Security and Communication Networks

Papers
(The H4-Index of Security and Communication Networks is 34. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
WEB DDoS Attack Detection Method Based on Semisupervised Learning123
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge103
Publishing Triangle Counting Histogram in Social Networks Based on Differential Privacy101
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering97
User Authentication Method via Speaker Recognition and Speech Synthesis Detection95
Application of Data Fusion and Image Video Teaching Mode in Physical Education Course Teaching and Evaluation of Teaching Effect80
Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection71
Adaptive Alleviation for Popularity Bias in Recommender Systems with Knowledge Graph71
Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model68
A Competition-Based Unequal Clustering Multihop Approach for Wireless Sensor Networks66
Visual Cryptography Using Computation-Free Bit-Plane Reconstruction65
QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers64
Encrypted Packet Inspection Based on Oblivious Transfer64
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification61
Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence61
Retracted: The Evaluation of DDoS Attack Effect Based on Neural Network59
Retracted: Artificial Intelligence-Based Online Education System for University Music58
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis55
Multiobjective Algorithm for Urban Land Spatial Layout Optimization50
A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks46
Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries46
Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach44
Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization41
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?39
ImageDroid: Using Deep Learning to Efficiently Detect Android Malware and Automatically Mark Malicious Features39
Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments39
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features38
Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor’s Algorithm38
Retracted: ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks37
Retracted: Digital Reconstruction Method of Power Metering Production Data Based on Digital Twin Technology37
Retracted: Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks35
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract35
Retracted: Comprehensive Treatment of Urban Landscape Water Environment Based on Aquatic Plants Purification and Restoration34
Retracted: AI-Based Secure Undergraduates’ Ideological and Political Public Opinion Strategy34
Retracted: Analysis of the Effect of Martial Arts on Students' Physical and Mental Health Based on Internet of Things Technology34
Retracted: Artificial Intelligence Sponge City Wisdom Management Model34
0.093309879302979