Computer Networks

Papers
(The TQCC of Computer Networks is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
The design of an RIS-assisted FDMA wireless sensor network for sum throughput maximization285
Editorial Board255
A fine-grained compression scheme for block transmission acceleration over IPFS network186
Editorial Board167
Neural quantile optimization for edge–cloud networking166
Experimental assessment of a JANUS-based consensus protocol157
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment153
Local Differential Privacy for correlated location data release in ITS149
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis135
Privacy-preserving edge caching: A probabilistic approach130
DCCS: A dual congestion control signals based TCP for datacenter networks127
An efficient certificateless aggregate signature scheme resistant to collusion attacks for VANETs126
Accelerating traffic engineering optimization for segment routing: A recommendation perspective116
FuzzyDoo: A framework for finding flaws in the 5G landscape116
Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration107
An explicit rate control based traffic transmission and schedule scheme in UAV-IOT network slicing system96
Mobility-Aware Predictive Split Federated Learning for 6G vehicular networks with ultra-low latency guarantees91
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN88
Wireless powered NOMA-based cognitive radio for 6G networks87
MalCon: A blockchain-based malware containment framework for Internet of Things84
Fair resource optimization for cooperative non-terrestrial vehicular networks81
A novel optimization and deep learning enabled resource allocation algorithm using blockchain-based Edge computing in IoT81
Workforce capacity planning for proactive troubleshooting in the Network Operations Center81
Swarm intelligence for hole detection and healing in wireless sensor networks81
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization81
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks78
All in one: Improving GPS accuracy and security via crowdsourcing78
Dominant coverage for target users at the lowest cost under competitive propagation in social networks76
Modeling and performance evaluation of OpenFlow switches using a MAP/PH/1/n queueing model76
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles73
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting72
BGP anomaly detection as a group dynamics problem71
Image super resolution based channel estimation for future wireless communication69
A marketplace model for drone-assisted edge computing in 5G scenarios66
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs65
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization65
Estimation of the success probability of a malicious attacker on blockchain-based edge network65
Secure over-the-air software update for connected vehicles64
Editorial Board64
An anonymity-preserving mobile user authentication protocol for global roaming services64
Online training data acquisition for federated learning in cloud–edge networks63
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks63
SRRS: A blockchain fast propagation protocol based on non-Markovian process62
On the prediction of large-scale road-network constrained trajectories59
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability59
Editorial Board58
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs57
A channel selection game for multi-operator LoRaWAN deployments57
Randomized distributed self-adjusting tree networks57
Detecting malicious proxy nodes during IoT network joining phase56
Optimizing distributed firewall reconfiguration transients56
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge55
(Vehicle’s YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network55
BGP convergence in an MRAI-free Internet55
Balanced wireless crowd charging with mobility prediction and social awareness54
Using channel predictions for improved proportional-fair utility for vehicular users54
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance54
Distance adaptive hybrid super-channels enabled by sliceable bandwidth variable transponder for spectrally efficient elastic optical networks54
Lightweight zero-knowledge authentication scheme for IoT embedded devices54
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks53
Priority-awareness VNF migration method based on deep reinforcement learning52
Symbiotic agents: A novel paradigm for trustworthy AGI-driven networks52
A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept51
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques50
A privacy-preserving attribute-based framework for IoT identity lifecycle management50
Joint task offloading and resource allocation scheme with UAV assistance in vehicle edge computing networks50
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks49
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime49
Bi-LSTM/GRU-based anomaly diagnosis for virtual network function instance49
An adaptive XSS vulnerability detection method based on hierarchical multi-objective reward-enhanced Dueling Double Deep Q-Network48
