Tsinghua Science and Technology

Papers
(The TQCC of Tsinghua Science and Technology is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning311
Proxy-Based Embedding Alignment for RGB-Infrared Person Re-Identification168
Call for Papers—Special Issue on Hybrid Energy Storage System-Based Electric Vehicles: Actions and Challenges155
Restage: Relation Structure-Aware Hierarchical Heterogeneous Graph Embedding152
Resource Management and Trajectory Optimization for UAV-IRS Assisted Maritime Edge Computing Networks129
Design of a Maritime Autoencoder Communication System Based on Attention Mechanisms and DenseBlock107
Deciphering a Million-Plus RSA Integer with Ultralow Local Field Coefficient h and Coupling Coefficient J of the Ising Model by D-Wave 2000Q100
DEFOG: Deep Learning with Attention Mechanism Enabled Cross-Age Face Recognition90
A novel QoS-based IoT network security approach with lightweight lattice-based quantum attribute-based encryption75
Optimized Consensus for Blockchain in Internet of Things Networks via Reinforcement Learning71
High-Performance Flow Classification of Big Data Using Hybrid CPU-GPU Clusters of Cloud Environments61
Residual convolutional graph neural network with subgraph attention pooling54
Graph Structure Learning for Robust Recommendation51
Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection49
A dynamic and deadline-oriented road pricing mechanism for urban traffic management48
An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages46
Exact and Approximation Algorithms for the Multi-Depot Capacitated Arc Routing Problems46
AMTrans: Auto-Correlation Multi-Head Attention Transformer for Infrared Spectral Deconvolution45
Quality-aware user recruitment based on federated learning in mobile crowd sensing45
Key Mechanisms on Resource Optimization Allocation in Minority Game Based on Reinforcement Learning45
Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models43
Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment42
A Deep Neural Collaborative Filtering Based Service Recommendation Method with Multi-Source Data for Smart Cloud-Edge Collaboration Applications42
Effect of chloride Ion concentrations on luminescence peak blue shift of light-emitting diode using anti-solvent extraction of quasi-two-dimensional perovskite41
Increasing the Maximum Capacity Path in a Network and Its Application for Improving the Connection Between Two Routers41
Fusing Syntactic Structure Information and Lexical Semantic Information for End-to-End Aspect-Based Sentiment Analysis40
Acute Complication Prediction and Diagnosis Model CLSTM-BPR: A Fusion Method of Time Series Deep Learning and Bayesian Personalized Ranking40
MPformer: A Transformer-Based Model for Earthen Ruins Climate Prediction39
A Solution Supporting Secure Transmission of Big Data38
IIN-FFD: Intra-Inter Network for Face Forgery Detection35
PG-CODE: Latent dirichlet allocation embedded policy knowledge graph for government department coordination34
Quantifying Bytes: Understanding Practical Value of Data Assets in Federated Learning34
A Hybrid Air Quality Prediction Model Based on Empirical Mode Decomposition34
Focusing Ability Enhancement in Broadside Direction of Array: From UCA to UCCA33
Deep-EERA: DRL-Based Energy-Efficient Resource Allocation in UAV-Empowered Beyond 5G Networks33
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication32
Anomaly detection of industrial control systems based on transfer learning32
Exploiting sparse representation in the P300 speller paradigm31
A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing31
Reset-Free Reinforcement Learning via Multi-State Recovery and Failure Prevention for Autonomous Robots31
Anti-interference low-power double-edge triggered flip-flop based on C-elements30
A Two-Stage Approach for Electric Vehicle Routing Problem with Time Windows and Heterogeneous Recharging Stations30
Call for Papers: Special Issue on Neural Networks Depicted in ODEs with Applications30
Role Identification Based Method for Cyberbullying Analysis in Social Edge Computing29
A Novel Popularity Extraction Method Applied in Session-Based Recommendation29
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning29
Multi-Clock Snapshot Isolation Concurrency Control for NVM Database28
Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet28
Interface modification of TiO2 electron transport layer with PbCl2 for perovskiote solar cells with carbon electrode28
Natural disasters warning for enterprises through fuzzy keywords search28
Optimizing the Perceptual Quality of Time-Domain Speech Enhancement with Reinforcement Learning28
Intrusion detection system using voting-based neural network28
Trident: Efficient and practical software network monitoring27
Cost-Based Research on Energy Management Strategy of Electric Vehicles Using Hybird Energy Storage System26
Few-Shot Object Detection via Dual-Domain Feature Fusion and Patch-Level Attention26
Indoor Human Fall Detection Algorithm Based on Wireless Sensing26
Causality-Based Contrastive Incremental Learning Framework for Domain Generalization26
Exploring the Chameleon Effect of Contextual Dynamics in Temporal Knowledge Graph for Event Prediction25
BSIN: A Behavior Schema of Information Networks Based on Approximate Bisimulation25
GGC: Gray-granger causality method for sensor correlation network structure mining on high-speed train22
Algorithms for the Prize-Collecting $k$-Steiner Tree Problem22
Identification of Key Genes as Potential Drug Targets for Gastric Cancer22
Online Weakly DR-Submodular Optimization Under Stochastic Cumulative Constraints21
