Computer Communications

Papers
(The median citation count of Computer Communications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture241
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art200
Drone-surveillance for search and rescue in natural disaster181
Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review152
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey149
Unmanned aerial vehicle for internet of everything: Opportunities and challenges139
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks137
Industrial Control Systems: Cyberattack trends and countermeasures130
Secure and energy-efficient smart building architecture with emerging technology IoT128
A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research126
Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs)119
Edge and fog computing for IoT: A survey on current research activities & future directions110
Internet of Things attack detection using hybrid Deep Learning Model109
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems103
Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare102
Green communication in IoT networks using a hybrid optimization algorithm101
A taxonomy of AI techniques for 6G communication networks98
Graph-based deep learning for communication networks: A survey89
Continuous health monitoring of sportsperson using IoT devices based wearable technology85
A taxonomy of blockchain-enabled softwarization for secure UAV network82
A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications82
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment81
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes80
Vehicle communication network in intelligent transportation system based on Internet of Things76
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review75
SDN/NFV architectures for edge-cloud oriented IoT: A systematic review75
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks75
Resource provisioning for IoT services in the fog computing environment: An autonomic approach73
Path extension similarity link prediction method based on matrix algebra in directed networks72
Geo-distributed efficient deployment of containers with Kubernetes72
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment69
Federated Learning for intrusion detection system: Concepts, challenges and future directions68
Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions67
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment66
EDGF: Empirical dataset generation framework for wireless sensor networks65
Optimal caching scheme in D2D networks with multiple robot helpers65
Blockchain based integrated security measure for reliable service delegation in 6G communication environment65
A review of wireless communication using high-altitude platforms for extended coverage and capacity64
Using data mining techniques to explore security issues in smart living environments in Twitter63
A study of LoRaWAN protocol performance for IoT applications in smart agriculture62
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets62
A hybrid Intrusion Detection System based on Sparse autoencoder and Deep Neural Network62
A deep neural networks based model for uninterrupted marine environment monitoring61
Deep reinforcement learning for computation offloading in mobile edge computing environment60
Three-factor authentication protocol using physical unclonable function for IoV59
Privacy preserving distributed machine learning with federated learning59
An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks59
SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network59
Lightweight blockchain assisted secure routing of swarm UAS networking59
Energy-efficient task scheduling and physiological assessment in disaster management using UAV-assisted networks58
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications58
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)56
A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework56
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm55
Intelligent workload allocation in IoT–Fog–cloud architecture towards mobile edge computing55
A driving intention prediction method based on hidden Markov model for autonomous driving54
A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things54
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks53
Internet of Flying Things (IoFT): A Survey53
Bee optimization based random double adaptive whale optimization model for task scheduling in cloud computing environment52
Information-Centric Networking solutions for the Internet of Things: A systematic mapping review51
IoT enabled HELMET to safeguard the health of mine workers50
A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN49
Securing Internet of Medical Things with Friendly-jamming schemes49
OntoBestFit: A Best-Fit Occurrence Estimation strategy for RDF driven faceted semantic search48
Efficient deep neural networks for classification of COVID-19 based on CT images: Virtualization via software defined radio47
Optimized multi-UAV cooperative path planning under the complex confrontation environment47
Energy-efficient and SDN-enabled routing algorithm for wireless body area networks46
A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)46
Diagnosis of heart diseases by a secure Internet of Health Things system based on Autoencoder Deep Neural Network46
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems45
Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare45
Deep learning for intelligent IoT: Opportunities, challenges and solutions44
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework44
Fault management frameworks in wireless sensor networks: A survey44
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey44
A survey on continuous authentication methods in Internet of Things environment44
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain43
Monitoring area coverage optimization algorithm based on nodes perceptual mathematical model in wireless sensor networks43
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem43
Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm42
A Novel Edge Computing Architecture Based on Adaptive Stratified Sampling41
Blockchain technology as a Fog computing security and privacy solution: An overview41
Deep reinforcement learning meets graph neural networks: Exploring a routing optimization use case41
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT41
Optimization of collaborative resource allocation for mobile edge computing40
Efficient deployment of UAVs for disaster management: A multi-criterion optimization approach40
Optimized data storage algorithm of IoT based on cloud computing in distributed system39
Result return aware offloading scheme in vehicular edge networks for IoT38
Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography38
Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks38
Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment37
Secure Device-to-Device communications for 5G enabled Internet of Things applications37
Malware propagation model in wireless sensor networks under attack–defense confrontation37
Benchmarking open source NFV MANO systems: OSM and ONAP37
Research on resource allocation of vocal music teaching system based on mobile edge computing36
Optimization of battery swapping infrastructure for e-commerce drone delivery36
Survey on watermarking methods in the artificial intelligence domain and beyond36
Dynamic server placement in edge computing toward Internet of Vehicles35
Cryptomining makes noise: Detecting cryptojacking via Machine Learning35
A method of two-stage clustering learning based on improved DBSCAN and density peak algorithm35
A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks35
A cooperative resource allocation model for IoT applications in mobile edge computing35
Do we need a contact tracing app?35
Security information transmission algorithms for IoT based on cloud computing35
Towards SDN-based smart contract solution for IoT access control34
Intelligent power monitoring of building equipment based on Internet of Things technology34
Joint routing and scheduling for large-scale deterministic IP networks34
Implementing a blockchain-based local energy market: Insights on communication and scalability34
Intelligent early structural health prognosis with nonlinear system identification for RFID signal analysis33
Multi-source social media data sentiment analysis using bidirectional recurrent convolutional neural networks33
A provably secure authentication scheme for RFID-enabled UAV applications32
Design and deployment of a practical IoT-based monitoring system for protected cultivations32
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning32
Logistics industry monitoring system based on wireless sensor network platform31
“DRL + FL”: An intelligent resource allocation model based on deep reinforcement learning for Mobile Edge Computing31
An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers31
A comprehensive approach for optimizing controller placement in Software-Defined Networks30
Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks30
Energy-efficient computation offloading for vehicular edge computing networks30
Are mobility management solutions ready for 5G and beyond?30
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks30
Social media privacy management strategies: A SEM analysis of user privacy behaviors29
BlockTour: A blockchain-based smart tourism platform29
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review29
A survey on 360-degree video: Coding, quality of experience and streaming29
Physical-layer security based mobile edge computing for emerging cyber physical systems29
Cloud-gaming: Analysis of Google Stadia traffic29
UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things29
A smartphone perspective on computation offloading—A survey29
The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data29
Privacy-preserving using homomorphic encryption in Mobile IoT systems29
Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection28
Flow length and size distributions in campus Internet traffic28
A secure and lightweight authentication scheme for next generation IoT infrastructure28
Fog Computing Based Hybrid Deep Learning Framework in effective inspection system for smart manufacturing28
A review on P4-Programmable data planes: Architecture, research efforts, and future directions28
Explore emission reduction strategy and evolutionary mechanism under central environmental protection inspection system for multi-agent based on evolutionary game theory28
Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing27
Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications27
A federated calibration scheme for convolutional neural networks: Models, applications and challenges27
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security26
Network intrusion detection based on IE-DBN model26
Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm26
Quantum and classical genetic algorithms for multilevel segmentation of medical images: A comparative study26
A new intelligent and data-driven product quality control system of industrial valve manufacturing process in CPS26
Security on in-vehicle communication protocols: Issues, challenges, and future research directions25
An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband25
Weighted utility aware computational overhead minimization of wireless power mobile edge cloud25
Deployment and optimization of wireless network node deployment and optimization in smart cities25
A wearable blood oxygen saturation monitoring system based on bluetooth low energy technology25
A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment25
Service architecture of IoT terminal connection based on blockchain identity authentication system25
IADF-CPS: Intelligent Anomaly Detection Framework towards Cyber Physical Systems25
COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach24
D2D communication mode selection and resource allocation in 5G wireless networks24
A security framework for Ethereum smart contracts24
A hybrid trust management framework for a multi-service social IoT network24
A privacy and session key based authentication scheme for medical IoT networks24
An adaptive and Distributed Traffic Management System using Vehicular Ad-hoc Networks24
Task offloading in vehicular edge computing networks via deep reinforcement learning24
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems24
Subjective logic-based trust model for fog computing24
Suppressed K-Anonymity Multi-Factor Authentication Based Schmidt-Samoa Cryptography for privacy preserved data access in cloud computing24
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning24
Remaining useful life prediction based on state assessment using edge computing on deep learning23
3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks23
Distributed task offloading strategy to low load base stations in mobile edge computing environment23
Priority-based data transmission using selective decision modes in wearable sensor based healthcare applications22
A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions22
An ultra light weight and secure RFID batch authentication scheme for IoMT22
On deep reinforcement learning security for Industrial Internet of Things22
Probabilistic Stone’s Blind Source Separation with application to channel estimation and multi-node identification in MIMO IoT green communication and multimedia systems22
