Security and Communication Networks

Papers
(The TQCC of Security and Communication Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
WEB DDoS Attack Detection Method Based on Semisupervised Learning139
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge109
Application of Data Fusion and Image Video Teaching Mode in Physical Education Course Teaching and Evaluation of Teaching Effect106
Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection105
Visual Cryptography Using Computation-Free Bit-Plane Reconstruction102
QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers70
Encrypted Packet Inspection Based on Oblivious Transfer68
Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence67
Retracted: The Evaluation of DDoS Attack Effect Based on Neural Network66
Retracted: Artificial Intelligence-Based Online Education System for University Music64
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis59
Multiobjective Algorithm for Urban Land Spatial Layout Optimization58
Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries56
Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach53
A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks53
Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments44
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?42
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features41
A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things41
Retracted: ECC-Based Authenticated Key Exchange Protocol for Fog-Based IoT Networks40
Retracted: Digital Reconstruction Method of Power Metering Production Data Based on Digital Twin Technology39
Retracted: Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks39
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract39
Retracted: Artificial Intelligence Sponge City Wisdom Management Model38
Retracted: AI-Based Secure Undergraduates’ Ideological and Political Public Opinion Strategy37
Retracted: Analysis of the Effect of Martial Arts on Students' Physical and Mental Health Based on Internet of Things Technology35
Retracted: Comprehensive Treatment of Urban Landscape Water Environment Based on Aquatic Plants Purification and Restoration35
Retracted: Selective Partial Update Adaptive Filtering Algorithms for Block-Sparse System Identification34
Retracted: Recognition Method of Matching Error between Dance Action and Music Beat Based on Data Mining33
Retracted: Computational Technologies in Internet of Things and Big Data Technology for Physical Exercise Rehabilitation System32
Retracted: Adaptive Integration Algorithm of Sports Event Network Marketing Data Based on Big Data32
Retracted: Research on Inversion of Suspended Sediment Concentration in Estuary Surface Based on Remote Sensing and GIS31
Retracted: A Recommended Approach to Classical Literature and Art Exhibition Activities Oriented towards Interactive Modelling30
Retracted: Corner Detection of Ceramic Crack Computer VR Image Based on Three-Dimensional Reconstruction Algorithm30
Effective Bots’ Detection for Online Smartphone Game Using Multilayer Perceptron Neural Networks30
Retracted: Intelligent Planning of Tourist Routes Based on Cloud Computing and Marching Algorithm29
Retracted: Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy28
Retracted: Research on Electronic Information Feature Extraction and Classification Recognition Algorithm Based on Deep Learning27
Retracted: An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm27
Retracted: Multipoint Distribution Vehicle Routing Optimization Problem considering Random Demand and Changing Load27
Retracted: Foreign Muslim Workers’ Perspectives of the Basic Needs of Muslim-Friendly Tourist Services: An Empirical Analysis of a Non-Muslim Destination27
Retracted: Secure Internet of Things Gateway Technology Based on Multicommunication Methods26
Retracted: RNN Neural Network Model for Chinese-Korean Translation Learning25
Estimation Method for Mixed Near-Field and Far-Field Sources Based on Four-Order Cumulant and Polarization Sensitive Array25
How Does Digital Finance Affect People’s Income: Evidence from China25
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain25
Understanding User-Level IP Blocks on the Internet24
Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain24
A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model24
Internet of Things Application of Intelligent and Innovative Learning Strategies in the Higher English Education System24
Effect of Multimodal Teaching on Language Comprehensive Ability under the Background of Artificial Intelligence24
