Wireless Networks

Papers
(The TQCC of Wireless Networks is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Automatic multimedia classification based on mood recognition of drivers in Internet-of-vehicle using fog computing145
Smart vision for quality apple classification using SURF–Harris optimizing techniques82
Network design for 6 G massive connectivity with aerial networks80
Secure transmission performance analysis of multi-hop cognitive relay radio networks with energy harvesting and artificial noise aided70
Review on energy conservation and congestion mechanism in mobile WSN: taxonomy, software programs, challenges, and future trends65
A multiband hook shaped flexible microstrip array antenna with DGS for 5G communication applications54
Secure and novel authentication model for protecting data centers in fog environment53
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers50
Impactless association methods for wi-fi based time-sensitive networks48
Blind parameter estimation for co-channel digital communication signals46
Applying AIoT image recognition for prognosis of wound healing in long-term care residential facility45
Joint deployment and sleep scheduling of the Internet of things43
NOMA using intelligent reflecting surfaces with adaptive transmit power and multi-antennas energy harvesting43
Multi-objective optimization task offloading decision for intelligent transportation system in cloud edge collaborative computing scenario42
Big data theory based spectrum sensing algorithm for the satellite cognitive radio network42
Analysis of secrecy outage performance for full duplex NOMA relay systems with appearance of multiple eavesdroppers42
THz quad-beam holographic antenna with independent beam control and low sidelobe levels41
Reliable positioning-based human activity recognition based on indoor RSSI changes40
Deep Q-probabilistic algorithm based rock hyraxes swarm optimization for channel allocation in CRSN smart grids39
Channel capacity limit of multi-beam satellite system38
Improved PSO based channel estimation algorithm for mmWave massive MIMO systems: hybridization technology and extreme perturbation37
An integrated independent antenna system for multiradio wireless communication applications36
A genetic algorithm based flow control scheme for LTE-NR dual connectivity networks36
ZTA: a novel zero trust framework for detection and prevention of malicious android applications34
Beam prediction and tracking mechanism with enhanced LSTM for mmWave aerial base station34
Deep learning based adaptive modulation and coding for uplink multi-user SIMO transmissions in IEEE 802.11ax WLANs32
A compact triband antenna using artificial magnetic conductor for wireless body area network communicationsFront31
A hybrid approach of multi-cast routing and clustering in underwater sensor networks30
Multi-objective path planning algorithm for mobile charger in wireless rechargeable sensor networks30
Cross layered cryptography based secure routing for IoT-enabled smart healthcare system30
Value-based multi-agent deep reinforcement learning for collaborative computation offloading in internet of things networks30
Collaborative task offloading and resource scheduling framework for heterogeneous edge computing30
Privacy-preserving association rule mining based on electronic medical system28
A survey of VNF forwarding graph embedding in B5G/6G networks28
Compressive sensing based indoor localization fingerprint collection and construction28
Reinforcement learning based routing in delay tolerant networks27
Enhanced dual lane detection in automotive radar systems using harmonic coordinated beamforming of time-modulated arrays27
MH-SIA: multi-objective handover using swarm intelligence algorithm for future wireless communication system26
UAV-assisted computation offloading and resource allocation algorithm based on D2D communication26
R-MPTCP: a rank-based data scheduler for wireless networks26
QoS supported redundancy balanced data transmission scheme for wireless body area network based H-IoT24
Analysis of delay distribution for downstream message deliveries in sparse VANETs24
Benchmarking of lightweight cryptographic algorithms for wireless IoT networks24
Multi-objective cluster head based energy efficient routing using THDCNN with hybrid capuchin search and woodpecker mating algorithm in WSN24
A new segment shift M-ary differential chaos shift keying aided by discrete sine transform24
Design of an interleaver with criteria to improve the performance of turbo codes in short block lengths23
Vehealth: pervasive RFID-based driver respiration and heart rate monitoring in driving scenarios23
Asymmetric CPW-fed patch antenna with slits at terahertz applications for 6G wireless communications22
Improving cell edge user performance using cooperative cyclic interleaved non-orthogonal multiple access under rayleigh fading channel22
OEEFCP – an optimal energy efficient framework employing cluster communication based routing protocol for UWCNs22
