Skip to main content

previous disabled Page of 39
and
Your search also matched 4,880 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

Include preview-only content
  1. Article

    Open Access

    Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud system

    Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient informa...

    Ke Yuan, Ziwei Cheng, Keyan Chen, Bozhen Wang, Junyang Sun in Journal of Cloud Computing (2024)

  2. Article

    Open Access

    From data to insights: the application and challenges of knowledge graphs in intelligent audit

    In recent years, knowledge graph technology has been widely applied in various fields such as intelligent auditing, urban transportation planning, legal research, and financial analysis. In traditional auditin...

    Hao Zhong, Dong Yang, Shengdong Shi, Lai Wei, Yanyan Wang in Journal of Cloud Computing (2024)

  3. Article

    Open Access

    MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices

    The rapid advancement of microservice architecture in the cloud has led to the necessity of effectively detecting, classifying, and diagnosing run failures in microservice applications. Due to the high dynamic...

    Juan Chen, Rui Zhang, Peng Chen, Jianhua Ren, Zongling Wu in Journal of Cloud Computing (2024)

  4. Article

    Open Access

    Analysis and prediction of virtual machine boot time on virtualized computing environments

    Starting a virtual machine (VM) is a common operation in cloud computing platforms. In order to achieve better management of resource provisioning, a cloud platform needs to accurately estimate the VM boot tim...

    Ridlo Sayyidina Auliya, Yen-Lin Lee, Chia-Ching Chen in Journal of Cloud Computing (2024)

  5. Article

    Open Access

    Accurate and fast congestion feedback in MEC-enabled RDMA datacenters

    Mobile edge computing (MEC) is a novel computing paradigm that pushes computation and storage resources to the edge of the network. The interconnection of edge servers forms small-scale data centers, enabling ...

    **n He, Feifan Liang, Weibei Fan, Junchang Wang, Lei Han in Journal of Cloud Computing (2024)

  6. Article

    Open Access

    Security issues of news data dissemination in internet environment

    With the rise of artificial intelligence and the development of social media, people's communication is more convenient and convenient. However, in the Internet environment, the untrue dissemination of news da...

    Kang Song, Wenqian Shang, Yong Zhang, Tong Yi, Xuan Wang in Journal of Cloud Computing (2024)

  7. Article

    Open Access

    Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks

    Powered by data-driven technologies, precision agriculture offers immense productivity and sustainability benefits. However, fragmentation across farmlands necessitates distributed transparent automation. We d...

    Qing He, Hua Zhao, Yu Feng, Zehao Wang, Zhaofeng Ning in Journal of Cloud Computing (2024)

  8. Article

    Open Access

    Translating gardens into accessible multisensory tours for blind and partially sighted visitors: an exploratory case study

    This paper presents an exploratory case study which illustrates the first stage of our multi-stage methodology for translating gardens into a multisensory and accessible tour for blind and partially sighted (B...

    ** Wang in Universal Access in the Information Society (2024)

  9. Article

    Open Access

    Privacy-preserving federated learning based on partial low-quality data

    Traditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants’ data. Federated learning provides a method to protect p...

    Huiyong Wang, Qi Wang, Yong Ding, Shijie Tang, Yujue Wang in Journal of Cloud Computing (2024)

  10. Article

    Open Access

    A secure data interaction method based on edge computing

    Deep learning achieves an outstanding success in the edge scene due to the appearance of lightweight neural network. However, a number of works show that these networks are vulnerable for adversarial examples,...

    Weiwei Miao, Yuanyi **a, Rui Zhang, **njian Zhao, Qianmu Li in Journal of Cloud Computing (2024)

  11. Article

    Open Access

    SRA-E-ABCO: terminal task offloading for cloud-edge-end environments

    The rapid development of the Internet technology along with the emergence of intelligent applications has put forward higher requirements for task offloading. In Cloud-Edge-End (CEE) environments, offloading c...

    Shun Jiao, Haiyan Wang, Jian Luo in Journal of Cloud Computing (2024)

  12. Article

    Open Access

    RNA-RBP interactions recognition using multi-label learning and feature attention allocation

    In this study, we present a sophisticated multi-label deep learning framework for the prediction of RNA-RBP (RNA-binding protein) interactions, a critical aspect in understanding RNA functionality modulation a...

    Huirui Han, Bandeh Ali Talpur, Wei Liu, Limei Wang in Journal of Cloud Computing (2024)

  13. Article

    Open Access

    Target tracking using video surveillance for enabling machine vision services at the edge of marine transportation systems based on microwave remote sensing

    Automatic target tracking in emerging remote sensing video-generating tools based on microwave imaging technology and radars has been investigated in this paper. A moving target tracking system is proposed to ...

    Meiyan Li, Qinyong Wang, Yuwei Liao in Journal of Cloud Computing (2024)

  14. Article

    Open Access

    A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption

    With the rapid development of the Internet of Medical Things (IoMT) and the increasing concern for personal health, sharing Electronic Medical Record (EMR) data is widely recognized as a crucial method for enh...

    Guijiang Liu, Haibo **e, Wenming Wang, Hai** Huang in Journal of Cloud Computing (2024)

  15. Article

    Open Access

    Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment

    Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...

    Hao Li, Wu Yang, Wei Wang, Huanran Wang in Journal of Cloud Computing (2024)

  16. Article

    Open Access

    MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition

    Mangroves are ecosystems that grow in the intertidal areas of coastal zones, playing crucial ecological roles and possessing unique economic and social values. They have garnered significant attention and rese...

    Lixiang Fu, **biao Chen, Zhuoying Wang, Tao Zang in Journal of Cloud Computing (2024)

  17. Article

    Open Access

    A resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit

    Resource allocation in Internet of Vehicles (IoV) edge computing is currently a research hotspot. Existing studies focus on social welfare or revenue maximization. However, there is little research on lowest r...

    Jixian Zhang, Zhemin Wang, Athanasios V. Vasilakos in Journal of Cloud Computing (2024)

  18. Article

    Open Access

    Edge-cloud computing cooperation detection of dust concentration for risk warning research

    An edge-cloud computing collaborative dust concentration detection architecture is proposed for real-time operation of intelligent algorithms to reduce the warning delay. And, an end-to-end three-channel convo...

    Qiao Su, Hongsu Wang, Haiyang Zhao, Yan Chu, Jie Li, Xuan Lyu in Journal of Cloud Computing (2024)

  19. Article

    Open Access

    Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics

    Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...

    **n Wang, Dongsheng Yang, D Raveena Judie Dolly, Shuang Chen in Journal of Cloud Computing (2024)

  20. Article

    Open Access

    Timed-release encryption anonymous interaction protocol based on smart contract

    Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios. To solve the reliability issue of nodes in ex...

    Ke Yuan, Zilin Wang, Keyan Chen, Bingcai Zhou, Zheng Li in Journal of Cloud Computing (2024)

previous disabled Page of 39