Digital Communications and Networks

Papers
(The TQCC of Digital Communications and Networks is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
A systematic literature review of blockchain cyber security377
Security and privacy in 6G networks: New areas and new challenges204
A survey of edge computing-based designs for IoT security166
A new type of blockchain for secure message exchange in VANET160
Performance analysis and comparison of PoW, PoS and DAG based blockchains151
Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching135
Tracing manufacturing processes using blockchain-based token compositions127
Blockchain-enabled resource management and sharing for 6G communications117
Privacy preservation in permissionless blockchain: A survey103
Attacks and defences on intelligent connected vehicles: a survey97
Recent advances in mobile edge computing and content caching73
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions62
Intent-based networks for 6G: Insights and challenges60
A survey on deep learning for textual emotion analysis in social networks59
A blockchain-empowered AAA scheme in the large-scale HetNet57
Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies57
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks56
A survey on user-centric cell-free massive MIMO systems53
Towards asynchronous federated learning for heterogeneous edge-powered internet of things50
An intelligent task offloading algorithm (iTOA) for UAV edge computing network47
Security and privacy issues of physical objects in the IoT: Challenges and opportunities46
A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey45
Deep learning for the internet of things: Potential benefits and use-cases41
Machine learning-based real-time visible fatigue crack growth detection41
A new adaptive co-site broadband interference cancellation method with auxiliary channel40
Entropy-based redundancy analysis and information screening39
Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology38
A survey on deploying mobile deep learning applications: A systemic and technical perspective37
A survey on communication protocols and performance evaluations for Internet of Things37
Machine learning-based zero-touch network and service management: a survey36
Dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in smart cities36
Analysis of identifiers in IoT platforms36
A blockchain and IoT-based lightweight framework for enabling information transparency in supply chain finance36
Help from space: grant-free massive access for satellite-based IoT in the 6G era35
Feature extraction for machine learning-based intrusion detection in IoT networks34
An ensemble deep learning model for cyber threat hunting in industrial internet of things34
Reconfigurable intelligent surface: design the channel – a new opportunity for future wireless networks33
Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN33
Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks32
Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT31
Capability-based IoT access control using blockchain30
A review of optimization methods for computation offloading in edge computing networks30
An enhanced scheme for mutual authentication for healthcare services29
Smart industrial IoT empowered crowd sensing for safety monitoring in coal mine29
Joint resource allocation for hybrid NOMA-assisted MEC in 6G networks29
Robot and its living space: A roadmap for robot development based on the view of living space28
Identifying influential nodes in social networks via community structure and influence distribution difference27
Research advances on blockchain-as-a-service: architectures, applications and challenges27
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution27
Attention-based spatio-temporal graph convolutional network considering external factors for multi-step traffic flow prediction27
A survey on blockchain-based integrity auditing for cloud data26
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles25
Safeguarding cross-silo federated learning with local differential privacy25
Network traffic classification: Techniques, datasets, and challenges25
Green indoor optical wireless communication systems: Pathway towards pervasive deployment25
Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications24
Intrusion detection and prevention system for an IoT environment24
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation24
Dynamic defenses in cyber security: Techniques, methods and challenges24
Enhancing IoT anomaly detection performance for federated learning24
An efficient data aggregation scheme with local differential privacy in smart grid23
Internet of things: Conceptual network structure, main challenges and future directions23
The detection method of low-rate DoS attack based on multi-feature fusion23
A new technology perspective of the Metaverse: Its essence, framework and challenges23
Building an interoperable space for smart agriculture23
Machine learning in vehicular networking: An overview23
Smart contract token-based privacy-preserving access control system for industrial Internet of Things23
A notary group-based cross-chain mechanism22
Can blockchain link the future?22
Blockchain-based data transmission control for Tactical Data Link22
Video transcoding for adaptive bitrate streaming over edge-cloud continuum21
Fooling intrusion detection systems using adversarially autoencoder21
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions21
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation20
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks19
Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities19
A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks19
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes18
Delay-CJ: A novel cryptojacking covert attack method based on delayed strategy and its detection18
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine17
Software defined satellite networks: A survey17
Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects17
AFSTGCN: Prediction for multivariate time series using an adaptive fused spatial-temporal graph convolutional network17
IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic17
A blockchain-empowered authentication scheme for worm detection in wireless sensor network16
A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles16
A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing16
Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse16
User location privacy protection mechanism for location-based services16
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems15
An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things15
A secure spectrum auction scheme without the trusted party based on the smart contract15
Sports match prediction model for training and exercise using attention-based LSTM network15
N-gram MalGAN: Evading machine learning detection via feature n-gram14
Joint position optimization, user association, and resource allocation for load balancing in UAV-assisted wireless networks14
Visually meaningful image encryption algorithm based on digital signature14
Edge robotics: are we ready? an experimental evaluation of current vision and future directions14
Multi-agent reinforcement learning for edge information sharing in vehicular networks14
Capacity maximizing in massive MIMO with linear precoding for SSF and LSF channel with perfect CSI14
Petahertz communication: Harmonizing optical spectra for wireless communications14
FedCDR: Privacy-preserving federated cross-domain recommendation14
Enhancing the robustness of object detection via 6G vehicular edge computing13
Smart and collaborative industrial IoT: A federated learning and data space approach13
On recommendation-aware content caching for 6G: An artificial intelligence and optimization empowered paradigm13
A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing13
Adversarial attacks and defenses for digital communication signals identification13
Toward intelligent wireless communications: Deep learning - based physical layer technologies13
Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network13
Accurate threat hunting in industrial internet of things edge devices13
Towards improving detection performance for malware with a correntropy-based deep learning method13
Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU13
3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization13
Distributed privacy protection strategy for MEC enhanced wireless body area networks13
A review on edge analytics: Issues, challenges, opportunities, promises, future directions, and applications13
A blockchain-based audit approach for encrypted data in federated learning12
A LoRa-based protocol for connecting IoT edge computing nodes to provide small-data-based services12
Application of meta-learning in cyberspace security: a survey12
A novel nest-based scheduling method for mobile wireless body area networks12
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting12
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network12
Deep reinforcement learning-based resource allocation for D2D communications in heterogeneous cellular networks12
Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing12
Information mining and similarity computation for semi- / un-structured sentences from the social data12
Optimal dynamic spectrum allocation-assisted latency minimization for multiuser mobile edge computing12
Multi-objective optimization for task offloading based on network calculus in fog environments12
Generating routes for autonomous driving in vehicle-to-infrastructure communications12
The effect of propagation delay on the dynamic evolution of the Bitcoin blockchain11
Design and optimization of an integrated MEMS gas chamber with high transmissivity11
DroidEnemy: Battling adversarial example attacks for Android malware detection11
Adaptive multi-channel Bayesian graph attention network for IoT transaction security11
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder11
COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities11
EA-DFPSO: An intelligent energy-efficient scheduling algorithm for mobile edge networks11
Directional neighbor discovery in mmWave wireless networks11
Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective10
Splitting and placement of data-intensive applications with machine learning for power system in cloud computing10
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications10
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge Computing networks10
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks10
Performance evaluation of a two-way relay network with energy harvesting and hardware noises10
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G10
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element10
Public integrity verification for data sharing in cloud with asynchronous revocation10
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home10
A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network10
ICS-SVM: A user retweet prediction method for hot topics based on improved SVM10
A fixed clustering protocol based on random relay strategy for EHWSN10
Self-healing and SDN: bridging the gap10
A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group10
0.041996002197266