Transactions on Emerging Telecommunications Technologies

Papers
(The TQCC of Transactions on Emerging Telecommunications Technologies is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Network intrusion detection system: A systematic study of machine learning and deep learning approaches390
Review on remote sensing methods for landslide detection using machine and deep learning116
An internet of health things‐driven deep learning framework for detection and classification of skin cancer using transfer learning101
A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)89
IOT and context‐aware learning‐based optimal neural network model for real‐time health monitoring86
A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing78
6G: A comprehensive survey on technologies, applications, challenges, and research problems78
Blockchain for decentralized multi‐drone to combat COVID‐19 and future pandemics: Framework and proposed solutions72
Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intru68
Fusion of blockchain and artificial intelligence for secure drone networking underlying 5G communications67
Precision agriculture and farming using Internet of Things based on wireless sensor network66
Lightweight branched blockchain security framework for Internet of Vehicles64
A survey on recent optimal techniques for securing unmanned aerial vehicles applications58
A taxonomy of blockchain envisioned edge‐as‐a‐connected autonomous vehicles58
Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm57
A systematic survey on internet of things: Energy efficiency and interoperability perspective51
Blockchain and artificial intelligence for 5G‐enabled Internet of Things: Challenges, opportunities, and solutions50
Optimal deep learning based image compression technique for data transmission on industrial Internet of things applications47
Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities46
Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things46
Integrating encryption techniques for secure data storage in the cloud45
Artificial intelligence‐powered decentralized framework for Internet of Things in Healthcare 4.044
An improved ensemble based intrusion detection technique using XGBoost43
Mobile‐fog‐cloud assisted deep reinforcement learning and blockchain‐enable IoMT system for healthcare workflows42
Deep learning in medical imaging: A brief review42
Ensemble Adaboost classifier for accurate and fast detection of botnet attacks in connected vehicles42
Review of optical and wireless backhaul networks and emerging trends of next generation 5G and 6G technologies40
Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions40
Blockchain technology for energy‐aware mobile crowd sensing approaches in Internet of Things39
A comprehensive review on blockchain and Internet of Things in healthcare39
Machine learning for next‐generation intelligent transportation systems: A survey39
Blockchain and artificial intelligence enabled privacy‐preserving medical data transmission in Internet of Things38
Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing37
An integrated intrusion detection system using correlation‐based attribute selection and artificial neural network36
Systematic review of Internet of Things in smart farming35
Artificial intelligence and blockchain: A review34
A novel multi‐image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition33
The role of unmanned aerial vehicles and mmWave in 5G: Recent advances and challenges33
Multiuser context‐aware computation offloading in mobile edge computing based on Bayesian learning automata32
From statistical‐ to machine learning‐based network traffic prediction32
Toward 6G: Understanding network requirements and key performance indicators32
Blockchain for precision irrigation: Opportunities and challenges31
Deep learning recognition of diseased and normal cell representation31
Machine learning for cooperative spectrum sensing and sharing: A survey30
Internet of Things backdoors: Resource management issues, security challenges, and detection methods29
An intrusion detection system using optimized deep neural network architecture29
Spectrum sensing in cognitive radio: A deep learning based model28
Ensemble machine learning approaches for webshell detection in Internet of things environments28
Intelligent blockchain management for distributed knowledge graphs in IoT 5G environments28
An efficient SDN‐based LTE‐WiFi spectrum aggregation system for heterogeneous 5G networks28
Intelligent intrusion detection system in smart grid using computational intelligence and machine learning28
CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things applications27
Q‐learning based flexible task scheduling in a global view for the Internet of Things27
Deep learning support for intelligent transportation systems27
