Tsinghua Science and Technology

Papers
(The TQCC of Tsinghua Science and Technology is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Call for Papers—Special Issue on Hybrid Energy Storage System-Based Electric Vehicles: Actions and Challenges176
Algorithmic Perspectives on Active Object Recognition Systems: A Survey133
Deciphering a Million-Plus RSA Integer with Ultralow Local Field Coefficient h and Coupling Coefficient J of the Ising Model by D-Wave 2000Q113
Design of a Maritime Autoencoder Communication System Based on Attention Mechanisms and DenseBlock102
Restage: Relation Structure-Aware Hierarchical Heterogeneous Graph Embedding83
AMTrans: Auto-Correlation Multi-Head Attention Transformer for Infrared Spectral Deconvolution79
DEFOG: Deep Learning with Attention Mechanism Enabled Cross-Age Face Recognition67
Key Mechanisms on Resource Optimization Allocation in Minority Game Based on Reinforcement Learning56
Graph Structure Learning for Robust Recommendation56
A dynamic and deadline-oriented road pricing mechanism for urban traffic management55
An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages53
Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models52
Fast and Efficient Algorithm for Tibetan Jiu Chess Gameplay Data Collecting Based on Improved YOLOv8n Model51
Resource Management and Trajectory Optimization for UAV-IRS Assisted Maritime Edge Computing Networks51
Proxy-Based Embedding Alignment for RGB-Infrared Person Re-Identification49
Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection48
Optimized Consensus for Blockchain in Internet of Things Networks via Reinforcement Learning48
A Deep Neural Collaborative Filtering Based Service Recommendation Method with Multi-Source Data for Smart Cloud-Edge Collaboration Applications47
High-Performance Flow Classification of Big Data Using Hybrid CPU-GPU Clusters of Cloud Environments46
ComPact: Edge Collaborative Spatiotemporal Graph Learning for Wind Speed Forecasting45
Exact and Approximation Algorithms for the Multi-Depot Capacitated Arc Routing Problems44
Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment42
Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning42
A novel QoS-based IoT network security approach with lightweight lattice-based quantum attribute-based encryption42
Residual convolutional graph neural network with subgraph attention pooling41
A Simple but Accurate Approximation for Multivariate Gaussian Rate-Distortion Function and Its Application in Maximal Coding Rate Reduction38
Quality-aware user recruitment based on federated learning in mobile crowd sensing37
MPformer: A Transformer-Based Model for Earthen Ruins Climate Prediction37
A Solution Supporting Secure Transmission of Big Data37
Acute Complication Prediction and Diagnosis Model CLSTM-BPR: A Fusion Method of Time Series Deep Learning and Bayesian Personalized Ranking36
Accurate and Scalable Anomaly Detection in Maternal Health Monitoring Systems35
Deep-EERA: DRL-Based Energy-Efficient Resource Allocation in UAV-Empowered Beyond 5G Networks34
CAE-IF: An Anomaly Detection Approach Based on Temporal Representation of the Reconstruction Error34
Quantifying Bytes: Understanding Practical Value of Data Assets in Federated Learning34
Optimizing Federated Incremental Learning: Efficient Malicious Data Removal for Big Data Analytics34
Multi-Agent Reinforcement Learning Optimization for Virtual Coupled Train Set Problem in CBTC Systems34
Efficient Lookup Table Based Z-Order Curve Encoding and Decoding: Algorithms, Parallelization, and Applications33
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication33
Anomaly detection of industrial control systems based on transfer learning33
An Ensemble Learning Model Based on Three-Way Decision for Concept Drift Adaptation33
Discrete Data-Driven Position and Orientation Control for Redundant Manipulators with Jacobian Matrix Learning32
PG-CODE: Latent dirichlet allocation embedded policy knowledge graph for government department coordination32
Increasing the Maximum Capacity Path in a Network and Its Application for Improving the Connection Between Two Routers31
IIN-FFD: Intra-Inter Network for Face Forgery Detection31
Fusing Syntactic Structure Information and Lexical Semantic Information for End-to-End Aspect-Based Sentiment Analysis31
A Hybrid Air Quality Prediction Model Based on Empirical Mode Decomposition31
A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing30
Focusing Ability Enhancement in Broadside Direction of Array: From UCA to UCCA29
Reset-Free Reinforcement Learning via Multi-State Recovery and Failure Prevention for Autonomous Robots28
Privacy-Preserving Unobtrusive Fall Detection for Older Adults: A Highly Generalized Deep Anomaly Detection Model28
