Transactions on Emerging Telecommunications Technologies

Papers
(The TQCC of Transactions on Emerging Telecommunications Technologies is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Low‐complexity joint equalization and CFO compensation in uplink SC‐FDMA NOMA system under different power allocation strategies77
CSAT‐FRMET: An energy‐efficient hybrid FiWi network‐based 5G model76
Feature reduction scheme for anomaly‐based intrusion detection in wireless networks: Building of hybrid model74
SSE_CIB: Secure storage and exchange of copyrighted images using blockchain62
62
An integrated AHP‐ELECTRE and deep reinforcement learning methods for handover performance optimization in an LTE‐A networks59
Power‐domain non‐orthogonal multiple access based full‐duplex one‐way wireless relaying network54
53
Enabling transmission status detection in grant‐free power domain non‐orthogonal multiple access for massive Internet of Things52
Enhancing Smart Grid Security Using BLS Privacy Blockchain With Siamese Bi‐LSTM for Electricity Theft Detection49
BER performance of MIMO based NOMA‐VLC system with imperfect SIC49
Artificial intelligence‐based blockchain solutions for intelligent healthcare: A comprehensive review on privacy preserving techniques43
Intelligent reflecting surface empowered WPCN system over generalized κ−μ$$ \kappa -\mu $$ fading channels: Performance analysis and optimization41
40
Reliable community card system for detecting and isolating selfish vehicles in smart and connected communities‐based VDTN's40
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review40
Evaluation of cooperative spectrum sensing with filtered bank multi carrier utilized for detecting in cognitive radio network38
Similarity‐based clustering and data aggregation with independent component analysis in wireless sensor networks37
Efficient resource allocation for hybrid nonorthogonal multiple access based heterogeneous networks beyond fifth‐generation33
Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook32
Channel reconfiguration for intelligent reflecting surface‐aided vehicular networks32
32
Smart Homes of the Future32
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons31
Bayesian detection with feedback for cooperative spectrum sensing in cognitive UAV networks31
Energy Efficient LoRa‐Based AIoT Setup for Human Movement Classification30
User grouping and resource management in efficient NOMA‐OMA transmission scheme for infotainment message dissemination in VANETs29
Jitter‐sensitive data communication in emerging wireless networks26
Particle swarm optimization of the spectral and energy efficiency of an SCMA‐based heterogeneous cellular network25
Impact of endorsement policy on the performance of blockchain‐based VANET25
Reconfigurable intelligent surface aided coordinated multipoint transmission for the simultaneous wireless information and power transfer non‐orthogonal multiple access network25
Issue Information25
Shannon meets Stackelberg on the cognitive interference channel part I: A deterministic view23
The offloading algorithm of mobile edge computing considering mobility in the intelligent inspection scenario23
Towards Secure and Efficient Data Aggregation in Blockchain‐Driven IoT Environments: A Comprehensive and Systematic Study23
Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning22
MS‐ADS: Multistage Spectrogram image‐based Anomaly Detection System for IoT security22
Energy‐efficient UOWC‐RF systems with SLIPT22
Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly22
Enhanced Elman spike neural network fostered blockchain framework espoused intrusion detection for securing Internet of Things network21
RETRACTED: Design and implementation of network‐on‐chip router using multi‐priority based iterative round‐robin matching with slip20
RETRACTION: Dynamic Flow Scheduling Optimization Based on Intelligent Control for Digital Twins20
Developing an attack detection framework for wireless sensor network‐based healthcare applications using hybrid convolutional neural network20
RETRACTION: Medical Data Quality Management Using Butterfly Optimization With Adaptive Threshold Sensitive Energy‐efficient Routing Protocol and Multidimensional Chaotic Blowfish Encryption20
Copula based analysis of impact of wireless channels correlation on the physical layer security performances in a wireless wiretap channel with artificial noise19
Signal points allocation for generalized enhanced spatial modulation19
Editorial: Security of cloud service for the manufacturing industry18
