ACM Transactions on Internet Technology

Papers
(The median citation count of ACM Transactions on Internet Technology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Federated Learning in a Medical Context: A Systematic Literature Review121
The Cloud-edge-based Dynamic Reconfiguration to Service Workflow for Mobile Ecommerce Environments101
Phishing Scams Detection in Ethereum Transaction Network91
A Simulation-driven Methodology for IoT Data Mining Based on Edge Computing80
Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring75
InFeMo: Flexible Big Data Management Through a Federated Cloud System70
Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain64
A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things63
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City54
Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures49
A Supply-chain System Framework Based on Internet of Things Using Blockchain Technology48
Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction46
AI-empowered IoT Security for Smart Cities43
Joint QoS-aware and Cost-efficient Task Scheduling for Fog-cloud Resources in a Volunteer Computing System42
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities42
esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments41
Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator41
Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment40
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions40
Social-Chain39
Web of Digital Twins38
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning37
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images35
AI-enabled IoT-Edge Data Analytics for Connected Living34
Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures33
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems32
Big Data Analysis of Internet of Things System32
Predictive Analytics for Smart Parking: A Deep Learning Approach in Forecasting of IoT Data32
A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures31
Design and Implementation of BCI-based Intelligent Upper Limb Rehabilitation Robot System29
The Security of Medical Data on Internet Based on Differential Privacy Technology29
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications29
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing28
Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents28
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model27
DAN-SNR26
An Efficient Angle-based Universum Least Squares Twin Support Vector Machine for Classification25
Knowledge Graph Construction with a Façade : A Unified Method to Access Heterogeneous Data Sources on the Web25
Data Privacy Based on IoT Device Behavior Control Using Blockchain23
Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework23
RTChain22
Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception22
CROWD: Crow Search and Deep Learning based Feature Extractor for Classification of Parkinson’s Disease22
A Novel Multiobjective GDWCN-PSO Algorithm and Its Application to Medical Data Security22
Epilepsy Diagnosis Using Multi-view & Multi-medoid Entropy-based Clustering with Privacy Protection21
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things21
Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things21
Cognitive Wearable Robotics for Autism Perception Enhancement21
Serving at the Edge: An Edge Computing Service Architecture Based on ICN20
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security20
Achieving Secure Search over Encrypted Data for e-Commerce19
Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model19
Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform19
An Incentive-based Mechanism for Volunteer Computing Using Blockchain19
AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks19
Edge Computing AI-IoT Integrated Energy-efficient Intelligent Transportation System for Smart Cities18
Using Deep Learning Models to Detect Fake News about COVID-1918
A COVID-19 Detection Algorithm Using Deep Features and Discrete Social Learning Particle Swarm Optimization for Edge Computing Devices18
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction18
Enabling User-centered Privacy Controls for Mobile Applications18
Driver Identification Using Optimized Deep Learning Model in Smart Transportation18
Intelligent Traffic Signal Control Based on Reinforcement Learning with State Reduction for Smart Cities17
DuroNet17
Privacy Care17
Negative Information Measurement at AI Edge: A New Perspective for Mental Health Monitoring17
Improving Vaccine Safety Using Blockchain16
Emerging Trends of ICT in Airborne Disease Prevention16
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing16
Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition16
A Hybrid Feature Selection Algorithm Based on a Discrete Artificial Bee Colony for Parkinson's Diagnosis15
S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT15
Multimodal Brain Tumor Segmentation Based on an Intelligent UNET-LSTM Algorithm in Smart Hospitals15
A Blockchain-based Iterative Double Auction Protocol Using Multiparty State Channels14
Fine-Grained Network Analysis for Modern Software Ecosystems14
IP Geolocation through Reverse DNS14
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities14
Machine Learning and Soil Humidity Sensing: Signal Strength Approach14
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy14
Sentence Semantic Matching Based on 3D CNN for Human–Robot Language Interaction14
An Effective Hyperparameter Optimization Algorithm for DNN to Predict Passengers at a Metro Station13
FinPrivacy: A Privacy-preserving Mechanism for Fingerprint Identification13
PPRP: Preserving-Privacy Route Planning Scheme in VANETs13
A Green Stackelberg-game Incentive Mechanism for Multi-service Exchange in Mobile Crowdsensing13
A Language-independent Network to Analyze the Impact of COVID-19 on the World via Sentiment Analysis13
Leveraging Data Augmentation for Service QoS Prediction in Cyber-physical Systems12
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations12
Alexa, Who Am I Speaking To?: Understanding Users’ Ability to Identify Third-Party Apps on Amazon Alexa12
A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images12
Fog Computing Platforms for Smart City Applications: A Survey12
Deep-Confidentiality : An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data12
