Digital Communications and Networks

Papers
(The median citation count of Digital Communications and Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
A systematic literature review of blockchain cyber security362
Security and privacy in 6G networks: New areas and new challenges198
A survey of edge computing-based designs for IoT security164
A new type of blockchain for secure message exchange in VANET160
Performance analysis and comparison of PoW, PoS and DAG based blockchains149
Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching131
Tracing manufacturing processes using blockchain-based token compositions123
Blockchain-enabled resource management and sharing for 6G communications116
Privacy preservation in permissionless blockchain: A survey101
Attacks and defences on intelligent connected vehicles: a survey96
Recent advances in mobile edge computing and content caching72
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions60
Intent-based networks for 6G: Insights and challenges60
A survey on deep learning for textual emotion analysis in social networks58
A blockchain-empowered AAA scheme in the large-scale HetNet57
Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies57
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks53
Towards asynchronous federated learning for heterogeneous edge-powered internet of things47
An intelligent task offloading algorithm (iTOA) for UAV edge computing network46
A survey on user-centric cell-free massive MIMO systems46
Security and privacy issues of physical objects in the IoT: Challenges and opportunities44
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey40
Deep learning for the internet of things: Potential benefits and use-cases39
Entropy-based redundancy analysis and information screening39
Machine learning-based real-time visible fatigue crack growth detection38
A new adaptive co-site broadband interference cancellation method with auxiliary channel37
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology37
A survey on communication protocols and performance evaluations for Internet of Things37
A survey on deploying mobile deep learning applications: A systemic and technical perspective36
Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities35
Analysis of identifiers in IoT platforms35
Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks33
A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance33
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks32
Machine learning-based zero-touch network and service management: a survey32
Help from space: grant-free massive access for satellite-based IoT in the 6G era32
Feature extraction for machine learning-based intrusion detection in IoT networks29
An ensemble deep learning model for cyber threat hunting in industrial internet of things29
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT29
Capability-based IoT access control using blockchain29
Joint resource allocation for hybrid NOMA-assisted MEC in 6G networks29
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN29
A review of optimization methods for computation offloading in edge computing networks28
Research advances on blockchain-as-a-service: architectures, applications and challenges27
An enhanced scheme for mutual authentication for healthcare services27
Robot and its living space: A roadmap for robot development based on the view of living space27
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution26
Green indoor optical wireless communication systems: Pathway towards pervasive deployment25
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction25
Identifying influential nodes in social networks via community structure and influence distribution difference25
A survey on blockchain-based integrity auditing for cloud data25
Enhancing IoT anomaly detection performance for federated learning24
Dynamic defenses in cyber security: Techniques, methods and challenges24
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles24
Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications24
Intrusion detection and prevention system for an IoT environment23
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation23
Safeguarding cross-silo federated learning with local differential privacy23
Blockchain-based data transmission control for Tactical Data Link22
Network traffic classification: Techniques, datasets, and challenges22
Machine learning in vehicular networking: An overview22
The detection method of low-rate DoS attack based on multi-feature fusion22
Smart contract token-based privacy-preserving access control system for industrial Internet of Things22
A new technology perspective of the Metaverse: Its essence, framework and challenges21
Building an interoperable space for smart agriculture21
Can blockchain link the future?21
Fooling intrusion detection systems using adversarially autoencoder20
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine20
An efficient data aggregation scheme with local differential privacy in smart grid20
Video transcoding for adaptive bitrate streaming over edge-cloud continuum20
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation20
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions19
A notary group-based cross-chain mechanism19
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection18
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic18
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks18
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks18
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities18
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects17
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes17
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network17
Internet of things: Conceptual network structure, main challenges and future directions16
Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse16
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing16
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems15
A blockchain-empowered authentication scheme for worm detection in wireless sensor network15
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things15
Sports match prediction model for training and exercise using attention-based LSTM network15
Software defined satellite networks: A survey15
User location privacy protection mechanism for location-based services15
Capacity maximizing in massive MIMO with linear precoding for SSF and LSF channel with perfect CSI14
Accurate threat hunting in industrial internet of things edge devices14
FedCDR: Privacy-preserving federated cross-domain recommendation14
Visually meaningful image encryption algorithm based on digital signature14
A secure spectrum auction scheme without the trusted party based on the smart contract14
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine14
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles14
N-gram MalGAN: Evading machine learning detection via feature n-gram14
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks14
Multi-agent reinforcement learning for edge information sharing in vehicular networks14
3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization13
Petahertz communication: Harmonizing optical spectra for wireless communications13
Adversarial attacks and defenses for digital communication signals identification13
Enhancing the robustness of object detection via 6G vehicular edge computing13
Edge robotics: are we ready? an experimental evaluation of current vision and future directions13
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing13
Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU13
Distributed privacy protection strategy for MEC enhanced wireless body area networks13
Towards improving detection performance for malware with a correntropy-based deep learning method13
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network12
Application of meta-learning in cyberspace security: a survey12
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing12
On recommendation-aware content caching for 6G: An artificial intelligence and optimization empowered paradigm12
A novel nest-based scheduling method for mobile wireless body area networks12
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting12
Toward intelligent wireless communications: Deep learning - based physical layer technologies12
Multi-objective optimization for task offloading based on network calculus in fog environments12
Generating routes for autonomous driving in vehicle-to-infrastructure communications12
Information mining and similarity computation for semi- / un-structured sentences from the social data12
The effect of propagation delay on the dynamic evolution of the Bitcoin blockchain11
EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks11
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities11
Smart and collaborative industrial IoT: A federated learning and data space approach11
Design and optimization of an integrated MEMS gas chamber with high transmissivity11
