Digital Communications and Networks

Papers
(The H4-Index of Digital Communications and Networks is 50. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems189
Diversified and compatible web APIs recommendation based on game theory in IoT175
Triangular code: Near-optimal linear time fountain code151
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications151
A label noise filtering and label missing supplement framework based on game theory140
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches132
A fast and accurate multi-keyword sorted searchable scheme based on blockchain129
Semi-supervised learning based hybrid beamforming under time-varying propagation environments124
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation120
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array117
Networked control with guaranteed performance for IoT rehabilitation robot under nonvanishing uncertainties and input quantization114
A security authentication scheme for mobile industrial IoT supply chains based on blockchain and group key management114
Building robust traffic classifier under low quality data: A federated contrastive learning approach106
A novel routing method for dynamic control in distributed computing power networks102
A relationship-aware mutual learning method for lightweight skin lesion classification102
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach95
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting88
DB-FL: DAG blockchain-enabled generalized federated dropout learning86
A latency sensitive and agile IIoT architecture with optimized edge node selection and task scheduling85
EHKP-Res: an explainable dynamic security solution for medical healthcare81
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach79
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic79
Network traffic classification: Techniques, datasets, and challenges78
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT76
Sports match prediction model for training and exercise using attention-based LSTM network75
An ensemble deep learning model for cyber threat hunting in industrial internet of things75
VANETs group message secure forwarding with trust evaluation74
Overcoming constructive/destructive interference in diversity transmission via Alamouti coding74
Resource allocation for D2D-assisted haptic communications67
Shard-DAG: A scalable and secure block-DAG sharding scheme for AI-driven 6G networks67
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing66
Computing Power Networks for Unmanned Aerial Vehicles: A Hierarchical Resources Trading Market65
Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method65
A survey on blockchain-based integrity auditing for cloud data62
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks62
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities60
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems59
IoT data analytic algorithms on edge-cloud infrastructure: A review59
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins58
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems58
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT58
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network58
Editorial Board57
MEC-based architecture for interoperable and trustworthy internet of moving things56
Using dummy data for RFID tag and reader authentication56
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks52
Editorial Board52
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing51
A fixed clustering protocol based on random relay strategy for EHWSN51
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks50
Design of modified model of intelligent assembly digital twins based on optical fiber sensor network50
0.259850025177