IEEE Internet of Things Journal

Papers
(The median citation count of IEEE Internet of Things Journal is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Table of Contents1010
Diagnosis of Multiple Fundus Disorders Amidst a Scarcity of Medical Experts Via Self-Supervised Machine Learning577
Pushing the Boundaries of High-Precision AoA Estimation With Enhanced Phase Estimation Protocol558
LuxTrack: Activity Inference Attacks via Smartphone Ambient Light Sensors and Countermeasures494
The Self-Detection Method of the Puppet Attack in Biometric Fingerprinting457
IEEE Internet of Things Journal Information for Authors386
IEEE Internet of Things Journal Information for Authors374
Secrecy Outage Probability of Multiple-Input–Multiple-Output Secure Internet of Things Communication Systems355
Blockchain Security Using Merkle Hash Zero Correlation Distinguisher for the IoT in Smart Cities345
Mixed-Criticality Industrial Data Scheduling on 5G NR345
Cryptosystem for IoT Devices With Feedback Operation Modes Based on Shared Buffer and Unrolled-Pipeline Techniques323
Convex Optimization of Mutual Inductance Between Multiantiparallel Coils for Distance-Insensitive Wireless Charging of Air–Ground Robots304
EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks286
Hash Access in Blockchain Radio Access Networks: Characterization and Optimization279
Clustered Scheduling and Communication Pipelining for Efficient Resource Management of Wireless Federated Learning261
Mordo: Silent Command Recognition Through Lightweight Around-Ear Biosensors253
Multistate Constraint Multipath-Assisted Positioning and Mismatch Alleviation251
Game-Theory-Inspired Novel Mechanism for Assessing Healthcare Quality243
Guest Editorial Special Issue on Blockchain-Enabled Internet of Things241
V2V-Based Cooperative Control of Heterogeneous CAV Platoons: An Intelligent VO-IDA Approach235
Novel Power Control With Duplex Mode Selection Schemes in Two-Way IoT-Type Communication235
Rate-Convergence Tradeoff of Federated Learning Over Wireless Channels224
CEL: Cost-Aware Edge-Assisted Livecast via Optimization With Shapley Value219
A Spatiotemporal Detection and Tracing Framework for Human Contact Behavior Using Multicamera Sensors216
Special Issue on Knowledge- and Service-Oriented Industrial Internet of Things: Architectures, Challenges, and Methodologies216
Modeling the Offloading Scheme With Unreliable VM-Related Service for MEC Networks211
Information for Authors202
IEEE Internet of Things Journal Information for Authors196
Front Cover194
Table of contents193
Outsourced Secure Cross-Modal Retrieval Based on Secret Sharing for Lightweight Clients191
IEEE Internet of Things Journal Publication Information191
Empowering AI-Driven Healthcare With Secure, Decentralized, and Privacy-Enhancing Adaptive Intelligence188
Foundation Model-Based Federated Learning for Intrusion Detection in Drone-Aided Industrial IoT186
Indoor 3-D Localization Based on Heterogeneous Sensing Data Fusion185
Movable-Element STARS-Assisted Near-Field Wideband Communications181
Automatic Image Annotation for Human–Machine Interaction in Industrial IoT Flexible Manufacturing177
A Root Cause Analysis Framework for IoT Based on Dynamic Causal Graphs Assisted by LLMs177
Smartphone-Based Multimode Geomagnetic Matching/PDR Adaptive Fusion Positioning and Integrity Monitoring in a Variable Corridor Environment174
IEEE Internet of Things Journal Society Information174
Is It Instrumentation? Evaluation of Validity Constraints in Smart Homes174
Table of Contents173
EESyn-CTP: Edge–End Collaboration for Patient-Friendly CTP Image Synthesis172
Multihop Routing for IoT-Based Digital Twin: Novel Metaheuristic Approaches171
Optimization of Vehicular Edge Computing Under Time-Varying Fading Channels With Path Prediction170
