| 1 | Doppler Interference Analysis for OTFS-Based LEO Satellite System | 11.1 | 16 | Citations (PDF) |
| 2 | Wireless Multi-Robot Collaboration: Communications, Perception, Control, and Planning | 3.6 | 7 | Citations (PDF) |
| 3 | Verkle-Accumulator-Based Stateless Transaction Validation (VA-STV) Scheme for the Blockchain-Based IoT Network | 7.0 | 8 | Citations (PDF) |
| 4 | Optimizing Age of Information in Polar-Coded Status Update System | 7.0 | 5 | Citations (PDF) |
| 5 | Adaptive Training and Aggregation for Federated Learning in Multi-Tier Computing Networks | 6.9 | 7 | Citations (PDF) |
| 6 | Delay-Optimized Multi-User VR Streaming via End-Edge Collaborative Neural Frame Interpolation | 6.3 | 20 | Citations (PDF) |
| 7 | Cooperative Authentication Scheme for Heterogeneous Networks Based on Identity Group Signature and Blockchain | 5.8 | 12 | Citations (PDF) |
| 8 | DetFed: Dynamic Resource Scheduling for Deterministic Federated Learning Over Time-Sensitive Networks | 6.9 | 123 | Citations (PDF) |
| 9 | Symbol-Level Integrated Sensing and Communication Enabled Multiple Base Stations Cooperative Sensing | 5.8 | 60 | Citations (PDF) |
| 10 | Learning-Based Edge-Device Collaborative DNN Inference in IoVT Networks | 7.0 | 18 | Citations (PDF) |
| 11 | GAN-Based Siamese Neuron Network for Modulation Classification Against White-Box Adversarial Attacks | 5.3 | 7 | Citations (PDF) |
| 12 | Task-Oriented 6G Native-AI Network Architecture | 3.6 | 20 | Citations (PDF) |
| 13 | Integrated Sensing and Communication Enabled Multiple Base Stations Cooperative Sensing Towards 6G | 3.6 | 73 | Citations (PDF) |
| 14 | Flexible and Fine-Grained Access Control for EHR in Blockchain-Assisted E-Healthcare Systems | 7.0 | 16 | Citations (PDF) |
| 15 | Computation Bits Maximization for IRS-Aided Mobile-Edge Computing Networks With Phase Errors and Transceiver Hardware Impairments | 5.8 | 3 | Citations (PDF) |
| 16 | A Copula-Based Approach to Performance Analysis of Fluid Antenna System With Multiple Fixed Transmit Antennas | 4.2 | 9 | Citations (PDF) |
| 17 | R3C: Reliability and Control Cost Co-Aware in RIS-Assisted Wireless Control Systems for IIoT | 7.0 | 15 | Citations (PDF) |
| 18 | Joint Power Control and Data Size Selection for Over-the-Air Computation-Aided Federated Learning | 7.0 | 3 | Citations (PDF) |
| 19 | Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks | 6.2 | 11 | Citations (PDF) |
| 20 | Joint Beamforming and Reflecting Design for IRS-Aided Wireless Powered Over-the-Air Computation and Communication Networks | 6.2 | 7 | Citations (PDF) |
| 21 | Joint Task Offloading and Resource Allocation in Multi-User Mobile Edge Computing With Continuous Spectrum Sharing | 5.8 | 6 | Citations (PDF) |
| 22 | Dynamic Neural Network-Based Resource Management for Mobile Edge Computing in 6G Networks | 5.3 | 22 | Citations (PDF) |
| 23 | Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices | 7.0 | 11 | Citations (PDF) |
| 24 | Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading | 5.0 | 25 | Citations (PDF) |
| 25 | Similarity-Based Label Inference Attack Against Training and Inference of Split Learning | 6.4 | 16 | Citations (PDF) |
| 26 | Polar Coding for Wiretap Channels With Random States Non-Causally Available at the Encoder | 6.4 | 1 | Citations (PDF) |
| 27 | Space-Air-Ground Integrated Networks: Spherical Stochastic Geometry-Based Uplink Connectivity Analysis | 11.1 | 24 | Citations (PDF) |
| 28 | Multiantenna Spectrum Sensing With Alpha-Stable Noise for Cognitive Radio-Enabled IoT | 7.0 | 7 | Citations (PDF) |
| 29 | Secure and Efficient Federated Learning With Provable Performance Guarantees via Stochastic Quantization | 6.4 | 16 | Citations (PDF) |
| 30 | Knowledge Discrepancy Oriented Privacy Preserving for Semantic Communication | 5.8 | 10 | Citations (PDF) |
