Computer Communications

Papers
(The TQCC of Computer Communications is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Applications of Artificial Intelligence and Machine learning in smart cities337
An exhaustive survey on security and privacy issues in Healthcare 4.0245
An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture233
Blockchain platform for industrial healthcare: Vision and future opportunities202
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art186
Drone-surveillance for search and rescue in natural disaster172
Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review147
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment145
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey141
Unmanned aerial vehicle for internet of everything: Opportunities and challenges133
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks130
A lightweight authentication and key agreement scheme for Internet of Drones130
Software defined solutions for sensors in 6G/IoE128
Industrial Control Systems: Cyberattack trends and countermeasures128
Machine Learning Models for Secure Data Analytics: A taxonomy and threat model128
A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research120
Secure and energy-efficient smart building architecture with emerging technology IoT119
Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs)113
TS-LoRa: Time-slotted LoRaWAN for the Industrial Internet of Things104
Internet of Things attack detection using hybrid Deep Learning Model104
Edge and fog computing for IoT: A survey on current research activities & future directions101
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems101
Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks100
Green communication in IoT networks using a hybrid optimization algorithm100
Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare98
A taxonomy of AI techniques for 6G communication networks97
Graph-based deep learning for communication networks: A survey83
A taxonomy of blockchain-enabled softwarization for secure UAV network81
Continuous health monitoring of sportsperson using IoT devices based wearable technology80
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment79
A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications78
SDN/NFV architectures for edge-cloud oriented IoT: A systematic review75
Vehicle communication network in intelligent transportation system based on Internet of Things75
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes74
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review73
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks72
Resource provisioning for IoT services in the fog computing environment: An autonomic approach71
Geo-distributed efficient deployment of containers with Kubernetes71
Path extension similarity link prediction method based on matrix algebra in directed networks69
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment68
Big Data analytics and IoT in Operation safety management in Under Water Management68
New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges67
Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions67
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment65
Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems65
Optimal caching scheme in D2D networks with multiple robot helpers65
EDGF: Empirical dataset generation framework for wireless sensor networks63
Blockchain based integrated security measure for reliable service delegation in 6G communication environment63
Cascading handcrafted features and Convolutional Neural Network for IoT-enabled brain tumor segmentation63
Using data mining techniques to explore security issues in smart living environments in Twitter62
A review of wireless communication using high-altitude platforms for extended coverage and capacity61
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets61
A deep neural networks based model for uninterrupted marine environment monitoring61
Federated Learning for intrusion detection system: Concepts, challenges and future directions60
Efficient resource management and workload allocation in fog–cloud computing paradigm in IoT using learning classifier systems59
Privacy preserving distributed machine learning with federated learning59
Deep reinforcement learning for computation offloading in mobile edge computing environment58
Lightweight blockchain assisted secure routing of swarm UAS networking58
SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network58
Using data mining techniques for bike sharing demand prediction in metropolitan city58
Three-factor authentication protocol using physical unclonable function for IoV58
Energy-efficient task scheduling and physiological assessment in disaster management using UAV-assisted networks57
A hybrid Intrusion Detection System based on Sparse autoencoder and Deep Neural Network57
An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks57
A study of LoRaWAN protocol performance for IoT applications in smart agriculture57
Energy and delay efficient fog computing using caching mechanism55
Intelligent workload allocation in IoT–Fog–cloud architecture towards mobile edge computing54
Traffic signal control for smart cities using reinforcement learning54
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications54
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks53
Internet of Flying Things (IoFT): A Survey53
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm52
A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things52
Establishment and application of intelligent city building information model based on BP neural network model51
Convolutional neural networks for 5G-enabled Intelligent Transportation System : A systematic review51
A driving intention prediction method based on hidden Markov model for autonomous driving50
Information-Centric Networking solutions for the Internet of Things: A systematic mapping review50
A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN49
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)48
A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework47
Securing Internet of Medical Things with Friendly-jamming schemes47
IoT enabled HELMET to safeguard the health of mine workers47
Efficient deep neural networks for classification of COVID-19 based on CT images: Virtualization via software defined radio47
Bee optimization based random double adaptive whale optimization model for task scheduling in cloud computing environment47
Optimized multi-UAV cooperative path planning under the complex confrontation environment46
OntoBestFit: A Best-Fit Occurrence Estimation strategy for RDF driven faceted semantic search46
Diagnosis of heart diseases by a secure Internet of Health Things system based on Autoencoder Deep Neural Network46
Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare45
