Security and Communication Networks

Papers
(The TQCC of Security and Communication Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
WEB DDoS Attack Detection Method Based on Semisupervised Learning128
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge107
User Authentication Method via Speaker Recognition and Speech Synthesis Detection103
Application of Data Fusion and Image Video Teaching Mode in Physical Education Course Teaching and Evaluation of Teaching Effect102
Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection98
Visual Cryptography Using Computation-Free Bit-Plane Reconstruction74
QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers73
Encrypted Packet Inspection Based on Oblivious Transfer70
Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence68
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification67
Retracted: The Evaluation of DDoS Attack Effect Based on Neural Network64
Retracted: Artificial Intelligence-Based Online Education System for University Music64
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis59
Multiobjective Algorithm for Urban Land Spatial Layout Optimization58
Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries56
Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach52
A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks52
Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization44
Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments41
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?40
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features39
SoK: Context and Risk Aware Access Control for Zero Trust Systems39
Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor’s Algorithm39
A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things39
Retracted: Digital Reconstruction Method of Power Metering Production Data Based on Digital Twin Technology38
Retracted: ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks38
Retracted: Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks37
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract37
Retracted: Artificial Intelligence Sponge City Wisdom Management Model36
Retracted: AI-Based Secure Undergraduates’ Ideological and Political Public Opinion Strategy35
Retracted: Comprehensive Treatment of Urban Landscape Water Environment Based on Aquatic Plants Purification and Restoration34
Retracted: Analysis of the Effect of Martial Arts on Students' Physical and Mental Health Based on Internet of Things Technology34
Retracted: Selective Partial Update Adaptive Filtering Algorithms for Block-Sparse System Identification33
Retracted: Recognition Method of Matching Error between Dance Action and Music Beat Based on Data Mining32
Retracted: Computational Technologies in Internet of Things and Big Data Technology for Physical Exercise Rehabilitation System32
Retracted: Adaptive Integration Algorithm of Sports Event Network Marketing Data Based on Big Data32
Effective Bots’ Detection for Online Smartphone Game Using Multilayer Perceptron Neural Networks30
Retracted: Research on Inversion of Suspended Sediment Concentration in Estuary Surface Based on Remote Sensing and GIS30
Retracted: Corner Detection of Ceramic Crack Computer VR Image Based on Three-Dimensional Reconstruction Algorithm29
Retracted: A Recommended Approach to Classical Literature and Art Exhibition Activities Oriented towards Interactive Modelling28
Retracted: Intelligent Planning of Tourist Routes Based on Cloud Computing and Marching Algorithm28
Retracted: An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm27
Retracted: Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy27
Retracted: Foreign Muslim Workers’ Perspectives of the Basic Needs of Muslim-Friendly Tourist Services: An Empirical Analysis of a Non-Muslim Destination27
Retracted: Research on Electronic Information Feature Extraction and Classification Recognition Algorithm Based on Deep Learning26
Retracted: Multipoint Distribution Vehicle Routing Optimization Problem considering Random Demand and Changing Load26
How Does Digital Finance Affect People’s Income: Evidence from China25
Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning25
Retracted: Secure Internet of Things Gateway Technology Based on Multicommunication Methods25
Retracted: RNN Neural Network Model for Chinese-Korean Translation Learning24
A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model24
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain24
Research on Real-Time Detection of Sprint Error Based on Visual Features and Internet of Things24
