Computer Networks

Papers
(The H4-Index of Computer Networks is 56. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial Board228
Editorial Board196
Neural quantile optimization for edge–cloud networking190
Experimental assessment of a JANUS-based consensus protocol187
Editorial Board179
Using channel predictions for improved proportional-fair utility for vehicular users170
Balanced wireless crowd charging with mobility prediction and social awareness155
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge153
An anonymity-preserving mobile user authentication protocol for global roaming services146
SRRS: A blockchain fast propagation protocol based on non-Markovian process144
A channel selection game for multi-operator LoRaWAN deployments131
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs131
Randomized distributed self-adjusting tree networks107
SigNet-10: a dataset and CNN-based benchmark for signal-level network traffic classification106
IEEE 802.11Be WLANs: Performance assessment of multi-link operation with unsaturated queues104
A digital twin-assisted framework for secure task offloading in adaptive vehicular edge computing system103
Local Differential Privacy for correlated location data release in ITS90
Swarm intelligence for hole detection and healing in wireless sensor networks89
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs89
Quantum enhanced time synchronisation for communication network89
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet87
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis86
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things84
Workforce capacity planning for proactive troubleshooting in the Network Operations Center80
FuzzyDoo: A framework for finding flaws in the 5G landscape75
Privacy-preserving edge caching: A probabilistic approach72
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime70
Game theory based incentive mechanism for a bi-tiered public blockchain system69
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization69
DACS: Efficient resource allocation and power control for D2D communication considering RAN sharing69
Wireless powered NOMA-based cognitive radio for 6G networks68
Task offloading and multi-cache placement in multi-access mobile edge computing68
DCCS: A dual congestion control signals based TCP for datacenter networks68
Accelerating traffic engineering optimization for segment routing: A recommendation perspective67
Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration66
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing66
Symbiotic agents: A novel paradigm for trustworthy AGI-driven networks65
AI-enhanced hierarchical routing with Q-learning and graph neural networks for 6G-enabled internet of vehicles65
Mobility-Aware Predictive Split Federated Learning for 6G vehicular networks with ultra-low latency guarantees64
BGP anomaly detection as a group dynamics problem63
Optimizing distributed firewall reconfiguration transients63
Lightweight zero-knowledge authentication scheme for IoT embedded devices63
Priority-awareness VNF migration method based on deep reinforcement learning63
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks62
UAV deployment in WSN system for emergency/remote area applications62
Dominant coverage for target users at the lowest cost under competitive propagation in social networks61
A marketplace model for drone-assisted edge computing in 5G scenarios60
Modeling and performance evaluation of OpenFlow switches using a MAP/PH/1/n queueing model60
Fair resource optimization for cooperative non-terrestrial vehicular networks60
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance59
A trust-based incentive mechanism and resource allocation in fog networks59
An explicit rate control based traffic transmission and schedule scheme in UAV-IOT network slicing system57
A fine-grained compression scheme for block transmission acceleration over IPFS network57
(Vehicle’s YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network57
MalCon: A blockchain-based malware containment framework for Internet of Things57
Bi-LSTM/GRU-based anomaly diagnosis for virtual network function instance56
0.23606705665588