Transactions on Emerging Telecommunications Technologies

Papers
(The median citation count of Transactions on Emerging Telecommunications Technologies is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
96
94
80
Smart Homes of the Future67
Explainable Machine Learning Framework for Real‐Time Multi‐Attack Threat Detection in Edge‐Enabled VANET Environments65
Enabling transmission status detection in grant‐free power domain non‐orthogonal multiple access for massive Internet of Things64
PCNNBCMO: A Novel Deep Learning Espoused Task Scheduling Approach for Enhancing Energy Efficiency of Cloud Data Centers56
Efficient resource allocation for hybrid nonorthogonal multiple access based heterogeneous networks beyond fifth‐generation53
Intelligent reflecting surface empowered WPCN system over generalized κ−μ$$ \kappa -\mu $$ fading channels: Performance analysis and optimization50
Low‐complexity joint equalization and CFO compensation in uplink SC‐FDMA NOMA system under different power allocation strategies47
Channel reconfiguration for intelligent reflecting surface‐aided vehicular networks46
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons45
CSAT‐FRMET: An energy‐efficient hybrid FiWi network‐based 5G model44
Bayesian detection with feedback for cooperative spectrum sensing in cognitive UAV networks43
Reliable community card system for detecting and isolating selfish vehicles in smart and connected communities‐based VDTN's42
Energy Efficient LoRa‐Based AIoT Setup for Human Movement Classification40
Development of a Genetic Algorithm for Optimal Response Time Based on Full Scheduling Model of Electric Vehicle38
SSE_CIB: Secure storage and exchange of copyrighted images using blockchain32
An integrated AHP‐ELECTRE and deep reinforcement learning methods for handover performance optimization in an LTE‐A networks31
30
Cloud Computing With Image Processing Framework for Lung Cancer Diagnosis Using Improved Heuristic‐Aided Hybrid Residual Attention Network30
Issue Information29
RIS‐Driven Resource Allocation Strategies for Diverse Network Environments: A Comprehensive Review29
An Integrated Machine Learning Framework for Power Data Security and Misbehavior Detection in Next‐Generation VANETs28
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review27
Securing 5G ‐Enabled CPS and IoT With 27
Enhancing Smart Grid Security Using BLS Privacy Blockchain With Siamese Bi‐LSTM for Electricity Theft Detection26
Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook26
Artificial intelligence‐based blockchain solutions for intelligent healthcare: A comprehensive review on privacy preserving techniques24
Shannon meets Stackelberg on the cognitive interference channel part I: A deterministic view24
GCOA : An Effective Task Scheduling for Load Balancing in the Cloud Framework24
Particle swarm optimization of the spectral and energy efficiency of an SCMA‐based heterogeneous cellular network24
Signal points allocation for generalized enhanced spatial modulation22
User grouping and resource management in efficient NOMA‐OMA transmission scheme for infotainment message dissemination in VANETs22
Jitter‐sensitive data communication in emerging wireless networks21
Multi‐Criteria Bargaining Based Spectrum Sharing Scheme for 6G In‐X Subnetworks21
Energy‐efficient UOWC‐RF systems with SLIPT20
MS‐ADS: Multistage Spectrogram image‐based Anomaly Detection System for IoT security20
Threat Detection Framework for IoT Devices Using Adaptive Dilated Conv‐Gated Recurrent Units With Spatial and Temporal Attention‐Based Residual Autoencoder20
Correction to “Cloud‐Edge‐End Collaborative Dependent Computing Schedule Strategy for Immersive Media”20
Dynamic Weight Allocation–Based Network Security and Anomaly Detection Model for Intelligent VANETs19
Enhancing Intelligent Transportation Systems in Smart Cities Using VANETs With Deep Reinforcement Transfer Learning and Explainable AI19
Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly19
RETRACTION : Dynamic Flow Scheduling Optimization Based on Intelligent Control for Digital Twins19
Enhanced Elman spike neural network fostered blockchain framework espoused intrusion detection for securing Internet of Things network19
RETRACTION : Medical Data Quality Management Using Butterfly Optimization With Adaptive Threshold Sensitive Energy‐efficient Routing Protocol and Multidimensional Chaoti18
A Reinforcement Learning–Driven Payoff‐Adaptive Game‐Theoretic Framework for Secure and Reliable Operation of Mobile Ad Hoc Networks18
Implementation of Hybrid Wild Geese Migration‐Bird Swarm Algorithm‐Based Optimal Power Allocation Strategy for Spectral Efficiency Analysis in Massive MIMO System18
