IEEE Transactions on Network Science and Engineering

Papers
(The H4-Index of IEEE Transactions on Network Science and Engineering is 59. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Table of Content199
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries164
2022 Index IEEE Transactions on Network Science and Engineering Vol. 9163
Epidemic Spreading on Directed Networks and Twitter Cascades162
Freshness-Aware Age Optimization for Multipath TCP Over Software Defined Networks161
A Bayesian Graph Embedding Model for Link-Based Classification Problems154
Expected Extinction Times of Epidemics With State-Dependent Infectiousness153
Distributed Gradient Method for Neural Network-Based Constrained $k$-Winners-Take-All141
A Novel Tensor Completion Based Indoor Positioning Fingerprint Recovery Method in Mobile Crowdsensing Networks131
PTAS: PIFO-Based Time-Aware Shaper for Massive Concurrent Flows in Time-Sensitive Networks126
Community Detection With Known, Unknown, or Partially Known Auxiliary Latent Variables124
Event-Triggered Observer-Based $\mathcal {H}_\infty$ Consensus Control and Fault Detection of Multiagent Systems Under Stochastic False Data Injection Attacks120
Ensemble Learning-Based Atrial Fibrillation Detection From Single Lead ECG Wave for Wireless Body Sensor Network120
Deep Multi-Attributed-View Graph Representation Learning120
Secure Transmission for Multi-UAV-Assisted Mobile Edge Computing Based on Reinforcement Learning116
SFANT: A SRv6-Based Flexible and Active Network Telemetry Scheme in Programming Data Plane111
Stochastic Event-Triggered Feedback Physical Watermarks Against Replay Attacks106
Dynamic Opinion Maximization Framework With Hybrid Method in Social Networks104
Clustered Graph Matching for Label Recovery and Graph Classification102
Poisoning the Well: Adversarial Poisoning on ML-Based Software-Defined Network Intrusion Detection Systems100
On the Design of Resilient Distributed Single Time-Scale Estimators: A Graph-Theoretic Approach96
APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks95
Renewable Energy Absorption Oriented Many-Objective Probabilistic Optimal Power Flow95
A New Flexible HARQ Assisted by Rate Splitting Multiple Access92
Tackling Data Mining Risks: A Tripartite Covert Channel Merging Blockchain and IPFS86
Towards Security Enhanced Service Function Chain Deployment by Moving Target Defense85
Spot Electricity Market Design Considering Carbon Emissions for a Power System With a High Penetration of Renewable Energy Generation78
Distributed Management of Fluctuating Energy Resources in Dynamic Networked Systems77
Networked Decision-Making Dynamics Based on Fair, Extortionate and Generous Strategies in Iterated Public Goods Games75
Vital Nodes Identification via Evolutionary Algorithm With Percolation Optimization in Complex Networks75
QECO: A QoE-Oriented Computation Offloading Algorithm Based on Deep Reinforcement Learning for Mobile Edge Computing74
Attributes Based Vehicular Named Data Networking for Driving Assistance71
Distributed Guaranteed-Performance Consensus of Networked Systems Without Involving the Feasibility Condition: A Hierarchical Algorithm71
Performance Analysis of Cache-Enabled Handover Management for Vehicular Networks71
Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing71
Planning Cyclic Queuing and Forwarding for Time-Sensitive Networking via Heuristic and Neurodynamic Optimization71
Detection and Prediction of FDI Attacks in IoT Systems via Hidden Markov Model69
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression69
Secure and Efficient Federated Learning Through Layering and Sharding Blockchain68
Intelligent Energy Scheduling in Renewable Integrated Microgrid With Bidirectional Electricity-to-Hydrogen Conversion68
Secure Computation Offloading in Blockchain Based IoT Networks With Deep Reinforcement Learning68
Protocol-Based Particle Filtering for Nonlinear Complex Networks: Handling Non-Gaussian Noises and Measurement Censoring68
An Event-Triggered Approach for Gradient Tracking in Consensus-Based Distributed Optimization67
New Gas-Efficient Authenticated Range Query Schemes in Hybrid-Storage Blockchain66
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems65
Robust Consensus of Multiagent Dynamics With Transmission Constraints and Noises64
Anonymous Classical Message Transmission Through Various Quantum Networks64
The Nodes Influence Maximization in Open Source Software Community Based on Probability Propagation Model64
Learning-augmented Online Minimization of Age of Information and Transmission Costs64
Guest Editorial: Introduction to the Special Section on Intelligence-Empowered Collaboration Among Space, Air, Ground, and Sea Mobile Networks Towards B5G62
Multimedia Traffic Classification for Imbalanced Environment62
TKAGFL: A Federated Communication Framework Under Data Heterogeneity62
Hierarchical Aerial Computing for Task Offloading and Resource Allocation in 6G-Enabled Vehicular Networks62
Foundation Model Empowered Synesthesia of Machines (SoM): AI-native Intelligent Multi-Modal Sensing-Communication Integration61
Deep Learning for Fast and Reliable Initial Access in AI-Driven 6G mmWave Networks61
Influence Maximization Based on Network Motifs in Mobile Social Networks60
A Distributed Network System for Nonsmooth Coupled-Constrained Optimization59
A New Protection-Based Approach for Link Failure Management of Software-Defined Networks59
Joint Split Offloading and Trajectory Scheduling for UAV-Enabled Mobile Edge Computing in IoT Network59
0.13068389892578