Computer Communications

Papers
(The median citation count of Computer Communications is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Group acknowledgement mechanism for beacon-enabled wireless sensor networks226
5G for connected and automated mobility - Network level evaluation on real neighboring 5G networks: The Greece - Turkey cross border corridor190
Reinforcement learning based offloading and resource allocation for multi-intelligent vehicles in green edge-cloud computing182
An anomaly-based approach for cyber–physical threat detection using network and sensor data182
A deep reinforcement learning-based UAV-smallcell system for mobile terminals geolocalization in disaster scenarios172
A Contextual Aware Enhanced LoRaWAN Adaptive Data Rate for mobile IoT applications162
On the right choice of data from popular datasets for Internet traffic classification139
Blockchain-empowered multi-skilled crowdsourcing for mobile web 3.0120
Floating Nodes Assisted Cluster-Based Routing for Efficient Data Collection in Underwater Acoustic Sensor Networks120
Making stateless and stateful network performance measurements unbiased102
Graphic image classification method based on an attention mechanism and fusion of multilevel and multiscale deep features91
A hybrid trust management framework for a multi-service social IoT network88
Reinforced practical Byzantine fault tolerance consensus protocol for cyber physical systems84
Survival backup strategy for controller placement problem in Software Defined Networking82
NetSentry: A deep learning approach to detecting incipient large-scale network attacks81
Context-based caching in mobile information-centric networks80
A cooperative resource allocation model for IoT applications in mobile edge computing79
Multi-feature fusion for fault diagnosis of rotating machinery based on convolutional neural network75
Energy efficiency optimization for 6G multi-IRS multi-cell NOMA vehicle-to-infrastructure communication networks72
MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment71
A novel insurance claim blockchain scheme based on zero-knowledge proof technology70
Dynamic multiple access based on deep reinforcement learning for Internet of Things68
Editorial Board67
Estimating the composition ratios of network services carried in mixed traffic67
ER-OCN: Toward efficient network routing in ocean city based on deep reinforcement learning65
Joint mode selection and resource allocation for cellular V2X communication using distributed deep reinforcement learning under 5G and beyond networks65
Throughput maximization and reliable wireless communication in NOMA using chained fog structure and weighted energy efficiency power allocation approach65
Abnormal traffic detection system in SDN based on deep learning hybrid models65
FedAFR: Enhancing Federated Learning with adaptive feature reconstruction65
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes62
Privacy-preserving spam filtering using homomorphic and functional encryption60
A pairing-free data authentication and aggregation mechanism for Intelligent Healthcare System60
Optimizing the performance of vehicular delay tolerant networks using multi-objective PSO and artificial intelligence58
Editorial Board57
Resource orchestration in 5G and beyond: Challenges and opportunities56
CoPaM: Cost-aware VM Placement and Migration for Mobile services in Multi-Cloudlet environment: An SDN-based approach55
Exploring the design space of privacy-enhanced content discovery for bitswap54
SDN-based detection and mitigation of DDoS attacks on smart homes54
Multiple UAVs collaborative traffic monitoring with intention-based communication53
Joint perception data caching and computation offloading in MEC-enabled vehicular networks52
Learning-based intrusion detection for high-dimensional imbalanced traffic50
Performance evaluation of IoT networks: A product density approach49
Risk model of financial supply chain of Internet of Things enterprises: A research based on convolutional neural network49
An IoT and machine learning enhanced framework for real-time digital human modeling and motion simulation48
Deeply fused flow and topology features for botnet detection based on a pretrained GCN47
Handoff control strategy of cyber physical systems under dynamic data attack47
System reliability evaluation using budget constrained real d-MC se47
Edge intelligence for smart airport runway: Architectures and enabling technologies46
A robust multi-key authority system for privacy-preserving distribution and access control of healthcare data45
Green traffic backhauling in next generation wireless communication networks incorporating FSO/mmWave technologies45
Operation and maintenance(O&M) for data center: An intelligent anomaly detection approach44
Multi-objective task offloading for highly dynamic heterogeneous Vehicular Edge Computing: An efficient reinforcement learning approach43
Towards security automation in Software Defined Networks42
Real-time prevention of trust-related attacks in social IoT using blockchain and Apache spark42
Cloud native Lightweight Slice Orchestration (CLiSO) framework41
RLCS: Towards a robust and efficient mobile edge computing resource scheduling and task offloading system based on graph neural network40
In-network aggregation for data center networks: A survey40
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living40
