Digital Communications and Networks

Academic journal published by KeAi , covering the subjects: Technology: Technology (General): Industrial engineering. Management engineering: Information technology

Digital Communications and Networks is …
instance of (P31):
academic journalQ737498
open-access journalQ773668

External links are
P6981ACNP journal ID3173077
P1209CN50-1212/TN
P8375Crossref journal ID267204
P8926DBLP venue IDjournals/dcan
P6180Dimensions Source ID1151995
P5115Directory of Open Access Journals ID2352-8648
P8903HAL journal ID117064
P236ISSN2352-8648
2468-5925
P7363ISSN-L2352-8648
P1277JUFO ID84043
P856official websitehttp://www.journals.elsevier.com/digital-communications-and-networks
https://www.keaipublishing.com/en/journals/digital-communications-and-networks/
P10283OpenAlex IDS2495769766
S4306549730
P7662Scilit journal ID1235970
P1156Scopus source ID21100823476

P972catalogDirectory of Open Access JournalsQ1227538
P275copyright licenseCreative Commons Attribution-NonCommercial-NoDerivativesQ6937225
P17countryPeople's Republic of ChinaQ148
P495country of originKingdom of the NetherlandsQ29999
P8875indexed in bibliographic reviewScopusQ371467
Chinese Science Citation DatabaseQ20716557
Science Citation Index ExpandedQ104047209
P407language of work or nameEnglishQ1860
P921main subjectinformation technologyQ11661
P127owned byChongqing University of Posts and TelecommunicationsQ5104676
P123publisherKeAiQ52667636
P1476titleDigital communications and networks

