ACM Transactions on Sensor Networks

Papers
(The TQCC of ACM Transactions on Sensor Networks is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Edge Content Caching with Deep Spatiotemporal Residual Network for IoV in Smart City86
Low-Cost Outdoor Air Quality Monitoring and Sensor Calibration80
Resource Orchestration of Cloud-Edge–based Smart Grid Fault Detection69
SCANet55
Artificial Intelligence in Underwater Digital Twins Sensor Networks50
A Secure and Anonymous Communicate Scheme over the Internet of Things40
A Survey on Energy-Efficient Strategies in Static Wireless Sensor Networks35
Pushing the Limits of Transmission Concurrency for Low Power Wireless Networks29
Blockchain-Based Privacy Preservation for IoT-Enabled Healthcare System27
Concurrent Low-power Listening: A New Design Paradigm for Duty-cycling Communication26
ACES25
H-DrunkWalk25
QoS-Aware VNF Placement and Service Chaining for IoT Applications in Multi-Tier Mobile Edge Networks25
Recent Advances in LoRa: A Comprehensive Survey22
DeepHeart21
Improving Quality of Service in 5G Resilient Communication with the Cellular Structure of Smartphones20
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid20
MSEva: A Musculoskeletal Rehabilitation Evaluation System Based on EMG Signals20
Graph Neural Networks in IoT: A Survey20
Ultra-wideband Concurrent Ranging18
SateLoc: A Virtual Fingerprinting Approach to Outdoor LoRa Localization Using Satellite Images17
Identifying Child Users via Touchscreen Interactions16
iSleep16
GaitSense: Towards Ubiquitous Gait-Based Human Identification with Wi-Fi16
ClusterFL: A Clustering-based Federated Learning System for Human Activity Recognition14
3D Localization and Error Minimization in Underwater Sensor Networks13
Latency-efficient Data Collection Scheduling in Battery-free Wireless Sensor Networks13
Introduction to the Special Issue on Low Power Wide Area Networks13
Energy-collision-aware Minimum Latency Aggregation Scheduling for Energy-harvesting Sensor Networks13
RLC: A Reinforcement Learning-Based Charging Algorithm for Mobile Devices13
On the Range Assignment in Wireless Sensor Networks for Minimizing the Coverage-Connectivity Cost12
Quality-aware Online Task Assignment in Mobile Crowdsourcing12
Robust Networking: Dynamic Topology Evolution Learning for Internet of Things12
XGest: Enabling Cross-Label Gesture Recognition with RF Signals11
Towards an Advanced Deep Learning for the Internet of Behaviors: Application to Connected Vehicles11
Deep Reinforcement Learning for Tropical Air Free-cooled Data Center Control11
A Mobile-assisted Edge Computing Framework for Emerging IoT Applications11
Applying Probabilistic Model Checking to the Behavior Guidance and Abnormality Detection for A-MCI Patients under Wireless Sensor Network10
Design of Self-sustainable Wireless Sensor Networks with Energy Harvesting and Wireless Charging10
AsTAR: Sustainable Energy Harvesting for the Internet of Things through Adaptive Task Scheduling10
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things10
Mobile Localization Techniques for Wireless Sensor Networks: Survey and Recommendations10
Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems10
Intelligent Data Collaboration in Heterogeneous-device IoT Platforms10
DMCP: A Distributed Mobile Charging Protocol in Wireless Rechargeable Sensor Networks10
Compressive Sensing Based Distributed Data Storage for Mobile Crowdsensing9
Joint Offloading and Resource Allocation Based on UAV-Assisted Mobile Edge Computing9
dWatch9
Price Learning-based Incentive Mechanism for Mobile Crowd Sensing9
A Secure Face Recognition for IoT-enabled Healthcare System9
DSME-LoRa: Seamless Long-range Communication between Arbitrary Nodes in the Constrained IoT9
A Prospect Theoretic Approach for Trust Management in IoT Networks Under Manipulation Attacks9
ApproxNet: Content and Contention-Aware Video Object Classification System for Embedded Clients9
CoHop9
Securing Cyber-Physical Social Interactions on Wrist-Worn Devices8
An Energy-efficient And Trustworthy Unsupervised Anomaly Detection Framework (EATU) for IIoT8
Online Resource Provisioning for Wireless Data Collection8
MORE8
Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain8
Attack-aware Synchronization-free Data Timestamping in LoRaWAN8
Reliability–Security Tradeoff Analysis in mmWave Ad Hoc–based CPS8
