ACM Transactions on Internet Technology

Papers
(The TQCC of ACM Transactions on Internet Technology is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks106
SSWMNet: Solving the Speech Separation Problem While the Target is Wearing a Mask91
Analysis of the Behavior of Ethereum Accounts During an Economic Impact Event85
Fog Computing Platforms for Smart City Applications: A Survey82
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments64
Enabling Short-Term Energy Flexibility Markets Through Blockchain62
Selective Federated IDS Framework with Adaptation for Large-scale Segmented Industrial Networks57
Detection of Trust Information Tampering in IoT Service Environments55
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation51
Budget Inference Attacks and Countermeasures in Locally Differentially Private Data Collection41
An ECC Based Secure Authentication Protocol Ensuring Privacy in the Industrial IOT39
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics37
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy31
Optimizing Effectiveness and Defense of Drone Surveillance Missions via Honey Drones29
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English27
CAPilot: A High-Performance and High-Reliability Communication Middleware for Autonomous Driving26
Dynamic and Immersive Framework for Drone Delivery Services in Skyway Networks25
An End-to-end Trust Management Framework for Crowdsourced IoT Services25
The Tip of the Buyer: Extracting Product Tips from Reviews23
UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud22
LNNIDS: A Hybrid Liquid Neural Network based IDS for Known and Unknown IoT Attacks22
Malicious Participants and Fake Task Detection Incorporating Gaussian Bias21
Interpersonal Communication Interconnection in Media Convergence Metaverse21
Communication-Efficient Federated Learning for Heterogeneous Clients18
Movie Account Recommendation on Instagram18
Editorial17
Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services17
Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning17
ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application17
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency17
Enhancing Alexa Skill Testing Through Improved Utterance Discovery16
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies16
Identifying Concealed Channels in Internet Streaming Media Communication16
A Blockchain-based Decentralized Low-carbon Electric Vehicle Charging System16
Achieving Resilient and Self-Adaptive Topology Configuration in 3D UAV Networks15
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds15
D-RecSys: A Decentralized Recommendation Framework for Web 3.0-Based Content-Sharing Platforms15
Unsupervised Learning and Process Analysis for Sensor Data Validation in the IIoT15
Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things15
Seek and You Shall SOC: Blending Human Expertise with Multimodal Generative AI for Scalable Threat Prevention14
We Really Need the Help of AI: A Case Study of AI Adoption in Cybersecurity14
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems13
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications12
Modeling Inter-drone Interference as a Service in Skyway Networks12
Optimizing WebAssembly Bytecode for IoT Devices Using Deep Reinforcement Learning12
Governance of Autonomous Agents on the Web: Challenges and Opportunities12
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN)11
DxHash: A Memory-saving Consistent Hashing Algorithm11
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks11
EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum11
Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network11
Quantum-safe Federated Learning Framework for Cyber Threat Detection in 5G-enabled IoT Ecosystems10
Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments10
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching10
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts10
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication10
Safeguarding User-Centric Privacy in Smart Homes10
Emerging Trends of ICT in Airborne Disease Prevention10
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot10
A Novel Cross-Domain Recommendation with Evolution Learning10
0.051204919815063