Future Generation Computer Systems-the International Journal Of Escience

Future Generation Computer Systems-the International Journal Of Escience

未来一代计算机系统-国际科学杂志

  • 2区 中科院分区
  • Q1 JCR分区

高引用文章

文章名称 引用次数
Harris hawks optimization: Algorithm and applications 257
IoT security: Review, blockchain solutions, and open challenges 205
Secure integration of IoT and Cloud Computing 146
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges 143
On blockchain and its integration with loT. Challenges and opportunities 139
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things:A fog computing approach 123
Research on internet information mining based on agent algorithm 99
Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings 89
Towards fog-driven IoT eHealth: Promises and challenges of loT in medicine and healthcare 85
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment 82
Distributed attack detection scheme using deep learning approach for Internet of Things 75
A robust human activity recognition system using smartphone sensors and deep learning 73
Next generation cloud computing: New trends and research directions 73
Low illumination underwater light field images reconstruction using deep convolutional neural networks 66
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework 63
A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system 63
A computation offloading method over big data for IoT-enabled cloud-edge computing 62
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles 62
Henry gas solubility optimization: A novel physics-based algorithm 57
Security and trust issues in Fog computing: A survey 52
A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem 52
Enabling technologies for fog computing in healthcare IoT systems 48
Research on agricultural supply chain system with double chain architecture based on blockchain technology 47
Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things 46
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset 45
Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier 45
Dynamic evaluation of drilling leakage risk based on fuzzy theory and PSO-SVR algorithm 44
Edge computing: A survey 43
The role of big data analytics in industrial Internet of Things 42
Blockchain based hybrid network architecture for the smart city 41
IoT big data analytics for smart homes with fog and cloud computing 40
A robust and anonymous patient monitoring system using wireless medical sensor networks 39
Blockchain based searchable encryption for electronic health record sharing 38
A hybrid model of Internet of Things and cloud computing to manage big data in health services applications 38
A deep learning approach for ECG-based heartbeat classification for arrhythmia detection 38
Task scheduling techniques in cloud computing: A literature survey 37
Automated identification of shockable and non-shockable life-threatening ventricular arrhythmias using convolutional neural network 37
A data-driven method for future Internet route decision modeling 37
Characterization of focal EEG signals: A review 37
Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges 37
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment 36
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions 36
Optimal deep learning model for classification of lung cancer on CT images 35
Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities 35
In the shades of the uncanny valley: An experimental study of human-chatbot interaction 34
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting 34
SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things 33
Controllable and trustworthy blockchain-based cloud data management 33
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers 32
Big data analysis for brain tumor detection: Deep convolutional neural networks 32