Digital Communications and Networks

Papers
(The median citation count of Digital Communications and Networks is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
A novel routing method for dynamic control in distributed computing power networks146
A Security Authentication Scheme for Mobile Industrial IoT Supply Chains Based on Blockchain and Group Key Management141
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems139
Diversified and compatible web APIs recommendation based on game theory in IoT134
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array124
A fast and accurate multi-keyword sorted searchable scheme based on blockchain117
EHKP-Res: An explainable dynamic security solution for medical healthcare117
Semi-supervised learning based hybrid beamforming under time-varying propagation environments117
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications108
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation106
Triangular code: Near-optimal linear time fountain code97
A label noise filtering and label missing supplement framework based on game theory97
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches94
A latency sensitive and agile IIoT architecture with optimized edge node selection and task scheduling88
Networked control with guaranteed performance for IoT rehabilitation robot under nonvanishing uncertainties and input quantization87
DB-FL: DAG blockchain-enabled generalized federated dropout learning79
A relationship-aware mutual learning method for lightweight skin lesion classification79
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach79
Building robust traffic classifier under low quality data: A federated contrastive learning approach78
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects78
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach76
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting75
Network traffic classification: Techniques, datasets, and challenges71
Computing Power Networks for Unmanned Aerial Vehicles: A Hierarchical Resources Trading Market70
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic70
VANETs group message secure forwarding with trust evaluation69
Resource allocation for D2D-assisted haptic communications69
Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method67
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing62
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities62
Shard-DAG: A scalable and secure block-DAG sharding scheme for AI-driven 6G networks60
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems60
Sports match prediction model for training and exercise using attention-based LSTM network60
IoT data analytic algorithms on edge-cloud infrastructure: A review60
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks59
A survey on blockchain-based integrity auditing for cloud data59
Wideband communications through drone-assisted cognitive radio VANETs using SURF channel selection57
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT57
An ensemble deep learning model for cyber threat hunting in industrial internet of things57
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems56
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins55
Editorial Board55
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing54
MEC-based architecture for interoperable and trustworthy internet of moving things53
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT52
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks52
Editorial Board51
Using dummy data for RFID tag and reader authentication49
Autonomous network management for 6G communication: A comprehensive survey49
Design of modified model of intelligent assembly digital twins based on optical fiber sensor network48
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks48
Deep learning aided CSI feedback optimization with robust error recovery48
ExplainableDetector: Exploring transformer-based language modeling approach for SMS spam detection with explainability analysis48
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network47
On the design of an AI-driven secure communication scheme for internet of medical things environment46
A fixed clustering protocol based on random relay strategy for EHWSN45
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction45
A fine-grained intrusion protection system for inter-edge trust transfer44
A multi-dimensional trust attestation solution in 5G-IoT44
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber43
Experience Replay with Cohesive-Subgraph Awareness for Continual Graph Learning in IoT43
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey39
Capacity and delay performance analysis for large-scale UAV-enabled wireless networks38
Multiplex network infomax: Multiplex network embedding via information fusion38
A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization37
Short video preloading via domain knowledge assisted deep reinforcement learning36
Smart all-time vision: The battery-free video communication for urban administration and law enforcement36
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system35
SEAttention-residual based channel estimation for mmWave massive MIMO systems in IoV scenarios34
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks34
Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios34
The DNN-based DBP scheme for nonlinear compensation and longitudinal monitoring of optical fiber links34
Standardised interworking and deployment of IoT and edge computing platforms33
Sum-rate optimization methods and analysis for reconfigurable intelligent surface aided communication system33
Enhancing IoT anomaly detection performance for federated learning31
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology31
Robust resource allocation for NOMA-assisted heterogeneous networks31
Dynamic adversarial jamming-based reinforcement learning for designing constellations31
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing30
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective30
A review of optimization methods for computation offloading in edge computing networks30
Secure monitoring of Internet of vehicles in 6G networks through intelligent reflecting surfaces leveraging AI29
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder29
CMBA-FL: Communication-mitigated and blockchain-assisted federated learning for traffic flow predictions29
Field trial measurement and channel modeling for reconfigurable intelligent surface29
YOLO-SDLUWD: YOLOv7-based small target detection network for infrared images in complex backgrounds28
