in the Internet of Things. 879 - Bin Zhuge, Tingting Pan, Qianye Ren, Zitian Zhang, Ligang Dong, Xian Jiang:

Data resource scheduling strategy based on improved sparrow search algorithm. 880 - Lei Zheng, Lifeng Wang, Zheng Wang:

A novel model for failure mode and effect analysis based on K-means clustering under a T-spherical fuzzy environment. 881 - Shaohui Ren, Tao Sun, Qingrui Yu, Jun Wang, Yingzhuo Liu, Wenhui Huang:

ASPSO: an adaptive acceleration coefficient particle swarm optimization algorithm with sigmoid inertia weight. 882 - Gangjie Song, Wanzhi Ma:

Impact of VR educational games on users: a classification algorithm based on EEG signal feature extraction. 883 - Akshya Jothi, M. Sundarrajan, R. Vijayakumar

, Rajesh Kumar Dhanaraj, Anand Nayyar:
Explainable AI-driven intrusion detection for securing IoT-enabled autonomous transportation systems. 884 - Xiongfa Mai, Yan Zhong, Li-Bin Liu, Han-Bin Liu:

A new quantum differential squirrel search algorithm for global optimization problem. 885 - Feiyan Guo, Xiaoqing Luo, Xingshu Liu, Yangkun Luo:

A mobility-aware task offloading approach for vehicles in cloud-edge collaborative environments. 886 - Jinsheng Wang, Bo Liao, Fangxiang Wu, Zhihao Jiang, Changsong Shen:

Improving traffic flow forecasting with variational mode decomposition and deep learning-based prediction models. 887 - Miftah Bedru Jamal, Muhammad Adil, Danish Javeed, Yaping Zhao:

An intelligent light-weight intrusion detection system for edge-centric smart logistics system. 888 - Catherine Alessandra Torres Charles, Dante D. Sánchez-Gallegos, José Luis González Compeán, Miguel Morales-Sandoval, Jesús Carretero:

Xook-Sec: A policy-as-code framework for secure data-sharing on the computing continuum. 889 - Zohaib Hassan, Wajahat Anwaar Bukhari, Ammar Sikander, Umair Bashir, Hassaan Malik:

Intrusion detection and classification using deep belief networks with feature reduction. 890 - Wu Wang, Fouzi Harrou, Sidi-Mohammed Senouci, Ying Sun:

Improving cyber-attack detection in Internet of Medical Things using ensemble deep learning methods. 891 - Liangjun Deng

, Qi Zhong, Yao Qiu, Jingxue Chen, Hang Lei, Shunkun Yang, Liming Zhou, Hongyuan Cheng:
LLM-based program analysis for source codes, abstract syntax trees and webassembly instructions. 892 - Salman Ali, Faisal Anwer:

A secure framework for IoT-based medical sensors data using homomorphic elliptic curve cryptography. 893 - Sarra Abidi, Imen Chebbi, Leila Ben Ayed, Chirine Ghedira Guegan:

PAM-SHRM: pretrained artificial intelligence model based on microservices for secure healthcare recommendation systems. 894 - Neeraj Kumar, Rifaqat Ali:

Smart-FIoT: A smart contract based efficient authentication framework for forensics IoT. 895 - Apoorv Bedmutha, A. Anjali, Aditya Trivedi:

Securing the private smart home: lightweight digital certificates for resource-constrained IoT networks. 896 - Gubao Mao, Xianwen Fang, Xiwei Zhang:

A multiattribute fusion-based deep neural collaborative filtering model for predicting next process activities. 897 - M. Prakash, K. Ramesh:

Blockchain-enabled decentralized lightweight authentication scheme with dynamic difficulty adjustment using ECC for IoT networks. 898 - Rajesh Kumar

, Deepak Sinwar
, Vijander Singh
:
QoS-aware user association and RAT selection mechanism in 5G flow networks. 899 - Gurpreet Singh Chhabra, Satish Kumar Satti, Goluguri N. V. Rajareddy, Abhijeet Mahapatra, Gondi Lakshmeeswari, Kaushik Mishra:

Time-and-Traffic-aware collaborative task offloading with service caching-replacement in cloud-assisted mobile edge computing. 900 - Zeynab Mottaghinia

, Mohammad-Reza Feizi-Derakhshi
, Pedram Salehpour:
TopicFFCA: A short-text topic-detection approach by fuzzy formal concept analysis. 901 - Assala Nacef, Djamila Mechta, Lina Benchikh, Lemia Louail, Saad Harous, Raouf Belmahdi:

A quantum genetic-based routing protocol for real-time peer-to-peer energy transactions. 902 - Guoliang Zhao, Wei Li, Yazhi Liu, Haizhen Qi:

An efficient intrusion detection method based on Rime-NeoEvo Optimizer algorithm. 903 - Chuanjun Zhao, Xuzhuang Sun, Xinyi Yang, Lu Kang, Lihua Shen, Jing Gao, Yanjie Wang:

