Ad Hoc Networks

Papers
(The TQCC of Ad Hoc Networks is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
Wireless communication protocols in smart agriculture: A review on applications, challenges and future trends212
Explainable deep learning for attack intelligence and combating cyber–physical attacks139
Range-free localization using Reliable Anchor Pair Selection and Quantum-behaved Salp Swarm Algorithm for anisotropic Wireless Sensor Networks129
A secure and efficient certificateless signature scheme for Internet of Things112
MBC-SS: A multi-band cooperative sidelink scheme for NR V2X networks101
A method for vulnerability detection by IoT network traffic analytics86
Cluster based resource management using H-NOMA in heterogeneous networks beyond 5G78
Hybrid fusion of Pietra–Ricci index detector information for cooperative spectrum sensing74
Asymmetric Autoencoders: An NN alternative for resource-constrained devices in IoT networks67
Fr-Aro: Secure interference aware fuzzy based clustering and hybrid optimization driven data routing in VANETs60
Improved DV-Hop model based on the application of variable scenarios59
Link characteristics study of ultra-wideband radios49
Editorial Board49
Editorial Board48
Unsupervised concept drift detection based on multi-scale slide windows48
Power allocation in D2D enabled cellular network with probability constraints: A robust Stackelberg game approach47
Artificial Intelligence for Wireless Networks43
Rapid prediction of network quality in mobile robots43
Editorial Board42
NoD: A content retrieval scheme for intermittently-connected IoT networks41
Editorial Board40
A deep learning scheme for efficient multimedia IoT data compression39
Quantitative models for friendly jammer trustworthiness evaluation in IoT networks39
Editorial Board37
Editorial Board35
Fully privacy-preserving location recommendation in outsourced environments35
TRFR: A ternary relation link prediction framework on Knowledge graphs34
Multi-scene LoRa positioning algorithm based on Kalman filter and its implementation on NS334
Editorial Board33
Editorial Board33
UWB-MAC: MAC protocol for UWB localization using ultra-low power anchor nodes32
Editorial Board32
A low-latency and reliable multihop D2D transmissions scheduling algorithm for guaranteed message dissemination32
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing32
On migratable traffic risk estimation in urban sensing: A social sensing based deep transfer network approach31
Newton-interpolation-based zk-SNARK for Artificial Internet of Things31
Defending Root DNS Servers against DDoS Using Layered Defenses (Extended)31
IoVCipher: A low-latency lightweight block cipher for internet of vehicles31
Clustering at the Edge: Load balancing and energy efficiency for the IoT30
Editorial Board30
Multi-label active learning from crowds for secure IIoT30
Interference-aware modeling and analysis for the secrecy performance of cooperative vehicular relaying networks over mixed Nakagami-29
SmartLight: A smart efficient traffic light scheduling algorithm for green road intersections28
A cluster-based cooperative computation offloading scheme for C-V2X networks28
ACGSOR: Adaptive cooperation-based geographic segmented opportunistic routing for underwater acoustic sensor networks28
RGSO-UAV: Reverse Glowworm Swarm Optimization inspired UAV path-planning in a 3D dynamic environment27
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications27
IoT adaptive threshold energy management algorithm based on energy harvesting27
Space delay-tolerant network routing algorithm based on node clustering and social attributes27
LESCA: LightwEight Stream Cipher Algorithm for emerging systems26
Survey and taxonomy of information-centric vehicular networking security attacks26
Security in wireless body area networks via anonymous authentication: Comprehensive literature review, scheme classification, and future challenges26
Smart adaptive collision avoidance for IEEE 802.1126
Combining recurrent and Graph Neural Networks to predict the next place’s category26
TICPS: A trustworthy collaborative intrusion detection framework for industrial cyber–physical systems26
VOCkit: A low-cost IoT sensing platform for volatile organic compound classification25
Enhancing MPTCP performance in wireless networks with PRS-MPTCP25
A spectral clustering-based deployment strategy for roadside units in vehicular edge computing environments25
Greedy cooperative cache placement for mobile edge networks with user preferences prediction and adaptive clustering25
Enhancing quality of service through federated learning in edge-cloud architecture25
Collecting large volume data from wireless sensor network by drone24
Intelligent Computer Networks and Distributed Systems24
Do not get fooled: Defense against the one-pixel attack to protect IoT-enabled Deep Learning systems24