| 31 | STAR-RIS Assisted Offloading Based on Hybrid NOMA: A Time Minimization Perspective | 5.8 | 8 | Citations (PDF) |
| 32 | Joint Sensing and Communication for mmWave VR in Metaverse: A Meta-Learning Approach | 7.0 | 12 | Citations (PDF) |
| 33 | Two-Hop Packet Scheduling, Resource Allocation, and UAV Trajectory Design for Internet of Remote Things in Air–Ground Integrated Network | 7.0 | 13 | Citations (PDF) |
| 34 | Lightweight and Robust Wireless Semantic Communications | 3.5 | 7 | Citations (PDF) |
| 35 | Dependence-Aware Multitask Scheduling for Edge Video Analytics With Accuracy Guarantee | 7.0 | 14 | Citations (PDF) |
| 36 | 6G Non-Terrestrial Networks for Intelligent IoT Services | 3.6 | 1 | Citations (PDF) |
| 37 | Game-Theoretic Security Analysis in Heterogeneous IoT Networks: A Competition Perspective | 7.0 | 3 | Citations (PDF) |
| 38 | Toward Effective Retrieval Augmented Generative Services in 6G Networks | 3.6 | 7 | Citations (PDF) |
| 39 | Deep Reinforcement Learning-Based Computation Offloading for Mobile Edge Computing in 6G | 7.5 | 8 | Citations (PDF) |
| 40 | Joint Computation Offloading and Multidimensional Resource Allocation in Air–Ground Integrated Vehicular Edge Computing Network | 7.0 | 29 | Citations (PDF) |
| 41 | (θ,ϵ): Social Relationship Privacy Protection for Order Allocation in Vehicular Social Network | 7.0 | 0 | Citations (PDF) |
| 42 | Secure Transmission Design for Rate-Splitting Empowered STAR-RIS-Aided Networks | 4.2 | 7 | Citations (PDF) |
| 43 | Joint Optimization of Caching, Computing, and Trajectory Planning in Aerial Mobile Edge Computing Networks: An MADDPG Approach | 7.0 | 11 | Citations (PDF) |
| 44 | S2E-DECI: Secrecy and Energy-Efficient Dual-Aware Device-Edge Co-Inference for AIoT | 7.0 | 5 | Citations (PDF) |
| 45 | Lightweight Federated Learning for Large-Scale IoT Devices With Privacy Guarantee | 7.0 | 38 | Citations (PDF) |
| 46 | Break the Data Barriers While Keeping Privacy: A Graph Differential Privacy Method | 7.0 | 13 | Citations (PDF) |
| 47 | Low-Latency Edge Video Analytics for On-Road Perception of Autonomous Ground Vehicles | 9.5 | 31 | Citations (PDF) |
| 48 | Cost-Effective Task Offloading in NOMA-Enabled Vehicular Mobile Edge Computing | 3.9 | 36 | Citations (PDF) |
| 49 | Cooperative Game-Based Charging-Discharging Efficiency Optimization of Electric Vehicles in 6G-Enabled V2G | 5.4 | 25 | Citations (PDF) |
| 50 | 6G Network AI Architecture for Everyone-Centric Customized Services | 3.6 | 86 | Citations (PDF) |
| 51 | Towards Energy-Efficient Data Collection by Unmanned Aerial Vehicle Base Station With NOMA for Emergency Communications in IoT | 5.8 | 40 | Citations (PDF) |
| 52 | Minimizing Age-of-Information in HARQ-CC Aided NOMA Systems | 8.4 | 29 | Citations (PDF) |
| 53 | Feature-Based Spectrum Sensing of NOMA System for Cognitive IoT Networks | 7.0 | 37 | Citations (PDF) |
| 54 | Intelligent Reflecting Surface-Assisted Low-Latency Federated Learning Over Wireless Networks | 7.0 | 17 | Citations (PDF) |
| 55 | A Survey on Metaverse: Fundamentals, Security, and Privacy | 35.0 | 967 | Citations (PDF) |
| 56 | DMGAN: Dynamic Multi-Hop Graph Attention Network for Traffic Forecasting | 6.9 | 27 | Citations (PDF) |
| 57 | Resource Scheduling for Intelligent Reflecting Surface-Assisted Full-Duplex Wireless-Powered Communication Networks With Phase Errors | 7.0 | 14 | Citations (PDF) |
| 58 | Defed: An Edge-Feature-Enhanced Image Denoised Network Against Adversarial Attacks for Secure Internet of Things | 7.0 | 10 | Citations (PDF) |
| 59 | Secure Computation Offloading for Device-Collaborative MEC Networks: A DRL-Based Approach | 5.8 | 19 | Citations (PDF) |
| 60 | Joint Trajectory and Resource Optimization for Covert Communication in UAV-Enabled Relaying Systems | 5.8 | 32 | Citations (PDF) |
| 61 | Integrated Sensing and Communication Signals Toward 5G-A and 6G: A Survey | 7.0 | 470 | Citations (PDF) |
