Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 14. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
A novel routing method for dynamic control in distributed computing power networks146
A Security Authentication Scheme for Mobile Industrial IoT Supply Chains Based on Blockchain and Group Key Management141
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems139
Diversified and compatible web APIs recommendation based on game theory in IoT134
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array124
A fast and accurate multi-keyword sorted searchable scheme based on blockchain117
EHKP-Res: An explainable dynamic security solution for medical healthcare117
Semi-supervised learning based hybrid beamforming under time-varying propagation environments117
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications108
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation106
Triangular code: Near-optimal linear time fountain code97
A label noise filtering and label missing supplement framework based on game theory97
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches94
A latency sensitive and agile IIoT architecture with optimized edge node selection and task scheduling88
Networked control with guaranteed performance for IoT rehabilitation robot under nonvanishing uncertainties and input quantization87
A relationship-aware mutual learning method for lightweight skin lesion classification79
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach79
DB-FL: DAG blockchain-enabled generalized federated dropout learning79
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects78
Building robust traffic classifier under low quality data: A federated contrastive learning approach78
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach76
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting75
Network traffic classification: Techniques, datasets, and challenges71
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic70
Computing Power Networks for Unmanned Aerial Vehicles: A Hierarchical Resources Trading Market70
VANETs group message secure forwarding with trust evaluation69
Resource allocation for D2D-assisted haptic communications69
Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method67
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing62
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities62
Shard-DAG: A scalable and secure block-DAG sharding scheme for AI-driven 6G networks60
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems60
Sports match prediction model for training and exercise using attention-based LSTM network60
IoT data analytic algorithms on edge-cloud infrastructure: A review60
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks59
A survey on blockchain-based integrity auditing for cloud data59
Wideband communications through drone-assisted cognitive radio VANETs using SURF channel selection57
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT57
An ensemble deep learning model for cyber threat hunting in industrial internet of things57
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems56
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins55
Editorial Board55
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing54
MEC-based architecture for interoperable and trustworthy internet of moving things53
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT52
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks52
Editorial Board51
Autonomous network management for 6G communication: A comprehensive survey49
Using dummy data for RFID tag and reader authentication49
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks48
Deep learning aided CSI feedback optimization with robust error recovery48
ExplainableDetector: Exploring transformer-based language modeling approach for SMS spam detection with explainability analysis48
Design of modified model of intelligent assembly digital twins based on optical fiber sensor network48
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network47
On the design of an AI-driven secure communication scheme for internet of medical things environment46
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction45
A fixed clustering protocol based on random relay strategy for EHWSN45
A fine-grained intrusion protection system for inter-edge trust transfer44
A multi-dimensional trust attestation solution in 5G-IoT44
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber43
Experience Replay with Cohesive-Subgraph Awareness for Continual Graph Learning in IoT43
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey39
Capacity and delay performance analysis for large-scale UAV-enabled wireless networks38
Multiplex network infomax: Multiplex network embedding via information fusion38
A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization37
Short video preloading via domain knowledge assisted deep reinforcement learning36
Smart all-time vision: The battery-free video communication for urban administration and law enforcement36
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system35
SEAttention-residual based channel estimation for mmWave massive MIMO systems in IoV scenarios34
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks34
Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios34
The DNN-based DBP scheme for nonlinear compensation and longitudinal monitoring of optical fiber links34
Standardised interworking and deployment of IoT and edge computing platforms33
Sum-rate optimization methods and analysis for reconfigurable intelligent surface aided communication system33
Enhancing IoT anomaly detection performance for federated learning31
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology31
Robust resource allocation for NOMA-assisted heterogeneous networks31
Dynamic adversarial jamming-based reinforcement learning for designing constellations31
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective30
A review of optimization methods for computation offloading in edge computing networks30
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing30
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder29
CMBA-FL: Communication-mitigated and blockchain-assisted federated learning for traffic flow predictions29
Field trial measurement and channel modeling for reconfigurable intelligent surface29
Secure monitoring of Internet of vehicles in 6G networks through intelligent reflecting surfaces leveraging AI29
Spatio-temporal features with global–local transformer model for video scene graph generation28
Low-complexity multi-target localization via multi-BS sensing28
Editorial Board28
YOLO-SDLUWD: YOLOv7-based small target detection network for infrared images in complex backgrounds28
Device-edge collaborative occluded face recognition method based on cross-domain feature fusion27
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT27
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT26