Partitioned uneven cluster routing algorithm based on gray wolf optimization in WSNs22
Exploring data collection on Bluetooth Mesh networks22
Status update scheduling in remote sensing under variable activation and propagation delays22
Energy-efficient and solar powered mission planning of UAV swarms to reduce the coverage gap in rural areas: The 3D case22
iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning22
Towards energy balancing optimization in wireless sensor networks: A novel quantum inspired genetic algorithm based sinks deployment approach21
Generative adversarial network to detect unseen Internet of Things malware21
Throughput-aware path planning for UAVs in D2D 5G networks21
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET21
Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective20
Fuzzy-AHP based optimal RSU deployment (Fuzzy-AHP-ORD) approach using road and traffic analysis in VANET20
Distributed multi-hop clustering algorithm for aeronautical ad-hoc network20
A trustworthy data collection scheme based on active spot-checking in UAV-Assisted WSNs20
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction20
Reinforcement learning based reliability-aware routing in IoT networks20
Mobility-aware and energy-efficient offloading for mobile edge computing in cellular networks20
A two-context-aware approach for navigation: A case study for vehicular route recommendation19
Dual-stage machine learning approach for advanced malicious node detection in WSNs19
Residual multiscale attention based modulated convolutional neural network for radio link failure prediction in 5G19
A cache-aware congestion control mechanism using deep reinforcement learning for wireless sensor networks19
A multi-hop routing protocol based on link state prediction for intra-body Wireless Nanosensor Networks18
Indoor localization algorithms based on Angle of Arrival with a benchmark comparison18
CollOR: Distributed collaborative offloading and routing for tasks with QoS demands in multi-robot system18
Verifying trust over IoT-ad hoc network-based applications under uncertainty18
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework18
Reinforcement learning based multi-parameter joint optimization in dense multi-hop wireless networks18
Performance analysis of the air-ground integrated vehicular networks: A hierarchical model approach18
TS-CAGR:Traffic sensitive connectivity-aware geocast routing protocol in internet of vehicles18
A deep reinforcement learning approach for online mobile charging scheduling with optimal quality of sensing coverage in wireless rechargeable sensor networks18
Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization18
ReLoRaWAN: Reliable data delivery in LoRaWAN networks with multiple gateways18
Deep reinforcement learning for the computation offloading in MIMO-based Edge Computing18
Distributed Physical-layer Network Coding MAC protocol18
Strategic deployment of RSUs in urban settings: Optimizing IEEE 802.11p infrastructure18
Performance of STAR-RIS-aided cooperative NOMA networks under Nakagami-m18
Reinforcement learning based effective communication strategies for energy harvested WBAN17
FIDWATCH: Federated incremental distillation for continuous monitoring of IoT security threats17
Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds17
Gas sensing in industry. A case study: Train hangar17
Deep Q-network based fog node offloading strategy for 5 G vehicular Adhoc Network17
Editorial Board17
ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments16
IoT-based data-driven fault allocation in microgrids using advanced µPMUs16
Task-driven charger placement and power allocation for wireless sensor networks16
LUVI: Lightweight UWB-VIO based relative positioning for AR-IoT applications16
Load-adaptive MAC protocol for frontier detection in Underwater Mobile Sensor Network16
Joint differential evolution algorithm in RIS-assisted multi-UAV IoT data collection system16
A novel two-phase energy efficient load balancing scheme for efficient data collection for energy harvesting WSNs using mobile sink16
Robust Deep Identification using ECG and Multimodal Biometrics for Industrial Internet of Things16
Geometric least square curve fitting method for localization of wireless sensor network16
Exploiting stream scheduling in QUIC: Performance assessment over wireless connectivity scenarios15
RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks15
Joint optimization of communication and mission performance for multi-UAV collaboration network: A multi-agent reinforcement learning method15
ECMSH: An Energy-efficient and Cost-effective data harvesting protocol for Mobile Sink-based Heterogeneous WSNs using PSO-TVAC15
CV POp-CoRN: The (smart) city-vehicle participatory-opportunistic cooperative route navigation system15
A novel differentiated coverage-based lifetime metric for wireless sensor networks15