Design and experimental analysis of fractal antennae with ground‐defected structure for expected 6G and 5G mm‐wave communication and wireless applications18
An efficient multicriteria‐based vertical handover decision‐making algorithm for heterogeneous networks18
HECC‐ABE: A novel blockchain‐based IoT healthcare data storage using hybrid cryptography schemes with key optimization by hybrid meta‐heuristic algorithm17
Secure transmission in smart grid dynamic wide area network by exploiting full‐duplex jamming scheme17
Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach16
Explainable artificial intelligence for feature selection in network traffic classification: A comparative study16
Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments16
Design and Analysis of Sierpinski Fractal Antennas for Millimeter‐Wave 5G and Ground‐Based Radio Navigation Applications16
Quantum Safe Proxy Blind Signature Protocol Based on 3D Entangled GHZ‐Type States15
An improved low‐carbon intelligent agriculture system with energy optimization principles using wireless IoT environment14
Issue Information14
A review on tactile IoT: Architecture, requirements, prospects, and future directions14
An efficient and secure wearable sensor based remote healthcare monitoring system using adaptive dilated transformer Bi‐LSTM with gated recurrent unit14
Joint switch controlling and subvectors permutation for quadrature index modulation with hybrid constellations14
Energy‐efficient load balancing for divisible tasks on heterogeneous clusters14
An Enhanced IOMT and Blockchain‐Based Heart Disease Monitoring System Using BS‐THA and OA‐CNN13
CaPTS scheduler: A context‐aware priority tuple scheduling for Fog computing paradigm13
An IoT‐Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing13
Data‐Aggregation‐Aware Energy‐Efficient in Wireless Sensor Networks Using Multi‐Stream General Adversarial Network13
Malicious behavior detection in cloud using self‐optimized dynamic kernel convolutional neural network13
Adjacent channel interference suppression based on spectral extrapolation to enhance electromagnetic compatibility of co‐site radio devices12
Algorithms and throughput analysis of cognitive radio‐based MIMO‐NOMA for the next generation of wireless communications12
Green Computation Offloading With DRL in Multi‐Access Edge Computing12
Bayesian quickest detection‐based spectrum sensing for cognitive UAV networks12
Cooperative jamming in downlink satellite network with hardware impairments12
Textual emotion analysis using improved metaheuristics with deep learning model for intelligent systems12
Energy efficient federated learning in internet of vehicles: A game theoretic scheme12
Security analysis of fog computing environment for ensuring the security and privacy of information12
12
Multi‐channel attack detection based on lightweight message authentication code access control using Internet of Things design11
Robotic Cloud Automation‐Enabled Attack Detection and Secure Robotic Command Verification Using LADA‐C‐RNN and S‐Fuzzy11
The improvement of wavefront cellular learning automata for task scheduling in fog computing11
An artificial immune system‐based algorithm for selfish node detection in Mobile Ad Hoc Networks (MANETs)11
A Multiscale Principal Component Analysis Approach to Physical Layer Secret Key Generation in Indoor Environments11
Design and implementation of a novel real‐time unmanned aerial vehicle localization scheme based on received signal strength11
A decision for 5G‐UAV to maximize the throughput of emergency indoor‐outdoor communication11
SKALP: Secure key agreement and lightweight protocol for dew‐assisted IoT enabled edge computing11
A fully distributed energy‐aware multi‐level clustering and routing for WSN‐based IoT11
Attentive Dual Residual Generative Adversarial Network for Energy‐Aware Routing Through Golden Search Optimization Algorithm in Wireless Sensor Network Utilizing Cluster Head Selection11
Physical layer security‐oriented energy‐efficient resource allocation and trajectory design for UAV jammer over 5G millimeter wave cognitive relay system11
Cooperative vehicles‐assisted task offloading in vehicular networks11
Smart contract assisted blockchain based public key infrastructure system11
Adaptive dynamic duty cycle mechanism for energy efficient medium access control in wireless multimedia sensor networks10
A resource efficient scheme for backhaul‐constrained coordinated multipoint cellular networks10
Issue Information10
IRDB: Towards enjoying spatial, rate, and beam‐channel diversity in wireless networks for multimedia applications10
