Computer Communications

Papers
(The median citation count of Computer Communications is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-01-01 to 2025-01-01.)
ArticleCitations
Group acknowledgement mechanism for beacon-enabled wireless sensor networks275
Sieve: A flow scheduling framework in SDN based data center networks226
Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare181
VeriBypasser: An automatic image verification code recognition system based on CNN178
Floating Nodes Assisted Cluster-Based Routing for Efficient Data Collection in Underwater Acoustic Sensor Networks171
Leveraging context-awareness for Internet of Things ecosystem: Representation, organization, and management of context156
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network151
Defect identification for oil and gas pipeline safety based on autonomous deep learning network140
Protocol Reverse-Engineering Methods and Tools: A Survey126
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network125
Making stateless and stateful network performance measurements unbiased124
A parallel machine learning-based approach for tsunami waves forecasting using regression trees124
AI-based energy-efficient path planning of multiple logistics UAVs in intelligent transportation systems116
A hybrid trust management framework for a multi-service social IoT network97
Dynamic multiple access based on deep reinforcement learning for Internet of Things97
Estimating the composition ratios of network services carried in mixed traffic87
ER-OCN: Toward efficient network routing in ocean city based on deep reinforcement learning84
Throughput maximization and reliable wireless communication in NOMA using chained fog structure and weighted energy efficiency power allocation approach83
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs79
Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing77
Collaborative cloud-edge-end task offloading with task dependency based on deep reinforcement learning76
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction74
Edge-based platoon control72
Editorial Board71
NetSentry: A deep learning approach to detecting incipient large-scale network attacks71
A new intelligent and data-driven product quality control system of industrial valve manufacturing process in CPS70
DA-DMPF: Delay-aware differential multi-path forwarding of industrial time-triggered flows in deterministic network68
Joint mode selection and resource allocation for cellular V2X communication using distributed deep reinforcement learning under 5G and beyond networks67
Abnormal traffic detection system in SDN based on deep learning hybrid models66
A survey on integrated computing, caching, and communication in the cloud-to-edge continuum66
A decentralized framework for device authentication and data security in the next generation internet of medical things65
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency64
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes63
AntiSense: Standard-compliant CSI obfuscation against unauthorized Wi-Fi sensing63
A survey on 360-degree video: Coding, quality of experience and streaming59
A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System58
Privacy-preserving spam filtering using homomorphic and functional encryption57
Multi-hop routing under short contact in delay tolerant networks56
Joint perception data caching and computation offloading in MEC-enabled vehicular networks55
Performance evaluation of IoT networks: A product density approach54
An interference-conscious reduced routing overhead protocol for Device-to-Device (D2D) Networks52
Optimizing the performance of vehicular delay tolerant networks using multi-objective PSO and artificial intelligence52
Editorial Board52
Graphic image classification method based on an attention mechanism and fusion of multilevel and multiscale deep features51
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks50
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study49
Blockchain based resource allocation in cloud and distributed edge computing: A survey49
IoT-based generalized multi-granulation sequential three-way decisions49
Transient analysis of energy-saving strategy for cognitive radio networks using G-queue with heterogeneity49
NRflex: Enforcing network slicing in 5G New Radio48
Resource orchestration in 5G and beyond: Challenges and opportunities47
A privacy-preserving federated learning protocol with a secure data aggregation for the Internet of Everything45
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks45
Graph-based deep learning for communication networks: A survey45
CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach45
Reinforcement learning multi-agent system for faults diagnosis of mircoservices in industrial settings44
Exploring the design space of privacy-enhanced content discovery for bitswap44
Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks44
A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing43
A seven-dimensional state flow traffic modelling for multi-controller Software-Defined Networks considering multiple switches43
Energy consumption model for data transfer in smartphone43
Multiple intersection selection routing protocol based on road section connectivity probability for urban VANETs42
