IEEE Transactions on Network Science and Engineering

Papers
(The H4-Index of IEEE Transactions on Network Science and Engineering is 65. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
2022 Index IEEE Transactions on Network Science and Engineering Vol. 9300
Expected Extinction Times of Epidemics With State-Dependent Infectiousness218
Ensemble Learning-Based Atrial Fibrillation Detection From Single Lead ECG Wave for Wireless Body Sensor Network211
Freshness-Aware Age Optimization for Multipath TCP Over Software Defined Networks198
Multi-Authorized, Privacy-Protected, and Traceable Driverless Taxi Data Sharing in Internet of Vehicles192
A Federated Blockchain Security for MEC-Enabled IoT Networks in Industrial 5.0169
Continuous Authentication in IoT-Based Smart Home Application: A Survey and a Design Framework Using Vector Similarity Search154
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries150
SFANT: A SRv6-Based Flexible and Active Network Telemetry Scheme in Programming Data Plane140
Dynamic Opinion Maximization Framework With Hybrid Method in Social Networks133
Vital Nodes Identification via Evolutionary Algorithm With Percolation Optimization in Complex Networks130
Clustered Graph Matching for Label Recovery and Graph Classification130
Poisoning the Well: Adversarial Poisoning on ML-Based Software-Defined Network Intrusion Detection Systems121
A New Flexible HARQ Assisted by Rate Splitting Multiple Access120
Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing115
Distributed Guaranteed-Performance Consensus of Networked Systems Without Involving the Feasibility Condition: A Hierarchical Algorithm113
Epidemic Spreading on Directed Networks and Twitter Cascades109
Dynamic QoS Mapping in Integrated 5G-TSN Networks With Programmable Resource Slicing107
Inference-Subgraph Driven Multi-Agent DRL for Joint Resource Orchestration in Communication and Computing Power Network106
Multi-Link Enabled Reliable and Low Latency Transmission Design for Edge Estimation103
BECS: A Privacy-Preserving Computing Resource Sharing Mechanism for 6G Computing Power Network103
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression101
Deep Multi-Attributed-View Graph Representation Learning100
Planning Cyclic Queuing and Forwarding for Time-Sensitive Networking via Heuristic and Neurodynamic Optimization98
On the Design of Resilient Distributed Single Time-Scale Estimators: A Graph-Theoretic Approach96
Modularity Maximization and Community Detection in Complex Networks Through Recursive and Hierarchical Annealing in the DWAVE Advantage Quantum Processing Units96
Evolving Intelligent Network Attack Classifier Under Label Distribution Shift96
A Novel Tensor Completion Based Indoor Positioning Fingerprint Recovery Method in Mobile Crowdsensing Networks95
Protocol-Based Particle Filtering for Nonlinear Complex Networks: Handling Non-Gaussian Noises and Measurement Censoring94
Performance Analysis of Cache-Enabled Handover Management for Vehicular Networks92
Attributes Based Vehicular Named Data Networking for Driving Assistance92
Community Detection With Known, Unknown, or Partially Known Auxiliary Latent Variables91
Integrated Sensing and Communication Using a Smart Leaky-Wave Antenna91
Joint Jamming and Transmission Rate Optimization for Multi-Jammer Assisted UAV Covert Communications With Imperfect CSI90
Spot Electricity Market Design Considering Carbon Emissions for a Power System With a High Penetration of Renewable Energy Generation88
PTAS: PIFO-Based Time-Aware Shaper for Massive Concurrent Flows in Time-Sensitive Networks88
Secure Transmission for Multi-UAV-Assisted Mobile Edge Computing Based on Reinforcement Learning88
Stochastic Event-Triggered Feedback Physical Watermarks Against Replay Attacks87
Detection and Prediction of FDI Attacks in IoT Systems via Hidden Markov Model85
Robust Beamforming for RSMA-Aided Bistatic Integrated Sensing and Communication in Low-Altitude Wireless Networks85
Buffer Management for Timely Reconstruction: Lower Bounds and Near-Optimal Policies84
Towards Security Enhanced Service Function Chain Deployment by Moving Target Defense83
Accelerated Transfer-Entropy-Weighted ADMM for Learning Causal Directed Acyclic Graphs83
Tackling Data Mining Risks: A Tripartite Covert Channel Merging Blockchain and IPFS83
Intelligent Energy Scheduling in Renewable Integrated Microgrid With Bidirectional Electricity-to-Hydrogen Conversion82
Renewable Energy Absorption Oriented Many-Objective Probabilistic Optimal Power Flow81
Distributed Management of Fluctuating Energy Resources in Dynamic Networked Systems81
APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks80
QECO: A QoE-Oriented Computation Offloading Algorithm Based on Deep Reinforcement Learning for Mobile Edge Computing80
Networked Decision-Making Dynamics Based on Fair, Extortionate and Generous Strategies in Iterated Public Goods Games79
Secure and Efficient Federated Learning Through Layering and Sharding Blockchain77
Distributed Gradient Method for Neural Network-Based Constrained $k$-Winners-Take-All77
Large Models Empowered End-to-End AI for Split Learning in Native AI Future Networks74
Joint Power and Coverage Control of Massive UAVs in Post-Disaster Emergency Networks: An Aggregative Game-Theoretic Learning Approach74
Composite Learning From Fractional-Order Fuzzy Echo State Network Control Using Historical Data72
Automated Hubs-Patching: Protection Against Malware Spread Through Reduced Scale-Free Networks and External Storage Devices72
Influence Maximization Based on Network Motifs in Mobile Social Networks72
The Nodes Influence Maximization in Open Source Software Community Based on Probability Propagation Model70
Blockchain-Based Hybrid Reliable User Selection Scheme for Task Allocation in Mobile Crowd Sensing69
Spectrum Efficient Communication for Heterogeneous IoT Networks69
From Network Inference Errors to Utility Suboptimality: How Much Is the Impact?68
Efficient Intrusion Detection for Edge Network via Multi-Stage Few-Shot Class-Incremental Learning68
HCAAC: Hybrid Channel Access by Admission and Contention in Wi-Fi Networks67
Blockchain-Aided Secure Access Control for UAV Computing Networks66
An Adaptive Service Function Chains Mapping With Multi-Task Deep Reinforcement Learning66
0.13582301139832