Optimizing Multitask Assignment of Internet of Things Devices by Reinforcement Learning in Mobile Crowdsensing Scenes24
Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology23
Statistical Analysis of Employment Education in Colleges and Universities Based on Improved Clustering Algorithm23
Machine Learning-Based Intelligent Wireless Communication System for Solving Real-World Security Issues23
Enterprise Management Performance Evaluation Model Using Improved Fuzzy Clustering Algorithm in IoT Networks23
Adaptive Alleviation for Popularity Bias in Recommender Systems with Knowledge Graph22
Evaluation Method of Wushu Teaching Quality Based on Fuzzy Clustering22
GAP-MM: 5G-Enabled Real-Time Autonomous Vehicle Platoon Membership Management Based on Blockchain22
Big Data Storage Index Mechanism Based on Spatiotemporal Information Cloud Platform22
A Basketball Technique Balance Control Technology Based on Ant Colony Algorithm22
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering22
Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning22
An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning21
Pattern Mathematical Model for Fingerprint Security Using Bifurcation Minutiae Extraction and Neural Network Feature Selection21
A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion21
User Authentication Method via Speaker Recognition and Speech Synthesis Detection21
ImageDroid: Using Deep Learning to Efficiently Detect Android Malware and Automatically Mark Malicious Features21
Publishing Triangle Counting Histogram in Social Networks Based on Differential Privacy21
Cryptographic Accumulator and Its Application: A Survey21
Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor’s Algorithm20
A Class of Public Opinion Dissemination Model considering the Information Screening Mechanism20
SoK: Context and Risk Aware Access Control for Zero Trust Systems20
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services20
Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization20
Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning20
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT20
Delta-DAGMM: A Free Rider Attack Detection Model in Horizontal Federated Learning19
BEvote: Bitcoin-Enabled E-Voting Scheme with Anonymity and Robustness19
Overlapping Community Detection Based on Node Importance and Adjacency Information19
Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future Directions19
Retracted: Research on the Application of Data Mining Technology in College Students’ Mental Health Education in the Network Age19
An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications19
Analyzing the Role of Emotional Intelligence on the Performance of Small and Medium Enterprises (SMEs) Using AI-Based Convolutional Neural Networks (CNNs)19
DQfD-AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data18
E-Commerce Logistics Inspection System Based on Artificial Intelligence Technology in the Context of Big Data18
Security Issues in IoT and Cloud Computing Service Models with Suggested Solutions18
Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card18
Construction of Competitive Advantage and Competitive Strategy Model of Sports Enterprises Based on Multicase Study and In-Depth Learning18
Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic18
Retracted: Improving the Application of Blockchain Technology for Financial Security in Supply Chain Integrated Business Intelligence17
Security-Enhanced Certificate-Based Remote Data Integrity Batch Auditing for Cloud-IoT17
Retracted: Copyright Protection and Data Reliability of AI-Written Literary Creations in Smart City17
Retracted: Sharpening and Detection of Road Studs for Intelligent Vehicles at Nighttime17
Retracted: Application of Face Recognition in E-commerce Security Authentication in the Era of Big Data17
Detecting Digital Watermarking Image Attacks Using a Convolution Neural Network Approach17
Retracted: Evaluation Method of Enterprise Management Effectiveness Based on Improved Analytic Hierarchy Process17
Retracted: Optimization of Regional Logistics Distribution Information Network Platform17
Retracted: Multiobjective Optimal Dispatching Method of Generalized Power Active Distribution Network Based on Game Theory17
Retracted: Network Teaching Technology Based on Big Data Mining and Information Fusion17
A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network17
Retracted: Network Media Public Opinion and Social Governance Supported by the Internet-of-Things Big Data17
Retracted: Application of Business Intelligence Based on the Deep Neural Network in Credit Scoring17