Optimization-based mode selection scheme for OAM millimeter wave system in the off-axis misalignment case25
DCETEN: A lightweight ECG automatic classification network based on Transformer model25
Generalized Kennedy receivers enhanced CV-QKD in turbulent channels for endogenous security of space-air-ground integrated network25
Digital twin empowered cooperative trajectory planning of platoon vehicles for collision avoidance with unexpected obstacles25
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation25
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework24
Certificateless threshold signature from lattice24
Secure transmission design for RIS-aided symbiotic radio networks: A DRL approach24
Information theory based clustering of cellular network usage data for the identification of representative urban areas24
Refinement modeling and verification of secure operating systems for communication in digital twins23
Secformer: privacy-preserving atomic-level componentized transformer-like model with MPC23
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques23
Editorial Board23
SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS23
Chinese relation extraction for constructing satellite frequency and orbit knowledge graph: A survey22
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks22
Performance comparison of single-carrier and multi-carrier waveforms over terahertz wireless channels22
Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis22
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services22
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing22
Software defined satellite networks: A survey21
An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm21
UAV-assisted data collection for wireless sensor networks with dynamic working modes21
A digital twin-based quadruped robot system with scene perception, fast communication, and holographic interaction21
Covert wireless communication over uplink satellite-terrestrial network21
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges21
Radio map estimation using a CycleGAN-based learning framework for 6G wireless communication20
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems20
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning20
Smart and collaborative industrial IoT: A federated learning and data space approach20
Hierarchical flow learning for low-light image enhancement19
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks19
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks19
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract19
Scheduling optimization for UAV communication coverage using virtual force-based PSO model19
Classification with ensembles and case study on functional magnetic resonance imaging19
Video Frame Interpolation Based on Invertible Neural Network for Internet of Things19
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process19
Energy minimized joint resource allocation and task offloading with user association for URLLC and eMBB 5G multi-RAT systems19
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT18
Security and privacy in edge computing: a survey of electric vehicles18
DWT-3DRec: DeepJSCC-based wireless transmission for efficient 3D scene reconstruction using CityNeRF18
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks18
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming18
DP-Fed6G: An adaptive differential privacy-empowered federated learning framework for 6G networks17
Role of deep learning in cognitive healthcare: Wearable signal analysis, algorithms, benefits, and challenges17
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks17
Resource management at the network edge for federated learning17
A survey of internet of medical things: technology, application and future directions17
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy17
Building an interoperable space for smart agriculture17
Interworking between Modbus and internet of things platform for industrial services17
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system17
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling17
A compatible carbon efficiency information service framework based on the industrial internet identification16
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things16
Privacy-preserving authentication scheme based on zero trust architecture16
LOS and NLOS identification in real indoor environment using deep learning approach16
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities16
Explainable AI for epileptic seizure detection in Internet of Medical Things16
Factors affecting forensic electric network frequency matching – A comprehensive study16
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection16
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks16
Performance analysis of UAV-based mixed underwater PLC-RF systems16
Adjustable random linear network coding (ARLNC): A solution for data transmission in dynamic IoT computational environments16
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT16
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications16
Information freshness optimization of multiple status update streams in Internet of things: Generation rate control and service rate reservation15
Guest editorial15
Energy-optimal DNN model placement in UAV-enabled edge computing networks15
Editorial Board15
Blockchain-based lightweight trusted data interaction scheme for cross-domain IIoT15
A dynamic algorithm for trust inference based on double DQN in the internet of things15
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks15
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates15
Attack-detection and multi-clock source cooperation-based accurate time synchronization for PLC-AIoT in smart parks15
Enhanced multi-agent deep reinforcement learning for efficient task offloading and resource allocation in vehicular networks15
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications15
Application of meta-learning in cyberspace security: a survey15
Editorial Board15
A blockchain-empowered authentication scheme for worm detection in wireless sensor network14
Collaborative learning-based inter-dependent task dispatching and co-location in an integrated edge computing system14
Secure intelligent reflecting surface assisted mobile edge computing system with wireless power transfer14
Secure ticket-based authentication method for IoT applications14
METAseen: analyzing network traffic and privacy policies in Web 3.0 based Metaverse14
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A14
Artificial intelligence in physiological characteristics recognition for internet of things authentication14
Low-complexity APSK demodulation algorithm based on K-means clustering in LEO satellite communication systems14
FedACT: An adaptive chained training approach for federated learning in computing power networks14
0.21880888938904