Spatio-temporal features with global–local transformer model for video scene graph generation28
Low-complexity multi-target localization via multi-BS sensing28
Editorial Board28
Device-edge collaborative occluded face recognition method based on cross-domain feature fusion27
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT27
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT26
Optimization-based mode selection scheme for OAM millimeter wave system in the off-axis misalignment case25
DCETEN: A lightweight ECG automatic classification network based on Transformer model25
Generalized Kennedy receivers enhanced CV-QKD in turbulent channels for endogenous security of space-air-ground integrated network25
Digital twin empowered cooperative trajectory planning of platoon vehicles for collision avoidance with unexpected obstacles25
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation25
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework24
Certificateless threshold signature from lattice24
Secure transmission design for RIS-aided symbiotic radio networks: A DRL approach24
Information theory based clustering of cellular network usage data for the identification of representative urban areas24
Refinement modeling and verification of secure operating systems for communication in digital twins23
Secformer: privacy-preserving atomic-level componentized transformer-like model with MPC23
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques23
Editorial Board23
SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS23
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services22
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing22
Chinese relation extraction for constructing satellite frequency and orbit knowledge graph: A survey22
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks22
Performance comparison of single-carrier and multi-carrier waveforms over terahertz wireless channels22
Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis22
Software defined satellite networks: A survey21
An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm21
UAV-assisted data collection for wireless sensor networks with dynamic working modes21
A digital twin-based quadruped robot system with scene perception, fast communication, and holographic interaction21
Covert wireless communication over uplink satellite-terrestrial network21
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges21
Radio map estimation using a CycleGAN-based learning framework for 6G wireless communication20
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems20
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning20
Smart and collaborative industrial IoT: A federated learning and data space approach20
Hierarchical flow learning for low-light image enhancement19
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks19
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks19
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract19
Scheduling optimization for UAV communication coverage using virtual force-based PSO model19
Classification with ensembles and case study on functional magnetic resonance imaging19
Video Frame Interpolation Based on Invertible Neural Network for Internet of Things19
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process19
Energy minimized joint resource allocation and task offloading with user association for URLLC and eMBB 5G multi-RAT systems19
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT18
Security and privacy in edge computing: a survey of electric vehicles18
DWT-3DRec: DeepJSCC-based wireless transmission for efficient 3D scene reconstruction using CityNeRF18
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks18
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming18
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system17
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling17
DP-Fed6G: An adaptive differential privacy-empowered federated learning framework for 6G networks17
Role of deep learning in cognitive healthcare: Wearable signal analysis, algorithms, benefits, and challenges17
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks17
Resource management at the network edge for federated learning17
A survey of internet of medical things: technology, application and future directions17
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy17
Building an interoperable space for smart agriculture17
Interworking between Modbus and internet of things platform for industrial services17
A compatible carbon efficiency information service framework based on the industrial internet identification16
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things16
Privacy-preserving authentication scheme based on zero trust architecture16
LOS and NLOS identification in real indoor environment using deep learning approach16
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities16
Explainable AI for epileptic seizure detection in Internet of Medical Things16
Factors affecting forensic electric network frequency matching – A comprehensive study16
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection16
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks16
Performance analysis of UAV-based mixed underwater PLC-RF systems16
Adjustable random linear network coding (ARLNC): A solution for data transmission in dynamic IoT computational environments16
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT16
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications16
Editorial Board15
Information freshness optimization of multiple status update streams in Internet of things: Generation rate control and service rate reservation15
Guest editorial15
Energy-optimal DNN model placement in UAV-enabled edge computing networks15
Editorial Board15
Blockchain-based lightweight trusted data interaction scheme for cross-domain IIoT15
A dynamic algorithm for trust inference based on double DQN in the internet of things15
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks15
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates15
Attack-detection and multi-clock source cooperation-based accurate time synchronization for PLC-AIoT in smart parks15
Enhanced multi-agent deep reinforcement learning for efficient task offloading and resource allocation in vehicular networks15
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications15
Application of meta-learning in cyberspace security: a survey15
FedACT: An adaptive chained training approach for federated learning in computing power networks14