Reverse relations

published in (P1433)
Q1148485593-Multi ranked encryption with enhanced security in cloud computing
Q124285497A WKNN-based approach for NB-IoT sensors localization
Q57586718A blockchain future for internet of things security: a position paper
Q123018063A blockchain-based Privacy-Preserving and Collusion-Resistant scheme (PPCR) for double auctions
Q114848560A blockchain-based audit approach for encrypted data in federated learning
Q114307239A blockchain-enabled wiki framework based on participatory design
Q114671248A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications
Q130083635A comparative study of name resolution and routing mechanisms in information-centric networks
Q114902525A digital twins enabled underwater intelligent internet vehicle path planning system via reinforcement learning and edge computing
Q125801113A multi-layered policy generation and management engine for semantic policy mapping in clouds
Q57431124A network security situation prediction model based on wavelet neural network with optimized parameters
Q127992575A new type of blockchain for secure message exchange in VANET
Q127023171A novel modeling approach for vertical handover based on dynamic k-partite graph in heterogeneous networks
Q115044940A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI
Q115044967A roadmap for security challenges in the Internet of Things
Q126640204A simple 2D modulation code in single-reader two-track reading BPMR systems
Q115044930A statistical approach for enhancing security in VANETs with efficient rogue node detection using fog computing
Q115044950A survey of edge computing-based designs for IoT security
Q114902527A survey on deploying mobile deep learning applications: A systemic and technical perspective
Q115044955A systematic literature review of blockchain cyber security
Q121135716A time-aware searchable encryption scheme for EHRs
Q121183404AQROM: A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks
Q127216649AdaptiveMutate: a technique for privacy preservation
Q127854233An architecture for digital hate content reduction with mobile edge computing
Q114671246An efficient data aggregation scheme with local differential privacy in smart grid
Q59429532An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks
Q114671247An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things
Q127938474Analysis of identifiers in IoT platforms
Q129564076Analytical model of IoT CoAP traffic
Q114387782Anonymous crowdsourcing-based WLAN indoor localization
Q129075318Antenna selection for MIMO system based on pattern recognition
Q115044928Application of meta-learning in cyberspace security: a survey
Q122750555Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home
Q114671245Blockchain-based continuous data integrity checking protocol with zero-knowledge privacy protection
Q115044923Cache in fog computing design, concepts, contributions, and security issues in machine learning prospective
Q129046470Caching resource management of mobile edge network based on Stackelberg game
Q126779032DVCast: denoising and variable dct for analog visual communications
Q129079582Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing
Q115044932DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network
Q128937722Design and analysis of multi-channel drop filter using dual L defected hexagonal photonic crystal ring resonator
Q127461157Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks
Q129648307Design of multi-antenna relaying for OFDM in impulsive noise environment
Q115044957Developing a platform to evaluate and assess the security of wearable devices
Q115044933Dynamic defenses in cyber security: Techniques, methods and challenges
Q128218786Dynamic load balancing with learning model for Sudoku solving system
Q126979537EECDH to prevent MITM attack in cloud computing
Q115044934Editorial for special issue on ”security and privacy protection in the era of IoT devices”
Q115044943Editorial: Special issue on blockchain and communication networks
Q115044948Editorial: special issue on “The security, privacy, and digital forensics of mobile networks and mobile cloud”
Q115044960Editorial: special issue on “big data security and privacy”
Q126404034Electromagnetic spectrum chipless radio frequency identification: A review
Q129035143Enabling intelligence in fog computing to achieve energy and latency reduction
Q129035160Energy efficient and delay aware ternary-state transceivers for aerial base stations
Q130054938Enhancing secrecy rates in a wiretap channel
Q114671244Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes
Q115044935Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers
Q128772611Game-theoretic private blockchain design in edge computing networks
Q130110162Gaussian broadcast channel with lossy state reconstruction
Q122415535Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing
Q115044924Guest editorial: Special issue on security and privacy for AI-powered smart IoT applications
Q115044925How AI-enabled SDN technologies improve the security and functionality of industrial IoT network: Architectures, enabling technologies, and opportunities
Q114671250Information mining and similarity computation for semi- / un-structured sentences from the social data
Q115044944Information security through controlled quantum teleportation networks
Q114456102Joint computation offloading and parallel scheduling to maximize delay-guarantee in cooperative MEC systems
Q114191331Kernel-based adversarial attacks and defenses on support vector classification
Q114848562Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning
Q114902526Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack
Q114387780Multi-stage online task assignment driven by offline data under spatio-temporal crowdsourcing
Q130173719Multifault diagnosis in WSN using a hybrid metaheuristic trained neural network
Q128522442NLDA non-linear regression model for preserving data privacy in wireless sensor networks
Q114952312NeurstrucEnergy: A bi-directional GNN model for energy prediction of neural networks in IoT
Q128322990On the performance of web services, google cloud messaging and firebase cloud messaging
Q111897718On the use of the genetic programming for balanced load distribution in software-defined networks
Q113103177PRECESION: progressive recovery and restoration planning of interdependent services in enterprise data centers
Q130064344Percolation analysis of large-scale wireless balloon networks
Q120919940Performance analysis and comparison of PoW, PoS and DAG based blockchains
Q114261757Performance analysis of an improved dynamic power management model in wireless sensor node
Q56938739Pheromone based alternative route planning
Q115044953Private membership test protocol with low communication complexity
Q60536937Providing healthcare services on-the-fly using multi-player cooperation game theory in Internet of Vehicles (IoV) environment
Q114671249Public integrity verification for data sharing in cloud with asynchronous revocation
Q126398770Quanta - A platform for rapid control and monitoring of heterogeneous rbots
Q127871208RFHUI: an RFID based human-unmanned aerial vehicle interaction system in an indoor environment
Q128902748Rate distortion optimization for adaptive gradient quantization in federated learning
Q115044952Recent advances in mobile edge computing and content caching
Q114197128Research on encoding and decoding of non-binary polar codes over GF(2 )
Q115044937Robot and its living space: A roadmap for robot development based on the view of living space
Q128786447Robust beamforming design for energy harvesting efficiency maximization in RIS-aided SWIPT system
Q129253792S-transformation based integrated approach for spectrum estimation, storage, and sensing in cognitive radio
Q122259994SM algorithms-based encryption scheme for large genomic data files
Q129267702Secrecy sum-rate analysis of massive MIMO systems under dual-threat attacks using normalization methods
Q111522156Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
Q115044941Security and privacy in 6G networks: New areas and new challenges
Q115044938Security and privacy issues of physical objects in the IoT: Challenges and opportunities
Q129267350Short video preloading via domain knowledge assisted deep reinforcement learning
Q127980801Submillimeter wave communication versus millimeter wave communication
Q121133048Substring-searchable attribute-based encryption and its application for IoT devices
Q123132623Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage
Q127023043Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism
Q122169629Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT
Q128417528Tracing manufacturing processes using blockchain-based token compositions
Q129038438Traffic-driven epidemic spreading and its control strategies
Q114316962Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing
Q121009064VRS-DB: preserve confidentiality of users’ data using encryption approach
Q115044963Visualization of big data security: a case study on the KDD99 cup data set
Q114848561Visually meaningful image encryption algorithm based on digital signature
Q129743582WITHDRAWN: Low signaling overhead group-based power-control scheme for massive machine-type communications
Q129972632WITHDRAWN: Quality-of-service support in LTE-A systems with the DRX mechanism
Q115044936WITHDRAWN: Security protocol of sensitive high utility itemset hiding in shared IoT environments
Q128928532Weak harmonic signal detection method in chaotic interference based on extended Kalman filter

Search more.