Annals of Telecommunications

Papers
(The TQCC of Annals of Telecommunications is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
On enhancing the transmission efficiency of modulated UWB signals under different emission standards73
Troubleshooting distributed network emulation45
Analysis of the impact of correlated channels on the outage performance of a NOMA-based covert IOS network43
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts39
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments38
Advanced speech biomarker integration for robust Alzheimer’s disease diagnosis36
Optimizing resource allocation in 5G-V2X communication: adaptive strategies for enhanced QoS in intelligent transportation systems36
Generative AI in mobile networks: a survey35
Efficient bimodal emotion recognition system based on speech/text embeddings and ensemble learning fusion29
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection25
A dynamic AI-based algorithm selection for Virtual Network Embedding20
Joint MEC selection and wireless resource allocation in 5G RAN19
A revocable attribute-based access control with non-monotonic access structure19
A bi-objective optimization model for segment routing traffic engineering19
Distributed congestion control method for sending safety messages to vehicles at a set target distance17
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting16
Towards greener digital infrastructures for ICT and vertical markets16
Performance of cell-free massive MIMO with group SIC detectors and low-resolution ADCs over spatially correlated channels15
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison14
A non-stationary relay-based 3D MIMO channel model with time-variant path gains for human activity recognition in indoor environments13
Testbed of V2X infrastructure for autonomous vehicles12
Network slicing for vehicular communications: a multi-agent deep reinforcement learning approach12
Cooperative localisation for multi-RSU vehicular networks based on predictive beamforming11
Evaluating pending interest table performance under the collusive interest flooding attack in named data networks11
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures10
Automated slow-start detection for anomaly root cause analysis and BBR identification10
Digital sufficiency: conceptual considerations for ICTs on a finite planet9
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives8
Semi-blind AF transmission in secure NOMA systems8
Achieving proportional fairness in WiFi networks via bandit convex optimization7
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models7
Explainable artificial intelligence for cybersecurity: a literature survey7
Investigation of LDPC codes with interleaving for 5G wireless networks7
Wi-Fi faces the new wireless ecosystem: a critical review7
Prediction of low accessibility in 4G networks7
Interactions between artificial intelligence and cybersecurity to protect future networks6
A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population6
A low-complexity iterative algorithm for multiuser millimeter-wave systems6
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum6
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments6
Product of two Gaussian Q-functions as sum of exponentials and its applications5
A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning5
On the interoperability of verifiable credentials: simple universal verifier (SUV)5
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms5
An approach for detecting multi-institution attacks5
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles5
A security and performance analysis of proof-based consensus protocols5
Carbon footprint of cloud, edge, and Internet of Edges5
A deeper look at Ariadne: a privacy-preserving network layer protocol5
Towards programmable IoT with ActiveNDN5
PAPR reduction using constrained convex optimization for vector OFDM5
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype5
Mutated traffic detection and recovery: an adversarial generative deep learning approach4
A study on robustness of malware detection model4
Backscatter communication system efficiency with diffusing surfaces4
Integration of IoT with cloud computing for next generation wireless technology4
Evaluating a mobility-aware ADR scheme in urban and suburban LoRaWAN environments4
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications4
NLOS identification and mitigation in UWB positioning with bagging-based ensembled classifiers4
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks4
Voting-based probabilistic consensuses and their applications in distributed ledgers4
Fibonacci tiles strategy for optimal coverage in IoT networks4
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network4
Handling data scarcity through data augmentation for detecting offensive speech3
A modified ZF algorithm for signal detection in an underwater MIMO STBC-OFDM acoustic communication system3
Special issue on blockchain networks and distributed protocols3
Deep neural network-driven precision agriculture multi-path multi-hop noisy plant image data transmission and plant disease detection3
Experimental assessment of SDR-based 5G positioning: methodologies and insights3
Analyzing the stability, efficiency, and cost of a dynamic data replica balancing architecture for HDFS3
On the $$\eta -\mu $$ shadowed Ricean model for land mobile satellite channels3
Enhancing robustness in federated learning using minimal repair and dynamic adaptation in a scenario with client failures3
Mitigation of a poisoning attack in federated learning by using historical distance detection3
A survey of public datasets for O-RAN: fostering the development of machine learning models3
Robust physical layer security using frequency diverse array directional modulation3
Two level data centric aggregation scheme for wireless sensor networks3
An efficient mobile cloud security method based on strong multi-factor authentication and smart card technology3
SHAKE-ESDRL-based energy efficient intrusion detection and hashing system3
Computing paradigms for smart farming in the era of drones: a systematic review3
Efficient representation of disoccluded regions in 3D video coding3
CSNet 2022 special issue—decentralized and data-driven security in networking3
0.044985055923462