Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Performance analysis and comparison of PoW, PoS and DAG based blockchains168
Attacks and defences on intelligent connected vehicles: a survey123
Privacy preservation in permissionless blockchain: A survey114
A survey on deep learning for textual emotion analysis in social networks88
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions75
A survey on user-centric cell-free massive MIMO systems72
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks71
Towards asynchronous federated learning for heterogeneous edge-powered internet of things68
An ensemble deep learning model for cyber threat hunting in industrial internet of things62
An intelligent task offloading algorithm (iTOA) for UAV edge computing network58
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey58
A blockchain-empowered AAA scheme in the large-scale HetNet57
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT57
A survey on communication protocols and performance evaluations for Internet of Things56
A survey on deploying mobile deep learning applications: A systemic and technical perspective52
Machine learning-based real-time visible fatigue crack growth detection51
Security and privacy issues of physical objects in the IoT: Challenges and opportunities49
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine47
Deep learning for the internet of things: Potential benefits and use-cases47
A review of optimization methods for computation offloading in edge computing networks46
Machine learning-based zero-touch network and service management: a survey45
Feature extraction for machine learning-based intrusion detection in IoT networks44
A new technology perspective of the Metaverse: Its essence, framework and challenges44
Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks44
A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance44
Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities44
A new adaptive co-site broadband interference cancellation method with auxiliary channel42
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology42
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks42
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN42
Dynamic defenses in cyber security: Techniques, methods and challenges40
Help from space: grant-free massive access for satellite-based IoT in the 6G era40
Research advances on blockchain-as-a-service: architectures, applications and challenges38
Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications37
Network traffic classification: Techniques, datasets, and challenges36
Intrusion detection and prevention system for an IoT environment35
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles35
Capability-based IoT access control using blockchain35
Identifying influential nodes in social networks via community structure and influence distribution difference34
A notary group-based cross-chain mechanism34
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions33
An enhanced scheme for mutual authentication for healthcare services33
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes33
Internet of things: Conceptual network structure, main challenges and future directions33
Machine learning in vehicular networking: An overview33
A survey on blockchain-based integrity auditing for cloud data33
Safeguarding cross-silo federated learning with local differential privacy32
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic32
Entropy-based redundancy analysis and information screening32
Enhancing IoT anomaly detection performance for federated learning32
Smart contract token-based privacy-preserving access control system for industrial Internet of Things32
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction30
Building an interoperable space for smart agriculture30
Green indoor optical wireless communication systems: Pathway towards pervasive deployment30
Robot and its living space: A roadmap for robot development based on the view of living space28
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities28
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution28
Software defined satellite networks: A survey28
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation28
The detection method of low-rate DoS attack based on multi-feature fusion27
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine27
An efficient data aggregation scheme with local differential privacy in smart grid26
Can blockchain link the future?25
Visually meaningful image encryption algorithm based on digital signature25
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects25
Fooling intrusion detection systems using adversarially autoencoder25
Smart and collaborative industrial IoT: A federated learning and data space approach24
Video transcoding for adaptive bitrate streaming over edge-cloud continuum24
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network24
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles24
Sports match prediction model for training and exercise using attention-based LSTM network23
Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse22
Blockchain-based data transmission control for Tactical Data Link22
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation22
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks22
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks22
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting22
Petahertz communication: Harmonizing optical spectra for wireless communications22
FedCDR: Privacy-preserving federated cross-domain recommendation22
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection21
A blockchain-empowered authentication scheme for worm detection in wireless sensor network21
Edge robotics: are we ready? an experimental evaluation of current vision and future directions21
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder21
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks20
Task offloading mechanism based on federated reinforcement learning in mobile edge computing20
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element19
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things19
Enhancing the robustness of object detection via 6G vehicular edge computing19
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network18
User location privacy protection mechanism for location-based services18
A secure spectrum auction scheme without the trusted party based on the smart contract18
A blockchain-based audit approach for encrypted data in federated learning18
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems18
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing18
Adversarial attacks and defenses for digital communication signals identification18
Toward intelligent wireless communications: Deep learning - based physical layer technologies17
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks17
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems17
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network17
Towards improving detection performance for malware with a correntropy-based deep learning method17
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities17
Multi-objective optimization for task offloading based on network calculus in fog environments17
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications17
IRS-enabled NOMA communication systems: A network architecture primer with future trends and challenges16
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services16
Accurate threat hunting in industrial internet of things edge devices16
N-gram MalGAN: Evading machine learning detection via feature n-gram16
Multi-agent reinforcement learning for edge information sharing in vehicular networks16
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack15
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems15
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective15
Application of meta-learning in cyberspace security: a survey15
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach15
Adaptive multi-channel Bayesian graph attention network for IoT transaction security15
3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization15
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing15
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing15
Capacity maximizing in massive MIMO with linear precoding for SSF and LSF channel with perfect CSI15
Directional neighbor discovery in mmWave wireless networks15
DroidEnemy: Battling adversarial example attacks for Android malware detection15
Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions14
A fixed clustering protocol based on random relay strategy for EHWSN14
ICS-SVM: A user retweet prediction method for hot topics based on improved SVM14
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home14
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing14
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G14
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks14
Smart object recommendation based on topic learning and joint features in the social internet of things13
Image analysis and machine learning-based malaria assessment system13
EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks13
An efficient resource optimization scheme for D2D communication13
Information mining and similarity computation for semi- / un-structured sentences from the social data13
Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU13
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities13
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications12
Generating routes for autonomous driving in vehicle-to-infrastructure communications12
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy12
Design and optimization of an integrated MEMS gas chamber with high transmissivity12
FedRec: Trusted rank-based recommender scheme for service provisioning in federated cloud environment12
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group12
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning12
A geographic routing protocol based on trunk line in VANETs12
A novel nest-based scheduling method for mobile wireless body area networks12
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things12
Splitting and placement of data-intensive applications with machine learning for power system in cloud computing12
RFID-based 3D human pose tracking: A subject generalization approach11
UAV-supported intelligent truth discovery to achieve low-cost communications in mobile crowd sensing11
A multi-point collaborative DDoS defense mechanism for IIoT environment11
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks11
Efficient pipelined flow classification for intelligent data processing in IoT11
Clustering-based label estimation for network anomaly detection11
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks11
Robust resource allocation for NOMA-assisted heterogeneous networks11
An autoencoder-based feature level fusion for speech emotion recognition11
Theoretical analysis and comparison of OAM waves generated by three kinds of antenna array11
Performance evaluation of a two-way relay network with energy harvesting and hardware noises10
A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment10
A credibility-aware swarm-federated deep learning framework in internet of vehicles10
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network10
Time to forge ahead: The Internet of Things for healthcare10
Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing10
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates10
Substring-searchable attribute-based encryption and its application for IoT devices10
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract10
Semantic segmentation-based semantic communication system for image transmission10
Unintentional forking analysis in wireless blockchain networks10
On the design of an AI-driven secure communication scheme for internet of medical things environment10
Public integrity verification for data sharing in cloud with asynchronous revocation10
0.049179077148438