Computer Communications

Papers
(The median citation count of Computer Communications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks238
A Steiner Tree based efficient network infrastructure design in 5G urban vehicular networks211
A multimodal dual-fusion entity extraction model for large and complex devices205
Trade-off analysis between delay and throughput of RAN slicing for smart grid203
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.0192
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan176
Editorial Board151
Editorial special issue on AI-Driven sensing and computing for cyber-physical systems128
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs112
Editorial Board99
An attack-resistant target localization in underwater based on consensus fusion95
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction90
A dynamic data access control scheme for hierarchical structures in big data85
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks83
RLCS: Towards a robust and efficient mobile edge computing resource scheduling and task offloading system based on graph neural network82
NetSentry: A deep learning approach to detecting incipient large-scale network attacks79
An improved authentication scheme for BLE devices with no I/O capabilities74
Energy consumption model for data transfer in smartphone73
Reinforcement learning multi-agent system for faults diagnosis of mircoservices in industrial settings72
A lightweight framework for abnormal driving behavior detection71
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation69
A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks68
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication68
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks67
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks66
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud66
A new intelligent and data-driven product quality control system of industrial valve manufacturing process in CPS65
Protocol Reverse-Engineering Methods and Tools: A Survey65
Sensor-based implicit authentication through learning user physiological and behavioral characteristics64
Graph-based deep learning for communication networks: A survey63
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study62
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks61
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks61
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes60
UAVs deployment optimization in cell-free aerial communication networks58
GNNetSlice: A GNN-based performance model to support network slicing in B5G networks58
Face detection algorithm based on improved TinyYOLOv3 and attention mechanism58
A coordinates-based hierarchical computing framework towards spatial data processing57
SANet: A novel segmented attention mechanism and multi-level information fusion network for 6D object pose estimation55
Probing-aided spectrum sensing-based hybrid access strategy for energy harvesting CRNs54
Available energy routing algorithm considering QoS requirements for LEO satellite network51
Estimating autonomous system risk levels by analyzing IXP route server RIB51
Maximizing the stable throughput of heterogeneous nodes under airtime fairness in a CSMA environment51
DRL: Dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution51
f250
HMLB: Holonic multi-agent approach for preventive controllers load-balancing in SDN-enabled smart grid48
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication48
A first look at HTTP/3 adoption and performance48
Revving up VNDN: Efficient caching and forwarding by expanding content popularity perspective and mobility47
Efficient resource allocation in 5G URLLC with packet duplication based macro-diversity45
Optimization of fitness data monitoring system based on Internet of Things and cloud computing45
NOMA-inspired coexistence enabling method in cell-free massive MIMO using opportunistic interference alignment45
Reinforcement learning based flow and energy management in resource-constrained wireless networks42
Fine-grained frequencies meet synchronous transmission42
Opportunistic airborne virtual network infrastructure for urban wireless networks41
FedMBC: Personalized federated learning via mutually beneficial collaboration41
APAP: An adaptive packet-reproduction and active packet-loss data collection protocol for WSNs41
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning40
Cache-Based Green Distributed Cell Dormancy Technique for Dense Heterogeneous Networks40
A discrete time-varying greywolf IoT botnet detection system39
High-precision real-time UAV target recognition based on improved YOLOv439
Stochastic modelling of multi-layer HAP-LEO systems in 6G for energy saving: An analytical approach39
On the optimal resistance against mafia and distance fraud in distance-bounding protocols38
Link and stability-aware adaptive cooperative routing with restricted packets transmission and void-avoidance for underwater acoustic wireless sensor networks38
NASOR: A network slicing approach for multiple Autonomous Systems38
An experimental investigation of Round-Trip Time and virtualization38
Bandwidth abstraction and service rate instantiation for latency-bounded reliability provisioning in 5th generation wireless networks37
