Transactions on Emerging Telecommunications Technologies

Papers
(The median citation count of Transactions on Emerging Telecommunications Technologies is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
6G: A comprehensive survey on technologies, applications, challenges, and research problems99
Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications86
Blockchain for decentralized multi‐drone to combat COVID‐19 and future pandemics: Framework and proposed solutions78
Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm72
Lightweight branched blockchain security framework for Internet of Vehicles69
A systematic survey on internet of things: Energy efficiency and interoperability perspective62
Machine learning for next‐generation intelligent transportation systems: A survey54
A comprehensive review on blockchain and Internet of Things in healthcare54
Artificial intelligence‐powered decentralized framework for Internet of Things in Healthcare 4.050
Blockchain and artificial intelligence for 5G‐enabled Internet of Things: Challenges, opportunities, and solutions49
Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions49
Mobile‐fog‐cloud assisted deep reinforcement learning and blockchain‐enable IoMT system for healthcare workflows45
Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing44
Blockchain and artificial intelligence enabled privacy‐preserving medical data transmission in Internet of Things44
Toward 6G: Understanding network requirements and key performance indicators43
From statistical‐ to machine learning‐based network traffic prediction42
Artificial intelligence and blockchain: A review41
Blockchain technology for energy‐aware mobile crowd sensing approaches in Internet of Things40
The role of unmanned aerial vehicles and mmWave in 5G: Recent advances and challenges39
Spectrum sensing in cognitive radio: A deep learning based model39
Machine learning for cooperative spectrum sensing and sharing: A survey37
Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology36
An intrusion detection system using optimized deep neural network architecture35
Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things34
Congestion centric multi‐objective reptile search algorithm‐based clustering and routing in cognitive radio sensor network34
CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things applications33
Deep learning support for intelligent transportation systems32
Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments30
Security challenges of Internet of Underwater Things: A systematic literature review29
Security threats and measures in the Internet of Things for smart city infrastructure: A state of art29
DBTP2SF: A deep blockchain‐based trustworthy privacy‐preserving secured framework in industrial internet of things systems29
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets28
A survey on the blockchain techniques for the Internet of Vehicles security27
Advanced security model for multimedia data sharing in Internet of Things27
Blockchain‐based asset storage and service mechanism to metaverse universe: Metarepo26
KRanTi: Blockchain‐based farmer's credit scheme for agriculture‐food supply chain25
On The Selection of Power Allocation Strategy in Power Domain Non‐Orthogonal Multiple Access (PD‐NOMA) for 6G and Beyond25
Adaptive cluster‐based heuristic approach in cognitive radio networks for5Gapplications25
Trusted authority based session key agreement and authentication algorithm for smart grid networks25
Public key encryption with equality test for Industrial Internet of Things system in cloud computing24
Recent advances in multimedia security and information hiding23
A trusted distributed routing scheme for wireless sensor networks using blockchain and meta‐heuristics‐based deep learning technique23
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network23
An inverted L‐strip loaded ground with hollow semi‐hexagonal four‐element polarization diversity UWB‐MIMO antenna22
Performance analysis of long‐reach 40/40 Gbps mode division multiplexing‐based hybrid time and wavelength division multiplexing passive optical network/free‐space22
A comprehensive survey on secure software‐defined network for the Internet of Things22
Machine learning for mobile network payment security evaluation system22
Software‐defined networking in vehicular networks: A survey22
BCALS: Blockchain‐based secure log management system for cloud computing20
SDN and application layer DDoS attacks detection in IoT devices by attention‐based Bi‐LSTM‐CNN20
Climate‐smart agriculture using intelligent techniques, blockchain and Internet of Things: Concepts, challenges, and opportunities20
I‐FBECS: Improved fuzzy based energy efficient clustering using biogeography based optimization in wireless sensor network20
Energy efficient routing in IOT based UWSN using bald eagle search algorithm19
