Computer Communications

Papers
(The H4-Index of Computer Communications is 46. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Digital twin-assisted multi-layer networks for low-latency and energy-efficient communication301
Channel-hopping sequence generation for blind rendezvous in cognitive radio-enabled internet of vehicles: A multi-agent twin delayed deep deterministic policy gradient-based method296
Editorial special issue on AI-Driven sensing and computing for cyber-physical systems216
Editorial Board175
Sensor-based implicit authentication through learning user physiological and behavioral characteristics155
Editorial Board151
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks103
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes98
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs93
A Steiner Tree based efficient network infrastructure design in 5G urban vehicular networks86
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan85
Energy consumption model for data transfer in smartphone79
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study78
A dynamic data access control scheme for hierarchical structures in big data77
A multimodal dual-fusion entity extraction model for large and complex devices76
An attack-resistant target localization in underwater based on consensus fusion74
A lightweight framework for abnormal driving behavior detection74
Editorial Board71
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation71
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication70
Protocol Reverse-Engineering Methods and Tools: A Survey68
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud66
An improved authentication scheme for BLE devices with no I/O capabilities65
RLCS: Towards a robust and efficient mobile edge computing resource scheduling and task offloading system based on graph neural network65
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks64
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks62
A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks62
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.061
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction60
NetSentry: A deep learning approach to detecting incipient large-scale network attacks60
Graph-based deep learning for communication networks: A survey58
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks58
Link and stability-aware adaptive cooperative routing with restricted packets transmission and void-avoidance for underwater acoustic wireless sensor networks57
A distributed routing-aware power control scheme for underwater wireless sensor networks56
Big data-driven scheduling optimization algorithm for Cyber–Physical Systems based on a cloud platform55
HMLB: Holonic multi-agent approach for preventive controllers load-balancing in SDN-enabled smart grid52
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network52
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments50
APAP: An adaptive packet-reproduction and active packet-loss data collection protocol for WSNs50
Multi-UAV WRSN charging path planning based on improved heed and IA-DRL50
Stochastic modelling of multi-layer HAP-LEO systems in 6G for energy saving: An analytical approach49
Probing-aided spectrum sensing-based hybrid access strategy for energy harvesting CRNs48
Flow-based Service Time optimization in software-defined networks using Deep Reinforcement Learning48
Estimating autonomous system risk levels by analyzing IXP route server RIB48
Autonomous cyber defense for AIoT using Graph Attention Network-Enhanced reinforcement learning47
NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment47
On the optimal resistance against mafia and distance fraud in distance-bounding protocols46
UAVs deployment optimization in cell-free aerial communication networks46
0.066136121749878