Computer Networks

Papers
(The median citation count of Computer Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Mobility-Aware Predictive Split Federated Learning for 6G vehicular networks with ultra-low latency guarantees277
The design of an RIS-assisted FDMA wireless sensor network for sum throughput maximization251
Editorial Board177
A fine-grained compression scheme for block transmission acceleration over IPFS network165
Editorial Board161
Neural quantile optimization for edge–cloud networking151
Experimental assessment of a JANUS-based consensus protocol147
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment146
Local Differential Privacy for correlated location data release in ITS128
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis125
Bi-LSTM/GRU-based anomaly diagnosis for virtual network function instance123
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime115
Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration113
Privacy-preserving edge caching: A probabilistic approach104
DCCS: A dual congestion control signals based TCP for datacenter networks101
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing93
Wireless powered NOMA-based cognitive radio for 6G networks87
Swarm intelligence for hole detection and healing in wireless sensor networks85
Accelerating traffic engineering optimization for segment routing: A recommendation perspective83
An adaptive XSS vulnerability detection method based on hierarchical multi-objective reward-enhanced Dueling Double Deep Q-Network81
A novel optimization and deep learning enabled resource allocation algorithm using blockchain-based Edge computing in IoT80
BGP anomaly detection as a group dynamics problem78
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization78
An explicit rate control based traffic transmission and schedule scheme in UAV-IOT network slicing system78
An efficient certificateless aggregate signature scheme resistant to collusion attacks for VANETs77
FuzzyDoo: A framework for finding flaws in the 5G landscape77
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things75
Fair resource optimization for cooperative non-terrestrial vehicular networks73
All in one: Improving GPS accuracy and security via crowdsourcing71
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks70
Dominant coverage for target users at the lowest cost under competitive propagation in social networks66
Modeling and performance evaluation of OpenFlow switches using a MAP/PH/1/n queueing model66
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques65
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks64
Optimal server and service deployment for multi-tier edge cloud computing64
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles64
Reinforcement learning based tasks offloading in vehicular edge computing networks64
A privacy-preserving attribute-based framework for IoT identity lifecycle management64
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs63
Editorial Board62
UAV deployment in WSN system for emergency/remote area applications62
A marketplace model for drone-assisted edge computing in 5G scenarios62
Estimation of the success probability of a malicious attacker on blockchain-based edge network61
Secure over-the-air software update for connected vehicles59
An anonymity-preserving mobile user authentication protocol for global roaming services59
Online training data acquisition for federated learning in cloud–edge networks58
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks58
Workforce capacity planning for proactive troubleshooting in the Network Operations Center57
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization56
SRRS: A blockchain fast propagation protocol based on non-Markovian process56
CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN55
On the prediction of large-scale road-network constrained trajectories55
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability55
Editorial Board54
A channel selection game for multi-operator LoRaWAN deployments53
A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept53
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs53
Randomized distributed self-adjusting tree networks52
MalCon: A blockchain-based malware containment framework for Internet of Things51
BGP convergence in an MRAI-free Internet50
Optimizing distributed firewall reconfiguration transients50
Detecting malicious proxy nodes during IoT network joining phase50
Image super resolution based channel estimation for future wireless communication50
(Vehicle’s YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network49
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge49
Priority-awareness VNF migration method based on deep reinforcement learning49
Using channel predictions for improved proportional-fair utility for vehicular users48
Balanced wireless crowd charging with mobility prediction and social awareness48
Distance adaptive hybrid super-channels enabled by sliceable bandwidth variable transponder for spectrally efficient elastic optical networks48
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting48
Task offloading and multi-cache placement in multi-access mobile edge computing48