Online Identification and Temperature Tracking Control for Furnace System With a Single Slab and a Single Heater Over the Wirelessly Connected IoT Controller170
Table of Contents168
Continuous Latent Adversarial Autoencoder: A Time-Sensitive Method for Incomplete Time-Series Modeling166
IEEE Internet of Things Journal Publication Information165
Data-Driven Iterative Learning Security Consensus for Nonlinear Multiagent Systems With Fading Channels and Deception Attacks163
Toward Crash-Free Autonomous Driving: Anomaly Detection and Control for Resilience to Stealthy Sensor Attacks155
Pushing the Charging Distance Beyond Near Field by Antenna Design154
Table of Contents153
A Multilevel Biosensor-Based Epidemic Simulation Model for COVID-19152
DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications151
Joint Optimization of Signal Scheme and Vehicle Trajectories Based on Vehicular Delay Estimation Model149
Mitigating Energy Cost of Connection Reliability in UWSNs Through Non-Uniform k-Connectivity145
Distributed Feature Selection Considering Data Pricing Based on Edge Computing in Electricity Spot Markets145
A Definition of a New Global Secure Internet of Things Architecture144
Assessing Membership Leakages via Task-Aligned Divergent Shadow Data Sets in Vehicular Road Cooperation144
MASS: A Multiattribute Sketch Secure Data Sharing Scheme for IoT Wearable Medical Devices Based on Blockchain142
GreenTrust: Trust Assessment Using Ensemble Learning in Internet of Microgrid Things142
A Semantic Communication Approach for Multiscene Target Detection in Intelligent Vehicle Networks142
An Optimized Privacy-Utility Tradeoff Framework for Differentially Private Data Sharing in Blockchain-Based Internet of Things141
Robust Spectrum Access Scheme Against Diverse Jamming Policies: A Prioritized Fictitious Rival-Play-Based Approach138
Oneshot Deep Reinforcement Learning Approach to Network Slicing for Autonomous IoT Systems138
Lightweight Trust Management Scheme Based on Blockchain in Resource-Constrained Intelligent IoT Systems138
Collaborative Intrusion Detection Approach Based on Blockchain in Internet of Vehicles138
Global Microservice Autoscaling Over Heterogeneous Edge Environments for Internet Applications: A Reinforcement Learning Approach137
A Fractured Petal-Shaped Multi-Polarization Reconfigurable Antenna With Over 2:1 Bandwidth for Intelligent IoT Applications137
Distributed Adaptive Bipartite Containment Control for Nonlinear Multiagent Systems Under Deception Attacks and Actuator Faults137
Fuzzy Neural Network Enhanced Information Fusion for Multi-model Action Recognition137
3-D Indoor Positioning Based on Passive Radio Frequency Signal Strength Distribution137
Mobile Feature Enhanced High-Accuracy Positioning Based on Carrier Phase and Bayesian Estimation136
Energy-Aware Irregular Slotted Aloha Methods for Wireless-Powered IoT Networks134
Analytical Modeling of Location and Contention Randomness for Node-Assisted WiFi Backscatter Communication134
General Simultaneous Localization and Mapping Scheme for mmWave Communication Systems133
Enhancing Performance in Worst-Case Scenarios of BLE Periodic Advertising for Dense IoT Networks133
LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems132
Toward Communication-Efficient Over-the-Air Federated Learning: Synergistic Compression for Uplink and Downlink Transmission132
Cerberus: Accurate Real-Time Object Detection System Under Adverse Weather Conditions via Multi-modal Fusion131
Rethinking Distributed Average Consensus for Wireless Networks: A Low-Cost Approach to Broadcast Probability Optimization131
Modulation Classification of Active Attacks in Internet of Things: Lightweight MCBLDN With Spatial Transformer Network129
MitM Attack to Electric Vehicle AC Chargers129
Watermarking for Stable Diffusion Models129