Energy efficient resource allocation for uplink hybrid power domain sparse code nonorthogonal multiple access heterogeneous networks with statistical channel estimation19
Leveraging big data analytics in 5G‐enabled IoT and industrial IoT for the development of sustainable smart cities19
Block chain fostered cycle‐consistent generative adversarial network framework espoused intrusion detection for protecting IoT network19
Communication systems of high‐speed railway: A survey19
Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains19
Federated learning and next generation wireless communications: A survey on bidirectional relationship18
Lightweight and efficient privacy‐preserving mutual authentication scheme to secure Internet of Things‐based smart healthcare18
Ultra‐reliability and low‐latency communications on the internet of things based on5Gnetwork: Literature review, classification, and future research view18
Game theory based hybrid localization technique for underwater wireless sensor networks18
Unknown network attack detection based on open‐set recognition and active learning in drone network17
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT17
A fully distributed energy‐aware multi‐level clustering and routing for WSN‐based IoT17
Placement of edge server based on task overhead in mobile edge computing environment17
An improved optimal energy aware data availability approach for secure clustering and routing in wireless sensor networks16
A review and analysis of secure and lightweightECC‐basedRFIDauthentication protocol for Internet of Vehicles16
A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges16
Efficiency enhancement techniques of microwave and millimeter‐wave antennas for 5G communication: A survey16
Security enhancement technologies for smart contracts in the blockchain: A survey15
SecureDeepNet‐IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems15
A systematic review of task scheduling approaches in fog computing15
Design of an energy‐efficient IoT device with optimized data management in sports person health monitoring application15
Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction14
Securing AI‐based healthcare systems using blockchain technology: A state‐of‐the‐art systematic literature review and future research directions14
Security challenges of blockchain in Internet of things: Systematic literature review14
Resource optimization in UAV‐assisted wireless networks—A comprehensive survey14
Unmanned aerial vehicle‐enabled layered architecture based solution for disaster management14
An optimized hybrid methodology for short‐term traffic forecasting in telecommunication networks13
Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things13
Autonomous underwater vehicles support for enhanced performance in the Internet of underwater things13
Hybrid dingo and whale optimization algorithm‐based optimal load balancing for cloud computing environment13
ONOS Flood Defender: An Intelligent Approach to Mitigate DDoS Attack in SDN13
A performance‐aware routing mechanism for flying ad hoc networks13
Intrusion detection: A model based on the improved vision transformer13
Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud13
Role‐based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment13
SO‐VMEC: Service offloading in virtual mobile edge computing using deep reinforcement learning13
Power control scheme for device‐to‐device communication using uplink channel in 5G mm‐Wave network13
A new optimization technique to solve the latency aware controller placement problem in software defined networks12
Framework for determining the suitability of blockchain: Criteria and issues to consider12
Channel estimation for reconfigurable intelligent surface‐assisted multiuser mmWave MIMO system in the presence of array blockage12
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach12
A deep and systematic review of the intrusion detection systems in the fog environment12
A comprehensive study of different objectives and solutions of controller placement problem in software‐defined networks12
An evolutionary computation‐based privacy‐preserving data mining model under a multithreshold constraint12
 LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios12
Selection of relays based on the classification of mobility‐type and localized network metrics in the Internet of Vehicles12
A lightweight data transmission reduction method based on a dual prediction technique for sensor networks12
Enabling machine learning‐based side‐chaining for improving QoS in blockchain‐powered IoT networks12
Developing an attack detection framework for wireless sensor network‐based healthcare applications using hybrid convolutional neural network11
5G network slicing with unmanned aerial vehicles: Taxonomy, survey, and future directions11
A survey on green unmanned aerial vehicles‐based fog computing: Challenges and future perspective11
Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN‐RFOA11
