Annals of Telecommunications

Papers
(The TQCC of Annals of Telecommunications is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
A compact inexpensive UWB-modified elliptic antenna including a slotted ground plane for an indoor positioning system53
Multi-carrier multi-level DCSK communication system based on time-reversal42
Adaptive password guessing: learning language, nationality and dataset source35
Interactions between artificial intelligence and cybersecurity to protect future networks33
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum32
Editorial of 6GNet 2023 special issue29
CSNet 2022 special issue—decentralized and data-driven security in networking26
Advanced speech biomarker integration for robust Alzheimer’s disease diagnosis25
Robust physical layer security using frequency diverse array directional modulation23
The robust deep learning–based schemes for intrusion detection in Internet of Things environments20
Large language models and unsupervised feature learning: implications for log analysis19
Publisher Correction: Towards programmable IoT with ActiveNDN19
A deeper look at Ariadne: a privacy-preserving network layer protocol15
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments15
Traffic identification model based on generative adversarial deep convolutional network15
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts15
Generative AI in mobile networks: a survey14
Generalization aspect of accurate machine learning models for CSI-based localization14
Robust adaptive beamforming algorithm for coherent signals based on virtual array14
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments13
A security and performance analysis of proof-based consensus protocols12
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles12
Towards adversarial realism and robust learning for IoT intrusion detection and classification11
Modeling and improving named data networking over IEEE 802.15.411
Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards10
Efficient approaches to optimize energy consumption in 3D wireless video sensor network under the coverage and connectivity constraints8
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing8
Social network malicious insider detection using time-based trust evaluation8
Experimental assessment of SDR-based 5G positioning: methodologies and insights7
An approach for detecting multi-institution attacks7
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks7
Troubleshooting distributed network emulation7
A low-complexity iterative algorithm for multiuser millimeter-wave systems7
A survey of public datasets for O-RAN: fostering the development of machine learning models7
Efficient representation of disoccluded regions in 3D video coding7
A balanced prior knowledge model based on Beta function for evaluating DIDS performance6
On enhancing the transmission efficiency of modulated UWB signals under different emission standards6
A biobjective availability optimization problem with nonlinear constraints6
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels6
Multi-layer perceptron for network intrusion detection6
A novel offline indoor acoustic synchronization protocol: experimental analysis6
Product of two Gaussian Q-functions as sum of exponentials and its applications5
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks5
Generating practical adversarial examples against learning-based network intrusion detection systems5
Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk5
A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing5
Reinforcement learning-based clustering scheme for the Internet of Vehicles5
Machine learning for networking5
Orthogonal beamforming technique for massive MIMO systems5
Enhancing the physical layer security in IoT over mixed Rayleigh-Nakagami-m fading channels with untrustworthy relays5
Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity5
Network traffic analysis using machine learning: an unsupervised approach to understand and slice your network4
Multi-labeling with topic models for searching security information4
Integration of blockchain and Internet of Things: challenges and solutions4
Lattice-based undeniable signature scheme4
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks4
Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living4
PAPR reduction using constrained convex optimization for vector OFDM4
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles4
Zt &t: secure service session management using blockchain-based tokens in zero trust networks.4
BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels3
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles3
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms3
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms3
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection3
SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems3
An SDN-based energy-aware traffic management mechanism3
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN3
Blockchain-based whistleblowing service to solve the problem of journalistic conflict of interest3
Towards programmable IoT with ActiveNDN3
A dynamic AI-based algorithm selection for Virtual Network Embedding3
Capacity aware Wi-Fi networks deployment3
Privacy preserving machine unlearning for smart cities3
0.076241016387939