Optimal caching scheme in D2D networks with multiple robot helpers37
Flow-based Service Time optimization in software-defined networks using Deep Reinforcement Learning37
Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver37
Big data-driven scheduling optimization algorithm for Cyber–Physical Systems based on a cloud platform36
A distributed routing-aware power control scheme for underwater wireless sensor networks36
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network35
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments35
Path extension similarity link prediction method based on matrix algebra in directed networks35
IoT video analytics for surveillance-based systems in smart cities34
HeavySeparation: A Generic framework for stream processing faster and more accurate34
Federated learning: A cutting-edge survey of the latest advancements and applications34
A scalable rule engine system for trigger-action application in large-scale IoT environment33
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions32
MASK-GD segmentation based robotic grasp detection32
Multi-UAV WRSN charging path planning based on improved heed and IA-DRL32
DINNRS: A Distributed In-Network Name Resolution System for information-centric networks32
Distributed optimization for intelligent IoT under unstable communication conditions32
A secure road condition monitoring scheme in cloud based VANET32
Access-oblivious and Privacy-Preserving K Nearest Neighbors Classification in dual clouds32
A machine learning-based approach to detect threats in bio-cyber DNA storage systems31
Lower boundary based nonlinear model predictive control of transmission power for smart grid WSNs31
Opportunistic RIS-assisted rate splitting transmission in coordinated multiple points networks31
Reinforcement learning for radio resource management of hybrid energy cellular networks with battery constraints31
Cluster head selection method of multiple UAVs under COVID-19 situation31
Energy-efficient routing in LEO satellite networks for extending satellites lifetime31
Estimating coverage and capacity of high frequency mobile networks in ultradense urban areas30
Hidden terminal aware grouping scheme for IEEE 802.11ah based dense IoT networks30
Editorial Board30
5G core network control plane: Network security challenges and solution requirements30
Editorial Board29
UMPL- VINS: Generalized SLAM for multi-scene metaverse applications29
Developing an asynchronous NoAck-based full-duplex MAC for IEEE 802.11 networks in a systems approach29
Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario29
Editorial Board29
An ensemble approach for optimization of penetration layout in wide area networks29
A multi-agent enhanced DDPG method for federated learning resource allocation in IoT28
Spoofing-jamming attack based on cross-technology communication for wireless networks28
Enhancing human–robot communication with a comprehensive language-conditioned imitation policy for embodied robots in smart cities27
Clustered jamming in U-V2X communications with 3D antenna beam-width fluctuations27
Construction of FANETs for user coverage and information transmission in disaster rescue scenarios27
Rolling bearing fault diagnosis based on wireless sensor network data fusion27
Unbalanced abnormal traffic detection based on improved Res-BIGRU and integrated dynamic ELM optimization27
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network27
Channel allocation optimization algorithm for hybrid wireless mesh networks for information physical fusion system27
BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation27
Autonomous confrontation strategy learning evolution mechanism of unmanned system group under actual combat in the loop27
Towards a quantum-safe 5G: Quantum Key Distribution in core networks27
Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks26
A privacy-preserving and verifiable federated learning method based on blockchain26
Editorial Board26
Predicting and mitigating cyber threats through data mining and machine learning26
GLSFF: Global–local specific feature fusion for cross-modality pedestrian re-identification26
Attribute-based policies through microservices in a smart home scenario26
CSformer: Enhancing deep learning efficiency for intelligent IoT26
Hyperbolic K-means for traffic-aware clustering in cloud and virtualized RANs26
Enabling simulation services for digital twins of 5G/B5G mobile networks26
RIPPLE-WiN: An efficient protocol for loop-free multipath routing in wireless networks26
Host identification based on self-similarity of network activity25
PbCP: A profit-based cache placement scheme for next-generation IoT-based ICN networks25
Editorial Board25
Graph convolutional networks and deep reinforcement learning for intelligent edge routing in IoT environment25
A cost-efficient, load-balanced and fragmentation-aware approach for deployment of VNF service chains in Elastic Optical Networks25
Path selection and resource allocation for 5G multi-hop D2D networks25
Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment25
Secure, accurate and privacy-aware fully decentralized learning via co-utility25
On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate limiting24
DCDIM: Diversified influence maximization on dynamic social networks24