Self-Renewal Consortium Blockchain Based on Proof of Rest and Strong Smart Contracts21
A multilevel splitting algorithm for quick sampling21
Time-Aware LSTM Neural Networks for Dynamic Personalized Recommendation on Business Intelligence20
Time-beacon beats Blockchain Trilemma20
Distributed scheduling problems in intelligent manufacturing systems20
Editorial20
A Survey of Edge Caching: Key Issues and Challenges20
Dynamic Task Offloading for Mobile Edge Computing with Hybrid Energy Supply20
An Improved Robust Sparse Convex Clustering20
Arm PSA-Certified IoT Chip Security: A Case Study19
Transformer and GAN-Based Super-Resolution Reconstruction Network for Medical Images19
A Constraint Adaptive Multi-Tasking Differential Evolution Algorithm: Designed for Dispatch of Integrated Energy System in Coal Mine19
Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks19
Object Counting Using a Refinement Network18
Evaluation Method of Motor Coordination Ability in Children Based on Machine Vision18
Implementation of abstract MAC layer under jamming18
Multi-Influencing Factors Landslide Susceptibility Prediction Model Based on Monte Carlo Neural Network18
Characteristics of Controlled Bridge Circuit and Its Application in Magnetic Field Induction Measurement17
An Electrical Impedance Imaging System Towards Edge Intelligence for Non-Destructive Testing of Concrete17
Information Purification Network for Remote Sensing Image Super-Resolution17
Data-Driven Collaborative Scheduling Method for Multi-Satellite Data-Transmission17
GAAF: Searching Activation Functions for Binary Neural Networks Through Genetic Algorithm16
A High-Linear Radio Frequency Quadrature Modulator with Improved Sideband Suppression and Carrier Leakage Performance16
Attention-Enhanced and Knowledge-Fused Dual Item Representations Network for Recommendation16
DCVAE-adv: A Universal Adversarial Example Generation Method for White and Black Box Attacks16
Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption15
A Temporal Knowledge Graph Embedding Model Based on Variable Translation15
A Blockchain-Based Copyright Management Scheme for Open-Source Software and Hardware Designs15
False Negative Sample Detection for Graph Contrastive Learning15
A GNSS Anti-Spoofing Technique Based on the Spatial Distribution Characteristic of the Residual Vectors14
Adversarial training for supervised relation extraction14
Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing14
DeepSI: A Sensitive-Driven Testing Samples Generation Method of Whitebox CNN Model for Edge Computing14
CCDive: A Deep Dive into Code Clone Detection Using Local Sequence Alignment14
Plausible Heterogeneous Graph $k$-Anonymization for Social Networks14
Deep Time-Frequency Denoising Transform Defense for Spectrum Monitoring in Integrated Networks14
Deep reinforcement learning based mobile robot navigation: A review14
Three Dimensional Metal-Surface Processing Parameter Generation Through Machine Learning-Based Nonlinear Mapping13
Bilevel Optimal Infrastructure Planning Method for the Inland Battery Swapping Stations and Battery-Powered Ships13
Editorial13
980 nm Near-Infrared Light-Emitting Diode Using All-Inorganic Perovskite Nanocrystals Doped with Ytterbium Ions13
Approximation and Heuristic Algorithms for the Priority Facility Location Problem with Outliers13
Optimized relinearization algorithm of the multikey homomorphic encryption scheme13
A First Successful Factorization of RSA-2048 Integer by D-Wave Quantum Computer13
A Differential Privacy Protection Protocol Based on Location Entropy13
Machine Learning for Selecting Important Clinical Markers of Imaging Subgroups of Cerebral Small Vessel Disease Based on a Common Data Model13
Core Decomposition and Maintenance in Bipartite Graphs12
Enhancing Power Line Insulator Health Monitoring with a Hybrid Generative Adversarial Network and YOLO3 Solution12
Prompting and Tuning: A Two-Stage Unsupervised Domain Adaptive Person Re-identification Method on Vision Transformer Backbone12
Decoupled Two-Phase Framework for Class-Incremental Few-Shot Named Entity Recognition12
CAN: Effective cross features by global attention mechanism and neural network for ad click prediction12
PrivBV: Distance-aware encoding for distributed data with local differential privacy12
LETRNG—A Lightweight and Efficient True Random Number Generator for GNU/Linux Systems12
Joint Beamforming Design for RIS-Assisted Cell-Free Network with Multi-Hop Transmissions12
Near-Threshold Wide-Voltage Design Review12
Monte Carlo Simulation-Based Robust Workflow Scheduling for Spot Instances in Cloud Environments11
Review of technologies for high-voltage integrated circuits11
CPT: A Configurable Predictability Testbed for DNN Inference in AVs11
Loop Subgraph-Level Greedy Mapping Algorithm for Grid Coarse-Grained Reconfigurable Array11
Diffusion Models for Medical Image Computing: A Survey11
A Privacy Policy Text Compliance Reasoning Framework with Large Language Models for Healthcare Services11
Wearable Continuous Blood Pressure Monitoring Based on Pulsatile Cycle Volume Adjustment Method11
Nonnegative matrix tri-factorization based clustering in a heterogeneous information network with star network schema11
Extensible Bloom Filters: Adaptive Strategies for Scalability and Efficiency in Network and Distributed Systems to Handle Increased Data11
A Variance Reducing Stochastic Proximal Method with Acceleration Techniques11
A Multi-Hyperparameter Prediction Framework for Distributed Energy Trading on Photovoltaic Network11
0.18474388122559