On channel estimation and spectral efficiency for cell‐free massive MIMO with multi‐antenna access points considering spatially correlated channels11
Improving routing disruption attack detection in MANETs using efficient trust establishment11
An improved underwater wireless sensor network communication using Internet of Things and signal to noise ratio analysis11
Auction based cost‐efficient resource allocation by utilizing blockchain in fog computing11
BER performance of MIMO based NOMA‐VLC system with imperfect SIC11
A levy flight based strategy to improve the exploitation capability of arithmetic optimization algorithm for engineering global optimization problems11
Privacy‐preserving multilevel obfuscation scheme for vehicular network11
Blockchain and extreme learning machine based spectrum management in cognitive radio networks10
Signal to interference plus noise ratio improvement of a multi‐cell indoor visible light communication system through optimal parameter selection complying lighting constraints10
Towards faster big data analytics for anti‐jamming applications in vehicular ad‐hoc network10
Intelligent software defined networking: Long short term memory‐graded rated unit enabled block‐attack model to tackle distributed denial of service attacks10
Design and investigation of hybrid PON‐FSO system employing modified NZCC code under distinct weather conditions10
A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird based CNN10
Performance analysis for IRS‐aided communication systems with composite fading/shadowing direct link and discrete phase shifts10
TamForen: A tamper‐proof cloud forensic framework10
An intelligent collaborative inference approach of service partitioning and task offloading for deep learning based service in mobile edge computing networks10
Defending co‐resident attack using reputation‐based virtual machine deployment policy in cloud computing10
An efficient approach to detect  distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparam10
Power‐domain non‐orthogonal multiple access based full‐duplex one‐way wireless relaying network10
A certificateless keyword searchable encryption scheme in multi‐user setting for fog‐enhanced Industrial Internet of Things9
Learning‐based deep neural network inference task offloading in multi‐device and multi‐server collaborative edge computing9
Optimized intellectual resource scheduling using deep reinforcement Q‐learning in cloud computing9
Distributed pricing‐based resource allocation for dense device‐to‐device communications in beyond 5G networks9
UF‐GPSR: Modified geographical routing protocol for flying ad‐hoc networks9
Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks9
An intelligent content caching protocol for connected vehicles9
Modified African buffalo and group teaching optimization algorithm‐based clustering scheme for sustaining energy stability and network lifetime in wireless sensor networks9
An efficient modulation classification method using signal constellation diagrams with convolutional neural networks, Gabor filtering, and thresholding9
A fog‐based fault‐tolerant and QoE‐aware service composition in smart cities9
Efficient deployment of multi‐UAV assisted mobile edge computing: A cost and energy perspective9
An overview of LTE/LTE‐A heterogeneous networks for 5G and beyond9
MDCD: A malware detection approach in cloud using deep learning9
MetaInfoChain: Bi‐layered blockchain consensus for metadata aggregation inIoTand cloud environments9
A hybrid deep learning model based low‐rate DoS attack detection method for software defined network9
A Blockchain‐based Framework for Privacy Preservation of Electronic Health Records (EHRs)9
Overview of evolutionary algorithms and neural networks for modern mobile communication8
Detecting attacks on IoT devices with probabilistic Bayesian neural networks and hunger games search optimization approaches8
Statistical QoS guarantees of a device‐to‐device link assisted by a full‐duplex relay8
Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach8
MobiScan: An enhanced invisible screen‐camera communication system for IoT applications8
Amalgamation of blockchain and sixth‐generation‐envisioned responsive edge orchestration in future cellular vehicle‐to‐anything ecosystems: Opportunities and challenges8
Blockchain‐enabled secure communication mechanism for IoT‐driven personal health records8
A security‐driven network architecture for routing in industrial Internet of Things8
Reinforcement optimization for decentralized service placement policy in IoT‐centric fog environment8
Memory optimization at Edge for Distributed Convolution Neural Network8
Design consideration and recent developments in flexible, transparent and wearable antenna technology: A review8
Blockchain mechanism with Byzantine fault tolerance consensus for Internet of Drones services8
COSCO2: AI‐augmented evolutionary algorithm based workload prediction framework for sustainable cloud data centers8
