Tsinghua Science and Technology

Papers
(The TQCC of Tsinghua Science and Technology is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
Call for Papers—Special Issue on Hybrid Energy Storage System-Based Electric Vehicles: Actions and Challenges178
Algorithmic Perspectives on Active Object Recognition Systems: A Survey137
Deciphering a Million-Plus RSA Integer with Ultralow Local Field Coefficient h and Coupling Coefficient J of the Ising Model by D-Wave 2000Q117
Design of a Maritime Autoencoder Communication System Based on Attention Mechanisms and DenseBlock103
Restage: Relation Structure-Aware Hierarchical Heterogeneous Graph Embedding84
AMTrans: Auto-Correlation Multi-Head Attention Transformer for Infrared Spectral Deconvolution81
A Simple but Accurate Approximation for Multivariate Gaussian Rate-Distortion Function and Its Application in Maximal Coding Rate Reduction68
Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models63
An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages61
Fast and Efficient Algorithm for Tibetan Jiu Chess Gameplay Data Collecting Based on Improved YOLOv8n Model58
Proxy-Based Embedding Alignment for RGB-Infrared Person Re-Identification57
High-Performance Flow Classification of Big Data Using Hybrid CPU-GPU Clusters of Cloud Environments56
ComPact: Edge Collaborative Spatiotemporal Graph Learning for Wind Speed Forecasting53
Exact and Approximation Algorithms for the Multi-Depot Capacitated Arc Routing Problems52
Resource Management and Trajectory Optimization for UAV-IRS Assisted Maritime Edge Computing Networks50
A novel QoS-based IoT network security approach with lightweight lattice-based quantum attribute-based encryption49
A Simple but Accurate Approximation for Multivariate Gaussian Rate-Distortion Function and Its Application in Maximal Coding Rate Reduction48
Residual convolutional graph neural network with subgraph attention pooling48
Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection47
A Deep Neural Collaborative Filtering Based Service Recommendation Method with Multi-Source Data for Smart Cloud-Edge Collaboration Applications47
A dynamic and deadline-oriented road pricing mechanism for urban traffic management45
DEFOG: Deep Learning with Attention Mechanism Enabled Cross-Age Face Recognition44
Key Mechanisms on Resource Optimization Allocation in Minority Game Based on Reinforcement Learning44
Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment43
Optimized Consensus for Blockchain in Internet of Things Networks via Reinforcement Learning42
Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning41
Quality-aware user recruitment based on federated learning in mobile crowd sensing40
Graph Structure Learning for Robust Recommendation39
A Solution Supporting Secure Transmission of Big Data38
MPformer: A Transformer-Based Model for Earthen Ruins Climate Prediction38
An Improved Algorithm for Segmentation and Determination of Respiratory Phase Times Based on Temporal Processing of Nasal and Mouth Breathing Sound Signals37
Increasing the Maximum Capacity Path in a Network and Its Application for Improving the Connection Between Two Routers37
Optimizing Federated Incremental Learning: Efficient Malicious Data Removal for Big Data Analytics35
CAE-IF: An Anomaly Detection Approach Based on Temporal Representation of the Reconstruction Error35
Accurate and Scalable Anomaly Detection in Maternal Health Monitoring Systems35
Multi-Agent Reinforcement Learning Optimization for Virtual Coupled Train Set Problem in CBTC Systems35
Efficient Low-Rank Adaptation for Sparse Large Language Model35
An Ensemble Learning Model Based on Three-Way Decision for Concept Drift Adaptation34
Efficient Lookup Table Based Z-Order Curve Encoding and Decoding: Algorithms, Parallelization, and Applications34
Quantifying Bytes: Understanding Practical Value of Data Assets in Federated Learning34
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication33
Discrete Data-Driven Position and Orientation Control for Redundant Manipulators with Jacobian Matrix Learning33
Fusing Syntactic Structure Information and Lexical Semantic Information for End-to-End Aspect-Based Sentiment Analysis33
IIN-FFD: Intra-Inter Network for Face Forgery Detection32
Focusing Ability Enhancement in Broadside Direction of Array: From UCA to UCCA32
Deep-EERA: DRL-Based Energy-Efficient Resource Allocation in UAV-Empowered Beyond 5G Networks31
Acute Complication Prediction and Diagnosis Model CLSTM-BPR: A Fusion Method of Time Series Deep Learning and Bayesian Personalized Ranking31
PG-CODE: Latent dirichlet allocation embedded policy knowledge graph for government department coordination30
Role Identification Based Method for Cyberbullying Analysis in Social Edge Computing30
A Hybrid Air Quality Prediction Model Based on Empirical Mode Decomposition30
Anomaly detection of industrial control systems based on transfer learning30
A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing30
Reset-Free Reinforcement Learning via Multi-State Recovery and Failure Prevention for Autonomous Robots30