Estimation Method for Mixed Near-Field and Far-Field Sources Based on Four-Order Cumulant and Polarization Sensitive Array24
An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning24
Effect of Multimodal Teaching on Language Comprehensive Ability under the Background of Artificial Intelligence24
Internet of Things Application of Intelligent and Innovative Learning Strategies in the Higher English Education System23
Understanding User-Level IP Blocks on the Internet23
Enterprise Management Performance Evaluation Model Using Improved Fuzzy Clustering Algorithm in IoT Networks22
Design and Reconstruction of Visual Art Based on Virtual Reality22
Statistical Analysis of Employment Education in Colleges and Universities Based on Improved Clustering Algorithm22
Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain22
Machine Learning-Based Intelligent Wireless Communication System for Solving Real-World Security Issues22
Optimizing Multitask Assignment of Internet of Things Devices by Reinforcement Learning in Mobile Crowdsensing Scenes22
Evaluation Method of Wushu Teaching Quality Based on Fuzzy Clustering21
Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning21
A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion21
Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology21
A Basketball Technique Balance Control Technology Based on Ant Colony Algorithm21
Publishing Triangle Counting Histogram in Social Networks Based on Differential Privacy21
Big Data Storage Index Mechanism Based on Spatiotemporal Information Cloud Platform21
GAP-MM: 5G-Enabled Real-Time Autonomous Vehicle Platoon Membership Management Based on Blockchain21
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT20
Pattern Mathematical Model for Fingerprint Security Using Bifurcation Minutiae Extraction and Neural Network Feature Selection20
Adaptive Alleviation for Popularity Bias in Recommender Systems with Knowledge Graph20
ImageDroid: Using Deep Learning to Efficiently Detect Android Malware and Automatically Mark Malicious Features20
A Class of Public Opinion Dissemination Model considering the Information Screening Mechanism20
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering20
Cryptographic Accumulator and Its Application: A Survey20
Overlapping Community Detection Based on Node Importance and Adjacency Information19
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services19
BEvote: Bitcoin-Enabled E-Voting Scheme with Anonymity and Robustness19
Delta-DAGMM: A Free Rider Attack Detection Model in Horizontal Federated Learning19
Retracted: Research on the Application of Data Mining Technology in College Students’ Mental Health Education in the Network Age19
An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications19
Analyzing the Role of Emotional Intelligence on the Performance of Small and Medium Enterprises (SMEs) Using AI-Based Convolutional Neural Networks (CNNs)19
Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future Directions19
Security-Enhanced Certificate-Based Remote Data Integrity Batch Auditing for Cloud-IoT18
Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic18
Detecting Digital Watermarking Image Attacks Using a Convolution Neural Network Approach18
Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card18
Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions18
A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network18
Retracted: Improving the Application of Blockchain Technology for Financial Security in Supply Chain Integrated Business Intelligence17
Retracted: Application of Face Recognition in E-commerce Security Authentication in the Era of Big Data17
Retracted: Evaluation Method of Enterprise Management Effectiveness Based on Improved Analytic Hierarchy Process17
Retracted: Optimization of Regional Logistics Distribution Information Network Platform17
Retracted: Multiobjective Optimal Dispatching Method of Generalized Power Active Distribution Network Based on Game Theory17
Retracted: Application of Business Intelligence Based on the Deep Neural Network in Credit Scoring17
Retracted: Network Media Public Opinion and Social Governance Supported by the Internet-of-Things Big Data17
Retracted: A Method of Using Data Mining and Edge Computing to Calculate the Standing Efficiency of Basketball Games17
Retracted: Nonlinear Control Method of Superconducting Energy Storage considering Voltage Imbalance in Distribution Network17
Retracted: Sharpening and Detection of Road Studs for Intelligent Vehicles at Nighttime17
