IEEE-ACM Transactions on Networking

Papers
(The TQCC of IEEE-ACM Transactions on Networking is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
IEEE/ACM Transactions on Networking Information for Authors143
A Shifting Filter Framework for Dynamic Set Queries109
Joint Online Optimization of Model Training and Analog Aggregation for Wireless Edge Learning91
PACC: A Proactive CNP Generation Scheme for Datacenter Networks88
Enabling Multi-Frequency and Wider-Band RFID Sensing Using COTS Device76
Revisiting Wireless Breath and Crowd Inference Attacks With Defensive Deception73
Optimal Edge Caching for Individualized Demand Dynamics71
InaudibleKey2.0: Deep Learning-Empowered Mobile Device Pairing Protocol Based on Inaudible Acoustic Signals65
Circling Reduction Algorithm for Cloud Edge Traffic Allocation Under the 95th Percentile Billing64
MuSher: An Agile Multipath-TCP Scheduler for Dual-Band 802.11ad/ac Wireless LANs59
On the Optimal Duration of Spectrum Leases in Exclusive License Markets With Stochastic Demand58
Approximate Packet Classifiers With Controlled Accuracy58
Efficient Link Scheduling Solutions for the Internet of Things Under Rayleigh Fading58
PeerProbe: Estimating Vehicular Neighbor Distribution With Adaptive Compressive Sensing51
Time-Efficient Range Detection in Commodity RFID Systems50
Mean Field Graph Based D2D Collaboration and Offloading Pricing in Mobile Edge Computing49
StarFront: Cooperatively Constructing Pervasive and Low-Latency CDNs Upon Emerging LEO Satellites and Clouds48
Blockchain for Data Sharing at the Network Edge: Trade-Off Between Capability and Security43
Practical and Efficient Coded Transmission for Full-Duplex Relay Networks Without CSI43
Delay-Optimal Distributed Computation Offloading in Wireless Edge Networks42
Self-Adaptive Sampling Based Per-Flow Traffic Measurement41
Revisiting Nakamoto Consensus in Asynchronous Networks: A Comprehensive Analysis of Bitcoin Safety and Chain Quality40
A Novel Self-Supervised Framework Based on Masked Autoencoder for Traffic Classification40
Combating Bufferbloat in Multi-Bottleneck Networks: Theory and Algorithms40
Traffic-Aware Configuration of All-Optical Data Center Networks Based on Hyper-FleX-LION40
DeviceRadar: Online IoT Device Fingerprinting in ISPs Using Programmable Switches40
Accelerating Geo-Distributed Machine Learning With Network-Aware Adaptive Tree and Auxiliary Route39
An Anonymity Vulnerability in Tor38
Distributed Transport Protocols for Quantum Data Networks37
Incentivizing Massive Unknown Workers for Budget-Limited Crowdsensing: From Off-Line and On-Line Perspectives35
IEEE/ACM Transactions on Networking Information for Authors34
IEEE/ACM Transactions on Networking Society Information33
Internet Traffic Volumes are Not Gaussian—They are Log-Normal: An 18-Year Longitudinal Study With Implications for Modelling and Prediction32
Serving Graph Neural Networks With Distributed Fog Servers for Smart IoT Services32
Autonomous Robustness Control for Fog Reinforcement in Dynamic Wireless Networks31
Asymptotically Optimal Online Caching on Multiple Caches With Relaying and Bypassing31
Local Fast Rerouting With Low Congestion: A Randomized Approach30
A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic30
Enabling Cross-Technology Communication From WiFi to LoRa With IEEE 802.11ax30
Social Sourcing: Incorporating Social Networks Into Crowdsourcing Contest Design29
LiFi for Low-Power and Long-Range RF Backscatter29
DistMind: Efficient Resource Disaggregation for Deep Learning Workloads29
An Imperceptible Eavesdropping Attack on WiFi Sensing Systems29
DeepScaling: Autoscaling Microservices With Stable CPU Utilization for Large Scale Production Cloud Systems28
Minimizing Edge Caching Service Costs Through Regret-Optimal Online Learning28
FlowSail: Fine-Grained and Practical Flow Control for Datacenter Networks28
Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning27
