Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 15. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems189
Diversified and compatible web APIs recommendation based on game theory in IoT175
Guest editorial: Blockchain-enabled technologies for cyber-physical systems and big data applications151
Triangular code: Near-optimal linear time fountain code151
A label noise filtering and label missing supplement framework based on game theory140
Fuzz-classification (p, l)-Angel: An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches132
A fast and accurate multi-keyword sorted searchable scheme based on blockchain129
Semi-supervised learning based hybrid beamforming under time-varying propagation environments124
Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation120
A novel EO-based optimum random beamforming method in mmWave-NOMA systems with sparse antenna array117
Networked control with guaranteed performance for IoT rehabilitation robot under nonvanishing uncertainties and input quantization114
A security authentication scheme for mobile industrial IoT supply chains based on blockchain and group key management114
Building robust traffic classifier under low quality data: A federated contrastive learning approach106
A relationship-aware mutual learning method for lightweight skin lesion classification102
A novel routing method for dynamic control in distributed computing power networks102
Radio resource management in energy harvesting cooperative cognitive UAV assisted IoT networks: A multi-objective approach95
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting88
DB-FL: DAG blockchain-enabled generalized federated dropout learning86
A latency sensitive and agile IIoT architecture with optimized edge node selection and task scheduling85
EHKP-Res: an explainable dynamic security solution for medical healthcare81
Privacy-preserved learning from non-i.i.d data in fog-assisted IoT: A federated learning approach79
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic79
Network traffic classification: Techniques, datasets, and challenges78
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT76
An ensemble deep learning model for cyber threat hunting in industrial internet of things75
Sports match prediction model for training and exercise using attention-based LSTM network75
VANETs group message secure forwarding with trust evaluation74
Overcoming constructive/destructive interference in diversity transmission via Alamouti coding74
Shard-DAG: A scalable and secure block-DAG sharding scheme for AI-driven 6G networks67
Resource allocation for D2D-assisted haptic communications67
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing66
Service chain caching and task offloading in two-tier UAV-assisted vehicular edge computing networks: an Attention-DRL method65
Computing Power Networks for Unmanned Aerial Vehicles: A Hierarchical Resources Trading Market65
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks62
A survey on blockchain-based integrity auditing for cloud data62
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities60
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems59
IoT data analytic algorithms on edge-cloud infrastructure: A review59
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins58
An analytical framework for the incorporation of non-orthogonal pilots in massive MIMO systems58
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT58
Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network58
Editorial Board57
MEC-based architecture for interoperable and trustworthy internet of moving things56
Using dummy data for RFID tag and reader authentication56
Editorial Board52
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks52
A fixed clustering protocol based on random relay strategy for EHWSN51
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing51
Intelligent reflecting surface-assisted federated learning in multi-platoon collaborative networks50
Design of modified model of intelligent assembly digital twins based on optical fiber sensor network50
Autonomous network management for 6G communication: A comprehensive survey49
Wideband communications through drone-assisted cognitive radio VANETs using SURF channel selection49
Adaptive joint source-channel coding with regulated autoencoder48
Hybrid body area network with integrated sensing and communication for AIoT smart healthcare48
Deep learning aided CSI feedback optimization with robust error recovery45
ExplainableDetector: Exploring transformer-based language modeling approach for SMS spam detection with explainability analysis43
On the design of an AI-driven secure communication scheme for internet of medical things environment42
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction42
A multi-dimensional trust attestation solution in 5G-IoT41
A fine-grained intrusion protection system for inter-edge trust transfer41
Capacity and delay performance analysis for large-scale UAV-enabled wireless networks40
Dynamic adversarial jamming-based reinforcement learning for designing constellations39
Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios39
CMBA-FL: Communication-mitigated and blockchain-assisted federated learning for traffic flow predictions38
Secure monitoring of Internet of vehicles in 6G networks through intelligent reflecting surfaces leveraging AI36
Training-based symbol detection with temporal convolutional neural network in single-polarized optical communication system36
Standardised interworking and deployment of IoT and edge computing platforms36
Multiplex network infomax: Multiplex network embedding via information fusion36
Field trial measurement and channel modeling for reconfigurable intelligent surface35
Short video preloading via domain knowledge assisted deep reinforcement learning35
The DNN-based DBP scheme for nonlinear compensation and longitudinal monitoring of optical fiber links35
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks34
A review of optimization methods for computation offloading in edge computing networks34
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder33
Sum-rate optimization methods and analysis for reconfigurable intelligent surface aided communication system32
SEAttention-residual based channel estimation for mmWave massive MIMO systems in IoV scenarios32
Smart all-time vision: The battery-free video communication for urban administration and law enforcement32
352-Gbit/s single line rate THz wired transmission based on PS-4096QAM employing hollow-core fiber32
A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization31
Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing31
Experience replay with cohesive-subgraph awareness for continual graph learning in IoT31
Performance analysis of legitimate UAV surveillance system with suspicious relay and anti-surveillance technology31
Enhancing IoT anomaly detection performance for federated learning29
Digital twin- and extended reality-based telepresence for collaborative robot programming in the 6G perspective29
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey29
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework29
YOLO-SDLUWD: YOLOv7-based small target detection network for infrared images in complex backgrounds29
Editorial Board28
Generalized Kennedy receivers enhanced CV-QKD in turbulent channels for endogenous security of space-air-ground integrated network27
Low-complexity multi-target localization via multi-BS sensing27