Retracted: Nonlinear Control Method of Superconducting Energy Storage considering Voltage Imbalance in Distribution Network17
Retracted: A Method of Using Data Mining and Edge Computing to Calculate the Standing Efficiency of Basketball Games17
Retracted: Research on Intelligent Calibration of English Long Sentence Translation Based on Corpus16
An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree16
Retracted: Construction of Cross-Cultural College English Teaching System Based on Computer Simulation Technology16
Retracted: Application of CAD in Semifinished Product Packaging Art Design16
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE16
NSGA-II-Based Granularity-Adaptive Control-Flow Attestation16
Retracted: Research on Spatial Agglomeration Characteristics of Aerospace Cultural and Creative Industries in Smart City under Multidata Fusion16
Retracted: Application of Convolutional Neural Network Algorithm under Deep Learning in Digital Clothing Design16
Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks16
Retracted: Audience Dissemination Response Law and Action Mechanism Based on Internet Rumor Computer Big Data16
Retracted: Audio Signal Acquisition and Processing System Based on Model DSP Rapid Design16
Retracted: Classroom Resource Optimization of the English Four-Step Model Based on Deep Learning16
An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems15
Evaluation of Coordinated Level between Coastal Ports and Urban Economics Based on DEA and Coordination Degree Model: Case of Jiangsu Province15
BERT-Embedding-Based JSP Webshell Detection on Bytecode Level Using XGBoost15
Automating Group Management of Large-Scale IoT Botnets for Antitracking15
Security Analysis of Smart Grids15
IIDQN: An Incentive Improved DQN Algorithm in EBSN Recommender System15
An Improved Secure Public Cloud Auditing Scheme in Edge Computing15
Feature Extraction and Identification of Calligraphy Style Based on Dual Channel Convolution Network15
A Four-Tier Smart Contract Model with On-Chain Upgrade15
DeepDefense: A Steganalysis-Based Backdoor Detecting and Mitigating Protocol in Deep Neural Networks for AI Security14
Macroeconomic Short-Term High-Precision Combined Forecasting Algorithm Based on Grey Model14
Big Data Analytics and Discrete Choice Model for Enterprise Credit Risk Early Warning Algorithm14
A Dynamic Density Peak Clustering Algorithm Based on K-Nearest Neighbor14
Intelligent Detection and Analysis of Wearable Devices in Wushu Training14
Multiclass Interactive Martial Arts Teaching Optimization Method Based on Euclidean Distance14
Computer Graphic Image Design and Visual Communication Design in the Internet of Things Scenario14
Research on Site Safety Management by BIM Technology Based on Fuzzy Intuition Set14
An Intelligent Security Classification Model of Driver’s Driving Behavior Based on V2X in IoT Networks13
Optimization of English Classroom Quality Evaluation Model with AHP13
Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM13
Fluid Dynamics and Numerical Simulation of Exhaled Droplets Containing Infectious Viruses13
Influencing Factors of College Students’ Sports Cognition Based on DM Technology13
Group Relationship Mining of College Students Based on Predictive Social Network13
Accuracy Analysis of Sports Performance Prediction Based on BP Neural Network Intelligent Algorithm13
An Efficient Intrusion Detection Method Based on Federated Transfer Learning and an Extreme Learning Machine with Privacy Preservation13
Radio Network Forensic with mmWave Using the Dominant Path Algorithm13
Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production13
Mathematical Modeling and Multivariable Optimization Design of SUV Chassis Structure Based on SFE CONCEPT13
Quality Evaluation and Satisfaction Analysis of Online Learning of College Students Based on Artificial Intelligence13
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum13
Towards Achieving Personal Privacy Protection and Data Security on Integrated E-Voting Model of Blockchain and Message Queue13
Dance Movement Recognition Based on Modified GMM-Based Motion Target Detection Algorithm13
Local Corner and Motion Key Point Trajectory Extraction for Facial Forgery Identification13
A Blockchain-Based Privacy Preservation Scheme in Mobile Medical13
Enterprise Financial Risk Prediction and Prevention Based on Big Data Analysis13
Toward Identifying APT Malware through API System Calls12
Component-Based Software Testing Method Based on Deep Adversarial Network12
