Wireless Communications & Mobile Computing

Papers
(The TQCC of Wireless Communications & Mobile Computing is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
[Retracted] Conceptual Implementation of Artificial Intelligent based E‐Mobility Controller in smart city Environment174
IoT‐Based Smart Alert System for Drowsy Driver Detection101
Aggregation-Based Dynamic Channel Bonding to Maximise the Performance of Wireless Local Area Networks (WLAN)98
Intrusion Detection in Industrial Internet of Things Network‐Based on Deep Learning Model with Rule‐Based Feature Selection92
Wireless Communication Technologies for IoT in 5G: Vision, Applications, and Challenges87
Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering73
[Retracted] A Novel Smart Healthcare Monitoring System Using Machine Learning and the Internet of Things71
Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations69
Moving Vehicle Detection and Classification Using Gaussian Mixture Model and Ensemble Deep Learning Technique68
[Retracted] Application Analysis of New Internet Multimedia Technology in Optimizing the Ideological and Political Education System of College Students65
ObjectDetect: A Real-Time Object Detection Framework for Advanced Driver Assistant Systems Using YOLOv564
Machine Learning Enabled Techniques for Protecting Wireless Sensor Networks by Estimating Attack Prevalence and Device Deployment Strategy for 5G Networks64
An Enhanced Secure Deep Learning Algorithm for Fraud Detection in Wireless Communication64
Indoor Visible Light Communication: A Tutorial and Survey62
Intelligent Oil Production Stratified Water Injection Technology61
Deep Reinforcement Learning-Based Path Control and Optimization for Unmanned Ships61
A Survey on Zero Trust Architecture: Challenges and Future Trends59
VLSI Implementation of Green Computing Control Unit on Zynq FPGA for Green Communication57
Intrusion Detection System for Industrial Internet of Things Based on Deep Reinforcement Learning57
Progressive Distributed and Parallel Similarity Retrieval of Large CT Image Sequences in Mobile Telemedicine Networks55
Pavement Crack Detection Method Based on Deep Learning Models54
Standard Propagation Channel Models for MIMO Communication Systems54
DMTC: Optimize Energy Consumption in Dynamic Wireless Sensor Network Based on Fog Computing and Fuzzy Multiple Attribute Decision‐Making52
Energy-Efficient UART Design on FPGA Using Dynamic Voltage Scaling for Green Communication in Industrial Sector52
A Novel Strategy for Waste Prediction Using Machine Learning Algorithm with IoT Based Intelligent Waste Management System51
Speaker Gender Recognition Based on Deep Neural Networks and ResNet5050
IoT with BlockChain: A Futuristic Approach in Agriculture and Food Supply Chain48
Path Planning for Smart Car Based on Dijkstra Algorithm and Dynamic Window Approach48
Algorithm for Energy Resource Allocation and Sensor-Based Clustering in M2M Communication Systems47
Basic Research on Ancient Bai Character Recognition Based on Mobile APP47
Energy-Efficient Resource Allocation and Migration in Private Cloud Data Centre47
Image‐Based Detection of Plant Diseases: From Classical Machine Learning to Deep Learning Journey46
The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks45
Development of Algorithms for an IoT-Based Smart Agriculture Monitoring System45
Integrating Sensor Ontologies with Global and Local Alignment Extractions45
A New Hybrid Deep Learning Algorithm for Prediction of Wide Traffic Congestion in Smart Cities44
Analyzing Machine Learning Enabled Fake News Detection Techniques for Diversified Datasets44
Multi‐Drone Edge Intelligence and SAR Smart Wearable Devices for Emergency Communication43
EPPDA: An Efficient and Privacy‐Preserving Data Aggregation Scheme with Authentication and Authorization for IoT‐Based Healthcare Applications43
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data43
CPIDM: A Clustering‐Based Profound Iterating Deep Learning Model for HSI Segmentation42
Smart Farming: An Enhanced Pursuit of Sustainable Remote Livestock Tracking and Geofencing Using IoT and GPRS42
The Smart Network Management Automation Algorithm for Administration of Reliable 5G Communication Networks42
Enhanced Intelligent Smart Home Control and Security System Based on Deep Learning Model41
Intrusion Detection System on IoT with 5G Network Using Deep Learning41
Node Replication Attack Detection in Distributed Wireless Sensor Networks40
Unified Authentication and Access Control for Future Mobile Communication‐Based Lightweight IoT Systems Using Blockchain40
Deep Learning Enhanced Solar Energy Forecasting with AI‐Driven IoT39
