Computer Communications

Papers
(The TQCC of Computer Communications is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
A Steiner Tree based efficient network infrastructure design in 5G urban vehicular networks355
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan346
An attack-resistant target localization in underwater based on consensus fusion193
Sensor-based implicit authentication through learning user physiological and behavioral characteristics181
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction139
Channel-hopping sequence generation for blind rendezvous in cognitive radio-enabled internet of vehicles: A multi-agent twin delayed deep deterministic policy gradient-based method113
Editorial Board92
Editorial special issue on AI-Driven sensing and computing for cyber-physical systems92
Editorial Board86
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks83
Editorial Board82
A dynamic data access control scheme for hierarchical structures in big data80
An improved authentication scheme for BLE devices with no I/O capabilities77
A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks76
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks74
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud72
Digital twin-assisted multi-layer networks for low-latency and energy-efficient communication68
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes67
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study66
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication65
A multimodal dual-fusion entity extraction model for large and complex devices63
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.062
The human digital twin for service management: Architecture and user modeling62
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation60
NetSentry: A deep learning approach to detecting incipient large-scale network attacks59
Enabling ML-driven threat detection: An analysis of IoT network traffic datasets58
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks57
A two-stage data placement strategy for cloud-edge-device collaborative environment57
RLCS: Towards a robust and efficient mobile edge computing resource scheduling and task offloading system based on graph neural network56
Fine-grained frequencies meet synchronous transmission54
NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment54
Probing-aided spectrum sensing-based hybrid access strategy for energy harvesting CRNs52
APAP: An adaptive packet-reproduction and active packet-loss data collection protocol for WSNs52
GNNetSlice: A GNN-based performance model to support network slicing in B5G networks51
A distributed routing-aware power control scheme for underwater wireless sensor networks50
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning50
Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver50
Federated learning: A cutting-edge survey of the latest advancements and applications49
High-precision real-time UAV target recognition based on improved YOLOv449
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution48
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication48
Stochastic modelling of multi-layer HAP-LEO systems in 6G for energy saving: An analytical approach48
Estimating autonomous system risk levels by analyzing IXP route server RIB47
UAVs deployment optimization in cell-free aerial communication networks47
f247
Autonomous cyber defense for AIoT using Graph Attention Network-Enhanced reinforcement learning47
On the optimal resistance against mafia and distance fraud in distance-bounding protocols47
A coordinates-based hierarchical computing framework towards spatial data processing46
Maximizing the stable throughput of heterogeneous nodes under airtime fairness in a CSMA environment46
Efficient resource allocation in 5G URLLC with packet duplication based macro-diversity45
SANet: A novel segmented attention mechanism and multi-level information fusion network for 6D object pose estimation44
HeavySeparation: A Generic framework for stream processing faster and more accurate43
Periodic data collection in hybrid energy-harvesting sensor networks43
Opportunistic airborne virtual network infrastructure for urban wireless networks43
Editorial Board42
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments41
Cache-Based Green Distributed Cell Dormancy Technique for Dense Heterogeneous Networks41
FedMBC: Personalized federated learning via mutually beneficial collaboration41
Revving up VNDN: Efficient caching and forwarding by expanding content popularity perspective and mobility40
IoT video analytics for surveillance-based systems in smart cities40
HMLB: Holonic multi-agent approach for preventive controllers load-balancing in SDN-enabled smart grid40
User Plane Performance in Beyond 5G Networks: Comprehensive Analysis and Evaluation40
Flow-based Service Time optimization in software-defined networks using Deep Reinforcement Learning40
Multi-UAV WRSN charging path planning based on improved heed and IA-DRL39
Available energy routing algorithm considering QoS requirements for LEO satellite network39
A discrete time-varying greywolf IoT botnet detection system38
Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario38
BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation38
Reinforcement learning based flow and energy management in resource-constrained wireless networks38
Editorial Board38