Reinforcement learning based tasks offloading in vehicular edge computing networks48
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing48
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things48
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet48
Task offloading and multi-cache placement in multi-access mobile edge computing48
Reunion: Receiver-driven network load balancing mechanism in AI training clusters47
UAV deployment in WSN system for emergency/remote area applications47
Quantum enhanced time synchronisation for communication network47
Open set identification of malicious encrypted traffic based on multi-feature fusion47
TorVIA: A novel encrypted video identification method based on Tor transmission characteristics46
Coordinated multi-point by distributed hierarchical active inference with sensor feedback45
Toward resilient communication architecture: Online network reconfiguration for UAV failure45
Research on data security delivery algorithm for crowdsourcing scenario in Internet of Vehicles45
Line rate botnet detection with SmartNIC-embedded feature extraction43
Edge-caching assisted underlay spectrum sharing in large-scale cognitive radio networks43
Energy-efficient communication for UAV-enabled mobile relay networks43
VECLLF: A vehicle-edge collaborative lifelong learning framework for anomaly detection in VANETs43
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency42
ScasDK—An all-in-one test platform for security assurance in 5G core networks42
Salience-based VNF placement method for evolving multiple network slices42
Towards strong continuous consistency in edge-assisted VR-SGs: Delay-differences sensitive online task redistribution42
Decentralized traffic detection utilizing blockchain-federated learning with quality-driven aggregation41
ArchW3: An adaptive blockchain wallet architecture for Web3 applications41
An effective data dissemination method in WAIC networks using enhanced CTC40
EE-AIRP: An AI-enhanced energy-efficient routing protocol for IoT-enabled WSNs40
Decentralized reinforcement learning-based resource management for dense-interference IoV40
Editorial Board40
An accelerated Benders decomposition approach for virtual base station formation in stochastic Cloud-RANs39
Multi-provider NFV network service delegation via average reward reinforcement learning39
Multi-UAV trajectory planning for RIS-assisted SWIPT system under connectivity preservation39
MuHoW: Distributed protocol for resource sharing in collaborative edge-computing networks39
SP-DG: A programmable packet-level scheduling for queuing delay guarantees in time-critical networks39
SIM+: A comprehensive implementation-agnostic information model assisting AI-driven optimization for beyond 5G networks38
Learning quantile QoT models to address uncertainty over unseen lightpaths38
CA-Live360: Crowd-assisted transcoding and delivery for live 360-degree video streaming38
Editorial Board38
Defining and measuring the resilience of network services38
Editorial Board38
Implementing efficient attribute encryption in IoV under cloud environments38
Performance characterization and profiling of chained CPU-bound Virtual Network Functions37
Resource-efficient seamless transitions for high-performance multi-hop UAV multicasting37
Mobility-aware multi-user service placement and resource allocation in edge computing37
Collision-free optimal packet scheduling algorithm for multi-hop wireless IoT networks37
Optimizing resource allocation for cluster D2D-assisted fog computing networks: A three-layer Stackelberg game approach36
On the impact of Open RAN Fronthaul Control in scenarios with XR Traffic36
DDoSBlocker: Enhancing SDN security with time-based address mapping and AI-driven approach36
A covert channel over blockchain based on label tree without long waiting times36
Live migration of virtual machine memory content in networked systems36
Maintaining source–destination connectivity in uncertain networks under adversarial attack36
Minimize BER without CSI for dynamic RIS-assisted wireless broadcast communication systems36
Low-AoI data collection in integrated UAV-UGV-assisted IoT systems based on deep reinforcement learning36
A novel Congestion Control algorithm based on inverse reinforcement learning with parallel training35
On studying active radio measurements estimating the mobile network quality of service for the Regulatory Authority's purposes35
Cooperative caching algorithm for mobile edge networks based on multi-agent meta reinforcement learning35
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT35
Enhancing LoRaWAN scalability with Longest First Slotted CSMA35
EdgeML: Towards network-accelerated federated learning over wireless edge34
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios33
Q-ICAN: A Q-learning based cache pollution attack mitigation approach for named data networking33
Secure and privacy-preserving D2D communication in fog computing services33
A joint orchestration of security and functionality services at network edge33
Dynamic resource allocation for URLLC and eMBB in MEC-NFV 5G networks33
Lyapunov-guided Deep Reinforcement Learning for service caching and task offloading in Mobile Edge Computing32