V2X Fusion Communication Framework Based on VANETS Collaborative Autonomous Driving18
Blockchain‐Enabled Modified Bi‐Directional Recurrent Neural Network for Intelligent Crop Recommendation18
Caviar Parrot Optimizer: A Quantum Key Distribution Approach to Secure Authentication and Data Storage17
Impact of endorsement policy on the performance of blockchain‐based VANET17
Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning16
Energy efficient federated learning in internet of vehicles: A game theoretic scheme16
Towards Secure and Efficient Data Aggregation in Blockchain‐Driven IoT Environments: A Comprehensive and Systematic Study16
HECC‐ABE: A novel blockchain‐based IoT healthcare data storage using hybrid cryptography schemes with key optimization by hybrid meta‐heuristic algorithm15
Secure transmission in smart grid dynamic wide area network by exploiting full‐duplex jamming scheme15
An improved low‐carbon intelligent agriculture system with energy optimization principles using wireless IoT environment15
IoT‐Enabled Blockchain Framework for Internet of Vehicles Safety Monitoring in Smart Cities15
Issue Information15
An IoT‐Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing15
Joint switch controlling and subvectors permutation for quadrature index modulation with hybrid constellations15
CaPTS scheduler: A context‐aware priority tuple scheduling for Fog computing paradigm14
An efficient and secure wearable sensor based remote healthcare monitoring system using adaptive dilated transformer Bi‐LSTM with gated recurrent unit14
A Blockchain Framework for Ensuring Medical Data Security in Internet of Medical Things14
An Intelligent Approach for Cloud Infrastructure With Improved Multi‐Objective Graywolf Optimization and Resource Allocation for Dynamic Virtual Machine Placement14
Secure Detection Model Using Black Widow Optimized Features with Bidirectional Learning in Cloud and Fog Network14
Design and Analysis of Sierpinski Fractal Antennas for Millimeter‐Wave 5G and Ground‐Based Radio Navigation Applications14
Double Deep Reinforcement Learning for Optimization of Underwater Acoustic Sensor Network Energy Consumption and Congestion Control14
Quantum Safe Proxy Blind Signature Protocol Based on 3D Entangled GHZ‐Type States14
Energy‐efficient load balancing for divisible tasks on heterogeneous clusters14
An Enhanced IOMT and Blockchain‐Based Heart Disease Monitoring System Using BS‐THA and OA‐CNN14
Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach14
Heuristic Path‐Planning Techniques in Indoor Complex Three Dimensional Environment for Unmanned Aerial Vehicles13
Design and experimental analysis of fractal antennae with ground‐defected structure for expected 6G and 5G mm‐wave communication and wireless applications13
13
IntelliMetro‐Hybrid: A Machine Learning and Deep Learning Fusion Model for Economic Optimization in Smart Metro Systems13
Data‐Aggregation‐Aware Energy‐Efficient in Wireless Sensor Networks Using Multi‐Stream General Adversarial Network13
A Review: Application and Impact of Blockchain Technology on the Library13
DSecNet : An Enhanced Cyber Security System for Authentication, Intrusion Detection, and Risk Level Prediction in Information Systems Using Weighted 13
Machine Learning‐Driven Intrusion Detection Systems for Anomaly Detection in Vehicular Ad‐Hoc Networks13
A Lightweight Certificateless Public Encryption With Multi‐Keyword Search in IIoT13
PEFCAPD: A Privacy Enhanced Federated Cyber Physical and Attack Detection Framework for Edge‐Cloud‐Blockchain Enabled Smart Healthcare Environment13
Explainable artificial intelligence for feature selection in network traffic classification: A comparative study13
RIS ‐Aided mmWave MIMO Channel Estimation Using Rotation‐Invariant Coordinate Convolutional Neural Network and Compres12
Robotic Cloud Automation‐Enabled Attack Detection and Secure Robotic Command Verification Using LADA‐C‐RNN and S‐Fuzzy12
Algorithms and throughput analysis of cognitive radio‐based MIMO‐NOMA for the next generation of wireless communications12
Mapping the Landscape of Abusive Content Detection in Social Networks: A Comprehensive and Scientometric Analysis12
Textual emotion analysis using improved metaheuristics with deep learning model for intelligent systems12
Content‐Aware Routing Algorithms in WSN for Energy‐Efficient Content Delivery Through Clustering With Hybridized Optimization Aided Shortest Path Selection11
An artificial immune system‐based algorithm for selfish node detection in Mobile Ad Hoc Networks (MANETs)11
Physical layer security‐oriented energy‐efficient resource allocation and trajectory design for UAV jammer over 5G millimeter wave cognitive relay system11
