IEEE-ACM Transactions on Networking

Papers
(The median citation count of IEEE-ACM Transactions on Networking is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Federated Learning Over Wireless Networks: Convergence Analysis and Resource Allocation198
Efficient Computing Resource Sharing for Mobile Edge-Cloud Computing Networks144
BOLA: Near-Optimal Bitrate Adaptation for Online Videos143
Joint Scheduling of URLLC and eMBB Traffic in 5G Wireless Networks142
The Age of Incorrect Information: A New Performance Metric for Status Updates115
Direct Acyclic Graph-Based Ledger for Internet of Things: Performance and Security Analysis106
Risk-Aware Data Offloading in Multi-Server Multi-Access Edge Computing Environment106
On the Age of Information in a CSMA Environment84
CoEdge: Cooperative DNN Inference With Adaptive Workload Partitioning Over Heterogeneous Edge Devices82
Service Placement and Request Scheduling for Data-Intensive Applications in Edge Clouds77
Service Placement and Request Routing in MEC Networks With Storage, Computation, and Communication Constraints77
Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services68
A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs67
Joint Optimization of Relay Deployment, Channel Allocation, and Relay Assignment for UAVs-Aided D2D Networks64
Multi-Resource Allocation for Network Slicing57
Computation Offloading Scheduling for Periodic Tasks in Mobile Edge Computing57
FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory54
Edge Federation: Towards an Integrated Service Provisioning Model51
FTrack: Parallel Decoding for LoRa Transmissions51
Shared Bottleneck-Based Congestion Control and Packet Scheduling for Multipath TCP50
Five Years at the Edge: Watching Internet From the ISP Network50
Online Adaptive Interference-Aware VNF Deployment and Migration for 5G Network Slice46
Detection and Mitigation of DoS Attacks in Software Defined Networks45
Output Reachable Set Synthesis of Event-Triggered Control for Singular Markov Jump Systems Under Multiple Cyber-Attacks39
Collaborative Content Delivery in Software-Defined Heterogeneous Vehicular Networks38
SDN-Based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach38
Deep Reinforcement Learning With Spatio-Temporal Traffic Forecasting for Data-Driven Base Station Sleep Control38
P4xos: Consensus as a Network Service36
Combining Contract Theory and Lyapunov Optimization for Content Sharing With Edge Caching and Device-to-Device Communications35
Task Offloading for Post-Disaster Rescue in Unmanned Aerial Vehicles Networks35
Designing Heavy-Hitter Detection Algorithms for Programmable Switches35
Sampling and Remote Estimation for the Ornstein-Uhlenbeck Process Through Queues: Age of Information and Beyond34
A Partitioning Approach to RFID Identification33
Improving Age of Information in Wireless Networks With Perfect Channel State Information31
CSI Fingerprinting Localization With Low Human Efforts31
Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools30
Multi-Stage Hybrid Federated Learning Over Large-Scale D2D-Enabled Fog Networks29
Minimizing Charging Delay for Directional Charging29
An Adaptive Robustness Evolution Algorithm With Self-Competition and its 3D Deployment for Internet of Things28
Optimizing Information Freshness Through Computation–Transmission Tradeoff and Queue Management in Edge Computing28
Privacy-Preserving User Recruitment Protocol for Mobile Crowdsensing27
Privacy-Preserving Data Aggregation for Mobile Crowdsensing With Externality: An Auction Approach27
Cooperative Intersection Crossing Over 5G27
On the Hardness and Inapproximability of Virtual Network Embeddings26
Throughput Maximization of UAV Networks26
A Cell-Free Networking System With Visible Light26
Multi-Associated Parameters Aggregation-Based Routing and Resources Allocation in Multi-Core Elastic Optical Networks26
Detecting IoT Devices in the Internet26
Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms25
An Efficient K-Persistent Spread Estimator for Traffic Measurement in High-Speed Networks25
Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs24
Placement of Unmanned Aerial Vehicles for Directional Coverage in 3D Space24
NFVnice: Dynamic Backpressure and Scheduling for NFV Service Chains23
Mitigating Packet Reordering for Random Packet Spraying in Data Center Networks23
Network-Aware Optimization of Distributed Learning for Fog Computing23
DeepCast: Towards Personalized QoE for Edge-Assisted Crowdcast With Deep Reinforcement Learning23
Minimizing the Deployment Cost of UAVs for Delay-Sensitive Data Collection in IoT Networks23
One More Config is Enough: Saving (DC)TCP for High-Speed Extremely Shallow-Buffered Datacenters23
An Online Algorithm for VNF Service Chain Scaling in Datacenters22
Service Placement for Collaborative Edge Applications22