FLOW: A Robust Federated Learning Framework to Defend Against Model Poisoning Attacks in IoT128
Fine-Grained Personalized Hierarchical Federated Learning Toward Heterogeneous Internet of Vehicles126
Paired Swarm Optimized Relational Vector Learning for FDI Attack Detection in IoT-Aided Smart Grid126
Toward the Random Multiaccess in SIoT: A Generalized-Deduplication-Based CRDSA Mechanism125
Semantic-Based Channel State Information Feedback for AAV-Assisted ISAC Systems124
IoT-Driven Facial Expression Recognition for Personalized Healthcare in Industry 5.0124
A Joint Global–Local Network for Human Pose Estimation With Millimeter Wave Radar122
UAV-Assisted Active Sparse Crowdsensing for Ground Signal Map Construction Based on 3-D Spatial–Temporal Correlation122
Permutation-Based Short-Packet Transmissions Improve Secure URLLCs in the Internet of Things121
Energy Minimization of RIS-Assisted Cooperative UAV–USV MEC Network120
Incentive-Vacation Queueing for Edge Crowd Computing120
UAV Dynamic Service Function Chains Deployment Based on Security Considerations: A Reinforcement Learning Method119
Cell-Free Optimization Method for Downlink Integrated Satellite-Ground Networks119
mmMotion: A Real-Time Human Motion Detection Smart Home System Based on mmWave Radar118
EAGCN: An Efficient Adaptive Graph Convolutional Network for Item Recommendation in Social Internet of Things118
Doppler-Division MIMO Radar-Based Target Detection for Edge Sensing Systems117
Enhancing Malicious Activity Detection in IoT-Enabled Network and IoMT Systems Through Meta-Heuristic Optimization and Machine Learning117
Make the Rocket Intelligent at IoT Edge: Stepwise GAN for Anomaly Detection of LRE With Multisource Fusion116
Joint Device Selection and Power Control for Energy Sustainable RIS-NOMA-Enhanced Wireless IoT Networks116
Direct Position Determination With a Moving Extended Nested Array by Spatial Sparsity115
Holographic-Inspired Meta-Surfaces Exploiting Vortex Beams for Low-Interference Multipair IoT Communications: From Theory to Prototype115
Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain115
Dual Photoplethysmography Pulse Wave Velocity-Based Blood Pressure Prediction for Wearable Healthcare Internet of Things115
Securing Distributed Network Digital Twin Systems Against Model Poisoning Attacks114
A Novel High-Precision and Low-Latency Abandoned Object Detection Method Under the Hybrid Cloud-Fog Computing Architecture114
IoT and Fog-Computing-Based Predictive Maintenance Model for Effective Asset Management in Industry 4.0 Using Machine Learning114
Hybrid NOMA-OMA Transmission Scheduling for Production Efficiency Maximization in Industrial Edge Computing Networks113
Learning-Aided Joint Beam Divergence Angle and Power Optimization for Seamless and Energy-Efficient Underwater Optical Communication111
The Security and Privacy of Mobile-Edge Computing: An Artificial Intelligence Perspective110
Integrated Terrestrial-Wired and LEO Satellite With Offline Bidirectional Cooperation for 6G IoT Networks110
Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things110
Node Dynamic Localization and Prediction Algorithm for Internet of Underwater Things109
UAV-Enabled Secure Data Collection and Energy Transfer in IoT via Diffusion-Model-Enhanced Deep Reinforcement Learning109
An M-Ary Concentration-Shift Keying With Common Detection Thresholds for Multitransmitter Molecular Communication108
Fault-Tolerant Mechanism for Edge-Based IoT Networks With Demand Uncertainty108
Physical-Layer Security for Intelligent-Reflecting-Surface-Aided Wireless-Powered Communication Systems107
Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial Control Systems106
FCLLM-DT: Enpowering Federated Continual Learning With Large Language Models for Digital-Twin-Based Industrial IoT106
