Security and Communication Networks

Papers
(The TQCC of Security and Communication Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
WEB DDoS Attack Detection Method Based on Semisupervised Learning123
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge103
Publishing Triangle Counting Histogram in Social Networks Based on Differential Privacy101
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering97
User Authentication Method via Speaker Recognition and Speech Synthesis Detection95
Application of Data Fusion and Image Video Teaching Mode in Physical Education Course Teaching and Evaluation of Teaching Effect80
Adaptive Alleviation for Popularity Bias in Recommender Systems with Knowledge Graph71
Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection71
Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model68
A Competition-Based Unequal Clustering Multihop Approach for Wireless Sensor Networks66
Visual Cryptography Using Computation-Free Bit-Plane Reconstruction65
Encrypted Packet Inspection Based on Oblivious Transfer64
QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers64
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification61
Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence61
Retracted: The Evaluation of DDoS Attack Effect Based on Neural Network59
Retracted: Artificial Intelligence-Based Online Education System for University Music58
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis55
Multiobjective Algorithm for Urban Land Spatial Layout Optimization50
A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks46
Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries46
Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach44
Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization41
ImageDroid: Using Deep Learning to Efficiently Detect Android Malware and Automatically Mark Malicious Features39
Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments39
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?39
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features38
Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor’s Algorithm38
Retracted: Digital Reconstruction Method of Power Metering Production Data Based on Digital Twin Technology37
Retracted: ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks37
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract35
Retracted: Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks35
Retracted: Analysis of the Effect of Martial Arts on Students' Physical and Mental Health Based on Internet of Things Technology34
Retracted: Artificial Intelligence Sponge City Wisdom Management Model34
Retracted: Comprehensive Treatment of Urban Landscape Water Environment Based on Aquatic Plants Purification and Restoration34
Retracted: AI-Based Secure Undergraduates’ Ideological and Political Public Opinion Strategy34
Retracted: Selective Partial Update Adaptive Filtering Algorithms for Block-Sparse System Identification33
Retracted: Adaptive Integration Algorithm of Sports Event Network Marketing Data Based on Big Data32
Retracted: Computational Technologies in Internet of Things and Big Data Technology for Physical Exercise Rehabilitation System32
Retracted: Recognition Method of Matching Error between Dance Action and Music Beat Based on Data Mining32
Retracted: Research on Inversion of Suspended Sediment Concentration in Estuary Surface Based on Remote Sensing and GIS31
Effective Bots’ Detection for Online Smartphone Game Using Multilayer Perceptron Neural Networks30
Retracted: A Recommended Approach to Classical Literature and Art Exhibition Activities Oriented towards Interactive Modelling30
Retracted: Corner Detection of Ceramic Crack Computer VR Image Based on Three-Dimensional Reconstruction Algorithm30
Retracted: Intelligent Planning of Tourist Routes Based on Cloud Computing and Marching Algorithm27
Retracted: Foreign Muslim Workers’ Perspectives of the Basic Needs of Muslim-Friendly Tourist Services: An Empirical Analysis of a Non-Muslim Destination26
Retracted: An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm26
Retracted: Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy26
Retracted: Multipoint Distribution Vehicle Routing Optimization Problem considering Random Demand and Changing Load25
Retracted: Secure Internet of Things Gateway Technology Based on Multicommunication Methods24
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain24
Estimation Method for Mixed Near-Field and Far-Field Sources Based on Four-Order Cumulant and Polarization Sensitive Array24
Retracted: Research on Electronic Information Feature Extraction and Classification Recognition Algorithm Based on Deep Learning24
Cryptographic Accumulator and Its Application: A Survey24
An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning24
Retracted: RNN Neural Network Model for Chinese-Korean Translation Learning24
Research on Real-Time Detection of Sprint Error Based on Visual Features and Internet of Things24
Design and Reconstruction of Visual Art Based on Virtual Reality23
Internet of Things Application of Intelligent and Innovative Learning Strategies in the Higher English Education System23
Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain23
Effect of Multimodal Teaching on Language Comprehensive Ability under the Background of Artificial Intelligence23
Understanding User-Level IP Blocks on the Internet23
A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model23
Pattern Mathematical Model for Fingerprint Security Using Bifurcation Minutiae Extraction and Neural Network Feature Selection22