Design and performance evaluation of QoE/QoS-oriented scheme for reliable data transmission in Internet of Things environments24
Detection of DDoS attacks in D2D communications using machine learning approach24
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV)24
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks24
Blockchain and differential privacy-based data processing system for data security and privacy in urban computing24
Enhancing the ACME protocol to automate the management of all X.509 web certificates (Extended version)24
A novel hybrid method for achieving accurate and timeliness vehicular traffic flow prediction in road networks24
A Cloud-RAN based end-to-end computation offloading in Mobile Edge Computing23
A cost-efficient hybrid redundancy coding scheme for wireless storage systems23
Data detection in decentralized and distributed massive MIMO networks23
A cross entropy based approach to minimum propagation latency for controller placement in Software Defined Network23
Network architecture and ROA protection of government mail domains: A case study23
On flexible association and placement in disaggregated RAN designs23
Traveling salesman problem with drone under recharging policy23
An overview of MAC energy-saving mechanisms in Wi-Fi23
Decentralized federated learning based on blockchain: concepts, framework, and challenges23
BioMixD: A Bio-Inspired and Traffic-Aware Mix Zone Placement Strategy for Location Privacy on the Internet of Drones22
Design and deployment of a practical IoT-based monitoring system for protected cultivations22
A new platform for machine-learning-based network traffic classification22
A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system22
A Task-Oriented Hybrid Routing Approach based on Deep Deterministic Policy Gradient22
A Novel Edge Computing Architecture Based on Adaptive Stratified Sampling22
Efficient consensus algorithm based on improved DPoS in UAV-assisted mobile edge computing22
Multi-agent reinforcement learning based computation offloading and resource allocation for LEO Satellite edge computing networks22
A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing22
Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography22
Autonomous collaborative combat strategy of unmanned system group in continuous dynamic environment based on PD-MADDPG22
Making slotted ALOHA efficient and fair using reinforcement learning21
Sum-rate maximization for cognitive relay NOMA Systems with channel uncertainty21
Enhancing fog load balancing through lifelong transfer learning of reinforcement learning agents21
aBBR: An augmented BBR for collaborative intelligent transmission over heterogeneous networks in IIoT21
DAR-DRL: A dynamic adaptive routing method based on deep reinforcement learning21
A crowd cooperative defense model for mitigating DDoS attacks in Mobile Crowdsensing networks21
Multi-objective optimization for coverage aware energy consumption in wireless 3D video sensor network21
On the design and performance of scheduling policies exploiting spatial diversity for URLLC21
Integrating interactions between target users and opinion leaders for better recommendations: An opinion dynamics approach21
An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems21
Optimizing Key Value Indicators in Intent-Based Networks through Digital Twins aided service orchestration mechanisms21
Performance analysis of general P4 forwarding devices with controller feedback: Single- and multi-data plane cases21
Discovery privacy threats via device de-anonymization in LoRaWAN20
Sub-rate linear network coding20
Secrecy outage performance of NOMA relay networks using partial relay selection in the presence of multiple colluding eavesdroppers20
On-path caching based on content relevance in Information-Centric Networking20
Mobility-aware incentive mechanism for relaying D2D communications20
A pricing strategy for electric vehicle charging in residential areas considering the uncertainty of charging time and demand20
Honey-list based authentication protocol for industrial IoT swarms20
COCKTAIL: Video streaming QoE optimization with chunk replacement and guided learning20
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches20
Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications20
IoT based real-time traffic monitoring system using images sensors by sparse deep learning algorithm20
Security-aware spectrum sharing for NOMA in cognitive radio networks with discrete-time energy harvesting20
Information centric wireless communication for variation detection and Mitigation Model in industrial internet of Things19
Activate or sleep? An optimal two-threshold policy for transmission service19
DEQLFER — A Deep Extreme Q-Learning Firefly Energy Efficient and high performance routing protocol for underwater communication19
Direction-agnostic gesture recognition system using commercial WiFi devices19
Editorial Board19
Distributed cyber-physical intrusion detection using stacking learning for wide-area protection system19
SLICES, a scientific instrument for the networking community19
DRL-assisted task offloading in enhanced time-expanded graph (eTEG)-modeled aerial computing19
Resources optimization for secure transmission in wireless powered communication networks19
