Annals of Telecommunications

Papers
(The median citation count of Annals of Telecommunications is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Wi-Sense: a passive human activity recognition system using Wi-Fi and convolutional neural network and its integration in health information systems35
5G, 6G, and Beyond: Recent advances and future challenges34
A review of clustering algorithms in VANETs32
eHealthChain—a blockchain-based personal health information management system30
Explainable artificial intelligence for cybersecurity: a literature survey26
The robust deep learning–based schemes for intrusion detection in Internet of Things environments26
A security and performance analysis of proof-based consensus protocols26
Digital sufficiency: conceptual considerations for ICTs on a finite planet20
Integration of blockchain and Internet of Things: challenges and solutions20
Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing17
Physical layer security for NOMA: limitations, issues, and recommendations16
SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems15
Junction-based stable clustering algorithm for vehicular ad hoc network15
Multi-layer perceptron for network intrusion detection15
Investigating the practicality of adversarial evasion attacks on network intrusion detection15
LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks14
Named data networking architecture for internet of vehicles in the era of 5G14
Generative AI in mobile networks: a survey13
Network slicing for vehicular communications: a multi-agent deep reinforcement learning approach13
Challenges and limits of fractal and slot antennas for WLAN, LTE, ISM, and 5G communication: a review paper13
Traffic identification model based on generative adversarial deep convolutional network12
Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network12
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms12
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles11
An extended assessment of metaheuristics-based feature selection for intrusion detection in CPS perception layer10
NLOS identification and mitigation in UWB positioning with bagging-based ensembled classifiers10
Towards adversarial realism and robust learning for IoT intrusion detection and classification10
A decision tree for building IT applications8
Generalization aspect of accurate machine learning models for CSI-based localization8
Estimating and predicting link quality in wireless IoT networks7
LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network7
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments7
Maximizing the underwater wireless sensor networks’ lifespan using BTC and MNP5 compression techniques7
An SDN-based energy-aware traffic management mechanism7
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks7
Multi-carrier multi-level DCSK communication system based on time-reversal7
Energy awareness and energy efficiency in internet of things middleware: a systematic literature review6
Mobile money traceability and federation using blockchain services6
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN6
Anomaly detection for ICS based on deep learning: a use case for aeronautical radar data6
An enhanced energy optimization routing protocol for WSNs6
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments6
Iterative interference alignment with spatial hole sensing in MIMO cognitive radio networks6
The Internet of vehicles and smart cities6
An energy-efficient data aggregation approach for cluster-based wireless sensor networks6
Energy-efficient Data Processing Protocol in edge-based IoT networks5
Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards5
MIMO-OFDM LTE system based on a parallel IFFT/FFT on NoC-based FPGA5
On enhancing the transmission efficiency of modulated UWB signals under different emission standards5
Virtual sensors: an industrial application for illumination attributes based on machine learning techniques5
HistoTrust: tracing AI behavior with secure hardware and blockchain technology5
A modified ZF algorithm for signal detection in an underwater MIMO STBC-OFDM acoustic communication system4
Mutated traffic detection and recovery: an adversarial generative deep learning approach4
A threat monitoring system for intelligent data analytics of network traffic4
Evaluation and projection of 4G and 5G RAN energy footprints: the case of Belgium for 2020–20254
3DMAT: data dissemination for disaster management using available technology in a smart city4
Lattice-based undeniable signature scheme4
Multipath neural networks for anomaly detection in cyber-physical systems4
Secrecy sum rate maximization for UAV-aided NOMA communication systems4
Probabilistic computation offloading and data caching assisted by mobile-edge-computing–enabled base stations3
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework3
Voting-based probabilistic consensuses and their applications in distributed ledgers3
DLT architectures for trust anchors in 6G3
Testbed of V2X infrastructure for autonomous vehicles3
Outage probability of MIMO cognitive radio networks with energy harvesting and adaptive transmit power3
A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population3
Fibonacci tiles strategy for optimal coverage in IoT networks3
Realizing privacy aspects in blockchain networks3
Performance evaluation of an active signaling based time-slot scheduling scheme for connected vehicles3
An optimal compact time-modulated circular antenna array synthesis using krill herd optimization3
