Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 13. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Diversified and compatible web APIs recommendation based on game theory in IoT126
A novel routing method for dynamic control in distributed computing power networks116
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems100
A fast and accurate multi-keyword sorted searchable scheme based on blockchain97
DB-FL: DAG blockchain-enabled generalized federated dropout learning91
A label noise filtering and label missing supplement framework based on game theory88
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI85
Triangular code: Near-optimal linear time fountain code84
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches81
Video transcoding for adaptive bitrate streaming over edge-cloud continuum79
EHKP-Res: An explainable dynamic security solution for medical healthcare76
A relationship-aware mutual learning method for lightweight skin lesion classification75
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications75
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach71
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation70
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach67
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array67
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects65
Semi-supervised learning based hybrid beamforming under time-varying propagation environments64
Network traffic classification: Techniques, datasets, and challenges64
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting64
Security and privacy issues of physical objects in the IoT: Challenges and opportunities62
Sports match prediction model for training and exercise using attention-based LSTM network60
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group60
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic60
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems58
Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method57
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system56
VANETs group message secure forwarding with trust evaluation54
Computing Power Networks for Unmanned Aerial Vehicles: A Hierarchical Resources Trading Market54
UTM: A trajectory privacy evaluating model for online health monitoring54
IoT data analytic algorithms on edge-cloud infrastructure: A review52
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing52
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities51
Resource allocation for D2D-assisted haptic communications51
An ensemble deep learning model for cyber threat hunting in industrial internet of things50
A survey on blockchain-based integrity auditing for cloud data50
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks48
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT48
MEC-based architecture for interoperable and trustworthy internet of moving things47
Design of modified model of intelligent assembly digital twins based on optical fiber sensor network47
On the design of an AI-driven secure communication scheme for internet of medical things environment47
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems47
Wideband communications through drone-assisted cognitive radio VANETs using SURF channel selection44
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology43
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction43
Machine learning-based real-time visible fatigue crack growth detection43
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks43
Using dummy data for RFID tag and reader authentication42
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network41
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins40
Editorial Board40
Editorial Board38
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT38
Editorial Board37
A fixed clustering protocol based on random relay strategy for EHWSN37
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks37
Editorial for special issue on ”security and privacy protection in the era of IoT devices”36
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing36
Smart all-time vision: The battery-free video communication for urban administration and law enforcement36
Capacity and delay performance analysis for large-scale UAV-enabled wireless networks35
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber35
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology35
A multi-dimensional trust attestation solution in 5G-IoT34
The DNN-based DBP scheme for nonlinear compensation and longitudinal monitoring of optical fiber links34
Field trial measurement and channel modeling for reconfigurable intelligent surface33
Dynamic adversarial jamming-based reinforcement learning for designing constellations33
Multiplex network infomax: Multiplex network embedding via information fusion33
A fine-grained intrusion protection system for inter-edge trust transfer33
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing32
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks32
Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios32
Robust resource allocation for NOMA-assisted heterogeneous networks30
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective29
Enhancing IoT anomaly detection performance for federated learning29
SEAttention-residual based channel estimation for mmWave massive MIMO systems in IoV scenarios28
A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization28
A review of optimization methods for computation offloading in edge computing networks27
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder27
Unintentional forking analysis in wireless blockchain networks27
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system27
Short video preloading via domain knowledge assisted deep reinforcement learning27
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework26
YOLO-SDLUWD: YOLOv7-based small target detection network for infrared images in complex backgrounds26
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey26
A secure spectrum auction scheme without the trusted party based on the smart contract25
Low-complexity multi-target localization via multi-BS sensing25
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT25
Optimization-based mode selection scheme for OAM millimeter wave system in the off-axis misalignment case25
Digital twin empowered cooperative trajectory planning of platoon vehicles for collision avoidance with unexpected obstacles25
Secure transmission design for RIS-aided symbiotic radio networks: A DRL approach24
DCETEN: A lightweight ECG automatic classification network based on Transformer model24
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT23
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation23
Device-edge collaborative occluded face recognition method based on cross-domain feature fusion23
Spatio-temporal features with global–local transformer model for video scene graph generation23
Information theory based clustering of cellular network usage data for the identification of representative urban areas22
Scheduling optimization for UAV communication coverage using virtual force-based PSO model22
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks22
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems22
Certificateless threshold signature from lattice21
An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm21
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques21
Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis21
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning21
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services21
Refinement modeling and verification of secure operating systems for communication in digital twins21
Covert wireless communication over uplink satellite-terrestrial network20
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges20
Performance comparison of single-carrier and multi-carrier waveforms over terahertz wireless channels20
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract19
SecureVFL: privacy-preserving multi-party vertical federated learning based on blockchain and RSS19
Smart and collaborative industrial IoT: A federated learning and data space approach19
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing19
Software defined satellite networks: A survey19
Interworking between Modbus and internet of things platform for industrial services18
Secformer: privacy-preserving atomic-level componentized transformer-like model with MPC18
Resource management at the network edge for federated learning18
UAV-assisted data collection for wireless sensor networks with dynamic working modes18
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks18
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process17
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks17
Hierarchical flow learning for low-light image enhancement17
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling17
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system17
Video Frame Interpolation Based on Invertible Neural Network for Internet of Things17
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming17
A survey of internet of medical things: technology, application and future directions16
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks16
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks16
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy16
A compatible carbon efficiency information service framework based on the industrial internet identification16
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT16
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT16
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities16
Building an interoperable space for smart agriculture16
Classification with ensembles and case study on functional magnetic resonance imaging16
Role of deep learning in cognitive healthcare: wearable signal analysis, algorithms, benefits, and challenges16
Privacy-preserving authentication scheme based on zero trust architecture15
Factors affecting forensic electric network frequency matching – A comprehensive study15
LOS and NLOS identification in real indoor environment using deep learning approach15
Performance analysis of UAV-based mixed underwater PLC-RF systems15
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things14
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications14
WITHDRAWN: Diagnosis and analysis of repeatable diseases based on deep intelligent model driven by big data of medical images14
Information freshness optimization of multiple status update streams in Internet of things: Generation rate control and service rate reservation14
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications14
Editorial Board14
Blockchain-based lightweight trusted data interaction scheme for cross-domain IIoT14
Guest editorial14
Explainable AI for epileptic seizure detection in Internet of Medical Things14
Adjustable random linear network coding (ARLNC): A solution for data transmission in dynamic IoT computational environments14
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection14
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A14
A dynamic algorithm for trust inference based on double DQN in the internet of things13
Generalized spatial modulation detector assisted by reconfigurable intelligent surface based on deep learning13
Application of meta-learning in cyberspace security: a survey13
Attack-detection and multi-clock source cooperation-based accurate time synchronization for PLC-AIoT in smart parks13
Energy-optimal DNN model placement in UAV-enabled edge computing networks13
Green indoor optical wireless communication systems: Pathway towards pervasive deployment13
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks13
Editorial Board13
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks13
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates13
0.079888105392456