Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
A systematic literature review of blockchain cyber security362
Security and privacy in 6G networks: New areas and new challenges198
A survey of edge computing-based designs for IoT security164
A new type of blockchain for secure message exchange in VANET160
Performance analysis and comparison of PoW, PoS and DAG based blockchains149
Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching131
Tracing manufacturing processes using blockchain-based token compositions123
Blockchain-enabled resource management and sharing for 6G communications116
Privacy preservation in permissionless blockchain: A survey101
Attacks and defences on intelligent connected vehicles: a survey96
Recent advances in mobile edge computing and content caching72
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions60
Intent-based networks for 6G: Insights and challenges60
A survey on deep learning for textual emotion analysis in social networks58
Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies57
A blockchain-empowered AAA scheme in the large-scale HetNet57
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks53
Towards asynchronous federated learning for heterogeneous edge-powered internet of things47
An intelligent task offloading algorithm (iTOA) for UAV edge computing network46
A survey on user-centric cell-free massive MIMO systems46
Security and privacy issues of physical objects in the IoT: Challenges and opportunities44
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey40
Entropy-based redundancy analysis and information screening39
Deep learning for the internet of things: Potential benefits and use-cases39
Machine learning-based real-time visible fatigue crack growth detection38
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology37
A survey on communication protocols and performance evaluations for Internet of Things37
A new adaptive co-site broadband interference cancellation method with auxiliary channel37
A survey on deploying mobile deep learning applications: A systemic and technical perspective36
Analysis of identifiers in IoT platforms35
Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities35
A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance33
Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks33
Machine learning-based zero-touch network and service management: a survey32
Help from space: grant-free massive access for satellite-based IoT in the 6G era32
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks32
Joint resource allocation for hybrid NOMA-assisted MEC in 6G networks29
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN29
Feature extraction for machine learning-based intrusion detection in IoT networks29
An ensemble deep learning model for cyber threat hunting in industrial internet of things29
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT29
Capability-based IoT access control using blockchain29
A review of optimization methods for computation offloading in edge computing networks28
Robot and its living space: A roadmap for robot development based on the view of living space27
Research advances on blockchain-as-a-service: architectures, applications and challenges27
An enhanced scheme for mutual authentication for healthcare services27
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution26
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction25
Identifying influential nodes in social networks via community structure and influence distribution difference25
A survey on blockchain-based integrity auditing for cloud data25
Green indoor optical wireless communication systems: Pathway towards pervasive deployment25
Dynamic defenses in cyber security: Techniques, methods and challenges24
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles24
Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications24
Enhancing IoT anomaly detection performance for federated learning24
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation23
Safeguarding cross-silo federated learning with local differential privacy23
Intrusion detection and prevention system for an IoT environment23
Machine learning in vehicular networking: An overview22
The detection method of low-rate DoS attack based on multi-feature fusion22
Smart contract token-based privacy-preserving access control system for industrial Internet of Things22
Blockchain-based data transmission control for Tactical Data Link22
Network traffic classification: Techniques, datasets, and challenges22
Building an interoperable space for smart agriculture21
Can blockchain link the future?21
A new technology perspective of the Metaverse: Its essence, framework and challenges21
Video transcoding for adaptive bitrate streaming over edge-cloud continuum20
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation20
Fooling intrusion detection systems using adversarially autoencoder20
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine20
An efficient data aggregation scheme with local differential privacy in smart grid20
A notary group-based cross-chain mechanism19
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions19
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks18
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities18
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection18
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic18
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks18
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes17
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network17
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects17
Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse16
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing16
Internet of things: Conceptual network structure, main challenges and future directions16
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems15
Sports match prediction model for training and exercise using attention-based LSTM network15
User location privacy protection mechanism for location-based services15
Software defined satellite networks: A survey15
A blockchain-empowered authentication scheme for worm detection in wireless sensor network15
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things15
Accurate threat hunting in industrial internet of things edge devices14
FedCDR: Privacy-preserving federated cross-domain recommendation14
Visually meaningful image encryption algorithm based on digital signature14
A secure spectrum auction scheme without the trusted party based on the smart contract14
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine14
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles14
N-gram MalGAN: Evading machine learning detection via feature n-gram14
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks14
Multi-agent reinforcement learning for edge information sharing in vehicular networks14
Capacity maximizing in massive MIMO with linear precoding for SSF and LSF channel with perfect CSI14
Enhancing the robustness of object detection via 6G vehicular edge computing13
Edge robotics: are we ready? an experimental evaluation of current vision and future directions13
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing13
Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU13
Distributed privacy protection strategy for MEC enhanced wireless body area networks13
Towards improving detection performance for malware with a correntropy-based deep learning method13
3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization13
Petahertz communication: Harmonizing optical spectra for wireless communications13
Adversarial attacks and defenses for digital communication signals identification13
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network12
Application of meta-learning in cyberspace security: a survey12
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing12
On recommendation-aware content caching for 6G: An artificial intelligence and optimization empowered paradigm12
A novel nest-based scheduling method for mobile wireless body area networks12
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting12
Toward intelligent wireless communications: Deep learning - based physical layer technologies12
Multi-objective optimization for task offloading based on network calculus in fog environments12
Generating routes for autonomous driving in vehicle-to-infrastructure communications12
Information mining and similarity computation for semi- / un-structured sentences from the social data12
The effect of propagation delay on the dynamic evolution of the Bitcoin blockchain11
EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks11
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities11
Smart and collaborative industrial IoT: A federated learning and data space approach11
Design and optimization of an integrated MEMS gas chamber with high transmissivity11
A blockchain-based audit approach for encrypted data in federated learning11
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing11
Directional neighbor discovery in mmWave wireless networks11
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective10
Splitting and placement of data-intensive applications with machine learning for power system in cloud computing10
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder10
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks10
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks10
Performance evaluation of a two-way relay network with energy harvesting and hardware noises10
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services10
ICS-SVM: A user retweet prediction method for hot topics based on improved SVM10
A fixed clustering protocol based on random relay strategy for EHWSN10
DroidEnemy: Battling adversarial example attacks for Android malware detection10
Self-healing and SDN: bridging the gap10
Adaptive multi-channel Bayesian graph attention network for IoT transaction security10
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network10
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications10
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks10
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home10
A comprehensive survey on Segment Routing Traffic Engineering9
Clustering-based label estimation for network anomaly detection9
Jointly optimizing user clustering, power management, and wireless channel allocation for NOMA-based Internet of Things9
Substring-searchable attribute-based encryption and its application for IoT devices9
Public integrity verification for data sharing in cloud with asynchronous revocation9
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network9
RFID-based 3D human pose tracking: A subject generalization approach9
Robust resource allocation for NOMA-assisted heterogeneous networks9
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element9
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group9
A survey on blockchain-enabled federated learning and its prospects with digital twin9
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G9
Unintentional forking analysis in wireless blockchain networks9
Image analysis and machine learning-based malaria assessment system9
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things9
0.031086206436157