Computer Networks

Papers
(The H4-Index of Computer Networks is 54. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Mobility-Aware Predictive Split Federated Learning for 6G vehicular networks with ultra-low latency guarantees277
The design of an RIS-assisted FDMA wireless sensor network for sum throughput maximization251
Editorial Board177
A fine-grained compression scheme for block transmission acceleration over IPFS network165
Editorial Board161
Neural quantile optimization for edge–cloud networking151
Experimental assessment of a JANUS-based consensus protocol147
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment146
Local Differential Privacy for correlated location data release in ITS128
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis125
Bi-LSTM/GRU-based anomaly diagnosis for virtual network function instance123
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime115
Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration113
Privacy-preserving edge caching: A probabilistic approach104
DCCS: A dual congestion control signals based TCP for datacenter networks101
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing93
Wireless powered NOMA-based cognitive radio for 6G networks87
Swarm intelligence for hole detection and healing in wireless sensor networks85
Accelerating traffic engineering optimization for segment routing: A recommendation perspective83
An adaptive XSS vulnerability detection method based on hierarchical multi-objective reward-enhanced Dueling Double Deep Q-Network81
A novel optimization and deep learning enabled resource allocation algorithm using blockchain-based Edge computing in IoT80
BGP anomaly detection as a group dynamics problem78
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization78
An explicit rate control based traffic transmission and schedule scheme in UAV-IOT network slicing system78
An efficient certificateless aggregate signature scheme resistant to collusion attacks for VANETs77
FuzzyDoo: A framework for finding flaws in the 5G landscape77
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things75
Fair resource optimization for cooperative non-terrestrial vehicular networks73
All in one: Improving GPS accuracy and security via crowdsourcing71
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks70
Dominant coverage for target users at the lowest cost under competitive propagation in social networks66
Modeling and performance evaluation of OpenFlow switches using a MAP/PH/1/n queueing model66
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques65
A privacy-preserving attribute-based framework for IoT identity lifecycle management64
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks64
Optimal server and service deployment for multi-tier edge cloud computing64
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles64
Reinforcement learning based tasks offloading in vehicular edge computing networks64
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs63
Editorial Board62
UAV deployment in WSN system for emergency/remote area applications62
A marketplace model for drone-assisted edge computing in 5G scenarios62
Estimation of the success probability of a malicious attacker on blockchain-based edge network61
Secure over-the-air software update for connected vehicles59
An anonymity-preserving mobile user authentication protocol for global roaming services59
Online training data acquisition for federated learning in cloud–edge networks58
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks58
Workforce capacity planning for proactive troubleshooting in the Network Operations Center57
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization56
SRRS: A blockchain fast propagation protocol based on non-Markovian process56
CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN55
On the prediction of large-scale road-network constrained trajectories55
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability55
Editorial Board54
0.11859583854675