Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 14. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
A novel routing method for dynamic control in distributed computing power networks137
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach136
A Security Authentication Scheme for Mobile Industrial IoT Supply Chains Based on Blockchain and Group Key Management132
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems131
Diversified and compatible web APIs recommendation based on game theory in IoT122
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array116
EHKP-Res: An explainable dynamic security solution for medical healthcare114
A fast and accurate multi-keyword sorted searchable scheme based on blockchain112
Semi-supervised learning based hybrid beamforming under time-varying propagation environments105
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach101
Networked control with guaranteed performance for IoT rehabilitation robot under nonvanishing uncertainties and input quantization97
DB-FL: DAG blockchain-enabled generalized federated dropout learning96
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications91
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation87
Triangular code: Near-optimal linear time fountain code81
A label noise filtering and label missing supplement framework based on game theory77
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches77
A relationship-aware mutual learning method for lightweight skin lesion classification76
Building robust traffic classifier under low quality data: A federated contrastive learning approach76
A latency sensitive and agile IIoT architecture with optimized edge node selection and task scheduling75
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting74
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects71
Network traffic classification: Techniques, datasets, and challenges70
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic69
Computing Power Networks for Unmanned Aerial Vehicles: A Hierarchical Resources Trading Market69
Resource allocation for D2D-assisted haptic communications68
Shard-DAG: A scalable and secure block-DAG sharding scheme for AI-driven 6G networks68
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities62
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing60
Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method59
VANETs group message secure forwarding with trust evaluation59
A survey on blockchain-based integrity auditing for cloud data58
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems58
IoT data analytic algorithms on edge-cloud infrastructure: A review57
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT57
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks57
Sports match prediction model for training and exercise using attention-based LSTM network57
Wideband communications through drone-assisted cognitive radio VANETs using SURF channel selection56
An ensemble deep learning model for cyber threat hunting in industrial internet of things56
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins55
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems55
Autonomous network management for 6G communication: a comprehensive survey53
Editorial Board53
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing51
MEC-based architecture for interoperable and trustworthy internet of moving things50
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT50
Editorial Board48
On the design of an AI-driven secure communication scheme for internet of medical things environment48
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks48
A fixed clustering protocol based on random relay strategy for EHWSN47
Using dummy data for RFID tag and reader authentication47
Design of modified model of intelligent assembly digital twins based on optical fiber sensor network45
ExplainableDetector: Exploring transformer-based language modeling approach for SMS spam detection with explainability analysis45
Deep learning aided CSI feedback optimization with robust error recovery45
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks45
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network44
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction43
CMBA-FL: Communication-mitigated and blockchain-assisted federated learning for traffic flow predictions42
A multi-dimensional trust attestation solution in 5G-IoT42
A fine-grained intrusion protection system for inter-edge trust transfer40
Experience Replay with Cohesive-Subgraph Awareness for Continual Graph Learning in IoT40
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber39
A review of optimization methods for computation offloading in edge computing networks37
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder36
Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios35
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey34
SEAttention-residual based channel estimation for mmWave massive MIMO systems in IoV scenarios34
The DNN-based DBP scheme for nonlinear compensation and longitudinal monitoring of optical fiber links34
Capacity and delay performance analysis for large-scale UAV-enabled wireless networks34
A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization33
Robust resource allocation for NOMA-assisted heterogeneous networks33
Field trial measurement and channel modeling for reconfigurable intelligent surface33
Smart all-time vision: The battery-free video communication for urban administration and law enforcement32
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks30
Short video preloading via domain knowledge assisted deep reinforcement learning30
Secure monitoring of internet of vehicles in 6G networks through intelligent reflecting surfaces leveraging AI30
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing30
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system30
Sum-rate optimization methods and analysis for reconfigurable intelligent surface aided communication system29
YOLO-SDLUWD: YOLOv7-based small target detection network for infrared images in complex backgrounds29
Dynamic adversarial jamming-based reinforcement learning for designing constellations28
Standardised interworking and deployment of IoT and edge computing platforms28
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective28
Enhancing IoT anomaly detection performance for federated learning28
Multiplex network infomax: Multiplex network embedding via information fusion28
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology27