Quantum enhanced time synchronisation for communication network47
Lightweight zero-knowledge authentication scheme for IoT embedded devices47
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance47
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet47
Reunion: Receiver-driven network load balancing mechanism in AI training clusters46
Maintaining source–destination connectivity in uncertain networks under adversarial attack46
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN46
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks46
Line rate botnet detection with SmartNIC-embedded feature extraction45
Research on data security delivery algorithm for crowdsourcing scenario in Internet of Vehicles45
TorVIA: A novel encrypted video identification method based on Tor transmission characteristics45
Coordinated multi-point by distributed hierarchical active inference with sensor feedback45
Open set identification of malicious encrypted traffic based on multi-feature fusion45
ArchW3: An adaptive blockchain wallet architecture for Web3 applications44
VECLLF: A vehicle-edge collaborative lifelong learning framework for anomaly detection in VANETs43
Toward resilient communication architecture: Online network reconfiguration for UAV failure43
Edge-caching assisted underlay spectrum sharing in large-scale cognitive radio networks43
SP-DG: A programmable packet-level scheduling for queuing delay guarantees in time-critical networks41
Towards strong continuous consistency in edge-assisted VR-SGs: Delay-differences sensitive online task redistribution41
An effective data dissemination method in WAIC networks using enhanced CTC41
Editorial Board41
Decentralized reinforcement learning-based resource management for dense-interference IoV41
MuHoW: Distributed protocol for resource sharing in collaborative edge-computing networks40
Multi-UAV trajectory planning for RIS-assisted SWIPT system under connectivity preservation40
Multi-provider NFV network service delegation via average reward reinforcement learning40
An accelerated Benders decomposition approach for virtual base station formation in stochastic Cloud-RANs40
On studying active radio measurements estimating the mobile network quality of service for the Regulatory Authority's purposes39
A covert channel over blockchain based on label tree without long waiting times39
SIM+: A comprehensive implementation-agnostic information model assisting AI-driven optimization for beyond 5G networks39
Salience-based VNF placement method for evolving multiple network slices39
Leveraging pervasive computing for ambient intelligence: A survey on recent advancements, applications and open challenges39
A novel Congestion Control algorithm based on inverse reinforcement learning with parallel training39
Editorial Board38
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency38
A joint orchestration of security and functionality services at network edge38
Editorial Board37
Enhancing LoRaWAN scalability with Longest First Slotted CSMA37
Deep learning for online computation offloading and resource allocation in NOMA37
EdgeML: Towards network-accelerated federated learning over wireless edge37
Exploiting smart contracts in PBFT-based blockchains: A case study in medical prescription system37
Secure and privacy-preserving D2D communication in fog computing services36
Lyapunov-guided Deep Reinforcement Learning for service caching and task offloading in Mobile Edge Computing36
A hybrid optimization-Machine Learning approach for the VNF placement and chaining problem36
Mobility-aware multi-user service placement and resource allocation in edge computing36
Learning quantile QoT models to address uncertainty over unseen lightpaths36
Decentralized traffic detection utilizing blockchain-federated learning with quality-driven aggregation35
DDoSBlocker: Enhancing SDN security with time-based address mapping and AI-driven approach35
An intelligent task offloading method based on multi-agent deep reinforcement learning in ultra-dense heterogeneous network with mobile edge computing35
Privacy-preserving and scalable federated blockchain scheme for healthcare 4.035
ScasDK—An all-in-one test platform for security assurance in 5G core networks35
CA-Live360: Crowd-assisted transcoding and delivery for live 360-degree video streaming35
Implementing efficient attribute encryption in IoV under cloud environments34
On the impact of Open RAN Fronthaul Control in scenarios with XR Traffic34
Resource-efficient seamless transitions for high-performance multi-hop UAV multicasting34
Low-AoI data collection in integrated UAV-UGV-assisted IoT systems based on deep reinforcement learning34
Collision-free optimal packet scheduling algorithm for multi-hop wireless IoT networks34
Defining and measuring the resilience of network services34
Performance characterization and profiling of chained CPU-bound Virtual Network Functions33
Minimize BER without CSI for dynamic RIS-assisted wireless broadcast communication systems33
Live migration of virtual machine memory content in networked systems33
Dynamic resource allocation for URLLC and eMBB in MEC-NFV 5G networks33