Efficient and anonymous multi‐message and multi‐receiver electronic health records sharing scheme without secure channel based on blockchain8
A quantitative cross‐comparison of container networking technologies for virtualized service infrastructures in local computing environments8
Cloud healthcare services: A comprehensive and systematic literature review7
LWEDM: Learning with error based secure mobile digital rights management system7
Adaptive modem and interference suppression based on deep learning7
Robust and efficient cooperative spectrum sensing against probabilistic hard Byzantine attack7
Performance analysis of non‐orthogonal multiple access assisted cooperative relay system with channel estimation errors and imperfect successive interference cancellation7
Blockchain enabled joint trust (MF‐WWO‐WO) algorithm for clustered‐based energy efficient routing protocol in wireless sensor network7
Hybrid‐360: An adaptive bitrate algorithm for tile‐based 360 video streaming7
Low‐complexity receivers for massive MIMO‐GFDM communications7
DEIT: Dempster Shafer Theory‐based edge‐centric Internet of Things‐specific trust model7
A relationship matrix resolving model for identifying vital nodes based on community in opportunistic social networks7
A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication7
Enhanced Elman spike neural network for cluster head based energy aware routing in WSN7
Markov‐based analysis for cooperative HARQ‐aided NOMA transmission scheme in 5G and beyond7
Automatic modulation classification with 2D transforms and convolutional neural network7
A comprehensive survey onQoSfor video transmission in heterogeneous mobile ad hoc network7
Brakerski‐Gentry‐Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted Internet of Things services using glow‐worm swarm optimization6
Decentralized prediction and reputation approach in vehicular networks6
A unified service‐based capability exposure framework for closed‐loop network automation6
Post quantum secure conditional privacy preserving authentication for edge based vehicular communication6
Enhanced characterization and modeling of A‐MPDU aggregation for IEEE 802.11n WLANs6
Joint relay and channel selection in relay‐aided anti‐jamming system: A reinforcement learning approach6
Multi‐objective metaheuristic optimization‐based clustering with network slicing technique forInternet of Things‐enabled wireless sensor networks in5Gsystems6
An accurate attack detection framework based on exponential polynomial kernel‐centered deep neural networks in the wireless sensor network6
Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up‐to‐date survey from 2017 to 20226
Resource allocation for cellular device‐to‐device‐aided vehicle‐to‐everything networks with partial channel state information6
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities6
Privacy‐preserving authentication scheme for digital twin‐enabled autonomous vehicle environments6
Autonomic cloud computing based management and security solutions: State‐of‐the‐art, challenges, and opportunities6
Bipolar fuzzy information‐based PROMETHEE‐based outranking scheme for mitigating vampire attack in wireless sensor networks6
Smart contract assisted blockchain based public key infrastructure system6
A novel decentralized cross‐domain identity authentication protocol based on blockchain6
An efficient multicriteria‐based vertical handover decision‐making algorithm for heterogeneous networks6
Similarity‐based clustering and data aggregation with independent component analysis in wireless sensor networks6
A systematic review on resource provisioning in fog computing6
Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach6
Re‐ranking with multiple objective optimization in recommender system6
Antenna selection in nonorthogonal multiple access multiple‐input multiple‐output systems aided by machine learning6
A wide band log periodic millimeter‐wave antenna for 5G femtocells applications6
Joint resource allocation and power allocation scheme forMIMOassistedNOMAsystem6
Request delay and survivability optimization for software defined‐wide area networking (SD‐WAN) using multi‐agent deep reinforcement learning6
Quick cooperative spectrum sensing in cognitive unmanned aerial vehicles networks6
Blockchain privacy‐preserving smart contract centric multiplemultipartykey agreement over largeWANETs6
A privacy‐preserving mechanism for social mobile crowdsensing using game theory6
Optimizing resources allocation in a heterogeneous cloud radio access network using machine learning5
Quality of service‐aware adaptive radio resource management based on deep federated Q‐learning for multi‐access edge computing in beyond 5G cloud‐radio access network5
An efficient interference mitigation approach for NavIC receivers using improved variational mode decomposition and wavelet packet decomposition5
