Computer Networks

Papers
(The median citation count of Computer Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board228
Editorial Board196
Neural quantile optimization for edge–cloud networking190
Experimental assessment of a JANUS-based consensus protocol187
Editorial Board179
Using channel predictions for improved proportional-fair utility for vehicular users170
Balanced wireless crowd charging with mobility prediction and social awareness155
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge153
An anonymity-preserving mobile user authentication protocol for global roaming services146
SRRS: A blockchain fast propagation protocol based on non-Markovian process144
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs131
A channel selection game for multi-operator LoRaWAN deployments131
Randomized distributed self-adjusting tree networks107
SigNet-10: a dataset and CNN-based benchmark for signal-level network traffic classification106
IEEE 802.11Be WLANs: Performance assessment of multi-link operation with unsaturated queues104
A digital twin-assisted framework for secure task offloading in adaptive vehicular edge computing system103
Local Differential Privacy for correlated location data release in ITS90
Swarm intelligence for hole detection and healing in wireless sensor networks89
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs89
Quantum enhanced time synchronisation for communication network89
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet87
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis86
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things84
Workforce capacity planning for proactive troubleshooting in the Network Operations Center80
FuzzyDoo: A framework for finding flaws in the 5G landscape75
Privacy-preserving edge caching: A probabilistic approach72
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime70
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization69
DACS: Efficient resource allocation and power control for D2D communication considering RAN sharing69
Game theory based incentive mechanism for a bi-tiered public blockchain system69
Task offloading and multi-cache placement in multi-access mobile edge computing68
DCCS: A dual congestion control signals based TCP for datacenter networks68
Wireless powered NOMA-based cognitive radio for 6G networks68
Accelerating traffic engineering optimization for segment routing: A recommendation perspective67
Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration66
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing66
AI-enhanced hierarchical routing with Q-learning and graph neural networks for 6G-enabled internet of vehicles65
Symbiotic agents: A novel paradigm for trustworthy AGI-driven networks65
Mobility-Aware Predictive Split Federated Learning for 6G vehicular networks with ultra-low latency guarantees64
Lightweight zero-knowledge authentication scheme for IoT embedded devices63
Priority-awareness VNF migration method based on deep reinforcement learning63
BGP anomaly detection as a group dynamics problem63
Optimizing distributed firewall reconfiguration transients63
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks62
UAV deployment in WSN system for emergency/remote area applications62
Dominant coverage for target users at the lowest cost under competitive propagation in social networks61
Modeling and performance evaluation of OpenFlow switches using a MAP/PH/1/n queueing model60
Fair resource optimization for cooperative non-terrestrial vehicular networks60
A marketplace model for drone-assisted edge computing in 5G scenarios60
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance59
A trust-based incentive mechanism and resource allocation in fog networks59
A fine-grained compression scheme for block transmission acceleration over IPFS network57
(Vehicle’s YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network57
MalCon: A blockchain-based malware containment framework for Internet of Things57
An explicit rate control based traffic transmission and schedule scheme in UAV-IOT network slicing system57
Bi-LSTM/GRU-based anomaly diagnosis for virtual network function instance56
DFQ+: Dynamic queuing for approximate fairness in programmable shared memory switches55
Understanding and addressing concept drift in website fingerprinting55
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques54
All in one: Improving GPS accuracy and security via crowdsourcing53
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks52
BGP convergence in an MRAI-free Internet52
Reinforcement learning based tasks offloading in vehicular edge computing networks52
Secure over-the-air software update for connected vehicles51
Editorial Board51
Image super resolution based channel estimation for future wireless communication49
An efficient certificateless aggregate signature scheme resistant to collusion attacks for VANETs48
Adaptive gradient sparsification with layer and stage-wise for accelerating distributed DNN training48
Blockchain-Enabled federated learning framework with cantor filtering and reed–Solomon coding for secure healthcare IoT systems46
Beyond immutability: A comprehensive review of redactable blockchain systems46
An adaptive XSS vulnerability detection method based on hierarchical multi-objective reward-enhanced Dueling Double Deep Q-Network46
