IEEE Internet of Things Journal

Papers
(The H4-Index of IEEE Internet of Things Journal is 112. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Table of Contents1010
Diagnosis of Multiple Fundus Disorders Amidst a Scarcity of Medical Experts Via Self-Supervised Machine Learning577
Pushing the Boundaries of High-Precision AoA Estimation With Enhanced Phase Estimation Protocol558
LuxTrack: Activity Inference Attacks via Smartphone Ambient Light Sensors and Countermeasures494
The Self-Detection Method of the Puppet Attack in Biometric Fingerprinting457
IEEE Internet of Things Journal Information for Authors386
IEEE Internet of Things Journal Information for Authors374
Secrecy Outage Probability of Multiple-Input–Multiple-Output Secure Internet of Things Communication Systems355
Mixed-Criticality Industrial Data Scheduling on 5G NR345
Blockchain Security Using Merkle Hash Zero Correlation Distinguisher for the IoT in Smart Cities345
Cryptosystem for IoT Devices With Feedback Operation Modes Based on Shared Buffer and Unrolled-Pipeline Techniques323
Convex Optimization of Mutual Inductance Between Multiantiparallel Coils for Distance-Insensitive Wireless Charging of Air–Ground Robots304
EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks286
Hash Access in Blockchain Radio Access Networks: Characterization and Optimization279
Clustered Scheduling and Communication Pipelining for Efficient Resource Management of Wireless Federated Learning261
Mordo: Silent Command Recognition Through Lightweight Around-Ear Biosensors253
Multistate Constraint Multipath-Assisted Positioning and Mismatch Alleviation251
Game-Theory-Inspired Novel Mechanism for Assessing Healthcare Quality243
Guest Editorial Special Issue on Blockchain-Enabled Internet of Things241
V2V-Based Cooperative Control of Heterogeneous CAV Platoons: An Intelligent VO-IDA Approach235
Novel Power Control With Duplex Mode Selection Schemes in Two-Way IoT-Type Communication235
Rate-Convergence Tradeoff of Federated Learning Over Wireless Channels224
CEL: Cost-Aware Edge-Assisted Livecast via Optimization With Shapley Value219
Special Issue on Knowledge- and Service-Oriented Industrial Internet of Things: Architectures, Challenges, and Methodologies216
A Spatiotemporal Detection and Tracing Framework for Human Contact Behavior Using Multicamera Sensors216
Modeling the Offloading Scheme With Unreliable VM-Related Service for MEC Networks211
Information for Authors202
IEEE Internet of Things Journal Information for Authors196
Front Cover194
Table of contents193
Outsourced Secure Cross-Modal Retrieval Based on Secret Sharing for Lightweight Clients191
IEEE Internet of Things Journal Publication Information191
Empowering AI-Driven Healthcare With Secure, Decentralized, and Privacy-Enhancing Adaptive Intelligence188
Foundation Model-Based Federated Learning for Intrusion Detection in Drone-Aided Industrial IoT186
Indoor 3-D Localization Based on Heterogeneous Sensing Data Fusion185
Movable-Element STARS-Assisted Near-Field Wideband Communications181
Automatic Image Annotation for Human–Machine Interaction in Industrial IoT Flexible Manufacturing177
A Root Cause Analysis Framework for IoT Based on Dynamic Causal Graphs Assisted by LLMs177
Is It Instrumentation? Evaluation of Validity Constraints in Smart Homes174
Smartphone-Based Multimode Geomagnetic Matching/PDR Adaptive Fusion Positioning and Integrity Monitoring in a Variable Corridor Environment174
IEEE Internet of Things Journal Society Information174
Table of Contents173
EESyn-CTP: Edge–End Collaboration for Patient-Friendly CTP Image Synthesis172
Multihop Routing for IoT-Based Digital Twin: Novel Metaheuristic Approaches171
Online Identification and Temperature Tracking Control for Furnace System With a Single Slab and a Single Heater Over the Wirelessly Connected IoT Controller170
Optimization of Vehicular Edge Computing Under Time-Varying Fading Channels With Path Prediction170
Table of Contents168
Continuous Latent Adversarial Autoencoder: A Time-Sensitive Method for Incomplete Time-Series Modeling166
IEEE Internet of Things Journal Publication Information165
Data-Driven Iterative Learning Security Consensus for Nonlinear Multiagent Systems With Fading Channels and Deception Attacks163
Toward Crash-Free Autonomous Driving: Anomaly Detection and Control for Resilience to Stealthy Sensor Attacks155
Pushing the Charging Distance Beyond Near Field by Antenna Design154
Table of Contents153
A Multilevel Biosensor-Based Epidemic Simulation Model for COVID-19152
DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications151
Joint Optimization of Signal Scheme and Vehicle Trajectories Based on Vehicular Delay Estimation Model149
Distributed Feature Selection Considering Data Pricing Based on Edge Computing in Electricity Spot Markets145
Mitigating Energy Cost of Connection Reliability in UWSNs Through Non-Uniform k-Connectivity145
A Definition of a New Global Secure Internet of Things Architecture144
Assessing Membership Leakages via Task-Aligned Divergent Shadow Data Sets in Vehicular Road Cooperation144
MASS: A Multiattribute Sketch Secure Data Sharing Scheme for IoT Wearable Medical Devices Based on Blockchain142
