278(top 1%)
papers
5.2K(top 1%)
citations
36(top 1%)
h-index
65(top 1%)
g-index
333
all documents
5.6K
doc citations
841
citing journals

Top Articles

#TitleJournalYearCitations
1A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoTIEEE Access2018513
2Machine Learning Techniques for Cooperative Spectrum Sensing in Cognitive Radio NetworksIEEE Journal on Selected Areas in Communications2013331
3Blockchain Security in Cloud Computing: Use Cases, Challenges, and SolutionsSymmetry2017213
4BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT networkJournal of Network and Computer Applications2019186
5Blockchain-Based Distributed Framework for Automotive Industry in a Smart CityIEEE Transactions on Industrial Informatics2019166
6An improved ant colony optimization-based approach with mobile sink for wireless sensor networksJournal of Supercomputing2018151
7Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and OpportunitiesIEEE Transactions on Industrial Informatics2018143
8Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big DataSymmetry2017140
9Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinksJournal of Supercomputing2017139
10Using Multi-Modal Semantic Association Rules to fuse keywords and visual features automatically for Web image retrievalInformation Fusion201189
11Wireless-Powered Sensor Networks: How to RealizeIEEE Transactions on Wireless Communications201787
12End-To-End Deep Learning Architecture for Continuous Blood Pressure Estimation Using Attention MechanismSensors202082
13Privacy-preserving max/min query in two-tiered wireless sensor networksComputers and Mathematics With Applications201377
14A Lightweight Hash-Based Blockchain Architecture for Industrial IoTApplied Sciences (Switzerland)201976
15Robust one-time password authentication scheme using smart card for home network environmentComputer Communications201175
16Editorial: A special section on “Emerging Platform Technologies”Journal of Supercomputing201675
17Opportunistic Access to Spectrum Holes Between Packet Bursts: A Learning-Based ApproachIEEE Transactions on Wireless Communications201165
18Two-Stage Semi-Distributed Resource Management for Device-to-Device Communication in Cellular NetworksIEEE Transactions on Wireless Communications201465
19BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT NetworkSustainability201962
20Adaptive data rate control in low power wide area networks for long range IoT servicesJournal of Computational Science201752
21Secure D2D Communication for 5G IoT Network Based on Lightweight CryptographyApplied Sciences (Switzerland)202052
22User authentication schemes with pseudonymity for ubiquitous sensor network in NGNInternational Journal of Communication Systems201050
23Cooperative Spectrum Sensing Under a Random Geometric Primary User Network ModelIEEE Transactions on Wireless Communications201150
24Stochastic Optimal Control for Wireless Powered Communication NetworksIEEE Transactions on Wireless Communications201650
25Theory and Experiment for Wireless-Powered Sensor Networks: How to Keep Sensors AliveIEEE Transactions on Wireless Communications201850
26An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard MonitoringSensors201045
27Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environmentIET Communications201045
28Downlink Subchannel and Power Allocation in Multi-Cell OFDMA Cognitive Radio NetworksIEEE Transactions on Wireless Communications201144
29Blockchain-Based Secure Storage Management with Edge Computing for IoTElectronics (Switzerland)201943
30Task number maximization offloading strategy seamlessly adapted to UAV scenarioComputer Communications202042
31Machine Learning-Based Network Sub-Slicing Framework in a Sustainable 5G EnvironmentSustainability202042
32Hybrid security protocol for wireless body area networksWireless Communications and Mobile Computing201141
33A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communicationInternational Journal of Communication Systems201141
34Energy harvesting and information processing in two‐way multiplicative relay networksElectronics Letters201640
35An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard MonitoringSensors201139
36EH-HL: Effective Communication Model by Integrated EH-WSN and Hybrid LiFi/WiFi for IoTIEEE Internet of Things Journal201839
37Intelligent video surveillance system: 3-tier context-aware surveillance system with metadataMultimedia Tools and Applications201237
38k-Cliques mining in dynamic social networks based on triadic formal concept analysisNeurocomputing201637
39DoS attacks exploiting signaling in UMTS and IMSComputer Communications201136
40Image hash generation method using hierarchical histogramMultimedia Tools and Applications201236
41CloudRPS: a cloud analysis based enhanced ransomware prevention systemJournal of Supercomputing201736
42Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social DataIEEE Journal on Selected Areas in Communications201132
43A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge ComputingIEEE Access201832
44VPNFilter Malware Analysis on Cyber Threat in Smart Home NetworkApplied Sciences (Switzerland)201932
45Blockchain-Based Secure Device Management Framework for an Internet of Things Network in a Smart CitySustainability201932
46FusionFedBlock: Fusion of blockchain and federated learning to preserve privacy in industry 5.0Information Fusion202330
47Design and implementation of a framework for building distributed smart object systemsJournal of Supercomputing201028
48An efficient authentication system of smart device using multi factors in mobile cloud service architectureInternational Journal of Communication Systems201527
49Distributed Random Access Scheme for Collision Avoidance in Cellular Device-to-Device CommunicationIEEE Transactions on Wireless Communications201526
50FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable ComputingSustainability201626