Joint task offloading and resource allocation scheme with UAV assistance in vehicle edge computing networks45
BVPM: A blockchain-based scheme for secure and efficient vehicle platoon management45
IoD-Sim: an open-source simulator for 6 G integrated terrestrial/non-terrestrial networks45
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks45
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN44
The design of an RIS-assisted FDMA wireless sensor network for sum throughput maximization44
A novel optimization and deep learning enabled resource allocation algorithm using blockchain-based Edge computing in IoT44
A privacy-preserving attribute-based framework for IoT identity lifecycle management44
DAC-UAV: A secure and adaptive task scheduling framework for UAVs based on dynamic anonymous credentials44
Real-time congestion management in 6G networks via GNN-based detection and queue-aware mitigation44
Detecting malicious proxy nodes during IoT network joining phase43
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability43
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment43
Neighbor selection strategies in the wild for CDN/V2V WebRTC live streaming: Can we learn what a good neighbor is?43
Estimation of the success probability of a malicious attacker on blockchain-based edge network42
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks42
Online training data acquisition for federated learning in cloud–edge networks42
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles42
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization42
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios41
Open set identification of malicious encrypted traffic based on multi-feature fusion41
Reunion: Receiver-driven network load balancing mechanism in AI training clusters41
Maintaining source–destination connectivity in uncertain networks under adversarial attack40
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking40
An effective data dissemination method in WAIC networks using enhanced CTC40
Research on lightweight network traffic service classification with interference traffic in large-scale networks40
TorVIA: A novel encrypted video identification method based on Tor transmission characteristics39
Energy-efficient communication for UAV-enabled mobile relay networks39
Research on data security delivery algorithm for crowdsourcing scenario in Internet of Vehicles38
VECLLF: A vehicle-edge collaborative lifelong learning framework for anomaly detection in VANETs37
Privacy-preserving and scalable federated blockchain scheme for healthcare 4.037
EdgeML: Towards network-accelerated federated learning over wireless edge36
Exploiting smart contracts in PBFT-based blockchains: A case study in medical prescription system36
Revocable -noise federated learning: A quantum-audited and dynamically coordinated framework for zero-loss privacy36
DDoSBlocker: Enhancing SDN security with time-based address mapping and AI-driven approach36
Salience-based VNF placement method for evolving multiple network slices35
Editorial Board35
Decentralized traffic detection utilizing blockchain-federated learning with quality-driven aggregation35
ScasDK—An all-in-one test platform for security assurance in 5G core networks35
Towards strong continuous consistency in edge-assisted VR-SGs: Delay-differences sensitive online task redistribution35
Decentralized reinforcement learning-based resource management for dense-interference IoV35
Multi-provider NFV network service delegation via average reward reinforcement learning34
Line rate botnet detection with SmartNIC-embedded feature extraction34
Defining and measuring the resilience of network services34
SP-DG: A programmable packet-level scheduling for queuing delay guarantees in time-critical networks34
A covert channel over blockchain based on label tree without long waiting times34
A joint orchestration of security and functionality services at network edge34
Editorial Board34
Learning quantile QoT models to address uncertainty over unseen lightpaths34
On studying active radio measurements estimating the mobile network quality of service for the Regulatory Authority's purposes34
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT33
Toward resilient communication architecture: Online network reconfiguration for UAV failure33
EE-AIRP: An AI-enhanced energy-efficient routing protocol for IoT-enabled WSNs33
Optimizing resource allocation for cluster D2D-assisted fog computing networks: A three-layer Stackelberg game approach33
Implementing efficient attribute encryption in IoV under cloud environments32
Low-AoI data collection in integrated UAV-UGV-assisted IoT systems based on deep reinforcement learning32
Edge-caching assisted underlay spectrum sharing in large-scale cognitive radio networks32
Corrigendum to “Distributed quantum computing: A survey” [Computer Networks Volume 254 December 2024 110672]32
Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things32
Coordinated multi-point by distributed hierarchical active inference with sensor feedback32
Enhancing network security: A novel intrusion detection system utilizing dual-optimization techniques for feature selection and classification32
Multi-UAV trajectory planning for RIS-assisted SWIPT system under connectivity preservation32
