ACM Transactions on Internet Technology

Papers
(The median citation count of ACM Transactions on Internet Technology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
The Cloud-edge-based Dynamic Reconfiguration to Service Workflow for Mobile Ecommerce Environments95
Understanding Ethereum via Graph Analysis88
An Emotional Analysis of False Information in Social Media and News Articles83
Federated Learning in a Medical Context: A Systematic Literature Review81
Phishing Scams Detection in Ethereum Transaction Network66
A Simulation-driven Methodology for IoT Data Mining Based on Edge Computing65
Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring63
A Cost-Efficient Container Orchestration Strategy in Kubernetes-Based Cloud Computing Infrastructures with Heterogeneous Resources61
InFeMo: Flexible Big Data Management Through a Federated Cloud System59
A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things55
Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain53
An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices46
AI-empowered IoT Security for Smart Cities46
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City45
Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction45
A Supply-chain System Framework Based on Internet of Things Using Blockchain Technology44
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures43
Fog in the Clouds43
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities42
Social-Chain37
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing System37
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment35
Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator35
AI-enabled IoT-Edge Data Analytics for Connected Living34
Personalized Review Recommendation based on Users’ Aspect Sentiment33
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions30
Big Data Analysis of Internet of Things System30
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images29
Predictive Analytics for Smart Parking: A Deep Learning Approach in Forecasting of IoT Data28
A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures27
esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments27
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning27
DAN-SNR26
Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System26
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model25
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems24
Web of Digital Twins23
The Security of Medical Data on Internet Based on Differential Privacy Technology23
Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents22
Epilepsy Diagnosis Using Multi-view & Multi-medoid Entropy-based Clustering with Privacy Protection21
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things21
CROWD: Crow Search and Deep Learning based Feature Extractor for Classification of Parkinson’s Disease20
A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security20
An Efficient Angle-based Universum Least Squares Twin Support Vector Machine for Classification20
Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework20
RTChain19
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications19
Data Privacy Based on IoT Device Behavior Control Using Blockchain19
Cognitive Wearable Robotics for Autism Perception Enhancement18
Negative Information Measurement at AI Edge: A New Perspective for Mental Health Monitoring18
Driver Identification Using Optimized Deep Learning Model in Smart Transportation18
Enabling User-centered Privacy Controls for Mobile Applications17
Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform17
Achieving Secure Search over Encrypted Data for e-Commerce17
Knowledge Graph Construction with a Façade : A Unified Method to Access Heterogeneous Data Sources on the Web17
Serving at the Edge: An Edge Computing Service Architecture Based on ICN17
Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things17
A COVID-19 Detection Algorithm Using Deep Features and Discrete Social Learning Particle Swarm Optimization for Edge Computing Devices16
An Incentive-based Mechanism for Volunteer Computing Using Blockchain16
Improving Vaccine Safety Using Blockchain15
Intelligent Traffic Signal Control Based on Reinforcement Learning with State Reduction for Smart Cities15
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing15
AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks15
Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities14
Sentence Semantic Matching Based on 3D CNN for Human–Robot Language Interaction14
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing14
Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model14
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction14
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security14
A Hybrid Feature Selection Algorithm Based on a Discrete Artificial Bee Colony for Parkinson's Diagnosis14
Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition14
FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification13
DuroNet13
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy13
Low-cost Security for Next-generation IoT Networks13
Privacy Care13
Cloud-based Enabling Mechanisms for Container Deployment and Migration at the Network Edge13
A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels12
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception12
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs12
Fine-Grained Network Analysis for Modern Software Ecosystems12
An Effective Hyperparameter Optimization Algorithm for DNN to Predict Passengers at a Metro Station12
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities11
A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images11
