Security and Communication Networks

Papers
(The H4-Index of Security and Communication Networks is 33. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
WEB DDoS Attack Detection Method Based on Semisupervised Learning128
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge107
User Authentication Method via Speaker Recognition and Speech Synthesis Detection103
Application of Data Fusion and Image Video Teaching Mode in Physical Education Course Teaching and Evaluation of Teaching Effect102
Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection98
Visual Cryptography Using Computation-Free Bit-Plane Reconstruction74
QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers73
Encrypted Packet Inspection Based on Oblivious Transfer70
Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence68
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification67
Retracted: Artificial Intelligence-Based Online Education System for University Music64
Retracted: The Evaluation of DDoS Attack Effect Based on Neural Network64
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis59
Multiobjective Algorithm for Urban Land Spatial Layout Optimization58
Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries56
A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks52
Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach52
Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization44
Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments41
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?40
SoK: Context and Risk Aware Access Control for Zero Trust Systems39
Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor’s Algorithm39
A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things39
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features39
Retracted: ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks38
Retracted: Digital Reconstruction Method of Power Metering Production Data Based on Digital Twin Technology38
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract37
Retracted: Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks37
Retracted: Artificial Intelligence Sponge City Wisdom Management Model36
Retracted: AI-Based Secure Undergraduates’ Ideological and Political Public Opinion Strategy35
Retracted: Analysis of the Effect of Martial Arts on Students' Physical and Mental Health Based on Internet of Things Technology34
Retracted: Comprehensive Treatment of Urban Landscape Water Environment Based on Aquatic Plants Purification and Restoration34
Retracted: Selective Partial Update Adaptive Filtering Algorithms for Block-Sparse System Identification33
0.054670095443726