GreenTrust: Trust Assessment Using Ensemble Learning in Internet of Microgrid Things142
A Semantic Communication Approach for Multiscene Target Detection in Intelligent Vehicle Networks142
An Optimized Privacy-Utility Tradeoff Framework for Differentially Private Data Sharing in Blockchain-Based Internet of Things141
Collaborative Intrusion Detection Approach Based on Blockchain in Internet of Vehicles138
Robust Spectrum Access Scheme Against Diverse Jamming Policies: A Prioritized Fictitious Rival-Play-Based Approach138
Oneshot Deep Reinforcement Learning Approach to Network Slicing for Autonomous IoT Systems138
Lightweight Trust Management Scheme Based on Blockchain in Resource-Constrained Intelligent IoT Systems138
3-D Indoor Positioning Based on Passive Radio Frequency Signal Strength Distribution137
Global Microservice Autoscaling Over Heterogeneous Edge Environments for Internet Applications: A Reinforcement Learning Approach137
A Fractured Petal-Shaped Multi-Polarization Reconfigurable Antenna With Over 2:1 Bandwidth for Intelligent IoT Applications137
Distributed Adaptive Bipartite Containment Control for Nonlinear Multiagent Systems Under Deception Attacks and Actuator Faults137
Fuzzy Neural Network Enhanced Information Fusion for Multi-model Action Recognition137
Mobile Feature Enhanced High-Accuracy Positioning Based on Carrier Phase and Bayesian Estimation136
Energy-Aware Irregular Slotted Aloha Methods for Wireless-Powered IoT Networks134
Analytical Modeling of Location and Contention Randomness for Node-Assisted WiFi Backscatter Communication134
Enhancing Performance in Worst-Case Scenarios of BLE Periodic Advertising for Dense IoT Networks133
General Simultaneous Localization and Mapping Scheme for mmWave Communication Systems133
Toward Communication-Efficient Over-the-Air Federated Learning: Synergistic Compression for Uplink and Downlink Transmission132
LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems132
Cerberus: Accurate Real-Time Object Detection System Under Adverse Weather Conditions via Multi-modal Fusion131
Rethinking Distributed Average Consensus for Wireless Networks: A Low-Cost Approach to Broadcast Probability Optimization131
Watermarking for Stable Diffusion Models129
Modulation Classification of Active Attacks in Internet of Things: Lightweight MCBLDN With Spatial Transformer Network129
MitM Attack to Electric Vehicle AC Chargers129
FLOW: A Robust Federated Learning Framework to Defend Against Model Poisoning Attacks in IoT128
Fine-Grained Personalized Hierarchical Federated Learning Toward Heterogeneous Internet of Vehicles126
Paired Swarm Optimized Relational Vector Learning for FDI Attack Detection in IoT-Aided Smart Grid126
Toward the Random Multiaccess in SIoT: A Generalized-Deduplication-Based CRDSA Mechanism125
IoT-Driven Facial Expression Recognition for Personalized Healthcare in Industry 5.0124
Semantic-Based Channel State Information Feedback for AAV-Assisted ISAC Systems124
A Joint Global–Local Network for Human Pose Estimation With Millimeter Wave Radar122
UAV-Assisted Active Sparse Crowdsensing for Ground Signal Map Construction Based on 3-D Spatial–Temporal Correlation122
Permutation-Based Short-Packet Transmissions Improve Secure URLLCs in the Internet of Things121
Energy Minimization of RIS-Assisted Cooperative UAV–USV MEC Network120
Incentive-Vacation Queueing for Edge Crowd Computing120
Cell-Free Optimization Method for Downlink Integrated Satellite-Ground Networks119
UAV Dynamic Service Function Chains Deployment Based on Security Considerations: A Reinforcement Learning Method119
mmMotion: A Real-Time Human Motion Detection Smart Home System Based on mmWave Radar118
EAGCN: An Efficient Adaptive Graph Convolutional Network for Item Recommendation in Social Internet of Things118
Doppler-Division MIMO Radar-Based Target Detection for Edge Sensing Systems117
Enhancing Malicious Activity Detection in IoT-Enabled Network and IoMT Systems Through Meta-Heuristic Optimization and Machine Learning117
Make the Rocket Intelligent at IoT Edge: Stepwise GAN for Anomaly Detection of LRE With Multisource Fusion116
Joint Device Selection and Power Control for Energy Sustainable RIS-NOMA-Enhanced Wireless IoT Networks116
Direct Position Determination With a Moving Extended Nested Array by Spatial Sparsity115
Holographic-Inspired Meta-Surfaces Exploiting Vortex Beams for Low-Interference Multipair IoT Communications: From Theory to Prototype115
Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain115
Dual Photoplethysmography Pulse Wave Velocity-Based Blood Pressure Prediction for Wearable Healthcare Internet of Things115
Securing Distributed Network Digital Twin Systems Against Model Poisoning Attacks114
A Novel High-Precision and Low-Latency Abandoned Object Detection Method Under the Hybrid Cloud-Fog Computing Architecture114
IoT and Fog-Computing-Based Predictive Maintenance Model for Effective Asset Management in Industry 4.0 Using Machine Learning114
Hybrid NOMA-OMA Transmission Scheduling for Production Efficiency Maximization in Industrial Edge Computing Networks113
0.097574949264526