A Fast and Compact Invertible Sketch for Network-Wide Heavy Flow Detection22
SDN-Enabled Energy-Aware Routing in Underwater Multi-Modal Communication Networks22
A Compressive Integrity Auditing Protocol for Secure Cloud Storage22
Spread Estimation With Non-Duplicate Sampling in High-Speed Networks22
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading22
Joint Server Assignment and Resource Management for Edge-Based MAR System21
Rethinking Fast and Friendly Transport in Data Center Networks21
Approximation Algorithms for the Generalized Team Orienteering Problem and its Applications21
Efficient Data Collection Over Multiple Access Wireless Sensors Network21
Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks21
Priority-Based Inter-Core and Inter-Mode Crosstalk-Avoided Resource Allocation for Spectrally-Spatially Elastic Optical Networks21
Connectivity Maintenance for Next-Generation Decentralized Vehicle Platoon Networks20
Traffic Engineering in Partially Deployed Segment Routing Over IPv6 Network With Deep Reinforcement Learning20
Waiting But Not Aging: Optimizing Information Freshness Under the Pull Model20
Enabling Scalable Routing in Software-Defined Networks With Deep Reinforcement Learning on Critical Nodes20
MARS: A Multi-Attribute Routing and Scheduling Algorithm for DTN Interplanetary Networks19
Estimating Cardinality for Arbitrarily Large Data Stream With Improved Memory Efficiency19
Wi-Fi Localization Enabling Self-Calibration19
Distributed Byzantine-Resilient Multiple-Message Dissemination in Wireless Networks19
EdgeLSTM: Towards Deep and Sequential Edge Computing for IoT Applications19
Resolvable Designs for Speeding Up Distributed Computing19
Age of Information for Updates With Distortion: Constant and Age-Dependent Distortion Constraints18
Quick and Accurate False Data Detection in Mobile Crowd Sensing18
On Fundamental Bounds on Failure Identifiability by Boolean Network Tomography18
WiZig: Cross-Technology Energy Communication Over a Noisy Channel18
Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems18
Distributed Joint Power, Association and Flight Control for Massive-MIMO Self-Organizing Flying Drones18
LSQ: Load Balancing in Large-Scale Heterogeneous Systems With Multiple Dispatchers18
Adaptive Configuration Selection and Bandwidth Allocation for Edge-Based Video Analytics17
A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage17
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks17
A Spatiotemporal Approach for Secure Crowdsourced Radio Environment Map Construction17
Conditional Diagnosability of Alternating Group Networks Under the PMC Model16
Certificateless Homomorphic Signature Scheme for Network Coding16
Quantum Network: Security Assessment and Key Management16
Hybrid Scheduling in Heterogeneous Half- and Full-Duplex Wireless Networks16
Approximation Algorithms for the Min-Max Cycle Cover Problem With Neighborhoods16
On the Theoretical Gap of Channel Hopping Sequences With Maximum Rendezvous Diversity in the Multichannel Rendezvous Problem16
Efficient Ambient LoRa Backscatter With On-Off Keying Modulation16
Adjusting Switching Granularity of Load Balancing for Heterogeneous Datacenter Traffic16
Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection16
LaScaDa: A Novel Scalable Topology for Data Center Network15
MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles15
Routing in Communication Networks With Interdependent Power Grid15
An Incentive Mechanism for Sustainable Blockchain Storage15
Wi-Fi Channel Bonding: An All-Channel System and Experimental Study From Urban Hotspots to a Sold-Out Stadium15
Toward Optimal Partial Parallelization for Service Function Chaining15
Optimal Submarine Cable Path Planning and Trunk-and-Branch Tree Network Topology Design15
Coordinated 5G Network Slicing: How Constructive Interference Can Boost Network Throughput15
Verifying Rule Enforcement in Software Defined Networks With REV15
Elastic Provisioning of Cloud Caches: A Cost-Aware TTL Approach15
REINFORCE: Achieving Efficient Failure Resiliency for Network Function Virtualization-Based Services15
Towards Optimal Low-Latency Live Video Streaming14
Achieving Privacy Preservation and Billing via Delayed Information Release14
PPQC: A Blockchain-Based Privacy-Preserving Quality Control Mechanism in Crowdsensing Applications14
Combating Bufferbloat in Multi-Bottleneck Networks: Theory and Algorithms14
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams14
Understanding the Ecosystem and Addressing the Fundamental Concerns of Commercial MVNO14
A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue14
Control Plane Reflection Attacks and Defenses in Software-Defined Networks14
Beyond QoE: Diversity Adaptation in Video Streaming at the Edge14
A Practical Spectrum Sharing Scheme for Cognitive Radio Networks: Design and Experiments14
