ACM Transactions on Internet Technology

Papers
(The median citation count of ACM Transactions on Internet Technology is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles176
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things89
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments73
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation72
Collusion-free for Cloud Verification toward the View of Game Theory65
Enabling Short-Term Energy Flexibility Markets Through Blockchain65
Adaptive Management of Volatile Edge Systems at Runtime With Satisfiability62
Fog Computing Platforms for Smart City Applications: A Survey54
Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction50
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning50
Special Section on AI-Empowered Internet of Things for Smart Cities50
Chinese Emotional Dialogue Response Generation via Reinforcement Learning50
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics49
Optimizing Effectiveness and Defense of Drone Surveillance Missions via Honey Drones49
A Multi-graph Convolutional Network Framework for Tourist Flow Prediction47
Dynamic and Immersive Framework for Drone Delivery Services in Skyway Networks46
An End-to-end Trust Management Framework for Crowdsourced IoT Services46
A Hybrid Feature Selection Algorithm Based on a Discrete Artificial Bee Colony for Parkinson's Diagnosis43
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English43
Privacy-preserving Time-series Medical Images Analysis Using a Hybrid Deep Learning Framework42
Improving Vaccine Safety Using Blockchain40
Short-term Load Forecasting by Using Improved GEP and Abnormal Load Recognition36
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy36
UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud35
Movie Account Recommendation on Instagram33
Interpersonal Communication Interconnection in Media Convergence Metaverse32
Malicious Participants and Fake Task Detection Incorporating Gaussian Bias31
Communication-Efficient Federated Learning for Heterogeneous Clients31
The Tip of the Buyer: Extracting Product Tips from Reviews28
Multimodal Brain Tumor Segmentation Based on an Intelligent UNET-LSTM Algorithm in Smart Hospitals28
ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application27
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems27
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions27
Automated Discovery of Network Cameras in Heterogeneous Web Pages26
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities26
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency26
Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services25
Editorial25
Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning23
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies23
On the Neural Backdoor of Federated Generative Models in Edge Computing23
Spatio-temporal Bayesian Learning for Mobile Edge Computing Resource Planning in Smart Cities22
Enhancing Alexa Skill Testing Through Improved Utterance Discovery22
Neural Network Approximation of Graph Fourier Transform for Sparse Sampling of Networked Dynamics22
SANTM: Efficient Self-attention-driven Network for Text Matching22
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds22
Negative Information Measurement at AI Edge: A New Perspective for Mental Health Monitoring21
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications21
Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things20
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems20
A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET19
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks19
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing19
DxHash: A Memory-saving Consistent Hashing Algorithm19
EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum18
Governance of Autonomous Agents on the Web: Challenges and Opportunities18
PoSSUM: An Entity-centric Publish/Subscribe System for Diverse Summarization in Internet of Things18
Optimizing WebAssembly Bytecode for IoT Devices Using Deep Reinforcement Learning18
QoS–aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges17
Predictive Analytics of Energy Usage by IoT-Based Smart Home Appliances for Green Urban Development17
Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network17
Game-Theoretic Strategic Coordination and Navigation of Multiple Wheeled Robots16
Intelligent Traffic Signal Control Based on Reinforcement Learning with State Reduction for Smart Cities16
The Efficient Mining of Skyline Patterns from a Volunteer Computing Network15
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts15
Extracting Formats of Service Messages with Varying Payloads15
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN)15
Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform15
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things14
Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme14
Emerging Trends of ICT in Airborne Disease Prevention14
Unsupervised Derivation of Keyword Summary for Short Texts14
Using Social Media Data to Analyse Issue Engagement During the 2017 German Federal Election14
Safeguarding User-Centric Privacy in Smart Homes14
A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images14
Machine Learning and Soil Humidity Sensing: Signal Strength Approach14
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot14
