Digital Communications and Networks

Papers
(The median citation count of Digital Communications and Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Performance analysis and comparison of PoW, PoS and DAG based blockchains168
Attacks and defences on intelligent connected vehicles: a survey123
Privacy preservation in permissionless blockchain: A survey114
A survey on deep learning for textual emotion analysis in social networks88
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions75
A survey on user-centric cell-free massive MIMO systems72
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks71
Towards asynchronous federated learning for heterogeneous edge-powered internet of things68
An ensemble deep learning model for cyber threat hunting in industrial internet of things62
An intelligent task offloading algorithm (iTOA) for UAV edge computing network58
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey58
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT57
A blockchain-empowered AAA scheme in the large-scale HetNet57
A survey on communication protocols and performance evaluations for Internet of Things56
A survey on deploying mobile deep learning applications: A systemic and technical perspective52
Machine learning-based real-time visible fatigue crack growth detection51
Security and privacy issues of physical objects in the IoT: Challenges and opportunities49
Deep learning for the internet of things: Potential benefits and use-cases47
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine47
A review of optimization methods for computation offloading in edge computing networks46
Machine learning-based zero-touch network and service management: a survey45
Feature extraction for machine learning-based intrusion detection in IoT networks44
A new technology perspective of the Metaverse: Its essence, framework and challenges44
Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks44
A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance44
Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities44
A new adaptive co-site broadband interference cancellation method with auxiliary channel42
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology42
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks42
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN42
Dynamic defenses in cyber security: Techniques, methods and challenges40
Help from space: grant-free massive access for satellite-based IoT in the 6G era40
Research advances on blockchain-as-a-service: architectures, applications and challenges38
Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications37
Network traffic classification: Techniques, datasets, and challenges36
Intrusion detection and prevention system for an IoT environment35
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles35
Capability-based IoT access control using blockchain35
Identifying influential nodes in social networks via community structure and influence distribution difference34
A notary group-based cross-chain mechanism34
An enhanced scheme for mutual authentication for healthcare services33
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes33
Internet of things: Conceptual network structure, main challenges and future directions33
Machine learning in vehicular networking: An overview33
A survey on blockchain-based integrity auditing for cloud data33
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions33
Entropy-based redundancy analysis and information screening32
Enhancing IoT anomaly detection performance for federated learning32
Smart contract token-based privacy-preserving access control system for industrial Internet of Things32
Safeguarding cross-silo federated learning with local differential privacy32
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic32
Building an interoperable space for smart agriculture30
Green indoor optical wireless communication systems: Pathway towards pervasive deployment30
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction30
Robot and its living space: A roadmap for robot development based on the view of living space28
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities28
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution28
Software defined satellite networks: A survey28
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation28
The detection method of low-rate DoS attack based on multi-feature fusion27
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine27
An efficient data aggregation scheme with local differential privacy in smart grid26
Can blockchain link the future?25
Visually meaningful image encryption algorithm based on digital signature25
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects25
Fooling intrusion detection systems using adversarially autoencoder25
Smart and collaborative industrial IoT: A federated learning and data space approach24
Video transcoding for adaptive bitrate streaming over edge-cloud continuum24
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network24
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles24
Sports match prediction model for training and exercise using attention-based LSTM network23
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation22
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks22
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks22
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting22
Petahertz communication: Harmonizing optical spectra for wireless communications22
FedCDR: Privacy-preserving federated cross-domain recommendation22
Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse22
Blockchain-based data transmission control for Tactical Data Link22
A blockchain-empowered authentication scheme for worm detection in wireless sensor network21
Edge robotics: are we ready? an experimental evaluation of current vision and future directions21
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder21
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection21
Task offloading mechanism based on federated reinforcement learning in mobile edge computing20
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks20
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element19
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things19
Enhancing the robustness of object detection via 6G vehicular edge computing19
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems18
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing18
Adversarial attacks and defenses for digital communication signals identification18
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network18
User location privacy protection mechanism for location-based services18
A secure spectrum auction scheme without the trusted party based on the smart contract18
A blockchain-based audit approach for encrypted data in federated learning18
Multi-objective optimization for task offloading based on network calculus in fog environments17
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications17
Toward intelligent wireless communications: Deep learning - based physical layer technologies17
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks17
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems17
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network17
Towards improving detection performance for malware with a correntropy-based deep learning method17
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities17
N-gram MalGAN: Evading machine learning detection via feature n-gram16
Multi-agent reinforcement learning for edge information sharing in vehicular networks16
IRS-enabled NOMA communication systems: A network architecture primer with future trends and challenges16
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services16
Accurate threat hunting in industrial internet of things edge devices16
Capacity maximizing in massive MIMO with linear precoding for SSF and LSF channel with perfect CSI15
Directional neighbor discovery in mmWave wireless networks15
DroidEnemy: Battling adversarial example attacks for Android malware detection15
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack15
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems15
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective15
Application of meta-learning in cyberspace security: a survey15
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach15
Adaptive multi-channel Bayesian graph attention network for IoT transaction security15
3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization15
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing15
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing15
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing14
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G14
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks14
Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions14
A fixed clustering protocol based on random relay strategy for EHWSN14
ICS-SVM: A user retweet prediction method for hot topics based on improved SVM14
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home14
Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU13
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities13
Smart object recommendation based on topic learning and joint features in the social internet of things13
Image analysis and machine learning-based malaria assessment system13
EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks13
An efficient resource optimization scheme for D2D communication13
Information mining and similarity computation for semi- / un-structured sentences from the social data13
A novel nest-based scheduling method for mobile wireless body area networks12
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things12
Splitting and placement of data-intensive applications with machine learning for power system in cloud computing12
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications12
Generating routes for autonomous driving in vehicle-to-infrastructure communications12
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy12
Design and optimization of an integrated MEMS gas chamber with high transmissivity12
FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment12
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group12
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning12
A geographic routing protocol based on trunk line in VANETs12
Robust resource allocation for NOMA-assisted heterogeneous networks11
An autoencoder-based feature level fusion for speech emotion recognition11
Theoretical analysis and comparison of OAM waves generated by three kinds of antenna array11
RFID-based 3D human pose tracking: A subject generalization approach11
UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing11
A multi-point collaborative DDoS defense mechanism for IIoT environment11
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks11
Efficient pipelined flow classification for intelligent data processing in IoT11
Clustering-based label estimation for network anomaly detection11
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks11
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract10
Semantic segmentation-based semantic communication system for image transmission10
Unintentional forking analysis in wireless blockchain networks10
On the design of an AI-driven secure communication scheme for internet of medical things environment10
Public integrity verification for data sharing in cloud with asynchronous revocation10
Performance evaluation of a two-way relay network with energy harvesting and hardware noises10
A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment10
A credibility-aware swarm-federated deep learning framework in internet of vehicles10
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network10
Time to forge ahead: The Internet of Things for healthcare10
Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing10
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates10
Substring-searchable attribute-based encryption and its application for IoT devices10
SMDP-based sleep policy for base stations in heterogeneous cellular networks9
Deep learning for joint channel estimation and feedback in massive MIMO systems9
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber9
User scheduling and power allocation for downlink multi-cell multi-carrier NOMA systems9
An Ethereum-based solution for energy trading in smart grids9
AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks9
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G9
ED-SWE: Event detection based on scoring and word embedding in online social networks for the internet of people9
Jointly optimizing user clustering, power management, and wireless channel allocation for NOMA-based Internet of Things9
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection9
Prototyping low-cost automatic weather stations for natural disaster monitoring9
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks9
Generative adversarial network-based atmospheric scattering model for image dehazing9
Comparing the efficiency of artificial neural networks in sEMG-based simultaneous and continuous estimation of hand kinematics9
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach9
A survey on semantic communications: Technologies, solutions, applications and challenges8
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation8
A survey on blockchain-enabled federated learning and its prospects with digital twin8
Secure K-Nearest neighbor queries in two-tiered mobile wireless sensor networks8
Review on application progress of federated learning model and security hazard protection8
Joint offloading decision and resource allocation in vehicular edge computing networks8
Hadoop-based secure storage solution for big data in cloud computing environment8
A comprehensive survey on Segment Routing Traffic Engineering8
Information security through controlled quantum teleportation networks8
ML-SLD: A message-level stateless design for cloud-native 5G core network8
Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment8
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges8
Applying blockchain-based method to smart contract classification for CPS applications8
Depressive semantic awareness from vlog facial and vocal streams via spatio-temporal transformer8
UAV-assisted cooperative offloading energy efficiency system for mobile edge computing8
UAV-assisted data collection for wireless sensor networks with dynamic working modes7
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges7
T2L: A traceable and trustable consortium blockchain for logistics7
A broad learning-based comprehensive defence against SSDP reflection attacks in IoTs7
A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism7
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system7
Game-theoretic physical layer authentication for spoofing detection in internet of things7
Classification with ensembles and case study on functional magnetic resonance imaging7
Twin delayed deep deterministic policy gradient-based intelligent computation offloading for IoT7
Big data in healthcare: Conceptual network structure, key challenges and opportunities7
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework7
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing7
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications7
Protecting the trust and credibility of data by tracking forgery trace based on GANs7
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach7
Resource management at the network edge for federated learning7
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems7
Towards reinforcement learning in UAV relay for anti-jamming maritime communications7
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective7
Deep radio signal clustering with interpretability analysis based on saliency map7
Request pattern change-based cache pollution attack detection and defense in edge computing7
UTM: A trajectory privacy evaluating model for online health monitoring7
Design and analysis of intrusion detection systems for wireless mesh networks7
Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks6
The analysis of coverage probability, ASE and EE in heterogeneous ultra-dense networks with power control6
A mobility compensation method for drones in SG-eIoT6
Privacy-preserving authentication scheme based on zero trust architecture6
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT6
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system6
Extended context-based semantic communication system for text transmission6
Decentralized content sharing in mobile ad-hoc networks: A survey6
Field trial measurement and channel modeling for reconfigurable intelligent surface6
A deep learning driven hybrid beamforming method for millimeter wave MIMO system6
Automatic collaborative water surface coverage and cleaning strategy of UAV and USVs6
Alamouti code based on block repetition in FBMC/OQAM systems6
Graph neural network-based scheduling for multi-UAV-enabled communications in D2D networks6
METAseen: Analyzing network traffic and privacy policies in Web 3.0 based Metaverse6
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems6
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare6
Game theory in network security for digital twins in industry6
Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator5
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things5
Interworking between Modbus and internet of things platform for industrial services5
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers5
Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG5
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems5
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring5
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach5
Performance analysis of a hybrid optical CDMA/DWDM system against inter-symbol interference and four wave mixing5
A label noise filtering and label missing supplement framework based on game theory5
Network traffic identification in packet sampling environment5
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications5
0.049436807632446