Annals of Telecommunications

Papers
(The median citation count of Annals of Telecommunications is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
A compact inexpensive UWB-modified elliptic antenna including a slotted ground plane for an indoor positioning system35
Efficient representation of disoccluded regions in 3D video coding34
A novel offline indoor acoustic synchronization protocol: experimental analysis32
A low-complexity iterative algorithm for multiuser millimeter-wave systems30
Social network malicious insider detection using time-based trust evaluation26
Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk26
Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity26
Multi-carrier multi-level DCSK communication system based on time-reversal20
Robust adaptive beamforming algorithm for coherent signals based on virtual array20
Adaptive password guessing: learning language, nationality and dataset source17
Modeling and improving named data networking over IEEE 802.15.415
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing15
A balanced prior knowledge model based on Beta function for evaluating DIDS performance15
Interactions between artificial intelligence and cybersecurity to protect future networks15
Audio quality level vs. signal-to-interference ratio in isofrequency FM broadcasting14
Efficient approaches to optimize energy consumption in 3D wireless video sensor network under the coverage and connectivity constraints14
A biobjective availability optimization problem with nonlinear constraints13
Generative AI in mobile networks: a survey13
Editorial of 6GNet 2023 special issue13
A survey of public datasets for O-RAN: fostering the development of machine learning models13
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels12
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments12
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles12
On enhancing the transmission efficiency of modulated UWB signals under different emission standards10
CSNet 2022 special issue—decentralized and data-driven security in networking10
Experimental assessment of SDR-based 5G positioning: methodologies and insights10
An approach for detecting multi-institution attacks8
A security and performance analysis of proof-based consensus protocols7
Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards7
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks7
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments7
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum7
Generalization aspect of accurate machine learning models for CSI-based localization7
Towards adversarial realism and robust learning for IoT intrusion detection and classification7
Multi-layer perceptron for network intrusion detection6
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts6
Publisher Correction: Towards programmable IoT with ActiveNDN6
Troubleshooting distributed network emulation6
Large language models and unsupervised feature learning: implications for log analysis6
The robust deep learning–based schemes for intrusion detection in Internet of Things environments6
Traffic identification model based on generative adversarial deep convolutional network6
A deeper look at Ariadne: a privacy-preserving network layer protocol6
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks5
Privacy preserving machine unlearning for smart cities5
Challenges and limits of fractal and slot antennas for WLAN, LTE, ISM, and 5G communication: a review paper5
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles5
Machine learning for networking5
Lattice-based undeniable signature scheme5
Product of two Gaussian Q-functions as sum of exponentials and its applications5
BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels4
A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing4
A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning4
Zt &t: secure service session management using blockchain-based tokens in zero trust networks.4
Orthogonal beamforming technique for massive MIMO systems4
Enhancing the physical layer security in IoT over mixed Rayleigh-Nakagami-m fading channels with untrustworthy relays4
SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems4
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN4
Generating practical adversarial examples against learning-based network intrusion detection systems4
Multi-labeling with topic models for searching security information4
Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network3
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection3
Reinforcement learning-based clustering scheme for the Internet of Vehicles3
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms3
An SDN-based energy-aware traffic management mechanism3
Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living3
Blockchain-based whistleblowing service to solve the problem of journalistic conflict of interest3
Capacity aware Wi-Fi networks deployment3
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms3
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks3
PAPR reduction using constrained convex optimization for vector OFDM3
Integration of blockchain and Internet of Things: challenges and solutions3
Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts3
Efficient practical Byzantine consensus using random linear network coding2
Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices2
HistoTrust: tracing AI behavior with secure hardware and blockchain technology2
Investigating the practicality of adversarial evasion attacks on network intrusion detection2
The use of statistical features for low-rate denial-of-service attack detection2
A dynamic AI-based algorithm selection for Virtual Network Embedding2
The role of SIC on the design of next generation multiple access2
Joint MEC selection and wireless resource allocation in 5G RAN2
Organic 6G networks: ultra-flexibility through extensive stateless functional split2
A bi-objective optimization model for segment routing traffic engineering2
Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing2
Towards programmable IoT with ActiveNDN2
LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks2
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles2
On the capacity of multiple antenna systems2
Junction-based stable clustering algorithm for vehicular ad hoc network2
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting2
Sliding window symbol-pair constrained codes for energy harvesting2
Energy and delay trade-offs of end-to-end vehicular communications using a hyperfractal urban modelling2
Low-latency remote-offloading system for accelerator2
A threat monitoring system for intelligent data analytics of network traffic2
Deep learning-based sequential models for multi-user detection with M-PSK for downlink NOMA wireless communication systems2
A modular pipeline for enforcement of security properties at runtime2
Federated deep Q-learning networks for service-based anomaly detection and classification in edge-to-cloud ecosystems2
Secrecy sum rate maximization for UAV-aided NOMA communication systems2
Slotted patch and ground for reducing side lobe level of planar antenna operating under higher order mode1
Integration of IoT with cloud computing for next generation wireless technology1
Balance: depolarized intelligent sensing system with multi-angle energy-saving optimized control model1
A three-dimensional wireless sensor network with an improved localization algorithm based on orthogonal learning class topper optimization1
Carbon footprint of cloud, edge, and Internet of Edges1
Fixed-text keystroke dynamics authentication data set—collection and analysis1
A revocable attribute-based access control with non-monotonic access structure1
Towards greener digital infrastructures for ICT and vertical markets1
Named data networking architecture for internet of vehicles in the era of 5G1
The Internet of vehicles and smart cities1
An enhanced energy optimization routing protocol for WSNs1
Mobile money traceability and federation using blockchain services1
Automated slow-start detection for anomaly root cause analysis and BBR identification1
A non-stationary relay-based 3D MIMO channel model with time-variant path gains for human activity recognition in indoor environments1
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks1
Low-power DSSS transmitter and its VLSI implementation1
Network slicing for vehicular communications: a multi-agent deep reinforcement learning approach1
E-Watcher: insider threat monitoring and detection for enhanced security1
CSNet 2023 special issue—the resilient networked systems1
A distributed platform for intrusion detection system using data stream mining in a big data environment1
LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network1
Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface1
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison1
Enhancing video dissemination over urban VANETs using line of sight and QoE awareness mechanisms1
Enabling technologies for running IoT applications on the cloud1
MIMO-OFDM LTE system based on a parallel IFFT/FFT on NoC-based FPGA1
Semi-blind AF transmission in secure NOMA systems1
The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection1
Secure and low PAPR OFDM system using TCCM1
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype1
Digital credentials management system using rejectable soulbound tokens1
Distributed congestion control method for sending safety messages to vehicles at a set target distance1
Performance analysis of NOMA in a MIMO system over Rayleigh channels under imperfect SIC1
Wi-Sense: a passive human activity recognition system using Wi-Fi and convolutional neural network and its integration in health information systems1
Bringing privacy, security and performance to the Internet of Things using IOTA and usage control1
0.061244010925293