Transactions on Emerging Telecommunications Technologies

Papers
(The TQCC of Transactions on Emerging Telecommunications Technologies is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Network intrusion detection system: A systematic study of machine learning and deep learning approaches369
Review on remote sensing methods for landslide detection using machine and deep learning112
An internet of health things‐driven deep learning framework for detection and classification of skin cancer using transfer learning99
A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)88
IOT and context‐aware learning‐based optimal neural network model for real‐time health monitoring86
A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing76
6G: A comprehensive survey on technologies, applications, challenges, and research problems74
Trust based energy efficient data collection with unmanned aerial vehicle in edge network73
Blockchain for decentralized multi‐drone to combat COVID‐19 and future pandemics: Framework and proposed solutions72
Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intru66
Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications65
Precision agriculture and farming using Internet of Things based on wireless sensor network64
Lightweight branched blockchain security framework for Internet of Vehicles64
A survey on recent optimal techniques for securing unmanned aerial vehicles applications57
A taxonomy of blockchain envisioned edge‐as‐a‐connected autonomous vehicles57
A survey of security and privacy issues in the Internet of Things from the layered context53
Blockchain and artificial intelligence for 5G‐enabled Internet of Things: Challenges, opportunities, and solutions50
A systematic survey on internet of things: Energy efficiency and interoperability perspective49
Optimal deep learning based image compression technique for data transmission on industrial Internet of things applications46
Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things46
Artificial intelligence‐powered decentralized framework for Internet of Things in Healthcare 4.044
Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm44
Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities43
An improved ensemble based intrusion detection technique using XGBoost43
Integrating encryption techniques for secure data storage in the cloud43
Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles41
Mobile‐fog‐cloud assisted deep reinforcement learning and blockchain‐enable IoMT system for healthcare workflows41
Blockchain technology for energy‐aware mobile crowd sensing approaches in Internet of Things40
Deep learning in medical imaging: A brief review40
Review of optical and wireless backhaul networks and emerging trends of next generation 5G and 6G technologies40
Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions39
A comprehensive review on blockchain and Internet of Things in healthcare38
Data dissemination for Internet of vehicle based on 5G communications: A survey37
A Secured and Robust Medical Image Watermarking Approach for Protecting Integrity of Medical Images36
Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing36
Systematic review of Internet of Things in smart farming35
Machine learning for next‐generation intelligent transportation systems: A survey34
Blockchain and artificial intelligence enabled privacy‐preserving medical data transmission in Internet of Things34
Artificial intelligence and blockchain: A review33
The role of unmanned aerial vehicles and mmWave in 5G: Recent advances and challenges32
Multiuser context‐aware computation offloading in mobile edge computing based on Bayesian learning automata32
An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network32
A novel multi‐image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition31
Toward 6G: Understanding network requirements and key performance indicators31
Deep learning recognition of diseased and normal cell representation30
Blockchain for precision irrigation: Opportunities and challenges30
From statistical‐ to machine learning‐based network traffic prediction30
Internet of Things backdoors: Resource management issues, security challenges, and detection methods29
Machine learning for cooperative spectrum sensing and sharing: A survey29
An intrusion detection system using optimized deep neural network architecture29
Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments28
Ensemble machine learning approaches for webshell detection in Internet of things environments28
An efficient SDN‐based LTE‐WiFi spectrum aggregation system for heterogeneous 5G networks27
CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things applications27
Spectrum sensing in cognitive radio: A deep learning based model27
Q‐learning based flexible task scheduling in a global view for the Internet of Things27
Intelligent intrusion detection system in smart grid using computational intelligence and machine learning26
Deep learning support for intelligent transportation systems26
DBTP2SF: A deep blockchain‐based trustworthy privacy‐preserving secured framework in industrial internet of things systems26
Blockchain as a service models in the Internet of Things management: Systematic review25
Unmanned aerial vehicles integratedHetNetfor smart dense urban area24
Security challenges of Internet of Underwater Things: A systematic literature review24
Secure smart contracts for cloud‐based manufacturing using Ethereum blockchain24
Deep neuro‐fuzzy approach for risk and severity prediction using recommendation systems in connected health care24
KRanTi: Blockchain‐based farmer's credit scheme for agriculture‐food supply chain24
Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks23
A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique23
A trusted distributed routing scheme for wireless sensor networks using blockchain and meta‐heuristics‐based deep learning technique23