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System14
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication14
Introduction to the Special Section on Cognitive Robotics on 5G/6G Networks13
An Incentive-based Mechanism for Volunteer Computing Using Blockchain13
Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments13
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching12
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks12
CROWD: Crow Search and Deep Learning based Feature Extractor for Classification of Parkinson’s Disease12
An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments12
A Novel Cross-Domain Recommendation with Evolution Learning11
MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs11
Using Deep Learning Models to Detect Fake News about COVID-1911
LSDN Empowers the Metaverse Communication to Achieve High-Resolution Visuals with Lower Bandwidth11
AI-assisted Blockchain-enabled Smart and Secure E-prescription Management Framework10
A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments10
Wielding Blockchain Transactions for Capture-Replay Testing of Upgradeable Smart Contracts10
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution10
Serving at the Edge: An Edge Computing Service Architecture Based on ICN10
EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters10
A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures9
Signature-based IaaS Performance Change Detection9
Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities9
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks9
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity9
A Security Cost Modelling Framework for Cyber-Physical Systems9
Distributed Computation Offloading and Power Control for UAV-Enabled Internet of Medical Things8
Adaptive Fuzzy Game-Based Energy-Efficient Localization in 3D Underwater Sensor Networks8
Knowledge Graph Construction with a Façade : A Unified Method to Access Heterogeneous Data Sources on the Web8
The Security of Medical Data on Internet Based on Differential Privacy Technology8
Predicting Diabetes with Federated Learning: A Digital Twin and Medical Fog-based IoT Framework8
A Reputation-based Framework for Honest Provenance Reporting8
Exploring the Potential of Cyber Manufacturing System in the Digital Age7
Real-time Pricing-based Resource Allocation in Open Market Environments7
Detecting Malicious Switches for a Secure Software-defined Tactile Internet7
Optimizing Geo-Distributed Data Processing with Resource Heterogeneity over the Internet7
A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing7
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing7
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs7
HeLoRA: LoRA-heterogeneous Federated Fine-tuning for Foundation Models7
A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications7
Sentence Semantic Matching Based on 3D CNN for Human–Robot Language Interaction7
Random Graph-based Multiple Instance Learning for Structured IoT Smart City Applications7
Proof-of-Prestige: A Useful Work Reward System for Unverifiable Tasks7
RESP: A Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing7
SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion6
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges6
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City6
Open Set Dandelion Network for IoT Intrusion Detection6
InFeMo: Flexible Big Data Management Through a Federated Cloud System6
A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things6
Attacking DoH and ECH: Does Server Name Encryption Protect Users’ Privacy?6
Agile Support Vector Machine for Energy-efficient Resource Allocation in IoT-oriented Cloud using PSO6
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces6
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems6
Market Manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data6
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment6
A Network Calculus Model for SFC Realization and Traffic Bounds Estimation in Data Centers6
An Intent-driven DaaS Management Framework to Enhance User Quality of Experience6
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network6
Accurate Bandwidth and Delay Prediction for 5G Cellular Networks6
Relieving Overexposure in Information Diffusion Through a Budget Multi-stage Allocation6
Fast Search of Lightweight Block Cipher Primitives via Swarm-like Metaheuristics for Cyber Security5
Cognitive Wearable Robotics for Autism Perception Enhancement5
Predictive Analytics for Smart Parking: A Deep Learning Approach in Forecasting of IoT Data5
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model5
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction5
IP Geolocation through Reverse DNS5
A Novel Image Inpainting Framework Using Regression5
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images5
Navigating the Metaverse: A Comprehensive Analysis of Consumer Electronics Prospects and Challenges5
Incremental Group-Level Popularity Prediction in Online Social Networks5
Investigating the Spread of Coronavirus Disease via Edge-AI and Air Pollution Correlation5
Special Section on Edge-AI for Connected Living5
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding5
Introduction To The Special Section On Edge/Fog Computing For Infectious Disease Intelligence5
A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks5
0.061311960220337