Computer Communications

Papers
(The H4-Index of Computer Communications is 47. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
A Steiner Tree based efficient network infrastructure design in 5G urban vehicular networks355
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan346
An attack-resistant target localization in underwater based on consensus fusion193
Sensor-based implicit authentication through learning user physiological and behavioral characteristics181
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction139
Channel-hopping sequence generation for blind rendezvous in cognitive radio-enabled internet of vehicles: A multi-agent twin delayed deep deterministic policy gradient-based method113
Editorial Board92
Editorial special issue on AI-Driven sensing and computing for cyber-physical systems92
Editorial Board86
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks83
Editorial Board82
A dynamic data access control scheme for hierarchical structures in big data80
An improved authentication scheme for BLE devices with no I/O capabilities77
A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks76
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks74
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud72
Digital twin-assisted multi-layer networks for low-latency and energy-efficient communication68
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes67
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study66
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication65
A multimodal dual-fusion entity extraction model for large and complex devices63
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.062
The human digital twin for service management: Architecture and user modeling62
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation60
NetSentry: A deep learning approach to detecting incipient large-scale network attacks59
Enabling ML-driven threat detection: An analysis of IoT network traffic datasets58
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks57
A two-stage data placement strategy for cloud-edge-device collaborative environment57
RLCS: Towards a robust and efficient mobile edge computing resource scheduling and task offloading system based on graph neural network56
Fine-grained frequencies meet synchronous transmission54
NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment54
Probing-aided spectrum sensing-based hybrid access strategy for energy harvesting CRNs52
APAP: An adaptive packet-reproduction and active packet-loss data collection protocol for WSNs52
GNNetSlice: A GNN-based performance model to support network slicing in B5G networks51
A distributed routing-aware power control scheme for underwater wireless sensor networks50
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning50
Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver50
Federated learning: A cutting-edge survey of the latest advancements and applications49
High-precision real-time UAV target recognition based on improved YOLOv449
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution48
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication48
Stochastic modelling of multi-layer HAP-LEO systems in 6G for energy saving: An analytical approach48
On the optimal resistance against mafia and distance fraud in distance-bounding protocols47
Estimating autonomous system risk levels by analyzing IXP route server RIB47
UAVs deployment optimization in cell-free aerial communication networks47
f247
Autonomous cyber defense for AIoT using Graph Attention Network-Enhanced reinforcement learning47
0.26349186897278