Computer Communications

Papers
(The median citation count of Computer Communications is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture249
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art210
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey161
Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review154
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks140
Secure and energy-efficient smart building architecture with emerging technology IoT139
A survey of breakthrough in blockchain technology: Adoptions, applications, challenges and future research130
Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs)123
Edge and fog computing for IoT: A survey on current research activities & future directions120
Internet of Things attack detection using hybrid Deep Learning Model111
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems103
Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare103
Green communication in IoT networks using a hybrid optimization algorithm101
Graph-based deep learning for communication networks: A survey100
A taxonomy of AI techniques for 6G communication networks98
A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment90
Continuous health monitoring of sportsperson using IoT devices based wearable technology86
A taxonomy of blockchain-enabled softwarization for secure UAV network84
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes81
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks80
SDN/NFV architectures for edge-cloud oriented IoT: A systematic review79
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review77
Path extension similarity link prediction method based on matrix algebra in directed networks76
Vehicle communication network in intelligent transportation system based on Internet of Things76
Geo-distributed efficient deployment of containers with Kubernetes75
Federated Learning for intrusion detection system: Concepts, challenges and future directions73
Resource provisioning for IoT services in the fog computing environment: An autonomic approach73
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment72
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment69
EDGF: Empirical dataset generation framework for wireless sensor networks69
A review of wireless communication using high-altitude platforms for extended coverage and capacity66
Sensors for internet of medical things: State-of-the-art, security and privacy issues, challenges and future directions66
A study of LoRaWAN protocol performance for IoT applications in smart agriculture65
Using data mining techniques to explore security issues in smart living environments in Twitter65
SSGRU: A novel hybrid stacked GRU-based traffic volume prediction approach in a road network65
Optimal caching scheme in D2D networks with multiple robot helpers65
Blockchain based integrated security measure for reliable service delegation in 6G communication environment65
A hybrid Intrusion Detection System based on Sparse autoencoder and Deep Neural Network64
Three-factor authentication protocol using physical unclonable function for IoV63
A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework62
An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks62
A deep neural networks based model for uninterrupted marine environment monitoring62
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets62
Deep reinforcement learning for computation offloading in mobile edge computing environment60
BCHealth: A Novel Blockchain-based Privacy-Preserving Architecture for IoT Healthcare Applications60
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm60
A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things59
Lightweight blockchain assisted secure routing of swarm UAS networking59
Privacy preserving distributed machine learning with federated learning59
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)57
Intelligent workload allocation in IoT–Fog–cloud architecture towards mobile edge computing57
A driving intention prediction method based on hidden Markov model for autonomous driving56
Bee optimization based random double adaptive whale optimization model for task scheduling in cloud computing environment54
Internet of Flying Things (IoFT): A Survey53
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks53
Information-Centric Networking solutions for the Internet of Things: A systematic mapping review52
A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN51
A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)50
IoT enabled HELMET to safeguard the health of mine workers50
Efficient deep neural networks for classification of COVID-19 based on CT images: Virtualization via software defined radio50
Securing Internet of Medical Things with Friendly-jamming schemes50
Optimized multi-UAV cooperative path planning under the complex confrontation environment49
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework48
OntoBestFit: A Best-Fit Occurrence Estimation strategy for RDF driven faceted semantic search48
Diagnosis of heart diseases by a secure Internet of Health Things system based on Autoencoder Deep Neural Network47
A smart lightweight privacy preservation scheme for IoT-based UAV communication systems47
Energy-efficient and SDN-enabled routing algorithm for wireless body area networks46
Prevention of Hello Flood Attack in IoT using combination of Deep Learning with Improved Rider Optimization Algorithm46
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey46
A survey on continuous authentication methods in Internet of Things environment46
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain45
Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare45
Deep learning for intelligent IoT: Opportunities, challenges and solutions45
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem44
Blockchain technology as a Fog computing security and privacy solution: An overview43
Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT43
Deep reinforcement learning meets graph neural networks: Exploring a routing optimization use case42
A Novel Edge Computing Architecture Based on Adaptive Stratified Sampling42
Efficient deployment of UAVs for disaster management: A multi-criterion optimization approach41
Optimized data storage algorithm of IoT based on cloud computing in distributed system41
Optimization of collaborative resource allocation for mobile edge computing40
Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography40
Research on resource allocation of vocal music teaching system based on mobile edge computing40
Secure Device-to-Device communications for 5G enabled Internet of Things applications38
Survey on watermarking methods in the artificial intelligence domain and beyond38
Benchmarking open source NFV MANO systems: OSM and ONAP38
Result return aware offloading scheme in vehicular edge networks for IoT38
Sparse Bayesian learning based channel estimation in FBMC/OQAM industrial IoT networks38