Efficient resource allocation scheme for dually connected non-orthogonal multiple access based LIFI-RF networks21
Secrecy performance analysis of cell-free massive MIMO in the presence of active eavesdropper with low resolution ADCs21
3D EM data driven surrogate based design optimization of traveling wave antennas for beam scanning in X-band: an application example20
Conjunctive searchable encryption with efficient authorization for group sharing20
Denoising method for terahertz signal using RBF neural network with adaptive projection learning algorithm20
Capacity analysis of cooperative amplify and forward–quadrature spatial modulation MIMO system20
Efficient non-orthogonal multiple access for predicting arrival direction in multiple UAV-6G networks19
A novel model for optimal selection of relay bus with maximum link reliability in VANET using hybrid fuzzy niching grey wolf optimization19
Retraction Note to: Throughput maximization of multichannel allocation mechanism under interference constraint for hybrid overlay/underlay cognitive radio networks with energy harvesting19
A self-sustainable opportunistic solution for emergency detection in ageing people living in rural areas19
Scalable energy optimization of resources for mobile cloud computing using sensor enabled cluster based system19
Accuracy-enhanced E-commerce recommendation based on deep learning and locality-sensitive hashing18
Co-operative beam forming selection with energy balanced operation for wireless sensor network18
An EEG signal-based music treatment system for autistic children using edge computing devices18
B-GWO based multi-UAV deployment and power allocation in NOMA assisted wireless networks18
Multicultural data assistance mining analysis for ideological and political education in smart education platforms using artificial intelligence18
Optimizing redeployment of communication base station18
Latency-aware service migration with decision theory for Internet of Vehicles in mobile edge computing18
Artificial neural networks-based improved Levenberg–Marquardt neural network for energy efficiency and anomaly detection in WSN18
English teaching evaluation based on reinforcement learning in content centric data center network17
Harden-IoT: hardening the EoL devices by intercepting the attack vector for future B5G/6G IoT17
An adaptive channel reservation MAC protocol based on forwarding traffic of key nodes17
Efficient trajectory optimization and resource allocation in UAV 5G networks using dueling-Deep-Q-Networks17
Network selection in heterogeneous dense networks based on user clustering17
DCPMK: a difference-of-convex programming-based approach for deploying m-connected k-covering wireless sensor networks17
Deep network expression recognition with transfer learning in UAV-enabled B5G/6G networks17
Secure shortest distance queries over encrypted graph in cloud computing17
Development of hybrid weighted networks of RNN and DBN for facilitating the secure information system in cyber security using meta-heuristic improvement16
A reliable authentication scheme of personal health records in cloud computing16
Research on smart-locks cybersecurity and vulnerabilities16
A survey on IoT fog nano datacenters16
A defected substrate 4-element mimo antenna with higher diversity characteristics for 5G sub 6 GHz N77/N78 band applications16
Detection of malicious URLs using machine learning16
Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions16
Wireless technologies, medical applications and future challenges in WBAN: a survey16
Privacy-preserving federated learning framework in multimedia courses recommendation16
Performance improvement of OFDM systems using compressive sensing with group LASSO signal reconstruction algorithm15
Enriched energy optimized LEACH protocol for efficient data transmission in wireless sensor network15
Distributed multi-tenant RAN slicing in 5G networks15
Sustainable mobility in urban conditions- multimodal approach for greener cities: insights from Slovakia15
Correction: Transient analysis of enhanced hybrid spectrum access for QoS provisioning in multi-class cognitive radio networks15
AUV-assisted information collection scheme with energy balance and low delay of underwater things14
Downlink AP coordination based OFDMA and NOMA protocols for the next-generation WLANs14
Anti-jamming transmission in softwarization UAV network: a federated deep reinforcement learning approach14
Cloud-edge collaboration-based task offloading strategy in railway IoT for intelligent detection14
Evaluating the practical effectiveness of college counselors’ ideological and political education using big data video streaming14
Joint design of hybrid beamforming and reflection coefficients for reconfigurable intelligent surface aided mmWave communication systems14
Joint activity and channel estimation for asynchronous grant-Free NOMA with chaos sequence14