Performance evaluation of CNN-based pedestrian detectors for autonomous vehicles15
End-to-end network slicing in vehicular clouds using the MobFogSim simulator14
Corrigendum to Energy-Efficient Coverage Optimization in Wireless Sensor Networks based on Voronoi-Glowworm Swarm Optimization-K-means algorithm [AdHoc Networks Volume 122 (November 2021) 102660]14
A hybrid RSSI and AoA indoor positioning approach with adapted confidence evaluator14
Simopticon: Automated optimization of vehicular platooning controllers14
Salient object detection on hyperspectral images in wireless network using CNN and saliency optimization14
Corrigendum to “Federated Learning assisted framework to periodically identify user communities in urban space” [Ad Hoc Networks 163 (2024) pp. 1-21/103589]14
A general task offloading and resources allocation strategy for multi-RSUs with load unbalance and priority awareness14
Low data regimes in extreme climates: Foliage penetration personnel detection using a wireless network-based device-free sensing approach14
Intrusion detection system for cyberattacks in the Internet of Vehicles environment14
JamBIT: RL-based framework for disrupting adversarial information in battlefields14
CLIC-IoE — Cross Layers Solution to Improve Communications under IoE14
Cross-layer UAV network routing protocol for spectrum denial environments14
LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks13
A vertical handoff decision scheme using subjective-objective weighting and grey relational analysis in cognitive heterogeneous networks13
Interference Aware Joint Power Control and Routing Optimization in Multi-UAV FANETs13
Local search resource allocation algorithm for space-based backbone network in Deep Reinforcement Learning method13
Delay-guaranteed Mobile Augmented Reality Task Offloading in Edge-assisted Environment13
An optimized transaction verification method for trustworthy blockchain-enabled IIoT13
Context-aware resource allocation for vehicle-to-vehicle communications in cellular-V2X networks13
TSBS: A Two-Stage Backpressure Scheduling scheme over multihop wireless networks13
Partner selection in self-organised wireless sensor networks for opportunistic energy negotiation: A multi-armed bandit based approach12
Deep reinforcement learning in NOMA-assisted UAV networks for path selection and resource offloading12
Modeling and analysis of directional energy harvesting and spectrum sharing communications in massive D2D networks12
Privacy reinforcement learning for faults detection in the smart grid12
Deep learning-driven opportunistic spectrum access (OSA) framework for cognitive 5G and beyond 5G (B5G) networks12
CR-5: Resource optimization opportunistic network routing algorithm based on node dynamic attributes12
Optimal channel selection for tri-band Wi-Fi in a residential scenario12
Inspecting VANET with Various Critical Aspects – A Systematic Review12
CRT-based group rekeying with efficient dynamically aggregate signature for IoMT12
System-centric energy efficient computation offloading and resource allocation in latency-sensitive MEC systems12
An IPSO-assisted DNN operation scheme in UAV-mounted MEC networks12
Communication architecture and operations for SDR-enabled UAVs network in disaster-stressed areas12
Relay selection in millimeter wave D2D communications through obstacle learning12
Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation12
Next generation opportunistic networking in beyond 5G networks11
Deep convolutional recurrent model for region recommendation with spatial and temporal contexts11
Editorial Board11
NMSFRA: Heterogeneous routing protocol for balanced energy consumption in mobile wireless sensor network11
A novel auxiliary hole localization algorithm based on multidimensional scaling for wireless sensor networks in complex terrain with holes11
Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks11
A city-wide experimental testbed for the next generation wireless networks11
Editorial Board11
Performance analysis of a Vehicular Ad Hoc network Using LoRa technology and IoT devices in Amazon Rivers11
A lightweight mutual and transitive authentication mechanism for IoT network11
Disentangling style on dynamic aligned poses for individual identification11
Exploiting scene and body contexts in controlling continuous vision body cameras11
An optimized message routing approach inspired by the landlord-peasants game in disruption-tolerant networks10
Evaluation of the end-to-end response times in an energy harvesting wireless sensor network using a receiver-initiated MAC protocol10
Editorial Board10
Editorial Board10
High-integrity based cooperative file transmission at urban intersections using pure V2V communication10
Dwell time estimation at intersections for improved vehicular micro cloud operations10