Blockchain as a service models in the Internet of Things management: Systematic review27
DBTP2SF: A deep blockchain‐based trustworthy privacy‐preserving secured framework in industrial internet of things systems26
Unmanned aerial vehicles integratedHetNetfor smart dense urban area24
Chaos‐based privacy preserving vehicle safety protocol for 5G Connected Autonomous Vehicle networks24
KRanTi: Blockchain‐based farmer's credit scheme for agriculture‐food supply chain24
Security challenges of Internet of Underwater Things: A systematic literature review24
Secure smart contracts for cloud‐based manufacturing using Ethereum blockchain24
A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique24
Deep neuro‐fuzzy approach for risk and severity prediction using recommendation systems in connected health care24
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets23
Adaptive cluster‐based heuristic approach in cognitive radio networks for5Gapplications23
A trusted distributed routing scheme for wireless sensor networks using blockchain and meta‐heuristics‐based deep learning technique22
A survey on the blockchain techniques for the Internet of Vehicles security22
Public key encryption with equality test for Industrial Internet of Things system in cloud computing22
Recent advances in multimedia security and information hiding22
Security threats and measures in the Internet of Things for smart city infrastructure: A state of art22
Machine learning for mobile network payment security evaluation system21
Trusted authority based session key agreement and authentication algorithm for smart grid networks21
Performance analysis of Beaulieu‐Xie fading channel with MRC diversity reception21
Advanced security model for multimedia data sharing in Internet of Things21
On The Selection of Power Allocation Strategy in Power Domain Non‐Orthogonal Multiple Access (PD‐NOMA) for 6G and Beyond20
I‐FBECS: Improved fuzzy based energy efficient clustering using biogeography based optimization in wireless sensor network20
An inverted L‐strip loaded ground with hollow semi‐hexagonal four‐element polarization diversity UWB‐MIMO antenna20
An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network20
Survey on recent smart gateways for smart home: Systems, technologies, and challenges20
Two hop verification for avoiding void hole in underwater wireless sensor network using SM‐AHH‐VBF and AVH‐AHH‐VBF routing protocols19
Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions19
Performance analysis of long‐reach 40/40 Gbps mode division multiplexing‐based hybrid time and wavelength division multiplexing passive optical network/free‐space19
Internet of things‐fog computing‐based framework for smart disaster management18
Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things18
Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks18
A comprehensive survey on secure software‐defined network for the Internet of Things18
SecRIP: Secure and reliable intercluster routing protocol for efficient data transmission in flying ad hoc networks18
Blockchain‐based asset storage and service mechanism to metaverse universe: Metarepo18
Resource allocation in sparse code multiple access‐based systems for cloud‐radio access network in 5G networks18
Energy efficient routing in IOT based UWSN using bald eagle search algorithm17
Application of Lah transform for security and privacy of data through information hiding in telecommunication17
A fully distributed energy‐aware multi‐level clustering and routing for WSN‐based IoT17
Climate‐smart agriculture using intelligent techniques, blockchain and Internet of Things: Concepts, challenges, and opportunities17
Consortium blockchain‐enabled access control mechanism in edge computing based generic Internet of Things environment17
BCALS: Blockchain‐based secure log management system for cloud computing17
Communication systems of high‐speed railway: A survey17
Analysis of anomaly detection method for Internet of things based on deep learning17
Energy efficient resource allocation for uplink hybrid power domain sparse code nonorthogonal multiple access heterogeneous networks with statistical channel estimation17
Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains16
Efficient data transfer in edge envisioned environment using artificial intelligence based edge node algorithm16
Multilabel classification of remote sensed satellite imagery16
Retracted: Design of multimedia blockchain privacy protection system based on distributed trusted communication15
Placement of edge server based on task overhead in mobile edge computing environment15
SDN and application layer DDoS attacks detection in IoT devices by attention‐based Bi‐LSTM‐CNN15
Integration of Internet of Things and blockchain toward portability and low‐energy consumption14
Leveraging mist and fog for big data analytics in IoT environment14