Transmission Scheduling for Remote State Estimation in CPSs With Two-Hop Networks Subject to DoS Attacks27
A Framework for Policy Inconsistency Detection in Software-Defined Networks27
Blockchain-Enabled Federated Learning-Based Resource Allocation and Trading for Network Slicing in 5G26
Crowdfunding With Cognitive Limitations26
Network Traffic Shaping for Enhancing Privacy in IoT Systems26
Bolt: Scalable and Cost-Efficient Multistring Pattern Matching With Programmable Switches26
Energy Cost Minimization in Wireless Rechargeable Sensor Networks26
A3D: Adaptive, Accurate, and Autonomous Navigation for Edge-Assisted Drones26
BOSE: Block-Wise Federated Learning in Heterogeneous Edge Computing25
NCScale: Toward Optimal Storage Scaling via Network Coding25
Table of Contents24
A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes24
Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting24
Deep Reinforcement Learning Based Cross-Layer Design in Terahertz Mesh Backhaul Networks24
Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound24
Combining Regularization With Look-Ahead for Competitive Online Convex Optimization24
Optimal Weighted Load Balancing in TCAMs23
Precise Wireless Charging in Complicated Environments23
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation23
Offloading Elastic Transfers to Opportunistic Vehicular Networks Based on Imperfect Trajectory Prediction23
MTU-Adaptive In-Band Network-Wide Telemetry23
Online Learning for Failure-Aware Edge Backup of Service Function Chains With the Minimum Latency23
Maximizing Last-Minute Backup in Endangered Time-Varying Inter-Datacenter Networks23
Southbound Message Delivery With Virtual Network Topology Awareness in Clouds22
Privacy-Aware Participant Recruitment in Opportunistic Device to Device Networks22
Scaling Up Edge-Assisted Real-Time Collaborative Visual SLAM Applications21
Outlier-Concerned Data Completion Exploiting Intra- and Inter-Data Correlations in Sparse CrowdSensing21
Revisiting RFID Missing Tag Identification: Theoretical Foundation and Algorithm Design21
Empowering In-Network Classification in Programmable Switches by Binary Decision Tree and Knowledge Distillation21
Fast Retrieval of Large Entries With Incomplete Measurement Data21
HLB: Toward Load-Aware Load Balancing21
Power Is Knowledge: Distributed and Throughput Optimal Power Control in Wireless Networks21
IEEE/ACM Transactions on Networking Publication Information20
Automating Cloud Deployment for Real-Time Online Foundation Model Inference20
Scheduling Coflows With Dependency Graph20
Accelerating Distributed Training With Collaborative In-Network Aggregation20
Load Balancing With Multi-Level Signals for Lossless Datacenter Networks20
An Exact Implementation of the Abstract MAC Layer via Carrier Sensing in Dynamic Networks20
Self-Learning Multi-Mode Slicing Mechanism for Dynamic Network Architectures20
Toward Resource-Efficient and High- Performance Program Deployment in Programmable Networks19
SCDP: Systematic Rateless Coding for Efficient Data Transport in Data Centers19
Fast and Scalable ACL Policy Solving Under Complex Constraints With Graph Neural Networks19
QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge19
Age of Information for Updates With Distortion: Constant and Age-Dependent Distortion Constraints18
Meeting Coflow Deadlines in Data Center Networks With Policy-Based Selective Completion18
Stability and Optimization of Speculative Queueing Networks18
Meta-Scheduling for the Wireless Downlink Through Learning With Bandit Feedback18
Toward Improved Energy Fairness in CSMA-Based LoRaWAN18
How Do You Earn Money on Live Streaming Platforms?—A Study of Donation-Based Markets18
Tagcaster: Activating Wireless Voice of Electronic Toll Collection Systems With Zero Start-Up Cost18
RCC: Enabling Receiver-Driven RDMA Congestion Control With Congestion Divide-and-Conquer in Datacenter Networks18
