Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches126
Editorial Board111
A measurable refinement method of design and verification for micro-kernel operating systems in communication network97
Video Frame Interpolation Based on Invertible Neural Network for Internet of Things94
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling86
An ellipse-guided routing algorithm in wireless sensor networks84
Editorial Board80
Observer-based event-triggered networked multi-drives speed consensus79
Classification with ensembles and case study on functional magnetic resonance imaging79
Editorial Board77
Editorial Board74
Prototyping low-cost automatic weather stations for natural disaster monitoring73
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges67
Resource management at the network edge for federated learning66
Index modulation aided generalized space-time block coding: A unified MIMO framework65
Swarm learning anomaly detection framework for cloud data center using multi-channel BiWGAN-GTN and CEEMDAN64
Sparse graph neural network aided efficient decoder for polar codes under bursty interference64
A novel routing method for dynamic control in distributed computing power networks64
Information mining and similarity computation for semi- / un-structured sentences from the social data63
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things60
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities59
SCIM: Incorporating secure communication and interference management in one operation59
A secure visual framework for multi-index protection evaluation in networks59
DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet58
Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections56
Position-aware packet loss optimization on service function chain placement54
Monte-Carlo based random passive energy beamforming for reconfigurable intelligent surface assisted wireless power transfer54
Game-theoretic physical layer authentication for spoofing detection in internet of things53
A fast and accurate multi-keyword sorted searchable scheme based on blockchain51
A reconstruction and recovery network-based channel estimation in high-speed railway wireless communications50
DB-FL: DAG blockchain-enabled generalized federated dropout learning50
Location privacy protection of maritime mobile terminals49
NPO-BAND: Number and placement optimization for backhaul-aware UAV network deployment49
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI49
An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT49
Research on data load balancing technology of massive storage systems for wearable devices47
A label noise filtering and label missing supplement framework based on game theory47
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks46
Triangular code: Near-optimal linear time fountain code46
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks45
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach44
Semantic framework of event detection in emergency situations for smart buildings43
Reinforcement learning-enabled swarm intelligence method for computation task offloading in Internet-of-Things blockchain43
Adversarial attacks and defenses for digital communication signals identification42
Path planning of autonomous underwater vehicle for data collection of the internet of everything42
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home41
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group41
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system40
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming40
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems39
Hierarchical flow learning for low-light image enhancement39
Alamouti code based on block repetition in FBMC/OQAM systems38
Semi-supervised learning based hybrid beamforming under time-varying propagation environments38
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things38
CPFinder: Finding an unknown caller's profession from anonymized mobile phone data37
Substring-searchable attribute-based encryption and its application for IoT devices35
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks34
Security and privacy issues of physical objects in the IoT: Challenges and opportunities34
A novel deviation measurement for scheduled intelligent transportation system via comparative spatial-temporal path networks34
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers34
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring33
Interworking between Modbus and internet of things platform for industrial services33
Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN33
RADAR: a rapid discovery algorithm for routes in SDN-based IoV33
Multi-class Bitcoin mixing service identification based on graph classification33
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process32
A blockchain-based audit approach for encrypted data in federated learning30
Sum rate maximization in UAV-assisted data harvesting network supported by CF-mMIMO system exploiting statistical CSI30
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications30
AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks29
Game theory attack pricing for mining pools in blockchain-based IoT28
Enhancing flexibility and system performance in 6G and beyond: A user-based numerology and waveform approach28
Diversified and compatible web APIs recommendation based on game theory in IoT27
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach27
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting26
Game theory in network security for digital twins in industry26
CARS: connection as required scheme for horizontal communications in Industry 4.025
A pipelining task offloading strategy via delay-aware multi-agent reinforcement learning in Cybertwin-enabled 6G network25
EHKP-Res: An explainable dynamic security solution for medical healthcare25
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy25
Block-gram: Mining knowledgeable features for efficiently smart contract vulnerability detection25
A survey of internet of medical things: technology, application and future directions25
8K Ultra HD TV broadcast system: Challenge, architecture and implementation25
Building an interoperable space for smart agriculture24
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine24
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT24
Environment-aware streaming media transmission method in high-speed mobile networks23
Preamble slice orderly queue access scheme in cell-free dense communication systems23
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks23
Public integrity verification for data sharing in cloud with asynchronous revocation22
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN22
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks22
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks22
Video transcoding for adaptive bitrate streaming over edge-cloud continuum22
A notary group-based cross-chain mechanism22
Trust-based co-operative routing for secure communication in mobile ad hoc networks21
Latency minimization for multiuser computation offloading in fog-radio access networks21
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems21
A relationship-aware mutual learning method for lightweight skin lesion classification21
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects20
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation20
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities20
Hadoop-based secure storage solution for big data in cloud computing environment20
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G19
Network traffic identification in packet sampling environment19
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles19
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array19
Capability-based IoT access control using blockchain19
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic18
Design and analysis of intrusion detection systems for wireless mesh networks18
Privacy preservation in permissionless blockchain: A survey18
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles18
Network traffic classification: Techniques, datasets, and challenges18
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems18
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI18
Security analysis and secured access design for networks of image remote sensing17
Protecting the trust and credibility of data by tracking forgery trace based on GANs17
Joint alignment and steering to manage interference17
An efficient resource optimization scheme for D2D communication17
Deep learning aided underwater acoustic OFDM receivers: Model-driven or data-driven?17
Resource allocation for D2D-assisted haptic communications17
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions17
Digital twin empowered lightweight and efficient blockchain for dynamic internet of vehicles16
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach16
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation16
A malware propagation prediction model based on representation learning and graph convolutional networks16
Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment16
Adjustable random linear network coding (ARLNC): a solution for data transmission in dynamic IoT computational environments16
Handover management in beyond 5g hetnet topologies with unbalanced user distribution16
Towards improving detection performance for malware with a correntropy-based deep learning method16
Potential friendship discovery in social networks based on hybrid ensemble multiple collaborative filtering models in a 5G network environment15
Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model15
Auction-based profit maximization offloading in mobile edge computing15
User location privacy protection mechanism for location-based services15
Task offloading mechanism based on federated reinforcement learning in mobile edge computing15
Secure data rate maximization for full-duplex UAV-enabled base station15
Image analysis and machine learning-based malaria assessment system14
Lightweight Consensus Mechanisms in the Internet of Blockchained Things: Thorough Analysis and Research Directions14
A compatible carbon efficiency information service framework based on the industrial internet identification14
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach14
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks14
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare14
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT14
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing14
OAM mode purity improvement based on antenna array13
From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs13
Privacy-preserving authentication scheme based on zero trust architecture13
Runtime reconfiguration of data services for dealing with out-of-range stream fluctuation in cloud-edge environments13
Research on encoding and decoding of non-binary polar codes over GF(2 )13
An improved pulse coupled neural networks model for semantic IoT13
Factors affecting forensic electric network frequency matching – A comprehensive study13
A highly reliable encoding and decoding communication framework based on semantic information13
UTM: A trajectory privacy evaluating model for online health monitoring13
Dynamics modeling and optimal control for multi-information diffusion in Social Internet of Things13
Heterogeneous radio frequency/underwater optical wireless communication relaying systems with MIMO scheme13
Automatic collaborative water surface coverage and cleaning strategy of UAV and USVs12
LOS and NLOS identification in real indoor environment using deep learning approach12
Intelligent sitting postural anomaly detection system for wheelchair users with unsupervised techniques12
Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring12
Performance analysis of UAV-based mixed underwater PLC-RF systems12
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system12
0.23907589912415