Emotion recognition from spatiotemporal EEG representations with hybrid convolutional recurrent neural networks via wearable multi-channel headset45
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems44
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem43
Energy-efficient and SDN-enabled routing algorithm for wireless body area networks43
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey43
Fault management frameworks in wireless sensor networks: A survey43
Application of attitude tracking algorithm for face recognition based on OpenCV in the intelligent door lock42
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain42
Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm41
Deep learning for intelligent IoT: Opportunities, challenges and solutions41
A survey on continuous authentication methods in Internet of Things environment41
A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things41
Monitoring area coverage optimization algorithm based on nodes perceptual mathematical model in wireless sensor networks41
A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)41
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT40
A Novel Edge Computing Architecture Based on Adaptive Stratified Sampling40
Social media sentiment analysis through parallel dilated convolutional neural network for smart city applications40
Deep reinforcement learning meets graph neural networks: Exploring a routing optimization use case40
Optimization of collaborative resource allocation for mobile edge computing38
Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks38
Result return aware offloading scheme in vehicular edge networks for IoT38
Efficient deployment of UAVs for disaster management: A multi-criterion optimization approach38
Construction of complex network of green infrastructure in smart city under spatial differentiation of landscape37
Blockchain technology as a Fog computing security and privacy solution: An overview37
Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment37
Optimized data storage algorithm of IoT based on cloud computing in distributed system37
Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography36
The method of Internet of Things access and network communication based on MQTT36
Research on resource allocation of vocal music teaching system based on mobile edge computing36
Performance modeling and analysis of a Hyperledger-based system using GSPN36
Malware propagation model in wireless sensor networks under attack–defense confrontation36
Benchmarking open source NFV MANO systems: OSM and ONAP36
Enhancement of e-commerce security through asymmetric key algorithm35
Optimization of battery swapping infrastructure for e-commerce drone delivery35
Security information transmission algorithms for IoT based on cloud computing35
A cooperative resource allocation model for IoT applications in mobile edge computing35
Dynamic server placement in edge computing toward Internet of Vehicles35
Secure Device-to-Device communications for 5G enabled Internet of Things applications35
Implementing a blockchain-based local energy market: Insights on communication and scalability34
Do we need a contact tracing app?34
Energy efficient routing algorithm in wireless body area networks for smart wearable patches33
A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks33
Privacy preserving distributed data mining based on secure multi-party computation33
Joint routing and scheduling for large-scale deterministic IP networks33
Survey on watermarking methods in the artificial intelligence domain and beyond33
Intelligent power monitoring of building equipment based on Internet of Things technology33
Intelligent early structural health prognosis with nonlinear system identification for RFID signal analysis33
A provably secure authentication scheme for RFID-enabled UAV applications32
Multi-source social media data sentiment analysis using bidirectional recurrent convolutional neural networks32
Cryptomining makes noise: Detecting cryptojacking via Machine Learning32
Joint offloading decision and resource allocation for mobile edge computing enabled networks31
A comprehensive approach for optimizing controller placement in Software-Defined Networks30
A method of two-stage clustering learning based on improved DBSCAN and density peak algorithm30
Are mobility management solutions ready for 5G and beyond?30
Logistics industry monitoring system based on wireless sensor network platform30
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework30
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning29
The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data29
A survey on 360-degree video: Coding, quality of experience and streaming29
Physical-layer security based mobile edge computing for emerging cyber physical systems29
Energy-efficient computation offloading for vehicular edge computing networks29
“DRL + FL”: An intelligent resource allocation model based on deep reinforcement learning for Mobile Edge Computing29
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review29
Control method of urban intelligent parking guidance system based on Internet of Things29
A secure and lightweight authentication scheme for next generation IoT infrastructure28
UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things28
An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers28
A review on P4-Programmable data planes: Architecture, research efforts, and future directions28
Towards an SDR implementation of LoRa: Reverse-engineering, demodulation strategies and assessment over Rayleigh channel28
Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks28
Amateur Drones Detection: A machine learning approach utilizing the acoustic signals in the presence of strong interference28
Modeling and reasoning of IoT architecture in semantic ontology dimension27
A federated calibration scheme for convolutional neural networks: Models, applications and challenges27
Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection27
BlockTour: A blockchain-based smart tourism platform27
Flow length and size distributions in campus Internet traffic27
A bidirectional congestion control transport protocol for the internet of drones27
SEAL: Self-adaptive AUV-based localization for sparsely deployed Underwater Sensor Networks27
Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing27
Privacy-preserving using homomorphic encryption in Mobile IoT systems27
Explore emission reduction strategy and evolutionary mechanism under central environmental protection inspection system for multi-agent based on evolutionary game theory27
Towards SDN-based smart contract solution for IoT access control27
Design and deployment of a practical IoT-based monitoring system for protected cultivations27