Experimental Design Networks: A Paradigm for Serving Heterogeneous Learners Under Networking Constraints18
Toward Flexible and Predictable Path Programmability Recovery Under Multiple Controller Failures in Software-Defined WANs18
Fence: Fee-Based Online Balance-Aware Routing in Payment Channel Networks17
Deployment Optimization of Intelligent Wireless Sensor Network Using Graph Similarity Based on Multi-Granularity Cross Representation and Matching17
Adjusting Switching Granularity of Load Balancing for Heterogeneous Datacenter Traffic17
EdgeBOL: A Bayesian Learning Approach for the Joint Orchestration of vRANs and Mobile Edge AI17
Per-Flow Network Measurement With Distributed Sketch17
DBTable: Leveraging Discriminative Bitsets for High-Performance Packet Classification17
Distributed Scheduling With Centralized Coordination for Scalable Wireless Mesh Networking17
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain16
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging16
Cache Networks of Counting Queues16
On the Theoretical Gap of Channel Hopping Sequences With Maximum Rendezvous Diversity in the Multichannel Rendezvous Problem16
Real-Time Update of Joint SFC and Routing in Software Defined Networks16
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack16
IEEE/ACM Transactions on Networking Publication Information15
IEEE/ACM Transactions on Networking Publication Information15
Per-Packet Traffic Measurement in Storage, Computation and Bandwidth Limited Data Plane15
Straggler-Aware Gradient Aggregation for Large-Scale Distributed Deep Learning System15
IEEE/ACM Transactions on Networking Publication Information15
Table of Contents15
Optimal Finite Horizon Scheduling of Wireless Networked Control Systems15
Charting the Complexity Landscape of Compiling Packet Programs to Reconfigurable Switches15
On the Benefits of Traffic “Reprofiling” the Single Hop Case15
IEEE/ACM Transactions on Networking Information for Authors15
c-Chirp: Towards Symmetric Cross-Technology Communication Over Asymmetric Channels15
IEEE/ACM Transactions on Networking Information for Authors15
Deep Distributional Reinforcement Learning-Based Adaptive Routing With Guaranteed Delay Bounds15
A Computational Approach to Packet Classification15
Martingale Theory Application to the Delay Analysis of a Multi-Hop Aloha NOMA Scheme in Edge Computing Systems14
Efficient Distributed DNNs in the Mobile-Edge-Cloud Continuum14
Decentralized Caching Under Nonuniform File Popularity and Size: Memory-Rate Tradeoff Characterization14
A Mobility-Resilient Spectrum Sharing Framework for Operating Wireless UAVs in the 6 GHz Band14
Movement-Based Reliable Mobility Management for Beyond 5G Cellular Networks14
Reliable Multi-Factor User Authentication With One Single Finger Swipe14
6Scan: A High-Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding14
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning14
Social-Aware Clustered Federated Learning With Customized Privacy Preservation14
Toward Multi-User Authentication Using WiFi Signals14
How to Use In-Band Network Telemetry Wisely: Network-Wise Orchestration of Sel-INT14
Congestion Control for Cross-Datacenter Networks14
Entanglement From Sky: Optimizing Satellite-Based Entanglement Distribution for Quantum Networks14
Multi-Transmitter Coded Caching Networks With Transmitter-Side Knowledge of File Popularity14
Adapting Wireless Network Configuration From Simulation to Reality via Deep Learning-Based Domain Adaptation13
Deep Transfer Learning Across Cities for Mobile Traffic Prediction13
Unifying AoI Minimization and Remote Estimation—Optimal Sensor/Controller Coordination With Random Two-Way Delay13
Virtual Filter for Non-Duplicate Sampling With Network Applications13
HyperTester: High-Performance Network Testing Driven by Programmable Switches13
RouteNet-Fermi: Network Modeling With Graph Neural Networks13