| 62 | Multi-Agent Deep Reinforcement Learning-Based Interdependent Computing for Mobile Edge Computing-Assisted Robot Teams | 5.8 | 29 | Citations (PDF) |
| 63 | Reliability-Guaranteed Uplink Resource Management in Proactive Mobile Network for Minimal Latency Communications | 8.4 | 13 | Citations (PDF) |
| 64 | FastNet: A Lightweight Convolutional Neural Network for Tumors Fast Identification in Mobile-Computer-Assisted Devices | 7.0 | 18 | Citations (PDF) |
| 65 | Deep Learning Aided Multi-Level Transmit Power Recognition in Cognitive Radio Networks | 5.3 | 1 | Citations (PDF) |
| 66 | Multiagent Meta-Reinforcement Learning for Optimized Task Scheduling in Heterogeneous Edge Computing Systems | 7.0 | 35 | Citations (PDF) |
| 67 | CPAHP: Conditional Privacy-Preserving Authentication Scheme With Hierarchical Pseudonym for 5G-Enabled IoV | 5.8 | 25 | Citations (PDF) |
| 68 | Outage Probability and Average BER of UAV-Assisted Dual-Hop FSO Communication With Amplify-and-Forward Relaying | 5.8 | 121 | Citations (PDF) |
| 69 | UAV-Assisted Wireless Backhaul Networks: Connectivity Analysis of Uplink Transmissions | 5.8 | 18 | Citations (PDF) |
| 70 | Robust Task Offloading and Resource Allocation in Mobile Edge Computing With Uncertain Distribution of Computation Burden | 6.2 | 18 | Citations (PDF) |
| 71 | Spectrum Sharing Toward Delay Deterministic Wireless Network: Delay Performance Analysis | 5.3 | 5 | Citations (PDF) |
| 72 | Modeling, Critical Threshold, and Lowest-Cost Patching Strategy of Malware Propagation in Heterogeneous IoT Networks | 6.4 | 22 | Citations (PDF) |
| 73 | Multi-User Dynamic Computation Offloading and Resource Allocation in 5G MEC Heterogeneous Networks with Static and Dynamic Subchannels | 5.8 | 21 | Citations (PDF) |
| 74 | A Deep Learning-Based Algorithm for Energy and Performance Optimization of Computational Offloading in Mobile Edge Computing | 0.9 | 5 | Citations (PDF) |
| 75 | Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things | 6.4 | 106 | Citations (PDF) |
| 76 | A Covert Jamming Scheme Against an Intelligent Eavesdropper in Cooperative Cognitive Radio Networks | 5.8 | 25 | Citations (PDF) |
| 77 | Physical-Layer Adversarial Robustness for Deep Learning-Based Semantic Communications | 11.1 | 56 | Citations (PDF) |
| 78 | A Joint Minimum Hop and Earliest Arrival Routing Algorithm for LEO Satellite Networks | 5.8 | 34 | Citations (PDF) |
| 79 | Adaptive Digital Twin for UAV-Assisted Integrated Sensing, Communication, and Computation Networks | 5.4 | 63 | Citations (PDF) |
| 80 | Analytical Solution of Optimal Symbol Error Rate for Multilevel Pulse-Amplitude-Modulated Signals With One-Bit Quantization | 3.5 | 4 | Citations (PDF) |
| 81 | (<i>τ</i>, <i>m</i>)‐<scp>slicedBucket</scp> privacy model for sequential anonymization for improving privacy and utility | 2.2 | 9 | Citations (PDF) |
| 82 | Learning-Based Flexible Cross-Layer Optimization for Ultrareliable and Low-Latency Applications in IoT Scenarios | 7.0 | 14 | Citations (PDF) |
| 83 | Secrecy Energy Efficiency Maximization in UAV-Enabled Wireless Sensor Networks Without Eavesdropper’s CSI | 7.0 | 50 | Citations (PDF) |
| 84 | Privacy-Preserved Federated Learning for Autonomous Driving | 7.9 | 192 | Citations (PDF) |
| 85 | The Block Propagation in Blockchain-Based Vehicular Networks | 7.0 | 24 | Citations (PDF) |
| 86 | Differential Game Approach for Attack-Defense Strategy Analysis in Internet of Things Networks | 7.0 | 33 | Citations (PDF) |
| 87 | Energy-Efficient Secure Short-Packet Transmission in NOMA-Assisted mMTC Networks With Relaying | 5.8 | 32 | Citations (PDF) |
| 88 | Online Optimization of Energy-Efficient User Association and Workload Offloading for Mobile Edge Computing | 5.8 | 19 | Citations (PDF) |
| 89 | Artificial Noise Aided Secure NOMA Communications in STAR-RIS Networks | 4.2 | 108 | Citations (PDF) |