Privacy-Preserving Unobtrusive Fall Detection for Older Adults: A Highly Generalized Deep Anomaly Detection Model28
Motion-Force Control of Redundant Manipulators: A Kinematics Approach to Synchronized Learning and Control of Position and Orientation27
A Two-Stage Approach for Electric Vehicle Routing Problem with Time Windows and Heterogeneous Recharging Stations26
Multiagent Reinforcement Learning Based on Structural Coordination26
Call for Papers: Special Issue on Neural Networks Depicted in ODEs with Applications25
ASNHC:Adaptive Switching Node with Hybrid Backscatter and Wireless Powered Communication25
Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet24
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning24
Anti-interference low-power double-edge triggered flip-flop based on C-elements24
A Novel Popularity Extraction Method Applied in Session-Based Recommendation23
Improved Aerial Video Compression for UAV System Based on Historical Background Redundancy23
Accelerating Distributed Training of Large Concurrent-Branch Models Through Bidirectional Pipeline Coordination22
Interface modification of TiO2 electron transport layer with PbCl2 for perovskiote solar cells with carbon electrode22
Dynamic Surface Control for Nonlinear Bilateral Teleoperation Manipulators with Guaranteed Transient Performance21
Output Type Guided Random Test Case Generation for String Validation Routines21
Empirical Analysis of Remote Keystroke Inference Attacks and Defenses on Incremental Search21
Algorithms for the Prize-Collecting $k$-Steiner Tree Problem21
Effect Analysis of Factors and Time on SFEP Using Multimodal Streaming Data under Uncertain Conditions20
GGC: Gray-granger causality method for sensor correlation network structure mining on high-speed train20
Multi-Clock Snapshot Isolation Concurrency Control for NVM Database20
Semantic Markov Chain Using Synonymous Mapping19
Cost-Based Research on Energy Management Strategy of Electric Vehicles Using Hybird Energy Storage System19
Identification of Key Genes as Potential Drug Targets for Gastric Cancer18
Causality-Based Contrastive Incremental Learning Framework for Domain Generalization18
Finite-Time Stability for Fuzzy Systems: A Weighted Sum-Based Dynamic Event-Triggered Mechanism18
Decision-making Approach for Complex Network Defense Based on FlipIt Game18
Incorporating multi-scale module kernel for disease-gene identification in biological networks18
Exploring the Chameleon Effect of Contextual Dynamics in Temporal Knowledge Graph for Event Prediction17
Few-Shot Object Detection via Dual-Domain Feature Fusion and Patch-Level Attention17
BSIN: A Behavior Schema of Information Networks Based on Approximate Bisimulation17
Client to Server: Heterogeneous Distribution Knowledge Transfer for Federated Learning17
Optimizing the Perceptual Quality of Time-Domain Speech Enhancement with Reinforcement Learning17
Indoor Human Fall Detection Algorithm Based on Wireless Sensing17
Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks16
Self-Renewal Consortium Blockchain Based on Proof of Rest and Strong Smart Contracts16
Time-beacon beats Blockchain Trilemma16
Editorial16
An Improved Robust Sparse Convex Clustering16
Online Weakly DR-Submodular Optimization Under Stochastic Cumulative Constraints16
Development and Application of Magnetoresistive Sensors in Current Detection15
Time-Aware LSTM Neural Networks for Dynamic Personalized Recommendation on Business Intelligence15
A Survey of Zero-shot Image Classification: Concepts, Developments and Challenges15
Coevolutionary SGD for Improving Generalization15
Dynamic Task Offloading for Mobile Edge Computing with Hybrid Energy Supply15
Data-Driven Collaborative Scheduling Method for Multi-Satellite Data-Transmission14
A Novel Zeroing Neural Network for Time-Varying Matrix Pseudoinversion in the Presence of Linear Noises14
A Constraint Adaptive Multi-Tasking Differential Evolution Algorithm: Designed for Dispatch of Integrated Energy System in Coal Mine14
Multi-Influencing Factors Landslide Susceptibility Prediction Model Based on Monte Carlo Neural Network14
Performance Analysis for Digital Twin Enabled Vehicular Platoon based V2V Communication14
Evaluation Method of Motor Coordination Ability in Children Based on Machine Vision14
DCVAE-adv: A Universal Adversarial Example Generation Method for White and Black Box Attacks14
Error-Accumulation Improved Newton Algorithm in Model Predictive Control for Novel Compliant Actuator-Driven Upper-Limb Exoskeleton14
Arm PSA-Certified IoT Chip Security: A Case Study14
Transformer and GAN-Based Super-Resolution Reconstruction Network for Medical Images14
A Light Application Level Virtualization Framework with Zero-Copy and Migration Agent14
An Electrical Impedance Imaging System Towards Edge Intelligence for Non-Destructive Testing of Concrete14
Implementation of abstract MAC layer under jamming14
Fast and Scalable GPU-Based RPA Decoder for Reed-Muller Codes14
Towards Federated Learning Driving Technology for Privacy-Preserving Micro-Expression Recognition14