A Local-Neighborhood Information Based Overlapping Community Detection Algorithm for Large-Scale Complex Networks14
Low-Power Status Updates via Sleep-Wake Scheduling14
BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation14
SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane14
Unifying AoI Minimization and Remote Estimation—Optimal Sensor/Controller Coordination With Random Two-Way Delay14
Real-Time Update of Joint SFC and Routing in Software Defined Networks13
A Physarum-Inspired Algorithm for Minimum-Cost Relay Node Placement in Wireless Sensor Networks13
TopoX: Topology Refactorization for Minimizing Network Communication in Graph Computations13
Transient Analysis for Multihop Wireless Networks Under Static Routing13
Online Convex Optimization for Caching Networks13
Multi-Layer Decomposition of Network Utility Maximization Problems13
Event-Triggered Control for Network-Based Switched Systems With Switching Signals Subject to Dual-Terminal DoS Attacks13
Optimal Server Selection for Straggler Mitigation13
NAMP: Network-Aware Multipathing in Software-Defined Data Center Networks13
Burst-Aware Time-Triggered Flow Scheduling With Enhanced Multi-CQF in Time-Sensitive Networks12
PolarScout: Wi-Fi Interference-Resilient ZigBee Communication via Shell-Shaping12
RobustPay+: Robust Payment Routing With Approximation Guarantee in Blockchain-Based Payment Channel Networks12
Efficient Link Scheduling Solutions for the Internet of Things Under Rayleigh Fading12
From Conception to Retirement: A Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild12
Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks12
Service Function Path Provisioning With Topology Aggregation in Multi-Domain Optical Networks12
T-RACKs: A Faster Recovery Mechanism for TCP in Data Center Networks12
Dynamic Online User Recruitment With (Non-) Submodular Utility in Mobile CrowdSensing12
Crowdsensing for Spectrum Discovery: A Waze-Inspired Design via Smartphone Sensing12
Prioritized Deployment of Dynamic Service Function Chains12
Internet Traffic Volumes are Not Gaussian—They are Log-Normal: An 18-Year Longitudinal Study With Implications for Modelling and Prediction12
On Provisioning Slices and Overbooking Resources in Service Tailored Networks of the Future12
Fast Switch-Based Load Balancer Considering Application Server States11
Boosting or Hindering: AoI and Throughput Interrelation in Routing-Aware Multi-Hop Wireless Networks11
Hu-Fu: Replay-Resilient RFID Authentication11
AnchorHash: A Scalable Consistent Hash11
Failure Resiliency With Only a Few Tunnels – Enabling Segment Routing for Traffic Engineering11
A Coverage-Aware Resource Provisioning Method for Network Slicing11
Reliable Physical-Layer Cross-Technology Communication With Emulation Error Correction11
A Secure Middlebox Framework for Enabling Visibility Over Multiple Encryption Protocols11
Scheduling With Age of Information Guarantee11
Planning mm-Wave Access Networks Under Obstacle Blockages: A Reliability-Aware Approach11
Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning11
Using Smart Routing for Secure and Dependable NoC-Based MPSoCs11
Accurate and Fast Recovery of Network Monitoring Data With GPU-Accelerated Tensor Completion11
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches11
An Exact Implementation of the Abstract MAC Layer via Carrier Sensing in Dynamic Networks11
Blind GB-PANDAS: A Blind Throughput-Optimal Load Balancing Algorithm for Affinity Scheduling10
Robust Distributed Monitoring of Traffic Flows10
Resilient Range-Based d-Dimensional Localization for Mobile Sensor Networks10
WNOS: Enabling Principled Software-Defined Wireless Networking10
Wideband Full-Duplex Phased Array With Joint Transmit and Receive Beamforming: Optimization and Rate Gains10
HDS: A Fast Hybrid Data Location Service for Hierarchical Mobile Edge Computing10
Poisson Receivers: A Probabilistic Framework for Analyzing Coded Random Access10
Optimizing Primary User Privacy in Spectrum Sharing Systems10
Robotic Millimeter-Wave Wireless Networks10
Performance Analysis of the IEEE 802.11ax OBSS_PD-Based Spatial Reuse10
PolarTracker: Attitude-Aware Channel Access for Floating Low Power Wide Area Networks10
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas10
Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers10
Smart Name Lookup for NDN Forwarding Plane via Neural Networks10
Fast Enumeration of Regional Link Failures Caused by Disasters With Limited Size10
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack10
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs10
A Blockchain-Based Scheme for Secure Data Offloading in Healthcare With Deep Reinforcement Learning10
Design and Implementation of TCP-Friendly Meters in P4 Switches10
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks10
Distributed Broadcasting in Dynamic Networks10