| 90 | Reconfigurable Intelligent Surface-Assisted Secure Mobile Edge Computing Networks | 5.8 | 124 | Citations (PDF) |
| 91 | Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT | 7.0 | 44 | Citations (PDF) |
| 92 | Green concerns in federated learning over 6G | 1.9 | 17 | Citations (PDF) |
| 93 | Guest Editorial Special Issue on Space-Air-Ground Integrated Networks for Intelligent Transportation Systems | 7.9 | 2 | Citations (PDF) |
| 94 | UAV-Assisted Data Collection for Internet of Things: A Survey | 7.0 | 314 | Citations (PDF) |
| 95 | A Weighted Graph-Based Handover Strategy for Aeronautical Traffic in LEO SatCom Networks | 1.7 | 15 | Citations (PDF) |
| 96 | Eavesdropping and Anti-Eavesdropping Game in UAV Wiretap System: A Differential Game Approach | 8.4 | 26 | Citations (PDF) |
| 97 | Joint Subcarrier Allocation, Modulation Mode Selection, and Trajectory Design in a UAV-Based OFDMA Network | 3.5 | 16 | Citations (PDF) |
| 98 | Energy-Efficient Covert Communication With the Aid of Aerial Reconfigurable Intelligent Surface | 3.5 | 27 | Citations (PDF) |
| 99 | Random Matrix Theory-Based ROI Identification for Wireless Networks | 0.9 | 0 | Citations (PDF) |
| 100 | A DAG-Based Reputation Mechanism for Preventing Peer Disclosure in SIoV | 7.0 | 8 | Citations (PDF) |
| 101 | Electrocardiogram Based Group Device Pairing for Wearables | 6.9 | 2 | Citations (PDF) |
| 102 | Secure Content Delivery for Connected and Autonomous Trucks: A Coalition Formation Game Approach | 7.9 | 17 | Citations (PDF) |
| 103 | Optimizing Age of Information in Adaptive NOMA/OMA/Cooperative-SWIPT-NOMA System | 8.4 | 30 | Citations (PDF) |
| 104 | Throughput of Hybrid UAV Networks With Scale-Free Topology | 6.2 | 8 | Citations (PDF) |
| 105 | Age of Information With Hybrid-ARQ: A Unified Explicit Result | 6.2 | 30 | Citations (PDF) |
| 106 | Side-lobe Can Know More 2022, 6, 1-34 | | 10 | Citations (PDF) |
| 107 | Distributed Online Learning of Cooperative Caching in Edge Cloud | 6.9 | 27 | Citations (PDF) |
| 108 | Dynamic Multiconnectivity Based Joint Scheduling of eMBB and uRLLC in 5G Networks | 3.9 | 34 | Citations (PDF) |
| 109 | Symbol Error Analysis of Amplify-and-Forward Based Multiuser Hybrid Satellite-Terrestrial Relay Network | 4.2 | 20 | Citations (PDF) |
| 110 | On Credibility-Based Service Function Chain Deployment | 6.9 | 9 | Citations (PDF) |
| 111 | Secrecy Performance Analysis of Air-to-Ground Communication With UAV Jitter and Multiple Random Walking Eavesdroppers | 5.8 | 35 | Citations (PDF) |
| 112 | Intelligent Reflecting Surface and UAV Assisted Secrecy Communication in Millimeter-Wave Networks | 5.8 | 56 | Citations (PDF) |
| 113 | Anomalous role of information diffusion in epidemic spreading | 3.9 | 36 | Citations (PDF) |
| 114 | Optimal Power Allocation for Superposed Secrecy Transmission in Multicarrier Systems | 5.8 | 6 | Citations (PDF) |
| 115 | Multiple Correlated Attributes Based Physical Layer Authentication in Wireless Networks | 5.8 | 41 | Citations (PDF) |
| 116 | Edge-Intelligence-Empowered, Unified Authentication and Trust Evaluation for Heterogeneous Beyond 5G Systems | 5.3 | 26 | Citations (PDF) |
| 117 | Resource Management for Computation Offloading in D2D-Aided Wireless Powered Mobile-Edge Computing Networks | 7.0 | 50 | Citations (PDF) |
| 118 | Intelligent Reflecting Surface Assisted NOMA With Heterogeneous Internal Secrecy Requirements | 4.2 | 34 | Citations (PDF) |
| 119 | Joint allocation of wireless resource and computing capability in MEC-enabled vehicular network | 1.9 | 44 | Citations (PDF) |
| 120 | Two-timescale online learning of joint user association and resource scheduling in dynamic mobile edge computing | 1.9 | 3 | Citations (PDF) |
| 121 | Differential game-based analysis of multi-attacker multi-defender interaction | 4.8 | 11 | Citations (PDF) |