Retracted: Trend Prediction Model of Asian Stock Market Volatility Dynamic Relationship Based on Machine Learning12
Retracted: Design of College Scheduling Algorithm Based on Improved Genetic Ant Colony Hybrid Optimization12
Retracted: Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain12
Retracted: Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts12
Retracted: Intelligent Intrusion Detection Method of Industrial Internet of Things Based on CNN-BiLSTM12
Gesture Tracking and Recognition Algorithm for Dynamic Human Motion Using Multimodal Deep Learning12
RNN Neural Network Model for Chinese-Korean Translation Learning12
Retracted: A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks12
Retracted: Study and Application on Big Data Information Fusion System Based on IoT12
Retracted: Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model12
Retracted: Research on Value Co-Creation New Business Model of Import Cross-Border E-Commerce Platform Ecosystem12
Retracted: Optimization of Printing and Dyeing Energy Consumption Based on Multimedia Machine Learning Algorithm12
The Innovative Development of Russian Modern Oil Painting under the Background of Internet of Things and Artificial Intelligence12
An Automated Data Desensitisation System Based on the Middle Platform12
Retracted: Construction of Marine Professional Virtual Simulation Experiment Platform Based on Internet-of-Things Technology12
Retracted: 5G-Based Information Platform Design of Tourist Attractions in the Context of Mobile Big Data12
Retracted: Research on Performance Optimization Method of UAV Communication Link in Emergency Communication Environment12
Retracted: Empirical Analysis of Enterprise Financial Management Risk Prediction in View of Associative Memory Neural Network12
A Practical Anonymous Voting Scheme Based on Blockchain for Internet of Energy11
Retracted: Research on the Innovation of Ideological and Political Education in Universities Based on Artificial Intelligence Machine Learning in a Wireless Network Environment11
Retracted: Data File Security Strategy and Implementation Based on Fuzzy Control Algorithm11
Attacker Traceability on Ethereum through Graph Analysis11
Network Penetration Intrusion Prediction Based on Attention Seq2seq Model11
Network Traffic Classification Based on SD Sampling and Hierarchical Ensemble Learning11
Retracted: An Intelligent Teaching Strategy of Cross-Cultural Business Communication Course Based on Big Data11
Financial and Economic Sequence Forecasting Based on Time Slot Allocation Algorithm11
Retracted: Text Mining of Movie Animation User Comments and Video Artwork Recommendation Based on Machine Learning11
Retracted: Online Big Data Physical Education Classroom Based on Monitoring Network and Artificial Intelligence11
Retracted: Enterprise Credit Security Prediction and Evaluation Based on Multimodel Fusion11
A Regulatable Data Privacy Protection Scheme for Energy Transactions Based on Consortium Blockchain11
Coarse-Grained Load Balancing with Traffic-Aware Marking in Data Center Networks11
Attribute Set-Based Boolean Keyword Search over Encrypted Personal Health Records11
Feature Extraction Method Based on Sparse Autoencoder for Air Traffic Management System Security Situation Awareness11
Retracted: Architectural and Landscape Garden Planning Integrated with Artificial Intelligence Parametric Analysis11
Toward Detecting Malware Based on Process-Aware Behaviors11
Retracted: Psychological Consultation and Health Analysis Method for Artificial Intelligence Multidecision Support11
Retracted: The Segmentation of Road Scenes Based on Improved ESPNet Model11
Efficient Hyperchaotic Image Encryption Algorithm Based on a Fast Key Generation Method and Simultaneous Permutation-Diffusion Structure11
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records Using Blockchain11
Cross-Platform Binary Code Homology Analysis Based on GRU Graph Embedding11
Retracted: Problems and Countermeasures of China’s International Trade in Agricultural Products under the Belt and Road Strategy Based on Big Data Analysis Technology in the Internet of Things Era11
A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server10
Quality Evaluation of Ranunculaceae Essential Oil with the Artificial Neural Network10
Telematics Collaborative Resource Allocation Algorithm Based on Cloud Sidecar10
Research on Mobile English Learning System Based on iOS10
TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments10
Mining Cryptocurrency-Based Security Using Renewable Energy as Source10
Verification Grid and Map Slipping Based Graphical Password against Shoulder-Surfing Attacks10
PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios10
Material Analysis and Application Based on Intelligent Computing in the Context of Contemporary Watercolor Painting10
Cross-Border e-Commerce Business Model Based on Wireless Communication Network and Blockchain10
EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application10
Design of Teaching System of Physical Yoga Course in Colleges and Universities Based on Computer Network10
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System10
FGL_Droid: An Efficient Android Malware Detection Method Based on Hybrid Analysis10
CTRF: Ethereum-Based Ponzi Contract Identification10
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs10
Machine Learning-Enabled Development of Model for Japanese Film Industry10
Android Malware Detection Technology Based on Lightweight Convolutional Neural Networks10
Retracted: Models in the Construction of Accounting Informatization Transformation Based on Digital Twin10
Design of Network Intrusion Detection Model Based on TCA10
Major Challenges and Future Approaches in the Employment of Blockchain and Machine Learning Techniques in the Health and Medicine10
Personalized Online Education Learning Strategies Based on Transfer Learning Emotion Classification Model10
An Edge Cloud Data Integrity Protection Scheme Based on Blockchain10
Resource Selection from Edge-Cloud for IIoT and Blockchain-Based Applications in Industry 4.0/5.010
Retracted: Algorithm of 3D Virtual Reconstruction of Ancient Buildings in Qing Dynasty Based on Image Sequence9
Retracted: Distributed Network Image Processing System and Transmission Control Algorithm9
Retracted: Effect of Multimodal Teaching on Language Comprehensive Ability under the Background of Artificial Intelligence9
IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search9
LGBM: An Intrusion Detection Scheme for Resource-Constrained End Devices in Internet of Things9
Performance Evaluation Model of Short-Term Mutual Funds Based on Return-Variance-Liquidity9
Retracted: Parallel Classification Algorithm Design of Human Resource Big Data Based on Spark Platform9
Retracted: Detection Algorithm of Wind Power Equipment Video Image Sequence Based on Artificial Intelligence9
Retracted: Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence9
Retracted: Application of High-Resolution Face Recognition and EDF Image Reconstruction in English Classroom Teaching9
Retracted: Optimization and Application of Random Forest Algorithm for Applied Mathematics Specialty9
Retracted: Data Protection Software for Civil Aviation Control Flight Information System Based on FPE Algorithm9
Selective Partial Update Adaptive Filtering Algorithms for Block-Sparse System Identification9
The Optimal Carrier-Secret Ratio for Wireless Covert Channels Based on Constellation Shaping Modulation9
A Blockchain-Based Personal Health Record System for Emergency Situation9
Retracted: Research on Risk Assessment of Science and Technology Data in Network Finance Based on Portfolio Empowerment9
Retracted: TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments9
Retracted: Analysis of Artistic Creation and Design Methods in Universities Based on Augmented Reality and 5G Communication Technology9
Retracted: College English Online Teaching Model Based on Deep Learning9
Retracted: Fault Diagnosis Method of Rotor Magnetic Field Local Demagnetization in Permanent Magnet Synchronous Motor Model Predictive Current Control System9
Retracted: A Prediction Method for Evolution Effects of Software Architecture9
Retracted: An English Mobile Learning Platform Embedded in GSM-R Wireless Network Communication9
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification9
Blockchain and Business Process Management in Health Care, Especially for COVID-19 Cases9
Grouping-Based Reliable Privacy Preservation for Blockchain-Assisted Data Aggregation in Mobile Crowdsensing9
Research on Value Co-Creation New Business Model of Import Cross-Border E-Commerce Platform Ecosystem9
DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective9
Retracted: English Teaching Evaluation Model Based on Association Rule Algorithm and Machine Learning9
Retracted: Jamming Meets Antijamming: A Survey of GPS Communication Networks9
Retracted: Transfer Learning Auto-Encoder Neural Networks for Anomaly Detection of DDoS Generating IoT Devices9
Retracted: Description of Quantum Mechanics as a Branch of Mathematical Physics That Deals with the Emission and Absorption of Energy by Matter9
0.055063962936401