| Harris hawks optimization: Algorithm and applications |
257 |
| IoT security: Review, blockchain solutions, and open challenges |
205 |
| Secure integration of IoT and Cloud Computing |
146 |
| Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges |
143 |
| On blockchain and its integration with loT. Challenges and opportunities |
139 |
| Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things:A fog computing approach |
123 |
| Research on internet information mining based on agent algorithm |
99 |
| Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings |
89 |
| Towards fog-driven IoT eHealth: Promises and challenges of loT in medicine and healthcare |
85 |
| A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment |
82 |
| Distributed attack detection scheme using deep learning approach for Internet of Things |
75 |
| A robust human activity recognition system using smartphone sensors and deep learning |
73 |
| Next generation cloud computing: New trends and research directions |
73 |
| Low illumination underwater light field images reconstruction using deep convolutional neural networks |
66 |
| An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework |
63 |
| A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system |
63 |
| A computation offloading method over big data for IoT-enabled cloud-edge computing |
62 |
| An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles |
62 |
| Henry gas solubility optimization: A novel physics-based algorithm |
57 |
| Security and trust issues in Fog computing: A survey |
52 |
| A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem |
52 |
| Enabling technologies for fog computing in healthcare IoT systems |
48 |
| Research on agricultural supply chain system with double chain architecture based on blockchain technology |
47 |
| Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things |
46 |
| Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset |
45 |
| Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier |
45 |
| Dynamic evaluation of drilling leakage risk based on fuzzy theory and PSO-SVR algorithm |
44 |
| Edge computing: A survey |
43 |
| The role of big data analytics in industrial Internet of Things |
42 |
| Blockchain based hybrid network architecture for the smart city |
41 |
| IoT big data analytics for smart homes with fog and cloud computing |
40 |
| A robust and anonymous patient monitoring system using wireless medical sensor networks |
39 |
| Blockchain based searchable encryption for electronic health record sharing |
38 |
| A hybrid model of Internet of Things and cloud computing to manage big data in health services applications |
38 |
| A deep learning approach for ECG-based heartbeat classification for arrhythmia detection |
38 |
| Task scheduling techniques in cloud computing: A literature survey |
37 |
| Automated identification of shockable and non-shockable life-threatening ventricular arrhythmias using convolutional neural network |
37 |
| A data-driven method for future Internet route decision modeling |
37 |
| Characterization of focal EEG signals: A review |
37 |
| Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges |
37 |
| A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment |
36 |
| Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions |
36 |
| Optimal deep learning model for classification of lung cancer on CT images |
35 |
| Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities |
35 |
| In the shades of the uncanny valley: An experimental study of human-chatbot interaction |
34 |
| A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting |
34 |
| SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things |
33 |
| Controllable and trustworthy blockchain-based cloud data management |
33 |
| Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers |
32 |
| Big data analysis for brain tumor detection: Deep convolutional neural networks |
32 |