| 122 | Secure polar coding for a joint source-channel model | 4.8 | 1 | Citations (PDF) |
| 123 | MDP-Based Task Offloading for Vehicular Edge Computing Under Certain and Uncertain Transition Probabilities | 5.8 | 112 | Citations (PDF) |
| 124 | Optimal Array Steering for High Spatial Resolution Over Time Varying UAV Communication Channels | 3.5 | 0 | Citations (PDF) |
| 125 | Malicious User Detection in Non-Orthogonal Multiple Access Based on Spectrum Analysis | 3.2 | 7 | Citations (PDF) |
| 126 | Joint Power Allocation and Beamforming for Overlaid Secrecy Transmissions in MIMO-OFDM Channels | 5.8 | 14 | Citations (PDF) |
| 127 | Stochastic geometry based analysis for heterogeneous networks: a perspective on meta distribution | 4.8 | 9 | Citations (PDF) |
| 128 | Hierarchical Resource Allocation in Multi-Service Wireless Networks With Wireless Network Virtualization | 5.8 | 29 | Citations (PDF) |
| 129 | An area based physical layer authentication framework to detect spoofing attacks | 4.8 | 6 | Citations (PDF) |
| 130 | Large-Scale User-Assisted Multi-Task Online Offloading for Latency Reduction in D2D-Enabled Heterogeneous Networks | 6.3 | 35 | Citations (PDF) |
| 131 | The impact of asymptomatic individuals on the strength of public health interventions to prevent the second outbreak of COVID-19 | 5.1 | 20 | Citations (PDF) |
| 132 | Online Anticipatory Proactive Network Association in Mobile Edge Computing for IoT | 8.4 | 41 | Citations (PDF) |
| 133 | Delay-Aware Resource Management for Multi-Service Coexisting LTE-D2D Networks With Wireless Network Virtualization | 5.8 | 7 | Citations (PDF) |
| 134 | θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records | 2.3 | 35 | Citations (PDF) |
| 135 | Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying <i>c</i>-Diversity | 0.9 | 19 | Citations (PDF) |
| 136 | NOMA-Based D2D-Enabled Traffic Offloading for 5G and Beyond Networks Employing Licensed and Unlicensed Access | 8.4 | 32 | Citations (PDF) |
| 137 | Deep Reinforcement Learning for Throughput Improvement of the Uplink Grant-Free NOMA System | 7.0 | 105 | Citations (PDF) |
| 138 | Energy-Efficient and Secure Air-to-Ground Communication With Jittering UAV | 5.8 | 92 | Citations (PDF) |
| 139 | Adaptive Bitrate Video Streaming in Non-Orthogonal Multiple Access Networks | 5.8 | 20 | Citations (PDF) |
| 140 | Polar Coding for the Multiple Access Channel With Confidential Messages | 3.1 | 2 | Citations (PDF) |
| 141 | Multi-Objective Optimization for Full-Duplex SWIPT Systems | 3.1 | 7 | Citations (PDF) |
| 142 | Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper | 3.1 | 3 | Citations (PDF) |
| 143 | Cell-Edge User Offloading via Flying UAV in Non-Uniform Heterogeneous Cellular Networks | 8.4 | 54 | Citations (PDF) |
| 144 | Advanced Energy-Efficient Computation Offloading Using Deep Reinforcement Learning in MTC Edge Computing | 3.1 | 30 | Citations (PDF) |
| 145 | A Real-Time Hidden Anomaly Detection of Correlated Data in Wireless Networks | 3.1 | 10 | Citations (PDF) |
| 146 | Efficient Kalman Filter-Based Precoder Tracking for Time-Varying Massive MIMO-OFDM Systems | 3.5 | 3 | Citations (PDF) |
| 147 | Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts | 4.8 | 1,608 | Citations (PDF) |
| 148 | Corrections to “Energy-Efficient and Secure Air-to-Ground Communication With Jittering UAV” | 5.8 | 1 | Citations (PDF) |
| 149 | Private Key and Group Key Generation Using Correlated Sources and Wiretap Broadcast Channel in Presence of One-Way Public Communication | 3.1 | 5 | Citations (PDF) |
| 150 | Energy-Efficient Short Packet Communications for Uplink NOMA-Based Massive MTC Networks | 5.8 | 76 | Citations (PDF) |
| 151 | Power Allocation in UAV-Enabled Relaying Systems for Secure Communications | 3.1 | 19 | Citations (PDF) |
| 152 | Edge Network Slicing With Statistical QoS Provisioning | 4.2 | 21 | Citations (PDF) |