Enterprise Management Performance Evaluation Model Using Improved Fuzzy Clustering Algorithm in IoT Networks22
Optimizing Multitask Assignment of Internet of Things Devices by Reinforcement Learning in Mobile Crowdsensing Scenes22
Machine Learning-Based Intelligent Wireless Communication System for Solving Real-World Security Issues22
Statistical Analysis of Employment Education in Colleges and Universities Based on Improved Clustering Algorithm22
A Basketball Technique Balance Control Technology Based on Ant Colony Algorithm21
How Does Digital Finance Affect People’s Income: Evidence from China21
Evaluation Method of Wushu Teaching Quality Based on Fuzzy Clustering21
Big Data Storage Index Mechanism Based on Spatiotemporal Information Cloud Platform21
Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning21
Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology21
Research on Classification Method of Network Resources Based on Modified SVM Algorithm20
A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion20
A Four-Tier Smart Contract Model with On-Chain Upgrade20
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code20
A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things20
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT20
SoK: Context and Risk Aware Access Control for Zero Trust Systems20
GAP-MM: 5G-Enabled Real-Time Autonomous Vehicle Platoon Membership Management Based on Blockchain20
Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning20
A Class of Public Opinion Dissemination Model considering the Information Screening Mechanism20
Retracted: Research on the Application of Data Mining Technology in College Students’ Mental Health Education in the Network Age19
BERT-Embedding-Based JSP Webshell Detection on Bytecode Level Using XGBoost19
Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic19
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services19
BEvote: Bitcoin-Enabled E-Voting Scheme with Anonymity and Robustness19
Security-Enhanced Certificate-Based Remote Data Integrity Batch Auditing for Cloud-IoT18
Retracted: Copyright Protection and Data Reliability of AI-Written Literary Creations in Smart City18
Retracted: Network Media Public Opinion and Social Governance Supported by the Internet-of-Things Big Data18
A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network18
Retracted: Evaluation Method of Enterprise Management Effectiveness Based on Improved Analytic Hierarchy Process18
Retracted: Improving the Application of Blockchain Technology for Financial Security in Supply Chain Integrated Business Intelligence18
Detecting Digital Watermarking Image Attacks Using a Convolution Neural Network Approach18
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations18
Retracted: Optimization of Regional Logistics Distribution Information Network Platform18
Retracted: Network Teaching Technology Based on Big Data Mining and Information Fusion17
Retracted: Nonlinear Control Method of Superconducting Energy Storage considering Voltage Imbalance in Distribution Network17
Retracted: Multiobjective Optimal Dispatching Method of Generalized Power Active Distribution Network Based on Game Theory17
Retracted: Research on Spatial Agglomeration Characteristics of Aerospace Cultural and Creative Industries in Smart City under Multidata Fusion17
Retracted: Sharpening and Detection of Road Studs for Intelligent Vehicles at Nighttime17
Retracted: Application of Face Recognition in E-commerce Security Authentication in the Era of Big Data17
Retracted: Audio Signal Acquisition and Processing System Based on Model DSP Rapid Design17
Retracted: Classroom Resource Optimization of the English Four-Step Model Based on Deep Learning17
Retracted: A Method of Using Data Mining and Edge Computing to Calculate the Standing Efficiency of Basketball Games17
Retracted: Application of Business Intelligence Based on the Deep Neural Network in Credit Scoring17
Retracted: Construction of Cross-Cultural College English Teaching System Based on Computer Simulation Technology17
Retracted: Research on Intelligent Calibration of English Long Sentence Translation Based on Corpus16
Retracted: Audience Dissemination Response Law and Action Mechanism Based on Internet Rumor Computer Big Data16
An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree16
An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems16
An Improved Secure Public Cloud Auditing Scheme in Edge Computing16
Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card16
Retracted: Application of CAD in Semifinished Product Packaging Art Design16
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE16
Automating Group Management of Large-Scale IoT Botnets for Antitracking16
Evaluation of Coordinated Level between Coastal Ports and Urban Economics Based on DEA and Coordination Degree Model: Case of Jiangsu Province16
Feature Extraction and Identification of Calligraphy Style Based on Dual Channel Convolution Network16
Retracted: Application of Convolutional Neural Network Algorithm under Deep Learning in Digital Clothing Design16
Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks16
NSGA-II-Based Granularity-Adaptive Control-Flow Attestation16
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting16
IIDQN: An Incentive Improved DQN Algorithm in EBSN Recommender System16
Security Analysis of Smart Grids15
Macroeconomic Short-Term High-Precision Combined Forecasting Algorithm Based on Grey Model15
Overlapping Community Detection Based on Node Importance and Adjacency Information15
Multiclass Interactive Martial Arts Teaching Optimization Method Based on Euclidean Distance15
