Digital Communications and Networks

Papers
(The median citation count of Digital Communications and Networks is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches126
Editorial Board111
A measurable refinement method of design and verification for micro-kernel operating systems in communication network97
Video Frame Interpolation Based on Invertible Neural Network for Internet of Things94
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling86
An ellipse-guided routing algorithm in wireless sensor networks84
Editorial Board80
Classification with ensembles and case study on functional magnetic resonance imaging79
Observer-based event-triggered networked multi-drives speed consensus79
Editorial Board77
Editorial Board74
Prototyping low-cost automatic weather stations for natural disaster monitoring73
Software defined intelligent satellite-terrestrial integrated networks: Insights and challenges67
Resource management at the network edge for federated learning66
Index modulation aided generalized space-time block coding: A unified MIMO framework65
A novel routing method for dynamic control in distributed computing power networks64
Swarm learning anomaly detection framework for cloud data center using multi-channel BiWGAN-GTN and CEEMDAN64
Sparse graph neural network aided efficient decoder for polar codes under bursty interference64
Information mining and similarity computation for semi- / un-structured sentences from the social data63
Towards machine-learning-driven effective mashup recommendations from big data in mobile networks and the Internet-of-Things60
SCIM: Incorporating secure communication and interference management in one operation59
A secure visual framework for multi-index protection evaluation in networks59
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities59
DTAIS: Distributed trusted active identity resolution systems for the Industrial Internet58
Toward edge-computing-enabled collision-free scheduling management for autonomous vehicles at unsignalized intersections56
Position-aware packet loss optimization on service function chain placement54
Monte-Carlo based random passive energy beamforming for reconfigurable intelligent surface assisted wireless power transfer54
Game-theoretic physical layer authentication for spoofing detection in internet of things53
A fast and accurate multi-keyword sorted searchable scheme based on blockchain51
A reconstruction and recovery network-based channel estimation in high-speed railway wireless communications50
DB-FL: DAG blockchain-enabled generalized federated dropout learning50
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI49
An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT49
Location privacy protection of maritime mobile terminals49
NPO-BAND: Number and placement optimization for backhaul-aware UAV network deployment49
Research on data load balancing technology of massive storage systems for wearable devices47
A label noise filtering and label missing supplement framework based on game theory47
Triangular code: Near-optimal linear time fountain code46
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks46
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks45
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach44
Semantic framework of event detection in emergency situations for smart buildings43
Reinforcement learning-enabled swarm intelligence method for computation task offloading in Internet-of-Things blockchain43
Path planning of autonomous underwater vehicle for data collection of the internet of everything42
Adversarial attacks and defenses for digital communication signals identification42
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group41
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home41
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system40
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming40
Hierarchical flow learning for low-light image enhancement39
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems39
Semi-supervised learning based hybrid beamforming under time-varying propagation environments38
Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things38
Alamouti code based on block repetition in FBMC/OQAM systems38
CPFinder: Finding an unknown caller's profession from anonymized mobile phone data37
Substring-searchable attribute-based encryption and its application for IoT devices35
A novel deviation measurement for scheduled intelligent transportation system via comparative spatial-temporal path networks34
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers34
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks34
Security and privacy issues of physical objects in the IoT: Challenges and opportunities34
RADAR: a rapid discovery algorithm for routes in SDN-based IoV33
Multi-class Bitcoin mixing service identification based on graph classification33
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring33
Interworking between Modbus and internet of things platform for industrial services33
Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN33
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process32
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications30
A blockchain-based audit approach for encrypted data in federated learning30
Sum rate maximization in UAV-assisted data harvesting network supported by CF-mMIMO system exploiting statistical CSI30
AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks29
Game theory attack pricing for mining pools in blockchain-based IoT28
Enhancing flexibility and system performance in 6G and beyond: A user-based numerology and waveform approach28
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach27
Diversified and compatible web APIs recommendation based on game theory in IoT27
Game theory in network security for digital twins in industry26
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting26
A survey of internet of medical things: technology, application and future directions25
8K Ultra HD TV broadcast system: Challenge, architecture and implementation25
CARS: connection as required scheme for horizontal communications in Industry 4.025
A pipelining task offloading strategy via delay-aware multi-agent reinforcement learning in Cybertwin-enabled 6G network25
EHKP-Res: An explainable dynamic security solution for medical healthcare25
