Security and Communication Networks

Papers
(The TQCC of Security and Communication Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Pattern Mathematical Model for Fingerprint Security Using Bifurcation Minutiae Extraction and Neural Network Feature Selection122
A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things101
Understanding User-Level IP Blocks on the Internet99
Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors93
Corrigendum to “Rational Protocols and Attacks in Blockchain System”92
WEB DDoS Attack Detection Method Based on Semisupervised Learning77
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge70
Publishing Triangle Counting Histogram in Social Networks Based on Differential Privacy69
User Authentication Method via Speaker Recognition and Speech Synthesis Detection66
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering66
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data65
Adaptive Alleviation for Popularity Bias in Recommender Systems with Knowledge Graph65
Application of Data Fusion and Image Video Teaching Mode in Physical Education Course Teaching and Evaluation of Teaching Effect65
Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection64
Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model63
Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing59
A Competition-Based Unequal Clustering Multihop Approach for Wireless Sensor Networks59
Visual Cryptography Using Computation-Free Bit-Plane Reconstruction58
QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers54
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code54
Encrypted Packet Inspection Based on Oblivious Transfer50
Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence50
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification46
Retracted: The Evaluation of DDoS Attack Effect Based on Neural Network45
Retracted: Artificial Intelligence-Based Online Education System for University Music42
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis41
Effect of Multimodal Teaching on Language Comprehensive Ability under the Background of Artificial Intelligence38
Multiobjective Algorithm for Urban Land Spatial Layout Optimization38
Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach37
Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries37
A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks37
Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization37
Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments35
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?34
ImageDroid: Using Deep Learning to Efficiently Detect Android Malware and Automatically Mark Malicious Features34
Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor’s Algorithm33
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features33
Retracted: ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks32
Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning32
Internet of Things Application of Intelligent and Innovative Learning Strategies in the Higher English Education System32
Retracted: Digital Reconstruction Method of Power Metering Production Data Based on Digital Twin Technology31
Application of Internet of Things and Edge Computing Technology in Sports Tourism Services31
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract31
Estimation Method for Mixed Near-Field and Far-Field Sources Based on Four-Order Cumulant and Polarization Sensitive Array30
Enterprise Management Performance Evaluation Model Using Improved Fuzzy Clustering Algorithm in IoT Networks30
Retracted: Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks29
Research on Real-Time Detection of Sprint Error Based on Visual Features and Internet of Things29
Retracted: Artificial Intelligence Sponge City Wisdom Management Model27
Retracted: Comprehensive Treatment of Urban Landscape Water Environment Based on Aquatic Plants Purification and Restoration25
Retracted: AI-Based Secure Undergraduates’ Ideological and Political Public Opinion Strategy25
Research on Classification Method of Network Resources Based on Modified SVM Algorithm25
Retracted: Analysis of the Effect of Martial Arts on Students' Physical and Mental Health Based on Internet of Things Technology24
How Does Digital Finance Affect People’s Income: Evidence from China24
Retracted: Selective Partial Update Adaptive Filtering Algorithms for Block-Sparse System Identification24
A Basketball Technique Balance Control Technology Based on Ant Colony Algorithm24
A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model24
Retracted: Computational Technologies in Internet of Things and Big Data Technology for Physical Exercise Rehabilitation System23
Machine Learning-Based Intelligent Wireless Communication System for Solving Real-World Security Issues23
Retracted: Adaptive Integration Algorithm of Sports Event Network Marketing Data Based on Big Data23
Big Data Storage Index Mechanism Based on Spatiotemporal Information Cloud Platform23
Retracted: Recognition Method of Matching Error between Dance Action and Music Beat Based on Data Mining23
Retracted: Research on Inversion of Suspended Sediment Concentration in Estuary Surface Based on Remote Sensing and GIS22
Retracted: Corner Detection of Ceramic Crack Computer VR Image Based on Three-Dimensional Reconstruction Algorithm22
Retracted: Intelligent Planning of Tourist Routes Based on Cloud Computing and Marching Algorithm22
Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology22