An IoT and machine learning enhanced framework for real-time digital human modeling and motion simulation42
A proactive caching and offloading technique using machine learning for mobile edge computing users42
Route recommendation for evacuation networks using MM42
Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge41
Handoff control strategy of cyber physical systems under dynamic data attack41
Context-based caching in mobile information-centric networks40
Intelligent routing algorithm for wireless sensor networks dynamically guided by distributed neural networks39
Investigating predictive model-based control to achieve reliable consistent multipath mmWave communication39
A lightweight framework for abnormal driving behavior detection39
System reliability evaluation using budget constrained real d-MC se38
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication37
Edge intelligence for smart airport runway: Architectures and enabling technologies37
An edge computing based data detection scheme for traffic light at intersections36
Learning to optimize power allocation in cell-free massive MIMO networks with hybrid green energy36
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living35
In-network aggregation for data center networks: A survey35
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks35
Cloud native Lightweight Slice Orchestration (CLiSO) framework35
Unified scheduling for predictable communication reliability in cellular networks with D2D Links35
Spectral efficiency analysis and optimal power allocation for uplink multi-user cell-free massive MIMO networks employing STBCs34
Lightweight blockchain assisted secure routing of swarm UAS networking33
A novel OTFS-based directional transmission scheme for airborne networks with ISAC technology33
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.033
Malware containment with immediate response in IoT networks: An optimal control approach32
Noncoherent multiuser massive SIMO with mixed differential and index modulation32
A heterogeneous ring signcryption scheme with privacy protection and conditional tracing for smart grid31
Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations31
Sensor-based implicit authentication through learning user physiological and behavioral characteristics30
A provably secure authentication scheme for RFID-enabled UAV applications30
Enhancing mobile cloud with social-aware device-to-device offloading30
Performance evaluation of Attribute-Based Encryption on constrained IoT devices30
Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use30
LVSegNet: A novel deep learning-based framework for left ventricle automatic segmentation using magnetic resonance imaging29
AI-assisted traffic matrix prediction using GA-enabled deep ensemble learning for hybrid SDN29
D2D communication channel allocation and resource optimization in 5G network based on game theory28
A rapid coarse-grained blind wideband spectrum sensing method for cognitive radio networks27
A segment-graph algorithm for two-objective wireless spectrum allocation in cognitive networks27
Editorial Board26
MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment26
Editorial for Special Issue on Analysis and Performance of Wireless Mobile Systems26
Staggered HLL: Near-continuous-time cardinality estimation with no overhead26
Editorial Board26
Stochastic buffer-and-server-aided relay-assisted mobile edge computing in time-slotted systems26
Multi-layer and multi-order fine-grained feature learning for artwork attribute recognition26
A Survivable Communication Game based Approach for a network of cooperative UAVs25
Editorial Board25
An early stage convolutional feature extracting method using for mining traffic detection25
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud25
Testing AGV mobility control method for MANET coverage optimization using procedural simulation25
Network coding assisted reliable multi-source multicasting over a multi-hop wireless mesh network25
Chameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network24
An efficient data transmission scheme through 5G D2D-enabled relays in wireless sensor networks24
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan24
Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks24
Asynchronous Background Processing for accelerated simulation of wireless communication on multi-core systems24
Is it possible to extend IPv6?23
Wi-Fi throughput estimation and forecasting for vehicle-to-infrastructure communication23
Editorial Board23
Editorial special issue on AI-Driven sensing and computing for cyber-physical systems23
Tag-based self-learning task recommendation for mobile crowdsensing via collaborative multi-expert system23
Editorial Board23
Cellular fault prediction of graphical representation based on spatio-temporal graph convolutional networks23
Velocity tracking control of nodes for the nonlinear complex dynamical networks associated with outgoing links subsystem23
Optimization and analysis of air-to-ground wireless link parameters for UAV mounted adaptable Radar Antenna Array23
Editorial for Special Issue on Machine Learning approaches in IoT scenarios23
