Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches123
Editorial Board88
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process85
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications76
A measurable refinement method of design and verification for micro-kernel operating systems in communication network76
Editorial Board72
Hadoop-based secure storage solution for big data in cloud computing environment72
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic72
Observer-based event-triggered networked multi-drives speed consensus68
Classification with ensembles and case study on functional magnetic resonance imaging63
Editorial Board62
Editorial Board59
An ellipse-guided routing algorithm in wireless sensor networks58
A notary group-based cross-chain mechanism56
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges55
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles54
Alamouti code based on block repetition in FBMC/OQAM systems50
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things48
Substring-searchable attribute-based encryption and its application for IoT devices47
Network traffic identification in packet sampling environment47
CPFinder: Finding an unknown caller's profession from anonymized mobile phone data47
Design and analysis of intrusion detection systems for wireless mesh networks46
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles46
Hierarchical flow learning for low-light image enhancement46
Resource management at the network edge for federated learning46
SCIM: Incorporating secure communication and interference management in one operation45
Semi-supervised learning based hybrid beamforming under time-varying propagation environments45
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems45
DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet45
Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections44
A relationship-aware mutual learning method for lightweight skin lesion classification44
Monte-Carlo based random passive energy beamforming for reconfigurable intelligent surface assisted wireless power transfer44
Game-theoretic physical layer authentication for spoofing detection in internet of things43
Position-aware packet loss optimization on service function chain placement43
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy42
Index modulation aided generalized space-time block coding: A unified MIMO framework42
Sparse graph neural network aided efficient decoder for polar codes under bursty interference40
Swarm learning anomaly detection framework for cloud data center using multi-channel BiWGAN-GTN and CEEMDAN39
A novel routing method for dynamic control in distributed computing power networks39
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system39
Privacy preservation in permissionless blockchain: A survey38
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems37
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things37
A secure visual framework for multi-index protection evaluation in networks36
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities35
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI35
A fast and accurate multi-keyword sorted searchable scheme based on blockchain35
NPO-BAND: Number and placement optimization for backhaul-aware UAV network deployment35
DB-FL: DAG blockchain-enabled generalized federated dropout learning35
A reconstruction and recovery network-based channel estimation in high-speed railway wireless communications35
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group33
Triangular code: Near-optimal linear time fountain code32
Research on data load balancing technology of massive storage systems for wearable devices32
Location privacy protection of maritime mobile terminals32
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks31
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks30
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach28
Semantic framework of event detection in emergency situations for smart buildings28
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks27
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities27
Path planning of autonomous underwater vehicle for data collection of the internet of everything27
Reinforcement learning-enabled swarm intelligence method for computation task offloading in Internet-of-Things blockchain27
Adversarial attacks and defenses for digital communication signals identification26
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks26
8K Ultra HD TV broadcast system: Challenge, architecture and implementation25
An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT25
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems25
Capability-based IoT access control using blockchain25
Preamble slice orderly queue access scheme in cell-free dense communication systems25
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine25
Building an interoperable space for smart agriculture25
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks24
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN24
A label noise filtering and label missing supplement framework based on game theory24
Security and privacy issues of physical objects in the IoT: Challenges and opportunities22
Information mining and similarity computation for semi- / un-structured sentences from the social data22
Public integrity verification for data sharing in cloud with asynchronous revocation22
Video transcoding for adaptive bitrate streaming over edge-cloud continuum22
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming22
A novel deviation measurement for scheduled intelligent transportation system via comparative spatial-temporal path networks22
Prototyping low-cost automatic weather stations for natural disaster monitoring22
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers22
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks22
Multi-class Bitcoin mixing service identification based on graph classification21
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring21
Sum rate maximization in UAV-assisted data harvesting network supported by CF-mMIMO system exploiting statistical CSI21
RADAR: a rapid discovery algorithm for routes in SDN-based IoV21
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G21
Interworking between Modbus and internet of things platform for industrial services21
A blockchain-based audit approach for encrypted data in federated learning20
Network traffic classification: Techniques, datasets, and challenges20
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array19
AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks19
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach19
Enhancing flexibility and system performance in 6G and beyond: A user-based numerology and waveform approach19
Diversified and compatible web APIs recommendation based on game theory in IoT19
Game theory attack pricing for mining pools in blockchain-based IoT19
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home19
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects18
EHKP-Res: An explainable dynamic security solution for medical healthcare18
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting18
Game theory in network security for digital twins in industry18
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation18
Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN18
Trust-based co-operative routing for secure communication in mobile ad hoc networks18
Video Frame Interpolation Based on Invertible Neural Network for Internet of Things17
Block-gram: Mining knowledgeable features for efficiently smart contract vulnerability detection17
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT17
A survey of internet of medical things: technology, application and future directions17
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling17
A pipelining task offloading strategy via delay-aware multi-agent reinforcement learning in Cybertwin-enabled 6G network17
Joint alignment and steering to manage interference16
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks16
Resource allocation for D2D-assisted haptic communications16
Latency minimization for multiuser computation offloading in fog-radio access networks16
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI16
Application of maximum rank distance codes in designing of STBC-OFDM system for next-generation wireless communications15
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions15
Protecting the trust and credibility of data by tracking forgery trace based on GANs15
Handover management in beyond 5g hetnet topologies with unbalanced user distribution14
Digital twin empowered lightweight and efficient blockchain for dynamic internet of vehicles14
Intrusion detection and prevention system for an IoT environment14
Deep learning aided underwater acoustic OFDM receivers: Model-driven or data-driven?14
A malware propagation prediction model based on representation learning and graph convolutional networks14
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network14
Adjustable random linear network coding (ARLNC): a solution for data transmission in dynamic IoT computational environments14
Auction-based profit maximization offloading in mobile edge computing14
An enhanced scheme for mutual authentication for healthcare services14
Task offloading mechanism based on federated reinforcement learning in mobile edge computing14
Security analysis and secured access design for networks of image remote sensing13
Potential friendship discovery in social networks based on hybrid ensemble multiple collaborative filtering models in a 5G network environment13
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing13
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare13
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT13
Sports match prediction model for training and exercise using attention-based LSTM network13
A compatible carbon efficiency information service framework based on the industrial internet identification13
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access13
Lightweight Consensus Mechanisms in the Internet of Blockchained Things: Thorough Analysis and Research Directions13
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications13
Privacy-preserving authentication scheme based on zero trust architecture12
Runtime reconfiguration of data services for dealing with out-of-range stream fluctuation in cloud-edge environments12
Smart contract token-based privacy-preserving access control system for industrial Internet of Things12
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach12
Factors affecting forensic electric network frequency matching – A comprehensive study12
A highly reliable encoding and decoding communication framework based on semantic information12
Research on encoding and decoding of non-binary polar codes over GF(2 )12
Dynamics modeling and optimal control for multi-information diffusion in Social Internet of Things12
Heterogeneous radio frequency/underwater optical wireless communication relaying systems with MIMO scheme12
OAM mode purity improvement based on antenna array12
UTM: A trajectory privacy evaluating model for online health monitoring12
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks11
Performance analysis of UAV-based mixed underwater PLC-RF systems11
LOS and NLOS identification in real indoor environment using deep learning approach11
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system11
Automatic collaborative water surface coverage and cleaning strategy of UAV and USVs11
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications11
Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring11
Intelligent sitting postural anomaly detection system for wheelchair users with unsupervised techniques11
From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs11
An improved pulse coupled neural networks model for semantic IoT11
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT11
0.098043203353882