Discrimination of primary user emulation attack on cognitive radio networks using machine learning based spectrum sensing scheme14
User grouping and power allocation for energy efficiency maximization in mmWave-NOMA heterogeneous networks14
Energy consumption reduction in OFDMA wireless sensor networks in existence of interference hazards14
Joint call admission control and load-balancing in ultra-dense cellular networks: a proactive approach14
Improved multi-objective brain storm optimization algorithm for RFID network planning14
TBMR: trust based multi-hop routing for secure communication in flying ad-hoc networks14
Joint multi-server cache sharing and delay-aware task scheduling for edge-cloud collaborative computing in intelligent manufacturing14
Outage probability constrained resource allocation scheme in two-tier cooperative NOMA network with SWIPT14
Correction: Securing and optimizing IoT offloading with blockchain and deep reinforcement learning in multi-user environments13
A high-performance dual-element slotted THz antenna with enhanced MIMO metrics for 5G/6G applications13
Interval graph based energy efficient routing scheme for a connected topology in wireless sensor networks13
Enhanced random access throughput for fixed-location machine-type communications devices: a collision resolution scheme13
User pairing and location planning in multi-UAV assisted downlink NOMA for emergency communications13
3D-multilayer magneto-inductive transceiver coil structure and optimal placement of relays for non-conventional media13
NOMA for 5G and beyond: literature review and novel trends13
Performance analysis of fully generalized spatial modulation aided C-NOMA system for B5G applications13
An online approach for cooperative cache updating and forwarding in mobile edge network13
Energy efficient optimal parent selection with Chameleon Swarm algorithm and non-overlapping backoff algorithm based dynamic slot allocation in wireless body area network13
Coarse-to-fine label propagation with hybrid representation for deep semi-supervised bot detection12
Edge intelligence in wireless networks12
Performance analysis of RIS-assisted 6G vehicular networks with NOMA under diverse channel conditions12
Improved mutimodulus blind equalization algorithm for multi-level QAM signals with impulsive noise12
Interference mitigation for non-orthogonal multiple access in heterogeneous networks12
Tunnel lining quality detection technology based on impulse echo acoustic method from fine management perspective12
Mobility aware load balancing using Kho–Kho optimization algorithm for hybrid Li-Fi and Wi-Fi network12
Lens antenna for 3D steering of an OAM-synthesized beam12
Influence of spatial distribution of base-stations on off-body path loss statistics for wireless body area network applications12
An improved distance vector hop algorithm and A* algorithm with modified supernova optimizer for 3-dimensional localization in wireless sensor networks12
Managing risks in main equipment projects for 5G construction: a case study based on techno-environment-economic-planning indicator framework12
Secure and efficient authentication protocol with user untraceability for global roaming services12
Transmit antenna selection and resource allocation for sequential D2D registration in mmWave networks12
Adaptive computation offloading for latency-sensitive tasks in heterogeneous edge-cloud-enabled smart warehouses using Gau-Angle FIS and AGE-MOEA-II11
Effective capacity maximization of two-way full-duplex and half-duplex relays with finite block length packets transmission11
Performance evaluation of Software-Defined Network (SDN) controllers using Dijkstra’s algorithm11
Full duplex reconfigurable intelligent surfaces system relying on NOMA and wireless power transfer11
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism11
Edge computing in the loop simulation framework for automotive use cases evaluation11
Live video streaming service with pay-as-you-use model on Ethereum Blockchain and InterPlanetary file system11
Support vector machine approach of malicious user identification in cognitive radio networks11
Ranked searchable encryption based on differential privacy and blockchain11
Optimized flexible network architecture creation against 5G communication-based IoT using information-centric wireless computing11
Load balanced cluster formation to avoid energy hole problem in WSN using fuzzy rule-based system11
An adaptive secure internet of things and cloud based disease classification strategy for smart healthcare industry11
A 12-element 360° azimuth plane scanning circular antenna array for THz wireless devices11
An efficient resource provisioning and traffic load balancing in multiprotocol label switched network using optimized gated graph convolution neural network11
Survelliance monitoring based routing optimization for wireless sensor networks11
Design of an adaptive framework with compressive sensing for spatial data in wireless sensor networks11