Energy-efficient communication for UAV-enabled mobile relay networks32
Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things32
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios32
Real time detection of malicious DoH traffic using statistical analysis32
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT32
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking32
Cooperative caching algorithm for mobile edge networks based on multi-agent meta reinforcement learning32
Optimizing resource allocation for cluster D2D-assisted fog computing networks: A three-layer Stackelberg game approach32
Task offloading and resource allocation in hybrid-powered WPT MEC system: An enhanced deep reinforcement learning method32
Scalable Load Balancing scheme for wireless distributed controllers in SDDC31
UGL: A comprehensive hybrid model integrating GCN and LSTM for enhanced intrusion detection in UAV controller area networks31
Joint access point selection and resource allocation for optimizing energy efficiency in aggregated VLC-RF network31
Reliability-aware hybrid SFC backup and deployment in edge computing31
Blockchain security threats: A comprehensive classification and impact assessment31
Two-phase authentication for secure vehicular digital twin communications30
DRAFTEE: A self-adaptive framework for BFT-based consensus to meet fluctuating throughput demands under security constraint30
HDPoA: Honesty-based distributed proof of authority via scalable work consensus protocol for IoT-blockchain applications29
Optimizing DV-Hop localization through topology-based straight-line distance estimation29
A survey on Bluetooth Low Energy security and privacy29
A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions29
Reinforcement learning based routing for time-aware shaper scheduling in time-sensitive networks29
GCP: A multi-strategy improved wireless sensor network model for environmental monitoring29
CAAST: Optimizing data communications in satellite networks through Cache and Anycast28
Optimal obfuscation of awareness messages: Improving users’ unlinkability in Intelligent Transport Systems28
ScaIR: Scalable Intelligent Routing based on Distributed Graph Reinforcement Learning28
Editorial Board28
Deep learning for encrypted traffic classification in the face of data drift: An empirical study28
Comprehensive survey on air quality monitoring systems based on emerging computing and communication technologies28
Slice aware baseband function splitting and placement in disaggregated 5G Radio Access Network28
Design and implementation of ARA wireless living lab for rural broadband and applications28
Dynamic eMBB scheduling strategy for GBR and NGBR in Non Standalone 5G NR: A deep reinforcement learning approach27
Age of collection with non-orthogonal multiple access: A theoretical-plus-experimental study27
Full duplex based collision detection to enhance the V2X sidelink autonomous mode27
SmartDefense: A distributed deep defense against DDoS attacks with edge computing27
Sum computation rate maximization for wireless powered OFDMA-based mobile edge computing network27
Together may be better: A novel framework and high-consistency feature for proxy traffic analysis27
Path stability in partially deployed secure BGP routing27
Joint user grouping and resource allocation scheme based on user satisfaction management for indoor multicolor VLC-NOMA network27
PEZD: A practical and effective zero-delay defense against website fingerprinting27
Network anomaly detection in cars: A case for time-sensitive stream filtering and policing27
Enhanced LR-FHSS receiver for headerless frame recovery in space–terrestrial integrated IoT networks27
Blockchain-enabled dynamic toll collection in highway VANETs using distance and weight-based payment with local validation27
Amazon Alexa traffic traces26
GramMatch: An automatic protocol feature extraction and identification system26
A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs26
Matrix Profile data mining for BGP anomaly detection26
Proactive radio- and QoS-aware UAV as BS deployment to improve cellular operations26
Digital twin approach to estimating and utilizing the capacity region of wireless ad hoc networks26
Studying and improving the performance of ETSI ITS contention-based forwarding (CBF) in urban and highway scenarios: S-FoT+25
A comprehensive survey on Green ICT with 5G-NB-IoT: Towards sustainable planet25
Irregular repetition slotted Aloha with multiuser detection: A density evolution analysis25
PADAL - Passive Acoustic Detection and Localisation: Low energy underwater wireless vessel tracking network25
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks25
Hierarchical feature block ranking for data-efficient intrusion detection modeling25
Editorial Board25
AI/ML for beyond 5G systems: Concepts, technology enablers & solutions25
Quality-driven video streaming for ultra-dense OFDMA heterogeneous networks25
Detection of mobile network abnormality using deep learning models on massive network measurement data25
Decentralized and collaborative machine learning framework for IoT25
A new approach for Bitcoin pool-hopping detection25