Heart Failure Detection Using Quantum‐Enhanced Machine Learning and Traditional Machine Learning Techniques for Internet of Artificially Intelligent Medical Things39
Diagnosis of Diabetic Retinopathy through Retinal Fundus Images and 3D Convolutional Neural Networks with Limited Number of Samples39
Minimization of Latency Using Multitask Scheduling in Industrial Autonomous Systems37
On Blockchain and IoT Integration Platforms: Current Implementation Challenges and Future Perspectives37
[Retracted] A Detailed Research on Human Health Monitoring System Based on Internet of Things37
Machine Learning-Based CO2 Prediction for Office Room: A Pilot Study36
[Retracted] Effects of Attentional Withdrawal on Chinese Disabled Biathletes’ Shooting Performance36
A Study on Smart Healthcare Monitoring Using IoT Based on Blockchain35
Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study34
Blind Travel Prediction Based on Obstacle Avoidance in Indoor Scene34
Secure and Scalable Healthcare Data Transmission in IoT Based on Optimized Routing Protocols for Mobile Computing Applications33
Artificial Intelligence Application in Cybersecurity and Cyberdefense33
An Efficient ECG Denoising Method Based on Empirical Mode Decomposition, Sample Entropy, and Improved Threshold Function33
An Implementation of Modified Blowfish Technique with Honey Bee Behavior Optimization for Load Balancing in Cloud System Environment33
Implementation of Reliability Antecedent Forwarding Technique Using Straddling Path Recovery in Manet33
A Survey on Adversarial Attack in the Age of Artificial Intelligence32
Identity Model for Blockchain-Based Land Registry System: A Comparison32
Recognition of Imbalanced Epileptic EEG Signals by a Graph‐Based Extreme Learning Machine31
Circuit Manufacturing Defect Detection Using VGG16 Convolutional Neural Networks31
Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature29
Machine Learning-Based Secure Data Acquisition for Fake Accounts Detection in Future Mobile Communication Networks28
Energy-Efficient Routing Protocol for Next-Generation Application in the Internet of Things and Wireless Sensor Networks28
Artificial Intelligence for Education and Teaching28
Computational Intelligence and Metaheuristic Techniques for Brain Tumor Detection through IoMT-Enabled MRI Devices28
ML-DDoSnet: IoT Intrusion Detection Based on Denial-of-Service Attacks Using Machine Learning Methods and NSL-KDD28
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey28
BSSPD: A Blockchain‐Based Security Sharing Scheme for Personal Data with Fine‐Grained Access Control27
Reduced‐Complexity LDPC Decoding for Next‐Generation IoT Networks27
Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things27
A Secure IoT‐Based Cloud Platform Selection Using Entropy Distance Approach and Fuzzy Set Theory27
Bodacious-Instance Coverage Mechanism for Wireless Sensor Network27
Emerging Applications of Blockchain Technology on a Virtual Platform for English Teaching and Learning27
BMC‐SDN: Blockchain‐Based Multicontroller Architecture for Secure Software‐Defined Networks27
QoS‐Aware Optimal Radio Resource Allocation Method for Machine‐Type Communications in 5G LTE and beyond Cellular Networks27
Implementation of Hidden Node Detection Scheme for Self-Organization of Data Packet26
A Traffic Density-Based Congestion Control Method for VANETs26
Elite Oppositional Farmland Fertility Optimization Based Node Localization Technique for Wireless Networks26
A Novel, Efficient, and Secure Anomaly Detection Technique Using DWU‐ODBN for IoT‐Enabled Multimedia Communication Systems26
Hybrid Rule‐Based Solution for Phishing URL Detection Using Convolutional Neural Network26
Intelligent Recognition and Teaching of English Fuzzy Texts Based on Fuzzy Computing and Big Data26
Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks26
Federated Deep Learning Approaches for the Privacy and Security of IoT Systems26
Investigation of Machine Learning Methods for Early Prediction of Neurodevelopmental Disorders in Children26
Enhancing Packet‐Level Wi‐Fi Device Authentication Protocol Leveraging Channel State Information26
Sixth Generation (6G) Cognitive Radio Network (CRN) Application, Requirements, Security Issues, and Key Challenges26
Deep Insight into IoT-Enabled Agriculture and Network Protocols26
Distributed Blockchain‐Based Authentication and Authorization Protocol for Smart Grid25
Capsule Network-Based Deep Transfer Learning Model for Face Recognition25
Denial‐of‐Service Attack Detection over IPv6 Network Based on KNN Algorithm25
An Improved Secure Key Generation Using Enhanced Identity-Based Encryption for Cloud Computing in Large-Scale 5G25
A Review of Intrusion Detection Systems in RPL Routing Protocol Based on Machine Learning for Internet of Things Applications25