Enhancing multi-source cross-domain sentiment classification with generative adversarial networks and transfer learning. 904 - Varsha Kumari, Chapram Sudhakar:

Efficient deadline-aware Non-Clairvoyant bag-of-tasks scheduling for edge computing using an enhanced SPEA2. 905 - Sait Alp, Rahim Dehkharghani, Taymaz Akan:

C-MOBRO: constrained multi-objective Battle Royale Optimization algorithm. 906 - B. Selvakumar

, B. Lakshmanan
, J. R. Simeon, P. Ajith Kumar:
Feature selection using feature fusion based weighted multi objective Grey Wolf Optimization for network intrusion detection system. 907 - Xiao Zheng, Muhammad Tahir, Jaroslav Frnda, Muhammad Shahid Anwar, Ahyoung Choi, Rajesh Kumar:

Computation offloading based on incomplete information in edge computing networks. 908 - Shoulu Hou, Min Gan, Yaru Zhao, Kailan Zhao, Qiang Tong, Xiulei Liu:

Affinity-aware dynamic request allocation for SDN-based edge computing. 909 - Imene Charabi, M'hamed Bilal Abidine

, Belkacem Fergani, Mourad Oussalah:
DeepF-SVM: A new hybrid deep learning model for enhanced sensor-based human activity recognition. 910 - Meiqi Zhang, Xingbao Gao, Mengnan Tian:

Progressive learning particle swarm optimization algorithm. 911 - Jiaming Gong, HaoJi Xia, Jinyan Cao:

A new model to evaluate the success of service composition method in cloud-based IoT systems using an enhanced swarm-based optimization algorithm. 912 - Daniel Blanco-Aza, Antonio Robles-Gómez, Rafael Pastor Vargas, Llanos Tobarra, Pedro Vidal-Balboa, Mariano Méndez-Suárez

:
Comprehensive AI-driven privacy risk assessment in mobile apps and social networks. 914 - Zhengkun Zhang, Yunqi Fu, Changfeng Zhu, Zhiqiang Tian, Yuxing Jiang, Jinxiu Jia:

Research on optimization of urban rail transit train operation plans under skip-stop and overtaking mode. 915 - Hang Lin, Lijuan Zhang, Lei Lei, Xiaoqin Song, Shihong Zhao:

A potential field-based critical probabilistic roadmap path plan algorithm for narrow passages. 916 - Sara Rezaei, Salman Goli-Bidgoli:

Pervasive QoS-aware service composition: a systematic review. 917 - Saurabh Jain, Aryan Agarwal, Manjeet Pathak, Rajesh Doriya:

Enhanced block chain and IPFS based secure storage and sharing of electronic healthcare records. 918 - Zhijie Han, Ningwen Wei, Ying Du:

LyMADDPG: resource optimization and task scheduling strategy for multi-MEC collaboration based on Lyapunov optimization. 919 - Reyhane Ghafari, Najme Mansouri:

Deadline-Aware and Priority-Driven scheduling for IoT tasks in Fog-Cloud systems using reinforcement learning. 920 - Nour El Houda Boubaker, Karim Zarour, Nawal Guermouche, Djamel Benmerzoug:

Heuristic-based DQN for sensitive task-aware partial workflow offloading and migration. 921 - Ruxin Zhao, Hongtan Zhang, Chang Liu, Lixiang Fu, Jiajie Kang, Yang Shi, Chao Jiang:

Ant colony optimization using eight-neighborhood search with dual pheromone updating strategy and continuous image edge generation strategy for license plate recognition. 922 - Longjiang Li, Tianle Shao, Jianjun Yang, Rong Jia:

Token reordering-based compression for efficient location information sharing in flying ad hoc networks. 923 - Arif Husen, Shafaq Nisar, Muhammad Hasanain Chaudary, Zuhaib Ashfaq Khan:

Holistic interference management for wireless networks in the era of artificial intelligence. 924 - Xinlei Tan, Fupei Wu, Yuchen Li

, Weilin Ye:
ACUM and ATUM: adaptive multi-pixel aggregation upsample modules for lightweight arbitrary scale super-resolution. 925 - Kalyan Gattupalli, Venkata Surya Bhavana Harish Gollavilli, Harikumar Nagarajan, Poovendran Alagarsundaram, Surendar Rama Sitaraman, Haris M. Khalid:

Privacy preserved api access control policy- based ransomware attack detection in cloud vms using sl2stm. 926 - Amjad Rehman, Muhammad Mujahid, Tanzila Saba, Noor Ayesha, Faten S. Alamri:

Multi-label malicious cybersecurity attack detection to secure internet of things devices using MADA and synthetic deep algorithm. 927 - Lalit Kumar Vashishtha, Kakali Chatterjee, Pranav Pant:

Optimising intrusion detection systems: a hybrid approach with ensemble machine learning models. 928 - Peter Tettey Yamak, Yujian Li, Ting Zhang, Muhammad Salman Pathan:

Kolmogorov-Arnold networks for time series forecasting: a comprehensive review. 929 - Mengge Fang, Haize Hu, Silun Liao:

Effective code pre-processing model for code search. 930 - Zhixin Xie, Ying Su, Guangbiao Liu, Yishi Yang:

Reinforcement learning-based framework for real-time task scheduling in IoT-Fog-Cloud environments. 931 - Xuandong Zhao, Wei Wu:

Enhancing lane line detection transformer with frequency-assisted attention. 932 - Hao Wei, Xabiel García Pañeda, Joaquin Salvachua Rodriguez:

Optimizing machine learning operations in multi-cloud infrastructure: a framework for unified deployment management and topology discovery. 933 - Somayeh Rahmani, Vahid Khajehvand, Mohsen Torabian:

Reinforcement learning for efficient VM reallocation: A novel approach for sustainable cloud computing. 934 - Huangzhi Xia, Linqi Sun, Huanghui Xia, Seyedali Mirjalili:

3D path planning in complex mountainous environments for UAVs using quaternion-based dung beetle optimizer. 935 - Zahra Nasiri Aghdam, Ali Rezaee, Amir Masoud Rahmani, Mehdi Hosseinzadeh:

Evolutionary-based hybrid classical-fuzzy heuristic protocol for real-time data availability of IoHT devices in cloud-fog computing. 936 - Alexander Golovin, Alexander S. Rumyantsev

, Srinivas R. Chakravarthy:
Regenerative exact simulation for multiserver job model. 937 - Juan Jesús Losada Del Olmo

, Emilio Pardo Ballesteros, Ángel Luis Perales Gómez
, Pedro E. López-de-Teruel
, Alberto Ruiz
, Félix J. García Clemente
:
Fog computing-driven logistics: leveraging few-shot learning and foundational computer vision models. 938 - Kouchi Sana, Hassina Nacer, Hachem Slimani:

QoS-aware multi-objective SaaS selection system in cloud computing using intelligent learning algorithm. 939
Volume 28, Number 15, December 2025
- Yago de Rezende dos Santos, Nicollas Rodrigues de Oliveira, Guilherme N. N. Barbosa, Lúcio Henrik A. Reis, Ana Carolina Rocha Mendes, Marcela T. de Oliveira

, Dianne S. V. Medeiros, Diogo M. F. Mattos:
Decentralized security in blockchain-based digital health systems: self-sovereign identity, access control, and auditing with smart contracts. 940 - Rayan G. Lima, Evandro L. C. Macedo, Thiago Pereira da Silva, Flávia Coimbra Delicato, Paulo F. Pires, Thaís Vasconcelos Batista, Antonio A. de A. Rocha:

HEART-2: High Efficient Auction-based Resource allocation Through layer-2 blockchain. 941 - Carlo Mazzocca, Alessio Mora, Nicolò Romandini, Rebecca Montanari, Paolo Bellavista:

I Trained That! Client-Side Proof of Participation in Federated Learning. 942 - B. Swathi, R. Praneetha Sree:

Systematic literature review of Blockchain-enhanced privacy in fog computing networks. 943 - Mohammad Qasim, Mohammad Sajid, Maria Lapina, Mohammad Shahid:

COBGA: MCDM-assisted improved genetic algorithm for scheduling Industrial-Internet-of-Things jobs in cloud computing. 944 - Umang Garg

, Preeti Mishra
, Neha Gupta, Emmanuel S. Pilli:
IoT botnets Unveiled: architectural analysis, threat vectors, and cutting-edge detection techniques. 945 - Yulong Guan

, Zhen Wu, Hui Yang, Hongyuan Cheng:
A JPEG compressed image encryption method based on Shamir secret sharing scheme. 946 - Fan Ding, Lizhi Lv, Meng Zhou, Rui Zhang:

A hybrid dung beetle optimization algorithm with improved weak cooperation for multi-objective workflow scheduling in heterogeneous cloud environments. 947 - Feriel Abbes, Souha Bennani, Ahmed Maalel:

A generative AI model for enhancing learner's skills in a gamified learning environment. 948 - Rahaf A. Alhazaymeh, Mostafa Z. Ali:

Automated question generation for Arabic language. 949 - Huajun Di, Shi Dong:

Data sharing mechanism for logistics supply chain based on blockchain shard distribution. 950 - Junji Li, Feng Hu, Hui Du, Lin Li, Zelin Zhang:

DCN-based cross-dimensional feature interaction for smart contract vulnerability detection. 951 - Ayman Odeh

, Haythem Bany Salameh, Ghaleb Elrefae:
A high-accuracy classification model for AI-generated and AI-paraphrased texts. 952 - Chang-Yin Luo, Cong-Qiang Zhang, Feng-Jun Li, Xue-Bin Chen, Qi Dai:

FedDCS: the role of sign and basic sparsity properties in federated learning. 953 - Haiqian Niu, Xing Zhang, Wei Shi:

BAMF: blockchain-assisted matrix factorization for recommender systems. 954 - Xin Yang, Zhendong Wang, Shuxin Yang, Dahai Li, Sammy Chan:

A knowledge distillation-based lightweight intrusion detection method for the Internet of Things. 955 - Ashutosh Shankhdhar, Hitendra Garg:

Blockchain-enabled secure data transmission for personalized e-healthcare and digital twin well-being. 956 - Yufeng Chen, Jian Wang, Yi Chen, Ali Asghar Heidari, Lei Liu, Mingjing Wang, Huiling Chen:

Exponential distribution optimizer for improving multiple strategies in feature selection. 957 - Huanlong Zhang, Qingzhen Li, Changjun Wu, Yanfeng Wang, Heng Liu, Huan Yuan:

Path planning for electricity inspection UAV based on elite differential variance improved northern goshawk optimisation algorithm. 958 - Xiaoming Song, Guodong Li, Wenxia Xu, Wenjie Li:

Design of a pixel-sensitive transfer encryption algorithm based on a novel three-dimensional sine-cosine chaotic system. 959 - Mohammed Elhajj, Ali El Attar, Ahmad Mikati:

Integrating IoT and blockchain for smart urban energy management: enhancing sustainability through real-time monitoring and optimization. 960 - Chunxiang Zheng, Lin Chen, Jiadong Dong, Zhaoxiang Wang, Qinghu Guo, Feihu Sang:

Hierarchical optimization method for industrial task offloading and resource allocation in multi-server edge computing. 961 - Yihong Bai, Dong Zhao, Helong Yu, Ali Asghar Heidari, Zhennao Cai, Lei Liu, Huiling Chen:

Enhanced sine cosine algorithm for multi-threshold image segmentation: a breast cancer pathology image study. 962 - Yuzhen Zhang, Xuhui Zhao, Ming Liu, Jianghui Liu, Ruijuan Zheng:

A cloud edge resources scheduling method based on reinforcement learning in industrial internet of things. 963 - Baoqi Zhao, Xiong Yang

, Hoileong Lee
, Bowen Dong:
An improved educational competition optimizer with multi-covariance learning operators for global optimization problems. 964 - Munish Saini, Eshan Sengupta

, Harsh Sharma
, Suraaj Thakur:
Artificial intelligence assisted framework for detecting offensive posters on the premises of educational institutions. 965 - Sana Saeed, Kashif Bilal, Junaid Shuja, Abdallah Namoun, Isa Ali Ibrahim:

Feature-centric mobile applications clustering using GPT-3 enabled context enrichment. 966 - Bashar Al-Shboul, Ali Qaqour, Hani Bani-Salameh

, Khaled Almakadmeh:
Transforming natural language into code: advancing automated code synthesis for software development. 967 - Xin Xie, Hanxin Zheng, Kexuan Liu, Xingpeng Zheng, Xuebo Cheng, Tao Wan:

Uniform regularization and contrastive learning to mitigate the long-tail effect of recommendation algorithms. 968 - Ze Deng, Xiang Li, Lizhe Wang, Wei Qi:

A learned index for continuous range queries over streaming data. 969 - Mbarek Marwan, Yassine Afoudi, Safae Hmaidi, Abdelkarim Ait Temghart

, Mohamed Lazaar:
Optimizing data caching and placement in next-generation data centers using transformer and probabilistic matrix factorization. 970 - Li Lv, Hong-Wei Tan, Renbin Xiao, Jeng-Shyang Pan, Hui Wang, Ivan Lee:

Density peaks clustering algorithm with neighborhood optimization and micro-cluster merging. 971 - Faming Gong, Hao Wang, Chengze Du, Junjie Hao, Jingcheng Gao:

LLM-TFNet: a method of production prediction on electric submersible pump wells based on large language model. 972 - Khaled Houssam Mahfouz

, Mohammed Azmi Al-Betar, Sharif Naser Makhadmeh, Qusai Yousef Shambour:
Mitigating the task scheduling Problem in fog computing environments using marine predators optimization algorithm. 973 - Wei Gan

, Zhou Du, Hongye Li, Yingdi Sun:
Multi-objective optimization based on filtering preprocessing and Near-Optimal individual learning Strategy. 974 - Mahdi Bazargani, Sina Tarkesh Esfahani, Behnam Heidari, Reza Hosseinzadeh Shabestary, Mohammadreza Forghani

:
AFedSLL-LDL: a framework based-on federated self-supervised learning and lightweight deep learning for attack detection in serverless edge computing. 975 - Kannan Srinivasan, Guman Singh Chauhan, Rahul Jadon, Rajababu Budda, Venkata Surya Teja Gollapalli, Joseph Bamidele Awotunde:

Federated meta heuristic cryptography algorithm with fuzzy logic model in cloud secure data migration. 976 - Raid Boudi, Mohammed Lalou, Nardjes Bouchemal:

PSO-HSL: A controller placement strategy using PSO with heterogeneous switch load awareness in SD-IoT. 977 - Ho Viet Duc Luong

, Huynh Thi Thanh Binh
, Nguyen Thi My Binh
, Trinh Van Chien
:
Mobile device-target association optimization for connectivity enhancement in wireless IoT sensor networks. 978 - Xuance Wang, Hao Liu

:
An improved pied kingfisher optimization algorithm based on multi-strategies for numerical and engineering problems. 979 - Mohammed Al-Refai, Shahed Alkhaza'leh, Ahmad AlZu'bi:

Federated deep learning with clustering-based aggregation for medical diagnosis. 980 - Daniel Arockiam

, S. Dinesh Krishnan
, Dyagala Naga Sudha, Balamurugan Balusamy, Anand Nayyar:
A novel optimized hybrid deep learning model for intrusion detection in software defined internet of things (SDIoT) environment. 981 - Shilin Yu, Yuantao Song:

Multi-category multi-objective ripple spreading algorithm for solving emergency facility location-routing problem with failure risk. 982 - Alexander Neulinger

, Lukas Sparer
:
Fostering AI alignment through blockchain, proof of personhood and zero knowledge proofs. 983 - William Maas, Arthur Francisco Lorenzon:

Exploring cloud instance options for optimal performance-cost efficiency. 984 - Xian Yu, Yinxin Bao, Quan Shi:

GraphSAGE-based spatial-temporal synchronous traffic forecasting network considering sensorless roads. 985 - Salih Turk

, Ahmet Coskunçay
:
A comparative study of Kolmogorov-Arnold networks and multilayer perceptrons for software defect prediction with SHAP analysis. 986 - Seyed Hossein Ahmadpanah, Meghdad Mirabi, Amir Sahafi, Seyed Hossein Erfani:

ATLAS: adaptive threat-learning algorithm for secure container migration in heterogeneous multi-cloud environments. 987 - Bhaumikaditya Guleria, Maroti Deshmukh, Rakhi Nautiyal:

IDS-LAD: Intrusion detection system using logical analysis of data. 988 - Akhilesh Chauhan, Neeraj Kumar Pandey

, Manoj Diwakar, Prabhishek Singh, Amit Kumar Mishra:
A survey of deep reinforcement learning techniques for Energy-efficient green cloud computing. 989 - Amardeep Kumar, Danish Ali Khan, Ruhul Amin:

Detecting application layer DDoS attacks with RSPF: A hybrid ensemble learning approach. 990 - Chengang Dong

, Yongkang Ding, Jianwei Hu:
GCAM-Inst: real-time instance segmentation via global contextual modeling. 991 - Salam Tabet, Kareem Bouakl, Ayman I. Kayssi, Imad H. Elhajj:

No shadow left behind: diminishing shadows for enhancing privacy guarantees in mixed reality. 992 - Shalini Gupta

, Anand Nayyar, Nitish:
Enhancing color image encryption scheme with a chaotic map and Fibonacci transform. 993 - Motahare Ebrahimi, Nastooh Taheri Javan

, Seyedakbar Mostafavi, Fatemeh Pakzaban:
Trustworthy mobile edge caching: a blockchain approach to mitigate malicious nodes and incentivize cache sharing. 994 - Ritu Rai, Jyoti Grover:

Detecting cyberattacks in CAN bus: a hybrid IDS with sequential feature learning and deep learning. 995 - Radwan Selo, Majid Kundroo, Taehong Kim:

Impact of network topologies on decentralized federated learning. 996 - Ala Abdulsalam Alarood, Mohammed Salem Atoum, Azizah Abdul Manaf, Adamu I. Abubakar, Izzat Alsmadi:

Enhanced obstacle detection using bilateral vision-aided transformer neural network for visually impaired persons. 997 - Lulu Chen, Tianbao Liu, Pengfei Zhao, Baohe Yuan, Yilong Hu:

Peregrine falcon predation algorithm: a better solution to multiple engineering problems and lithium-ion battery model parameter identification problem. 998 - Libo Zhu, Hongbin Song, Xiang Chen:

Dynamic privacy budget allocation for enhanced differential privacy in federated learning. 999 - Abderrahim Rafae

, Aicha Aiche
, Mohammed Erritali
:
Mitigating insider threats: a trust-based security framework for energy grid plants with dynamic authentication and role-based training. 1000 - Suhua Chen, Xu Fang:

Enhancing security in IoT-fog environments with a hybrid deep learning intrusion detection system. 1001 - Chunyu Lu, Tianran Chen, Duo Shang, Jun Luo, Xin Hui, Ruhui Shi:

Visual relation-aware and knowledge-guided multi-modal relation extraction. 1002 - Farzaneh Rastegar, Mahdi Ramezani, MohammadAmin Fazli, Jafar Habibi:

Cache-aware task and workflow ensemble scheduling in edge-based infrastructures. 1003 - Chung-Nan Tsai, Jingnan Xie