NRflex: Enforcing network slicing in 5G New Radio22
A new GSO based method for SDN controller placement22
Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things22
An efficient and practical certificateless signcryption scheme for wireless body area networks21
An exploratory study of congestion control techniques in Wireless Sensor Networks21
High-performance flow classification using hybrid clusters in software defined mobile edge computing21
Edge caching and computing in 5G for mobile augmented reality and haptic internet21
Classification of flower image based on attention mechanism and multi-loss attention network21
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks21
Collision-free and low delay MAC protocol based on multi-level quorum system in underwater wireless sensor networks21
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things21
A collaborative caching strategy for content-centric enabled wireless sensor networks20
A blockchain-based access control and intrusion detection framework for satellite communication systems20
Deep Reinforcement Learning-based resource allocation strategy for Energy Harvesting-Powered Cognitive Machine-to-Machine Networks20
An energy harvesting solution for computation offloading in Fog Computing networks20
An energy-efficient topology control algorithm for optimizing the lifetime of wireless ad-hoc IoT networks in 5G and B5G20
Condition monitoring of power transmission and transformation equipment based on industrial internet of things technology20
Resource allocation solution for sensor networks using improved chaotic firefly algorithm in IoT environment20
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations20
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT20
Resource scheduling for piano teaching system of internet of things based on mobile edge computing20
Multi-algorithm UWB-based localization method for mixed LOS/NLOS environments20
5G heterogeneous network selection and resource allocation optimization based on cuckoo search algorithm20
Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks19
Time-optimal trajectory planning of manipulator with simultaneously searching the optimal path19
Blockchain-based Mobility-aware Offloading mechanism for Fog computing services19
Air quality assessment system based on self-driven drone and LoRaWAN network19
Locally private frequency estimation of physical symptoms for infectious disease analysis in Internet of Medical Things19
A survey on TCP over mmWave19
Decentralized adaptive indoor positioning protocol using Bluetooth Low Energy19
Public key encryption supporting equality test and flexible authorization without bilinear pairings19
Certificateless signature schemes in Industrial Internet of Things: A comparative survey19
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network19
FoT-Stream: A Fog platform for data stream analytics in IoT19
A novel adaptive density-based spatial clustering of application with noise based on bird swarm optimization algorithm19
Controller placements for latency minimization of both primary and backup paths in SDNs19
An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network19
A distributed and low-overhead traffic congestion control protocol for vehicular ad hoc networks18
URLLC in UAV-enabled multicasting systems: A dual time and energy minimization problem using UAV speed, altitude and beamwidth18
Green computing in IoT: Time slotted simultaneous wireless information and power transfer18
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network18
A deep learning based non-intrusive household load identification for smart grid in China18
WOGRU-IDS — An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks18
Deep reinforcement learning-based joint task and energy offloading in UAV-aided 6G intelligent edge networks18
ELC: Edge Linked Caching for content updating in information-centric Internet of Things18
BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme18
A privacy-preserving and verifiable federated learning method based on blockchain18
A comparative study on consensus mechanism with security threats and future scopes: Blockchain18
Multiple intersection selection routing protocol based on road section connectivity probability for urban VANETs18
Reinforcement learning-enabled Intelligent Device-to-Device (I-D2D) communication in Narrowband Internet of Things (NB-IoT)18
Experimental vs. simulation analysis of LoRa for vehicular communications18
Spatial Reuse in IEEE 802.11ax WLANs18
Detection of algorithmically-generated domains: An adversarial machine learning approach18
Signal frequency domain analysis and sensor fault diagnosis based on artificial intelligence18
D2D communication channel allocation and resource optimization in 5G network based on game theory18
A sustainable deep learning framework for fault detection in 6G Industry 4.0 heterogeneous data environments17
A survey on improving the wireless communication with adaptive antenna selection by intelligent method17
Deep reinforcement learning-based multi-objective edge server placement in Internet of Vehicles17
An architecture for adaptive task planning in support of IoT-based machine learning applications for disaster scenarios17
Privacy-preserving compression model for efficient IoMT ECG sharing17
An improved OIF Elman neural network based on CSO algorithm and its applications17
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL17
A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems17
TMSE: A topology modification strategy to enhance the robustness of scale-free wireless sensor networks17
Face detection algorithm based on improved TinyYOLOv3 and attention mechanism17
A software-defined caching scheme for the Internet of Things17
SecDH: Security of COVID-19 images based on data hiding with PCA17
Improving mobile ad hoc networks using hybrid IP-Information Centric Networking17
Application of data mining technology in alarm analysis of communication network17
FIS-RGSO: Dynamic Fuzzy Inference System Based Reverse Glowworm Swarm Optimization of energy and coverage in green mobile wireless sensor networks17
Analysis and design of robust guaranteed cost Active Queue Management16
Increasing energy efficiency of Massive-MIMO network via base stations switching using reinforcement learning and radio environment maps16
A resource allocation deep active learning based on load balancer for network intrusion detection in SDN sensors16
A performance-aware dynamic scheduling algorithm for cloud-based IoT applications16
Urban expressway parallel pattern recognition based on intelligent IOT data processing for smart city16
Learning to upgrade internet information security and protection strategy in big data era16
Edge-based platoon control16
0.072740793228149