Research on Supply Chain Financial Risk Assessment Based on Blockchain and Fuzzy Neural Networks24
Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches24
Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning24
Efficient Byzantine Consensus Mechanism Based on Reputation in IoT Blockchain24
A Novel Highway Routing Protocol in Vehicular Ad Hoc Networks Using VMaSC-LTE and DBA-MAC Protocols24
DRL‐Based Intelligent Resource Allocation for Diverse QoS in 5G and toward 6G Vehicular Networks: A Comprehensive Survey24
Design and Experimental Analysis of Multiband Compound Reconfigurable 5G Antenna for Sub‐6 GHz Wireless Applications24
Image Recognition of Crop Diseases and Insect Pests Based on Deep Learning24
Analysis of Network Slicing for Management of 5G Networks Using Machine Learning Techniques24
Design and Simulation of Capacitive MEMS Switch for Ka Band Application24
An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm23
The Design of University Physical Education Management Framework Based on Edge Computing and Data Analysis23
BIoMT Modular Infrastructure: The Recent Challenges, Issues, and Limitations in Blockchain Hyperledger-Enabled E-Healthcare Application23
Small‐Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review23
Face Mask Detection Using Deep Convolutional Neural Network and MobileNetV2-Based Transfer Learning23
Explainable Artificial Intelligence for Sarcasm Detection in Dialogues23
A Blockchain‐Based Medical Data Sharing Mechanism with Attribute‐Based Access Control and Privacy Protection23
Structure Optimization of e-Commerce Platform Based on Artificial Intelligence and Blockchain Technology23
Nonholonomic Wheeled Mobile Robot Trajectory Tracking Control Based on Improved Sliding Mode Variable Structure22
Music Style Classification Algorithm Based on Music Feature Extraction and Deep Neural Network22
[Retracted] Reform and Challenges of Ideological and Political Education for College Students Based on Wireless Communication and Virtual Reality Technology22
[Retracted] Optimization of Intelligent Management and Monitoring System of Sports Training Hall Based on Internet of Things22
Machine Learning Technique for Precision Agriculture Applications in 5G-Based Internet of Things22
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation22
A Machine Learning-Based Model for Stability Prediction of Decentralized Power Grid Linked with Renewable Energy Resources22
Dimensions of Internet of Things: Technological Taxonomy Architecture Applications and Open Challenges—A Systematic Review22
[Retracted] Holographic Projection Technology in the Field of Digital Media Art22
IoT‐Based Smart Management of Healthcare Services in Hospital Buildings during COVID‐19 and Future Pandemics21
Using Mobile Computing to Provide a Smart and Secure Internet of Things (IoT) Framework for Medical Applications21
Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security21
Intelligent Blockchain-Based Secure Routing for Multidomain SDN-Enabled IoT Networks21
Cloud Computing Task Scheduling Model Based on Improved Whale Optimization Algorithm21
5G Joint Artificial Intelligence Technology in the Innovation and Reform of University English Education21
Passenger Flow Prediction Using Smart Card Data from Connected Bus System Based on Interpretable XGBoost20
Routing Protocols in Wireless Body Area Networks: Architecture, Challenges, and Classification20
Research on Value Integration Mode of Agricultural E-Commerce Industry Chain Based on Internet of Things and Blockchain Technology20
Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET)20
Computer Vision‐Driven Evaluation System for Assisted Decision‐Making in Sports Training20
Precision Measurement for Industry 4.0 Standards towards Solid Waste Classification through Enhanced Imaging Sensors and Deep Learning Model20
Prediction of Traffic Generated by IoT Devices Using Statistical Learning Time Series Algorithms20
Optimal Deep Learning Model for Olive Disease Diagnosis Based on an Adaptive Genetic Algorithm20
Energy‐Efficient Unmanned Aerial Vehicle (UAV) Surveillance Utilizing Artificial Intelligence (AI)20
Internet of Things‐Based Smart Electricity Monitoring and Control System Using Usage Data20
Named Entity Recognition of Traditional Chinese Medicine Patents Based on BiLSTM‐CRF20
A Novel Modified Sparrow Search Algorithm with Application in Side Lobe Level Reduction of Linear Antenna Array20
A Provably Secure Three‐Factor Authentication Protocol for Wireless Sensor Networks19
Effective Anomaly Detection Using Deep Learning in IoT Systems19
Evaluation of Vision Transformers for Traffic Sign Classification19
Smart Nursing Homes: Self‐Management Architecture Based on IoT and Machine Learning for Rural Areas19
