Annals of Telecommunications

Papers
(The median citation count of Annals of Telecommunications is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
On enhancing the transmission efficiency of modulated UWB signals under different emission standards76
Troubleshooting distributed network emulation50
Analysis of the impact of correlated channels on the outage performance of a NOMA-based covert IOS network44
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts41
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments39
Generative AI in mobile networks: a survey39
Advanced speech biomarker integration for robust Alzheimer’s disease diagnosis38
Optimizing resource allocation in 5G-V2X communication: adaptive strategies for enhanced QoS in intelligent transportation systems36
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection26
A dynamic AI-based algorithm selection for Virtual Network Embedding21
A revocable attribute-based access control with non-monotonic access structure20
Efficient bimodal emotion recognition system based on speech/text embeddings and ensemble learning fusion20
Unleashing the power of decentralized serverless IoT dataflow architecture for the Cloud-to-Edge Continuum: a performance comparison17
Joint MEC selection and wireless resource allocation in 5G RAN16
Towards greener digital infrastructures for ICT and vertical markets16
Distributed congestion control method for sending safety messages to vehicles at a set target distance16
Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting15
Performance of cell-free massive MIMO with group SIC detectors and low-resolution ADCs over spatially correlated channels14
A bi-objective optimization model for segment routing traffic engineering13
Testbed of V2X infrastructure for autonomous vehicles13
Network slicing for vehicular communications: a multi-agent deep reinforcement learning approach12
Evaluating pending interest table performance under the collusive interest flooding attack in named data networks11
Automated slow-start detection for anomaly root cause analysis and BBR identification10
Cooperative localisation for multi-RSU vehicular networks based on predictive beamforming10
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures9
Semi-blind AF transmission in secure NOMA systems9
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives8
Achieving proportional fairness in WiFi networks via bandit convex optimization8
Digital sufficiency: conceptual considerations for ICTs on a finite planet8
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum7
Wi-Fi faces the new wireless ecosystem: a critical review7
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models7
Interactions between artificial intelligence and cybersecurity to protect future networks7
Explainable artificial intelligence for cybersecurity: a literature survey7
Investigation of LDPC codes with interleaving for 5G wireless networks7
A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population7
End-to-end trusted computing architecture for vehicular over-the-air updates7
A low-complexity iterative algorithm for multiuser millimeter-wave systems6
Product of two Gaussian Q-functions as sum of exponentials and its applications6
An approach for detecting multi-institution attacks6
A deeper look at Ariadne: a privacy-preserving network layer protocol6
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments6
A security and performance analysis of proof-based consensus protocols6
NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype5
PAPR reduction using constrained convex optimization for vector OFDM5
Towards programmable IoT with ActiveNDN5
Carbon footprint of cloud, edge, and Internet of Edges5
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms5
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles5
NLOS identification and mitigation in UWB positioning with bagging-based ensembled classifiers5
On the interoperability of verifiable credentials: simple universal verifier (SUV)5
A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning5
Integration of IoT with cloud computing for next generation wireless technology4
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network4
Fibonacci tiles strategy for optimal coverage in IoT networks4
An efficient mobile cloud security method based on strong multi-factor authentication and smart card technology4
Mutated traffic detection and recovery: an adversarial generative deep learning approach4
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks4
Backscatter communication system efficiency with diffusing surfaces4
A study on robustness of malware detection model4
Evaluating a mobility-aware ADR scheme in urban and suburban LoRaWAN environments4
Voting-based probabilistic consensuses and their applications in distributed ledgers4
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications4
ISIVC 2024 special issue—signal and audio processing, digital communications, and networking3
Experimental assessment of SDR-based 5G positioning: methodologies and insights3
Enhancing robustness in federated learning using minimal repair and dynamic adaptation in a scenario with client failures3
On the $$\eta -\mu $$ shadowed Ricean model for land mobile satellite channels3