A Multiscale Principal Component Analysis Approach to Physical Layer Secret Key Generation in Indoor Environments11
Issue Information11
Optimization of High‐Definition Music Streaming VANET Broadcast Protocol for QoS11
The improvement of wavefront cellular learning automata for task scheduling in fog computing11
Multi‐channel attack detection based on lightweight message authentication code access control using Internet of Things design11
Research on Three‐Dimensional Autonomous Obstacle Avoidance Path Planning Methods for UAVs11
Green Computation Offloading With DRL in Multi‐Access Edge Computing11
Bayesian quickest detection‐based spectrum sensing for cognitive UAV networks11
Hybrid Optimization for IRS‐Aided Secure Communication: A Gradient Projection and Dynamic Security Framework11
Attentive Dual Residual Generative Adversarial Network for Energy‐Aware Routing Through Golden Search Optimization Algorithm in Wireless Sensor Network Utilizing Cluster Head Selection11
Adaptive Feature Selection for Anomaly Detection in Vehicular Networks Using the Recruitment‐Based Optimization Algorithm11
Effective Performance Analysis of DCT OFDMIM Using Deep Learning Detector Under Different Fadin11
A Two‐Stage Intrusion Detection Ensemble Model for Airborne Networks10
Discrete practical RF energy harvesting models for wireless communication networks10
Harnessing idle edge resources for execution of cloud services: A comprehensive review10
Performance analysis and comparison of approximate detectors with linear detectors in massive MIMO systems under imperfect channel state information10
Enhanced authentication and device integrity protection for GDOI using blockchain10
Performance evaluation of cooperative‐nonorthogonal multiple access‐based improved hybrid simultaneous wireless information and power transfer protocol10
Issue Information10
SKALP: Secure key agreement and lightweight protocol for dew‐assisted IoT enabled edge computing10
10
RETRACTION : A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications10
Security analysis of fog computing environment for ensuring the security and privacy of information10
Smart contract assisted blockchain based public key infrastructure system10
Optimizing UAV computation offloading via MEC with deep deterministic policy gradient10
Integrating CLDs and machine learning through hybridization for human‐centric wireless networks10
Innovative Video Anomaly Detection: TCNAnoDetect With Self‐Supervised Feature Learning10
Joint user and throughput maximization in re‐configurable intelligent surface assisted beyond 5G/6G networks10
Leveraging Distributed Intelligence for Low‐Latency Decision‐Making in Cyber‐Physical Systems9
9
9
Cloud migration framework clustering method for social decision support in modernizing the legacy system9
Energy‐efficient power control and altitude planning for UAV‐based vehicular communications in 5G NR‐V2X networks9
9
Outage probability and throughput of cooperative non‐orthogonal multiple access with moving relay in heterogeneous network9
A ferry mobility based direction and time‐aware greedy delay‐tolerant routing (FM‐DT‐GDR) protocol for sparse flying ad‐hoc network9
Enhanced Signal Processing in IoT‐Enabled Wireless Sensor Networks and VANETs Using the Butterfly Optimization Algorithm and K‐Means++ Clustering9
9
Reconfigurable intelligent surface assisted downlink INOMA system8
An efficient fine‐grained searchable encryption for secure communication in IoT‐based vehicular social networks8
Hybrid Quantum Teaching With Adaptive Group Termite Alate Optimization Based Optimal Mixed Block Withholding Attacks8
Blockchain With Hierarchical Auto‐Associative Polynomial Convolutional Neural Network Fostered Cryptography for Securing Image8
Lightweight Multi‐Hop Clustering With Cross‐Layer Intelligence for VANET Malicious Behavior Detection8
Modeling of Multi Hermite‐Gaussian MDM Based Passive Star ITU G.989.x Standardardized PON System8
Anomaly Detection of VANET Vehicle Communication Channel Driven by Artificial Intelligence8
A Concise Survey on Modern Web‐Based Phishing Techniques and Advanced Mitigation Strategies8
ONOS Flood Defender: An Intelligent Approach to Mitigate DDoS Attack in SDN8
AIIAD : An Artificial Intelligence Driven Framework for Real‐Time Anomaly Detection in VAN8
A privacy‐sensitive data identification model in online social networks8
8
Blockchain‐based Human Intelligent Systems for Smart City Safety7
A Probabilistic Routing Algorithm Based on CNN and Q‐Learning for Vehicular Edge Network7
RETRACTION : Wireless Communication Channel Modeling Using Machine Learning7
Energy‐efficient routing in low power and lossy networks with concurrent overlapping RPL instances7
Bringing life out of diversity: Boosting network lifetime using multi‐PHY routing in RPL7