Bandwidth abstraction and service rate instantiation for latency-bounded reliability provisioning in 5th generation wireless networks38
UMPL- VINS: Generalized SLAM for multi-scene metaverse applications38
Editorial Board38
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions37
Cluster head selection method of multiple UAVs under COVID-19 situation37
Enhancing human–robot communication with a comprehensive language-conditioned imitation policy for embodied robots in smart cities36
Analysis and implementation of Discrete Time Markov Chain based method for pilot decontamination in cognitive radio based ultra-dense networks36
5G core network control plane: Network security challenges and solution requirements35
Opportunistic RIS-assisted rate splitting transmission in coordinated multiple points networks35
Special Issue on selected papers from IFIP Networking 202435
Secrecy analysis of orthogonal/nonorthogonal multiple access in energy scavenging-enabled short-packet transmission34
A multi-agent enhanced DDPG method for federated learning resource allocation in IoT34
Performance of UAV-assisted C-V2X communications with 3D antenna beam-width fluctuations34
DINNRS: A Distributed In-Network Name Resolution System for information-centric networks33
Clustered jamming in U-V2X communications with 3D antenna beam-width fluctuations33
Distributed optimization for intelligent IoT under unstable communication conditions33
UAV hovering location optimization for maximizing the throughput of IPv6 packet broadcast in Wireless Powered Sensor Network33
Hidden terminal aware grouping scheme for IEEE 802.11ah based dense IoT networks32
Estimating coverage and capacity of high frequency mobile networks in ultradense urban areas32
Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks32
GLSFF: Global–local specific feature fusion for cross-modality pedestrian re-identification32
Lower boundary based nonlinear model predictive control of transmission power for smart grid WSNs32
Energy-efficient routing in LEO satellite networks for extending satellites lifetime32
Trust-Defined Network: A panoramic P2P framework for distributed ledger systems31
A multi-scale fingerprint cascade framework for detection of network covert timing channels31
Reinforcement learning for radio resource management of hybrid energy cellular networks with battery constraints31
Enabling simulation services for digital twins of 5G/B5G mobile networks31
Construction of FANETs for user coverage and information transmission in disaster rescue scenarios31
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network30
Autonomous confrontation strategy learning evolution mechanism of unmanned system group under actual combat in the loop30
Towards a quantum-safe 5G: Quantum Key Distribution in core networks30
Editorial Board29
Editorial Board29
Network architecture and ROA protection of government mail domains: A case study29
RIPPLE-WiN: An efficient protocol for loop-free multipath routing in wireless networks29
Revisiting the problem of optimizing spreading factor allocations in LoRaWAN: From theory to practice28
CSformer: Enhancing deep learning efficiency for intelligent IoT28
Cache-assisted task offloading in Vehicular Edge Computing: A spatio-temporal deep reinforcement learning approach28
Secure, accurate and privacy-aware fully decentralized learning via co-utility28
Editorial Board28
Host identification based on self-similarity of network activity28
DCDIM: Diversified influence maximization on dynamic social networks27
An effective method for Data Aggregation Point placement in LoRaWAN network for smart metering service27
Path selection and resource allocation for 5G multi-hop D2D networks27
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV)26
A novel hybrid method for achieving accurate and timeliness vehicular traffic flow prediction in road networks26
Predicting and mitigating cyber threats through data mining and machine learning26
A cost-efficient hybrid redundancy coding scheme for wireless storage systems26
Enhancing the ACME protocol to automate the management of all X.509 web certificates (Extended version)26
A Task-Oriented Hybrid Routing Approach based on Deep Deterministic Policy Gradient26
A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system26
Editorial: Festschrift in Honor of Prof. Arturo Azcorra25
A slot-based energy storage decision-making approach for optimal Off-Grid telecommunication operator25
Data detection in decentralized and distributed massive MIMO networks25
A new platform for machine-learning-based network traffic classification25
Attribute-based policies through microservices in a smart home scenario25
On flexible association and placement in disaggregated RAN designs25
PbCP: A profit-based cache placement scheme for next-generation IoT-based ICN networks25
BioMixD: A Bio-Inspired and Traffic-Aware Mix Zone Placement Strategy for Location Privacy on the Internet of Drones25
Multi-agent reinforcement learning based computation offloading and resource allocation for LEO Satellite edge computing networks24
Towards the integration of Privacy-Preserving technologies in future mobile networking24
Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment24
An overview of MAC energy-saving mechanisms in Wi-Fi24
A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing24
