Computer Communications

Papers
(The H4-Index of Computer Communications is 47. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Group acknowledgement mechanism for beacon-enabled wireless sensor networks226
5G for connected and automated mobility - Network level evaluation on real neighboring 5G networks: The Greece - Turkey cross border corridor190
An anomaly-based approach for cyber–physical threat detection using network and sensor data182
Reinforcement learning based offloading and resource allocation for multi-intelligent vehicles in green edge-cloud computing182
A deep reinforcement learning-based UAV-smallcell system for mobile terminals geolocalization in disaster scenarios172
A Contextual Aware Enhanced LoRaWAN Adaptive Data Rate for mobile IoT applications162
On the right choice of data from popular datasets for Internet traffic classification139
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.0120
Floating Nodes Assisted Cluster-Based Routing for Efficient Data Collection in Underwater Acoustic Sensor Networks120
Making stateless and stateful network performance measurements unbiased102
Graphic image classification method based on an attention mechanism and fusion of multilevel and multiscale deep features91
A hybrid trust management framework for a multi-service social IoT network88
Reinforced practical Byzantine fault tolerance consensus protocol for cyber physical systems84
Survival backup strategy for controller placement problem in Software Defined Networking82
NetSentry: A deep learning approach to detecting incipient large-scale network attacks81
Context-based caching in mobile information-centric networks80
A cooperative resource allocation model for IoT applications in mobile edge computing79
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network75
Energy efficiency optimization for 6G multi-IRS multi-cell NOMA vehicle-to-infrastructure communication networks72
MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment71
A novel insurance claim blockchain scheme based on zero-knowledge proof technology70
Dynamic multiple access based on deep reinforcement learning for Internet of Things68
Editorial Board67
Estimating the composition ratios of network services carried in mixed traffic67
Throughput maximization and reliable wireless communication in NOMA using chained fog structure and weighted energy efficiency power allocation approach65
Abnormal traffic detection system in SDN based on deep learning hybrid models65
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction65
ER-OCN: Toward efficient network routing in ocean city based on deep reinforcement learning65
Joint mode selection and resource allocation for cellular V2X communication using distributed deep reinforcement learning under 5G and beyond networks65
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes62
A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System60
Privacy-preserving spam filtering using homomorphic and functional encryption60
Optimizing the performance of vehicular delay tolerant networks using multi-objective PSO and artificial intelligence58
Editorial Board57
Resource orchestration in 5G and beyond: Challenges and opportunities56
CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach55
Exploring the design space of privacy-enhanced content discovery for bitswap54
SDN-based detection and mitigation of DDoS attacks on smart homes54
Multiple UAVs collaborative traffic monitoring with intention-based communication53
Joint perception data caching and computation offloading in MEC-enabled vehicular networks52
Learning-based intrusion detection for high-dimensional imbalanced traffic50
Performance evaluation of IoT networks: A product density approach49
Risk model of financial supply chain of Internet of Things enterprises: A research based on convolutional neural network49
An IoT and machine learning enhanced framework for real-time digital human modeling and motion simulation48
Deeply fused flow and topology features for botnet detection based on a pretrained GCN47
Handoff control strategy of cyber physical systems under dynamic data attack47
System reliability evaluation using budget constrained real d-MC se47
0.70067691802979