Accelerating DNN Inference With Reliability Guarantee in Vehicular Edge Computing13
Single-Forking of Coded Subtasks for Straggler Mitigation13
Optimal Sampling for Data Freshness: Unreliable Transmissions With Random Two-Way Delay13
Enabling Quasi-Static Reconfigurable Networks With Robust Topology Engineering13
Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection13
A Low-Power Demodulator for LoRa Backscatter Systems With Frequency-Amplitude Transformation13
Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks13
Joint Multichannel-Spatial Diversity for Efficient Opportunistic Routing in Low-Power Wireless Networks13
Cocktail Edge Caching: Ride Dynamic Trends of Content Popularity With Ensemble Learning12
Progressive Slice Recovery With Guaranteed Slice Connectivity After Massive Failures12
Encrypted TLS Traffic Classification on Cloud Platforms12
Predicting Learning Interactions in Social Learning Networks: A Deep Learning Enabled Approach12
IEEE/ACM Transactions on Networking Information for Authors12
Scheduling Most Valuable Committees for the Sharded Blockchain12
Dynamic Discrete Topology Design and Routing for Satellite-Terrestrial Integrated Networks12
Information-Sensitive In-Band Network Telemetry in P4-Based Programmable Data Plane12
Distributed Stable Multi-Source Dynamic Broadcasting for Wireless Multi-Hop Networks Under SINR-Based Adversarial Channel Jamming12
Cuckoo Counter: Adaptive Structure of Counters for Accurate Frequency and Top-k Estimation12
A Tale of Three Videoconferencing Applications: Zoom, Webex, and Meet12
Output Reachable Set Synthesis of Event-Triggered Control for Singular Markov Jump Systems Under Multiple Cyber-Attacks12
A Framework for Anomaly Detection in Blockchain Networks With Sketches12
Capability Reconciliation for a CSP Approach to Virtual Device Composition12
Optimal Oblivious Routing With Concave Objectives for Structured Networks12
Quick and Reliable LoRa Data Aggregation Through Multi-Packet Reception12
A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs12
IEEE/ACM Transactions on Networking Information for Authors12
Interactive Anomaly Detection in Dynamic Communication Networks12
Improved Throughput for All-or-Nothing Multicommodity Flows With Arbitrary Demands12
On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems11
MVPipe: Enabling Lightweight Updates and Fast Convergence in Hierarchical Heavy Hitter Detection11
Adaptive Block-Wise Regularization and Knowledge Distillation for Enhancing Federated Learning11
Reliable and Practical Bluetooth Backscatter With Commodity Devices11
IEEE/ACM Transactions on Networking Information for Authors11
Minimizing Charging Delay for Directional Charging11
Simultaneous Data Dissemination Among WiFi and ZigBee Devices11
KPI Guarantees in Network Slicing11
FlowStar: Fast Convergence Per-Flow State Accurate Congestion Control for InfiniBand11
Reducing Mobile Web Latency Through Adaptively Selecting Transport Protocol11
Asynchronous Load Balancing and Auto-Scaling: Mean-Field Limit and Optimal Design11
IEEE/ACM Transactions on Networking Society Information11
Approaching an Optimal Bitcoin Mining Overlay11
Online Approximation Scheme for Scheduling Heterogeneous Utility Jobs in Edge Computing11
Multi-Stage Hybrid Federated Learning Over Large-Scale D2D-Enabled Fog Networks11
Continuous Network Update With Consistency Guaranteed in Software-Defined Networks11
A Robustness-Aware Real-Time SFC Routing Update Scheme in Multi-Tenant Clouds11
Coexistent Routing and Flooding Using WiFi Packets in Heterogeneous IoT Network11
Age-Dependent Distributed MAC for Ultra-Dense Wireless Networks11
Octopus: Exploiting the Edge Intelligence for Accessible 5G Mobile Performance Enhancement11
A Compressive Integrity Auditing Protocol for Secure Cloud Storage11
Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps11