Unmanned aerial vehicle‐enabled layered architecture based solution for disaster management14
Trust management of services (TMoS): Investigating the current mechanisms14
A review and analysis of secure and lightweightECC‐basedRFIDauthentication protocol for Internet of Vehicles13
Federated learning and next generation wireless communications: A survey on bidirectional relationship13
Software‐defined networking in vehicular networks: A survey13
Autonomous underwater vehicles support for enhanced performance in the Internet of underwater things13
Ultra‐reliability and low‐latency communications on the internet of things based on 5G network: Literature review, classification, and future research view13
Leveraging big data analytics in 5G‐enabled IoT and industrial IoT for the development of sustainable smart cities13
Lightweight and efficient privacy‐preserving mutual authentication scheme to secure Internet of Things‐based smart healthcare13
Efficiency enhancement techniques of microwave and millimeter‐wave antennas for 5G communication: A survey13
Security enhancement technologies for smart contracts in the blockchain: A survey13
Unknown network attack detection based on open‐set recognition and active learning in drone network12
A performance‐aware routing mechanism for flying ad hoc networks12
Heterogeneous Signcryption Scheme Supporting Equality Test from PKI to CLC toward IoT12
A review of industrial wireless communications, challenges, and solutions: A cognitive radio approach12
Security challenges of blockchain in Internet of things: Systematic literature review12
SecureDeepNet‐IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems12
Adaptive deep convolutional neural network‐based secure integration of fog to cloud supported Internet of Things for health monitoring system12
 LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios12
Analysis on homomorphic technique for data security in fog computing12
Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things12
An evolutionary computation‐based privacy‐preserving data mining model under a multithreshold constraint12
Resource optimization in UAV‐assisted wireless networks—A comprehensive survey12
Joint altitude, power control, and bandwidth allocation optimization for unmanned aerial vehicle‐enabled reliable communications11
A systematic review of task scheduling approaches in fog computing11
Proxy re‐encryption with equality test for secure data sharing in Internet of Things‐based healthcare systems11
Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction11
An intelligent collaborative inference approach of service partitioning and task offloading for deep learning based service in mobile edge computing networks11
Framework for determining the suitability of blockchain: Criteria and issues to consider11
A novel approach for multimodality medical image fusion over secure environment11
A proactive fog service provisioning framework for Internet of Things applications: An autonomic approach11
Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud11
A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges11
Analytical modeling for signaling‐based DRX in 5G communication11
Power control scheme for device‐to‐device communication using uplink channel in 5G mm‐Wave network11
On channel estimation and spectral efficiency for cell‐free massive MIMO with multi‐antenna access points considering spatially correlated channels10
Improving routing disruption attack detection in MANETs using efficient trust establishment10
Signal to interference plus noise ratio improvement of a multi‐cell indoor visible light communication system through optimal parameter selection complying lighting constraints10
Role‐based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment10
An improved optimal energy aware data availability approach for secure clustering and routing in wireless sensor networks10
Secure content‐based image retrieval using modified Euclidean distance for encrypted features10
An efficient priority‐based convolutional auto‐encoder approach for electrocardiogram signal compression in Internet of Things based healthcare system10
An improved underwater wireless sensor network communication using Internet of Things and signal to noise ratio analysis10
Selection of relays based on the classification of mobility‐type and localized network metrics in the Internet of Vehicles10
Channel estimation for reconfigurable intelligent surface‐assisted multiuser mmWave MIMO system in the presence of array blockage10
A platform for cloudification of network and applications in the Internet of Vehicles10
A smart energy‐based source location privacy preservation model for Internet of Things‐based vehicular ad hoc networks10
Blockchain and extreme learning machine based spectrum management in cognitive radio networks10
