Computer Communications

Papers
(The H4-Index of Computer Communications is 48. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks238
A Steiner Tree based efficient network infrastructure design in 5G urban vehicular networks211
A multimodal dual-fusion entity extraction model for large and complex devices205
Trade-off analysis between delay and throughput of RAN slicing for smart grid203
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.0192
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan176
Editorial Board151
Editorial special issue on AI-Driven sensing and computing for cyber-physical systems128
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs112
Editorial Board99
An attack-resistant target localization in underwater based on consensus fusion95
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction90
A dynamic data access control scheme for hierarchical structures in big data85
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks83
RLCS: Towards a robust and efficient mobile edge computing resource scheduling and task offloading system based on graph neural network82
NetSentry: A deep learning approach to detecting incipient large-scale network attacks79
An improved authentication scheme for BLE devices with no I/O capabilities74
Energy consumption model for data transfer in smartphone73
Reinforcement learning multi-agent system for faults diagnosis of mircoservices in industrial settings72
A lightweight framework for abnormal driving behavior detection71
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation69
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication68
A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks68
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks67
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks66
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud66
A new intelligent and data-driven product quality control system of industrial valve manufacturing process in CPS65
Protocol Reverse-Engineering Methods and Tools: A Survey65
Sensor-based implicit authentication through learning user physiological and behavioral characteristics64
Graph-based deep learning for communication networks: A survey63
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study62
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks61
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks61
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes60
Face detection algorithm based on improved TinyYOLOv3 and attention mechanism58
UAVs deployment optimization in cell-free aerial communication networks58
GNNetSlice: A GNN-based performance model to support network slicing in B5G networks58
A coordinates-based hierarchical computing framework towards spatial data processing57
SANet: A novel segmented attention mechanism and multi-level information fusion network for 6D object pose estimation55
Probing-aided spectrum sensing-based hybrid access strategy for energy harvesting CRNs54
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution51
Available energy routing algorithm considering QoS requirements for LEO satellite network51
Estimating autonomous system risk levels by analyzing IXP route server RIB51
Maximizing the stable throughput of heterogeneous nodes under airtime fairness in a CSMA environment51
f250
A first look at HTTP/3 adoption and performance48
HMLB: Holonic multi-agent approach for preventive controllers load-balancing in SDN-enabled smart grid48
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication48
0.064304113388062