Malware containment with immediate response in IoT networks: An optimal control approach39
Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations38
Sensor-based implicit authentication through learning user physiological and behavioral characteristics37
LVSegNet: A novel deep learning-based framework for left ventricle automatic segmentation using magnetic resonance imaging37
AI-assisted traffic matrix prediction using GA-enabled deep ensemble learning for hybrid SDN37
Stochastic buffer-and-server-aided relay-assisted mobile edge computing in time-slotted systems36
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud35
Multi-layer and multi-order fine-grained feature learning for artwork attribute recognition35
An early stage convolutional feature extracting method using for mining traffic detection34
Network coding assisted reliable multi-source multicasting over a multi-hop wireless mesh network34
Testing AGV mobility control method for MANET coverage optimization using procedural simulation33
Chameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network33
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan33
Editorial Board32
Editorial for Special Issue on Machine Learning approaches in IoT scenarios32
Cellular fault prediction of graphical representation based on spatio-temporal graph convolutional networks31
Editorial special issue on AI-Driven sensing and computing for cyber-physical systems31
Editorial Board31
Is it possible to extend IPv6?31
Theoretical modeling and analysis of Uplink performance for Three-dimension spatial RISs-aided Wireless communication systems30
Robustness analysis of DNS paths and web access paths in public administration websites30
A three-level slicing algorithm in a multi-slice multi-numerology context30
Optimization and analysis of air-to-ground wireless link parameters for UAV mounted adaptable Radar Antenna Array30
LoRa localisation using single mobile gateway30
An improved authentication scheme for BLE devices with no I/O capabilities30
Velocity tracking control of nodes for the nonlinear complex dynamical networks associated with outgoing links subsystem30
Network security situation assessment and prediction method based on multimodal transformation in edge computing30
Anomaly detection method of packet loss node location in heterogeneous hash networks30
Femtocell deployment for scalable video transmission in 5G networks29
Improved TDD operation on Software-Defined Radio platforms towards future wireless standards29
Privacy-preserving data dissemination scheme based on Searchable Encryption, publish–subscribe model, and edge computing29
Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability29
A hierarchical caching strategy in content delivery network28
Trustworthy artificial intelligence classification-based equivalent bandwidth control28
A sustainable deep learning framework for fault detection in 6G Industry 4.0 heterogeneous data environments28
Performance analysis of short-packet communications with incremental relaying28
HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments28
Enabling privacy by anonymization in the collection of similar data in multi-domain IoT27
A deep heterogeneous optimization framework for Bayesian compressive sensing27
Hybrid precoding design based on alternating optimization in mmWave massive MIMO systems aided by intelligent reflecting surface27
Computationally efficient topology optimization of scale-free IoT networks27
Autonomous flying IoT: A synergy of machine learning, digital elevation, and 3D structure change detection27
A federated calibration scheme for convolutional neural networks: Models, applications and challenges27
An edge computing based data detection scheme for traffic light at intersections27
Multiple intersection selection routing protocol based on road section connectivity probability for urban VANETs27
Hop-by-hop bandwidth allocation and deployment for SFC with end-to-end delay QoS guarantees26
DRTP: A generic Differentiated Reliable Transport Protocol26
A proactive caching and offloading technique using machine learning for mobile edge computing users26
A Steiner Tree based efficient network infrastructure design in 5G urban vehicular networks26
A coalitional game-based joint monitoring mechanism for combating COVID-1926
Fairness-oriented multicast routing for distributed interactive applications25
A heterogeneous ring signcryption scheme with privacy protection and conditional tracing for smart grid25
Multi-tenant resource sharing with equitable-priority-based performance isolation of slices for 5G cellular systems25
Full/half-duplex unmanned aerial vehicles assisted wireless systems: Performance analysis and optimization25
Tethering Layer 2 solutions to the blockchain: A survey on proving schemes25
A novel OTFS-based directional transmission scheme for airborne networks with ISAC technology25
AI-assisted secure data transmission techniques for next-generation HetNets: A review24
A novel approach for ray tracing optimization in wireless communication24
Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare24
Application of no-light fault prediction of PON based on deep learning method24
A spectral clustering algorithm for intelligent grouping in Dense Wireless Networks24
Blockchain-empowered secure federated learning system: Architecture and applications24
A Semi-supervised Sensing Rate Learning based CMAB scheme to combat COVID-19 by trustful data collection in the crowd24
