Annals of Telecommunications

Papers
(The TQCC of Annals of Telecommunications is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels64
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks42
Adaptive password guessing: learning language, nationality and dataset source40
Interactions between artificial intelligence and cybersecurity to protect future networks38
Generative AI in mobile networks: a survey38
ICIN 2023 special issue — Emergence of the data and intelligence networking across the edge-cloud continuum32
CSNet 2022 special issue—decentralized and data-driven security in networking29
Editorial of 6GNet 2023 special issue29
Advanced speech biomarker integration for robust Alzheimer’s disease diagnosis28
Robust physical layer security using frequency diverse array directional modulation22
Multi-carrier multi-level DCSK communication system based on time-reversal20
Publisher Correction: Towards programmable IoT with ActiveNDN19
Large language models and unsupervised feature learning: implications for log analysis18
Mixed $$\mathcal {H}_{2}$$/$$\mathcal {H}_{\infty }$$ fault detection and control for uncertain delta operator systems with mixed random delays and multiple data packet dropouts17
A deeper look at Ariadne: a privacy-preserving network layer protocol16
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments15
Generalization aspect of accurate machine learning models for CSI-based localization15
Robust adaptive beamforming algorithm for coherent signals based on virtual array15
Performance analysis of full-duplex decode-and-forward two-way relay networks with transceiver impairments14
A security and performance analysis of proof-based consensus protocols13
Modeling and improving named data networking over IEEE 802.15.412
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles12
Social network malicious insider detection using time-based trust evaluation11
Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards11
Efficient approaches to optimize energy consumption in 3D wireless video sensor network under the coverage and connectivity constraints10
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing8
A low-complexity iterative algorithm for multiuser millimeter-wave systems8
An approach for detecting multi-institution attacks8
Multi-layer perceptron for network intrusion detection7
Experimental assessment of SDR-based 5G positioning: methodologies and insights7
A biobjective availability optimization problem with nonlinear constraints7
Troubleshooting distributed network emulation7
A balanced prior knowledge model based on Beta function for evaluating DIDS performance7
A survey of public datasets for O-RAN: fostering the development of machine learning models7
Efficient representation of disoccluded regions in 3D video coding7
A novel offline indoor acoustic synchronization protocol: experimental analysis6
The robust deep learning–based schemes for intrusion detection in Internet of Things environments6
Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk6
Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity6
On enhancing the transmission efficiency of modulated UWB signals under different emission standards6
A dynamic AI-based algorithm selection for Virtual Network Embedding5
A novel digital watermarking technique empowered by MWT and DCT fusion with high resilience against cropping attacks5
Traffic identification model based on generative adversarial deep convolutional network5
Generating practical adversarial examples against learning-based network intrusion detection systems5
Integration of blockchain and Internet of Things: challenges and solutions5
BER performance analysis for downlink NOMA systems over cascaded Nakagami-m fading channels5
Zt &t: secure service session management using blockchain-based tokens in zero trust networks.5
Towards adversarial realism and robust learning for IoT intrusion detection and classification5
Machine learning for networking5
Orthogonal beamforming technique for massive MIMO systems4
Towards programmable IoT with ActiveNDN4
A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms4
Capacity aware Wi-Fi networks deployment4
Enhancing the physical layer security in IoT over mixed Rayleigh-Nakagami-m fading channels with untrustworthy relays4
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection4
GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN4
An SDN-based energy-aware traffic management mechanism4
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks4
Reinforcement learning-based clustering scheme for the Internet of Vehicles4
Blockchain-based whistleblowing service to solve the problem of journalistic conflict of interest4
Privacy preserving machine unlearning for smart cities4
A noise reduction orthogonal multi-user CDSK communication system based on frequency domain processing3
EC-MOPSO: an edge computing-assisted hybrid cluster and MOPSO-based routing protocol for the Internet of Vehicles3
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks3
SOSW: scalable and optimal nearsighted location selection for fog node deployment and routing in SDN-based wireless networks for IoT systems3
Lattice-based undeniable signature scheme3
Product of two Gaussian Q-functions as sum of exponentials and its applications3
Multi-labeling with topic models for searching security information3
Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts3
Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living3
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms3
PAPR reduction using constrained convex optimization for vector OFDM3
A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning3
Infrastructure localization service and tracking scheme in uncovered areas for Internet of Vehicles3
0.041199922561646