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems15
Research on Balance Control of Freestyle Skiing Aerial Skills Based on Ant Colony Algorithm15
Research on Site Safety Management by BIM Technology Based on Fuzzy Intuition Set15
E-Commerce Logistics Inspection System Based on Artificial Intelligence Technology in the Context of Big Data14
Enterprise Financial Risk Prediction and Prevention Based on Big Data Analysis14
Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future Directions14
Group Relationship Mining of College Students Based on Predictive Social Network14
Intelligent Detection and Analysis of Wearable Devices in Wushu Training14
Mathematical Modeling and Multivariable Optimization Design of SUV Chassis Structure Based on SFE CONCEPT14
A Blockchain-Based Privacy Preservation Scheme in Mobile Medical14
Big Data Analytics and Discrete Choice Model for Enterprise Credit Risk Early Warning Algorithm14
Analyzing the Role of Emotional Intelligence on the Performance of Small and Medium Enterprises (SMEs) Using AI-Based Convolutional Neural Networks (CNNs)14
Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM14
Computer Graphic Image Design and Visual Communication Design in the Internet of Things Scenario13
Local Corner and Motion Key Point Trajectory Extraction for Facial Forgery Identification13
Dance Movement Recognition Based on Modified GMM-Based Motion Target Detection Algorithm13
An Efficient Intrusion Detection Method Based on Federated Transfer Learning and an Extreme Learning Machine with Privacy Preservation13
DeepDefense: A Steganalysis-Based Backdoor Detecting and Mitigating Protocol in Deep Neural Networks for AI Security13
Construction of Competitive Advantage and Competitive Strategy Model of Sports Enterprises Based on Multicase Study and In-Depth Learning13
Radio Network Forensic with mmWave Using the Dominant Path Algorithm13
Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production13
Influencing Factors of College Students’ Sports Cognition Based on DM Technology13
Accuracy Analysis of Sports Performance Prediction Based on BP Neural Network Intelligent Algorithm13
Optimization of English Classroom Quality Evaluation Model with AHP13
Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions13
Delta-DAGMM: A Free Rider Attack Detection Model in Horizontal Federated Learning13
An Edge Cloud Data Integrity Protection Scheme Based on Blockchain13
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum13
Fluid Dynamics and Numerical Simulation of Exhaled Droplets Containing Infectious Viruses13
Quality Evaluation and Satisfaction Analysis of Online Learning of College Students Based on Artificial Intelligence13
DQfD-AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data13
Towards Achieving Personal Privacy Protection and Data Security on Integrated E-Voting Model of Blockchain and Message Queue13
An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications13
A Dynamic Density Peak Clustering Algorithm Based on K-Nearest Neighbor13
PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios13
RNN Neural Network Model for Chinese-Korean Translation Learning12
Mining Cryptocurrency-Based Security Using Renewable Energy as Source12
An Intelligent Security Classification Model of Driver’s Driving Behavior Based on V2X in IoT Networks12
Gesture Tracking and Recognition Algorithm for Dynamic Human Motion Using Multimodal Deep Learning12
Retracted: Study and Application on Big Data Information Fusion System Based on IoT12
Retracted: Intelligent Intrusion Detection Method of Industrial Internet of Things Based on CNN-BiLSTM12
Retracted: Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts12
Retracted: Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain12
Retracted: Research on Performance Optimization Method of UAV Communication Link in Emergency Communication Environment12
Retracted: A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks12
Component-Based Software Testing Method Based on Deep Adversarial Network12
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks12
Retracted: Construction of Marine Professional Virtual Simulation Experiment Platform Based on Internet-of-Things Technology12
Retracted: Design of College Scheduling Algorithm Based on Improved Genetic Ant Colony Hybrid Optimization12
Retracted: Enterprise Credit Security Prediction and Evaluation Based on Multimodel Fusion12
Retracted: Empirical Analysis of Enterprise Financial Management Risk Prediction in View of Associative Memory Neural Network12
Retracted: An Intelligent Teaching Strategy of Cross-Cultural Business Communication Course Based on Big Data12
Retracted: 5G-Based Information Platform Design of Tourist Attractions in the Context of Mobile Big Data12
An Automated Data Desensitisation System Based on the Middle Platform12
The Innovative Development of Russian Modern Oil Painting under the Background of Internet of Things and Artificial Intelligence12
Toward Identifying APT Malware through API System Calls12
CTRF: Ethereum-Based Ponzi Contract Identification12
Retracted: Optimization of Printing and Dyeing Energy Consumption Based on Multimedia Machine Learning Algorithm12
Retracted: Problems and Countermeasures of China’s International Trade in Agricultural Products under the Belt and Road Strategy Based on Big Data Analysis Technology in the Internet of Things Era12
Retracted: Research on Value Co-Creation New Business Model of Import Cross-Border E-Commerce Platform Ecosystem12
Retracted: Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model12