Retracted: Copyright Protection and Data Reliability of AI-Written Literary Creations in Smart City17
Retracted: Network Teaching Technology Based on Big Data Mining and Information Fusion16
Retracted: Classroom Resource Optimization of the English Four-Step Model Based on Deep Learning16
Retracted: Audience Dissemination Response Law and Action Mechanism Based on Internet Rumor Computer Big Data16
An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree16
Retracted: Construction of Cross-Cultural College English Teaching System Based on Computer Simulation Technology16
Retracted: Application of CAD in Semifinished Product Packaging Art Design16
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE16
NSGA-II-Based Granularity-Adaptive Control-Flow Attestation16
Retracted: Research on Intelligent Calibration of English Long Sentence Translation Based on Corpus16
Retracted: Research on Spatial Agglomeration Characteristics of Aerospace Cultural and Creative Industries in Smart City under Multidata Fusion16
Retracted: Audio Signal Acquisition and Processing System Based on Model DSP Rapid Design16
Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks16
Retracted: Application of Convolutional Neural Network Algorithm under Deep Learning in Digital Clothing Design16
An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems15
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting15
A Four-Tier Smart Contract Model with On-Chain Upgrade15
Evaluation of Coordinated Level between Coastal Ports and Urban Economics Based on DEA and Coordination Degree Model: Case of Jiangsu Province15
IIDQN: An Incentive Improved DQN Algorithm in EBSN Recommender System15
Feature Extraction and Identification of Calligraphy Style Based on Dual Channel Convolution Network15
Automating Group Management of Large-Scale IoT Botnets for Antitracking15
An Improved Secure Public Cloud Auditing Scheme in Edge Computing15
Security Analysis of Smart Grids15
Research on Balance Control of Freestyle Skiing Aerial Skills Based on Ant Colony Algorithm14
Research on Site Safety Management by BIM Technology Based on Fuzzy Intuition Set14
BERT-Embedding-Based JSP Webshell Detection on Bytecode Level Using XGBoost14
DeepDefense: A Steganalysis-Based Backdoor Detecting and Mitigating Protocol in Deep Neural Networks for AI Security14
Macroeconomic Short-Term High-Precision Combined Forecasting Algorithm Based on Grey Model14
DQfD-AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data14
Multiclass Interactive Martial Arts Teaching Optimization Method Based on Euclidean Distance14
E-Commerce Logistics Inspection System Based on Artificial Intelligence Technology in the Context of Big Data13
Big Data Analytics and Discrete Choice Model for Enterprise Credit Risk Early Warning Algorithm13
A Blockchain-Based Privacy Preservation Scheme in Mobile Medical13
Influencing Factors of College Students’ Sports Cognition Based on DM Technology13
Accuracy Analysis of Sports Performance Prediction Based on BP Neural Network Intelligent Algorithm13
An Efficient Intrusion Detection Method Based on Federated Transfer Learning and an Extreme Learning Machine with Privacy Preservation13
Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM13
Local Corner and Motion Key Point Trajectory Extraction for Facial Forgery Identification13
Enterprise Financial Risk Prediction and Prevention Based on Big Data Analysis13
Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production13
Mathematical Modeling and Multivariable Optimization Design of SUV Chassis Structure Based on SFE CONCEPT13
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum13
Towards Achieving Personal Privacy Protection and Data Security on Integrated E-Voting Model of Blockchain and Message Queue13
A Dynamic Density Peak Clustering Algorithm Based on K-Nearest Neighbor13
Intelligent Detection and Analysis of Wearable Devices in Wushu Training13
Group Relationship Mining of College Students Based on Predictive Social Network13
Fluid Dynamics and Numerical Simulation of Exhaled Droplets Containing Infectious Viruses13
Dance Movement Recognition Based on Modified GMM-Based Motion Target Detection Algorithm13
Optimization of English Classroom Quality Evaluation Model with AHP13
Construction of Competitive Advantage and Competitive Strategy Model of Sports Enterprises Based on Multicase Study and In-Depth Learning13
Quality Evaluation and Satisfaction Analysis of Online Learning of College Students Based on Artificial Intelligence13