Exploiting smart contracts in PBFT-based blockchains: A case study in medical prescription system32
Real time detection of malicious DoH traffic using statistical analysis32
Deep learning for online computation offloading and resource allocation in NOMA32
Leveraging pervasive computing for ambient intelligence: A survey on recent advancements, applications and open challenges32
An intelligent task offloading method based on multi-agent deep reinforcement learning in ultra-dense heterogeneous network with mobile edge computing32
Blockchain security threats: A comprehensive classification and impact assessment31
Two-phase authentication for secure vehicular digital twin communications31
Privacy-preserving and scalable federated blockchain scheme for healthcare 4.031
Scalable Load Balancing scheme for wireless distributed controllers in SDDC31
Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things31
Optimal obfuscation of awareness messages: Improving users’ unlinkability in Intelligent Transport Systems30
Access mechanism for period flows of non-deterministic end systems for time-sensitive networks30
PEZD: A practical and effective zero-delay defense against website fingerprinting30
ScaIR: Scalable Intelligent Routing based on Distributed Graph Reinforcement Learning30
A survey on how network simulators serve reinforcement learning in wireless networks30
CAAST: Optimizing data communications in satellite networks through Cache and Anycast29
Sum computation rate maximization for wireless powered OFDMA-based mobile edge computing network29
Slice aware baseband function splitting and placement in disaggregated 5G Radio Access Network29
Network anomaly detection in cars: A case for time-sensitive stream filtering and policing29
Editorial Board29
Age of collection with non-orthogonal multiple access: A theoretical-plus-experimental study29
A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs28
Path stability in partially deployed secure BGP routing28
Proactive radio- and QoS-aware UAV as BS deployment to improve cellular operations28
Digital twin approach to estimating and utilizing the capacity region of wireless ad hoc networks28
Enhanced LR-FHSS receiver for headerless frame recovery in space–terrestrial integrated IoT networks28
Matrix Profile data mining for BGP anomaly detection28
Joint user grouping and resource allocation scheme based on user satisfaction management for indoor multicolor VLC-NOMA network28
Amazon Alexa traffic traces28
A new approach for Bitcoin pool-hopping detection27
Irregular repetition slotted Aloha with multiuser detection: A density evolution analysis27
Toward pragmatic modeling of privacy information propagation in online social networks27
Location constrained virtual optical network embedding in space-division multiplexing elastic optical networks27
Detection of mobile network abnormality using deep learning models on massive network measurement data27
Quality-driven video streaming for ultra-dense OFDMA heterogeneous networks27
Balanar: Balancing deadline guarantee and Jain’s fairness for inter-datacenter transfers27
Editorial Board27
Hierarchical feature block ranking for data-efficient intrusion detection modeling27
Editorial Board27
Studying and improving the performance of ETSI ITS contention-based forwarding (CBF) in urban and highway scenarios: S-FoT+27
Complexity of minimum uplink power scheduling with delay bound for Backbone-assisted PD-NOMA wireless networks27
A PLS-HECC-based device authentication and key agreement scheme for smart home networks26
Comprehensive survey on air quality monitoring systems based on emerging computing and communication technologies26
Deep learning approaches for vehicle type classification with 3-D magnetic sensor26
Dynamic eMBB scheduling strategy for GBR and NGBR in Non Standalone 5G NR: A deep reinforcement learning approach26
DRAFTEE: A self-adaptive framework for BFT-based consensus to meet fluctuating throughput demands under security constraint26
AI/ML for beyond 5G systems: Concepts, technology enablers & solutions26
Performance modeling and comparison of URLLC and eMBB coexistence strategies in 5G new radio systems26
Optimizing DV-Hop localization through topology-based straight-line distance estimation26
Task offloading and resource allocation in hybrid-powered WPT MEC system: An enhanced deep reinforcement learning method26
Blockchain-enabled dynamic toll collection in highway VANETs using distance and weight-based payment with local validation26
Provisioning network slice for mobile content delivery in uncertain MEC environment26
Joint access point selection and resource allocation for optimizing energy efficiency in aggregated VLC-RF network26
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security25
HDPoA: Honesty-based distributed proof of authority via scalable work consensus protocol for IoT-blockchain applications25
UGL: A comprehensive hybrid model integrating GCN and LSTM for enhanced intrusion detection in UAV controller area networks25
AAE-DSVDD: A one-class classification model for VPN traffic identification25
Full duplex based collision detection to enhance the V2X sidelink autonomous mode25