Wi-Fi throughput estimation and forecasting for vehicle-to-infrastructure communication24
Traffic flow prediction using multi-view graph convolution and masked attention mechanism23
Accuracy enhancement of Wi-Fi positioning by ranging in dense UWB networks23
Efficient resource allocation and user association in NOMA-enabled vehicular-aided HetNets with high altitude platforms23
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach23
Reliable and efficient emergency rescue networks: A blockchain and fireworks algorithm-based approach23
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs23
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency23
An adaptive regional model spectrum sensing algorithm based on TD-LTE system23
An improved routing protocol for raw data collection in multihop wireless sensor networks23
A dynamic data access control scheme for hierarchical structures in big data23
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study23
Attention-transfer-based path loss prediction in asymmetric massive MIMO IoT systems22
Analysis of mobility robustness optimization in ultra-dense heterogeneous networks22
AP-assisted adaptive video streaming in wireless networks with high-density clients22
A secure and lightweight cloud data deduplication scheme with efficient access control and key management22
Weighted triplet loss based on deep neural networks for loop closure detection in VSLAM22
5G configured grant scheduling for seamless integration with TSN industrial networks22
SDNRoute: Proactive routing optimization in Software Defined Networks22
Privacy-preserving WiFi fingerprint-based people counting for crowd management22
Optimizing Secrecy Energy Efficiency in RIS-assisted MISO systems using Deep Reinforcement Learning22
An interference-conscious reduced routing overhead protocol for Device-to-Device (D2D) Networks22
A Survivable Communication Game based Approach for a network of cooperative UAVs22
Optimization of 5G base station coverage based on self-adaptive mutation genetic algorithm22
Dynamic task offloading and service caching based on game theory in vehicular edge computing networks22
Noncoherent multiuser massive SIMO with mixed differential and index modulation22
NRflex: Enforcing network slicing in 5G New Radio22
Leveraging context-awareness for Internet of Things ecosystem: Representation, organization, and management of context22
Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge21
An anonymous authentication and key agreement protocol in smart living21
Energy consumption model for data transfer in smartphone21
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication21
Route recommendation for evacuation networks using MM21
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs21
Asynchronous Background Processing for accelerated simulation of wireless communication on multi-core systems21
Protocol Reverse-Engineering Methods and Tools: A Survey21
VeriBypasser: An automatic image verification code recognition system based on CNN20
IoT-based generalized multi-granulation sequential three-way decisions20
Mixed noise-guided mutual constraint framework for unsupervised anomaly detection in smart industries20
A new intelligent and data-driven product quality control system of industrial valve manufacturing process in CPS20
Investigating predictive model-based control to achieve reliable consistent multipath mmWave communication19
A multi-stage graph based algorithm for survivable Service Function Chain orchestration with backup resource sharing19
A mutual information based federated learning framework for edge computing networks19
Edge computing-empowered task offloading in PLC-wireless integrated network based on matching with quota19
Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks19
Dynamic power allocation strategy for uplink non-orthogonal multiple access systems19
Hierarchical pattern matching for anomaly detection in time series19
Staggered HLL: Near-continuous-time cardinality estimation with no overhead19
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks19
Design and implementation of P4 virtual switches and P4 virtual networks19
NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme18
Application of edge computing-based information-centric networking in smart cities18
Corrigendum to ‘State-of-the-art solutions of blockchain technology for data dissemination in smart cities: A comprehensive review’ [Comput. Commun. 189 (2022) 120–147]18
A parallel machine learning-based approach for tsunami waves forecasting using regression trees18
A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver18
A multimodal dual-fusion entity extraction model for large and complex devices18
Retraction notice to “An assessment of software defined networking approach in surveillance using sparse optimization algorithm” [Comput. Commun. 151 (2020) 98–110]18
A hierarchical adaptive federated reinforcement learning for efficient resource allocation and task scheduling in hierarchical IoT network18
Cloud-edge-end integrated Artificial intelligence based on ensemble learning17
A seven-dimensional state flow traffic modelling for multi-controller Software-Defined Networks considering multiple switches17
Reinforcement learning multi-agent system for faults diagnosis of mircoservices in industrial settings17
Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks17