A unified service‐based capability exposure framework for closed‐loop network automation7
Issue Information7
Optimizing resources allocation in a heterogeneous cloud radio access network using machine learning7
Designing green IoT communication by adaptive spotted hyena tunicate swarm optimization‐based cluster head selection7
7
Dolphin echolocation optimized sailfish algorithm for energy efficient and secured routing based on trust management in ZigBee wireless sensor network7
Comparative analysis of cloud resources forecasting using deep learning techniques based on VM workload traces7
Latency‐Sensitive Service Function Chains Intelligent Migration in Satellite Communication Driven by Deep Reinforcement Learning7
An Intelligent Diagnosis Method for Metro Vehicle Wheelset Out‐of‐Roundness Based on Feature Mode Decomposition Combined With Deep Learning7
RAKSHAM: Responsive approach to Knock‐off scavenging hackers and attack mitigation7
HTTP header based phishing attack detection using machine learning7
A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird based CNN7
A deep and systematic review of the intrusion detection systems in the fog environment7
A Novel Multi‐Objective Task Scheduling Using Hybrid Drawer‐Mother Optimization Algorithm in Cloud Computing7
A Novel Adaptive Extreme Learning Machine for Traffic Prediction and Multipath Routing Framework in Software Defined Networks With Hybrid Optimization Approach for Smart Hotel Applications7
A multiple‐input, multiple‐output broadcasting system with space, time, polarization, and labeling diversity7
SDHOKGNN: An Effective Knowledge‐Enhanced Optimal Graph Neural Network Approach for Fraudulent Call Detection7
Multi‐dimensional resource management with deep deterministic policy gradient for digital twin‐enabled Industrial Internet of Things in 6 generation7
Issue Information7
Issue Information7
Lightbioptimum: An Intrusion Detection System Based on Bio‐Inspired Algorithm for VANET7
A Deep Reinforcement Learning‐Based Physical Layer Security Enhancement Design for RIS‐Aided mmWave Communications With Practical Constraints7
Image transmission performance analysis through free space optical communication link using coherent QPSK modulation under various environmental conditions6
A chaos opposition‐based dwarf mongoose approach for workflow scheduling in cloud6
Crossover Boosted Grey Wolf Optimizer‐based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs6
A robust‐link controller placement model for large‐scale software defined networks6
Metaverse: Trend, emerging themes, and future directions6
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies6
A Novel Object Detection Model Using Gazelle White Shark Optimization With Enhanced FRCNN6
6
Flight Evolution: Decoding Autonomous UAV Navigation—Fundamentals, Taxonomy, and Challenges6
Leveraging big data analytics in 5G‐enabled IoT and industrial IoT for the development of sustainable smart cities6
A novel game theory based reliable proof‐of‐stake consensus mechanism for blockchain6
AI ‐Driven Traffic Flow Prediction and Anomaly Detection in Smart Cities: A Multi‐Agent Approach6
Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review6
Security threats and measures in the Internet of Things for smart city infrastructure: A state of art6
Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology6
6
RETRACTION : Internet of Things Security Framework Based on Near Field Communication With Otway Rees Protocol6
Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain‐Based Intrusion Detection System for Smart Cities6
An Intelligent Routing for Internet of Things Mesh Networks6
An anonymous and efficient certificateless signature scheme based on blockchain in NDN‐IoT environments6
Issue Information6
Issue Information6
Secure Communication Using Steganography and Improved Blowfish Cryptographic Methods6
Issue Information6
Review of intrusion detection system in cyber‐physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges6
A profiled side‐channel attack detection using deep learning model with capsule auto‐encoder network6
Trust‐aware task load balancing in multi‐access edge computing based on blockchain and a zero trust security capability framework6
Channel Estimation Based Intelligent Reflecting Surfaces for Massive MIMO System Considering Spatially Correlated Channels6
5G network slicing with unmanned aerial vehicles: Taxonomy, survey, and future directions6
A Nature‐Inspired Multi‐Objective Green Routing Protocol for Iot‐Enabled SDWSNs6
Index Code Design for Index Coded‐NOMA Transmission in VANETs6
Simultaneous Vortex‐ and Non‐Vortex‐Based Transmission6