A method of two-stage clustering learning based on improved DBSCAN and density peak algorithm37
Industrial Internet of Things for smart manufacturing applications using hierarchical trustful resource assignment37
Dynamic server placement in edge computing toward Internet of Vehicles37
Towards SDN-based smart contract solution for IoT access control37
Malware propagation model in wireless sensor networks under attack–defense confrontation37
Joint routing and scheduling for large-scale deterministic IP networks36
A cooperative resource allocation model for IoT applications in mobile edge computing36
Do we need a contact tracing app?36
Optimization of battery swapping infrastructure for e-commerce drone delivery36
Cryptomining makes noise: Detecting cryptojacking via Machine Learning36
A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks35
Energy-efficient computation offloading for vehicular edge computing networks35
Intelligent power monitoring of building equipment based on Internet of Things technology35
Design and deployment of a practical IoT-based monitoring system for protected cultivations34
Multi-source social media data sentiment analysis using bidirectional recurrent convolutional neural networks34
Implementing a blockchain-based local energy market: Insights on communication and scalability34
A provably secure authentication scheme for RFID-enabled UAV applications34
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning33
Intelligent early structural health prognosis with nonlinear system identification for RFID signal analysis33
Privacy-preserving using homomorphic encryption in Mobile IoT systems33
An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers33
Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks32
A comprehensive approach for optimizing controller placement in Software-Defined Networks32
“DRL + FL”: An intelligent resource allocation model based on deep reinforcement learning for Mobile Edge Computing32
The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data32
Cloud-gaming: Analysis of Google Stadia traffic31
BlockTour: A blockchain-based smart tourism platform31
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks31
A smartphone perspective on computation offloading—A survey31
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security30
A survey on 360-degree video: Coding, quality of experience and streaming30
A review on P4-Programmable data planes: Architecture, research efforts, and future directions30
Flow length and size distributions in campus Internet traffic30
Are mobility management solutions ready for 5G and beyond?30
A federated calibration scheme for convolutional neural networks: Models, applications and challenges30
Intrusion detection in cyber–physical environment using hybrid Naïve Bayes—Decision table and multi-objective evolutionary feature selection29
Social media privacy management strategies: A SEM analysis of user privacy behaviors29
Fog Computing Based Hybrid Deep Learning Framework in effective inspection system for smart manufacturing29
A secure and lightweight authentication scheme for next generation IoT infrastructure29
Physical-layer security based mobile edge computing for emerging cyber physical systems29
IADF-CPS: Intelligent Anomaly Detection Framework towards Cyber Physical Systems29
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review29
COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach28
Task offloading in vehicular edge computing networks via deep reinforcement learning28
Security on in-vehicle communication protocols: Issues, challenges, and future research directions27
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning27
An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband27
3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks27
Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing27
A new intelligent and data-driven product quality control system of industrial valve manufacturing process in CPS27
Suppressed K-Anonymity Multi-Factor Authentication Based Schmidt-Samoa Cryptography for privacy preserved data access in cloud computing26
Network intrusion detection based on IE-DBN model26
Quantum and classical genetic algorithms for multilevel segmentation of medical images: A comparative study26
A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment26
Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm26
Service architecture of IoT terminal connection based on blockchain identity authentication system26
A privacy and session key based authentication scheme for medical IoT networks26
Weighted utility aware computational overhead minimization of wireless power mobile edge cloud25
A wearable blood oxygen saturation monitoring system based on bluetooth low energy technology25
A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions25
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems25
Remaining useful life prediction based on state assessment using edge computing on deep learning24
A hybrid trust management framework for a multi-service social IoT network24
A review of Machine Learning-based zero-day attack detection: Challenges and future directions24
An adaptive and Distributed Traffic Management System using Vehicular Ad-hoc Networks24
Subjective logic-based trust model for fog computing24
A security framework for Ethereum smart contracts24
An exploratory study of congestion control techniques in Wireless Sensor Networks23
An ultra light weight and secure RFID batch authentication scheme for IoMT23
Priority-based data transmission using selective decision modes in wearable sensor based healthcare applications23
NRflex: Enforcing network slicing in 5G New Radio23
Distributed task offloading strategy to low load base stations in mobile edge computing environment23
WOGRU-IDS — An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks23
An efficient and practical certificateless signcryption scheme for wireless body area networks22
Probabilistic Stone’s Blind Source Separation with application to channel estimation and multi-node identification in MIMO IoT green communication and multimedia systems22
Classification of flower image based on attention mechanism and multi-loss attention network22
A new GSO based method for SDN controller placement22
Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things22
On deep reinforcement learning security for Industrial Internet of Things22
Blockchain-based Mobility-aware Offloading mechanism for Fog computing services22
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things22
Air quality assessment system based on self-driven drone and LoRaWAN network21
Time-optimal trajectory planning of manipulator with simultaneously searching the optimal path21
A blockchain-based access control and intrusion detection framework for satellite communication systems21
Collision-free and low delay MAC protocol based on multi-level quorum system in underwater wireless sensor networks21
A privacy-preserving and verifiable federated learning method based on blockchain21
