ACM Transactions on Internet Technology

Papers
(The median citation count of ACM Transactions on Internet Technology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Analysis of the Behavior of Ethereum Accounts During an Economic Impact Event85
Enabling Short-Term Energy Flexibility Markets Through Blockchain83
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments79
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation74
Fog Computing Platforms for Smart City Applications: A Survey56
Budget Inference Attacks and Countermeasures in Locally Differentially Private Data Collection55
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy53
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics51
Dynamic and Immersive Framework for Drone Delivery Services in Skyway Networks46
An End-to-end Trust Management Framework for Crowdsourced IoT Services35
Optimizing Effectiveness and Defense of Drone Surveillance Missions via Honey Drones32
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English30
Movie Account Recommendation on Instagram29
LNNIDS: A Hybrid Liquid Neural Network based IDS for Known and Unknown IoT Attacks26
Communication-Efficient Federated Learning for Heterogeneous Clients25
Malicious Participants and Fake Task Detection Incorporating Gaussian Bias25
UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud24
Interpersonal Communication Interconnection in Media Convergence Metaverse24
The Tip of the Buyer: Extracting Product Tips from Reviews23
ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application22
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies21
Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services20
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency19
Editorial19
Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning18
Achieving Resilient and Self-Adaptive Topology Configuration in 3D UAV Networks17
Enhancing Alexa Skill Testing Through Improved Utterance Discovery17
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems16
Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things16
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications16
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds15
Negative Information Measurement at AI Edge: A New Perspective for Mental Health Monitoring14
Unsupervised Learning and Process Analysis for Sensor Data Validation in the IIoT14
D-RecSys: A Decentralized Recommendation Framework for Web 3.0-Based Content-Sharing Platforms13
Governance of Autonomous Agents on the Web: Challenges and Opportunities13
Optimizing WebAssembly Bytecode for IoT Devices Using Deep Reinforcement Learning13
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks13
PoSSUM: An Entity-centric Publish/Subscribe System for Diverse Summarization in Internet of Things13
Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network13
DxHash: A Memory-saving Consistent Hashing Algorithm12
EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum12
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts11
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN)11
Quantum-safe Federated Learning Framework for Cyber Threat Detection in 5G-enabled IoT Ecosystems11
Extracting Formats of Service Messages with Varying Payloads11
Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments10
Safeguarding User-Centric Privacy in Smart Homes10
Emerging Trends of ICT in Airborne Disease Prevention10
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot10
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication9
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching9
AI-assisted Blockchain-enabled Smart and Secure E-prescription Management Framework9
A Novel Cross-Domain Recommendation with Evolution Learning9
Wielding Blockchain Transactions for Capture-Replay Testing of Upgradeable Smart Contracts9
LSDN Empowers the Metaverse Communication to Achieve High-Resolution Visuals with Lower Bandwidth9
Using Deep Learning Models to Detect Fake News about COVID-199
SLO-aware Prioritization of Orchestration Times for Containerized Services9
Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models9
Signature-based IaaS Performance Change Detection8
Integrated User Scheduling and Beam Steering in Over-the-Air Federated Learning for Mobile IoT8
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks8
Cost-Optimized Periodic DAG-Structured Task Offloading in Multi-User MEC Systems Using Reinforcement Learning8
A Security Cost Modelling Framework for Cyber-Physical Systems8
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution8
Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities7
Predicting Diabetes with Federated Learning: A Digital Twin and Medical Fog-based IoT Framework7
A Reputation-based Framework for Honest Provenance Reporting7
Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation7
EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters7
BlockEdge: A Hybrid Blockchain Framework for Secure and Efficient Collaboration in EEC Environments7
Knowledge Graph Construction with a Façade : A Unified Method to Access Heterogeneous Data Sources on the Web7
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing7
Assessing and Mitigating Heterogeneity-Driven Security Threats in the Cloud7
Distributed Computation Offloading and Power Control for UAV-Enabled Internet of Medical Things7
Real-time Pricing-based Resource Allocation in Open Market Environments7
Optimizing Geo-Distributed Data Processing with Resource Heterogeneity over the Internet7
Incentivizing Cooperation for Handover Strategies in LEO Constellations via Fairness-guided MARL6
RESP: A Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing6
A Network Calculus Model for SFC Realization and Traffic Bounds Estimation in Data Centers6
A Constraint-Based Approach to Optimise QoS- and Energy-Aware Cloud-Edge Application Deployments6
Poisoning-Resilient Federated Learning for MEC-IoT Environments Using Blockchain6
HeLoRA: LoRA-heterogeneous Federated Fine-tuning for Foundation Models6
An Intent-driven DaaS Management Framework to Enhance User Quality of Experience6
Exploring the Potential of Cyber Manufacturing System in the Digital Age6
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs6
SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion6
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges5
Open Set Dandelion Network for IoT Intrusion Detection5
Attacking DoH and ECH: Does Server Name Encryption Protect Users’ Privacy?5
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems5
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces5
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City5
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network5
Navigating the Metaverse: A Comprehensive Analysis of Consumer Electronics Prospects and Challenges4
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment4
Special Section on Edge-AI for Connected Living4
A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks4
An Empirical View on Consolidation of the Web4
Offering Two-way Privacy for Evolved Purchase Inquiries4
Accurate Bandwidth and Delay Prediction for 5G Cellular Networks4
Relieving Overexposure in Information Diffusion Through a Budget Multi-stage Allocation4
AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks4
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction4
Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City4
Market Manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data4
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding4
Breaking CaptchaStar Using the BASECASS Methodology4
FedGK: Communication-Efficient Federated Learning through Group-Guided Knowledge Distillation4
DeepSDN: Deep Learning Based Software Defined Network Model for Cyberthreat Detection in IoT Network4
0.15804600715637