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy25
Block-gram: Mining knowledgeable features for efficiently smart contract vulnerability detection25
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine24
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT24
Building an interoperable space for smart agriculture24
Environment-aware streaming media transmission method in high-speed mobile networks23
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks23
Preamble slice orderly queue access scheme in cell-free dense communication systems23
Public integrity verification for data sharing in cloud with asynchronous revocation22
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN22
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks22
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks22
Video transcoding for adaptive bitrate streaming over edge-cloud continuum22
A notary group-based cross-chain mechanism22
Trust-based co-operative routing for secure communication in mobile ad hoc networks21
Latency minimization for multiuser computation offloading in fog-radio access networks21
Low-complexity soft-output signal detector based on adaptive pre-conditioned gradient descent method for uplink multiuser massive MIMO systems21
A relationship-aware mutual learning method for lightweight skin lesion classification21
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities20
Hadoop-based secure storage solution for big data in cloud computing environment20
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects20
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation20
Network traffic identification in packet sampling environment19
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles19
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array19
Capability-based IoT access control using blockchain19
GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G19
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles18
Network traffic classification: Techniques, datasets, and challenges18
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems18
RIS-assisted MIMO secure communications with Bob's statistical CSI and without Eve's CSI18
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic18
Design and analysis of intrusion detection systems for wireless mesh networks18
Privacy preservation in permissionless blockchain: A survey18
Security analysis and secured access design for networks of image remote sensing17
Protecting the trust and credibility of data by tracking forgery trace based on GANs17
Joint alignment and steering to manage interference17
An efficient resource optimization scheme for D2D communication17
Deep learning aided underwater acoustic OFDM receivers: Model-driven or data-driven?17
Resource allocation for D2D-assisted haptic communications17
Optimal social welfare: A many-to-many data transaction mechanism based on double auctions17
Digital twin empowered lightweight and efficient blockchain for dynamic internet of vehicles16
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach16
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation16
A malware propagation prediction model based on representation learning and graph convolutional networks16
Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment16
Adjustable random linear network coding (ARLNC): a solution for data transmission in dynamic IoT computational environments16
Handover management in beyond 5g hetnet topologies with unbalanced user distribution16
Towards improving detection performance for malware with a correntropy-based deep learning method16
Auction-based profit maximization offloading in mobile edge computing15
User location privacy protection mechanism for location-based services15
Task offloading mechanism based on federated reinforcement learning in mobile edge computing15
Secure data rate maximization for full-duplex UAV-enabled base station15
Potential friendship discovery in social networks based on hybrid ensemble multiple collaborative filtering models in a 5G network environment15
Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model15
Machine learning-enabled MIMO-FBMC communication channel parameter estimation in IIoT: A distributed CS approach14
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks14
Monitoring the security of audio biomedical signals communications in wearable IoT healthcare14
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT14
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing14
Image analysis and machine learning-based malaria assessment system14
Lightweight Consensus Mechanisms in the Internet of Blockchained Things: Thorough Analysis and Research Directions14
A compatible carbon efficiency information service framework based on the industrial internet identification14
From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs13
Privacy-preserving authentication scheme based on zero trust architecture13
Runtime reconfiguration of data services for dealing with out-of-range stream fluctuation in cloud-edge environments13
Research on encoding and decoding of non-binary polar codes over GF(2 )13
An improved pulse coupled neural networks model for semantic IoT13
Factors affecting forensic electric network frequency matching – A comprehensive study13
A highly reliable encoding and decoding communication framework based on semantic information13
UTM: A trajectory privacy evaluating model for online health monitoring13
Dynamics modeling and optimal control for multi-information diffusion in Social Internet of Things13
Heterogeneous radio frequency/underwater optical wireless communication relaying systems with MIMO scheme13
OAM mode purity improvement based on antenna array13
Automatic collaborative water surface coverage and cleaning strategy of UAV and USVs12
LOS and NLOS identification in real indoor environment using deep learning approach12
Intelligent sitting postural anomaly detection system for wheelchair users with unsupervised techniques12
Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring12
Performance analysis of UAV-based mixed underwater PLC-RF systems12
iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system12
A blockchain-empowered AAA scheme in the large-scale HetNet11
A novel fractional uplink power control framework for self-organizing networks11