, Chun-Ming Lai, Ching-Sheng Lin:
Leveraging Intra- and Inter-References in vulnerability detection using Multi-Agent collaboration based on LLMs. 1004 - Meihong Yang, Xiaoli Wang, Binlei Cai, Yinglong Wang, Ying Guo:

Full stack optimization of microservice architecture: systematic review and research opportunity. 1005 - Guangsheng Tu, Wenchao Liu, Yongjun Kong, Xiaoyuan Yang, Fan Zhang:

Dynamic multi-key FHE from LWE under new working mode. 1006 - Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Saadi Boudjit, Mohamed Hadded, Paul Muhlethaler:

A blockchain-based framework for secure data sharing and access control using IPFS and ECC. 1007 - Mohammed Tayebi, Said El Kafhali:

Enhancing IoT security with advanced GAN architectures for cyberattacks detection. 1008
Volume 28, Number 16, December 2025
- Yongchao Xing, Weipan Yang, Jiaxuan Yin, Dianhui Chu, Zhiying Tu:

MBST: a bad smells testbed for microservice systems. 1009 - Nithya Nedungadi, Sriram Sankaran, Krishnashree Achuthan:

Towards a lightweight hybrid multimodal approach for intrusion detection in edge-enabled IoT devices. 1010 - P. Karthikeyan, K. Brindha:

FogChainFlow: On-off blockchain data management for optimizing IoT healthcare. 1011 - Abdelkader Bouguessa, Sid Ahmed Mokhtar Mostefaoui, Mohamed Amine Daoud

, Abdelkader Alem, Said Mekroussi, Moustafa Maasakri, Ahmed Hasan:
TBAC-IDS: enhancing intrusion detection with transformer-based alerts correlation. 1012 - Danilo Magliarisi, Emiliano Casalicchio, Vincenzo Salvatore:

Orbit-aware task scheduling in satellite edge computing. 1013 - Rashed Alnuman, Tayyab Sajid, Wesam Almobaideen, Qusai Hasan:

Ensemble multi-label machine learning solidity smart contract vulnerability detection model. 1014 - Jingrong Chen, Yange Li

, Xue Li
:
3-Path Vertex Cover Problem based on the Variable Neighborhood Search algorithm and the Artificial Bee Colony algorithm. 1015 - Blaize Tom Parambil, Panchami V. Vamattathil

, Shelcy Paulose, Sharon Justine Payattukalanirappel:
Provably secure, lightweight, privacy-preserving PUF-based authentication and key agreement scheme using blockchain technology for internet of drones in smart cities. 1016 - Rio Mukhtarom Paweroi, Mutawally Syarawy, Mario Köppen:

A three-tier generative AI workflow for metaverse asset creation. 1017 - Hakan Aydin, Muhammed Ali Aydin:

A multi-agent-based DDoS detection and defense system design with federated learning and blockchain in public cloud network environment. 1018 - Veeramalai Sankaradass, V. K. Manindra Manish:

Federated learning and deep reinforcement networks for privacy-preserving real-time data analytics in smart healthcare systems. 1019 - Farouq Aliyu

, Uthman Baroudi
, Mohamed Younis
:
Enhancing base station anonymity in WSNs: a security framework using ring routing, fake packet injection, and dynamic coverage. 1020 - Muhmmad Fizan, Alaa Awad Abdellatif, Muhammad Asad, Muhammad Zubair, Bin Ni, Bin Xu, Xuefeng Liu, Jichuan Xiong, Muhammad Qasim Mehmood:

Unique explainable federated learning approach for detecting model poisoning attacks to secure systems. 1021 - Ali El Romeh

, Václav Snásel
, Seyedali Mirjalili
:
LLM-Enhanced metaheuristics with single-shot and few-shot learning for multi-robot exploration tasks. 1022 - Lubna Mohamad Vakil, Raja Wasim Ahmad, Mirna Nachouki, Junaid Shuja:

A decentralized blockchain and IPFS-based framework for secure traceability in agricultural waste-to-energy conversion. 1023 - Cheng Qian, Xinyu Cai:

An efficient social-driven educational competition optimizer for numerical optimization. 1024 - Sergio Santander-Jiménez, Miguel A. Vega-Rodríguez:

Multi-threaded SIMD strategies and frequency scaling for sustainable evolutionary biology. 1025 - F. Abil, Negin Daneshpour

, Zeinab Torabi
:
A hybrid approach based on neural network algorithm for task scheduling. 1026 - Ilyas Ziaya, Brahim Farou, Zineddine Kouahla, Hamid Seridi:

A blockchain and B-tree indexing approach to improve traceability and query efficiency in food supply chain. 1027 - Clement Babu, Fahimeh Jafari:

Empowering career development: a comprehensive AI-driven system for personalised guidance and recommendations. 1028 - Nikhil Sharma, Prashant Giridhar Shambharkar:

Blockchain-based framework for secure medical data sharing and disease diagnosis using optimized deep belief networks. 1029 - Farzaneh Rastegar, Zahra Nazari, MohammadAmin Fazli, Jafar Habibi:

Workflow ensemble scheduling in edge-based infrastructures for workflows with optional and mandatory tasks using Heuristic algorithms. 1030 - Zeeshan Hameed, Claus Pahl, Mohammad Hajian Berenjestanaki, Ibe Van Thillo:

A secure and reliable distributed storage system with multi-factor trust-aware workflow scheduling. 1031 - Le-Le Mao, Azlan Mohd Zain, Kai-Qing Zhou, Xin Li:

A modified wind driven optimization algorithm and its applications in hardware-software partitioning. 1032 - Zuhua Dai, Yaoguang Yang, Zihan Qin, Kun Deng:

Behavior-guided noise purification for multimodal graph contrastive learning recommendation model. 1033 - Ahmed Saidi

, Abdelouahab Amira, Omar Nouali:
A privacy-centric federated learning framework with blockchain and dynamic client selection mechanisms. 1034 - Binjie Hua, Haiyan Xi:

A lightweight hybrid encryption method for enhance the security of applications in the internet of things. 1035 - Wei Liu, Xu Wang, Bin Wang, Wentao Cui, Zhao Tian, Guangjun Zai:

AHIBCS: an adaptive historical-information-based client selection algorithm for Non-IID data. 1036 - Xiaoying Wang, Wai Chen:

HSEB: optimizing microkernel performance for network I/O-intensive applications via High-Speed Event Bus mechanism. 1037 - Xijing Zhang, ZhongJie Shen, Rui Xie:

A new efficient model to enhance the success of cloud-based service composition systems using an enhanced learning-based algorithm. 1038 - Guoguang Tan, Liu Liu, Ziteng Liu, Bin Wen, Lili Li, Yongsheng Ye:

Real-time detection method of typical defects in transmission line under complex lighting and backgrounds. 1039 - S. B. Chandini, A. B. Rajendra, Vinayakumar Ravi, Suliman A. Alsuhibany, C. M. Naveen Kumar:

Efficient hybrid feature selection using intrinsic and metaheuristic optimization algorithm and classification of malware using ensemble learning algorithm. 1040 - Yongliang Yuan, Guangya Chong, Jianji Ren, Wu Zhao, Yanan Li, Zhenxi Wang, Seyedali Mirjalili:

Musk ox optimizer (MO): a novel optimization algorithm and its application. 1041 - Zhengwei Ren, He Li, Guangxin He, Rongwei Yu, Yan Tong, Shiwei Xu, Li Deng:

An SGX-based key protection scheme for Hyperledger Fabric. 1042 - Syafiq Al Atiiq, Christian Gehrmann, Karim Khalil, Jakob Sternby, Yachao Yuan:

Resilient automatic model selection for mobility prediction. 1043 - Lopamudra Mohanty, Mohit Agarwal, Vivek Mehta:

FCDC: Firefly optimization algorithm based compression of deep CNN model with explainability. 1044 - Zhe Wang, Lijuan Zhou, Jiekai He, Lina Ge:

Task offloading optimization in IRS-assisted multi-tier computing networks. 1045 - Raja Jarray, Soufiene Bouallègue:

Improved deep Q-network-based UAV path planning in partially observable environments. 1046 - Cosimo Anglano, Massimo Canonico, Rossano Gaeta, Marco Guazzone:

Popularity-based data placement in erasure-coded Edge Storage Systems. 1047 - Hongbo Liu, Jiannong Cao

, Yinfeng Cao
, Dongbin Bai
, Jinwen Liang
, Ruidong Li
:
EdenDID: an edge computing and blockchain-based decentralized identity system for Web3 applications and DePIN. 1048 - Hadeel Alazzam, Orieb AbuAlghanam, Moutaz Alazab:

Optimizing malware detection across platforms using the firefly algorithm in cyber threat intelligence. 1049 - Mohammad Alnabhan, Saleem Alsaraireh, Yousef AbuHour, Hatem Mosa, Laith Alshaggah:

Lightweight and hybrid image encryption approach: dynamic anchor blocks selection. 1050 - Xu Wu, Jie Tian, Yuanpeng Li, Guoqiang Zhang, Bin Wen:

Study on reliable federated learning model in IoV environments. 1051 - Hongsong Chen

, Xingyu Li:
6G network cloud-edge-end collaboration security auditing traceability scheme and experiment verification. 1052 - Jiaofen Nan, Panpan Xu, Kaifan Zhang, Qian Xu, Siyuan Zhang, Yongquan Xia, Chuang Han, Duan Li, Yinghui Meng:

Research on optimization of brain-controlled typing recognition based on imaginary handwriting. 1053 - Yanhua Zhong, Yongqiu Liu:

Using machine learning algorithms with extreme learning to identify instances of malicious activity in data collection. 1054 - He Xu, Lili Dong, Yulin Gao, Yichen Wang, Zihao Liu:

Convolutional neural network with cascade fusion and spatial local feature enhancement for infrared maritime target detection. 1055 - Lihong Zhang, Tong Liu, Junding Sun:

AFS-LVNet: adaptive feature shuffle lightweight V-Net model for pulmonary nodule segmentation. 1056 - Hang Li

, Lili Wang:
Enhanced BiGAN for multi-task learning in business process prediction: next activity and timestamp prediction tasks. 1057 - Bouchra Fakher

, Mohamed-el-Amine Brahmia
, Ismail Bennis
, Abdelhafid Abouaissa
:
Combining client-based anomaly detection and federated learning for energy forecasting in smart buildings. 1058 - Xingna Hou, Yulan Zhao, Jinshuo Zhang, Shouhong Chen:

Integrated A* and DWA algorithms for emergency rescue path planning. 1059 - Fawzia Omer Albasheer, Mayank Agarwal:

OptiXID: An optimized and eXplainable AI framework for intrusion detection in IoT networks. 1060 - Suhua Chen, Xu Fang:

Detection of DDoS attacks in IoT networks using a majority voting mechanism. 1061 - Zechen Li, Wen Zhang:

OTST: an optimal transport based spatial-temporal graph attention model for traffic flow prediction. 1062 - Zhiying Feng, Lang Li:

MD-DLATA: optimized template attack method based on multi-domain feature fusion. 1063 - Cheng Zhang, Peixuan Li, Jinkang Lu, Zhu Yuan, Ping Xie:

A write leveling scheme for synchronizing garbage collection in RAID-enabled SSDs. 1064 - Wiem Bekri, Rihab Jmal, Lamia Chaari Fourati:

Distributed secured and trustworthy IoT framework based on SDN, AI, and blockchain. 1065 - Milad Ghahari-Bidgoli

, Mostafa Ghobaei-Arani, Ahmad Sharif:
JORAS: joint offloading and resource auto-scaling in edge computing environment. 1066 - Heng Wang, Kai Yang, Jiadui Chen, Haisong Huang, Jingwei Yang:

Multi-strategy collaborative improved Snake Optimizer for complex optimization problems and 3D UAV path planning. 1067 - Sharadadevi Kaganurmath, Nagaraj G. Cholli, M. R. Anala:

Integrating MQTT protocol to improve the performance using dynamic lightweight key sharing protocol for secure IoT communications. 1068 - Kyuli Park, Dongjae Lee, Yeonwoo Jeong, Salim Hariri, Sungyong Park:

Correction: Towards an asynchronous commit in micro-batch streaming systems with log-structured merge-tree based key-value store. 1069 - Thatikonda Supraja, Priyanka Chawla, Sukhpal Singh Gill:

AI-driven service placement in fog and edge computing environments: a systematic review, taxonomy and future directions. 1070 - Chuangyu Yu, Shaoming Pan, Wenping Song:

Progressive probabilistic retransmission method for reliable satellite-to-ground file transfer in LEO environment. 1071 - Yousef O. Sharrab, Basma M. Irtahi, Mohammad Ali H. Eljinini, Izzat Alsmadi:

Integrating deep learning and statistical models for traffic prediction and accident prevention in smart cities. 1072 - Jiaofen Nan, Siyuan Zhang, Panpan Xu, Kaifan Zhang, Duan Li, Fubao Zhu, Yanting Li, Yongquan Xia, Yinghui Meng:

TRCA with sparrow-optimized adaptive filter banks for SSVEP recognition. 1073 - Sara Khader, Rawan Ghnemat:

AGU-Net: advancing medical image segmentation with attention-guided U-Net architecture. 1074 - Hafiz Farooq Ahmad, Junaid Sajid, Raihan Ur Rasool, Asad Waqar Malik:

Beyond the hype: exploring the impact, challenges, and potential of large language models in healthcare. 1075 - Yumna Memon

, Feng Zeng
, Faiza Riaz Khawaja:
DUC-Net: A deep unified cross-modal architecture with cascaded feature learning for medical image segmentation. 1076 - Khalid Alkhatib, Fares Al Ayoub, Qais Marji:

Deep learning techniques used for the detection of fraudulent activities within the ethereum network. 1077 - Maemoona Kayani, Abdul Ghafoor, Muhammad Mohsin Riaz, Fawad Khan:

Digital twins enabled privacy preserving remote vital signs monitoring. 1078 - Fazeleh Tavassolian, Mahdi Abbasi, Abbas Ramezani, Atefeh Salimi, Amir Taherkordi, Mohammad Reza Khosravi:

AdaptFedDS: adaptive federated learning edge devices selection by using a light-dual reinforcement learning approach. 1079 - Rawan Ghnemat, Hatem Mosa:

Blockchain-based fraud detection: A systematic review of Ethereum network applications. 1080 - Jeyavim Sherin R. C., Parkavi Krishnamoorthy:

NIDS-APNHA: a transfer learning based network intrusion detection system with alert prioritization and network harmony analysis. 1081

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