Adaptive cluster‐based heuristic approach in cognitive radio networks for5Gapplications23
Public key encryption with equality test for Industrial Internet of Things system in cloud computing22
Recent advances in multimedia security and information hiding22
A survey on the blockchain techniques for the Internet of Vehicles security21
I‐FBECS: Improved fuzzy based energy efficient clustering using biogeography based optimization in wireless sensor network21
Trusted authority based session key agreement and authentication algorithm for smart grid networks21
Machine learning for mobile network payment security evaluation system21
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets21
Performance analysis of Beaulieu‐Xie fading channel with MRC diversity reception21
Survey on recent smart gateways for smart home: Systems, technologies, and challenges20
Advanced security model for multimedia data sharing in Internet of Things20
An inverted L‐strip loaded ground with hollow semi‐hexagonal four‐element polarization diversity UWB‐MIMO antenna20
Security threats and measures in the Internet of Things for smart city infrastructure: A state of art19
On The Selection of Power Allocation Strategy in Power Domain Non‐Orthogonal Multiple Access (PD‐NOMA) for 6G and Beyond19
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network19
Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions19
Two hop verification for avoiding void hole in underwater wireless sensor network using SM‐AHH‐VBF and AVH‐AHH‐VBF routing protocols18
Resource allocation in sparse code multiple access‐based systems for cloud‐radio access network in 5G networks18
Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks18
SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks18
A comprehensive survey on secure software‐defined network for the Internet of Things17
Energy efficient resource allocation for uplink hybrid power domain sparse code nonorthogonal multiple access heterogeneous networks with statistical channel estimation17
Communication systems of high‐speed railway: A survey17
Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things17
Performance analysis of long‐reach 40/40 Gbps mode division multiplexing‐based hybrid time and wavelength division multiplexing passive optical network/free‐space17
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment17
Revamping land coverage analysis using aerial satellite image mapping17
Orthogonal frequency division multiplexing with subcarrier power modulation for doubling the spectral efficiency of 6G and beyond networks17
Application of Lah transform for security and privacy of data through information hiding in telecommunication16
Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains16
Multilabel classification of remote sensed satellite imagery16
Analysis of anomaly detection method for Internet of things based on deep learning16
A fully distributed energy‐aware multi‐level clustering and routing for WSN‐based IoT16
Energy efficient routing in IOT based UWSN using bald eagle search algorithm16
Internet of things‐fog computing‐based framework for smart disaster management16
BCALS: Blockchain‐based secure log management system for cloud computing16
Deployment of edge servers in 5G cellular networks15
Model‐based method with nonlinear ultrasonic system identification for mechanical structural health assessment15
Retracted: Design of multimedia blockchain privacy protection system based on distributed trusted communication15
Efficient data transfer in edge envisioned environment using artificial intelligence based edge node algorithm15
Unmanned aerial vehicle‐enabled layered architecture based solution for disaster management14
Blockchain‐based asset storage and service mechanism to metaverse universe: Metarepo14
Leveraging mist and fog for big data analytics in IoT environment14
Climate‐smart agriculture using intelligent techniques, blockchain and Internet of Things: Concepts, challenges, and opportunities13
Integration of Internet of Things and blockchain toward portability and low‐energy consumption13
Trust management of services (TMoS): Investigating the current mechanisms13
Software‐defined networking in vehicular networks: A survey13
Placement of edge server based on task overhead in mobile edge computing environment13
Federated learning and next generation wireless communications: A survey on bidirectional relationship13
Lightweight and efficient privacy‐preserving mutual authentication scheme to secure Internet of Things‐based smart healthcare13
Autonomous underwater vehicles support for enhanced performance in the Internet of underwater things13
MARPL: A crosslayer approach for Internet of things based on neighbor variability for mobility support in RPL13
Analysis on homomorphic technique for data security in fog computing12
A review and analysis of secure and lightweightECC‐basedRFIDauthentication protocol for Internet of Vehicles12
A performance‐aware routing mechanism for flying ad hoc networks12
Resource optimization in UAV‐assisted wireless networks—A comprehensive survey12
SecureDeepNet‐IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems12
Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things12
An evolutionary computation‐based privacy‐preserving data mining model under a multithreshold constraint12
 LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios12
Security enhancement technologies for smart contracts in the blockchain: A survey12
Adaptive deep convolutional neural network‐based secure integration of fog to cloud supported Internet of Things for health monitoring system12
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT12
A review of industrial wireless communications, challenges, and solutions: A cognitive radio approach12
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach11
Security challenges of blockchain in Internet of things: Systematic literature review11
A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges11
