Tsinghua Science and Technology

Papers
(The TQCC of Tsinghua Science and Technology is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
IDEA: A utility-enhanced approach to incomplete data stream anonymization233
Accurate reliability analysis methods for approximate computing circuits141
Privacy-aware examination results ranking for the balance between teachers and mothers134
A Two-Stage Method for Routing in Field-Programmable Gate Arrays with Time-Division Multiplexing134
Building a post-layout simulation performance model with global mapping model fusion technique126
Cross-modal complementary network with hierarchical fusion for multimodal sentiment classification104
Solving Combinatorial Optimization Problems with Deep Neural Network: A Survey87
False Negative Sample Detection for Graph Contrastive Learning82
Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection79
Overview of ultra-wideband transceivers—system architectures and applications73
PicoRio: An open-source, RISC-V small-board computer to elevate the RISC-V software ecosystem61
Event-Related Potentials Analysis on Perception of Moving Object at Different Speeds56
XB-SIM∗: A simulation framework for modeling and exploration of ReRAM-based CNN acceleration design47
Exploring a Promising Region and Enhancing Decision Space Diversity for Multimodal Multi-Objective Optimization46
Graph structure learning for robust recommendation46
ASCFL: Accurate and Speedy Semi-Supervised Clustering Federated Learning45
High-Performance Flow Classification of Big Data Using Hybrid CPU-GPU Clusters of Cloud Environments40
Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption40
Spatial-temporal ConvLSTM for vehicle driving intention prediction39
HTDet: A clustering method using information entropy for hardware Trojan detection38
Architecture of Graphics System with 3D Acceleration Support for Embedded Operating Systems37
Deciphering a Million-Plus RSA Integer with Ultralow Local Field Coefficient h and Coupling Coefficient J of the Ising Model by D-Wave 2000Q35
Exact and Approximation Algorithms for the Multi-Depot Capacitated Arc Routing Problems34
An Online Website Fingerprinting Defense Based on the Non-Targeted Adversarial Patch34
FSRPCL: Privacy-preserve federated social relationship prediction with contrastive learning33
Call for Papers—Special Issue on Hybrid Energy Storage System-Based Electric Vehicles: Actions and Challenges31
Graph Convolutional Network Combined with Semantic Feature Guidance for Deep Clustering30
Dataflow Management in the Internet of Things: Sensing, Control, and Security29
SPIDER: Speeding up Side-Channel Vulnerability Detection via Test Suite Reduction29
Key Technology Innovation Mode of New Energy Industry Ecological Integration System Based on Particle Swarm Optimization Algorithm28
Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models28
ZKP Protocols for Usowan, Herugolf, and Five Cells28
An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages27
Optimizing the copy-on-write mechanism of docker by dynamic prefetching26
Call for Papers: Special Issue on Cross-Layer and Collaborative Optimization Techniques in Space-Air-Ground-Sea Integrated Networks26
Enhancement of Solar PV Panel Efficiency Using Double Integral Sliding Mode MPPT Control26
A Temporal Knowledge Graph Embedding Model Based on Variable Translation25
Real-Time Dwell Scheduling Based on a Unified Pulse Interleaving Framework for Phased Array Radar25
RBC: A memory architecture for improved performance and energy efficiency25
Robust segmentation method for noisy images based on an unsupervised denosing filter24
MetaOJ: A massive distributed online judge system23
Efficient publication of distributed and overlapping graph data under differential privacy23
A cascade model-aware generative adversarial example detection method22
A computer-aided system for ocular myasthenia gravis diagnosis22
Toward Robust and Efficient Low-Light Image Enhancement: Progressive Attentive Retinex Architecture Search22
Parallel-data-based social evolution modeling22
Fusion Model for Tentative Diagnosis Inference Based on Clinical Narratives21
Deep reinforcement learning based mobile robot navigation: A review21
A novel QoS-based IoT network security approach with lightweight lattice-based quantum attribute-based encryption20
Optimized Consensus for Blockchain in Internet of Things Networks via Reinforcement Learning20
From Coarse to Fine: Two-Stage Indoor Localization with Multisensor Fusion20
CamDroid: Context-Aware Model-Based Automated GUI Testing for Android Apps19
Restage: Relation Structure-Aware Hierarchical Heterogeneous Graph Embedding19
A P4-Based Approach to Traffic Isolation and Bandwidth Management for 5G Network Slicing19
Quantum-Inspired Sensitive Data Measurement and Secure Transmission in 5G-Enabled Healthcare Systems19
A multi-flow information flow tracking approach for proving quantitative hardware security properties18