Multi-theme hierarchical monitoring method for wireless sensor networks10
DV-Hop based localization algorithm using node negotiation and multiple communication radii for wireless sensor network10
A neuron fuzzy identification system based on a complex nonlinear mathematical model10
Range free localization in WSN against wormhole attack using Farkas’ Lemma10
Improved DV-Hop based on parallel compact Willow Catkin Optimization algorithm for 3D nodes localization in WSN10
BLE-based secure tracking system proposal10
A multi-frequency communication routing protocol for mobile devices in the Internet of things10
Downlink radio resource scheduling for OFDMA systems with hybrid beamforming10
An age of information based scheduling algorithm in a shared channel with energy and link capacity constraints10
Can differential privacy practically protect collaborative deep learning inference for IoT?10
An outlier detection method based on the hidden Markov model and copula for wireless sensor networks10
Efficient security framework against sybil attack in mobile adhoc network using EE-OLSR protocol scheme10
Crown shaped edge multiband antenna design for 5G and X-Band applications10
A target behavior pattern mining and abnormal behavior monitoring based on multidimensional similarity metric10
Multiple agent based reinforcement learning for energy efficient routing in WSN10
Distributed energy-efficient wireless sensing and information fusion via event-driven and state-rank activation10
Performance analysis for multi-RIS UAV NOMA mmWave communication systems10
A survey of application research based on blockchain smart contract10
Impact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice10
Performance analysis of variant MIMO systems over hoyt fading channel10
A novel intrusion detection system for internet of things devices and data9
Outage analysis of downlink communications in heterogeneous networks under backhaul constraint9
Quad element luna-shaped UWB-MIMO antenna with improved isolation and gain using novel decoupling networks9
Multi-modal interaction using time division long-term evolution (TD-LTE) for space designing exhibition9
An online joint optimization approach for task offloading and caching in multi-access edge computing9
Method for optimal allocation of network resources based on discrete probability model9
Doa estimation algorithm based on UV decomposition matrix completion9
Sensor node localization with improved hop-size using PSODESA optimization9
A comparison of measurement methodologies for the assessment of E-field level radiated by 5G NR base station9
Designing a demand forecasting model for human resources cloud data centres using fuzzy theory9
EWRPL: entropy-based weighted RPL9
Memetic algorithm applied to topology control optimization of a wireless sensor network9
Clustering and power allocation for secured access to simultaneous transmissions and sensing Internet of Things networks9
PKI-SMR: PKI based secure multipath routing for unmanned military vehicles (UMV) in VANETs9
A multi-criteria aware integrated decision making routing protocol for IoT communication toward 6G networks9
Applying machine learning enabled myriad fragment empirical modes in 5G communications to detect profile injection attacks9
Design and analysis of CPW-fed multiband antenna for bluetooth and X-band applications with SAR analysis on human head phantom9
A modified GADIA-based upper-bound to the capacity of Gaussian general N-relay networks9
Secure transmission in one-bit cell-free massive MIMO system with multiple non-colluding eavesdroppers9
UAV flight path design using multi-objective grasshopper with harmony search for cluster head selection in wireless sensor networks9
Deep learning detector for downlink IM-NOMA9
An energy efficiency optimization jointing resource allocation for delay-aware traffic in fronthaul constrained C-RAN9
Double fuzzy clustering-driven context neural network for intrusion detection in cloud computing9
Deep reinforcement learning mechanism for deadline-aware cache placement in device-to-device mobile edge networks9
Introducing a new algorithm based on collaborative game theory with the power of learning selfish node records to encourage selfish nodes in mobile social networks9
MAP based modeling method and performance study of a task offloading scheme with time-correlated traffic and VM repair in MEC systems9
A novel network flow prediction method based on UWB in power communication networks9
An energy efficient grid-based clustering algorithm using type-3 fuzzy system in wireless sensor networks9
Decision model of intrusion response based on markov game in fog computing environment9
Efficient downstream data dissemination in IAB networks with DAG-based topology9
Novel multi-agent reinforcement learning for maximizing throughput in UAV-Enabled 5G networks9
App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector9
6GIoDT: 6G-assisted intelligent resource utilization framework for the Internet of Drone Things9