IIsy: Hybrid In-Network Classification Using Programmable Switches11
Machine Learning on Volatile Instances: Convergence, Runtime, and Cost Tradeoffs11
From Non-Optimal Routing Protocols to Routing on Multiple Optimality Criteria11
Combating Packet Collisions Using Non-Stationary Signal Scaling in LPWANs11
List of Reviewers10
On the Need of Neuromorphic Twins to Detect Denial-of-Service Attacks on Communication Networks10
Native WiFi Backscatter10
Dependable Virtualized Fabric on Programmable Data Plane10
Minimizing Age of Incorrect Information Over a Channel With Random Delay10
Ark Filter: A General and Space-Efficient Sketch for Network Flow Analysis10
Enforcing Fairness in the Traffic Policer Among Heterogeneous Congestion Control Algorithms10
Revisiting Congestion Detection in Lossless Networks10
HyLink: Toward High Throughput LPWANs With LoRa Compatible Communication10
An Approximation Algorithm for the h-Hop Independently Submodular Maximization Problem and Its Applications10
A Hybrid NOMA-Based MAC Protocol for Underwater Acoustic Networks10
P-Sketch: A Fast and Accurate Sketch for Persistent Item Lookup10
Verifiable Query Processing Over Outsourced Social Graph10
IEEE/ACM Transactions on Networking Publication Information10
Enhancing Fairness for Approximate Weighted Fair Queueing With a Single Queue10
Distributed Resource Allocation and Flow Control Algorithms for mmWave IAB Networks10
Identifying RFID Tags in Collisions10
MiFi: Bounded Update to Optimize Network Performance in Software-Defined Data Centers10
SlimFL: Federated Learning With Superposition Coding Over Slimmable Neural Networks10
Utility Optimal Thread Assignment and Resource Allocation in Multi-Server Systems9
FlexNF: Flexible Network Function Orchestration for Scalable On-Path Service Chain Serving9
Revealing Smart Selective Jamming Attacks in WirelessHART Networks9
Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs9
On Flow Control and Optimized Back-Off in Non-Saturated CSMA9
Enabling Byzantine Fault Tolerance in Access Authentication for Mega-Constellations9
De-RPOTA: Decentralized Learning With Resource Adaptation and Privacy Preservation Through Over-the-Air Computation9
Composite Community-Aware Diversified Influence Maximization With Efficient Approximation9
A Generalized Method to Combat Multipaths for RFID Sensing9
Scout Sketch+: Finding Both Promising and Damping Items Simultaneously in Data Streams9
A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification9
Table of Contents9
Memento: Making Sliding Windows Efficient for Heavy Hitters9
Boosting or Hindering: AoI and Throughput Interrelation in Routing-Aware Multi-Hop Wireless Networks9
When Classic Meets Intelligence: A Hybrid Multipath Congestion Control Framework9
Toward Scalable and Low-Cost Traffic Testing for Evaluating DDoS Defense Solutions9
Fast Outbreak Sense and Effective Source Inference via Minimum Observer Set9
Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection9
A Self-Adaptive Robustness Optimization Method With Evolutionary Multi-Agent for IoT Topology9
Optimizing Task Placement and Online Scheduling for Distributed GNN Training Acceleration in Heterogeneous Systems8
Parallel Placement of Virtualized Network Functions via Federated Deep Reinforcement Learning8
Resource Critical Flow Monitoring in Software-Defined Networks8
Taming the Insecurity of Cellular Emergency Services (9–1-1): From Vulnerabilities to Secure Designs8
Bamboo Filters: Make Resizing Smooth and Adaptive8
Efficient Single-Symbol Backscatter With Uncontrolled Ambient OFDM WiFi8
IEEE/ACM Transactions on Networking Society Information8
AoI, Timely-Throughput, and Beyond: A Theory of Second-Order Wireless Network Optimization8
Rhythmic RFID Authentication8
TCP FlexiS: A New Approach to Incipient Congestion Detection and Control8
IEEE/ACM Transactions on Networking Information for Authors8
0.69292497634888