Annals of Telecommunications

Papers
(The median citation count of Annals of Telecommunications is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Troubleshooting distributed network emulation126
On enhancing the transmission efficiency of modulated UWB signals under different emission standards100
Advanced speech biomarker integration for robust Alzheimer’s disease diagnosis75
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts67
Optimizing resource allocation in 5G-V2X communication: adaptive strategies for enhanced QoS in intelligent transportation systems32
An FFB optimization design method based on two-dimensional search algorithm for satellite communication channelizers29
Carbon footprint of urban 5 G traffic in Lyon based on real-world data and analytical modeling22
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments21
Analysis of the impact of correlated channels on the outage performance of a NOMA-based covert IOS network18
Generative AI in mobile networks: a survey15
Machine learning-powered defense DDoS attacks in mobile cloud computing14
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection13
Opportunistic EBCS access mechanism for IEEE 802.11bc: a probabilistic approach12
Machine learning with UMAP k-NN-ML classification for data processing: a case study on LocURa4Iot dataset12
A dynamic AI-based algorithm selection for Virtual Network Embedding12
Speed: a distributed approach for SFC placement in the edge-cloud continuum12
Efficient bimodal emotion recognition system based on speech/text embeddings and ensemble learning fusion10
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison9
Towards greener digital infrastructures for ICT and vertical markets9
Distributed congestion control method for sending safety messages to vehicles at a set target distance9
An FCM-based hybrid method for DDoS attack detection in resource-constrained devices9
Distributed zero trust architecture based on policy negotiation secured by DPP in blockchain9
A revocable attribute-based access control with non-monotonic access structure9
Redefining data collection: energy-conscious path optimization for sustainable wireless sensor networks9
Design and performance of distributed Q-GRS coded cooperative communication with optimized relay selection9
Joint MEC selection and wireless resource allocation in 5G RAN9
Performance of cell-free massive MIMO with group SIC detectors and low-resolution ADCs over spatially correlated channels9
Automated slow-start detection for anomaly root cause analysis and BBR identification8
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting8
Cooperative localisation for multi-RSU vehicular networks based on predictive beamforming8
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures8
Blind retrieval of signals via analytical and sequential determination of separation angles7
Wi-Fi faces the new wireless ecosystem: a critical review7
Accurate channel estimation using effective support vector initialization for off-grid partially coherent compressive phase retrieval in mmWave MIMO systems for beyond 5G applications7
Semi-blind AF transmission in secure NOMA systems7
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models7
Evaluating pending interest table performance under the collusive interest flooding attack in named data networks7
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives7
Digital sufficiency: conceptual considerations for ICTs on a finite planet7
Investigation of LDPC codes with interleaving for 5G wireless networks6
A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population6
Characterization of EMF exposure induced by French cellular networks6
On the quality of WebRTC-based videoconferencing under adverse and mobility scenarios6
Intrusion detection in CAN protocol using novel spatial-temporal deep learning model for secure autonomous vehicles communication6
End-to-end trusted computing architecture for vehicular over-the-air updates6
A low-complexity iterative algorithm for multiuser millimeter-wave systems6
Interactions between artificial intelligence and cybersecurity to protect future networks6
Improving channel equalization in cell-free MIMO networks using reconfigurable intelligent surfaces and in-context learning6
Explainable artificial intelligence for cybersecurity: a literature survey6
SBRC 2024 special issue—cross-layer advances for resilient and intelligent communication systems6
An approach for detecting multi-institution attacks6
Blockchain-empowered e-ticket distribution system for secure and efficient transactions, validation, and audits5
PAPR reduction using constrained convex optimization for vector OFDM5
$${l_{1/2}}$$-FRSVT-based channel estimation algorithm for mmWave massive MIMO systems in quantum optimization5
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms5
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum5
A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning5
A deeper look at Ariadne: a privacy-preserving network layer protocol5
Towards programmable IoT with ActiveNDN4
On the interoperability of verifiable credentials: simple universal verifier (SUV)4
Hotspot analysis and prediction for mobile networking applications4
Simultaneously transmitting and reflecting reconfigurable intelligent surfaces with thermal energy harvesting4
Efficient unsupervised segmentation method for continuous Arabic and English speech4
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype4
SDN-API-Sec-Fast: a performance-enhanced conflict-free blockchain-based authorization for cross-domain SDNs4
Lattice-based certificateless linearly homomorphic signature scheme4
Nested-C protocol: consensus protocol designed for NestedChain4
Carbon footprint of cloud, edge, and Internet of Edges4
Editorial to the special issue on AI for cybersecurity (CSNet 2024)4
Proximity service for vehicular passengers: modeling and analyzing D2D implementation for VoIP application using vehicular mobility models3
Lightweight certificateless authenticated key agreement protocol for IIoT3
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network3
IoT-Beeps: IoT Behavior Perception System3
ISIVC 2024 special issue—signal and audio processing, digital communications, and networking3