DIVE: A distributed ID assignment and topology discovery protocol for underwater acoustic networks10
A replication strategy for mobile opportunistic networks based on utility clustering10
Editorial Board10
Special issue: Selected papers from COMSNETS 202010
Model-based Bayesian reinforcement learning for enhancing primary user performance under jamming attack10
Buffer-aided relay selection for secure communication in two-hop wireless networks with limited packet lifetime10
Joint service placement and request routing in mobile edge computing10
Editorial Board10
Editorial Board10
Adaptive time offset compensation for TDMA industrial wireless networks10
Editorial Board10
vServiceInspector: Introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers10
On the interest of artificial intelligence approaches in solving the IoT coverage problem10
An extreme value based algorithm for improving the accuracy of WiFi localization10
Editorial Board10
Editorial Board10
High-precision Time Synchronization Algorithm for Unmanned Aerial Vehicle Ad Hoc Networks based on Bidirectional Pseudo-range Measurements9
Efficient parallel scheduling with power control and successive interference cancellation in wireless sensor networks9
Multi-agent reinforcement learning for network routing in integrated access backhaul networks9
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme9
Enabling an inter-operator roaming capability in LoRaWAN networks9
Fuzzy cluster-based multi-node charging strategy in mobile sensor networks9
An energy efficiency routing protocol for UAV-aided WSNs data collection9
Exploiting FAS for Cooperative NOMA-based Full-duplex mmWave Networks with Imperfections9
An energy recovery routing algorithm for opportunistic networks based on connection stability and node encounter type9
Digital twin-assisted intelligent anomaly detection system for Internet of Things9
Interference management for coexisting Internet of Things networks over unlicensed spectrum9
A delay-tolerant network approach to satellite pickup and delivery scheduling9
Cost-effective task partial offloading and resource allocation for multi-vehicle and multi-MEC on B5G/6G edge networks9
Indoor tracking using auxiliary particle filter and deep learning in wireless sensor networks9
Dynamic Compressive Data Gathering using Angle-based Random Walk in Hybrid WSNs9
Adaptive clustering routing protocol for underwater sensor networks9
An efficient energy saving scheme using reinforcement learning for 5G and beyond in H-CRAN8
New routing method based on sticky bacteria algorithm and link stability for VANET8
Mobility-aware task offloading in MEC with task migration and result caching8
FLAV: Federated Learning for Autonomous Vehicle privacy protection8
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things8
A virtual models-based CAVs platoon resilient to network and sensor attacks8
TGRV: A trust-based geographic routing protocol for VANETs8
Inference of Wi-Fi busy time fraction based on Markov chains8
Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures8
A Survey on Mobility in Wireless Sensor Networks8
Geographic location based secure, dynamic and opportunistic RPL for distributed networks8
A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks8
Collaborative caching relay algorithm based on recursive deep reinforcement learning in mobile vehicle edge network8
UAVs assisted Network Partition Detection and Connectivity Restoration in Wireless Sensor and Actor Networks8
Li-Wi: An upper layer hybrid VLC-WiFi network handover solution8
AI-enabled cluster head selection through modified density based clustering in Aeronautical Ad Hoc Networks8
Federated Learning-based Misbehaviour detection on an emergency message dissemination scenario for the 6G-enabled Internet of Vehicles8
Lightweight integrity auditing of edge data for distributed edge computing scenarios8
STAG: A novel interaction-aware path prediction method based on Spatio-Temporal Attention Graphs for connected automated vehicles8
SAC-based UAV mobile edge computing for energy minimization and secure data transmission8
AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security8
An in-depth assessment of the physical layer performance in the proposed B5G framework8
Multiplex Fourier ptychographic reconstruction with model-based neural network for Internet of Things8
Towards an optimal 3-D design and deployment of 6G UAVs for interference mitigation under terrestrial networks8
Energy efficient and coverage aware grey wolf optimizer based clustering process for Software-defined wireless sensor networks8
Energy efficient deployment of aerial base stations for mobile users in multi-hop UAV networks8
Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks8
An adaptive and cooperative MAC protocol for safety applications in cognitive radio enabled vehicular Ad-hoc networks8
0.20555591583252