Enhanced authentication and device integrity protection for GDOI using blockchain10
Enhanced characterization and modeling of A‐MPDU aggregation for IEEE 802.11n WLANs10
Performance analysis and comparison of approximate detectors with linear detectors in massive MIMO systems under imperfect channel state information10
10
Joint user and throughput maximization in re‐configurable intelligent surface assisted beyond 5G/6G networks10
Double generalized spatial modulation10
Millimeter‐wave planar antennas for 5G‐based remote monitoring and treatment of COVID‐19 patients10
Optimizing UAV computation offloading via MEC with deep deterministic policy gradient10
Integrating CLDs and machine learning through hybridization for human‐centric wireless networks10
Detecting attacks on IoT devices with probabilistic Bayesian neural networks and hunger games search optimization approaches9
Performance evaluation of cooperative‐nonorthogonal multiple access‐based improved hybrid simultaneous wireless information and power transfer protocol9
Modeling of Multi Hermite‐Gaussian MDM Based Passive Star ITU G.989.x Standardardized PON System9
Energy‐efficient power control and altitude planning for UAV‐based vehicular communications in 5G NR‐V2X networks9
9
Outage probability and throughput of cooperative non‐orthogonal multiple access with moving relay in heterogeneous network9
A comprehensive review on blockchain and Internet of Things in healthcare9
9
RETRACTION: A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications9
Reconfigurable intelligent surface assisted downlink INOMA system9
A novel advanced 3D‐IPS based on mmWaves and SOM‐MLP neural network9
Clustering and parallel indexing of big IoT data in the fog‐cloud computing level9
Innovative Video Anomaly Detection: TCNAnoDetect With Self‐Supervised Feature Learning9
A wide band log periodic millimeter‐wave antenna for 5G femtocells applications9
9
Post quantum secure conditional privacy preserving authentication for edge based vehicular communication8
8
Cloud migration framework clustering method for social decision support in modernizing the legacy system8
Issue Information8
RAKSHAM: Responsive approach to Knock‐off scavenging hackers and attack mitigation8
A ferry mobility based direction and time‐aware greedy delay‐tolerant routing (FM‐DT‐GDR) protocol for sparse flying ad‐hoc network8
Discrete practical RF energy harvesting models for wireless communication networks8
Spectrum sensing in cognitive radio: A deep learning based model8
Signal to interference plus noise ratio improvement of a multi‐cell indoor visible light communication system through optimal parameter selection complying lighting constraints8
Issue Information8
Latency‐Sensitive Service Function Chains Intelligent Migration in Satellite Communication Driven by Deep Reinforcement Learning8
ONOS Flood Defender: An Intelligent Approach to Mitigate DDoS Attack in SDN8
Harnessing idle edge resources for execution of cloud services: A comprehensive review8
A unified service‐based capability exposure framework for closed‐loop network automation8
Dolphin echolocation optimized sailfish algorithm for energy efficient and secured routing based on trust management in ZigBee wireless sensor network8
Comparative analysis of cloud resources forecasting using deep learning techniques based on VM workload traces8
Cyber‐physical network architecture for data stream provisioning in complex ecosystems8
Blockchain‐based Human Intelligent Systems for Smart City Safety7
Optimizing resources allocation in a heterogeneous cloud radio access network using machine learning7
Large device to device communication network including airborne drones for emergency scenarios7
Bringing life out of diversity: Boosting network lifetime using multi‐PHY routing in RPL7
An efficient fine‐grained searchable encryption for secure communication in IoT‐based vehicular social networks7
Unmanned aerial vehicle‐enabled layered architecture based solution for disaster management7
A Deep Reinforcement Learning‐Based Physical Layer Security Enhancement Design for RIS‐Aided mmWave Communications With Practical Constraints7
A cross‐layered scheme for multichannel and reactive routing in vehicular ad hoc networks7
Energy‐efficient routing in low power and lossy networks with concurrent overlapping RPL instances7
Issue Information7
Potential of sixth‐generation technologies for emerging future wireless networks7
RETRACTION: Wireless Communication Channel Modeling Using Machine Learning7
High mobility transmission system under intelligent reflecting surface7