A smartphone perspective on computation offloading—A survey27
Social media privacy management strategies: A SEM analysis of user privacy behaviors26
Quantum and classical genetic algorithms for multilevel segmentation of medical images: A comparative study26
Device-to-device content caching techniques in 5G: A taxonomy, solutions, and challenges26
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks25
Network intrusion detection based on IE-DBN model25
Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm25
A new intelligent and data-driven product quality control system of industrial valve manufacturing process in CPS25
IADF-CPS: Intelligent Anomaly Detection Framework towards Cyber Physical Systems25
Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications25
A wearable blood oxygen saturation monitoring system based on bluetooth low energy technology25
Cloud-gaming: Analysis of Google Stadia traffic25
An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband24
A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment24
Fog Computing Based Hybrid Deep Learning Framework in effective inspection system for smart manufacturing24
Subjective logic-based trust model for fog computing24
An adaptive and Distributed Traffic Management System using Vehicular Ad-hoc Networks24
A hybrid trust management framework for a multi-service social IoT network24
Weighted utility aware computational overhead minimization of wireless power mobile edge cloud24
Suppressed K-Anonymity Multi-Factor Authentication Based Schmidt-Samoa Cryptography for privacy preserved data access in cloud computing24
Remaining useful life prediction based on state assessment using edge computing on deep learning23
Security on in-vehicle communication protocols: Issues, challenges, and future research directions23
A privacy and session key based authentication scheme for medical IoT networks23
Node layout plans for urban underground logistics systems based on heuristic Bat algorithm23
Service architecture of IoT terminal connection based on blockchain identity authentication system23
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security23
A security framework for Ethereum smart contracts23
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems22
Malware classification algorithm using advanced Word2vec-based Bi-LSTM for ground control stations22
Task offloading in vehicular edge computing networks via deep reinforcement learning22
Deployment and optimization of wireless network node deployment and optimization in smart cities22
Distributed task offloading strategy to low load base stations in mobile edge computing environment22
D2D communication mode selection and resource allocation in 5G wireless networks22
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning22
On deep reinforcement learning security for Industrial Internet of Things22
COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach22
Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things22
Handling imbalanced data with concept drift by applying dynamic sampling and ensemble classification model21
High-performance flow classification using hybrid clusters in software defined mobile edge computing21
A performance analysis of Software Defined Network based prevention on phishing attack in cyberspace using a deep machine learning with CANTINA approach (DMLCA)21
Study on real-time wearable sport health device based on body sensor networks21
Classification of flower image based on attention mechanism and multi-loss attention network21
Priority-based data transmission using selective decision modes in wearable sensor based healthcare applications21
Real-time detection of energy consumption of IoT network nodes based on artificial intelligence21
Edge caching and computing in 5G for mobile augmented reality and haptic internet21
An exploratory study of congestion control techniques in Wireless Sensor Networks21
NRflex: Enforcing network slicing in 5G New Radio21
An intelligent approach for dynamic network traffic restriction using MAC address verification21
An efficient and practical certificateless signcryption scheme for wireless body area networks21
A new GSO based method for SDN controller placement21
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things21
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks20
A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions20
3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks20
Cognitive IoT system with intelligence techniques in sustainable computing environment20
A collaborative caching strategy for content-centric enabled wireless sensor networks20
Resource allocation solution for sensor networks using improved chaotic firefly algorithm in IoT environment20
Probabilistic Stone’s Blind Source Separation with application to channel estimation and multi-node identification in MIMO IoT green communication and multimedia systems20
Deep Reinforcement Learning-based resource allocation strategy for Energy Harvesting-Powered Cognitive Machine-to-Machine Networks20
An energy-efficient topology control algorithm for optimizing the lifetime of wireless ad-hoc IoT networks in 5G and B5G20
Collision-free and low delay MAC protocol based on multi-level quorum system in underwater wireless sensor networks20
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations20
An ultra light weight and secure RFID batch authentication scheme for IoMT20
A novel adaptive density-based spatial clustering of application with noise based on bird swarm optimization algorithm19
Localization algorithm of wireless sensor network based on matrix reconstruction19
Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks19
A survey on TCP over mmWave19
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT19
Public key encryption supporting equality test and flexible authorization without bilinear pairings19
Locally private frequency estimation of physical symptoms for infectious disease analysis in Internet of Medical Things19
Condition monitoring of power transmission and transformation equipment based on industrial internet of things technology19
Decentralized adaptive indoor positioning protocol using Bluetooth Low Energy19
A blockchain-based access control and intrusion detection framework for satellite communication systems19
Sensing and throughput analysis of a MU-MIMO based cognitive radio scheme for the Internet of Things19
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network19
Research on location fusion of spatial geological disaster based on fuzzy SVM19
Heuristic and random search algorithm in optimization of route planning for Robot’s geomagnetic navigation19
An energy harvesting solution for computation offloading in Fog Computing networks18
D2D communication channel allocation and resource optimization in 5G network based on game theory18
0.044680118560791