Evaluation Method of Wushu Teaching Quality Based on Fuzzy Clustering22
Effective Bots’ Detection for Online Smartphone Game Using Multilayer Perceptron Neural Networks22
Optimizing Multitask Assignment of Internet of Things Devices by Reinforcement Learning in Mobile Crowdsensing Scenes22
Retracted: A Recommended Approach to Classical Literature and Art Exhibition Activities Oriented towards Interactive Modelling22
Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain21
Retracted: An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm21
Retracted: Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy21
Statistical Analysis of Employment Education in Colleges and Universities Based on Improved Clustering Algorithm21
Retracted: Secure Internet of Things Gateway Technology Based on Multicommunication Methods20
An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning20
Retracted: Foreign Muslim Workers’ Perspectives of the Basic Needs of Muslim-Friendly Tourist Services: An Empirical Analysis of a Non-Muslim Destination20
Early Rumor Detection Based on Deep Recurrent Q-Learning20
Retracted: Multipoint Distribution Vehicle Routing Optimization Problem considering Random Demand and Changing Load20
Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning20
Retracted: Research on Electronic Information Feature Extraction and Classification Recognition Algorithm Based on Deep Learning20
Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions19
SoK: Context and Risk Aware Access Control for Zero Trust Systems19
Cryptographic Accumulator and Its Application: A Survey19
Retracted: RNN Neural Network Model for Chinese-Korean Translation Learning19
Design and Reconstruction of Visual Art Based on Virtual Reality19
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain19
A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion19
GAP-MM: 5G-Enabled Real-Time Autonomous Vehicle Platoon Membership Management Based on Blockchain19
A Blockchain-Based Privacy Preservation Scheme in Mobile Medical18
A Four-Tier Smart Contract Model with On-Chain Upgrade18
Aggregating Heterogeneous Sensor Ontologies with Fuzzy Debate Mechanism18
DQfD-AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data18
Local Corner and Motion Key Point Trajectory Extraction for Facial Forgery Identification18
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT18
An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications18
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum18
Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems18
Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future Directions18
Detecting Digital Watermarking Image Attacks Using a Convolution Neural Network Approach17
A Dynamic Density Peak Clustering Algorithm Based on K-Nearest Neighbor17
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre17
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations17
BERT-Embedding-Based JSP Webshell Detection on Bytecode Level Using XGBoost17
Data Hiding Based on Mini Program Code17
A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network17
Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production17
Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic17
Fluid Dynamics and Numerical Simulation of Exhaled Droplets Containing Infectious Viruses16
Retracted: Evaluation Method of Enterprise Management Effectiveness Based on Improved Analytic Hierarchy Process16
Retracted: Copyright Protection and Data Reliability of AI-Written Literary Creations in Smart City16
Research on Site Safety Management by BIM Technology Based on Fuzzy Intuition Set16
Accuracy Analysis of Sports Performance Prediction Based on BP Neural Network Intelligent Algorithm16
Computer Graphic Image Design and Visual Communication Design in the Internet of Things Scenario16
Mathematical Modeling and Multivariable Optimization Design of SUV Chassis Structure Based on SFE CONCEPT16
Dance Movement Recognition Based on Modified GMM-Based Motion Target Detection Algorithm16
Security-Enhanced Certificate-Based Remote Data Integrity Batch Auditing for Cloud-IoT16
Group Relationship Mining of College Students Based on Predictive Social Network16
Retracted: Network Media Public Opinion and Social Governance Supported by the Internet-of-Things Big Data16
Retracted: Research on the Application of Data Mining Technology in College Students’ Mental Health Education in the Network Age16
Retracted: Improving the Application of Blockchain Technology for Financial Security in Supply Chain Integrated Business Intelligence15
Retracted: Optimization of Regional Logistics Distribution Information Network Platform15
Retracted: Multiobjective Optimal Dispatching Method of Generalized Power Active Distribution Network Based on Game Theory15
Retracted: Application of Business Intelligence Based on the Deep Neural Network in Credit Scoring15
Quality Evaluation and Satisfaction Analysis of Online Learning of College Students Based on Artificial Intelligence15
Research on Balance Control of Freestyle Skiing Aerial Skills Based on Ant Colony Algorithm15
Retracted: Nonlinear Control Method of Superconducting Energy Storage considering Voltage Imbalance in Distribution Network15
Retracted: Sharpening and Detection of Road Studs for Intelligent Vehicles at Nighttime15
Retracted: A Method of Using Data Mining and Edge Computing to Calculate the Standing Efficiency of Basketball Games15
Optimization of English Classroom Quality Evaluation Model with AHP15