Secure transmission design for RIS-aided symbiotic radio networks: A DRL approach27
Editorial Board27
Low-complexity multi-target localization via multi-BS sensing27
Device-edge collaborative occluded face recognition method based on cross-domain feature fusion26
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT26
Spatio-temporal features with global–local transformer model for video scene graph generation26
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework25
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT25
Optimization-based mode selection scheme for OAM millimeter wave system in the off-axis misalignment case25
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation25
Information theory based clustering of cellular network usage data for the identification of representative urban areas24
DCETEN: A lightweight ECG automatic classification network based on Transformer model24
Digital twin empowered cooperative trajectory planning of platoon vehicles for collision avoidance with unexpected obstacles24
Certificateless threshold signature from lattice24
Editorial Board23
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques23
Refinement modeling and verification of secure operating systems for communication in digital twins23
Secformer: privacy-preserving atomic-level componentized transformer-like model with MPC22
SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS22
Radio map estimation using a CycleGAN-based learning framework for 6G wireless communication22
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks22
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing22
Performance comparison of single-carrier and multi-carrier waveforms over terahertz wireless channels21
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services21
An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm21
Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis21
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract20
Covert wireless communication over uplink satellite-terrestrial network20
Chinese relation extraction for constructing satellite frequency and orbit knowledge graph: A survey20
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges20
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems19
Smart and collaborative industrial IoT: A federated learning and data space approach19
A digital twin-based quadruped robot system with scene perception, fast communication, and holographic interaction19
Scheduling optimization for UAV communication coverage using virtual force-based PSO model19
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning19
Software defined satellite networks: A survey19
UAV-assisted data collection for wireless sensor networks with dynamic working modes19
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks18
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks18
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling18
Classification with ensembles and case study on functional magnetic resonance imaging18
Energy minimized joint resource allocation and task offloading with user association for URLLC and eMBB 5G multi-RAT systems18
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming18
Hierarchical flow learning for low-light image enhancement18
Video Frame Interpolation Based on Invertible Neural Network for Internet of Things18
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT18
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process17
Security and privacy in edge computing: a survey of electric vehicles17
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks17
DP-Fed6G: An adaptive differential privacy-empowered federated learning framework for 6G networks17
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks17
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy17
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system17
Interworking between Modbus and internet of things platform for industrial services17
DWT-3DRec: DeepJSCC-based wireless transmission for efficient 3D scene reconstruction using CityNeRF17
Resource management at the network edge for federated learning16
Building an interoperable space for smart agriculture16
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection16
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities16
Performance analysis of UAV-based mixed underwater PLC-RF systems16
Adjustable random linear network coding (ARLNC): A solution for data transmission in dynamic IoT computational environments16
A survey of internet of medical things: technology, application and future directions16
Role of deep learning in cognitive healthcare: Wearable signal analysis, algorithms, benefits, and challenges16
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things16
A compatible carbon efficiency information service framework based on the industrial internet identification16
Explainable AI for epileptic seizure detection in Internet of Medical Things15
Privacy-preserving authentication scheme based on zero trust architecture15
A dynamic algorithm for trust inference based on double DQN in the internet of things15
Editorial Board15
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications15
LOS and NLOS identification in real indoor environment using deep learning approach15
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks15
Energy-optimal DNN model placement in UAV-enabled edge computing networks15
Attack-detection and multi-clock source cooperation-based accurate time synchronization for PLC-AIoT in smart parks15
Factors affecting forensic electric network frequency matching – A comprehensive study15
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT15
Enhanced multi-agent deep reinforcement learning for efficient task offloading and resource allocation in vehicular networks15
Blockchain-based lightweight trusted data interaction scheme for cross-domain IIoT15
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications14
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks14
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A14
Information freshness optimization of multiple status update streams in Internet of things: Generation rate control and service rate reservation14
Editorial Board14
Application of meta-learning in cyberspace security: a survey14
Guest editorial14
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates14
Secure intelligent reflecting surface assisted mobile edge computing system with wireless power transfer14
0.19109892845154