Octopus: Accuracy-aware resource scheduling for multi-video streaming inference at the edge32
Real time detection of malicious DoH traffic using statistical analysis31
RCBPS: Revocable certificate-based proxy signature scheme in the standard model for secure cloudIoT communications31
SIM+: A comprehensive implementation-agnostic information model assisting AI-driven optimization for beyond 5G networks31
Lyapunov-guided Deep Reinforcement Learning for service caching and task offloading in Mobile Edge Computing31
MuHoW: Distributed protocol for resource sharing in collaborative edge-computing networks30
A self-adaptive network flow watermarking with robust synchronization30
Cooperative caching algorithm for mobile edge networks based on multi-agent meta reinforcement learning30
An intelligent task offloading method based on multi-agent deep reinforcement learning in ultra-dense heterogeneous network with mobile edge computing30
Deep learning for online computation offloading and resource allocation in NOMA30
Performance characterization and profiling of chained CPU-bound Virtual Network Functions29
Admission control and pricing for multi-tenant network slices in 5G: A learning perspective29
Mobility-aware multi-user service placement and resource allocation in edge computing29
Dynamic resource allocation for URLLC and eMBB in MEC-NFV 5G networks29
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency29
Resource-efficient seamless transitions for high-performance multi-hop UAV multicasting29
A novel Congestion Control algorithm based on inverse reinforcement learning with parallel training29
On the impact of Open RAN Fronthaul Control in scenarios with XR Traffic29
Enhancing LoRaWAN scalability with Longest First Slotted CSMA29
PrivBoost: A federated learning framework for differentially private tree boosting29
Minimize BER without CSI for dynamic RIS-assisted wireless broadcast communication systems29
Optimizing handover decisions with skipping mechanisms in 5G mmWave UDNs using reinforcement learning29
Reliability-Aware Placement of Bidirectional Service Function Chains for Efficient Mobile Edge Computing29
An accelerated Benders decomposition approach for virtual base station formation in stochastic Cloud-RANs29
ArchW3: An adaptive blockchain wallet architecture for Web3 applications29
Live migration of virtual machine memory content in networked systems29
CA-Live360: Crowd-assisted transcoding and delivery for live 360-degree video streaming29
Leveraging pervasive computing for ambient intelligence: A survey on recent advancements, applications and open challenges28
Optimal obfuscation of awareness messages: Improving users’ unlinkability in Intelligent Transport Systems28
Intelligent Horizontal Autoscaling in Edge Computing using a Double Tower Neural Network28
Joint beamforming design for STAR-RIS-assisted full-duplex ISAC networks via meta-reinforcement learning28
Incentive mechanism design in blockchain-based hierarchical federated learning over edge clouds28
Slice aware baseband function splitting and placement in disaggregated 5G Radio Access Network28
Block-PAD: A blockchain-enabled framework for resilient and flexible CBDC transactions leveraging digital identity28
Deep learning approaches for vehicle type classification with 3-D magnetic sensor28
BDGraS: Bandwidth-adaptive dual-relation gravity model for efficient cooperative vehicle selection in autonomous driving28
Secure and privacy-preserving D2D communication in fog computing services28
Scalable Load Balancing scheme for wireless distributed controllers in SDDC28
Oversee effective DDoS detection based on dual frameworks28
Reinforcement learning based routing for time-aware shaper scheduling in time-sensitive networks27
Matrix Profile data mining for BGP anomaly detection27
Toward pragmatic modeling of privacy information propagation in online social networks27
A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions27
Blockchain security threats: A comprehensive classification and impact assessment27
ScaIR: Scalable Intelligent Routing based on Distributed Graph Reinforcement Learning27
Quality-driven video streaming for ultra-dense OFDMA heterogeneous networks27
Editorial Board27
Robust integration of blockchain and explainable federated learning for automated credit scoring27
Performance modeling and comparison of URLLC and eMBB coexistence strategies in 5G new radio systems27
HDPoA: Honesty-based distributed proof of authority via scalable work consensus protocol for IoT-blockchain applications27
Editorial Board27
Age of collection with non-orthogonal multiple access: A theoretical-plus-experimental study27
Editorial Board26
Dynamic eMBB scheduling strategy for GBR and NGBR in Non Standalone 5G NR: A deep reinforcement learning approach26
DRAFTEE: A self-adaptive framework for BFT-based consensus to meet fluctuating throughput demands under security constraint26
Enhanced LR-FHSS receiver for headerless frame recovery in space–terrestrial integrated IoT networks26
Digital twin approach to estimating and utilizing the capacity region of wireless ad hoc networks26
Blockchain-enabled dynamic toll collection in highway VANETs using distance and weight-based payment with local validation26
Irregular repetition slotted Aloha with multiuser detection: A density evolution analysis26