Digital Twin-enabled AI Enhancement in Smart Critical Infrastructures for 5G8
Communication for Underwater Sensor Networks: A Comprehensive Summary7
LMAC: Efficient Carrier-Sense Multiple Access for LoRa7
Evaluation of Low-cost Air Quality Sensor Calibration Models7
Deploying the Minimum Number of Rechargeable UAVs for a Quarantine Barrier6
Intelligent AI-based Healthcare Cyber Security System using Multi-Source Transfer Learning Method6
Minimizing Latency for Data Aggregation in Wireless Sensor Networks: An Algorithm Approach6
Wireless Localization with Spatial-Temporal Robust Fingerprints6
CoUAS6
Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing6
Joint Modelling of Cyber Activities and Physical Context to Improve Prediction of Visitor Behaviors6
Incentive Mechanisms for Crowdsensing6
A Query Processing Framework for Efficient Network Resource Utilization in Shared Sensor Networks6
CPS Attack Detection under Limited Local Information in Cyber Security: An Ensemble Multi-Node Multi-Class Classification Approach6
From Demodulation to Decoding: Toward Complete LoRa PHY Understanding and Implementation6
A MEC Offloading Strategy Based on Improved DQN and Simulated Annealing for Internet of Behavior6
COVID-19: Secure Healthcare Internet of Things Networks, Current Trends and Challenges with Future Research Directions6
Smartphone-Based Indoor Visual Navigation with Leader-Follower Mode6
EGM: An Efficient Generative Model for Unrestricted Adversarial Examples6
DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion6
Reinforcing Data Integrity in Renewable Hybrid AC-DC Microgrids from Social-Economic Perspectives6
Privacy Protection in 5G Positioning and Location-based Services Based on SGX6
Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge Collaboration5
Towards Reliable Driver Drowsiness Detection Leveraging Wearables5
Dynamic Edge-coded Protocols for Low-power, Device-to-device Communication5
DeepMTD: Moving Target Defense for Deep Visual Sensing against Adversarial Examples5
Distributed Node Deployment Algorithms in Mobile Wireless Sensor Networks: Survey and Challenges5
Energy-efficient Collaborative Sensing: Learning the Latent Correlations of Heterogeneous Sensors5
eDeepSave: Saving DNN Inference using Early Exit During Handovers in Mobile Edge Environment5
Enabling Cross-technology Communication from LoRa to ZigBee via Payload Encoding in Sub-1 GHz Bands5
Semi-supervised Intrusive Appliance Load Monitoring in Smart Energy Monitoring System5
Reinforcement Learning-Based MAC Protocol for Underwater Multimedia Sensor Networks5
Dynamic Buffer Sizing for Out-of-order Event Compensation for Time-sensitive Applications5
ForETaxi: Data-Driven Fleet-Oriented Charging Resource Allocation in Large-Scale Electric Taxi Networks4
Time-efficient Missing Tag Identification in an Open RFID System4
ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware4
BOND4
A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning4
An Efficient Framework for Unsupervised Anomaly Detection over Edge-Assisted Internet of Things4
One Size Does Not Fit All4
WiFine: Real-Time Gesture Recognition Using Wi-Fi with Edge Intelligence4
Availability-aware Provision of Service Function Chains in Mobile Edge Computing4
Reactive Jamming and Attack Mitigation over Cross-Technology Communication Links4
Intelligent Video Ingestion for Real-time Traffic Monitoring4
PCube: Scaling LoRa Concurrent Transmissions with Reception Diversities4
Traffic Classification in Underwater Networks Using SDN and Data-Driven Hybrid Metaheuristics4
Queec: QoE-aware Edge Computing for IoT Devices under Dynamic Workloads4
E-TPE: E fficient T humbnail- P reserving E ncryption for Privacy Protection4
Link Quality Estimation of Cross-Technology Communication: The Case with Physical-Level Emulation4
Breaking Cellular IoT with Forged Data-plane Signaling: Attacks and Countermeasure4
Energy-saving Service Offloading for the Internet of Medical Things Using Deep Reinforcement Learning4
Feasibility of Remote Blood Pressure Estimation via Narrow-band Multi-wavelength Pulse Transit Time4
TESS: multivariate sensor time series prediction for building sustainable smart cities4
Adaptive Monitor Placement for Near Real-time Node Failure Localisation in Wireless Sensor Networks4
LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation4
0.040169954299927