An Attribute-Based Access Control Model for Internet of Things Using Hyperledger Fabric Blockchain19
Survey of Graph Neural Networks and Applications19
Data Mining Techniques to Analyze the Impact of Social Media on Academic Performance of High School Students19
Air-Gapped Networks: Exfiltration without Privilege Escalation for Military and Police Units19
Enterprise Financial Risk Management Using Information Fusion Technology and Big Data Mining19
Histogram Shifting-Based Quick Response Steganography Method for Secure Communication19
Delay-Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness19
Comparative Study and Improvement Analysis of Sparrow Search Algorithm18
The Influence of Artificial Intelligence Technology on Teaching under the Threshold of “Internet+”: Based on the Application Example of an English Education Platform18
IMOC: Optimization Technique for Drone-Assisted VANET (DAV) Based on Moth Flame Optimization18
Certificateless‐Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks18
New Trends and Advancement in Next Generation Mobile Wireless Communication (6G): A Survey18
A Deep Learning‐Based Inventory Management and Demand Prediction Optimization Method for Anomaly Detection18
Prediction of Wear Rates of UHMWPE Bearing in Hip Joint Prosthesis with Support Vector Model and Grey Wolf Optimization18
SecureMed: A Blockchain-Based Privacy-Preserving Framework for Internet of Medical Things18
Energy-Aware Routing Protocol with Fuzzy Logic in Industrial Internet of Things with Blockchain Technology18
Machine Learning-Based Data Analytics for IoT-Enabled Industry Automation18
Research on Named Entity Recognition of Electronic Medical Records Based on RoBERTa and Radical‐Level Feature18
Construction of Big Data Technology Training Environment for Vocational Education Based on Edge Computing Technology18
FCN Network-Based Weed and Crop Segmentation for IoT-Aided Agriculture Applications18
Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things18
Nonorthogonal Multiple Access for Next-Generation Mobile Networks: A Technical Aspect for Research Direction17
MidSiot: A Multistage Intrusion Detection System for Internet of Things17
FA‐YOLO: An Improved YOLO Model for Infrared Occlusion Object Detection under Confusing Background17
Dispersed Computing for Tactical Edge in Future Wars: Vision, Architecture, and Challenges17
Smart Agriculture for Sustainable Food Security Using Internet of Things (IoT)17
CUCKOO-ANN Based Novel Energy-Efficient Optimization Technique for IoT Sensor Node Modelling17
Research on the Role of Big Data Technology in the Reform of English Teaching in Universities17
AI-Based Equipment Optimization of the Design on Intelligent Education Curriculum System17
[Retracted] Music Online Education Reform and Wireless Network Optimization Using Artificial Intelligence Piano Teaching17
Financial Big Data Based on Internet of Things and Wireless Network Communication16
Fragmented Task Scheduling for Load-Balanced Fog Computing Based on Q-Learning16
A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency Limitation16
Multimodal Sarcasm Detection: A Deep Learning Approach16
Wi‐Fi Fingerprint‐Based Indoor Mobile User Localization Using Deep Learning16
Effectiveness of Handover Control Parameters on Handover Performance in 5G and beyond Mobile Networks16
Architecture of Network-on-Chip (NoC) for Secure Data Routing Using 4-H Function of Improved TACIT Security Algorithm16
Applications of Deep Learning on Topographic Images to Improve the Diagnosis for Dynamic Systems and Unconstrained Optimization16
Using the Internet of Things E‐Government Platform to Optimize the Administrative Management Mode16
Real‐Time Twitter Trend Analysis Using Big Data Analytics and Machine Learning Techniques16
An Ant Colony Optimization-Based Routing Algorithm for Load Balancing in LEO Satellite Networks16
A Heterogeneous Ensemble Learning Model Based on Data Distribution for Credit Card Fraud Detection16
Ubiquitous e‐Teaching and e‐Learning: China’s Massive Adoption of Online Education and Launching MOOCs Internationally during the COVID‐19 Outbreak16
An Approach of Linear Regression‐Based UAV GPS Spoofing Detection16
A Novel Routing Protocol for Realistic Traffic Network Scenarios in VANET16
Multistrategy Repeated Game‐Based Mobile Crowdsourcing Incentive Mechanism for Mobile Edge Computing in Internet of Things15
Blockchain‐Envisioned Secure Authentication Approach in AIoT: Applications, Challenges, and Future Research15
Adoption of Blockchain Technology for Privacy and Security in the Context of Industry 4.015
Application of Motion Sensor Based on Neural Network in Basketball Technology and Physical Fitness Evaluation System15