Role Identification Based Method for Cyberbullying Analysis in Social Edge Computing28
Motion-Force Control of Redundant Manipulators: A Kinematics Approach to Synchronized Learning and Control of Position and Orientation27
ASNHC:Adaptive Switching Node with Hybrid Backscatter and Wireless Powered Communication26
Multiagent Reinforcement Learning Based on Structural Coordination26
Call for Papers: Special Issue on Neural Networks Depicted in ODEs with Applications26
A Two-Stage Approach for Electric Vehicle Routing Problem with Time Windows and Heterogeneous Recharging Stations26
Anti-interference low-power double-edge triggered flip-flop based on C-elements25
A Novel Popularity Extraction Method Applied in Session-Based Recommendation25
Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet24
Algorithms for the Prize-Collecting $k$-Steiner Tree Problem23
Interface modification of TiO2 electron transport layer with PbCl2 for perovskiote solar cells with carbon electrode23
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning23
BSIN: A Behavior Schema of Information Networks Based on Approximate Bisimulation23
Multi-Clock Snapshot Isolation Concurrency Control for NVM Database22
Cost-Based Research on Energy Management Strategy of Electric Vehicles Using Hybird Energy Storage System21
Effect Analysis of Factors and Time on SFEP Using Multimodal Streaming Data under Uncertain Conditions21
Semantic Markov Chain Using Synonymous Mapping21
Incorporating multi-scale module kernel for disease-gene identification in biological networks21
Decision-making Approach for Complex Network Defense Based on FlipIt Game20
Finite-Time Stability for Fuzzy Systems: A Weighted Sum-Based Dynamic Event-Triggered Mechanism20
Causality-Based Contrastive Incremental Learning Framework for Domain Generalization20
Identification of Key Genes as Potential Drug Targets for Gastric Cancer20
Client to Server: Heterogeneous Distribution Knowledge Transfer for Federated Learning19
GGC: Gray-granger causality method for sensor correlation network structure mining on high-speed train18
Few-Shot Object Detection via Dual-Domain Feature Fusion and Patch-Level Attention18
Exploring the Chameleon Effect of Contextual Dynamics in Temporal Knowledge Graph for Event Prediction18
Optimizing the Perceptual Quality of Time-Domain Speech Enhancement with Reinforcement Learning18
Indoor Human Fall Detection Algorithm Based on Wireless Sensing17
Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks17
An Improved Robust Sparse Convex Clustering17
Editorial17
Online Weakly DR-Submodular Optimization Under Stochastic Cumulative Constraints17
Self-Renewal Consortium Blockchain Based on Proof of Rest and Strong Smart Contracts17
A Novel Zeroing Neural Network for Time-Varying Matrix Pseudoinversion in the Presence of Linear Noises16
Time-Aware LSTM Neural Networks for Dynamic Personalized Recommendation on Business Intelligence16
Towards Federated Learning Driving Technology for Privacy-Preserving Micro-Expression Recognition16
A Constraint Adaptive Multi-Tasking Differential Evolution Algorithm: Designed for Dispatch of Integrated Energy System in Coal Mine16
Transformer and GAN-Based Super-Resolution Reconstruction Network for Medical Images15
Development and Application of Magnetoresistive Sensors in Current Detection15
Arm PSA-Certified IoT Chip Security: A Case Study15
Coevolutionary SGD for Improving Generalization15
Time-beacon beats Blockchain Trilemma15
Dynamic Task Offloading for Mobile Edge Computing with Hybrid Energy Supply15
A Survey of Zero-shot Image Classification: Concepts, Developments and Challenges15
A Survey of Edge Caching: Key Issues and Challenges15
Evaluation Method of Motor Coordination Ability in Children Based on Machine Vision14
Object Counting Using a Refinement Network14
Optimal Decisions for a Fresh Agricultural Product Supply Chain with Altruistic Behavior under Blockchain Technology14
Information Purification Network for Remote Sensing Image Super-Resolution14
An Electrical Impedance Imaging System Towards Edge Intelligence for Non-Destructive Testing of Concrete14
Fast and Scalable GPU-Based RPA Decoder for Reed-Muller Codes14
Multi-Influencing Factors Landslide Susceptibility Prediction Model Based on Monte Carlo Neural Network14
Performance Analysis for Digital Twin Enabled Vehicular Platoon based V2V Communication14
Quantum Superposition of Event Function States for Encryption-Decryption and the Entanglement Degree of System Fault Evolution Process14
Characteristics of Controlled Bridge Circuit and Its Application in Magnetic Field Induction Measurement14
A Light Application Level Virtualization Framework with Zero-Copy and Migration Agent14