Design of an energy‐efficient IoT device with optimized data management in sports person health monitoring application10
Privacy‐preserving multisource transfer learning in intrusion detection system10
SO‐VMEC: Service offloading in virtual mobile edge computing using deep reinforcement learning10
On the performance analysis of dual hop relaying systems using differential amplify‐and‐forward along with post‐detection selection combining techniques over Nakagami‐m fading ch9
Privacy‐preserving multilevel obfuscation scheme for vehicular network9
A lightweight data transmission reduction method based on a dual prediction technique for sensor networks9
Remote sensing to control respiratory viral diseases outbreaks using Internet of Vehicles9
A fog‐based fault‐tolerant and QoE‐aware service composition in smart cities9
A levy flight based strategy to improve the exploitation capability of arithmetic optimization algorithm for engineering global optimization problems9
A deep and systematic review of the intrusion detection systems in the fog environment9
Online reinforcement learning for adaptive interference coordination9
Joint low‐complexity nonlinear equalization and carrier frequency offset compensation for multiple‐input multiple‐output orthogonal frequency division multiplexing communication systems9
A comprehensive study of different objectives and solutions of controller placement problem in software‐defined networks9
Towards faster big data analytics for anti‐jamming applications in vehicular ad‐hoc network9
Developing an attack detection framework for wireless sensor network‐based healthcare applications using hybrid convolutional neural network9
TamForen: A tamper‐proof cloud forensic framework9
A lightweight privacy protection scheme based on user preference in mobile crowdsensing9
A new optimization technique to solve the latency aware controller placement problem in software defined networks9
Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology9
Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN‐RFOA9
Core‐level cybersecurity assurance using cloud‐based adaptive machine learning techniques for manufacturing industry9
Hybrid dingo and whale optimization algorithm‐based optimal load balancing for cloud computing environment9
Outage performance of cognitive two‐way amplify‐and‐forward relay network under different transmission schemes9
A certificateless keyword searchable encryption scheme in multi‐user setting for fog‐enhanced Industrial Internet of Things8
Honesty based democratic scheme to improve community cooperation for Internet of Things based vehicular delay tolerant networks8
Auction based cost‐efficient resource allocation by utilizing blockchain in fog computing8
Performance analysis of cooperative nonorthogonal multiple access with improved time switching simultaneous wireless information and power transfer protocol8
A deep learning approach for detecting tic disorder using wireless channel information8
Power‐domain non‐orthogonal multiple access based full‐duplex one‐way wireless relaying network8
Design and investigation of hybrid PON‐FSO system employing modified NZCC code under distinct weather conditions8
Intrusion detection: A model based on the improved vision transformer8
Spatiotemporal graph convolutional recurrent networks for traffic matrix prediction8
A relationship matrix resolving model for identifying vital nodes based on community in opportunistic social networks8
A hybrid deep learning model based low‐rate DoS attack detection method for software defined network8
Anomaly traffic detection and correlation in Smart Home automation IoT systems8
Efficient deployment of multi‐UAV assisted mobile edge computing: A cost and energy perspective8
An intelligent content caching protocol for connected vehicles8
Efficient and anonymous multi‐message and multi‐receiver electronic health records sharing scheme without secure channel based on blockchain8
SOFCluster: Safety‐oriented, fuzzy logic‐based clustering scheme for vehicular ad hoc networks8
A lightweight authentication and key exchange mechanism for IPv6 over low‐power wireless personal area networks‐based Internet of things8
BER performance of MIMO based NOMA‐VLC system with imperfect SIC8
Intelligent software defined networking: Long short term memory‐graded rated unit enabled block‐attack model to tackle distributed denial of service attacks8
KY converter with fuzzy logic controller for hybrid renewable photovoltaic/wind power system7
Distributed pricing‐based resource allocation for dense device‐to‐device communications in beyond 5G networks7
An efficient modulation classification method using signal constellation diagrams with convolutional neural networks, Gabor filtering, and thresholding7
Performance analysis of non‐orthogonal multiple access assisted cooperative relay system with channel estimation errors and imperfect successive interference cancellation7