A Fully Automated Intelligent Medicine Dispensary System Based on AIoT106
Multi-TDOA Estimation and Source Direct Position Determination Based on Parallel Factor Analysis106
An Efficient Aggregate Signature Scheme With Designated Verifier Based on the Schnorr Signature in Healthcare Wireless Sensor Networks106
Efficient and Privacy-Preserving Blockchain-Based Multifactor Device Authentication Protocol for Cross-Domain IIoT105
SeqBalance: Congestion-Aware Load Balancing With No Reordering in Data Center Networks105
Blockchain-Based Anonymous Data Sharing With Accountability for Internet of Things105
Next-Generation Internet of Things in Fintech Ecosystem105
Countering Large-Scale Malicious Multiagent Systems by Consensus Breakdown Based on Critical Node Identification104
Joint Quantum Reinforcement Learning and Neural Myerson Auction for High-Quality Digital-Twin Services in Multitier Networks104
Timeliness of CSMA/CA-Based Wireless Networks With HARQ in the FBL Regime: Explicit Age Characterizations and Resource Allocation104
MRDT: An Enhanced Multireceiver Secure Data Transmission Protocol for WBANs103
Toward Context-Aware Federated Learning Assessment: A Reality Check103
A Novel-Deep-Neural-Network-Architecture-Based GAN-DRANet for DOA Sensing With an Enhanced Performance in Low SNR103
A Conditional Privacy-Preserving Efficient Authentication Scheme With Revocability for Wireless Body Area Networks102
Codesigned Communication and Data Analytics for Condition-Based Maintenance in Smart Buildings102
ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System102
Smart Grid Meets URLLC: A Federated Orchestration With Improved Communication for Efficient Energy Resources Management101
Adaptive Policy Evaluation With Adjustable Step Sizes for Active Quarter-Vehicle Suspension Systems under IoT Environment101
Prescribed Performance Optimal Consensus of MASs With Connectivity Preservation100
Satellite Payload Noncooperative Tactical Communication Signal Monitoring: Dataset and IoT Edge Computing Method100
AIoT-Enhanced Blockchain Framework for Hierarchical Access Control in Green Medical Supply Chain Systems100
Mobility-Aware Semantic Offloading With NOMA in Edge-Enabled IoT Networks100
Generative AI-Augmented Federated Learning for Vehicle Routing in Supply Chain Management With Human Resource Management and Low-Carbon Emission in IIoT99
A PUF-Enhanced Fog-Enabled Hierarchical Authentication Protocol for Internet of Vehicles99
A Credit Rate Round-robin (CRR) Scheduling to Avoid Priority Assignment for Real-time Networks98
A Single-Fed Dual-Band Orthogonal Circularly Polarized Filtering Antenna for 5G-Enabled IoV Applications98
AAV Air-to-Air Channel: Statistical Properties and Experimental Verification98
PID Containment Control for Multi-Agent Systems With Multi-Rate Measurements Under Sensor Resolution Constraints98
Charging Cost-Aware Fleet Management for Shared On-Demand Green Logistic System97
Privacy-Preserving and Fault-Tolerant Aggregation of Time-Series Data With a Semi-Trusted Authority97
Computed Tomography and 3-D Face Scan Fusion for IoT-Based Diagnostic Solutions97
Joint Fairness and Power Optimization Under User Priority in NOMA Networks for IoT Applications96
UPNC-MAC: A Collision-Aware and PD-NOMA-Enabled MAC Protocol for Distributed Underwater Acoustic Networks96
Energy-Constrained Safe Path Planning for UAV-Assisted Data Collection of Mobile IoT Devices96
EdgeCrypt Tracker: Object Tracking With Differential Encryption for IoAAV Surveillance96
A Fast Consensus Algorithm of Large-Scale Heterogeneous Dynamic IoT Nodes for DAG-based Blockchain96
Concurrent Rate-Adaptive Reading With Passive RFIDs96
Multiple Access via Curriculum Multitask HAPPO Based on Dynamic Heterogeneous Wireless Network96
Targeted Dissemination of Incident Information With Combinatorial Traffic-Communication Optimization96