Retracted: Application of Face Recognition in E-commerce Security Authentication in the Era of Big Data15
Enterprise Financial Risk Prediction and Prevention Based on Big Data Analysis15
Retracted: Application of CAD in Semifinished Product Packaging Art Design14
Retracted: Construction of Cross-Cultural College English Teaching System Based on Computer Simulation Technology14
E-Commerce Logistics Inspection System Based on Artificial Intelligence Technology in the Context of Big Data14
Multiclass Interactive Martial Arts Teaching Optimization Method Based on Euclidean Distance14
Retracted: Research on Spatial Agglomeration Characteristics of Aerospace Cultural and Creative Industries in Smart City under Multidata Fusion14
Retracted: Network Teaching Technology Based on Big Data Mining and Information Fusion14
Intelligent Detection and Analysis of Wearable Devices in Wushu Training14
Retracted: Research on Intelligent Calibration of English Long Sentence Translation Based on Corpus14
Big Data Analytics and Discrete Choice Model for Enterprise Credit Risk Early Warning Algorithm14
Retracted: Audio Signal Acquisition and Processing System Based on Model DSP Rapid Design14
Macroeconomic Short-Term High-Precision Combined Forecasting Algorithm Based on Grey Model14
Retracted: Classroom Resource Optimization of the English Four-Step Model Based on Deep Learning14
Automating Group Management of Large-Scale IoT Botnets for Antitracking13
Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks13
Retracted: Audience Dissemination Response Law and Action Mechanism Based on Internet Rumor Computer Big Data13
An Efficient Intrusion Detection Method Based on Federated Transfer Learning and an Extreme Learning Machine with Privacy Preservation13
An Improved Secure Public Cloud Auditing Scheme in Edge Computing13
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting13
Delta-DAGMM: A Free Rider Attack Detection Model in Horizontal Federated Learning13
Analyzing the Role of Emotional Intelligence on the Performance of Small and Medium Enterprises (SMEs) Using AI-Based Convolutional Neural Networks (CNNs)13
BEvote: Bitcoin-Enabled E-Voting Scheme with Anonymity and Robustness13
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE13
An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems13
Evaluation of Coordinated Level between Coastal Ports and Urban Economics Based on DEA and Coordination Degree Model: Case of Jiangsu Province13
Feature Extraction and Identification of Calligraphy Style Based on Dual Channel Convolution Network13
Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card13
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems13
NSGA-II-Based Granularity-Adaptive Control-Flow Attestation13
Influencing Factors of College Students’ Sports Cognition Based on DM Technology13
Retracted: Application of Convolutional Neural Network Algorithm under Deep Learning in Digital Clothing Design13
An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree13
IIDQN: An Incentive Improved DQN Algorithm in EBSN Recommender System13
Security Analysis of Smart Grids13
Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM13
Major Challenges and Future Approaches in the Employment of Blockchain and Machine Learning Techniques in the Health and Medicine12
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System12
PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios12
A Class of Public Opinion Dissemination Model considering the Information Screening Mechanism12
Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain12
DeepDefense: A Steganalysis-Based Backdoor Detecting and Mitigating Protocol in Deep Neural Networks for AI Security12
Personalized Online Education Learning Strategies Based on Transfer Learning Emotion Classification Model12
Radio Network Forensic with mmWave Using the Dominant Path Algorithm12
An Edge Cloud Data Integrity Protection Scheme Based on Blockchain12
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks12
Construction of Competitive Advantage and Competitive Strategy Model of Sports Enterprises Based on Multicase Study and In-Depth Learning12
Design of Teaching System of Physical Yoga Course in Colleges and Universities Based on Computer Network12
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services12
Retracted: A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks12
CTRF: Ethereum-Based Ponzi Contract Identification12
Towards Achieving Personal Privacy Protection and Data Security on Integrated E-Voting Model of Blockchain and Message Queue12
An Intelligent Security Classification Model of Driver’s Driving Behavior Based on V2X in IoT Networks12
Overlapping Community Detection Based on Node Importance and Adjacency Information12
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs12
Retracted: Research on Performance Optimization Method of UAV Communication Link in Emergency Communication Environment11
Research on Mobile English Learning System Based on iOS11
Retracted: Study and Application on Big Data Information Fusion System Based on IoT11
Quality Evaluation of Ranunculaceae Essential Oil with the Artificial Neural Network11
Material Analysis and Application Based on Intelligent Computing in the Context of Contemporary Watercolor Painting11
The Innovative Development of Russian Modern Oil Painting under the Background of Internet of Things and Artificial Intelligence11
Retracted: Enterprise Credit Security Prediction and Evaluation Based on Multimodel Fusion11