Collaborative cloud-edge-end task offloading with task dependency based on deep reinforcement learning17
Edge-based platoon control17
Performance evaluation of mobile RPL-based IoT networks under version number attack17
A max plus algebra based scheduling algorithm for supporting time triggered services in ethernet networks17
Trade-off analysis between delay and throughput of RAN slicing for smart grid17
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning17
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication17
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework17
Secure and energy-efficient smart building architecture with emerging technology IoT17
Multi-objective cooperative computation offloading for MEC in UAVs hybrid networks via integrated optimization framework17
Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes17
Swin-T-NFC CRFs: An encoder–decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation17
An attack-resistant target localization in underwater based on consensus fusion17
Quantum-resistant Transport Layer Security17
A decentralized framework for device authentication and data security in the next generation internet of medical things17
A survey on integrated computing, caching, and communication in the cloud-to-edge continuum16
ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services16
A lightweight framework for abnormal driving behavior detection16
DA-DMPF: Delay-aware differential multi-path forwarding of industrial time-triggered flows in deterministic network16
Optimizing UAV delivery for pervasive systems through blockchain integration and adversarial machine learning16
Defect identification for oil and gas pipeline safety based on autonomous deep learning network16
EESR: Energy efficient sector-based routing protocol for reliable data communication in UWSNs16
Tag-based self-learning task recommendation for mobile crowdsensing via collaborative multi-expert system16
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks16
Transient analysis of energy-saving strategy for cognitive radio networks using G-queue with heterogeneity16
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks16
Network approaches in blockchain-based systems: Applications, challenges, and future directions16
SQID: A deep learning and network design synergy for next-generation IoT resource allocation management16
Sieve: A flow scheduling framework in SDN based data center networks16
Target Wake Time in IEEE 802.11 WLANs: Survey, Challenges, and Opportunities16
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope16
A two-stage federated learning method for personalization via selective collaboration16
AntiSense: Standard-compliant CSI obfuscation against unauthorized Wi-Fi sensing16
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems16
Efficient paths determining strategies in Mobile Crowd-sensing Networks with AI-based sensors forwarding data16
Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing16
AI-based energy-efficient path planning of multiple logistics UAVs in intelligent transportation systems16
A survey on 360-degree video: Coding, quality of experience and streaming16
A survey on UAV-assisted wireless communications: Recent advances and future trends15
Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use15
AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing15
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks15
Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks15
Analysis of physical health risk dynamic evaluation system based on sports network technology15
A survivable multipath resource allocation strategy based on fragmentation-sensitive fragmentation-aware in space division multiplexing elastic optical networks15
CANET: A hierarchical CNN-Attention model for Network Intrusion Detection15
Minimizing cost for influencing target groups in social network: A model and algorithmic approach15
A privacy-preserving federated learning protocol with a secure data aggregation for the Internet of Everything15
WOGRU-IDS — An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks15
Blockchain based resource allocation in cloud and distributed edge computing: A survey15
Graph-based deep learning for communication networks: A survey15
Intelligent routing algorithm for wireless sensor networks dynamically guided by distributed neural networks15
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network15
VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain15
Learning to optimize power allocation in cell-free massive MIMO networks with hybrid green energy15
The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset15
Empirical evaluation of 5G and Wi-Fi mesh interworking for Integrated Access and Backhaul networking paradigm14
f214
Stochastic modelling of multi-layer HAP-LEO systems in 6G for energy saving: An analytical approach14
Random spanning trees for expanders, sparsifiers, and virtual network security14
Special Issue on Smart Green Computing for Wireless Sensor Networks14
Opportunistic airborne virtual network infrastructure for urban wireless networks14
Softwarized management of 6G network for green Internet of Things14
Modulating LiFi for dual operation in the visible and infrared spectra14
Editorial Board14
Edge computing-based Generative Adversarial Network for photo design style transfer using conditional entropy distance14
Editorial Board14
0.08602499961853