Hybrid‐360: An adaptive bitrate algorithm for tile‐based 360 video streaming7
Sign‐bit shaping using polar codes7
Learning‐based deep neural network inference task offloading in multi‐device and multi‐server collaborative edge computing7
A security‐driven network architecture for routing in industrial Internet of Things7
MDCD: A malware detection approach in cloud using deep learning7
COSCO2: AI‐augmented evolutionary algorithm based workload prediction framework for sustainable cloud data centers7
Cooperative mobile edge computing‐cloud computing in Internet of vehicle: Architecture and energy‐efficient workload allocation7
Memory optimization at Edge for Distributed Convolution Neural Network7
Adaptive user clustering for downlink nonorthogonal multiple access based 5G systems using Brute‐force search7
Cooperative NOMA system with incremental relaying and energy harvesting: Performance analysis and optimization7
Different QAM schemes analyses for ARS fading channels7
ECS‐CP‐ABE: A lightweight elliptic curve signcryption scheme based on ciphertext‐policy attribute‐based encryption to secure downlink multicast communication in edge envisioned advanced metering infra7
ECBCM: A prestige‐based edge computing blockchain security consensus model7
Streaming service provisioning in IoT‐based healthcare: An integrated edge‐cloud perspective7
Internet of Things feasibility for disabled people7
Quantum computing inspired framework of student performance assessment in smart classroom7
Statistical QoS guarantees of a device‐to‐device link assisted by a full‐duplex relay7
Stochastic channel models for massive and extreme large multiple‐input multiple‐output systems7
Game theory based hybrid localization technique for underwater wireless sensor networks7
MobiScan: An enhanced invisible screen‐camera communication system for IoT applications7
A quantitative cross‐comparison of container networking technologies for virtualized service infrastructures in local computing environments7
Cloud healthcare services: A comprehensive and systematic literature review7
A survey on green unmanned aerial vehicles‐based fog computing: Challenges and future perspective7
SPSC: A secure and privacy‐preserving autonomous platoon setup and communication scheme7
Blockchain mechanism with Byzantine fault tolerance consensus for Internet of Drones services7
Congestion centric multi‐objective reptile search algorithm‐based clustering and routing in cognitive radio sensor network7
Repot: Real‐time and privacy‐preserving online task assignment for mobile crowdsensing7
A data privacy protection scheme for Internet of things based on blockchain7
An efficient approach to detect  distributed denial of service attacks for software defined internet of things combining autoencoder and extreme gradient boosting with feature selection and hyperparam6
MetaInfoChain: Bi‐layered blockchain consensus for metadata aggregation inIoTand cloud environments6
Low‐overhead inline deduplication for persistent memory6
A privacy‐preserving mechanism for social mobile crowdsensing using game theory6
Low‐complexity receivers for massive MIMO‐GFDM communications6
Performance analysis for IRS‐aided communication systems with composite fading/shadowing direct link and discrete phase shifts6
Automatic modulation classification with 2D transforms and convolutional neural network6
DEIT: Dempster Shafer Theory‐based edge‐centric Internet of Things‐specific trust model6
Enabling machine learning‐based side‐chaining for improving QoS in blockchain‐powered IoT networks6
Decentralized prediction and reputation approach in vehicular networks6
Detection and defense against network isolation attacks in software‐defined networks6
Similarity‐based clustering and data aggregation with independent component analysis in wireless sensor networks6
Joint relay and channel selection in relay‐aided anti‐jamming system: A reinforcement learning approach6
Markov‐based analysis for cooperative HARQ‐aided NOMA transmission scheme in 5G and beyond6
Adaptive modem and interference suppression based on deep learning6
An intelligent ensemble of long‐short‐term memory with genetic algorithm for network anomaly identification6
Quality of experience‐driven resource allocation in vehicular cloud long‐term evolution networks6
A Blockchain‐based Framework for Privacy Preservation of Electronic Health Records (EHRs)6
Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach6
Intelligent multimedia content delivery in 5G/6G networks: A reinforcement learning approach6
Joint relay assignment and energy‐efficiency maximization in energy‐harvesting downlink/uplink clustered nonorthogonal multiple‐access networks6
Optimized intellectual resource scheduling using deep reinforcement Q‐learning in cloud computing6
0.084681987762451