CaPTS scheduler: A context‐aware priority tuple scheduling for Fog computing paradigm5
Confinement forest‐based enhanced min‐min and max‐min technique for secure multicloud task scheduling5
TVSR‐OR: Tile‐based 360‐degree video streaming over real time streaming protocol with optimized read5
Energy efficiency analysis of narrowband Internet of Things with auxiliary active cycles for small data transmission5
Resource allocation for joint energy and spectral efficiency in cloud radio access network based on deep reinforcement learning5
Collaborative Transmitters Management for Multi‐user Indoor VLC Systems5
Trust‐oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks5
A novel game theory based reliable proof‐of‐stake consensus mechanism for blockchain5
Timing estimation of multiple hyperbolic frequency‐modulated signals based on multicarrier underwater acoustic communication5
A ferry mobility based direction and time‐aware greedy delay‐tolerant routing (FM‐DT‐GDR) protocol for sparse flying ad‐hoc network5
Double generalized spatial modulation5
Network security situation prediction based on combining associated entropy and deep recurrent neural network5
Data‐driven approach to design energy‐efficient joint precoders at source and relay using deep learning in MIMO‐CRNs5
Prediction of protein‐protein interactions using stacked auto‐encoder5
An optimized hybrid deep neural network architecture for intrusion detection in real‐time IoT networks5
An effective spectrum sensing in cognitive radio networks using improved convolution neural network by glow worm swarm algorithm5
Visible light communication performance using MIMO‐ADO‐OFDM system5
Outage probability minimization based power control and channel allocation in underlay D2D‐NOMA for IoT networks5
DEEDSP: Deadline‐aware and energy‐efficient dynamic service placement in integrated Internet of Things and fog computing environments5
Enabling transmission status detection in grant‐free power domain non‐orthogonal multiple access for massive Internet of Things5
An effective data routing for dynamic area coverage using multidrone network5
Dynamic placement of virtual machines using an improved multi‐objective teaching‐learning based optimization algorithm in cloud5
A survey of new orientations in the field of vehicular cybersecurity, applying artificial intelligence based methods5
H3CSA: A makespan aware task scheduling technique for cloud environments5
Value‐aware cache replacement in edge networks for Internet of Things5
Interference mitigation in multiuserWDM VLCsystems using differential receiver5
Performance limits of wireless powered cooperative NOMA over generalized fading5
Entropy‐based complex proportional assessment for efficient task scheduling in fog computing5
Artificial intelligence‐based blockchain solutions for intelligent healthcare: A comprehensive review on privacy preserving techniques5
Secure authentication and session key management scheme for Internet of Vehicles5
Estimation of Rayleigh flat channel coefficients using deep learning5
Massive capacity of novel three‐dimensional OCDMA‐FSO system for next generation of high‐data wireless networks4
Low complexity multichannel spectrum prediction algorithm based on optimized neural network for spectrum allocation in cognitive radio internet of things4
A multi‐controller placement method for software defined network based on improved firefly algorithm4
Mathematical framework for 5G‐UAV relay4
Enhancing physical layer security via a UAV friendly jammer for NOMA‐based IoT systems with imperfect CSI4
An integrated AHP‐ELECTRE and deep reinforcement learning methods for handover performance optimization in an LTE‐A networks4
GreenCloudNet++: Simulation framework for energy efficient and secure, green job scheduling in geographically distributed data centers4
An efficient IoMT based health monitoring using complex valued deep CNN and political optimizer4
Performance analysis of non‐orthogonal multiple access assisted cooperative maritime communication system over two‐wave with diffuse power fading4
Validation of VANET message dissemination algorithms otherwise vulnerable to broadcast storms in urban contexts4
A novel safety message dissemination framework in LTE‐V2X system4
A new method of hybrid optimization of small cell range development and density for energy efficient ultra‐dense networks4
Field trial with tactical bubbles for mission critical communications4
CFO and STO estimation and correction in multicarrier communications using linear filter bank multicarrier4
A chaos opposition‐based dwarf mongoose approach for workflow scheduling in cloud4
Fault tolerance aware workload resource management technique for real‐time workload in heterogeneous computing environment4
Hybrid Fuzzy Archimedes‐based Light GBM‐XGBoost model for distributed task scheduling in mobile edge computing4
Efficient solid waste inspection through drone‐based aerial imagery and TinyML vision model4
0.16318678855896