Energy and congestion-aware load balanced multi-path routing for wireless sensor networks in ambient environments19
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems19
Online Learning to parallel offloading in heterogeneous wireless networks18
IoT-assisted feature learning for surface settlement prediction caused by shield tunnelling18
Reliable and energy-efficient UAV-assisted air-to-ground transmission: Design, modeling and analysis18
A parallel computing based model for online binary computation offloading in mobile edge computing18
Multimedia services placement algorithm for cloud–fog hierarchical environments18
Beam adaptation using out-of-band signals for robust millimeter-wave communications18
A contract-based energy harvesting mechanism in UAV communication network18
A futuristic green service computing approach for smart city: A fog layered intelligent service management model for smart transport system18
A robust and distributed architecture for 5G-enabled networks in the smart blockchain era18
Wi-Fi frame detection via spiking neural networks with memristive synapses18
The pupil outdoes the master: Imperfect demonstration-assisted trust region jamming policy optimization against frequency-hopping spread spectrum18
A novel security framework for densely populated Internet of Things users in pervasive service access18
A novel joint short-packet transmission in satellite–terrestrial NOMA networks18
IMCNN:Intelligent Malware Classification using Deep Convolution Neural Networks as Transfer learning and ensemble learning in honeypot enabled organizational network18
An automated context-aware IoT vulnerability assessment rule-set generator17
Hybrid CSMA/CA and HCCA uplink medium access control protocol for VLC based heterogeneous users17
A review on uncertainty quantification of shadowing reconstruction and signal measurements in Radio Tomographic Imaging17
Effective networking: Enabling effective communications towards 6G17
Hybrid classical relay and advanced RISs for performance enhancement of IoT sensor networks with impaired hardware17
Constructions of broadcast encryption with personalized messages from bilinear map17
A blockchain-based infection tracing and notification system by non-fungible tokens17
On the properties of device-free multi-point CSI localization and its obfuscation17
A cross-chain access control mechanism based on blockchain and the threshold Paillier cryptosystem17
Latency-aware service provisioning in survivable multilayer IP-over-elastic optical networks to support multi-class of service transmission17
Fast speech adversarial example generation for keyword spotting system with conditional GAN17
A bandwidth-aware service migration method in LEO satellite edge computing network16
Toward the simulation of WiFi Fine Time measurements in NS3 network simulator16
Edge and fog computing for IoT: A survey on current research activities & future directions16
A coalitional game-based joint monitoring mechanism for combating COVID-1916
Optimizing UAV delivery for pervasive systems through blockchain integration and adversarial machine learning16
LVSegNet: A novel deep learning-based framework for left ventricle automatic segmentation using magnetic resonance imaging16
Analysis of attack-defense game for advanced malware propagation control in cloud16
Dynamic power allocation strategy for uplink non-orthogonal multiple access systems16
ASAP 2.0: Autonomous & proactive detection of malicious applications for privacy quantification in 6G network services16
Privacy-preserving and verifiable data aggregation for Internet of Vehicles16
Performance based Risk driven Trust (PRTrust): On modeling of secured service sharing in peer-to-peer federated cloud16
Mixed noise-guided mutual constraint framework for unsupervised anomaly detection in smart industries16
Anomaly detection method of packet loss node location in heterogeneous hash networks16
Weighted triplet loss based on deep neural networks for loop closure detection in VSLAM16
IoT-based generalized multi-granulation sequential three-way decisions16
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication16
An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment16
An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system16
A proactive caching and offloading technique using machine learning for mobile edge computing users16
An edge computing based data detection scheme for traffic light at intersections16
A robust multi-key authority system for privacy-preserving distribution and access control of healthcare data16
SDNRoute: Proactive routing optimization in Software Defined Networks16
Computationally efficient topology optimization of scale-free IoT networks15
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope15
Intelligent routing algorithm for wireless sensor networks dynamically guided by distributed neural networks15
Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations15
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs15
Reliable and efficient emergency rescue networks: A blockchain and fireworks algorithm-based approach15
5G for connected and automated mobility - Network level evaluation on real neighboring 5G networks: The Greece - Turkey cross border corridor15
0.11101794242859