Computer Networks

Papers
(The H4-Index of Computer Networks is 53. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Editorial Board247
SharAcc: Enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization234
Editorial Board194
Editorial Board147
Experimental assessment of a JANUS-based consensus protocol138
Comparison of energy conservation strategies for 5G NR RedCap service in industrial environment137
DCCS: A dual congestion control signals based TCP for datacenter networks137
Local Differential Privacy for correlated location data release in ITS135
Robust function deployment against uncertain recovery time in different protection types with workload-dependent failure probability126
Randomized distributed self-adjusting tree networks122
Neural quantile optimization for edge–cloud networking117
On the prediction of large-scale road-network constrained trajectories109
A marketplace model for drone-assisted edge computing in 5G scenarios96
(Vehicle’s YB)-based LPB prediction model and anti-LPB (communication link)-reconstruction strategy in the (VLC/RF)-V2X network94
Multi-agent reinforcement learning for cost-aware collaborative task execution in energy-harvesting D2D networks93
Online training data acquisition for federated learning in cloud–edge networks84
A privacy-preserving attribute-based framework for IoT identity lifecycle management81
Editorial Board81
Estimation of the success probability of a malicious attacker on blockchain-based edge network79
Distance adaptive hybrid super-channels enabled by sliceable bandwidth variable transponder for spectrally efficient elastic optical networks76
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques75
Decentralized Receiver-based Link Stability-aware Forwarding Scheme for NDN-based VANETs75
Fast incremental reconfiguration of dynamic time-sensitive networks at runtime75
Reinforcement learning based tasks offloading in vehicular edge computing networks73
A fine-grained compression scheme for block transmission acceleration over IPFS network73
NTRU-CLS: Efficient quantum-resistant NTRU lattice-based certificateless signature scheme for VANETs72
Balanced wireless crowd charging with mobility prediction and social awareness71
Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration71
NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting70
Joint beamforming and user association with reduced CSI signaling in mobile environments: A Deep Q-learning approach69
In-network placement of delay-constrained computing tasks in a softwarized intelligent edge68
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing67
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks66
UAV deployment in WSN system for emergency/remote area applications65
Task offloading and multi-cache placement in multi-access mobile edge computing62
An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance62
Secure over-the-air software update for connected vehicles61
Explainable Artificial Intelligence in communication networks: A use case for failure identification in microwave networks60
Priority-awareness VNF migration method based on deep reinforcement learning59
A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: A proof-of-concept59
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization59
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things58
A channel selection game for multi-operator LoRaWAN deployments58
Using channel predictions for improved proportional-fair utility for vehicular users57
Accelerating traffic engineering optimization for segment routing: A recommendation perspective57
An anonymity-preserving mobile user authentication protocol for global roaming services57
BGP convergence in an MRAI-free Internet57
SRRS: A blockchain fast propagation protocol based on non-Markovian process57
Privacy-preserving edge caching: A probabilistic approach55
All in one: Improving GPS accuracy and security via crowdsourcing55
Quantum enhanced time synchronisation for communication network54
Efficient multichannel energy harvesting with dedicated energy transmitters in CR-IoT networks54
MalCon: A blockchain-based malware containment framework for Internet of Things54
0.065721035003662