A blockchain-based audit approach for encrypted data in federated learning11
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing11
Directional neighbor discovery in mmWave wireless networks11
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network10
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications10
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks10
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home10
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective10
Splitting and placement of data-intensive applications with machine learning for power system in cloud computing10
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder10
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks10
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks10
Performance evaluation of a two-way relay network with energy harvesting and hardware noises10
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services10
ICS-SVM: A user retweet prediction method for hot topics based on improved SVM10
A fixed clustering protocol based on random relay strategy for EHWSN10
DroidEnemy: Battling adversarial example attacks for Android malware detection10
Self-healing and SDN: bridging the gap10
Adaptive multi-channel Bayesian graph attention network for IoT transaction security10
A comprehensive survey on Segment Routing Traffic Engineering9
Clustering-based label estimation for network anomaly detection9
Jointly optimizing user clustering, power management, and wireless channel allocation for NOMA-based Internet of Things9
Substring-searchable attribute-based encryption and its application for IoT devices9
Public integrity verification for data sharing in cloud with asynchronous revocation9
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network9
RFID-based 3D human pose tracking: A subject generalization approach9
Robust resource allocation for NOMA-assisted heterogeneous networks9
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element9
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group9
A survey on blockchain-enabled federated learning and its prospects with digital twin9
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G9
Unintentional forking analysis in wireless blockchain networks9
Image analysis and machine learning-based malaria assessment system9
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things9
Sparse array of sub-surface aided blockage-free multi-user mmWave communication systems8
Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing8
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications8
Theoretical analysis and comparison of OAM waves generated by three kinds of antenna array8
Efficient pipelined flow classification for intelligent data processing in IoT8
Smart object recommendation based on topic learning and joint features in the social internet of things8
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach8
ED-SWE: Event detection based on scoring and word embedding in online social networks for the internet of people8
Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks8
Electromagnetic spectrum chipless radio frequency identification: A review8
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack8
AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks7
Time to forge ahead: The Internet of Things for healthcare7
Generative adversarial network-based atmospheric scattering model for image dehazing7
Information security through controlled quantum teleportation networks7
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates7
Request pattern change-based cache pollution attack detection and defense in edge computing7
Task offloading mechanism based on federated reinforcement learning in mobile edge computing7
Prototyping low-cost automatic weather stations for natural disaster monitoring7
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems7
Anonymous data collection scheme for cloud-aided mobile edge networks7
Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks7
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities7
Private membership test protocol with low communication complexity7
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection7
Mobility-driven user-centric AP clustering in mobile edge computing-based ultra-dense networks7
FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment7
A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism7
UTM: A trajectory privacy evaluating model for online health monitoring7
Alamouti code based on block repetition in FBMC/OQAM systems6
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks6
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning6
UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing6
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective6
On the design of an AI-driven secure communication scheme for internet of medical things environment6
Similar physical entity matching strategy for mobile edge search6
An Ethereum-based solution for energy trading in smart grids6
Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism6
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems6
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system6
Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks6
A mobility compensation method for drones in SG-eIoT6
A geographic routing protocol based on trunk line in VANETs6
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems6
An efficient resource optimization scheme for D2D communication6
An architecture for digital hate content reduction with mobile edge computing6
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G6
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks6
Classification with ensembles and case study on functional magnetic resonance imaging6
Semantic segmentation-based semantic communication system for image transmission6
UAV-assisted cooperative offloading energy efficiency system for mobile edge computing6
Comparing the efficiency of artificial neural networks in sEMG-based simultaneous and continuous estimation of hand kinematics6
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs6
ML-SLD: A message-level stateless design for cloud-native 5G core network6
Protecting the trust and credibility of data by tracking forgery trace based on GANs6
SMDP-based sleep policy for base stations in heterogeneous cellular networks6
An autoencoder-based feature level fusion for speech emotion recognition5
Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG5
Performance analysis of a hybrid optical CDMA/DWDM system against inter-symbol interference and four wave mixing5
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges5
Set pair three-way overlapping community discovery algorithm for weighted social internet of things5
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract5
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework5
A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment5
A simple 2D modulation code in single-reader two-track reading BPMR systems5
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber5
A multi-point collaborative DDoS defense mechanism for IIoT environment5
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT5
Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator5
A malware propagation prediction model based on representation learning and graph convolutional networks5
Network traffic identification in packet sampling environment5
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges5
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems5
Extended context-based semantic communication system for text transmission5
Decentralized content sharing in mobile ad-hoc networks: A survey5
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing5
Review on application progress of federated learning model and security hazard protection5
VRS-DB: preserve confidentiality of users’ data using encryption approach5
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications5
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system5
Game-theoretic physical layer authentication for spoofing detection in internet of things5
Twin delayed deep deterministic policy gradient-based intelligent computation offloading for IoT5
Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks5
The analysis of coverage probability, ASE and EE in heterogeneous ultra-dense networks with power control5
A credibility-aware swarm-federated deep learning framework in internet of vehicles5
Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage5
User scheduling and power allocation for downlink multi-cell multi-carrier NOMA systems5
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers4
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems4
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation4
An ellipse-guided routing algorithm in wireless sensor networks4
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring4
0.03852105140686