MISD-SLAM: Multimodal Semantic SLAM for Dynamic Environments15
Addressing Overfitting Problem in Deep Learning‐Based Solutions for Next Generation Data‐Driven Networks15
Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios15
Network Security and Ideological Security Based on Wireless Communication and Big Data Analysis15
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches15
A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks15
Source Localization of EM Waves in the Near‐Field of Spherical Antenna Array in the Presence of Unknown Mutual Coupling15
Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks15
Link Budget Analysis for 5G Communication in the Tropical Regions15
A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks15
Searchable Encryption with Access Control in Industrial Internet of Things (IIoT)15
A Survey on Cluster Head Selection and Cluster Formation Methods in Wireless Sensor Networks15
Problems and Solutions of Art Professional Service Rural Revitalization Strategy Based on Random Forest Algorithm15
Artificial Intelligence of Things (AIoT) Technologies and Applications15
A Secure and Efficient Energy Trading Model Using Blockchain for a 5G-Deployed Smart Community15
A Hybrid Deep Neural Network for Electricity Theft Detection Using Intelligent Antenna‐Based Smart Meters15
A Lightweight Deep Learning‐Based Pneumonia Detection Approach for Energy‐Efficient Medical Systems15
[Retracted] Deep Convolutional Neural Network and Weighted Bayesian Model for Evaluation of College Foreign Language Multimedia Teaching15
Multilevel RNN-Based PM10 Air Quality Prediction for Industrial Internet of Things Applications in Cleanroom Environment15
Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain15
Multihoming Big Data Network Using Blockchain-Based Query Optimization Scheme15
Impact of Wireless Sensor Data Mining with Hybrid Deep Learning for Human Activity Recognition15
Application of Flipped Classroom in the Era of Big Data: What Factors Influence the Effect of Teacher‐Student Interaction in Oral English Teaching14
Improved YOLOX Foreign Object Detection Algorithm for Transmission Lines14
An Optimized Approach for Predicting Water Quality Features Based on Machine Learning14
A New Feature Selection Method Based on Hybrid Approach for Colorectal Cancer Histology Classification14
Network Performance Test and Analysis of LTE-V2X in Industrial Park Scenario14
Industrial Internet of Things Intrusion Detection Method Using Machine Learning and Optimization Techniques14
Research on English Online Education Platform Based on Genetic Algorithm and Blockchain Technology14
PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home14
Parameter Estimation of Gamma‐Gamma Fading with Generalized Pointing Errors in FSO Systems14
Modern Energy Optimization Approach for Efficient Data Communication in IoT-Based Wireless Sensor Networks14
Mobility‐Aware Routing Algorithm for Mobile Ad Hoc Networks14
Aspect‐Level Sentiment Analysis Approach via BERT and Aspect Feature Location Model14
Performance Evaluation of Downlink Coordinated Multipoint Joint Transmission under Heavy IoT Traffic Load14
C SVM Classification and KNN Techniques for Cyber Crime Detection14
Problems and Countermeasures in the Process of Applying Multimedia Technology in Basketball Teaching14
A Secure and Efficient Lightweight Vehicle Group Authentication Protocol in 5G Networks14
Multiauthority Traceable Ring Signature Scheme for Smart Grid Based on Blockchain14
Rotated Black Hole: A New Heuristic Optimization for Reducing Localization Error of WSN in 3D Terrain14
[Retracted] Research on the Detection and Tracking Algorithm of Moving Object in Image Based on Computer Vision Technology14
Internet of Things-Based Data Hiding Scheme for Wireless Communication14
Intrusion Detection into Cloud-Fog-Based IoT Networks Using Game Theory14
Deep Reinforcement Learning for Scheduling in an Edge Computing‐Based Industrial Internet of Things14
Artificial Intelligence for Higher Education Development and Teaching Skills14
Utilizing Artificial Intelligence and Lotus Effect in an Emerging Intelligent Drone for Persevering Solar Panel Efficiency14
[Retracted] Enhancement of Predicting Students Performance Model Using Ensemble Approaches and Educational Data Mining Techniques14
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT14
Secure Three‐Factor Anonymous User Authentication Scheme for Cloud Computing Environment14
A Privacy‐Preserving Incentive Mechanism for Data Offloading in Satellite‐Terrestrial Crowdsensing14
WSN Routing Protocol Using a Multiobjective Greedy Approach14
Current Status and Security Trend of OSINT14
[Retracted] Secure Big Data Processing in Multihoming Networks with AI‐Enabled IoT14
0.15387296676636