Computer Networks

Papers
(The H4-Index of Computer Networks is 56. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
The design of an RIS-assisted FDMA wireless sensor network for sum throughput maximization291
Editorial Board199
Editorial Board176
Neural quantile optimization for edge–cloud networking174
Experimental assessment of a JANUS-based consensus protocol165
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment163
Local Differential Privacy for correlated location data release in ITS158
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs139
Editorial Board135
Detecting malicious proxy nodes during IoT network joining phase134
BGP convergence in an MRAI-free Internet127
Using channel predictions for improved proportional-fair utility for vehicular users120
Balanced wireless crowd charging with mobility prediction and social awareness120
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge115
Dominant coverage for target users at the lowest cost under competitive propagation in social networks98
An anonymity-preserving mobile user authentication protocol for global roaming services93
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks91
Online training data acquisition for federated learning in cloud–edge networks89
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability86
SRRS: A blockchain fast propagation protocol based on non-Markovian process86
Editorial Board84
A channel selection game for multi-operator LoRaWAN deployments83
Randomized distributed self-adjusting tree networks82
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs82
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance81
On the prediction of large-scale road-network constrained trajectories81
Optimizing distributed firewall reconfiguration transients81
Swarm intelligence for hole detection and healing in wireless sensor networks78
Workforce capacity planning for proactive troubleshooting in the Network Operations Center77
FuzzyDoo: A framework for finding flaws in the 5G landscape76
An efficient certificateless aggregate signature scheme resistant to collusion attacks for VANETs74
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks72
Quantum enhanced time synchronisation for communication network71
Secure over-the-air software update for connected vehicles69
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime67
Privacy-preserving edge caching: A probabilistic approach66
DCCS: A dual congestion control signals based TCP for datacenter networks66
Reinforcement learning based tasks offloading in vehicular edge computing networks66
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing65
A privacy-preserving attribute-based framework for IoT identity lifecycle management65
Game theory based incentive mechanism for a bi-tiered public blockchain system63
DACS: Efficient resource allocation and power control for D2D communication considering RAN sharing62
All in one: Improving GPS accuracy and security via crowdsourcing59
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles59
Fair resource optimization for cooperative non-terrestrial vehicular networks59
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks59
Image super resolution based channel estimation for future wireless communication58
Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration58
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting58
A marketplace model for drone-assisted edge computing in 5G scenarios58
Accelerating traffic engineering optimization for segment routing: A recommendation perspective58
An explicit rate control based traffic transmission and schedule scheme in UAV-IOT network slicing system57
Symbiotic agents: A novel paradigm for trustworthy AGI-driven networks56
Mobility-Aware Predictive Split Federated Learning for 6G vehicular networks with ultra-low latency guarantees56
Wireless powered NOMA-based cognitive radio for 6G networks56
MalCon: A blockchain-based malware containment framework for Internet of Things56
0.20456409454346