IoT Architecture for Urban Data-Centric Services and Applications11
S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT11
Emerging Trends of ICT in Airborne Disease Prevention11
Multimodal Brain Tumor Segmentation Based on an Intelligent UNET-LSTM Algorithm in Smart Hospitals11
IP Geolocation through Reverse DNS11
Blockchain-Based Power Energy Trading Management11
Deep-Confidentiality : An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data11
A Language-independent Network to Analyze the Impact of COVID-19 on the World via Sentiment Analysis11
Machine Learning and Soil Humidity Sensing: Signal Strength Approach10
QoS–aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges10
Spatio-temporal Bayesian Learning for Mobile Edge Computing Resource Planning in Smart Cities10
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations10
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System10
Machine Learning Empowered IoT for Intelligent Vehicle Location in Smart Cities10
PPRP: Preserving-Privacy Route Planning Scheme in VANETs10
Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection10
A Hybrid Siamese Neural Network for Natural Language Inference in Cyber-Physical Systems10
Alexa, Who Am I Speaking To?: Understanding Users’ Ability to Identify Third-Party Apps on Amazon Alexa10
Leveraging Data Augmentation for Service QoS Prediction in Cyber-physical Systems10
Task Offloading with Task Classification and Offloading Nodes Selection for MEC-Enabled IoV10
Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce9
Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems9
Large-Scale Least Squares Twin SVMs9
A Deep Learning Approach for Voice Disorder Detection for Smart Connected Living Environments9
Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme9
Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks9
Using Deep Learning Models to Detect Fake News about COVID-199
A Green Stackelberg-game Incentive Mechanism for Multi-service Exchange in Mobile Crowdsensing9
Trustworthy and Transparent Third-party Authority9
DECENT: A Decentralized Configurator for Controlling Elasticity in Dynamic Edge Networks8
Secure Distributed Mobile Volunteer Computing with Android8
Optimal Receiver Placement for K -barrier Coverage in Passive Bistatic Radar Sensor Networks8
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles8
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification8
An Empirical View on Consolidation of the Web8
An Efficient Service Function Chaining Placement Algorithm in Mobile Edge Computing8
Emo2Vec7
Blockchain in eCommerce7
Multilateral Personal Portfolio Authentication System Based on Hyperledger Fabric7
Optimally Self-Healing IoT Choreographies7
Cloud-based Network Virtualization in IoT with OpenStack7
Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV7
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities7
Fog Computing Platforms for Smart City Applications: A Survey7
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications7
Towards Semantic Management of On-Device Applications in Industrial IoT7
SkillBot: Identifying Risky Content for Children in Alexa Skills7
Collusion-free for Cloud Verification toward the View of Game Theory7
Investigating the Spread of Coronavirus Disease via Edge-AI and Air Pollution Correlation7
Securing Low-Power Blockchain-enabled IoT Devices against Energy Depletion Attack6
Beyond Frequency6
SMig-RL6
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems6
Evolving Influence Maximization in Evolving Networks6
A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments6
Descriptions from the Customers6
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks6
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing6
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process6
Design and Implementation of a Compressed Certificate Status Protocol5
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy5
IBRDM: An Intelligent Framework for Brain Tumor Classification Using Radiomics- and DWT-based Fusion of MRI Sequences5
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies5
Improving Collaborative Filtering with Social Influence over Heterogeneous Information Networks5
A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems5
Cognitive Robotics on 5G Networks5
Designing and Developing a Weed Detection Model for California Thistle5
Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures5
Adaptive Management of Volatile Edge Systems at Runtime With Satisfiability5
Introduction to the Special Section on Cognitive Robotics on 5G/6G Networks4
PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy4
Incremental Group-Level Popularity Prediction in Online Social Networks4
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices4
Providing Reliable Service for Parked-vehicle-assisted Mobile Edge Computing4
Unsupervised Derivation of Keyword Summary for Short Texts4
Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis4
Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare4
Multi-criteria Web Services Selection: Balancing the Quality of Design and Quality of Service4
A Novel Real-time Anti-spam Framework4
Secure DNA Motif-Finding Method Based on Sampling Candidate Pruning4
Network Temperature: A Novel Statistical Index for Networks Measurement and Management4
Game-Theoretic Strategic Coordination and Navigation of Multiple Wheeled Robots4
Big Data Processing on Volunteer Computing4
A Polishing Robot Force Control System Based on Time Series Data in Industrial Internet of Things4
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces4
An Intelligent Edge-centric Queries Allocation Scheme based on Ensemble Models4
0.022499799728394