An interference alignment scheme based on limited feedback with differentiation in heterogeneous networks7
Efficient deployment of multi‐UAV assisted mobile edge computing: A cost and energy perspective7
Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review6
Issue Information6
A chaos opposition‐based dwarf mongoose approach for workflow scheduling in cloud6
An Intelligent Routing for Internet of Things Mesh Networks6
Development of hybrid heuristic‐assisted dynamic data auditing strategy in cloud sector6
6
SDHOKGNN: An Effective Knowledge‐Enhanced Optimal Graph Neural Network Approach for Fraudulent Call Detection6
Blockchain With Hierarchical Auto‐Associative Polynomial Convolutional Neural Network Fostered Cryptography for Securing Image6
A multiple‐input, multiple‐output broadcasting system with space, time, polarization, and labeling diversity6
Designing green IoT communication by adaptive spotted hyena tunicate swarm optimization‐based cluster head selection6
HTTP header based phishing attack detection using machine learning6
Issue Information6
Channel Estimation Based Intelligent Reflecting Surfaces for Massive MIMO System Considering Spatially Correlated Channels6
Performance analyses of TAS/Alamouti‐MRC NOMA system with channel estimation error, feedback delay, and imperfect SIC6
A profiled side‐channel attack detection using deep learning model with capsule auto‐encoder network6
A deep and systematic review of the intrusion detection systems in the fog environment6
Roadside units plane optimization scheme in software‐defined vehicular networks6
A Probabilistic Routing Algorithm Based on CNN and Q‐Learning for Vehicular Edge Network6
Multi‐dimensional resource management with deep deterministic policy gradient for digital twin‐enabled Industrial Internet of Things in 6 generation6
Decentralized prediction and reputation approach in vehicular networks6
DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery6
An efficient modulation classification method using signal constellation diagrams with convolutional neural networks, Gabor filtering, and thresholding6
Image transmission performance analysis through free space optical communication link using coherent QPSK modulation under various environmental conditions6
Metaverse: Trend, emerging themes, and future directions6
A Concise Survey on Modern Web‐Based Phishing Techniques and Advanced Mitigation Strategies6
Leveraging big data analytics in 5G‐enabled IoT and industrial IoT for the development of sustainable smart cities6
A privacy‐sensitive data identification model in online social networks6
A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird based CNN6
An enhancedLTEhandover scheme for high‐speed railway application5
An anonymous and efficient certificateless signature scheme based on blockchain in NDN‐IoT environments5
5
Correction to A Secure and Decentralized Authentication and Data Transmission in Internet of Vehicles Using Blockchain and Ring‐Based Cryptosystem5
Trust‐aware task load balancing in multi‐access edge computing based on blockchain and a zero trust security capability framework5
Performance analysis of subspace‐based spatio‐temporal spectral estimator5
Designing and planning of energy efficient sustainable cities and societies: A smart energy5
5G network slicing with unmanned aerial vehicles: Taxonomy, survey, and future directions5
An efficient IoMT based health monitoring using complex valued deep CNN and political optimizer5
Successive interferencecancelation‐inspiredchannel estimation for downlinknon‐orthogonalmultiple access5
A performance study of a genetic algorithm based mapper design for uncoded space‐time labeling diversity5
Review of intrusion detection system in cyber‐physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges5
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies5
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach5
Triple‐band circularly polarized conformal antenna for vehicular communication applications5
RETRACTION: Internet of Things Security Framework Based on Near Field Communication With Otway Rees Protocol5
Phase center motion based time modulated arrays with preprocessed time schemes for selective harmonic beamforming in B5G communication systems5
BER analysis of tightly packed planar RIS system using the level of spatial correlation and discrete phase shifter5
On channel estimation and spectral efficiency for cell‐free massive MIMO with multi‐antenna access points considering spatially correlated channels5