Request pattern change-based cache pollution attack detection and defense in edge computing11
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT11
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems11
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack11
Performance of mobile networks under composite F fading 11
A WKNN-based approach for NB-IoT sensors localization11
Explainable AI for epileptic seizure detection in Internet of Medical Things11
Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method11
Entropy-based redundancy analysis and information screening11
Intelligent non-invasive elderly fall monitoring by designing software defined radio frequency sensing system11
DroidEnemy: Battling adversarial example attacks for Android malware detection11
Attention-relation network for mobile phone screen defect classification via a few samples10
High-speed encrypted traffic classification by using payload features10
Computing Power Networks for Unmanned Aerial Vehicles: A Hierarchical Resources Trading Market10
Smart contract token-based privacy-preserving access control system for industrial Internet of Things10
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications10
IoT data analytic algorithms on edge-cloud infrastructure: A review10
An Ethereum-based solution for energy trading in smart grids10
A survey on blockchain-based integrity auditing for cloud data10
Multi-agent reinforcement learning for edge information sharing in vehicular networks10
Technologies of blockchain interoperability: A survey10
VANETs group message secure forwarding with trust evaluation10
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities10
A teacher-student based attention network for fine-grained image recognition9
Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG9
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data access9
Joint offloading decision and resource allocation in vehicular edge computing networks9
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network9
Sports match prediction model for training and exercise using attention-based LSTM network9
ACSarF: a DRL-based adaptive consortium blockchain sharding framework for supply chain finance9
FedCDR: Privacy-preserving federated cross-domain recommendation9
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications9
Performance optimization and parameters estimation for MIMO-OFDM dual-functional communication-radar systems9
Internet of things: Conceptual network structure, main challenges and future directions8
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing8
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection8
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks8
An enhanced scheme for mutual authentication for healthcare services8
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine8
A deep learning driven hybrid beamforming method for millimeter wave MIMO system8
Spectrum and energy efficient multi-antenna spectrum sensing for green UAV communication8
An ensemble deep learning model for cyber threat hunting in industrial internet of things7
Application of maximum rank distance codes in designing of STBC-OFDM system for next-generation wireless communications7
Guest editorial7
The deep spatiotemporal network with dual-flow fusion for video-oriented facial expression recognition7
Detecting conflict of heterogeneous access control policies7
Editorial Board7
Intrusion detection and prevention system for an IoT environment7
Distributed unsupervised meta-learning algorithm over multi-agent systems7
MEC-based architecture for interoperable and trustworthy internet of moving things7
A potential game-based outsourcing computation framework for multiple calculators7
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications7
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT7
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks7
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things7
Optimal deployment of swarm positions in cooperative interception of multiple UAV swarms7
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems7
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A7
Editorial Board7
A survey on semantic communications: Technologies, solutions, applications and challenges6
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT6
Intelligent joint communication and computation scheme of UAV-assisted Offloading in high speed rail scenarios6
Toward zero trust in 5G industrial internet collaboration systems6
Scheduling optimization for upstream dataflows in edge computing6
Improving throughput in SWIPT-based wireless multirelay networks with relay selection and rateless codes6
Channel assignment and power allocation for throughput improvement with PPO in B5G heterogeneous edge networks6
Editorial Board6
Physical-layer security in MU-MISO downlink networks against potential eavesdroppers6
Attack-detection and multi-clock source cooperation-based accurate time synchronization for PLC-AIoT in smart parks6
DAG-based swarm learning: A secure asynchronous learning framework for Internet of Vehicles6
Starlet: Network defense resource allocation with multi-armed bandits for cloud-edge crowd sensing in IoT6
Energy-optimal DNN model placement in UAV-enabled edge computing networks6
Echo state network based symbol detection in chaotic baseband wireless communication6
FedStrag: Straggler-aware federated learning for low resource devices6
A renewal theory based performance and configuration framework of the IEEE 802.11ah RAW mechanism6
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks6
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks6
Collision-free parking recommendation based on multi-agent reinforcement learning in vehicular crowdsensing6
Joint computation offloading and resource allocation in vehicular edge computing networks6
Review on application progress of federated learning model and security hazard protection6
Application of meta-learning in cyberspace security: a survey6
Editorial Board6
Doped low-density parity-check codes6
Joint multiple resource allocation for offloading cost minimization in IRS-assisted MEC networks with NOMA5
Towards privacy-preserving and efficient word vector learning for lightweight IoT devices5
Editorial Board5
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates5
0.14021992683411