A Survey of Edge Caching: Key Issues and Challenges14
Object Counting Using a Refinement Network14
Information Purification Network for Remote Sensing Image Super-Resolution14
Characteristics of Controlled Bridge Circuit and Its Application in Magnetic Field Induction Measurement14
A High-Linear Radio Frequency Quadrature Modulator with Improved Sideband Suppression and Carrier Leakage Performance14
Quantum Superposition of Event Function States for Encryption-Decryption and the Entanglement Degree of System Fault Evolution Process13
Improving the SGD Optimizer from the Perspective of ODE for Plant Disease Identification13
GAAF: Searching Activation Functions for Binary Neural Networks Through Genetic Algorithm13
A Robust Transformer-Based Method for Object Tracking under Prolonged Occlusion13
Optimal Decisions for a Fresh Agricultural Product Supply Chain with Altruistic Behavior under Blockchain Technology13
A GNSS Anti-Spoofing Technique Based on the Spatial Distribution Characteristic of the Residual Vectors12
A Knowledge-Driven Bi-Population Optimization Algorithm for Distributed Heterogeneous No-Idle Flow Shop Scheduling problem with Batch Delivery and Setup Times12
Empowering NP-Hard Problem Solving in Symmetric Cipher Attacks through the Global Optimization Capability of the Quantum Tunneling Effect12
Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing12
A Temporal Knowledge Graph Embedding Model Based on Variable Translation12
Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption12
DeepSI: A Sensitive-Driven Testing Samples Generation Method of Whitebox CNN Model for Edge Computing12
Three Dimensional Metal-Surface Processing Parameter Generation Through Machine Learning-Based Nonlinear Mapping12
CCDive: A Deep Dive into Code Clone Detection Using Local Sequence Alignment12
RPEU-Net: Residual Parallel Enhanced Attention Network for Left Atrial Segmentation12
False Negative Sample Detection for Graph Contrastive Learning12
MFF-YOLO: An Improved YOLO Algorithm Based on Multi-Scale Semantic Feature Fusion12
Approximation and Heuristic Algorithms for the Priority Facility Location Problem with Outliers12
Machine Learning for Selecting Important Clinical Markers of Imaging Subgroups of Cerebral Small Vessel Disease Based on a Common Data Model12
A Blockchain-Based Copyright Management Scheme for Open-Source Software and Hardware Designs12
Attention-Enhanced and Knowledge-Fused Dual Item Representations Network for Recommendation12
Optimized relinearization algorithm of the multikey homomorphic encryption scheme11
Plausible Heterogeneous Graph $k$-Anonymization for Social Networks11
Editorial11
980 nm Near-Infrared Light-Emitting Diode Using All-Inorganic Perovskite Nanocrystals Doped with Ytterbium Ions11
A Differential Privacy Protection Protocol Based on Location Entropy11
Adversarial training for supervised relation extraction11
Deep Time-Frequency Denoising Transform Defense for Spectrum Monitoring in Integrated Networks11
LETRNG—A Lightweight and Efficient True Random Number Generator for GNU/Linux Systems11
Enhanced 5G LDPC Codes and Their HARQ Scheme: Design and Performance Analysis11
A First Successful Factorization of RSA-2048 Integer by D-Wave Quantum Computer11
Bilevel Optimal Infrastructure Planning Method for the Inland Battery Swapping Stations and Battery-Powered Ships11
Core Decomposition and Maintenance in Bipartite Graphs11
Semi-Supervised Cardiac CT Segmentation by Cross-Supervision10
Near-Threshold Wide-Voltage Design Review10
Decoupled Two-Phase Framework for Class-Incremental Few-Shot Named Entity Recognition10
A Review of Deep Reinforcement Learning Methods for Production Scheduling10
Joint Beamforming Design for RIS-Assisted Cell-Free Network with Multi-Hop Transmissions10
CAN: Effective cross features by global attention mechanism and neural network for ad click prediction10
A Multi-Hyperparameter Prediction Framework for Distributed Energy Trading on Photovoltaic Network9
Differentially Private System for Residential Energy Management via Markov Decision Process9
CPT: A Configurable Predictability Testbed for DNN Inference in AVs9
Prompting and Tuning: A Two-Stage Unsupervised Domain Adaptive Person Re-identification Method on Vision Transformer Backbone9
Coevolutionary Neural Dynamics Considering Multiple Strategies for Nonconvex Optimization9
A Very Compact and a Threshold Implementation of uBlock for Internet of Things9
A Variance Reducing Stochastic Proximal Method with Acceleration Techniques9
A physics-informed glucose-insulin neural network model for glucose prediction9
A Time-Varying Hill Cipher for Dynamic Image Cryptography9
Extensible Bloom Filters: Adaptive Strategies for Scalability and Efficiency in Network and Distributed Systems to Handle Increased Data9
SAGVN Task Offloading and Resource Allocation with Spectrum Resource Constraints9
PrivBV: Distance-aware encoding for distributed data with local differential privacy9
Enhancing Power Line Insulator Health Monitoring with a Hybrid Generative Adversarial Network and YOLO3 Solution9
2.7474451065063