Annals of Telecommunications

Papers
(The TQCC of Annals of Telecommunications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
A compact inexpensive UWB-modified elliptic antenna including a slotted ground plane for an indoor positioning system35
Efficient representation of disoccluded regions in 3D video coding34
A novel offline indoor acoustic synchronization protocol: experimental analysis32
A low-complexity iterative algorithm for multiuser millimeter-wave systems30
Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity26
Social network malicious insider detection using time-based trust evaluation26
Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk26
Multi-carrier multi-level DCSK communication system based on time-reversal20
Robust adaptive beamforming algorithm for coherent signals based on virtual array20
Adaptive password guessing: learning language, nationality and dataset source17
A balanced prior knowledge model based on Beta function for evaluating DIDS performance15
Interactions between artificial intelligence and cybersecurity to protect future networks15
Modeling and improving named data networking over IEEE 802.15.415
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing15
Audio quality level vs. signal-to-interference ratio in isofrequency FM broadcasting14
Efficient approaches to optimize energy consumption in 3D wireless video sensor network under the coverage and connectivity constraints14
Editorial of 6GNet 2023 special issue13
A survey of public datasets for O-RAN: fostering the development of machine learning models13
A biobjective availability optimization problem with nonlinear constraints13
Generative AI in mobile networks: a survey13
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments12
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles12
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels12
CSNet 2022 special issue—decentralized and data-driven security in networking10
Experimental assessment of SDR-based 5G positioning: methodologies and insights10
On enhancing the transmission efficiency of modulated UWB signals under different emission standards10
An approach for detecting multi-institution attacks8
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments7
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum7
Generalization aspect of accurate machine learning models for CSI-based localization7
Towards adversarial realism and robust learning for IoT intrusion detection and classification7
A security and performance analysis of proof-based consensus protocols7
Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards7
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks7
The robust deep learning–based schemes for intrusion detection in Internet of Things environments6
Traffic identification model based on generative adversarial deep convolutional network6
A deeper look at Ariadne: a privacy-preserving network layer protocol6
Multi-layer perceptron for network intrusion detection6
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts6
Publisher Correction: Towards programmable IoT with ActiveNDN6
Troubleshooting distributed network emulation6
Large language models and unsupervised feature learning: implications for log analysis6
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles5
Machine learning for networking5
Lattice-based undeniable signature scheme5
Product of two Gaussian Q-functions as sum of exponentials and its applications5
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks5
Privacy preserving machine unlearning for smart cities5
Challenges and limits of fractal and slot antennas for WLAN, LTE, ISM, and 5G communication: a review paper5
Zt &t: secure service session management using blockchain-based tokens in zero trust networks.4
Orthogonal beamforming technique for massive MIMO systems4
Enhancing the physical layer security in IoT over mixed Rayleigh-Nakagami-m fading channels with untrustworthy relays4
SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems4
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN4
Generating practical adversarial examples against learning-based network intrusion detection systems4
Multi-labeling with topic models for searching security information4
BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels4
A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing4
A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning4
0.26574182510376