Analyzing the stability, efficiency, and cost of a dynamic data replica balancing architecture for HDFS3
A survey of public datasets for O-RAN: fostering the development of machine learning models3
Robust physical layer security using frequency diverse array directional modulation3
A modified ZF algorithm for signal detection in an underwater MIMO STBC-OFDM acoustic communication system3
Two level data centric aggregation scheme for wireless sensor networks3
Handling data scarcity through data augmentation for detecting offensive speech3
Efficient representation of disoccluded regions in 3D video coding3
Mitigation of a poisoning attack in federated learning by using historical distance detection3
Computing paradigms for smart farming in the era of drones: a systematic review3
Special issue on blockchain networks and distributed protocols3
SHAKE-ESDRL-based energy efficient intrusion detection and hashing system3
Performance analysis of NOMA in a MIMO system over Rayleigh channels under imperfect SIC2
Generalized Reed-Solomon coded cooperative differential spatial modulation with low-complexity detection and joint decoding for wireless communication2
Machine learning for networking2
Privacy preserving machine unlearning for smart cities2
A novel offline indoor acoustic synchronization protocol: experimental analysis2
Modeling and improving named data networking over IEEE 802.15.42
Capacity aware Wi-Fi networks deployment2
Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living2
On the capacity of multiple antenna systems2
A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing2
Digital credentials management system using rejectable soulbound tokens2
Deep neural network-driven precision agriculture multi-path multi-hop noisy plant image data transmission and plant disease detection2
Organic 6G networks: ultra-flexibility through extensive stateless functional split2
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing2
Generalization aspect of accurate machine learning models for CSI-based localization2
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks2
Secrecy sum rate maximization for UAV-aided NOMA communication systems2
A modular pipeline for enforcement of security properties at runtime2
Generating practical adversarial examples against learning-based network intrusion detection systems2
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms2
CSNet 2022 special issue—decentralized and data-driven security in networking2
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN2
An SDN-based energy-aware traffic management mechanism2
Opportunistic data gathering in IoT networks using an energy-efficient data aggregation mechanism1
Publisher Correction: Towards programmable IoT with ActiveNDN1
An extended assessment of metaheuristics-based feature selection for intrusion detection in CPS perception layer1
Reducing communication overhead through one-shot model pruning in federated learning1
Evaluation and projection of 4G and 5G RAN energy footprints: the case of Belgium for 2020–20251
Performance analysis of majority-based transmit antenna selection and maximal ratio combining in MIMO-NOMA networks1
A game-theoretical paradigm for collaborative and distributed power control in wireless networks1
Maximizing the underwater wireless sensor networks’ lifespan using BTC and MNP5 compression techniques1
LPPSA: an efficient Lightweight Privacy-Preserving Signature-based Authentication protocol for a vehicular ad hoc network1
E-Watcher: insider threat monitoring and detection for enhanced security1
A hybrid deep learning model for multi-class DDoS detection in SDN networks1
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework1
Large language models and unsupervised feature learning: implications for log analysis1
Reliable feature selection for adversarially robust cyber-attack detection1
Extracting human behavior patterns from DNS traffic1
Multimodal emotion recognition: integrating speech and text for improved valence, arousal, and dominance prediction1
Enhanced deep learning approach for high-accuracy mobility coordinate prediction1
Editorial Expression of Concern: Motor imagery-based neuro-feedback system using neuronal excitation of the active synapses1
Design and fabrication of a novel frequency-reconfigurable patch antenna for WiFi and 5 G applications1
Reconfigurable intelligent surfaces (RIS) using NOMA with energy harvesting from vibrations for 6G1
Junction-based stable clustering algorithm for vehicular ad hoc network1
Smart contract implementation on network sharing for 6G wireless networks1
A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks1
Energy awareness and energy efficiency in internet of things middleware: a systematic literature review1
Telephony speech system performance based on the codec effect1
An improved user authentication and key agreement scheme for roaming service in ubiquitous network1
Cloud service selection in IoFT-enabled Multi-access Edge Computing: a Game Theoretic approach1
Full data rate space-time code selection1
A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems1
A novel collision avoidance scheme for smart parking1
A distributed platform for intrusion detection system using data stream mining in a big data environment1
A two-stage Q-learning routing approach for quantum entanglement networks1
0.03934907913208