Retracted: A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks12
Retracted: Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain12
Retracted: Optimization of Printing and Dyeing Energy Consumption Based on Multimedia Machine Learning Algorithm12
The Innovative Development of Russian Modern Oil Painting under the Background of Internet of Things and Artificial Intelligence12
Computer Graphic Image Design and Visual Communication Design in the Internet of Things Scenario12
TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments12
Component-Based Software Testing Method Based on Deep Adversarial Network12
Retracted: Research on Performance Optimization Method of UAV Communication Link in Emergency Communication Environment12
Retracted: 5G-Based Information Platform Design of Tourist Attractions in the Context of Mobile Big Data12
Retracted: Design of College Scheduling Algorithm Based on Improved Genetic Ant Colony Hybrid Optimization12
An Automated Data Desensitisation System Based on the Middle Platform12
Gesture Tracking and Recognition Algorithm for Dynamic Human Motion Using Multimodal Deep Learning12
CTRF: Ethereum-Based Ponzi Contract Identification12
An Intelligent Security Classification Model of Driver’s Driving Behavior Based on V2X in IoT Networks12
Retracted: Construction of Marine Professional Virtual Simulation Experiment Platform Based on Internet-of-Things Technology12
Retracted: Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model12
Retracted: Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts12
Retracted: Study and Application on Big Data Information Fusion System Based on IoT12
RNN Neural Network Model for Chinese-Korean Translation Learning12
Toward Identifying APT Malware through API System Calls12
Radio Network Forensic with mmWave Using the Dominant Path Algorithm12
Retracted: Trend Prediction Model of Asian Stock Market Volatility Dynamic Relationship Based on Machine Learning12
Retracted: An Intelligent Teaching Strategy of Cross-Cultural Business Communication Course Based on Big Data11
Anonymous Certificate-Based Inner Product Broadcast Encryption11
Network Penetration Intrusion Prediction Based on Attention Seq2seq Model11
Financial and Economic Sequence Forecasting Based on Time Slot Allocation Algorithm11
Toward Detecting Malware Based on Process-Aware Behaviors11
Retracted: Research on the Innovation of Ideological and Political Education in Universities Based on Artificial Intelligence Machine Learning in a Wireless Network Environment11
Retracted: Problems and Countermeasures of China’s International Trade in Agricultural Products under the Belt and Road Strategy Based on Big Data Analysis Technology in the Internet of Things Era11
Retracted: Research on Value Co-Creation New Business Model of Import Cross-Border E-Commerce Platform Ecosystem11
Retracted: Online Big Data Physical Education Classroom Based on Monitoring Network and Artificial Intelligence11
Attribute Set-Based Boolean Keyword Search over Encrypted Personal Health Records11
Efficient Hyperchaotic Image Encryption Algorithm Based on a Fast Key Generation Method and Simultaneous Permutation-Diffusion Structure11
A Practical Anonymous Voting Scheme Based on Blockchain for Internet of Energy11
Retracted: Psychological Consultation and Health Analysis Method for Artificial Intelligence Multidecision Support11
Retracted: Architectural and Landscape Garden Planning Integrated with Artificial Intelligence Parametric Analysis11
Retracted: Intelligent Intrusion Detection Method of Industrial Internet of Things Based on CNN-BiLSTM11
Retracted: Data File Security Strategy and Implementation Based on Fuzzy Control Algorithm11
Retracted: The Segmentation of Road Scenes Based on Improved ESPNet Model11
Attacker Traceability on Ethereum through Graph Analysis11
Verification Grid and Map Slipping Based Graphical Password against Shoulder-Surfing Attacks11
Feature Extraction Method Based on Sparse Autoencoder for Air Traffic Management System Security Situation Awareness11
Retracted: Text Mining of Movie Animation User Comments and Video Artwork Recommendation Based on Machine Learning11
Retracted: Enterprise Credit Security Prediction and Evaluation Based on Multimodel Fusion11
Retracted: Empirical Analysis of Enterprise Financial Management Risk Prediction in View of Associative Memory Neural Network11
Retracted: Models in the Construction of Accounting Informatization Transformation Based on Digital Twin10
Cross-Platform Binary Code Homology Analysis Based on GRU Graph Embedding10