Optimal emplacement of sensors by orbit-electron theory in wireless sensor networks8
Development status of 5G private networks in taiwan: law and practice8
Power allocation algorithms for massive MIMO systems with multi-antenna users8
A novel predictive localization algorithm for underwater wireless sensor networks8
Improving robustness and efficiency of edge computing models8
Capacity analysis of cognitive radio wireless sensor network under optimal power allocation in imperfect channel8
Physical layer security perspective resource allocation for D2D underlay communications against multiple eavesdroppers8
An efficient privacy-preserving recommender system in wireless networks8
On the outage performance of decode-and-forward based relay ordering in cognitive wireless sensor networks8
Online delay optimization for MEC and RIS-assisted wireless VR networks8
Optimization of sensor node location utilizing artificial intelligence for mobile wireless sensor network8
Enhanced reliability in wireless sensor networks: federated learning with Bayesian weighted random forest for secure and privacy-preserving threat detection8
Intelligent biomedical image classification in a big data architecture using metaheuristic optimization and gradient approximation8
Fairness and Applications’ transport protocol aware frame aggregation using programmable WLANs8
Friendly spectrum jamming against MIMO eavesdropping8
Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security8
Analysis of electromagnetic force on wireless charging structure8
Comprehensive early warning of power quality in distribution network based on deep learning8
Optimal deployment of multistatic radar for belt barrier coverage8
Indoor evaluation algorithm for ecological environment design materials based on cloud data processing and wireless communication8
Low area FPGA implementation of PRESENT cryptography with 3S-RLKG and MKS8
Enhanced subtraction-average-based optimizer and blockchain for security and load balancing in fog computing8
An approach to make handover efficient in 5G and beyond using deep hybrid learning8
A deep learning based algorithm with multi-level feature extraction for automatic modulation recognition8
D2PG: deep deterministic policy gradient based for maximizing network throughput in clustered EH-WSN8
Optimizing computation offloading under heterogeneous delay requirements for wireless powered mobile edge computing8
Novel Ku/K-Band low-power LNAs with simultaneous input impedance and noise matching8
Multi-agent based optimal UAV deployment for throughput maximization in 5 G communications8
A state-of-the-art survey on wireless rechargeable sensor networks: perspectives and challenges8
Fading-ratio-based selection for massive MIMO systems under line-of-sight propagation8
Channel coding for cooperative wideband spectrum sensing under imperfect reporting channels8
Joint optimization algorithm of offloading decision and resource allocation based on integrated sensing, communication, and computation8
Crystals kyber cryptographic algorithm for efficient IoT D2d communication8
A novel offloading scheduling method for mobile application in mobile edge computing8
A high-speed radio over free space optics transmission link under dust environment conditions employing hybrid wavelength- and mode-division multiplexing8
A wireless network based technical and tactical analysis of volleyball game based on data mining techniques8
Prediction of middle box-based attacks in Internet of Healthcare Things using ranking subsets and convolutional neural network8
Novel multiple access protocols against Q-learning-based tunnel monitoring using flying ad hoc networks8
Analysis of security and privacy issues in wearables for minors8
Large scale WSNs node localization based on salp swarm algorithm using density peak clustering strategy8
Optimum splitting computing for DNN training through next generation smart networks: a multi-tier deep reinforcement learning approach8
Optimal routing using whale optimization and lion optimization algorithm in WSN8
Optimal deployment of vehicular cloud computing systems with remote microclouds8
Throughput and harvesting time trade-off in a energy harvesting cognitive radio network8
A collaborative offloading framework for multiple UAV considering service caching8
Special issue on the technologies and applications of big data7
Enhanced autoencoder and deep neural network (AE&DNN) method for ddos attack recognition7
Spectrum analysis: assessing interference risks for Ku-band satellite services resulting from 5G/6G systems operating in X-band7
Clustering routing algorithm of wireless sensor network based on swarm intelligence7
Machine learning-based centralized link coding attack detection in software-defined network7
Collaborative vessel clustering for improved satellite communication in maritime systems7
Fast monte-carlo clustering for signal separation of RFID collision tags at physical layer7
0.065631866455078