Enabling the Internet of Bodies Through Capacitive Body Channel Access Schemes95
Toward Secure Localization in Randomly Deployed Wireless Networks95
SenseMax: IoT-Based User Device Interaction Prediction with Complementary Masked Modeling and Contrastive Learning95
Joint Sensing and Communication for mmWave VR in Metaverse: A Meta-Learning Approach95
Resource Allocation in UAV-Enabled Wireless-Powered MEC Networks With Hybrid Passive and Active Communications95
CRS: A Privacy-Preserving Two-Layered Distributed Machine Learning Framework for IoV95
A Time-Efficient Protocol for Unknown Tag Identification in Large-Scale RFID Systems95
Design of Noncoherent and Coherent Receivers for Chirp Spread Spectrum Systems94
VirtElect: A Peer-to-Peer Trading Platform for Local Energy Transactions93
FedCos: A Scene-Adaptive Enhancement for Federated Learning93
Performance Evaluation of UAV-Aided Radio Frequency-UAC Relaying Systems93
Channel Modelling of Sharding Blockchain-enabled Wireless Internet of Things for Next Generation Networks93
Optimizing Low-Energy Carbon IIoT Systems With Quantum Algorithms: Performance Evaluation and Noise Robustness93
Learning-Based Resource Allocation in Heterogeneous Ultradense Network92
Reconfigurable Intelligent Surface Assisted Free Space Optical Information and Power Transfer92
Learning-Based Reconfigurable-Intelligent-Surface-Aided Rate-Splitting Multiple Access Networks91
An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme91
Joint Sensing and Computation Incentive Mechanism for Mobile Crowdsensing Networks: A Multiagent Reinforcement Learning Approach91
Early Forest Fire Detection and Localization Using UAV Bimodal Images90
Bifurcation Dynamics, Amplitude–Frequency Characteristics of Hopfield Neural Network and Its Application90
Enabling Lightweight Device Authentication in Message Queuing Telemetry Transport Protocol90
Short-Term Load Forecasting Using AMI Data90
Energy-Efficient Optimization for RIS-Aided MIMO Covert Communications89
Near-Field Beam Focusing for Integrated Sensing and Communication Systems89
A Swarm Formation Control System for AAV-Enabled Internet of Things With Hybrid Path Planning89
On the Age of Information and Energy Efficiency in Cellular IoT Networks With Data Compression88
MetaBP: A Meta-Learning Approach for Contact-Based Blood Pressure Measurement via Camera on Smart Devices88
TANF–Trustworthy Adaptive Neural Framework for Reliable and Scalable 6G Internet of Things87
Noise-Aware Ensemble Learning for Efficient Radar Modulation Recognition87
Permutation Index Aided Multicarrier Differential Chaos Shift Keying Modulation87
STL-Detector: Detecting City-Wide Ride-Sharing Cars via Self-Taught Learning87
EAPDS: Efficient Auditable and Privacy-Preservation Data-Sharing Scheme Based on Attribute-Based Encryption for IoMT87
A Home-Based Upper Limb Rehabilitation System via Cloud-Based Teleoperation and sEMG-Driven Bilateral Control87
An Efficient NB-IoT Compatible GF-NOMA PHY Mechanism for mMTC87
On-Demand Model and Client Deployment in Federated Learning With Deep Reinforcement Learning86
Enhanced mmWave Radar Sound Sensing: A Passive Relay for Long-Range, Source-Independent Sound Acquisition86
Mixture Survival Classification Neural Network for Power Failure Risk Prediction in Two-Wheel Shared Mobility86
Universal Programmable Transfer Function Modeling Circuit Based on Memristors for PID Simulation Application86
Machine-Learning-Based Performance Prediction for CDN Cache Groups in Meta Computing86
A NOMA-Enhanced Two-Step RACH Procedure for Low-Latency Access in 5G Networks85
A Fast Crash Reproduction Method for Android Applications Based on Widget Hierarchy Graphs85
Performance Improvement in UAV Communication Systems With Uncertain Solar Energy Supply85
