ACM Transactions on Internet Technology

Papers
(The median citation count of ACM Transactions on Internet Technology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks106
SSWMNet: Solving the Speech Separation Problem While the Target is Wearing a Mask91
Analysis of the Behavior of Ethereum Accounts During an Economic Impact Event85
Fog Computing Platforms for Smart City Applications: A Survey82
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments64
Enabling Short-Term Energy Flexibility Markets Through Blockchain62
Selective Federated IDS Framework with Adaptation for Large-scale Segmented Industrial Networks57
Detection of Trust Information Tampering in IoT Service Environments55
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation51
Budget Inference Attacks and Countermeasures in Locally Differentially Private Data Collection41
An ECC Based Secure Authentication Protocol Ensuring Privacy in the Industrial IOT39
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics37
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy31
Optimizing Effectiveness and Defense of Drone Surveillance Missions via Honey Drones29
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English27
CAPilot: A High-Performance and High-Reliability Communication Middleware for Autonomous Driving26
Dynamic and Immersive Framework for Drone Delivery Services in Skyway Networks25
An End-to-end Trust Management Framework for Crowdsourced IoT Services25
The Tip of the Buyer: Extracting Product Tips from Reviews23
UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud22
LNNIDS: A Hybrid Liquid Neural Network based IDS for Known and Unknown IoT Attacks22
Interpersonal Communication Interconnection in Media Convergence Metaverse21
Malicious Participants and Fake Task Detection Incorporating Gaussian Bias21
Movie Account Recommendation on Instagram18
Communication-Efficient Federated Learning for Heterogeneous Clients18
Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services17
Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning17
ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application17
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency17
Editorial17
Identifying Concealed Channels in Internet Streaming Media Communication16
A Blockchain-based Decentralized Low-carbon Electric Vehicle Charging System16
Enhancing Alexa Skill Testing Through Improved Utterance Discovery16
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies16
Unsupervised Learning and Process Analysis for Sensor Data Validation in the IIoT15
Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things15
Achieving Resilient and Self-Adaptive Topology Configuration in 3D UAV Networks15
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds15
D-RecSys: A Decentralized Recommendation Framework for Web 3.0-Based Content-Sharing Platforms15
We Really Need the Help of AI: A Case Study of AI Adoption in Cybersecurity14
Seek and You Shall SOC: Blending Human Expertise with Multimodal Generative AI for Scalable Threat Prevention14
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems13
Optimizing WebAssembly Bytecode for IoT Devices Using Deep Reinforcement Learning12
Governance of Autonomous Agents on the Web: Challenges and Opportunities12
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications12
Modeling Inter-drone Interference as a Service in Skyway Networks12
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks11
EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum11
Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network11
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN)11
DxHash: A Memory-saving Consistent Hashing Algorithm11
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts10
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication10
Safeguarding User-Centric Privacy in Smart Homes10
Emerging Trends of ICT in Airborne Disease Prevention10
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot10
A Novel Cross-Domain Recommendation with Evolution Learning10
Quantum-safe Federated Learning Framework for Cyber Threat Detection in 5G-enabled IoT Ecosystems10
Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments10
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching10
Wielding Blockchain Transactions for Capture-Replay Testing of Upgradeable Smart Contracts9
A Rumor Propagation Prediction Based on Multi-dimensional User Characteristics9
SLO-aware Prioritization of Orchestration Times for Containerized Services9
LSDN Empowers the Metaverse Communication to Achieve High-Resolution Visuals with Lower Bandwidth9
Using Deep Learning Models to Detect Fake News about COVID-199
Tyche: Probabilistic Selection over Encrypted Data for Generative Language Models9
AI-assisted Blockchain-enabled Smart and Secure E-prescription Management Framework9
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution8
Cost-Optimized Periodic DAG-Structured Task Offloading in Multi-User MEC Systems Using Reinforcement Learning8
Improving Financial Statement Fraud Detection: A Large Language Model Processing Approach8
Signature-based IaaS Performance Change Detection8
Network-level Side-channel Attacks in the Lightning Network8
Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities8
EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters8
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks8
Integrated User Scheduling and Beam Steering in Over-the-Air Federated Learning for Mobile IoT8
BlockEdge: A Hybrid Blockchain Framework for Secure and Efficient Collaboration in EEC Environments7
Assessing and Mitigating Heterogeneity-Driven Security Threats in the Cloud7
Knowledge Graph Construction with a Façade : A Unified Method to Access Heterogeneous Data Sources on the Web7
Predicting Diabetes with Federated Learning: A Digital Twin and Medical Fog-based IoT Framework7
Distributed Computation Offloading and Power Control for UAV-Enabled Internet of Medical Things7
Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation7
Real-time Pricing-based Resource Allocation in Open Market Environments7
A Constraint-Based Approach to Optimise QoS- and Energy-Aware Cloud-Edge Application Deployments6
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing6
An Intent-driven DaaS Management Framework to Enhance User Quality of Experience6
RESP: A Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing6
A Reputation-based Framework for Honest Provenance Reporting6
HeLoRA: LoRA-heterogeneous Federated Fine-tuning for Foundation Models6
Optimizing Geo-Distributed Data Processing with Resource Heterogeneity over the Internet6
Poisoning-Resilient Federated Learning for MEC-IoT Environments Using Blockchain6
Exploring the Potential of Cyber Manufacturing System in the Digital Age6
Cloud-edge Collaboration for Robust Network Embeddings6
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs6
Incentivizing Cooperation for Handover Strategies in LEO Constellations via Fairness-guided MARL6
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems5
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City5
Accurate Bandwidth and Delay Prediction for 5G Cellular Networks5
SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion5
Attacking DoH and ECH: Does Server Name Encryption Protect Users’ Privacy?5
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network5
A Network Calculus Model for SFC Realization and Traffic Bounds Estimation in Data Centers5
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges5
PokéLLMon: A Grounding and Reasoning Benchmark for Large Language Models in Pokémon Battles4
FedGK: Communication-Efficient Federated Learning through Group-Guided Knowledge Distillation4
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces4
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment4
Market Manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data4
Conscious Task Recommendation via Cognitive Reasoning Computing in Mobile Crowd Sensing4
Breaking CaptchaStar Using the BASECASS Methodology4
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction4
Relieving Overexposure in Information Diffusion Through a Budget Multi-stage Allocation4
A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks4
Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City4
Offering Two-way Privacy for Evolved Purchase Inquiries4
DeepSDN: Deep Learning Based Software Defined Network Model for Cyberthreat Detection in IoT Network4
Open Set Dandelion Network for IoT Intrusion Detection4
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding4
Navigating the Metaverse: A Comprehensive Analysis of Consumer Electronics Prospects and Challenges4
OTI-IoT: A Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks4
0.029245853424072