Reliability-aware hybrid SFC backup and deployment in edge computing25
Decentralized and collaborative machine learning framework for IoT25
Intelligent Horizontal Autoscaling in Edge Computing using a Double Tower Neural Network25
GramMatch: An automatic protocol feature extraction and identification system25
Robust integration of blockchain and explainable federated learning for automated credit scoring25
Together may be better: A novel framework and high-consistency feature for proxy traffic analysis25
Enhancing intrusion detection performance using GCN-LOF: A hybrid graph-based anomaly detection approach25
Deep learning for encrypted traffic classification in the face of data drift: An empirical study25
Deep Reinforcement Learning for intrusion detection in Internet of Things: Best practices, lessons learnt, and open challenges25
Design and implementation of ARA wireless living lab for rural broadband and applications24
PADAL - Passive Acoustic Detection and Localisation: Low energy underwater wireless vessel tracking network24
Multiple linear regression-based energy-aware resource allocation in the Fog computing environment24
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks24
Oversee Effective DDoS Detection based on Dual Frameworks24
SmartDefense: A distributed deep defense against DDoS attacks with edge computing24
GCP: A multi-strategy improved wireless sensor network model for environmental monitoring24
A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks24
A survey on Bluetooth Low Energy security and privacy24
A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions24
Reinforcement learning based routing for time-aware shaper scheduling in time-sensitive networks24
Using virtual function replacement to mitigate 0-day attacks in a multi-vendor NFV-based network23
A multi-node attack scheme based on community partitioning in large scale infrastructure networks23
Gradient importance enhancement based feature fusion intrusion detection technique23
Design and analysis of lightweight anonymity protocol for host- and AS-level anonymity23
LRS_PKI: A novel blockchain-based PKI framework using linkable ring signatures23
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain23
Privacy-preserving local clustering coefficient query on structured encrypted graphs23
MADRLOM: A Computation offloading mechanism for software-defined cloud-edge computing power network23
An adaptive GA-based slice provisioning method for vertical industries in 5G and beyond networks23
Parameterized deep reinforcement learning with hybrid action space for energy efficient data center networks23
A dynamic policy for selecting D2D mobile relays23
Leveraging quantum uncertainty: Quantum randomness through the lens of classical communication networks23
Leakage-resilient certificateless public key encryption with equality test resistant to side-channel attacks23
Tolerance of SCM Nyquist and OFDM signals for heterogeneous fiber-optic and millimeter-wave mobile backhaul links under the effect of power amplifier saturation induced clipping23
Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework23
Introduction to the special issue on machine learning and artificial intelligence for the internet of things, 5G, and beyond23
Performance evaluation of random access in narrow band Internet of Things23
Exploiting radio access information to improve performance of remote-controlled mobile robots in MEC-based 5G networks22
S2H: Hypervisor as a setter within Virtualized Network I/O for VM isolation on cloud platform22
P4+NFV: Optimal offloading from P4 switches to NFV for diverse traffic streams22
Joint resource allocation for high-mobility HCNs with D2D communications22
D2DLive: Iterative live video streaming algorithm for D2D networks22
Long-lasting sequences of BGP updates22
TAO: A real-time network traffic analysis task orchestration framework with optimized filtering and scheduling22
DOCUS-DDoS detection in SDN using modified CUSUM with flash traffic discrimination and mitigation22
A cost and demand sensitive adjustment algorithm for service function chain in data center network22
Intraflow temporal correlation-based network traffic prediction22
Betastack: Enhancing base station traffic prediction with network-specific Large Language Models22
EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things21
A differential game view of antagonistic dynamics for cybersecurity21
Energy-efficient collaborative optimization for VM scheduling in cloud computing21
A lightweight anonymity protocol at terabit speeds on programmable switches21
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT21
Edge collaborative caching solution based on improved NSGA II algorithm in Internet of Vehicles21
Energy-efficient fuzzy data offloading for IoMT21
An effective and accurate flow size measurement using funnel-shaped sketch21
Cooperative cache update using multi-agent recurrent deep reinforcement learning for mobile edge networks21
EUAV: An enhanced blockchain-based two-factor anonymous authentication key agreement protocol for UAV networks21
Disruptive 6G architecture: Software-centric, AI-driven, and digital market-based mobile networks20
0.23115992546082