Spatio-temporal feature extraction with a global-local Transformer model for video scene graph generation27
Device-edge collaborative occluded face recognition method based on cross-domain feature fusion27
Interference detection for UAV swarm satellite communications with spatiotemporal manifold filtering26
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation26
Mosaic-AM: multimodal sensors anomaly detection with inherent compensation for absent modalities26
Optimization-based mode selection scheme for OAM millimeter wave system in the off-axis misalignment case26
Digital twin empowered cooperative trajectory planning of platoon vehicles for collision avoidance with unexpected obstacles25
An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT25
Editorial Board25
DCETEN: A lightweight ECG automatic classification network based on Transformer model25
Certificateless threshold signature from lattice25
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT25
Secure transmission design for RIS-aided symbiotic radio networks: A DRL approach25
Information theory based clustering of cellular network usage data for the identification of representative urban areas25
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing24
Data-driven human and bot recognition from web activity logs based on hybrid learning techniques24
Blockchain-based fog radio access networks: Architecture, key technologies, and challenges24
A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks24
Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis24
An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm24
Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems24
Decentralized snapshot selection via trust game for robust DOA estimation with FMCW radar in static scenarios23
Research on optimal intelligent routing algorithm for IoV with machine learning and smart contract23
Chinese relation extraction for constructing satellite frequency and orbit knowledge graph: A survey23
UAV-assisted data collection for wireless sensor networks with dynamic working modes23
Performance comparison of single-carrier and multi-carrier waveforms over terahertz wireless channels23
Secformer: Privacy-preserving atomic-level componentized transformer-like model with MPC23
SecureVFL: Privacy-preserving multi-party vertical federated learning based on blockchain and RSS23
Covert wireless communication over uplink satellite-terrestrial network23
Radio map estimation using a CycleGAN-based learning framework for 6G wireless communication22
Smart and collaborative industrial IoT: A federated learning and data space approach22
Software defined satellite networks: A survey22
Energy minimized joint resource allocation and task offloading with user association for URLLC and eMBB 5G multi-RAT systems22
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services22
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning22
Hierarchical flow learning for low-light image enhancement22
Scheduling optimization for UAV communication coverage using virtual force-based PSO model22
Refinement modeling and verification of secure operating systems for communication in digital twins22
Editorial Board22
A digital twin-based quadruped robot system with scene perception, fast communication, and holographic interaction22
Secure beamforming designs for maximizing secrecy sum rate in MISO-NOMA networks22
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming21
Interworking between Modbus and internet of things platform for industrial services21
Caching modeling and energy analyzing of cell-free wireless heterogeneous networks with beta Ginibre point process21
Security and privacy in edge computing: a survey of electric vehicles21
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling21
Hierarchical detection and tracking for moving targets in underwater wireless sensor networks20
DWT-3DRec: DeepJSCC-based wireless transmission for efficient 3D scene reconstruction using CityNeRF20
IncEFL: a sharing incentive mechanism for edge-assisted federated learning in industrial IoT20
Clustering-based adaptive low-power subframe configuration with load-aware offsetting in dense heterogeneous networks20
Video frame interpolation based on invertible neural network for Internet of things19
Joint offloading strategy based on quantum particle swarm optimization for MEC-enabled vehicular networks19
Role of deep learning in cognitive healthcare: Wearable signal analysis, algorithms, benefits, and challenges19
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy19
Resource management at the network edge for federated learning19
Multi-feature weighted PBFT with reputation monopoly prevention19
A survey of internet of medical things: technology, application and future directions19
DP-Fed6G: An adaptive differential privacy-empowered federated learning framework for 6G networks18
Semantic-aware visual information transmission with key information extraction over wireless networks18
Building an interoperable space for smart agriculture18
LOS and NLOS identification in real indoor environment using deep learning approach18
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities18
A compatible carbon efficiency information service framework based on the industrial internet identification18
Performance analysis of UAV-based mixed underwater PLC-RF systems18
Privacy-preserving authentication scheme based on zero trust architecture17
Explainable AI for epileptic seizure detection in Internet of Medical Things17
Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection17
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications17
Editorial Board17
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications17
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things17
Information freshness optimization of multiple status update streams in Internet of things: Generation rate control and service rate reservation17
A dynamic algorithm for trust inference based on double DQN in the internet of things17
Factors affecting forensic electric network frequency matching – A comprehensive study17
Adjustable random linear network coding (ARLNC): A solution for data transmission in dynamic IoT computational environments17
NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT17
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks17
Guest editorial17
Application of meta-learning in cyberspace security: a survey16
Blockchain-based lightweight trusted data interaction scheme for cross-domain IIoT16
Suitability of SDN and MEC to facilitate digital twin communication over LTE-A16
Enhanced multi-agent deep reinforcement learning for efficient task offloading and resource allocation in vehicular networks16
Editorial Board16
F-norm based low-power motion recognition on wearable devices in the presence of outlier motions15
Energy-optimal DNN model placement in UAV-enabled edge computing networks15
Attack-detection and multi-clock source cooperation-based accurate time synchronization for PLC-AIoT in smart parks15
Editorial Board15
Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates15
Collaborative learning-based inter-dependent task dispatching and co-location in an integrated edge computing system15
Temporal pattern mining from user-generated content15
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks15
Digital compass for multi-user beam access in mmWave cellular networks15
0.078974008560181