Graph convolutional networks and deep reinforcement learning for intelligent edge routing in IoT environment24
Detection of DDoS attacks in D2D communications using machine learning approach24
An anonymous and privacy-preserving lightweight authentication protocol for secure communication in UAV-assisted IoAV networks23
Decentralized federated learning based on blockchain: concepts, framework, and challenges23
Honey-list based authentication protocol for industrial IoT swarms23
Blockchain and differential privacy-based data processing system for data security and privacy in urban computing23
Integrating interactions between target users and opinion leaders for better recommendations: An opinion dynamics approach23
aBBR: An augmented BBR for collaborative intelligent transmission over heterogeneous networks in IIoT23
A cross entropy based approach to minimum propagation latency for controller placement in Software Defined Network23
Design and performance evaluation of QoE/QoS-oriented scheme for reliable data transmission in Internet of Things environments23
Multi-objective optimization for coverage aware energy consumption in wireless 3D video sensor network23
On the design and performance of scheduling policies exploiting spatial diversity for URLLC22
A pricing strategy for electric vehicle charging in residential areas considering the uncertainty of charging time and demand22
Efficient consensus algorithm based on improved DPoS in UAV-assisted mobile edge computing22
Distributed cyber-physical intrusion detection using stacking learning for wide-area protection system22
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches22
Enhancing fog load balancing through lifelong transfer learning of reinforcement learning agents22
Mobility-aware incentive mechanism for relaying D2D communications22
Secrecy outage performance of NOMA relay networks using partial relay selection in the presence of multiple colluding eavesdroppers22
Sub-rate linear network coding22
Sum-rate maximization for cognitive relay NOMA Systems with channel uncertainty22
Adaptive layer-wise personalized federated learning via dual delay update in future communication networks22
Performance analysis of general P4 forwarding devices with controller feedback: Single- and multi-data plane cases22
Optimizing Key Value Indicators in Intent-Based Networks through Digital Twins aided service orchestration mechanisms21
SCT-V: State-change-triggered consistency validation for SDN-enabled IoT networks21
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems21
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems21
Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications21
A crowd cooperative defense model for mitigating DDoS attacks in Mobile Crowdsensing networks21
Energy and congestion-aware load balanced multi-path routing for wireless sensor networks in ambient environments21
V2X rebroadcasting for C-V2X communications21
COCKTAIL: Video streaming QoE optimization with chunk replacement and guided learning21
Autonomous collaborative combat strategy of unmanned system group in continuous dynamic environment based on PD-MADDPG21
An efficient master head selection for multi-EEG to multi-fog IoT network using 6G-driven FaaS21
Discovery privacy threats via device de-anonymization in LoRaWAN21
DAR-DRL: A dynamic adaptive routing method based on deep reinforcement learning21
Sparse QoS prediction for cloud services via inductive subgraph pattern aware graph neural network21
Empowering disaster response: Advanced Network Slicing solutions for reliable Wi-Fi and 5G communications21
Reliable and energy-efficient UAV-assisted air-to-ground transmission: Design, modeling and analysis20
Activate or sleep? An optimal two-threshold policy for transmission service20
An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment20
Beam adaptation using out-of-band signals for robust millimeter-wave communications20
Constructions of broadcast encryption with personalized messages from bilinear map20
Direction-agnostic gesture recognition system using commercial WiFi devices20
IoT based real-time traffic monitoring system using images sensors by sparse deep learning algorithm20
A novel joint short-packet transmission in satellite–terrestrial NOMA networks20
Online Learning to parallel offloading in heterogeneous wireless networks20
Hybrid classical relay and advanced RISs for performance enhancement of IoT sensor networks with impaired hardware20
The pupil outdoes the master: Imperfect demonstration-assisted trust region jamming policy optimization against frequency-hopping spread spectrum20
A novel energy-efficient cross-layer design for scheduling and routing in 6TiSCH networks20
Unmanned aerial vehicle-enabled mobile edge computing for semantic communications20
Editorial Board20
A contract-based energy harvesting mechanism in UAV communication network20
Active IRS-aided NOMA with full-duplex energy harvesting wire-tapper: Performance evaluation20
A bandwidth-aware service migration method in LEO satellite edge computing network20
Hybrid CSMA/CA and HCCA uplink medium access control protocol for VLC based heterogeneous users20
ASAP 2.0: Autonomous & proactive detection of malicious applications for privacy quantification in 6G network services20
SLICES, a scientific instrument for the networking community20
A review on uncertainty quantification of shadowing reconstruction and signal measurements in Radio Tomographic Imaging20