Location constrained virtual optical network embedding in space-division multiplexing elastic optical networks26
Task offloading and resource allocation in hybrid-powered WPT MEC system: An enhanced deep reinforcement learning method26
A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs26
Deep learning for encrypted traffic classification in the face of data drift: An empirical study25
Optimizing DV-Hop localization through topology-based straight-line distance estimation25
Integrating topology and traffic engineering to maximize throughput in reconfigurable networks25
Provisioning network slice for mobile content delivery in uncertain MEC environment25
Balanar: Balancing deadline guarantee and Jain’s fairness for inter-datacenter transfers25
SmartDefense: A distributed deep defense against DDoS attacks with edge computing25
CAAST: Optimizing data communications in satellite networks through Cache and Anycast25
PEZD: A practical and effective zero-delay defense against website fingerprinting24
PADAL - Passive Acoustic Detection and Localisation: Low energy underwater wireless vessel tracking network24
Access mechanism for period flows of non-deterministic end systems for time-sensitive networks24
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges24
Full duplex based collision detection to enhance the V2X sidelink autonomous mode24
Network anomaly detection in cars: A case for time-sensitive stream filtering and policing24
Corrigendum to “Reciprocal signal generation method for making symmetric keys over internet” [Computer Networks 276 (2026) 111989]24
Two-phase authentication for secure vehicular digital twin communications24
Together may be better: A novel framework and high-consistency feature for proxy traffic analysis24
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks24
Joint user grouping and resource allocation scheme based on user satisfaction management for indoor multicolor VLC-NOMA network24
Sum computation rate maximization for wireless powered OFDMA-based mobile edge computing network24
A survey on how network simulators serve reinforcement learning in wireless networks24
Joint access point selection and resource allocation for optimizing energy efficiency in aggregated VLC-RF network24
Reliability-aware hybrid SFC backup and deployment in edge computing24
AI/ML for beyond 5G systems: Concepts, technology enablers & solutions24
Complexity of minimum uplink power scheduling with delay bound for Backbone-assisted PD-NOMA wireless networks24
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks24
AAE-DSVDD: A one-class classification model for VPN traffic identification24
GCP: A multi-strategy improved wireless sensor network model for environmental monitoring24
Multiple linear regression-based energy-aware resource allocation in the Fog computing environment24
Introduction to the special issue on machine learning and artificial intelligence for the internet of things, 5G, and beyond23
Using virtual function replacement to mitigate 0-day attacks in a multi-vendor NFV-based network23
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security23
FBBTrust: Decentralized trust modeling in 6G via fuzzy inference, BiLSTM, and blockchain23
Decentralized and collaborative machine learning framework for IoT23
A dynamic policy for selecting D2D mobile relays23
Design and analysis of lightweight anonymity protocol for host- and AS-level anonymity23
Exploiting radio access information to improve performance of remote-controlled mobile robots in MEC-based 5G networks23
Enhancing intrusion detection performance using GCN-LOF: A hybrid graph-based anomaly detection approach23
Comprehensive survey on air quality monitoring systems based on emerging computing and communication technologies23
Design and implementation of ARA wireless living lab for rural broadband and applications23
Privacy-preserving local clustering coefficient query on structured encrypted graphs23
Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework23
A cost and demand sensitive adjustment algorithm for service function chain in data center network23
Studying and improving the performance of ETSI ITS contention-based forwarding (CBF) in urban and highway scenarios: S-FoT+23
UGL: A comprehensive hybrid model integrating GCN and LSTM for enhanced intrusion detection in UAV controller area networks23
A PLS-HECC-based device authentication and key agreement scheme for smart home networks23
A multi-node attack scheme based on community partitioning in large scale infrastructure networks23
Leakage-resilient certificateless public key encryption with equality test resistant to side-channel attacks23
ProxyCorr: robust traffic correlation attacks via mixed spatio-temporal analysis in encrypted proxy networks22
Editorial Board22
An effective and accurate flow size measurement using funnel-shaped sketch22
Improving the performance of Dragonfly networks through restrictive Proxy routing strategies22
Blockchain-based cross-domain IoT data sharing: A lightweight, secure edge-assisted approach22
EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things22
In-network aggregation enabled multiple sub-blocks parallel repair in erasure-coded storage system22
Device-to-device IoT system-based security protocol for agreeing on social meetings22
0.28075504302979