Computer Networks

Papers
(The H4-Index of Computer Networks is 54. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial Board257
Editorial Board241
Editorial Board156
Experimental assessment of a JANUS-based consensus protocol151
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment142
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability141
Local Differential Privacy for correlated location data release in ITS141
Randomized distributed self-adjusting tree networks138
Neural quantile optimization for edge–cloud networking124
A marketplace model for drone-assisted edge computing in 5G scenarios120
(Vehicle’s YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network112
Online training data acquisition for federated learning in cloud–edge networks100
Editorial Board100
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge97
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance86
Image super resolution based channel estimation for future wireless communication82
Task offloading and multi-cache placement in multi-access mobile edge computing82
Reinforcement learning based tasks offloading in vehicular edge computing networks81
Balanced wireless crowd charging with mobility prediction and social awareness80
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs80
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting79
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques76
Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach76
Distance adaptive hybrid super-channels enabled by sliceable bandwidth variable transponder for spectrally efficient elastic optical networks75
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs75
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks73
Optimal server and service deployment for multi-tier edge cloud computing73
Estimation of the success probability of a malicious attacker on blockchain-based edge network73
Dominant coverage for target users at the lowest cost under competitive propagation in social networks73
Wireless powered NOMA-based cognitive radio for 6G networks72
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN69
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization69
A channel selection game for multi-operator LoRaWAN deployments69
Optimizing distributed firewall reconfiguration transients63
BGP convergence in an MRAI-free Internet62
Using channel predictions for improved proportional-fair utility for vehicular users62
Accelerating traffic engineering optimization for segment routing: A recommendation perspective62
SRRS: A blockchain fast propagation protocol based on non-Markovian process61
An anonymity-preserving mobile user authentication protocol for global roaming services61
All in one: Improving GPS accuracy and security via crowdsourcing61
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks60
Detecting malicious proxy nodes during IoT network joining phase60
MalCon: A blockchain-based malware containment framework for Internet of Things60
Swarm intelligence for hole detection and healing in wireless sensor networks59
Fair resource optimization for cooperative non-terrestrial vehicular networks59
Reinterpreting Usability of Semantic Segmentation Approach for Darknet Traffic Analysis58
Modeling and performance evaluation of OpenFlow switches using a MAP/PH/1/n queueing model58
Workforce capacity planning for proactive troubleshooting in the Network Operations Center58
BGP anomaly detection as a group dynamics problem57
An explicit rate control based traffic transmission and schedule scheme in UAV-IOT network slicing system56
Lightweight zero-knowledge authentication scheme for IoT embedded devices55
A many-objective optimization charging scheme for wireless rechargeable sensor networks via mobile charging vehicles55
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing54
A privacy-preserving attribute-based framework for IoT identity lifecycle management54
0.07533597946167