| 153 | Joint Power and Sub-Channel Allocation for Secure Transmission in NOMA-Based mMTC Networks | 3.9 | 30 | Citations (PDF) |
| 154 | Analysis on Secrecy Capacity of Cooperative Non-Orthogonal Multiple Access With Proactive Jamming | 5.8 | 31 | Citations (PDF) |
| 155 | Inverse Extrapolation for Efficient Precoding in Time-Varying Massive MIMO–OFDM Systems | 3.1 | 7 | Citations (PDF) |
| 156 | Machine Learning Based Flexible Transmission Time Interval Scheduling for eMBB and uRLLC Coexistence Scenario | 3.1 | 62 | Citations (PDF) |
| 157 | Effective Capacity-Based Resource Allocation in Mobile Edge Computing With Two-Stage Tandem Queues | 6.2 | 40 | Citations (PDF) |
| 158 | Data Aggregation in Massive Machine Type Communication: Challenges and Solutions | 3.1 | 51 | Citations (PDF) |
| 159 | Delay-Oriented Cross-Tier Handover Optimization in Ultra-Dense Heterogeneous Networks | 3.1 | 15 | Citations (PDF) |
| 160 | Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT | 7.0 | 95 | Citations (PDF) |
| 161 | Stochastic Online Learning for Mobile Edge Computing: Learning from Changes | 3.1 | 98 | Citations (PDF) |
| 162 | Physical Layer Data Analysis for Abnormal User Detecting: A Random Matrix Theory Perspective | 3.1 | 9 | Citations (PDF) |
| 163 | Cooperative Task Offloading in Three-Tier Mobile Computing Networks: An ADMM Framework | 5.8 | 195 | Citations (PDF) |
| 164 | Secrecy Performance Analysis for Hybrid Wiretapping Systems Using Random Matrix Theory | 8.4 | 11 | Citations (PDF) |
| 165 | Performance analysis of scalable video transmission in machine-type-communication caching network | 2.1 | 1 | Citations (PDF) |
| 166 | Big Data Analytics and Network Calculus Enabling Intelligent Management of Autonomous Vehicles in a Smart City | 7.0 | 79 | Citations (PDF) |
| 167 | Spatio-Temporal Compressive Sensing-Based Data Gathering in Wireless Sensor Networks | 4.2 | 24 | Citations (PDF) |
| 168 | Cooperative Data Aggregation and Dynamic Resource Allocation for Massive Machine Type Communication | 3.1 | 32 | Citations (PDF) |
| 169 | Multi-Slot Coverage Probability and SINR-Based Handover Rate Analysis for Mobile User in Hetnet | 3.1 | 12 | Citations (PDF) |
| 170 | Dense Small Cell Networks: From Noise-Limited to Dense Interference-Limited | 5.8 | 62 | Citations (PDF) |
| 171 | Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks | 3.1 | 47 | Citations (PDF) |
| 172 | On Base Station Coordination in Cache- and Energy Harvesting-Enabled HetNets: A Stochastic Geometry Study | 6.2 | 26 | Citations (PDF) |
| 173 | Polar Coding for the Wiretap Channel With Shared Key | 6.4 | 19 | Citations (PDF) |
| 174 | Quadrature Space-Frequency Index Modulation for Energy-Efficient 5G Wireless Communication Systems | 6.2 | 20 | Citations (PDF) |
| 175 | A New Constellation Diagram-Based Signal Detection for GSM-MIMO Systems | 3.5 | 3 | Citations (PDF) |
| 176 | Content-Aware Cooperative Transmission in HetNets With Consideration of Base Station Height | 5.8 | 16 | Citations (PDF) |
| 177 | Adaptive Cell Zooming and Sleeping for Green Heterogeneous Ultradense Networks | 5.8 | 52 | Citations (PDF) |
| 178 | Joint time and power allocation for uplink cooperative non-orthogonal multiple access based massive machine-type communication Network | 2.1 | 5 | Citations (PDF) |
| 179 | Caching and Placement for In‐Network Caching in Device‐to‐Device Communications | 0.9 | 6 | Citations (PDF) |
| 180 | Cooperative Crossing Cache Placement in Cache-Enabled Device to Device-Aided Cellular Networks | 2.2 | 7 | Citations (PDF) |
| 181 | Average Service Time Analysis of a Clustered VNF Chaining Scheme in NFV-Based V2X Networks | 3.1 | 6 | Citations (PDF) |
| 182 | Performance Analysis of User Pairing in Cooperative NOMA Networks | 3.1 | 25 | Citations (PDF) |