Novel Response-Time Bounds of Typed DAG Tasks on Heterogeneous Multicores84
Scalable Wi-Fi Fingerprinting Localization by Deep Similarity Network84
TEGRAS: An Efficient Tegra Embedded GPU-Based RSA Acceleration Server84
Universal and Efficient Adversarial Training Framework With Membership Inference Resistance84
Front Cover84
Performance Evaluation of Uplink Grant-Free Access Networks Based on Spreading-Based NOMA84
Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers84
AI-Empowered Multi-UAV and IRS Collaboration for Spectrum and Energy Optimization in B5G Networks83
Energy-Efficient RIS-Assisted Co-Channel Interference Mitigation in ITSN83
Data-Driven Task Offloading Method for Resource-Constrained Terminals via Unified Resource Model83
VibMilk: Nonintrusive Milk Spoilage Detection via Smartphone Vibration82
STAR-RIS-Empowered Heterogeneous Federated Edge Learning With Flexible Aggregation82
Through Diverse Lenses: Multimodal Collaborative Perception for Indoor Scenes in Smart Home Systems81
Interference Cancelation for Coexistence of LoRaWAN With Wireless Power Transfer81
VSAFL: Verifiable and Secure Aggregation With (Poly) Logarithmic Overhead in Federated Learning81
Digital-Twin-Based Satellite Orbit Prediction for Internet of Things Systems81
Identification of Cellular Signal Measurements Using Extreme Learning Machine81
Graph-Based Denoising for Respiration and Heart Rate Estimation During Sleep in Thermal Video81
Tree Proof-of-Position Algorithms81
Training Optimization for Subarray-Based IRS-Assisted MIMO Communications81
Topology-Driven Attribute Recovery for Attribute Missing Graph Learning in Social Internet of Things81
A Mutation Particle Swarm Optimization Method for Task Scheduling in Seismic Edge Networks80
A Multilevel TDMA Approach for IoT Applications With WuR Support80
A Multiplatform-Cooperation-Based Task Assignment Mechanism for Mobile Crowdsensing80
Privacy-Preserving Multimodal Sentiment Analysis80
WiWalk: Gait-Based Dual-User Identification Using WiFi Device80
A Deep Reinforcement Learning-Based Multiobjective Charging Scheduling Method for Electric Vehicle Charging Station80
Effective Chirp Modulation Communication System Design for LEO Satellite IoT80
RSS-Based Visible Light Positioning Using Nonlinear Optimization79
Incentive-Driven Task Allocation for Collaborative Edge Computing in Industrial Internet of Things79
Priority-Based Load Balancing With Multiagent Deep Reinforcement Learning for Space–Air–Ground Integrated Network Slicing79
Multiresolution Fusion Convolutional Network for Open Set Human Activity Recognition79
Multi-UAV Trajectory Control, Resource Allocation, and NOMA User Pairing for Uplink Energy Minimization79
Profit Maximizing Smart Manufacturing Over AI-Enabled Configurable Blockchains79
Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud79
GRNN-Based Detection of Eavesdropping Attacks in SWIPT-Enabled Smart Grid Wireless Sensor Networks78
Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids78
Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity77
Delay Minimization for NOMA-mmW Scheme-Based MEC Offloading77
Achieving Privacy-Preserving Multitask Allocation for Mobile Crowdsensing77
Nonuniform-Array-Based Integrated MIMO Communication and Positioning in Wireless Local Area Networks77
Secure and Efficient Peer2Peer Authentication-Attestation Protocol for UAV Networks77
Toward Data Collection and Transmission in 6G Space–Air–Ground Integrated Networks: Cooperative HAP and LEO Satellite Schemes77
Joint Subcarrier and Transmission Power Allocation in OFDMA-Based WPT System for Mobile-Edge Computing in IoT Environment76
Robust RF Fingerprint Extraction Based on Cyclic Shift Characteristic76
RIS-Assisted Integration of Communications and Security: Protocol, Prototyping, and Field Trials76
0.5497670173645