Robust integration of blockchain and explainable federated learning for automated credit scoring25
Editorial Board25
Toward pragmatic modeling of privacy information propagation in online social networks24
Balanar: Balancing deadline guarantee and Jain’s fairness for inter-datacenter transfers24
Complexity of minimum uplink power scheduling with delay bound for Backbone-assisted PD-NOMA wireless networks24
Enhancing intrusion detection performance using GCN-LOF: A hybrid graph-based anomaly detection approach24
A PLS-HECC-based device authentication and key agreement scheme for smart home networks24
Provisioning network slice for mobile content delivery in uncertain MEC environment24
Location constrained virtual optical network embedding in space-division multiplexing elastic optical networks24
AAE-DSVDD: A one-class classification model for VPN traffic identification24
Deep learning approaches for vehicle type classification with 3-D magnetic sensor24
A survey on how network simulators serve reinforcement learning in wireless networks24
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security24
Access mechanism for period flows of non-deterministic end systems for time-sensitive networks24
Using virtual function replacement to mitigate 0-day attacks in a multi-vendor NFV-based network23
Improving the performance of Dragonfly networks through restrictive Proxy routing strategies23
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks23
Multiple linear regression-based energy-aware resource allocation in the Fog computing environment23
Efficient data transmission mechanisms in energy harvesting wireless body area networks: A survey23
Privacy-preserving local clustering coefficient query on structured encrypted graphs23
Large Language Models for computer networking operations and management: A survey on applications, key techniques, and opportunities23
Performance modeling and comparison of URLLC and eMBB coexistence strategies in 5G new radio systems23
A multi-node attack scheme based on community partitioning in large scale infrastructure networks23
Leveraging quantum uncertainty: Quantum randomness through the lens of classical communication networks23
Resource optimization for minimizing latency and cost in UAV-assisted mobile edge computing (MEC) networks23
Intelligent Horizontal Autoscaling in Edge Computing using a Double Tower Neural Network23
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges23
Intraflow temporal correlation-based network traffic prediction23
Blockchain-based cross-domain IoT data sharing: A lightweight, secure edge-assisted approach22
Attention map-driven compressive sensing for stable and high-accuracy distributed data storage in mobile crowdsensing systems22
P4+NFV: Optimal offloading from P4 switches to NFV for diverse traffic streams22
TAO: A real-time network traffic analysis task orchestration framework with optimized filtering and scheduling22
Leakage-resilient certificateless public key encryption with equality test resistant to side-channel attacks22
Disruptive 6G architecture: Software-centric, AI-driven, and digital market-based mobile networks22
Non-cooperative multi-agent deep reinforcement learning for channel resource allocation in vehicular networks22
An effective and accurate flow size measurement using funnel-shaped sketch22
Joint operating mode and resource allocation optimization in wireless-powered RIS-assisted multiuser communication systems22
A lightweight anonymity protocol at terabit speeds on programmable switches22
Quantitative delay analysis of GI/G/1 queues with heavy-tailed traffic by means of Alpha Theory22
LLMs are one-shot URL classifiers and explainers21
DoS and DDoS mitigation using Variational Autoencoders21
Design and analysis of lightweight anonymity protocol for host- and AS-level anonymity21
Performance evaluation of random access in narrow band Internet of Things21
Quantum advantages for data transmission in future networks: An overview21
Betastack: Enhancing base station traffic prediction with network-specific Large Language Models21
S2H: Hypervisor as a setter within Virtualized Network I/O for VM isolation on cloud platform21
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain21
Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework21
An adaptive GA-based slice provisioning method for vertical industries in 5G and beyond networks21
MADRLOM: A Computation offloading mechanism for software-defined cloud-edge computing power network21
EUAV: An enhanced blockchain-based two-factor anonymous authentication key agreement protocol for UAV networks21
In-network aggregation enabled multiple sub-blocks parallel repair in erasure-coded storage system21
Measuring DoH with web ads21
Gradient importance enhancement based feature fusion intrusion detection technique21
Energy-efficient fuzzy data offloading for IoMT21
Tolerance of SCM Nyquist and OFDM signals for heterogeneous fiber-optic and millimeter-wave mobile backhaul links under the effect of power amplifier saturation induced clipping21
Achieving scalable capacity in wireless mesh networks21
Meta-CAD: Few-shot anomaly detection for online social networks with meta-learning21
0.078962802886963