Secure Content Protection and Verification Framework for Digital Images Communication6
Development of hybrid heuristic‐assisted dynamic data auditing strategy in cloud sector6
DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery6
Hybrid Secure Onlooker: Enabling End‐to‐End Security for Cloud Data Center by Hybrid VM Segmentation6
BER analysis of tightly packed planar RIS system using the level of spatial correlation and discrete phase shifter5
Federated Transfer Active Learning With Quantized Neural Cryptography for Healthcare5
An intelligent human‐centric systems to diagnose breast cancer using machine learning and optimized feature selection techniques5
Task Offloading and Resource Allocation Using the Echo Tracking Optimization Enabled QoS ‐Aware Scheduling for MEC 5
5
5
An efficient IoMT based health monitoring using complex valued deep CNN and political optimizer5
Energy Efficiency Optimization in Vehicle Communication Network Using Hybrid‐Genetic Algorithm5
A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain5
Phase center motion based time modulated arrays with preprocessed time schemes for selective harmonic beamforming in B5G communication systems5
Correction to A Secure and Decentralized Authentication and Data Transmission in Internet of Vehicles Using Blockchain and Ring‐Based Cryptosystem5
A probably secure biometric‐based authentication and key agreement scheme for Internet of Drones5
Hyper contour cryptography with master Birch‐Brown Paruvala‐SLSTM model for enhanced healthcare security5
Issue Information5
A novel Hypertuned Prophet based power saving approach for IoT enabled smart homes5
Blockchain‐Based Trust Federated Learning Framework for Iov Security5
Near‐Field Beamforming for Terahertz Communications With NLG and Massive MIMO5
TVSR‐OR: Tile‐based 360‐degree video streaming over real time streaming protocol with optimized read5
Designing and planning of energy efficient sustainable cities and societies: A smart energy5
5
Performance analysis of subspace‐based spatio‐temporal spectral estimator5
Blockchain‐Enhanced Hierarchical Federated Learning for Efficient and Scalable Communication in the Internet of Vehicles5
Development of hyper‐parameter‐tuned‐recurrent neural network for detection and mitigation of fraudulent resource consumption attack in cloud5
Innovative Design of Gingham Pattern Patch Antenna Integrated With Kagome Lattice Photonic Crystal Structure for Terahertz Applications5
5
Cooperation and energy harvesting based spectrum sensing schemes for green cognitive radio networks5
Hybrid Pelican and Archimedes optimization algorithm fostered energy aware task scheduling in heterogeneous virtualized cloud computing5
Deep SCMA receiver: A low‐complexity joint decoder and channel estimator for SCMA over time‐varying channels using RNNs5
HIC: A high‐reliable in‐band control network for perception layer of software‐defined IoT5
Triple‐band circularly polarized conformal antenna for vehicular communication applications5
A Hybrid PSOGA Optimization Method for Relay Node Placement and Connection Point Detection in IoT Applications5
RCVMASS‐CICSKAPAPT‐VDF: VLSI design of high‐speed reconfigurable compressed Vedic PAPT‐VDF filter for ECG medical application4
Correction to “Lattice Homomorphic Assisted Privacy Preserving Electronic Health Records Data Transmission in Internet of Medical Things Using Blockchain”4
Cryptanalysis and improvement of an authentication protocol for wireless sensor networks4
A Decentralized Secure Blockchain Model and Lightweight Cryptosystem for Enhancing the EHR Data Security4
A Systematic Blockchain‐Based Proficient, Secure, and Energetic Privacy‐Preserving Protocol for Effective Authentication in Internet of Vehicles Networks Using the El‐Gamal Encryption With Optimal Key4
Enhancing Wireless System Secrecy Capacity Through NOMA Scheme and Multiple UAV‐Mounted IRSs Amidst Colluding and Non‐Colluding Eavesdroppers4
Multiuser Covert Terahertz Communication With Outdated CSI and Data Exception4
Secrecy Rate Optimization for Multi‐User Secure Communication Assisted by Intelligent Reflecting Surfaces (IRS) Under Imperfect CSI Conditions4
Real‐Time Anomaly Detection in Smart Vehicle‐To‐UAV Networks for Disaster Management4
Hardware softwareSoCco‐design analysis and implementation ofMIMOOFDMfor4G/5G/6G eNodeBapplications4
Optimized deep learning based hypernet convolution neural network and long short term memory for joint pilot design and channel estimation in MIMO‐OFDM model4
Misbehavior Detection With Collective Perception in V2X Networks: A Survey4
DRL‐Based Computation‐Efficient Offloading and Power Control for UAV‐Assisted MEC Networks4
MDCD: A malware detection approach in cloud using deep learning4
0.23340511322021