Performance analysis of NOMA in a MIMO system over Rayleigh channels under imperfect SIC3
An improved user authentication and key agreement scheme for roaming service in ubiquitous network3
Design of aperiodic spherical antenna arrays for wideband performance3
A performance evaluation of C4M consensus algorithm3
Analysis of error-based machine learning algorithms in network anomaly detection and categorization3
Enhancing video dissemination over urban VANETs using line of sight and QoE awareness mechanisms3
Blockchain-based whistleblowing service to solve the problem of journalistic conflict of interest3
Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain2
Energy-efficient cross-layer resource allocation scheme for OFDMA systems2
ICN clustering-based approach for VANETs2
A non-stationary relay-based 3D MIMO channel model with time-variant path gains for human activity recognition in indoor environments2
Distributed congestion control method for sending safety messages to vehicles at a set target distance2
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison2
PAPR reduction using constrained convex optimization for vector OFDM2
Towards programmable IoT with ActiveNDN2
Outage probability of dual-hop cooperative communication networks over the Nakagami-m fading channel with RF energy harvesting2
IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications2
Cloud service selection in IoFT-enabled Multi-access Edge Computing: a Game Theoretic approach2
The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection2
Effects of dataset attacks on machine learning models in e-health2
E-Watcher: insider threat monitoring and detection for enhanced security2
Deep learning-based sequential models for multi-user detection with M-PSK for downlink NOMA wireless communication systems2
Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living2
A low-complexity iterative algorithm for multiuser millimeter-wave systems2
On the performance and scalability of consensus mechanisms in privacy-enabled decentralized renewable energy marketplace2
Audio quality level vs. signal-to-interference ratio in isofrequency FM broadcasting2
Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city2
BALAdIN: truthfulness in collaborative access networks with distributed ledgers2
Oddlab: fault-tolerant aware load-balancing framework for data center networks2
Security and trust in ubiquitous systems2
Towards greener digital infrastructures for ICT and vertical markets2
Reinforcement learning-based clustering scheme for the Internet of Vehicles2
Privacy preserving machine unlearning for smart cities2
Interactions between artificial intelligence and cybersecurity to protect future networks2
Performance evaluation of an HTTP proxy implemented as a virtual network function2
Using packet trimming at the edge for in-network video quality adaption1
Integer codes correcting single asymmetric errors1
Enabling technologies for running IoT applications on the cloud1
A modular pipeline for enforcement of security properties at runtime1
The use of statistical features for low-rate denial-of-service attack detection1
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype1
Generating practical adversarial examples against learning-based network intrusion detection systems1
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles1
Building Lightweight Deep learning Models with TensorFlow Lite for Human Activity Recognition on Mobile Devices1
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles1
Smart contract implementation on network sharing for 6G wireless networks1
A compact inexpensive UWB-modified elliptic antenna including a slotted ground plane for an indoor positioning system1
A novel collision avoidance scheme for smart parking1
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures1
A dynamic channel allocation protocol for medical environment1
Semi-blind AF transmission in secure NOMA systems1
Efficient practical Byzantine consensus using random linear network coding1
Low-latency remote-offloading system for accelerator1
A revocable attribute-based access control with non-monotonic access structure1
A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing1
A biobjective availability optimization problem with nonlinear constraints1
Mitigation of a poisoning attack in federated learning by using historical distance detection1
Modeling and improving named data networking over IEEE 802.15.41
Wi-Fi faces the new wireless ecosystem: a critical review1
A game-theoretical paradigm for collaborative and distributed power control in wireless networks1
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network1
Helix Multi-layered: a context broker federation for an efficient cloud-to-things continuum1
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control1
Secure and low PAPR OFDM system using TCCM1
Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices1
BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels1
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks1
Computing paradigms for smart farming in the era of drones: a systematic review1
Experimental assessment of SDR-based 5G positioning: methodologies and insights1
Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography1
A social-aware content delivery scheme based on D2D communications underlying cellular networks: a Stackelberg game approach1
Double spatial media-based modulation with RF mirrors1
0.040380954742432