ACM Transactions on Internet Technology

Papers
(The median citation count of ACM Transactions on Internet Technology is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Data-Driven Prediction and Optimization of Energy Use for Transit Fleets of Electric and ICE Vehicles91
L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation76
Adaptive Management of Volatile Edge Systems at Runtime With Satisfiability70
Collusion-free for Cloud Verification toward the View of Game Theory69
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning58
Enabling Short-Term Energy Flexibility Markets Through Blockchain53
Fog Computing Platforms for Smart City Applications: A Survey52
Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments51
A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things51
Analysis of the Behavior of Ethereum Accounts During an Economic Impact Event49
VoiceTalk: Multimedia-IoT Applications for Mixing Mandarin, Taiwanese, and English47
An End-to-end Trust Management Framework for Crowdsourced IoT Services42
Dynamic and Immersive Framework for Drone Delivery Services in Skyway Networks41
Optimizing Effectiveness and Defense of Drone Surveillance Missions via Honey Drones38
SDN-enabled Resource Provisioning Framework for Geo-Distributed Streaming Analytics34
Reaching for the Sky: Maximizing Deep Learning Inference Throughput on Edge Devices with AI Multi-Tenancy34
Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction29
Malicious Participants and Fake Task Detection Incorporating Gaussian Bias27
UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud27
Communication-Efficient Federated Learning for Heterogeneous Clients27
Movie Account Recommendation on Instagram27
The Tip of the Buyer: Extracting Product Tips from Reviews26
Interpersonal Communication Interconnection in Media Convergence Metaverse26
ISDNet: AI-enabled Instance Segmentation of Aerial Scenes for Smart Cities25
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions24
ML-Based Identification of Neuromuscular Disorder Using EMG Signals for Emotional Health Application24
Editorial23
Optimal Energy-Centric Resource Allocation and Offloading Scheme for Green Internet of Things Using Machine Learning22
Guest Editors’ Introduction for Special Issue on Applications of Computational Linguistics in Multimedia IoT Services22
Tuneman: Customizing Networks to Guarantee Application Bandwidth and Latency21
Facilitating Serverless Match-based Online Games with Novel Blockchain Technologies20
Automated Discovery of Network Cameras in Heterogeneous Web Pages20
Enhancing Alexa Skill Testing Through Improved Utterance Discovery20
Negative Information Measurement at AI Edge: A New Perspective for Mental Health Monitoring19
On the Neural Backdoor of Federated Generative Models in Edge Computing19
Neural Network Approximation of Graph Fourier Transform for Sparse Sampling of Networked Dynamics19
SANTM: Efficient Self-attention-driven Network for Text Matching18
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds18
Federated Learning-based Information Leakage Risk Detection for Secure Medical Internet of Things18
DxHash: A Memory-saving Consistent Hashing Algorithm17
Achieving Resilient and Self-Adaptive Topology Configuration in 3D UAV Networks17
Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks17
Digital Twin of Intelligent Small Surface Defect Detection with Cyber-manufacturing Systems17
Optimizing WebAssembly Bytecode for IoT Devices Using Deep Reinforcement Learning17
BACKM-EHA: A Novel Blockchain-enabled Security Solution for IoMT-based E-healthcare Applications17
PoSSUM: An Entity-centric Publish/Subscribe System for Diverse Summarization in Internet of Things15
Predictive Analytics of Energy Usage by IoT-Based Smart Home Appliances for Green Urban Development15
EtherShield: Time-interval Analysis for Detection of Malicious Behavior on Ethereum15
Governance of Autonomous Agents on the Web: Challenges and Opportunities15
Atrial Fibrillation Detection from Compressed ECG Measurements for Wireless Body Sensor Network14
A Novel Approach for Efficient Packet Transmission in Volunteered Computing MANET14
QoS–aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges14
Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN)14
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts13
Extracting Formats of Service Messages with Varying Payloads13
Machine Learning-based Mist Computing Enabled Internet of Battlefield Things13
Multi-Tier Stack of Block Chain with Proxy Re-Encryption Method Scheme on the Internet of Things Platform12
Resilient Distributed Constraint Reasoning to Autonomously Configure and Adapt IoT Environments12
Machine Learning and Soil Humidity Sensing: Signal Strength Approach12
Conco-ERNIE: Complex User Intent Detect Model for Smart Healthcare Cognitive Bot12
Using Social Media Data to Analyse Issue Engagement During the 2017 German Federal Election11
Safeguarding User-Centric Privacy in Smart Homes11
Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme11
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication10
A Novel Cross-Domain Recommendation with Evolution Learning10
Emerging Trends of ICT in Airborne Disease Prevention10
An Efficient Interaction Protocol Inference Scheme for Incompatible Updates in IoT Environments10
Introduction to the Special Section on Cognitive Robotics on 5G/6G Networks10
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching10
Using Deep Learning Models to Detect Fake News about COVID-199
AI-assisted Blockchain-enabled Smart and Secure E-prescription Management Framework9