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs11
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System11
Machine Learning Empowered IoT for Intelligent Vehicle Location in Smart Cities11
Blockchain-Based Power Energy Trading Management11
Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme11
Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks11
Task Offloading with Task Classification and Offloading Nodes Selection for MEC-Enabled IoV11
Large-Scale Least Squares Twin SVMs11
An Empirical View on Consolidation of the Web11
Spatio-temporal Bayesian Learning for Mobile Edge Computing Resource Planning in Smart Cities11
Cloud-based Network Virtualization in IoT with OpenStack10
A Deep Learning Approach for Voice Disorder Detection for Smart Connected Living Environments10
A Hybrid Siamese Neural Network for Natural Language Inference in Cyber-Physical Systems10
Secure Distributed Mobile Volunteer Computing with Android10
Incentive-Driven Computation Offloading in Blockchain-Enabled E-Commerce10
DECENT: A Decentralized Configurator for Controlling Elasticity in Dynamic Edge Networks10
SkillBot: Identifying Risky Content for Children in Alexa Skills10
Intelligent Mediator-based Enhanced Smart Contract for Privacy Protection10
Towards Semantic Management of On-Device Applications in Industrial IoT10
Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems10
QoS–aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges10
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification9
A Softwarized Intrusion Detection System for IoT-Enabled Smart Healthcare System9
Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV9
Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process9
A Novel Memory-hard Password Hashing Scheme for Blockchain-based Cyber-physical Systems9
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities8
Multilateral Personal Portfolio Authentication System Based on Hyperledger Fabric8
Blockchain in eCommerce8
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles8
Investigating the Spread of Coronavirus Disease via Edge-AI and Air Pollution Correlation8
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications8
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis7
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy7
IBRDM: An Intelligent Framework for Brain Tumor Classification Using Radiomics- and DWT-based Fusion of MRI Sequences7
Designing and Developing a Weed Detection Model for California Thistle7
Efficient Cryptographic Hardware for Safety Message Verification in Internet of Connected Vehicles7
Concept Drift in Software Defect Prediction: A Method for Detecting and Handling the Drift7
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks7
Collusion-free for Cloud Verification toward the View of Game Theory7
Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions7
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies6
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication6
Game-Theoretic Strategic Coordination and Navigation of Multiple Wheeled Robots6
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing6
Adaptive Multi-Task Dual-Structured Learning with Its Application on Alzheimer’s Disease Study6
Securing Low-Power Blockchain-enabled IoT Devices against Energy Depletion Attack6
Beyond Frequency6
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation6
A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments6
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces6
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems6
Network Temperature: A Novel Statistical Index for Networks Measurement and Management6
A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks6
Secure DNA Motif-Finding Method Based on Sampling Candidate Pruning5
PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy5
Adaptive Management of Volatile Edge Systems at Runtime With Satisfiability5
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices5
EECDN: Energy-efficient Cooperative DNN Edge Inference in Wireless Sensor Networks5
Introduction to the Special Section on Cognitive Robotics on 5G/6G Networks5
Multi-criteria Web Services Selection: Balancing the Quality of Design and Quality of Service5
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks5
Providing Reliable Service for Parked-vehicle-assisted Mobile Edge Computing5
V-Gas: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability5
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things5
Cognitive Robotics on 5G Networks5
Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions4
Predictive Analytics of Energy Usage by IoT-Based Smart Home Appliances for Green Urban Development4
A Novel Real-time Anti-spam Framework4
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data4
Unsupervised Derivation of Keyword Summary for Short Texts4
Secure and Efficient Hybrid Data Deduplication in Edge Computing4
Big Data Processing on Volunteer Computing4
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction4
Virtual Reality Aided High-Quality 3D Reconstruction by Remote Drones4
PoSSUM: An Entity-centric Publish/Subscribe System for Diverse Summarization in Internet of Things4
MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs4
Deep Learning-Based Network Traffic Prediction for Secure Backbone Networks in Internet of Vehicles4
Taming Internet of Things Application Development with the IoTvar Middleware4
Adaptive Fuzzy Game-Based Energy-Efficient Localization in 3D Underwater Sensor Networks4
A Reputation-based Framework for Honest Provenance Reporting4
DANCE: Distributed Generative Adversarial Networks with Communication Compression4
Incremental Group-Level Popularity Prediction in Online Social Networks4
Neural Network Pruning by Recurrent Weights for Finance Market4
A Polishing Robot Force Control System Based on Time Series Data in Industrial Internet of Things4
Transfer Learning-powered Resource Optimization for Green Computing in 5G-Aided Industrial Internet of Things4
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs4
Introduction to the Special Section on Security and Privacy of Medical Data for Smart Healthcare4
Labeling Privacy Protection SVM Using Privileged Information for COVID-19 Diagnosis4
On Optimizing Transaction Fees in Bitcoin using AI: Investigation on Miners Inclusion Pattern4
0.032904148101807