Retracted: Intelligent Intrusion Detection Method of Industrial Internet of Things Based on CNN-BiLSTM11
Retracted: An Intelligent Teaching Strategy of Cross-Cultural Business Communication Course Based on Big Data11
Retracted: Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model11
Retracted: 5G-Based Information Platform Design of Tourist Attractions in the Context of Mobile Big Data11
Retracted: Optimization of Printing and Dyeing Energy Consumption Based on Multimedia Machine Learning Algorithm11
Retracted: Trend Prediction Model of Asian Stock Market Volatility Dynamic Relationship Based on Machine Learning11
Retracted: Research on Value Co-Creation New Business Model of Import Cross-Border E-Commerce Platform Ecosystem11
Component-Based Software Testing Method Based on Deep Adversarial Network11
RNN Neural Network Model for Chinese-Korean Translation Learning11
Retracted: Empirical Analysis of Enterprise Financial Management Risk Prediction in View of Associative Memory Neural Network11
Design of Network Intrusion Detection Model Based on TCA11
Retracted: Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain11
Retracted: Construction of Marine Professional Virtual Simulation Experiment Platform Based on Internet-of-Things Technology11
Retracted: Design of College Scheduling Algorithm Based on Improved Genetic Ant Colony Hybrid Optimization11
Retracted: Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts11
Analysis of English Performance Rating Based on Machine Learning and Optimized BP Network Technology11
Retracted: Architectural and Landscape Garden Planning Integrated with Artificial Intelligence Parametric Analysis11
Retracted: Problems and Countermeasures of China’s International Trade in Agricultural Products under the Belt and Road Strategy Based on Big Data Analysis Technology in the Internet of Things Era11
A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server11
Attacker Traceability on Ethereum through Graph Analysis10
Cross-Border e-Commerce Business Model Based on Wireless Communication Network and Blockchain10
Retracted: Research on the Innovation of Ideological and Political Education in Universities Based on Artificial Intelligence Machine Learning in a Wireless Network Environment10
Retracted: Psychological Consultation and Health Analysis Method for Artificial Intelligence Multidecision Support10
Machine Learning-Enabled Development of Model for Japanese Film Industry10
Efficient Hyperchaotic Image Encryption Algorithm Based on a Fast Key Generation Method and Simultaneous Permutation-Diffusion Structure10
Telematics Collaborative Resource Allocation Algorithm Based on Cloud Sidecar10
TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments10
Retracted: Models in the Construction of Accounting Informatization Transformation Based on Digital Twin10
Feature Extraction Method Based on Sparse Autoencoder for Air Traffic Management System Security Situation Awareness10
Network Traffic Classification Based on SD Sampling and Hierarchical Ensemble Learning10
An Automated Data Desensitisation System Based on the Middle Platform10
Attribute Set-Based Boolean Keyword Search over Encrypted Personal Health Records10
Resource Selection from Edge-Cloud for IIoT and Blockchain-Based Applications in Industry 4.0/5.010
Retracted: Online Big Data Physical Education Classroom Based on Monitoring Network and Artificial Intelligence10
Retracted: Text Mining of Movie Animation User Comments and Video Artwork Recommendation Based on Machine Learning10
Toward Identifying APT Malware through API System Calls10
Verification Grid and Map Slipping Based Graphical Password against Shoulder-Surfing Attacks10
EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application10
A Regulatable Data Privacy Protection Scheme for Energy Transactions Based on Consortium Blockchain10
Coarse-Grained Load Balancing with Traffic-Aware Marking in Data Center Networks10
A Practical Anonymous Voting Scheme Based on Blockchain for Internet of Energy10
Gesture Tracking and Recognition Algorithm for Dynamic Human Motion Using Multimodal Deep Learning10
Anonymous Certificate-Based Inner Product Broadcast Encryption10
Retracted: The Segmentation of Road Scenes Based on Improved ESPNet Model10
Retracted: Data File Security Strategy and Implementation Based on Fuzzy Control Algorithm10
Mining Cryptocurrency-Based Security Using Renewable Energy as Source10
Network Penetration Intrusion Prediction Based on Attention Seq2seq Model10
FGL_Droid: An Efficient Android Malware Detection Method Based on Hybrid Analysis10
Cross-Platform Binary Code Homology Analysis Based on GRU Graph Embedding10
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records Using Blockchain10
Toward Detecting Malware Based on Process-Aware Behaviors10
Financial and Economic Sequence Forecasting Based on Time Slot Allocation Algorithm10
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage9
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification9
Tracking Control of the Dynamic Input-Output Economic System Based on Data Fusion9
Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics9
The Practicality of Adopting Blockchain-Based Distributed Identity Management in Organisations: A Meta-Synthesis9
A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server9
VNGuarder: An Internal Threat Detection Approach for Virtual Network in Cloud Computing Environment9
0.11278581619263