International Journal of Distributed Sensor Networks

Papers
(The TQCC of International Journal of Distributed Sensor Networks is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Estimation of Joint Parameters Using Frequency-Based Substructuring Techniques216
Survey of Connectivity Restoration in 3D Wireless Ad Hoc/Sensor Networks108
Interoperability Structure of Smart Water Conservancy Based on Internet of Things38
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things38
6G Wireless Communications Enabled by the Blockchain: Privacy and Middleware Architecture34
An Efficient Fuzzy Logic Controller for Enhancing the Lifetime of Mobile WSNs Through Smart Cluster Head Selection Using Sleeping Time and Mobility Factor29
Analysis of relay selection schemes in underlay cognitive radio non-orthogonal multiple access networks28
A graph-based sensor recommendation model in semantic sensor network27
Energy Optimization-Based Clustering Protocols in Wireless Sensor Networks and Internet of Things-Survey20
Underwater Wireless Sensor Network–Based Static and Mobile Node Deployment Using Jellyfish Optimization Algorithm19
Bluetooth Three‐Dimensional AOA Positioning Method Based on the AMA‐SDM19
Cross-domain entity identity association analysis and prediction based on representation learning16
Method for predicting cutter remaining life based on multi-scale cyclic convolutional network16
An Efficient Mutual Authentication and Fractional Lyrebird Optimization With Deep Learning–Based SIP‐Based DRDoS Attack Detection16
Dynamic incentive mechanism in mobile crowdsourcing networks by combining reputation and contract theory15
TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks15
Unmanned aerial vehicles: Applications, techniques, and challenges as aerial base stations14
Custom Network Quantization Method for Lightweight CNN Acceleration on FPGAs13
Minimizing IoT Energy Consumption Using BLE and Metaprotocol Architecture12
Threshold-free multi-attributes physical layer authentication based on expectation–conditional maximization channel estimation in Internet of Things12
Distributed Nonfragile Guaranteed Cost Filter Design for Nonlinear Systems With Sensor Networks12
An Alliance Blockchain Modification Method Based on Chameleon Hashing and Verifiable Secret Sharing11
An Energy-Saving and Environment-Friendly Networked Intelligent Door Lock System for Offices11
A non-asymptotic analysis of adaptive TD(λ) learning in wireless sensor networks10
Secure Sharing of Electronic Medical Records Based on Blockchain10
A Method of Image Restoration for Distortion of Object in Water-Air Cross-Media8
Machine learning for Internet of things anomaly detection under low-quality data8
Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction8
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks8
Connected and automated vehicle control at unsignalized intersection based on deep reinforcement learning in vehicle-to-infrastructure environment8
A Side‐Scan Sonar Seabed Target Detection Algorithm Based on YOLOv8‐RDE8
Intrusion Detection Model for Wireless Sensor Networks Based on FedAvg and XGBoost Algorithm8
8
Distributed filtering in sensor networks based on linear minimum mean square error criterion with limited sensing range7
Speeding Up Sequential Markov Chain Monte Carlo Methods in the Context of Large Volumes of Data From Distributed Sensor Networks7
Semantic IoT Service Communication—Impedance Matching Between Service Goal and Event Routing7
Energy-efficient and intelligent cooperative spectrum sensing algorithm in cognitive radio networks7
SWIPT‐Enabled Full‐Duplex Short Packet Communications With Nonlinear Energy Harvesting7
The robustness of popular multiclass machine learning models against poisoning attacks: Lessons and insights7
0.079894781112671