Efficiency enhancement techniques of microwave and millimeter‐wave antennas for 5G communication: A survey11
Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction11
Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud11
An intelligent collaborative inference approach of service partitioning and task offloading for deep learning based service in mobile edge computing networks11
A novel approach for multimodality medical image fusion over secure environment11
Power control scheme for device‐to‐device communication using uplink channel in 5G mm‐Wave network11
Ultra‐reliability and low‐latency communications on the internet of things based on 5G network: Literature review, classification, and future research view11
Joint altitude, power control, and bandwidth allocation optimization for unmanned aerial vehicle‐enabled reliable communications11
Framework for determining the suitability of blockchain: Criteria and issues to consider11
Analytical modeling for signaling‐based DRX in 5G communication11
Selection of relays based on the classification of mobility‐type and localized network metrics in the Internet of Vehicles10
Privacy‐preserving multisource transfer learning in intrusion detection system10
Secure content‐based image retrieval using modified Euclidean distance for encrypted features10
On channel estimation and spectral efficiency for cell‐free massive MIMO with multi‐antenna access points considering spatially correlated channels10
Proxy re‐encryption with equality test for secure data sharing in Internet of Things‐based healthcare systems10
Leveraging big data analytics in 5G‐enabled IoT and industrial IoT for the development of sustainable smart cities10
Role‐based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment10
A systematic review of task scheduling approaches in fog computing10
An efficient priority‐based convolutional auto‐encoder approach for electrocardiogram signal compression in Internet of Things based healthcare system10
Capacity enhancement of NOMA‐SWIPT IoT relay system with direct links over rayleigh fading channels10
Unknown network attack detection based on open‐set recognition and active learning in drone network10
Channel estimation for reconfigurable intelligent surface‐assisted multiuser mmWave MIMO system in the presence of array blockage10
SO‐VMEC: Service offloading in virtual mobile edge computing using deep reinforcement learning10
A platform for cloudification of network and applications in the Internet of Vehicles10
Improving routing disruption attack detection in MANETs using efficient trust establishment10
Extenuation of phase shift influenced nonlinear impairments in fiber optics network9
TamForen: A tamper‐proof cloud forensic framework9
A lightweight privacy protection scheme based on user preference in mobile crowdsensing9
Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology9
An improved optimal energy aware data availability approach for secure clustering and routing in wireless sensor networks9
A lightweight data transmission reduction method based on a dual prediction technique for sensor networks9
Developing an attack detection framework for wireless sensor network‐based healthcare applications using hybrid convolutional neural network9
Outage performance of cognitive two‐way amplify‐and‐forward relay network under different transmission schemes9
Online reinforcement learning for adaptive interference coordination9
Privacy‐preserving multilevel obfuscation scheme for vehicular network9
Towards faster big data analytics for anti‐jamming applications in vehicular ad‐hoc network9
Privacy‐preserving data aggregation scheme for edge computing supported vehicular ad hoc networks9
A smart energy‐based source location privacy preservation model for Internet of Things‐based vehicular ad hoc networks9
A fog‐based fault‐tolerant and QoE‐aware service composition in smart cities9
Blockchain and extreme learning machine based spectrum management in cognitive radio networks9
Design of an energy‐efficient IoT device with optimized data management in sports person health monitoring application9
Core‐level cybersecurity assurance using cloud‐based adaptive machine learning techniques for manufacturing industry9
Power‐domain non‐orthogonal multiple access based full‐duplex one‐way wireless relaying network8
Game theory based framework of smart food quality assessment8
On the performance analysis of dual hop relaying systems using differential amplify‐and‐forward along with post‐detection selection combining techniques over Nakagami‐m fading ch8
Efficient deployment of multi‐UAV assisted mobile edge computing: A cost and energy perspective8
An intelligent content caching protocol for connected vehicles8
An unknown protocol syntax analysis method based on convolutional neural network8
Spatiotemporal graph convolutional recurrent networks for traffic matrix prediction8
SOFCluster: Safety‐oriented, fuzzy logic‐based clustering scheme for vehicular ad hoc networks8
Remote sensing to control respiratory viral diseases outbreaks using Internet of Vehicles8
A deep learning approach for detecting tic disorder using wireless channel information8
Intelligent software defined networking: Long short term memory‐graded rated unit enabled block‐attack model to tackle distributed denial of service attacks8
Intelligent Internet of Things gateway supporting heterogeneous energy data management and processing8
A certificateless keyword searchable encryption scheme in multi‐user setting for fog‐enhanced Industrial Internet of Things8
A new optimization technique to solve the latency aware controller placement problem in software defined networks8
Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks8
A comprehensive study of different objectives and solutions of controller placement problem in software‐defined networks8