Theoretical modeling and analysis of Uplink performance for Three-dimension spatial RISs-aided Wireless communication systems22
The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset22
A three-level slicing algorithm in a multi-slice multi-numerology context22
Network approaches in blockchain-based systems: Applications, challenges, and future directions22
Efficient resource allocation and user association in NOMA-enabled vehicular-aided HetNets with high altitude platforms22
LoRa localisation using single mobile gateway22
Robustness analysis of DNS paths and web access paths in public administration websites22
Optimizing Secrecy Energy Efficiency in RIS-assisted MISO systems using Deep Reinforcement Learning22
Network security situation assessment and prediction method based on multimodal transformation in edge computing22
Design and implementation of P4 virtual switches and P4 virtual networks22
A coalitional game-based joint monitoring mechanism for combating COVID-1921
Anomaly detection method of packet loss node location in heterogeneous hash networks21
Privacy-preserving data dissemination scheme based on Searchable Encryption, publish–subscribe model, and edge computing21
An improved authentication scheme for BLE devices with no I/O capabilities21
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs21
Reinforced practical Byzantine fault tolerance consensus protocol for cyber physical systems21
A deep heterogeneous optimization framework for Bayesian compressive sensing21
A Steiner Tree based efficient network infrastructure design in 5G urban vehicular networks21
Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability21
Femtocell deployment for scalable video transmission in 5G networks21
Improved TDD operation on Software-Defined Radio platforms towards future wireless standards20
RLCS: Towards a robust and efficient mobile edge computing resource scheduling and task offloading system based on graph neural network20
Stochastic geometry approach towards interference management and control in cognitive radio network: A survey20
A spectral clustering algorithm for intelligent grouping in Dense Wireless Networks20
Performance analysis of short-packet communications with incremental relaying20
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication20
ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services20
Hybrid precoding design based on alternating optimization in mmWave massive MIMO systems aided by intelligent reflecting surface20
Trustworthy artificial intelligence classification-based equivalent bandwidth control20
Dynamic power allocation strategy for uplink non-orthogonal multiple access systems20
Trade-off analysis between delay and throughput of RAN slicing for smart grid20
A hierarchical caching strategy in content delivery network19
WOGRU-IDS — An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks19
A secure and lightweight cloud data deduplication scheme with efficient access control and key management19
EESR: Energy efficient sector-based routing protocol for reliable data communication in UWSNs19
A sustainable deep learning framework for fault detection in 6G Industry 4.0 heterogeneous data environments19
A cooperative resource allocation model for IoT applications in mobile edge computing19
Multi-objective cooperative computation offloading for MEC in UAVs hybrid networks via integrated optimization framework19
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation19
Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks19
A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks18
A Semi-supervised Sensing Rate Learning based CMAB scheme to combat COVID-19 by trustful data collection in the crowd18
AI-assisted secure data transmission techniques for next-generation HetNets: A review18
Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes18
Performance evaluation of mobile RPL-based IoT networks under version number attack18
AP-assisted adaptive video streaming in wireless networks with high-density clients18
Accuracy enhancement of Wi-Fi positioning by ranging in dense UWB networks18
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks18
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks18
VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain18
Fairness-oriented multicast routing for distributed interactive applications18
Mixed noise-guided mutual constraint framework for unsupervised anomaly detection in smart industries18
DRTP: A generic Differentiated Reliable Transport Protocol17
A robust multi-key authority system for privacy-preserving distribution and access control of healthcare data17
Privacy-preserving WiFi fingerprint-based people counting for crowd management17
Energy efficiency optimization for 6G multi-IRS multi-cell NOMA vehicle-to-infrastructure communication networks17
Operation and maintenance(O&M) for data center: An intelligent anomaly detection approach17
Attention-transfer-based path loss prediction in asymmetric massive MIMO IoT systems17
5G configured grant scheduling for seamless integration with TSN industrial networks17
Application of no-light fault prediction of PON based on deep learning method17
SDNRoute: Proactive routing optimization in Software Defined Networks17
A novel approach for ray tracing optimization in wireless communication17