Integration of IoT with cloud computing for next generation wireless technology3
Evaluating a mobility-aware ADR scheme in urban and suburban LoRaWAN environments3
The network digital twin in Internet of Vehicles: applications, modeling, and challenges3
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications3
Two level data centric aggregation scheme for wireless sensor networks3
EWMAX and NDIST: RSSI filtering mechanisms for handoff algorithms in dense networks3
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks3
5G in society: environment, disputed futures, and contested governance3
An efficient mobile cloud security method based on strong multi-factor authentication and smart card technology3
Backscatter communication system efficiency with diffusing surfaces3
Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living2
Experimental assessment of SDR-based 5G positioning: methodologies and insights2
Deep neural network-driven precision agriculture multi-path multi-hop noisy plant image data transmission and plant disease detection2
A modified ZF algorithm for signal detection in an underwater MIMO STBC-OFDM acoustic communication system2
Efficient representation of disoccluded regions in 3D video coding2
Analyzing the stability, efficiency, and cost of a dynamic data replica balancing architecture for HDFS2
CSNet 2022 special issue—decentralized and data-driven security in networking2
Machine learning for networking2
Privacy preserving machine unlearning for smart cities2
Resource management for multi-service coexistence in 5 G/6 G NFV-MEC networks2
Computing paradigms for smart farming in the era of drones: a systematic review2
SHAKE-ESDRL-based energy efficient intrusion detection and hashing system2
Enhancing robustness in federated learning using minimal repair and dynamic adaptation in a scenario with client failures2
Robust physical layer security using frequency diverse array directional modulation2
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing2
Capacity aware Wi-Fi networks deployment2
Energy demand of major telecommunication network operators in Germany2
A survey of public datasets for O-RAN: fostering the development of machine learning models2
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks2
Mitigation of a poisoning attack in federated learning by using historical distance detection2
Handling data scarcity through data augmentation for detecting offensive speech2
On the $$\eta -\mu $$ shadowed Ricean model for land mobile satellite channels2
RF-EMF bystander exposure in the 5G era measured across various microenvironments in Greece2
Generating practical adversarial examples against learning-based network intrusion detection systems2
Multicriteria VNF placement and chaining with machine learning: a survey and new opportunities for the AHP in decision-making scenarios1
PORVIR-5G: Programmability, ORchestration, and VIRtualization of next-generation networks1
A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks1
Opportunistic data gathering in IoT networks using an energy-efficient data aggregation mechanism1
Neural network-based encrypted traffic classification and application categorization framework for the tor network1
Evaluation and projection of 4G and 5G RAN energy footprints: the case of Belgium for 2020–20251
E-Watcher: insider threat monitoring and detection for enhanced security1
A hybrid deep learning model for multi-class DDoS detection in SDN networks1
Organic 6G networks: ultra-flexibility through extensive stateless functional split1
Design and fabrication of a novel frequency-reconfigurable patch antenna for WiFi and 5 G applications1
Smart contract implementation on network sharing for 6G wireless networks1
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework1
Security and privacy-preserving for machine learning models: attacks, countermeasures, and future directions1
Publisher Correction: Towards programmable IoT with ActiveNDN1
DSCNN-AttNet: A low complexity deep learning framework for CSI feedback in mmWave massive MIMO systems1
Reliable feature selection for adversarially robust cyber-attack detection1
A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems1
Telephony speech system performance based on the codec effect1
A game-theoretical paradigm for collaborative and distributed power control in wireless networks1
The impact of human movement on 2.4 GHz link quality in indoor space1
A distributed platform for intrusion detection system using data stream mining in a big data environment1
Enhanced deep learning approach for high-accuracy mobility coordinate prediction1
A modular pipeline for enforcement of security properties at runtime1
On the capacity of multiple antenna systems1
Digital credentials management system using rejectable soulbound tokens1
Multimodal emotion recognition: integrating speech and text for improved valence, arousal, and dominance prediction1
Editorial of 6GNet 2023 special issue1
Large language models and unsupervised feature learning: implications for log analysis1
A two-stage machine learning approach to path loss prediction at 5.9 GHz: benchmarking empirical and data-driven models for V2V highway scenarios1
Energy awareness and energy efficiency in internet of things middleware: a systematic literature review1
Generalized Reed-Solomon coded cooperative differential spatial modulation with low-complexity detection and joint decoding for wireless communication1
Reducing communication overhead through one-shot model pruning in federated learning1
Dynamic virtual network embedding for task offloading in IoV: GAT-assisted HDRL approach1
Performance analysis of majority-based transmit antenna selection and maximal ratio combining in MIMO-NOMA networks1
Reconfigurable intelligent surfaces (RIS) using NOMA with energy harvesting from vibrations for 6G1
Performance analysis of NOMA in a MIMO system over Rayleigh channels under imperfect SIC1
A two-stage Q-learning routing approach for quantum entanglement networks1
A versatile XAI-based framework for efficient and explainable intrusion detection systems1
Cloud service selection in IoFT-enabled Multi-access Edge Computing: a Game Theoretic approach1
Joint simulation of urban vehicle traffic and relay-empowered 5G communications at city scale1
0.10742807388306