Single vs Distributed Edge Caching for Dynamic Content10
Revisiting Acknowledgment Mechanism for Transport Control: Modeling, Analysis, and Implementation10
Fast ReRoute on Programmable Switches10
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging10
Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing9
The HOP Protocol: Reliable Latency-Bounded End-to-End Multipath Communication9
CleanG—Improving the Architecture and Protocols for Future Cellular Networks With NFV9
A Coverage-Aware Distributed k-Connectivity Maintenance Algorithm for Arbitrarily Large k in Mobile Sensor Networks9
Network Latency Estimation With Leverage Sampling for Personal Devices: An Adaptive Tensor Completion Approach9
Super Spreader Identification Using Geometric-Min Filter9
On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems9
WIDE: Physical-Level CTC via Digital Emulation9
An Anonymity Vulnerability in Tor9
Missing-Tag Detection With Unknown Tags9
Similarity Caching: Theory and Algorithms8
Learning to Schedule Network Resources Throughput and Delay Optimally Using Q+-Learning8
Delay Gain Analysis of Wireless Multicasting for Content Distribution8
Reliable and Practical Bluetooth Backscatter With Commodity Devices8
Double-Auction Mechanisms for Resource Trading Markets8
Accurate and Fast Recovery of Network Monitoring Data: A GPU Accelerated Matrix Completion8
Impact of Synchronization Topology on DML Performance: Both Logical Topology and Physical Topology8
Delay-Based Network Utility Maximization Modelling for Congestion Control in Named Data Networking8
T-Cache: Efficient Policy-Based Forwarding Using Small TCAM8
Paid Peering, Settlement-Free Peering, or Both?8
Optimal Representations of a Traffic Distribution in Switch Memories8
COIN: An Efficient Indexing Mechanism for Unstructured Data Sharing Systems8
Optimal Control of Distributed Computing Networks With Mixed-Cast Traffic Flows8
Pose Sensing With a Single RFID Tag8
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks8
Simultaneous Bi-Directional Communications and Data Forwarding Using a Single ZigBee Data Stream8
FlEC: Enhancing QUIC With Application-Tailored Reliability Mechanisms8
Enabling Practical Large-Scale MIMO in WLANs With Hybrid Beamforming8
Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing8
MuSher: An Agile Multipath-TCP Scheduler for Dual-Band 802.11ad/ac Wireless LANs8
MultiLive: Adaptive Bitrate Control for Low-Delay Multi-Party Interactive Live Streaming8
An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDN8
Looking Glass of NFV: Inferring the Structure and State of NFV Network From External Observations8
Online VNF Chaining and Predictive Scheduling: Optimality and Trade-Offs8
Joint Routing and Sketch Configuration in Software-Defined Networking8
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation8
Born This Way: A Self-Organizing Evolution Scheme With Motif for Internet of Things Robustness7
A Fast Hierarchical Physical Topology Update Scheme for Edge-Cloud Collaborative IoT Systems7
Social-Aware Privacy-Preserving Mechanism for Correlated Data7
A Mean Field Game Analysis of Distributed MAC in Ultra-Dense Multichannel Wireless Networks7
Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics7
Information Source Finding in Networks: Querying With Budgets7
Wide-Sense Nonblocking Converting-Space-Converting Switching Node Architecture Under XsVarSWITCH Control Algorithm7
The Impact of Mobility on Physical Layer Security of 5G IoT Networks7
Two-Dimensional Task Offloading for Mobile Networks: An Imitation Learning Framework7
Adaptive CSMA for Decentralized Scheduling of Multi-Hop Networks With End-to-End Deadline Constraints7
Joint Reducer Placement and Coflow Bandwidth Scheduling for Computing Clusters7
Asynchronous Coded Caching With Uncoded Prefetching7
WiFED Mobile: WiFi Friendly Energy Delivery With Mobile Distributed Beamforming7
A Scalable, High-Performance, and Fault-Tolerant Network Architecture for Distributed Machine Learning7
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures7
On the Prefix Granularity Problem in NDN Adaptive Forwarding7
Dynamic Exclusion Zones for Protecting Primary Users in Database-Driven Spectrum Sharing7
High-Throughput and Robust Rate Adaptation for Backscatter Networks7
PFCA: A Programmable FIB Caching Architecture7
Pricing, Bandwidth Allocation, and Service Competition in Heterogeneous Wireless Networks7
Frequency Domain Feature Based Robust Malicious Traffic Detection7
GRID: Gradient Routing With In-Network Aggregation for Distributed Training7
Exploiting an Optimal Delay-Collision Tradeoff in CSMA-Based High-Dense Wireless Systems7
c-Chirp: Towards Symmetric Cross-Technology Communication Over Asymmetric Channels7
eDirect: Energy-Efficient D2D-Assisted Relaying Framework for Cellular Signaling Reduction7
0.46999406814575