Optimization of 5G base station coverage based on self-adaptive mutation genetic algorithm17
Enabling privacy by anonymization in the collection of similar data in multi-domain IoT17
Green traffic backhauling in next generation wireless communication networks incorporating FSO/mmWave technologies17
Full/half-duplex unmanned aerial vehicles assisted wireless systems: Performance analysis and optimization16
Real-time prevention of trust-related attacks in social IoT using blockchain and Apache spark16
Edge computing-empowered task offloading in PLC-wireless integrated network based on matching with quota16
Hop-by-hop bandwidth allocation and deployment for SFC with end-to-end delay QoS guarantees16
Learning-based intrusion detection for high-dimensional imbalanced traffic16
Reliable and efficient emergency rescue networks: A blockchain and fireworks algorithm-based approach16
Towards security automation in Software Defined Networks16
Quantum-resistant Transport Layer Security16
An adaptive regional model spectrum sensing algorithm based on TD-LTE system16
An anonymous authentication and key agreement protocol in smart living16
Computationally efficient topology optimization of scale-free IoT networks16
Hierarchical pattern matching for anomaly detection in time series16
Secure and energy-efficient smart building architecture with emerging technology IoT16
Weighted triplet loss based on deep neural networks for loop closure detection in VSLAM16
Multi-objective task offloading for highly dynamic heterogeneous Vehicular Edge Computing: An efficient reinforcement learning approach16
Tethering Layer 2 solutions to the blockchain: A survey on proving schemes16
AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing16
CANET: A hierarchical CNN-Attention model for Network Intrusion Detection16
A novel insurance claim blockchain scheme based on zero-knowledge proof technology16
Traffic flow prediction using multi-view graph convolution and masked attention mechanism16
Analysis of mobility robustness optimization in ultra-dense heterogeneous networks15
A multimodal dual-fusion entity extraction model for large and complex devices15
A survey on UAV-assisted wireless communications: Recent advances and future trends15
A dynamic data access control scheme for hierarchical structures in big data15
Application of edge computing-based information-centric networking in smart cities15
Multi-tenant resource sharing with equitable-priority-based performance isolation of slices for 5G cellular systems15
Risk model of financial supply chain of Internet of Things enterprises: A research based on convolutional neural network15
An improved routing protocol for raw data collection in multihop wireless sensor networks15
Survival backup strategy for controller placement problem in Software Defined Networking15
An ultra light weight and secure RFID batch authentication scheme for IoMT15
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment15
Blockchain-empowered secure federated learning system: Architecture and applications15
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework15
Multiple UAVs collaborative traffic monitoring with intention-based communication15
A federated calibration scheme for convolutional neural networks: Models, applications and challenges15
Optimization of battery swapping infrastructure for e-commerce drone delivery15
Autonomous flying IoT: A synergy of machine learning, digital elevation, and 3D structure change detection15
A mutual information based federated learning framework for edge computing networks15
Air–Ground Surveillance Sensor Network based on edge computing for target tracking15
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems14
SDN-based detection and mitigation of DDoS attacks on smart homes14
Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning14
5G for Connected and Automated Mobility - Network Level Evaluation on Real Neighboring 5G Networks: The Greece - Turkey Cross Border Corridor14
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope14
NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme14
A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research14
HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments14
Dynamic task offloading and service caching based on game theory in vehicular edge computing networks14
Analysis of physical health risk dynamic evaluation system based on sports network technology14
Memory-enhanced appearance-motion consistency framework for video anomaly detection14
Minimizing cost for influencing target groups in social network: A model and algorithmic approach14
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach14
Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review14
A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver14
A hierarchical adaptive federated reinforcement learning for efficient resource allocation and task scheduling in hierarchical IoT network14
Link and stability-aware adaptive cooperative routing with restricted packets transmission and void-avoidance for underwater acoustic wireless sensor networks14
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning14
An attack-resistant target localization in underwater based on consensus fusion14
0.070245027542114