Retracted: Trend Prediction Model of Asian Stock Market Volatility Dynamic Relationship Based on Machine Learning12
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records Using Blockchain11
FGL_Droid: An Efficient Android Malware Detection Method Based on Hybrid Analysis11
Retracted: Architectural and Landscape Garden Planning Integrated with Artificial Intelligence Parametric Analysis11
Retracted: Research on the Innovation of Ideological and Political Education in Universities Based on Artificial Intelligence Machine Learning in a Wireless Network Environment11
Retracted: Text Mining of Movie Animation User Comments and Video Artwork Recommendation Based on Machine Learning11
Efficient Hyperchaotic Image Encryption Algorithm Based on a Fast Key Generation Method and Simultaneous Permutation-Diffusion Structure11
Financial and Economic Sequence Forecasting Based on Time Slot Allocation Algorithm11
Coarse-Grained Load Balancing with Traffic-Aware Marking in Data Center Networks11
A Regulatable Data Privacy Protection Scheme for Energy Transactions Based on Consortium Blockchain11
Attacker Traceability on Ethereum through Graph Analysis11
Anonymous Certificate-Based Inner Product Broadcast Encryption11
Retracted: Data File Security Strategy and Implementation Based on Fuzzy Control Algorithm11
Network Penetration Intrusion Prediction Based on Attention Seq2seq Model11
A Practical Anonymous Voting Scheme Based on Blockchain for Internet of Energy11
Feature Extraction Method Based on Sparse Autoencoder for Air Traffic Management System Security Situation Awareness11
Network Traffic Classification Based on SD Sampling and Hierarchical Ensemble Learning11
TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments11
Attribute Set-Based Boolean Keyword Search over Encrypted Personal Health Records11
Retracted: The Segmentation of Road Scenes Based on Improved ESPNet Model11
Retracted: Psychological Consultation and Health Analysis Method for Artificial Intelligence Multidecision Support11
Retracted: Online Big Data Physical Education Classroom Based on Monitoring Network and Artificial Intelligence11
Verification Grid and Map Slipping Based Graphical Password against Shoulder-Surfing Attacks11
Toward Detecting Malware Based on Process-Aware Behaviors11
Major Challenges and Future Approaches in the Employment of Blockchain and Machine Learning Techniques in the Health and Medicine10
Design of Teaching System of Physical Yoga Course in Colleges and Universities Based on Computer Network10
Analysis of English Performance Rating Based on Machine Learning and Optimized BP Network Technology10
Performance Evaluation Model of Short-Term Mutual Funds Based on Return-Variance-Liquidity10
Machine Learning-Enabled Development of Model for Japanese Film Industry10
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System10
Retracted: Models in the Construction of Accounting Informatization Transformation Based on Digital Twin10
Cross-Platform Binary Code Homology Analysis Based on GRU Graph Embedding10
A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server10
Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain10
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs10
Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing10
Android Malware Detection Technology Based on Lightweight Convolutional Neural Networks10
Quality Evaluation of Ranunculaceae Essential Oil with the Artificial Neural Network10
Telematics Collaborative Resource Allocation Algorithm Based on Cloud Sidecar10
Cross-Border e-Commerce Business Model Based on Wireless Communication Network and Blockchain10
Material Analysis and Application Based on Intelligent Computing in the Context of Contemporary Watercolor Painting10
Research on Mobile English Learning System Based on iOS10
Personalized Online Education Learning Strategies Based on Transfer Learning Emotion Classification Model10
Compression Domain Reversible Robust Watermarking Based on Multilayer Embedding10
Design of Network Intrusion Detection Model Based on TCA10
Resource Selection from Edge-Cloud for IIoT and Blockchain-Based Applications in Industry 4.0/5.010
EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application10
Retracted: Application of High-Resolution Face Recognition and EDF Image Reconstruction in English Classroom Teaching9
Retracted: Optimization and Application of Random Forest Algorithm for Applied Mathematics Specialty9
Retracted: Data Protection Software for Civil Aviation Control Flight Information System Based on FPE Algorithm9
Retracted: English Teaching Evaluation Model Based on Association Rule Algorithm and Machine Learning9
Retracted: Algorithm of 3D Virtual Reconstruction of Ancient Buildings in Qing Dynasty Based on Image Sequence9
Retracted: Distributed Network Image Processing System and Transmission Control Algorithm9
Retracted: A Prediction Method for Evolution Effects of Software Architecture9
Retracted: TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments9
Retracted: Parallel Classification Algorithm Design of Human Resource Big Data Based on Spark Platform9
Retracted: Description of Quantum Mechanics as a Branch of Mathematical Physics That Deals with the Emission and Absorption of Energy by Matter9
Retracted: Transfer Learning Auto-Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices9
Retracted: An English Mobile Learning Platform Embedded in GSM-R Wireless Network Communication9
Retracted: Analysis of Artistic Creation and Design Methods in Universities Based on Augmented Reality and 5G Communication Technology9
0.16006994247437