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations21
High-performance flow classification using hybrid clusters in software defined mobile edge computing21
Edge caching and computing in 5G for mobile augmented reality and haptic internet21
Multi-algorithm UWB-based localization method for mixed LOS/NLOS environments21
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks21
TMSE: A topology modification strategy to enhance the robustness of scale-free wireless sensor networks21
Controller placements for latency minimization of both primary and backup paths in SDNs20
5G heterogeneous network selection and resource allocation optimization based on cuckoo search algorithm20
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network20
Condition monitoring of power transmission and transformation equipment based on industrial internet of things technology20
A novel adaptive density-based spatial clustering of application with noise based on bird swarm optimization algorithm20
A comparative study on consensus mechanism with security threats and future scopes: Blockchain20
An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network20
Multiple intersection selection routing protocol based on road section connectivity probability for urban VANETs20
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT20
A collaborative caching strategy for content-centric enabled wireless sensor networks20
BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme20
Deep Reinforcement Learning-based resource allocation strategy for Energy Harvesting-Powered Cognitive Machine-to-Machine Networks20
A sustainable deep learning framework for fault detection in 6G Industry 4.0 heterogeneous data environments20
An energy harvesting solution for computation offloading in Fog Computing networks20
An energy-efficient topology control algorithm for optimizing the lifetime of wireless ad-hoc IoT networks in 5G and B5G20
Resource scheduling for piano teaching system of internet of things based on mobile edge computing20
Deep reinforcement learning-based joint task and energy offloading in UAV-aided 6G intelligent edge networks19
FoT-Stream: A Fog platform for data stream analytics in IoT19
Host load prediction in cloud computing with Discrete Wavelet Transformation (DWT) and Bidirectional Gated Recurrent Unit (BiGRU) network19
Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks19
A survey on TCP over mmWave19
URLLC in UAV-enabled multicasting systems: A dual time and energy minimization problem using UAV speed, altitude and beamwidth19
Certificateless signature schemes in Industrial Internet of Things: A comparative survey19
Decentralized adaptive indoor positioning protocol using Bluetooth Low Energy19
Public key encryption supporting equality test and flexible authorization without bilinear pairings19
Locally private frequency estimation of physical symptoms for infectious disease analysis in Internet of Medical Things19
A distributed and low-overhead traffic congestion control protocol for vehicular ad hoc networks18
Experimental vs. simulation analysis of LoRa for vehicular communications18
Spatial Reuse in IEEE 802.11ax WLANs18
FIS-RGSO: Dynamic Fuzzy Inference System Based Reverse Glowworm Swarm Optimization of energy and coverage in green mobile wireless sensor networks18
A deep learning based non-intrusive household load identification for smart grid in China18
Reinforcement learning-enabled Intelligent Device-to-Device (I-D2D) communication in Narrowband Internet of Things (NB-IoT)18
Multi-criteria handover mobility management in 5G cellular network18
Green computing in IoT: Time slotted simultaneous wireless information and power transfer18
An improved OIF Elman neural network based on CSO algorithm and its applications18
Sieve: A flow scheduling framework in SDN based data center networks18
SecDH: Security of COVID-19 images based on data hiding with PCA18
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things18
Detection of algorithmically-generated domains: An adversarial machine learning approach18
Signal frequency domain analysis and sensor fault diagnosis based on artificial intelligence18
D2D communication channel allocation and resource optimization in 5G network based on game theory18
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL17
A privacy-preserving mutual authentication scheme for group communication in VANET17
Fault diagnosis method of sensors in building structural health monitoring system based on communication load optimization17
Towards high quality mobile crowdsensing: Incentive mechanism design based on fine-grained ability reputation17
Face detection algorithm based on improved TinyYOLOv3 and attention mechanism17
A performance-aware dynamic scheduling algorithm for cloud-based IoT applications17
Deep reinforcement learning-based multi-objective edge server placement in Internet of Vehicles17
MRT-LoRa: A multi-hop real-time communication protocol for industrial IoT applications over LoRa networks17
An architecture for adaptive task planning in support of IoT-based machine learning applications for disaster scenarios17
Application of data mining technology in alarm analysis of communication network17
A software-defined caching scheme for the Internet of Things17
Edge-based platoon control17
A survey on improving the wireless communication with adaptive antenna selection by intelligent method17
A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems17
Node localization algorithm for wireless sensor networks based on static anchor node location selection strategy17
6Blocks: 6G-enabled trust management scheme for decentralized autonomous vehicles17
Privacy-preserving compression model for efficient IoMT ECG sharing17
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living17
An energy efficient cluster head selection approach for performance improvement in network-coding-based wireless sensor networks with multiple sinks16
Multi-sensor detection and control network technology based on parallel computing model in robot target detection and recognition16
A comprehensive survey on aerial mobile edge computing: Challenges, state-of-the-art, and future directions16
Increasing energy efficiency of Massive-MIMO network via base stations switching using reinforcement learning and radio environment maps16
Smart city oriented Ecological Sensitivity Assessment and Service Value Computing based on Intelligent sensing data processing16
Hybrid fog/cloud computing resource allocation: Joint consideration of limited communication resources and user credibility16
A resource allocation deep active learning based on load balancer for network intrusion detection in SDN sensors16
Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes16
Traveling salesman problem with drone under recharging policy16
Analysis and design of robust guaranteed cost Active Queue Management16
Learning to upgrade internet information security and protection strategy in big data era16
0.050211906433105