Artificial intelligence in physiological characteristics recognition for internet of things authentication14
Low-complexity APSK demodulation algorithm based on K-means clustering in LEO satellite communication systems14
Collaborative learning-based inter-dependent task dispatching and co-location in an integrated edge computing system14
A blockchain-empowered authentication scheme for worm detection in wireless sensor network14
METAseen: analyzing network traffic and privacy policies in Web 3.0 based Metaverse14
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A14
Secure intelligent reflecting surface assisted mobile edge computing system with wireless power transfer14
Secure ticket-based authentication method for IoT applications14
Adaptive optimal consensus over networked multi-agent systems: A digital signal-driven hybrid iteration approach13
Temporal pattern mining from user-generated content13
Intelligent reflecting surface-assisted cognitive radio-inspired rate-splitting multiple access systems13
Digital compass for multi-user beam access in mmWave cellular networks13
F-norm based low-power motion recognition on wearable devices in the presence of outlier motions12
Deep reinforcement learning-based forwarding node selection algorithm in Internet of vehicles12
ICS-SVM: A user retweet prediction method for hot topics based on improved SVM12
Privacy-preserving computation meets quantum computing: A scoping review12
Rate distortion optimization for adaptive gradient quantization in federated learning12
Resilient task offloading in integrated satellite-terrestrial networks with mobility-induced variability12
Deep reinforcement learning-based spectrum resource allocation for the web of healthcare things with massive integrating wearable gadgets12
High-throughput SatCom-on-the-move antennas: Technical overview and state-of-the-art12
Generalized spatial modulation detector assisted by reconfigurable intelligent surface based on deep learning12
Editorial Board12
Large models based high-fidelity voice services over 6G narrowband non-terrestrial networks12
A blockchain-based anonymous and regulated e-taxing protocol for art trading12
A framework for locating multiple RFID tags using RF hologram tensors12
Data driven vehicular heterogeneity based intelligent collision avoidance system for Internet of Vehicles (IoV)12
Hybrid millimeter wave heterogeneous networks with spatially correlated user equipment11
Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks11
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT11
Multi-layer network embedding on scc-based network with motif11
Peak shrinking and interpolating for PAPR reduction in M-IFoF-based mobile fronthaul11
Editorial Board11
A survey on user-centric cell-free massive MIMO systems11
Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions11
A new adaptive co-site broadband interference cancellation method with auxiliary channel11
Opportunistic admission and resource allocation for slicing enhanced IoT networks11
Joint user association and cooperative beamforming for multi-IRSs aided mmWave communication systems11
A survey on blockchain-enabled federated learning and its prospects with digital twin11
EdgeAIGC: Model caching and resource allocation for edge artificial intelligence generated content10
Editorial Board10
An intelligent active probing and trace-back scheme for IoT anomaly detection10
Double-side delay alignment modulation for multi-user millimeter wave and terahertz communications10
Mitigating Blockchain Extractable Value threats by Distributed Transaction Sequencing Strategy10
GCN and DRL based on dependent task offloading mechanism in edge computing10
DRL-based federated self-supervised learning for task offloading and resource allocation in ISAC-enabled vehicle edge computing10
Secure transmission for uplink MIMO-OFDM IoT systems: time-domain artificial noise and deep reinforcement learning against intelligent eavesdroppers10
UAV-assisted MEC offloading strategy with peak AOI boundary optimization: A method based on DDQN10
On fine-grained visual explanation in convolutional neural networks10
Distributed service caching with deep reinforcement learning for sustainable edge computing in large-scale AI10
Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives10
PEPFL: A framework for a practical and efficient privacy-preserving federated learning10
Erratum to “A robust beam tracking scheme for millimeter wave HetNets” [Digit. Commun. Network. 8 (6) (2022) 1115–1121]10
AdaptNF: Adaptive service chain scheduling with stateless migration and NF consolidation10
UAV-assisted full-duplex ISAC: Joint communication scheduling, beamforming, and trajectory optimization10
RADAR: a rapid discovery algorithm for routes in SDN-based IoV9
Cybertwin driven resource allocation using optimized proximal policy based federated learning in 6G enabled edge environment9
C-privacy: A social relationship-driven image customization sharing method in cyber-physical networks9
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things9
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities9
Public integrity verification for data sharing in cloud with asynchronous revocation9
Index modulation aided generalized space-time block coding: A unified MIMO framework9
Strengthening network slicing for Industrial Internet with deep reinforcement learning9
CPFinder: Finding an unknown caller's profession from anonymized mobile phone data9
Editorial Board9
DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet9
Editorial Board9
Game-theoretic physical layer authentication for spoofing detection in internet of things9
Dynamic defenses in cyber security: Techniques, methods and challenges9
SCIM: Incorporating secure communication and interference management in one operation9
A survey on deploying mobile deep learning applications: A systemic and technical perspective9
Observer-based event-triggered networked multi-drives speed consensus9
Reinforcement learning-enabled swarm intelligence method for computation task offloading in Internet-of-Things blockchain9
A deep learning driven hybrid beamforming method for millimeter wave MIMO system8
Statistical energy consumption analysis and optimization for relaying transmission with wireless power transfer8
A malware propagation prediction model based on representation learning and graph convolutional networks8
Automatic collaborative water surface coverage and cleaning strategy of UAV and USVs8
Multi-agent reinforcement learning for edge information sharing in vehicular networks8
0.1154158115387