MetaInfoChain: Bi‐layered blockchain consensus for metadata aggregation inIoTand cloud environments5
Traffic Prevention and Security Enhancement in VANET Using Deep Learning With Trusted Routing Aided Blockchain Technology5
5
Simultaneous Vortex‐ and Non‐Vortex‐Based Transmission5
Cooperation and energy harvesting based spectrum sensing schemes for green cognitive radio networks5
Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain‐Based Intrusion Detection System for Smart Cities5
Security threats and measures in the Internet of Things for smart city infrastructure: A state of art5
Issue Information5
Crossover Boosted Grey Wolf Optimizer‐based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs5
User relay‐aided energy‐efficient resource allocation in heterogeneous cloud radio access network5
HIC: A high‐reliable in‐band control network for perception layer of software‐defined IoT5
Quick cooperative spectrum sensing in cognitive unmanned aerial vehicles networks5
A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain5
Flight Evolution: Decoding Autonomous UAV Navigation—Fundamentals, Taxonomy, and Challenges5
A probably secure biometric‐based authentication and key agreement scheme for Internet of Drones5
Deep SCMA receiver: A low‐complexity joint decoder and channel estimator for SCMA over time‐varying channels using RNNs5
A robust‐link controller placement model for large‐scale software defined networks5
5
A novel game theory based reliable proof‐of‐stake consensus mechanism for blockchain5
Performance analysis of FSO communications over a generalized turbulence fading channel with pointing error4
Blockchain‐based secure deduplication of encrypted data supporting client‐side semantically secure encryption without trusted third party4
Issue Information4
SDN and application layer DDoS attacks detection in IoT devices by attention‐based Bi‐LSTM‐CNN4
Markov‐based analysis for cooperative HARQ‐aided NOMA transmission scheme in 5G and beyond4
QAKA: A novel quantum authentication and key agreement (QAKA) protocol using quantum entanglement for secure communication among IoT devices4
4
TVSR‐OR: Tile‐based 360‐degree video streaming over real time streaming protocol with optimized read4
Blockchain and artificial intelligence for 5G‐enabled Internet of Things: Challenges, opportunities, and solutions4
Variable pulse position modulation receivers for visible light communication systems without the knowledge of dimming level4
Energy Efficiency Optimization in Vehicle Communication Network Using Hybrid‐Genetic Algorithm4
4
An intelligent human‐centric systems to diagnose breast cancer using machine learning and optimized feature selection techniques4
Digital twin‐enabled deep reinforcement learning for joint scheduling of ultra‐reliable low latency communication and enhanced mobile broad band: A reliability‐guaranteed approach4
FTHT: A Fine‐Tuned VGG16‐Based and Hashing Framework for Secure Multimodal Biometric System4
GIJA:Enhanced geyser‐inspired Jaya algorithm for task scheduling optimization in cloud computing4
4
Regular routine aware routing in opportunistic mobile social networks4
Performance of SWIPT‐Assisted CNOMA System With P‐CSI User Selection Under Nakagami‐m Fading4
Intelligent data offloading learning model for autonomous vehicular networks4
IPAPS: An improved public auditing protocol for secure data storage in cloud‐based medical storage system4
Issue Information4
Hybrid Pelican and Archimedes optimization algorithm fostered energy aware task scheduling in heterogeneous virtualized cloud computing4
A novel Hypertuned Prophet based power saving approach for IoT enabled smart homes4
Achieving fast page load for websites across multiple domains4
CKAA: Certificateless key‐agreement authentication scheme in digital twin telemedicine environment4
A secure routing protocol using trust‐based clustering and bionic intelligence algorithm for UAV‐assisted vehicular ad hoc networks4
Secure and efficient device‐to‐device communication in IoT: The DMBSOA‐enhanced MQTT protocol4
Interference mitigation in multiuserWDM VLCsystems using differential receiver4
4
Cloud‐fog assisted human tracing and disaster evacuation framework4
Development of hyper‐parameter‐tuned‐recurrent neural network for detection and mitigation of fraudulent resource consumption attack in cloud4
Issue Information4
Performance analysis of 5G heterogeneous networks under the impact of aggregate interference over Nakagami‐m fading channels4
Optical modulation using digital image symbol patterns and grating light valve technology in a hybrid multiplexed superchannel4
0.11164093017578