Efficient and anonymous multi‐message and multi‐receiver electronic health records sharing scheme without secure channel based on blockchain8
Performance analysis of cooperative nonorthogonal multiple access with improved time switching simultaneous wireless information and power transfer protocol8
A comparative node evaluation model for highly heterogeneous massive‐scale Internet of Things‐Mist networks8
A levy flight based strategy to improve the exploitation capability of arithmetic optimization algorithm for engineering global optimization problems8
Fog computing‐based privacy preserving data aggregation protocols8
Anomaly traffic detection and correlation in Smart Home automation IoT systems8
A deep and systematic review of the intrusion detection systems in the fog environment8
Joint low‐complexity nonlinear equalization and carrier frequency offset compensation for multiple‐input multiple‐output orthogonal frequency division multiplexing communication systems8
An improved underwater wireless sensor network communication using Internet of Things and signal to noise ratio analysis8
Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN‐RFOA8
Auction based cost‐efficient resource allocation by utilizing blockchain in fog computing8
A relationship matrix resolving model for identifying vital nodes based on community in opportunistic social networks8
A lightweight authentication and key exchange mechanism for IPv6 over low‐power wireless personal area networks‐based Internet of things8
BER performance of MIMO based NOMA‐VLC system with imperfect SIC8
An efficient modulation classification method using signal constellation diagrams with convolutional neural networks, Gabor filtering, and thresholding7
A quantitative cross‐comparison of container networking technologies for virtualized service infrastructures in local computing environments7
Signal to interference plus noise ratio improvement of a multi‐cell indoor visible light communication system through optimal parameter selection complying lighting constraints7
Design and investigation of hybrid PON‐FSO system employing modified NZCC code under distinct weather conditions7
SPSC: A secure and privacy‐preserving autonomous platoon setup and communication scheme7
MDCD: A malware detection approach in cloud using deep learning7
Congestion centric multi‐objective reptile search algorithm‐based clustering and routing in cognitive radio sensor network7
Cooperative mobile edge computing‐cloud computing in Internet of vehicle: Architecture and energy‐efficient workload allocation7
KY converter with fuzzy logic controller for hybrid renewable photovoltaic/wind power system7
Research and optimization of sports injury medical system under the background of Internet of things7
Hybrid dingo and whale optimization algorithm‐based optimal load balancing for cloud computing environment7
Performance analysis of non‐orthogonal multiple access assisted cooperative relay system with channel estimation errors and imperfect successive interference cancellation7
ECS‐CP‐ABE: A lightweight elliptic curve signcryption scheme based on ciphertext‐policy attribute‐based encryption to secure downlink multicast communication in edge envisioned advanced metering infra7
Streaming service provisioning in IoT‐based healthcare: An integrated edge‐cloud perspective7
Learning‐based deep neural network inference task offloading in multi‐device and multi‐server collaborative edge computing7
Quantum computing inspired framework of student performance assessment in smart classroom7
SDN and application layer DDoS attacks detection in IoT devices by attention‐based Bi‐LSTM‐CNN7
Stochastic channel models for massive and extreme large multiple‐input multiple‐output systems7
Game theory based hybrid localization technique for underwater wireless sensor networks7
Adaptive user clustering for downlink nonorthogonal multiple access based 5G systems using Brute‐force search7
Cooperative NOMA system with incremental relaying and energy harvesting: Performance analysis and optimization7
Different QAM schemes analyses for ARS fading channels7
Hybrid‐360: An adaptive bitrate algorithm for tile‐based 360 video streaming7
A survey on green unmanned aerial vehicles‐based fog computing: Challenges and future perspective7
ECBCM: A prestige‐based edge computing blockchain security consensus model7
Blockchain mechanism with Byzantine fault tolerance consensus for Internet of Drones services7
Internet of Things feasibility for disabled people7
A data privacy protection scheme for Internet of things based on blockchain7
A secure data transmission protocol for cloud‐assisted edge‐Internet of Things environment7
Distributed pricing‐based resource allocation for dense device‐to‐device communications in beyond 5G networks7
Enabling machine learning‐based side‐chaining for improving QoS in blockchain‐powered IoT networks6
A privacy‐preserving mechanism for social mobile crowdsensing using game theory6
Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach6
Joint relay assignment and energy‐efficiency maximization in energy‐harvesting downlink/uplink clustered nonorthogonal multiple‐access networks6
DEIT: Dempster Shafer Theory‐based edge‐centric Internet of Things‐specific trust model6
Quality of experience‐driven resource allocation in vehicular cloud long‐term evolution networks6
A hybrid deep learning model based low‐rate DoS attack detection method for software defined network6
Similarity‐based clustering and data aggregation with independent component analysis in wireless sensor networks6
Automatic modulation classification with 2D transforms and convolutional neural network6
An intelligent ensemble of long‐short‐term memory with genetic algorithm for network anomaly identification6
MetaInfoChain: Bi‐layered blockchain consensus for metadata aggregation inIoTand cloud environments6
Low‐overhead inline deduplication for persistent memory6
Adaptive modem and interference suppression based on deep learning6
0.067605018615723