Annals of Telecommunications

Papers
(The median citation count of Annals of Telecommunications is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A review on machine learning–based approaches for Internet traffic classification57
A study of the LoRa signal propagation in forest, urban, and suburban environments38
Survey on physical layer security for 5G wireless networks34
A review of clustering algorithms in VANETs26
Wi-Sense: a passive human activity recognition system using Wi-Fi and convolutional neural network and its integration in health information systems25
eHealthChain—a blockchain-based personal health information management system24
A security and performance analysis of proof-based consensus protocols20
Comparison of energy simulation applications used in green building20
The robust deep learning–based schemes for intrusion detection in Internet of Things environments20
Joint mobile vehicle–UAV scheme for secure data collection in a smart city18
Integration of blockchain and Internet of Things: challenges and solutions16
Physical layer security for NOMA: limitations, issues, and recommendations16
Named data networking architecture for internet of vehicles in the era of 5G14
Information security management frameworks and strategies in higher education institutions: a systematic review14
Explainable artificial intelligence for cybersecurity: a literature survey14
Digital sufficiency: conceptual considerations for ICTs on a finite planet13
Federated learning-based scheme for detecting passive mobile attackers in 5G vehicular edge computing13
5G, 6G, and Beyond: Recent advances and future challenges13
SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems13
Multi-layer perceptron for network intrusion detection12
LAFS: a learning-based adaptive forwarding strategy for NDN-based IoT networks11
Challenges and limits of fractal and slot antennas for WLAN, LTE, ISM, and 5G communication: a review paper11
Investigating the practicality of adversarial evasion attacks on network intrusion detection11
Comparison between LoRa and NB-IoT coverage in urban and rural Southern Brazil regions11
Discovering locations and habits from human mobility data11
A modified LOF-based approach for outlier characterization in IoT10
An extended assessment of metaheuristics-based feature selection for intrusion detection in CPS perception layer10
Junction-based stable clustering algorithm for vehicular ad hoc network10
Process mining on machine event logs for profiling abnormal behaviour and root cause analysis10
Network slicing for vehicular communications: a multi-agent deep reinforcement learning approach9
Traffic identification model based on generative adversarial deep convolutional network9
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles9
Density-connected cluster-based routing protocol in vehicular ad hoc networks9
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms9
NLOS identification and mitigation in UWB positioning with bagging-based ensembled classifiers8
Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network8
Design of a portable and multifunctional dependable wireless communication platform for smart health care7
Maximizing the underwater wireless sensor networks’ lifespan using BTC and MNP5 compression techniques7
IoT data stream analytics7
A decision tree for building IT applications7
Profiling high leverage points for detecting anomalous users in telecom data networks6
Generalization aspect of accurate machine learning models for CSI-based localization6
Decentralized spectrum learning for radio collision mitigation in ultra-dense IoT networks: LoRaWAN case study and experiments6
Iterative interference alignment with spatial hole sensing in MIMO cognitive radio networks6
The Internet of vehicles and smart cities6
An energy-efficient data aggregation approach for cluster-based wireless sensor networks6
Mobile money traceability and federation using blockchain services6
An ontology supported hybrid approach for recommendation in emergency situations6
An SDN-based energy-aware traffic management mechanism6
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks6
Virtual sensors: an industrial application for illumination attributes based on machine learning techniques5
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion5
LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network5
Anomaly detection for ICS based on deep learning: a use case for aeronautical radar data5
Energy-efficient Data Processing Protocol in edge-based IoT networks5
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN5
Analysis of discontinuous reception (DRX) on energy efficiency and transmission delay with bursty packet data traffic5
Rogue device discrimination in ZigBee networks using wavelet transform and autoencoders5
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments5
Understanding cyberbullying as an information security attack—life cycle modeling4
A modified ZF algorithm for signal detection in an underwater MIMO STBC-OFDM acoustic communication system4
Estimating and predicting link quality in wireless IoT networks4
On enhancing the transmission efficiency of modulated UWB signals under different emission standards4
Bi-directional online transfer learning: a framework4
Quantum signal processing for quantum phase estimation: Fourier transform versus maximum likelihood approaches4
Lattice-based undeniable signature scheme4
Parameter-free and fast nonlinear piecewise filtering: application to experimental physics4
Energy awareness and energy efficiency in internet of things middleware: a systematic literature review4
Approximate ASER analysis of MIMO TAS/MRC networks over Weibull fading channels4
Low-complexity PAPR reduction method based on the TLBO algorithm for an OFDM signal4
On the optimization of resources for short frame synchronization4
An enhanced energy optimization routing protocol for WSNs3
Multi-carrier multi-level DCSK communication system based on time-reversal3
Active feature acquisition on data streams under feature drift3
Realizing privacy aspects in blockchain networks3
Performance evaluation of an active signaling based time-slot scheduling scheme for connected vehicles3