Design of Network Intrusion Detection Model Based on TCA10
Telematics Collaborative Resource Allocation Algorithm Based on Cloud Sidecar10
FGL_Droid: An Efficient Android Malware Detection Method Based on Hybrid Analysis10
An Edge Cloud Data Integrity Protection Scheme Based on Blockchain10
Design of Teaching System of Physical Yoga Course in Colleges and Universities Based on Computer Network10
Analysis of English Performance Rating Based on Machine Learning and Optimized BP Network Technology10
Personalized Online Education Learning Strategies Based on Transfer Learning Emotion Classification Model10
Coarse-Grained Load Balancing with Traffic-Aware Marking in Data Center Networks10
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records Using Blockchain10
EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application10
A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server10
Major Challenges and Future Approaches in the Employment of Blockchain and Machine Learning Techniques in the Health and Medicine10
Cross-Border e-Commerce Business Model Based on Wireless Communication Network and Blockchain10
Material Analysis and Application Based on Intelligent Computing in the Context of Contemporary Watercolor Painting10
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System10
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs10
A Regulatable Data Privacy Protection Scheme for Energy Transactions Based on Consortium Blockchain10
Network Traffic Classification Based on SD Sampling and Hierarchical Ensemble Learning10
Android Malware Detection Technology Based on Lightweight Convolutional Neural Networks10
Resource Selection from Edge-Cloud for IIoT and Blockchain-Based Applications in Industry 4.0/5.010
Mining Cryptocurrency-Based Security Using Renewable Energy as Source10
Research on Mobile English Learning System Based on iOS10
Machine Learning-Enabled Development of Model for Japanese Film Industry10
Quality Evaluation of Ranunculaceae Essential Oil with the Artificial Neural Network10
Grouping-Based Reliable Privacy Preservation for Blockchain-Assisted Data Aggregation in Mobile Crowdsensing9
Performance Evaluation Model of Short-Term Mutual Funds Based on Return-Variance-Liquidity9
The Optimal Carrier-Secret Ratio for Wireless Covert Channels Based on Constellation Shaping Modulation9
Retracted: Research on Risk Assessment of Science and Technology Data in Network Finance Based on Portfolio Empowerment9
Retracted: Transfer Learning Auto-Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices9
Retracted: Description of Quantum Mechanics as a Branch of Mathematical Physics That Deals with the Emission and Absorption of Energy by Matter9
Retracted: Algorithm of 3D Virtual Reconstruction of Ancient Buildings in Qing Dynasty Based on Image Sequence9
Retracted: An English Mobile Learning Platform Embedded in GSM-R Wireless Network Communication9
Retracted: A Prediction Method for Evolution Effects of Software Architecture9
A Blockchain-Based Personal Health Record System for Emergency Situation9
PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios9
Retracted: Blockchain-Based Privacy Access Control Mechanism and Collaborative Analysis for Medical Images9
Retracted: Effect of Multimodal Teaching on Language Comprehensive Ability under the Background of Artificial Intelligence9
Retracted: Application of High-Resolution Face Recognition and EDF Image Reconstruction in English Classroom Teaching9
Retracted: Optimization and Application of Random Forest Algorithm for Applied Mathematics Specialty9
Retracted: Data Protection Software for Civil Aviation Control Flight Information System Based on FPE Algorithm9
Retracted: Analysis of Artistic Creation and Design Methods in Universities Based on Augmented Reality and 5G Communication Technology9
Research on Value Co-Creation New Business Model of Import Cross-Border E-Commerce Platform Ecosystem9
Selective Partial Update Adaptive Filtering Algorithms for Block-Sparse System Identification9
Retracted: English Teaching Evaluation Model Based on Association Rule Algorithm and Machine Learning9
Retracted: College English Online Teaching Model Based on Deep Learning9
Retracted: Distributed Network Image Processing System and Transmission Control Algorithm9
Retracted: Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence9
Retracted: TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments9
Retracted: Parallel Classification Algorithm Design of Human Resource Big Data Based on Spark Platform9
0.068028926849365