| 183 | Analytical Modeling for Caching Enabled UE-to-Network Relay in Cellular Networks | 3.1 | 10 | Citations (PDF) |
| 184 | Cooperative UAV Cluster-Assisted Terrestrial Cellular Networks for Ubiquitous Coverage | 11.1 | 171 | Citations (PDF) |
| 185 | Preserving Reliability of Heterogeneous Ultra-Dense Distributed Networks in Unlicensed Spectrum 2018, 56, 72-78 | | 45 | Citations (PDF) |
| 186 | Cooperative Caching Placement in Cache-Enabled D2D Underlaid Cellular Network | 3.5 | 70 | Citations (PDF) |
| 187 | Use of Two-Mode Transceiver Circuitry and Its Cross-Layer Energy Efficiency Analysis | 3.5 | 14 | Citations (PDF) |
| 188 | Energy‐efficient active offloading with collaboration communication and power allocations for heterogeneous ultradense networks | 2.2 | 4 | Citations (PDF) |
| 189 | Unbalanced Expander Based Compressive Data Gathering in Clustered Wireless Sensor Networks | 3.1 | 26 | Citations (PDF) |
| 190 | Storage and computing resource enabled joint virtual resource allocation with QoS guarantee in mobile networks | 4.8 | 5 | Citations (PDF) |
| 191 | Recent advances and future challenges for mobile network virtualization | 4.8 | 21 | Citations (PDF) |
| 192 | Secure Transmission in MISOME Wiretap Channel With Multiple Assisting Jammers: Maximum Secrecy Rate and Optimal Power Allocation | 6.2 | 52 | Citations (PDF) |
| 193 | Coverage Performance of Joint Transmission for Moving Relay Enabled Cellular Networks in Dense Urban Scenarios | 3.1 | 22 | Citations (PDF) |
| 194 | Mobile Edge Computing Enhanced Adaptive Bitrate Video Delivery With Joint Cache and Radio Resource Allocation | 3.1 | 98 | Citations (PDF) |
| 195 | ConFi: Convolutional Neural Networks Based Indoor Wi-Fi Localization Using Channel State Information | 3.1 | 266 | Citations (PDF) |
| 196 | A trust framework based smart aggregation for machine type communication | 4.8 | 10 | Citations (PDF) |
| 197 | Capacity- and Trust-Aware BS Cooperation in Nonuniform HetNets: Spectral Efficiency and Optimal BS Density | 5.8 | 7 | Citations (PDF) |
| 198 | Modeling and Analyzing the Cross-Tier Handover in Heterogeneous Networks | 8.4 | 52 | Citations (PDF) |
| 199 | Reverse Auction Based Green Offloading Scheme for Small Cell Heterogeneous Networks | 0.8 | 8 | Citations (PDF) |
| 200 | Exact Distributions of Finite Random Matrices and Their Applications to Spectrum Sensing | 3.1 | 6 | Citations (PDF) |
| 201 | Coverage analysis for moving relay enabled cellular networks | 0.0 | 5 | Citations (PDF) |
| 202 | Joint Caching Placement and User Association for Minimizing User Download Delay | 3.1 | 68 | Citations (PDF) |
| 203 | Analytical Modeling of Mode Selection for Moving D2D-Enabled Cellular Networks | 3.5 | 36 | Citations (PDF) |
| 204 | Relay selection for secrecy connectivity in random wireless networks | 0.9 | 4 | Citations (PDF) |
| 205 | Enhancing Secured Coverage With CoMP Transmission in Heterogeneous Cellular Networks | 3.5 | 40 | Citations (PDF) |
| 206 | Energy-Efficient Cooperative MIMO-Based Random Walk Routing for Wireless Sensor Networks | 3.5 | 12 | Citations (PDF) |
| 207 | Cooperative wireless localization based on weighting for vector‐addition error | 1.7 | 2 | Citations (PDF) |
| 208 | Secrecy Outage Probability in Multi-RAT Heterogeneous Networks | 3.5 | 40 | Citations (PDF) |
| 209 | Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation | 5.8 | 46 | Citations (PDF) |
| 210 | Capacity Enhancement in 60 GHz Based D2D Networks by Relay Selection and Scheduling | 1.0 | 6 | Citations (PDF) |
| 211 | Artificial Noise Assisted Communication in the Multiuser Downlink: Optimal Power Allocation | 3.5 | 24 | Citations (PDF) |
| 212 | Secrecy Outage on Transmit Antenna Selection With Weighting Errors at Maximal-Ratio Combiners | 3.5 | 20 | Citations (PDF) |
| 213 | Secrecy Outage Analysis of Multiuser Diversity With Unequal Average SNR in Transmit Antenna Selection Systems | 3.5 | 4 | Citations (PDF) |