Testbed of V2X infrastructure for autonomous vehicles3
MIMO-OFDM LTE system based on a parallel IFFT/FFT on NoC-based FPGA3
Secrecy sum rate maximization for UAV-aided NOMA communication systems3
Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards3
Design of aperiodic spherical antenna arrays for wideband performance3
A performance evaluation of C4M consensus algorithm3
Scalable kernel convex hull online support vector machine for intelligent network traffic classification3
An optimal compact time-modulated circular antenna array synthesis using krill herd optimization3
Interconnect bypass fraud detection: a case study3
Novel user authentication method based on body composition analysis3
Toward unified trust and reputation messaging in ubiquitous systems3
Transparency of SIM profiles for the consumer remote SIM provisioning protocol3
3DMAT: data dissemination for disaster management using available technology in a smart city3
Analysis of error-based machine learning algorithms in network anomaly detection and categorization3
Outage probability of MIMO cognitive radio networks with energy harvesting and adaptive transmit power3
Reinforcement learning-based clustering scheme for the Internet of Vehicles2
Audio quality level vs. signal-to-interference ratio in isofrequency FM broadcasting2
Downlink channel estimation for millimeter wave communication combining low-rank and sparse structure characteristics2
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework2
Enhancing video dissemination over urban VANETs using line of sight and QoE awareness mechanisms2
A non-stationary relay-based 3D MIMO channel model with time-variant path gains for human activity recognition in indoor environments2
Performance analysis of NOMA in a MIMO system over Rayleigh channels under imperfect SIC2
Towards programmable IoT with ActiveNDN2
Towards adversarial realism and robust learning for IoT intrusion detection and classification2
Towards more secure EMV purchase transactions2
Voting-based probabilistic consensuses and their applications in distributed ledgers2
Energy-efficient cross-layer resource allocation scheme for OFDMA systems2
Excess rate for model selection in interactive compression using belief propagation decoding2
Integer codes correcting single asymmetric errors2
Privacy preserving machine unlearning for smart cities2
Blockchain-based whistleblowing service to solve the problem of journalistic conflict of interest2
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments2
IEEE 802.11p performance enhancement based on Markov chain and neural networks for safety applications2
BALAdIN: truthfulness in collaborative access networks with distributed ledgers2
Using packet trimming at the edge for in-network video quality adaption2
Mutated traffic detection and recovery: an adversarial generative deep learning approach2
DLT architectures for trust anchors in 6G2
HistoTrust: tracing AI behavior with secure hardware and blockchain technology1
PAPR reduction using constrained convex optimization for vector OFDM1
Minimizing the average achievable distortion using multi-layer coding approach in two-hop networks1
Building Lightweight Deep learning Models with TensorFlow Lite for Human Activity Recognition on Mobile Devices1
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles1
A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population1
Modeling and improving named data networking over IEEE 802.15.41
Evaluation and projection of 4G and 5G RAN energy footprints: the case of Belgium for 2020–20251
Regularized and incremental decision trees for data streams1
A single-player Monte Carlo tree search method combined with node importance for virtual network embedding1
The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection1
Multipath neural networks for anomaly detection in cyber-physical systems1
ICN clustering-based approach for VANETs1
Distributed congestion control method for sending safety messages to vehicles at a set target distance1
Efficient practical Byzantine consensus using random linear network coding1
BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels1
Mitigation of a poisoning attack in federated learning by using historical distance detection1
Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living1
On the performance and scalability of consensus mechanisms in privacy-enabled decentralized renewable energy marketplace1
A social-aware content delivery scheme based on D2D communications underlying cellular networks: a Stackelberg game approach1
Secure outsourced attribute-based signcryption for cloud-based Internet of Vehicles in a smart city1
Interactions between artificial intelligence and cybersecurity to protect future networks1
Double spatial media-based modulation with RF mirrors1
A novel collision avoidance scheme for smart parking1
Effects of dataset attacks on machine learning models in e-health1
A blind separation algorithm for heterogeneous mixed signals1
A threat monitoring system for intelligent data analytics of network traffic1
Energy optimization of quantized min-sum decoders for protograph-based LDPC codes1
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison1
Green data collection and processing in smart cities1
Performance evaluation of an HTTP proxy implemented as a virtual network function1
Time-shift immunity for wireless sensor network based on discrete wavelet packets1
An improved user authentication and key agreement scheme for roaming service in ubiquitous network1
Outage probability of dual-hop cooperative communication networks over the Nakagami-m fading channel with RF energy harvesting1
Fibonacci tiles strategy for optimal coverage in IoT networks1
A compact inexpensive UWB-modified elliptic antenna including a slotted ground plane for an indoor positioning system1
Cloud service selection in IoFT-enabled Multi-access Edge Computing: a Game Theoretic approach1
A dynamic channel allocation protocol for medical environment1
Oddlab: fault-tolerant aware load-balancing framework for data center networks1
Enabling technologies for running IoT applications on the cloud1
A modular pipeline for enforcement of security properties at runtime1
0.025516986846924