Toward the simulation of WiFi Fine Time measurements in NS3 network simulator19
On the properties of device-free multi-point CSI localization and its obfuscation19
AIRSDN: AI based routing in software-defined networks for multimedia traffic transmission19
IMCNN:Intelligent Malware Classification using Deep Convolution Neural Networks as Transfer learning and ensemble learning in honeypot enabled organizational network19
Effective networking: Enabling effective communications towards 6G19
Optimizing mobility prediction in 5G for enhanced C-V2X applications: A multidisciplinary research survey19
Wi-Fi frame detection via spiking neural networks with memristive synapses19
Information centric wireless communication for variation detection and Mitigation Model in industrial internet of Things19
IoT-assisted feature learning for surface settlement prediction caused by shield tunnelling19
A blockchain-based infection tracing and notification system by non-fungible tokens19
A futuristic green service computing approach for smart city: A fog layered intelligent service management model for smart transport system19
Privacy-preserving and verifiable data aggregation for Internet of Vehicles19
Optimizing bandwidth allocation in mmWave/sub-THz cellular networks using maximum flow algorithms19
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication18
A cross-chain access control mechanism based on blockchain and the threshold Paillier cryptosystem18
Cellular fault prediction of graphical representation based on spatio-temporal graph convolutional networks18
An IoT and machine learning enhanced framework for real-time digital human modeling and motion simulation18
Digital Twins for smart campus networks: An end-to-end framework for multi-domain data intelligence18
Resource allocation for efficient AI inference in wireless sensing edge networks18
5G for connected and automated mobility - Network level evaluation on real neighboring 5G networks: The Greece - Turkey cross border corridor18
Reliable and efficient emergency rescue networks: A blockchain and fireworks algorithm-based approach18
Estimating the composition ratios of network services carried in mixed traffic18
DRL-assisted task offloading in enhanced time-expanded graph (eTEG)-modeled aerial computing18
Multimedia services placement algorithm for cloud–fog hierarchical environments18
A robust multi-key authority system for privacy-preserving distribution and access control of healthcare data18
Analysis of attack-defense game for advanced malware propagation control in cloud18
Mixed noise-guided mutual constraint framework for unsupervised anomaly detection in smart industries18
A parallel computing based model for online binary computation offloading in mobile edge computing18
IoT-based generalized multi-granulation sequential three-way decisions17
LVSegNet: A novel deep learning-based framework for left ventricle automatic segmentation using magnetic resonance imaging17
Requirement-driven multi-workflow scheduling based on improved evolutionary multitasking embedded bi-level optimization17
Edge intelligence for smart airport runway: Architectures and enabling technologies17
Integrating blockchain with IoT: Evaluating the feasibility of lightweight Bitcoin wallets on resource-constrained devices17
AI-assisted traffic matrix prediction using GA-enabled deep ensemble learning for hybrid SDN17
Adaptive QoE optimization in non-stationary networks: Integrating PPO and digital twins for video streaming17
Correctness of flow migration across Network Function instances17
A coalitional game-based joint monitoring mechanism for combating COVID-1917
Privacy-preserving spam filtering using homomorphic and functional encryption17
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework17
A multi-feature fusion approach for physical layer authentication in LEO satellites17
SDNRoute: Proactive routing optimization in Software Defined Networks17
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs17
Testing AGV mobility control method for MANET coverage optimization using procedural simulation17
Chameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network17
Traffic flow prediction using multi-view graph convolution and masked attention mechanism17
FedBH: Efficient federated learning through shared base and adaptive hyperparameters in heterogeneous systems17
Optimizing UAV delivery for pervasive systems through blockchain integration and adversarial machine learning17
Throughput maximization and reliable wireless communication in NOMA using chained fog structure and weighted energy efficiency power allocation approach17
VeriBypasser: An automatic image verification code recognition system based on CNN17
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope16
FALCON: Fanet-Aware Learning and digital twin CONtrol framework16
The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset16
An anomaly-based approach for cyber–physical threat detection using network and sensor data16
Collaborative computation offloading and resource allocation based on dynamic pricing in mobile edge computing16
Floating Nodes Assisted Cluster-Based Routing for Efficient Data Collection in Underwater Acoustic Sensor Networks16
FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network16
Learning optimal edge processing with offloading and energy harvesting16
0.17193508148193