EdgeCI: Distributed Workload Assignment and Model Partitioning for CNN Inference on Edge Clusters9
Serving at the Edge: An Edge Computing Service Architecture Based on ICN9
MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs9
LSDN Empowers the Metaverse Communication to Achieve High-Resolution Visuals with Lower Bandwidth9
Signature-based IaaS Performance Change Detection9
Wielding Blockchain Transactions for Capture-Replay Testing of Upgradeable Smart Contracts9
A Security Cost Modelling Framework for Cyber-Physical Systems9
CARES: Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge Networks9
Assessing and Mitigating Heterogeneity-Driven Security Threats in the Cloud8
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity8
Introduction to the Special Section on Edge Computing AI-IoT Integrated Energy Efficient Intelligent Transportation System for Smart Cities8
Unpaired Self-supervised Learning for Industrial Cyber-Manufacturing Spectrum Blind Deconvolution8
Integrated User Scheduling and Beam Steering in Over-the-Air Federated Learning for Mobile IoT8
Distributed Computation Offloading and Power Control for UAV-Enabled Internet of Medical Things7
Knowledge Graph Construction with a Façade : A Unified Method to Access Heterogeneous Data Sources on the Web7
Detecting Malicious Switches for a Secure Software-defined Tactile Internet7
BlockEdge: A Hybrid Blockchain Framework for Secure and Efficient Collaboration in EEC Environments7
Adaptive Fuzzy Game-Based Energy-Efficient Localization in 3D Underwater Sensor Networks7
Exploring the Potential of Cyber Manufacturing System in the Digital Age7
Predicting Diabetes with Federated Learning: A Digital Twin and Medical Fog-based IoT Framework7
A Reputation-based Framework for Honest Provenance Reporting7
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing7
Real-time Pricing-based Resource Allocation in Open Market Environments7
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs6
RESP: A Recursive Clustering Approach for Edge Server Placement in Mobile Edge Computing6
SDN-enabled Quantized LQR for Smart Traffic Light Controller to Optimize Congestion6
Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City6
A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network6
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces6
Optimizing Geo-Distributed Data Processing with Resource Heterogeneity over the Internet6
Agile Support Vector Machine for Energy-efficient Resource Allocation in IoT-oriented Cloud using PSO6
A Constraint-Based Approach to Optimise QoS- and Energy-Aware Cloud-Edge Application Deployments6
A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications6
Accurate Bandwidth and Delay Prediction for 5G Cellular Networks6
An Intent-driven DaaS Management Framework to Enhance User Quality of Experience6
HeLoRA: LoRA-heterogeneous Federated Fine-tuning for Foundation Models6
Optimization-Based Predictive Congestion Control for the Tor Network: Opportunities and Challenges6
Attacking DoH and ECH: Does Server Name Encryption Protect Users’ Privacy?6
A Network Calculus Model for SFC Realization and Traffic Bounds Estimation in Data Centers6
Introduction to the Special Section on Recent Advances in Networks and Distributed Systems6
AI-Enabled Task Offloading for Improving Quality of Computational Experience in Ultra Dense Networks5
Open Set Dandelion Network for IoT Intrusion Detection5
Relieving Overexposure in Information Diffusion Through a Budget Multi-stage Allocation5
Introduction To The Special Section On Edge/Fog Computing For Infectious Disease Intelligence5
Market Manipulation of Cryptocurrencies: Evidence from Social Media and Transaction Data5
InFeMo: Flexible Big Data Management Through a Federated Cloud System5
A Highly Stable Fusion Positioning System of Smartphone under NLoS Acoustic Indoor Environment5
IP Geolocation through Reverse DNS5
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding5
Special Section on Edge-AI for Connected Living5
Breaking CaptchaStar Using the BASECASS Methodology4
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities4
A Novel Approach to Enhance the End-to-End Quality of Service for Avionic Wireless Sensor Networks4
Collaborative Hotspot Data Collection with Drones and 5G Edge Computing in Smart City4
Conscious Task Recommendation via Cognitive Reasoning Computing in Mobile Crowd Sensing4
OTI-IoT: A Blockchain-based Operational Threat Intelligence Framework for Multi-vector DDoS Attacks4
RFL-LSU: A Robust Federated Learning Approach with Localized Stepwise Updates4
Machine Learning Empowered IoT for Intelligent Vehicle Location in Smart Cities4
A Multi-type Classifier Ensemble for Detecting Fake Reviews Through Textual-based Feature Extraction4
An Empirical View on Consolidation of the Web4
FedGK: Communication-Efficient Federated Learning through Group-Guided Knowledge Distillation4
Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV4
Enhancing Privacy-Preserving Knowledge Graph Embeddings with Federated Learning for IoT Services4
Breaking Bad: Quantifying the Addiction of Web Elements to JavaScript4
Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things4
Incremental Group-Level Popularity Prediction in Online Social Networks4
Navigating the Metaverse: A Comprehensive Analysis of Consumer Electronics Prospects and Challenges4
DeepSDN: Deep Learning Based Software Defined Network Model for Cyberthreat Detection in IoT Network4
Offering Two-way Privacy for Evolved Purchase Inquiries4
Designing and Developing a Weed Detection Model for California Thistle4
An Efficient Angle-based Universum Least Squares Twin Support Vector Machine for Classification4
0.079588174819946