| 214 | Adaptive Modulation for Dynamic Point Selection/Dynamic Point Blanking | 3.5 | 11 | Citations (PDF) |
| 215 | Coverage Analysis for CoMP in Two-Tier HetNets With Nonuniformly Deployed Femtocells | 3.5 | 24 | Citations (PDF) |
| 216 | Secrecy outage analysis of MU‐MIMO transmit antenna selection systems with arbitrary number of eavesdropping users | 0.0 | 1 | Citations (PDF) |
| 217 | Outage Probability of Full-Duplex AF Relaying With Processing Delay and Residual Self-Interference | 3.5 | 36 | Citations (PDF) |
| 218 | Intra‐cell and inter‐cell interference‐constrained D2D communication underlaying cellular networks | 0.0 | 10 | Citations (PDF) |
| 219 | Uncoordinated Cooperative Multihop Forwarding in 2D Highly Dynamic Networks | 2.1 | 0 | Citations (PDF) |
| 220 | Performance analyses and enhancement of distributed cooperative localisation on position ambiguity | 1.6 | 2 | Citations (PDF) |
| 221 | Performance relationship between distributed and centralised cooperative localisations | 0.0 | 10 | Citations (PDF) |
| 222 | Transport Capacity of Distributed Wireless CSMA Networks | 8.4 | 3 | Citations (PDF) |
| 223 | Optimal Energy-Efficient Relay Deployment for the Bidirectional Relay Transmission Schemes | 5.8 | 32 | Citations (PDF) |
| 224 | Analysis and design of handover in multicell cooperation networks: a field trial | 1.2 | 0 | Citations (PDF) |
| 225 | Energy Efficiency Analysis of Two-Way DF Relay System With Non-Ideal Power Amplifiers | 3.5 | 14 | Citations (PDF) |
| 226 | Bipartite matching approach to optimal resource allocation in device to device underlaying cellular network | 0.0 | 71 | Citations (PDF) |
| 227 | Evolution of Limited-Feedback CoMP Systems from 4G to 5G: CoMP Features and Limited-Feedback Approaches | 2.6 | 77 | Citations (PDF) |
| 228 | Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback | 3.5 | 35 | Citations (PDF) |
| 229 | The Secrecy Outage Probability for the <inline-formula> <tex-math notation="TeX">$i$</tex-math></inline-formula>th Closest Legitimate User in Stochastic Networks | 3.5 | 13 | Citations (PDF) |
| 230 | Resource pooling for frameless network architecture with adaptive resource allocation | 4.8 | 8 | Citations (PDF) |
| 231 | Energy-Efficient Distributed Data Storage for Wireless Sensor Networks Based on Compressed Sensing and Network Coding | 8.4 | 62 | Citations (PDF) |
| 232 | GPP-Based Soft Base Station Designing and Optimization | 1.0 | 5 | Citations (PDF) |
| 233 | A Generic Mathematical Model Based on Fuzzy Set Theory for Frequency Reuse in Cellular Networks | 11.1 | 7 | Citations (PDF) |
| 234 | Cooperative Group Localization Based on Factor Graph for Next-Generation Networks | 2.1 | 0 | Citations (PDF) |
| 235 | Energy Efficient Power Allocation in Generalized Distributed Antenna System | 3.5 | 68 | Citations (PDF) |
| 236 | Energy-Efficient Relay Selection and Power Allocation for Two-Way Relay Channel with Analog Network Coding | 3.5 | 118 | Citations (PDF) |
| 237 | An overview of cooperative communications 2012, 50, 65-71 | | 194 | Citations (PDF) |
| 238 | Capacity analysis and optimal power allocation for coordinated transmission in MIMO-OFDM systems | 4.8 | 26 | Citations (PDF) |
| 239 | Clustering strategy based on graph method and power control for frequency resource management in femtocell and macrocell overlaid system | 2.2 | 41 | Citations (PDF) |
| 240 | Downlink Radio Resource Allocation for Coordinated Cellular OFDMA Networks | 0.3 | 7 | Citations (PDF) |
| 241 | An Inter-Cell Interference Mitigation Method for OFDM-Based Cellular Systems Using Independent Component Analysis | 0.3 | 1 | Citations (PDF) |
| 242 | Maximum utility principle access control for beyond 3G mobile system | 0.9 | 5 | Citations (PDF) |
| 243 | A vision from the future: beyond 3G TDD 2005, 43, 38-44 | | 91 | Citations (PDF) |