Computer Communications

Papers
(The H4-Index of Computer Communications is 48. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks245
Trade-off analysis between delay and throughput of RAN slicing for smart grid240
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.0231
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan210
Editorial Board199
Editorial special issue on AI-Driven sensing and computing for cyber-physical systems184
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs156
Editorial Board123
Sensor-based implicit authentication through learning user physiological and behavioral characteristics106
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes100
A Steiner Tree based efficient network infrastructure design in 5G urban vehicular networks96
A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks87
A dynamic data access control scheme for hierarchical structures in big data85
A multimodal dual-fusion entity extraction model for large and complex devices84
An attack-resistant target localization in underwater based on consensus fusion84
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction82
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks77
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks75
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks74
An improved authentication scheme for BLE devices with no I/O capabilities73
Energy consumption model for data transfer in smartphone72
Reinforcement learning multi-agent system for faults diagnosis of mircoservices in industrial settings72
Protocol Reverse-Engineering Methods and Tools: A Survey71
Editorial Board69
NetSentry: A deep learning approach to detecting incipient large-scale network attacks68
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study68
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks67
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks67
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication66
RLCS: Towards a robust and efficient mobile edge computing resource scheduling and task offloading system based on graph neural network65
A lightweight framework for abnormal driving behavior detection64
Graph-based deep learning for communication networks: A survey63
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud62
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation61
GNNetSlice: A GNN-based performance model to support network slicing in B5G networks59
UAVs deployment optimization in cell-free aerial communication networks59
SANet: A novel segmented attention mechanism and multi-level information fusion network for 6D object pose estimation56
A coordinates-based hierarchical computing framework towards spatial data processing56
Probing-aided spectrum sensing-based hybrid access strategy for energy harvesting CRNs56
Maximizing the stable throughput of heterogeneous nodes under airtime fairness in a CSMA environment55
f254
Estimating autonomous system risk levels by analyzing IXP route server RIB54
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication52
Fine-grained frequencies meet synchronous transmission51
Optimization of fitness data monitoring system based on Internet of Things and cloud computing51
HMLB: Holonic multi-agent approach for preventive controllers load-balancing in SDN-enabled smart grid51
Cache-Based Green Distributed Cell Dormancy Technique for Dense Heterogeneous Networks50
APAP: An adaptive packet-reproduction and active packet-loss data collection protocol for WSNs50
A discrete time-varying greywolf IoT botnet detection system48
Periodic data collection in hybrid energy-harvesting sensor networks48
A distributed routing-aware power control scheme for underwater wireless sensor networks48
0.078886985778809