POI neural-rec model via graph embedding representation17
Quality-aware user recruitment based on federated learning in mobile crowd sensing17
Synergistic Multi-Drug Combination Prediction Based on Heterogeneous Network Representation Learning with Contrastive Learning17
A Deep Neural Collaborative Filtering Based Service Recommendation Method with Multi-Source Data for Smart Cloud-Edge Collaboration Applications17
Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning16
GAAF: Searching Activation Functions for Binary Neural Networks Through Genetic Algorithm16
Univariate Time Series Anomaly Detection Based on Hierarchical Attention Network16
Defense Against Software-Defined Network Topology Poisoning Attacks16
Camera, LiDAR, and IMU Based Multi-Sensor Fusion SLAM: A Survey15
Towards "general purpose" brain-inspired computing system15
Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol15
DEANet: Decomposition Enhancement and Adjustment Network for Low-Light Image Enhancement15
Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT15
Use of Deep Learning for Continuous Prediction of Mortality for All Admissions in Intensive Care Units14
News keyword extraction algorithm based on semantic clustering and word graph model14
Residual convolutional graph neural network with subgraph attention pooling14
A dynamic and deadline-oriented road pricing mechanism for urban traffic management14
SGNR: A Social Graph Neural Network Based Interactive Recommendation Scheme for E-Commerce14
A novel cross-project software defect prediction algorithm based on transfer learning14
Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment14
Adversarial training for supervised relation extraction13
A Hybrid Air Quality Prediction Model Based on Empirical Mode Decomposition13
Joint Sample Position Based Noise Filtering and Mean Shift Clustering for Imbalanced Classification Learning13
Ambipolar transport compact models for two-dimensional materials based field-effect transistors13
Thermal-Aware on-Device Inference Using Single-Layer Parallelization with Heterogeneous Processors12
Increasing the Maximum Capacity Path in a Network and Its Application for Improving the Connection Between Two Routers12
New advanced computing architecture for cryptography design and analysis by D-Wave quantum annealer12
A GNSS Anti-Spoofing Technique Based on the Spatial Distribution Characteristic of the Residual Vectors12
Automotive Visible-Light Communication: Alternative Devices and Systems12
Spatially Coupled Codes via Bidirectional Block Markov Superposition Transmission12
Towards rehabilitation at home after total knee replacement12
Key-Part Attention Retrieval for Robotic Object Recognition12
Streaming Algorithms for Non-Submodular Maximization on the Integer Lattice12
Federated Learning Security and Privacy-Preserving Algorithm and Experiments Research Under Internet of Things Critical Infrastructure11
A Note on Maximizing Regularized Submodular Functions Under Streaming11
Approximation and Heuristic Algorithms for the Priority Facility Location Problem with Outliers11
$k$-Submodular Maximization with a Knapsack Constraint and $p$ Matroid Constraints11
Efficient static compaction of test patterns using partial maximum satisfiability11
Study of texture segmentation and classification for grading small hepatocellular carcinoma based on CT images11
Effective Application of IoT Power Electronics Technology and Power System Optimization Control11
Fault-tolerant design for data efficient retransmission in WiNoC11
Anomaly detection of industrial control systems based on transfer learning11
MPformer: A Transformer-Based Model for Earthen Ruins Climate Prediction11
IIN-FFD: Intra-Inter Network for Face Forgery Detection11
Garbage collection and data recovery for N2DB10
Distributed Truss Computation in Dynamic Graphs10
Effect of chloride Ion concentrations on luminescence peak blue shift of light-emitting diode using anti-solvent extraction of quasi-two-dimensional perovskite10
DeepSI: A Sensitive-Driven Testing Samples Generation Method of Whitebox CNN Model for Edge Computing10
Classification of Medical Image Notes for Image Labeling by Using MinBERT9
Exploring Artistic Embeddings in Service Design: A Keyword-Driven Approach for Artwork Search and Recommendations9
Machine Learning for Selecting Important Clinical Markers of Imaging Subgroups of Cerebral Small Vessel Disease Based on a Common Data Model9
Deep Broad Learning for Emotion Classification in Textual Conversations9
Acute Complication Prediction and Diagnosis Model CLSTM-BPR: A Fusion Method of Time Series Deep Learning and Bayesian Personalized Ranking9
Leveraging Structured Information from a Passage to Generate Questions9
Approximation Algorithm for the Balanced 2-Correlation Clustering Problem9
Bilevel Optimal Infrastructure Planning Method for the Inland Battery Swapping Stations and Battery-Powered Ships9
0.049455881118774