Error-Accumulation Improved Newton Algorithm in Model Predictive Control for Novel Compliant Actuator-Driven Upper-Limb Exoskeleton14
Data-Driven Collaborative Scheduling Method for Multi-Satellite Data-Transmission14
Implementation of abstract MAC layer under jamming13
False Negative Sample Detection for Graph Contrastive Learning13
A High-Linear Radio Frequency Quadrature Modulator with Improved Sideband Suppression and Carrier Leakage Performance13
A Robust Transformer-Based Method for Object Tracking under Prolonged Occlusion13
DCVAE-adv: A Universal Adversarial Example Generation Method for White and Black Box Attacks13
GAAF: Searching Activation Functions for Binary Neural Networks Through Genetic Algorithm13
A Blockchain-Based Copyright Management Scheme for Open-Source Software and Hardware Designs13
CCDive: A Deep Dive into Code Clone Detection Using Local Sequence Alignment12
RPEU-Net: Residual Parallel Enhanced Attention Network for Left Atrial Segmentation12
Deep Time-Frequency Denoising Transform Defense for Spectrum Monitoring in Integrated Networks12
Empowering NP-Hard Problem Solving in Symmetric Cipher Attacks through the Global Optimization Capability of the Quantum Tunneling Effect12
Bilevel Optimal Infrastructure Planning Method for the Inland Battery Swapping Stations and Battery-Powered Ships12
Improving the SGD Optimizer from the Perspective of ODE for Plant Disease Identification12
Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing12
A Temporal Knowledge Graph Embedding Model Based on Variable Translation12
Three Dimensional Metal-Surface Processing Parameter Generation Through Machine Learning-Based Nonlinear Mapping12
A GNSS Anti-Spoofing Technique Based on the Spatial Distribution Characteristic of the Residual Vectors12
Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption12
Attention-Enhanced and Knowledge-Fused Dual Item Representations Network for Recommendation12
Approximation and Heuristic Algorithms for the Priority Facility Location Problem with Outliers12
Machine Learning for Selecting Important Clinical Markers of Imaging Subgroups of Cerebral Small Vessel Disease Based on a Common Data Model12
Enhanced 5G LDPC Codes and Their HARQ Scheme: Design and Performance Analysis11
A First Successful Factorization of RSA-2048 Integer by D-Wave Quantum Computer11
Plausible Heterogeneous Graph $k$-Anonymization for Social Networks11
Core Decomposition and Maintenance in Bipartite Graphs11
980 nm Near-Infrared Light-Emitting Diode Using All-Inorganic Perovskite Nanocrystals Doped with Ytterbium Ions11
DeepSI: A Sensitive-Driven Testing Samples Generation Method of Whitebox CNN Model for Edge Computing11
Adversarial training for supervised relation extraction11
MFF-YOLO: An Improved YOLO Algorithm Based on Multi-Scale Semantic Feature Fusion11
A Differential Privacy Protection Protocol Based on Location Entropy11
Optimized relinearization algorithm of the multikey homomorphic encryption scheme11
Editorial11
LETRNG—A Lightweight and Efficient True Random Number Generator for GNU/Linux Systems11
Joint Beamforming Design for RIS-Assisted Cell-Free Network with Multi-Hop Transmissions10
CAN: Effective cross features by global attention mechanism and neural network for ad click prediction10
Coevolutionary Neural Dynamics Considering Multiple Strategies for Nonconvex Optimization10
A Review of Deep Reinforcement Learning Methods for Production Scheduling10
Near-Threshold Wide-Voltage Design Review10
Enhancing Power Line Insulator Health Monitoring with a Hybrid Generative Adversarial Network and YOLO3 Solution10
Decoupled Two-Phase Framework for Class-Incremental Few-Shot Named Entity Recognition10
Semi-Supervised Cardiac CT Segmentation by Cross-Supervision10
PrivBV: Distance-aware encoding for distributed data with local differential privacy10
Prompting and Tuning: A Two-Stage Unsupervised Domain Adaptive Person Re-identification Method on Vision Transformer Backbone9
A Time-Varying Hill Cipher for Dynamic Image Cryptography9
Diffusion Models for Medical Image Computing: A Survey9
Differentially Private System for Residential Energy Management via Markov Decision Process9
A physics-informed glucose-insulin neural network model for glucose prediction9
Pretrained models and evaluation data for the Khmer language9
CPT: A Configurable Predictability Testbed for DNN Inference in AVs9
A Variance Reducing Stochastic Proximal Method with Acceleration Techniques9
A Very Compact and a Threshold Implementation of uBlock for Internet of Things9
A Multi-Hyperparameter Prediction Framework for Distributed Energy Trading on Photovoltaic Network9
Extensible Bloom Filters: Adaptive Strategies for Scalability and Efficiency in Network and Distributed Systems to Handle Increased Data9
0.095175981521606