Tsinghua Science and Technology

Papers
(The TQCC of Tsinghua Science and Technology is 12. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Deep reinforcement learning based mobile robot navigation: A review150
Artificial intelligence for edge service optimization in Internet of Vehicles: A survey113
Collaborative city digital twin for the COVID-19 pandemic: A federated learning solution111
Complex network classification with convolutional neural network105
A hybrid unsupervised clustering-based anomaly detection method98
Distributed scheduling problems in intelligent manufacturing systems95
Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT86
EVchain: An Anonymous Blockchain-Based System for Charging-Connected Electric Vehicles78
Utility aware offloading for mobile-edge computing74
Anomaly detection of industrial control systems based on transfer learning73
Hardware implementation of spiking neural networks on FPGA64
Decomposition-based multi-objective optimization for energy-aware distributed hybrid flow shop scheduling with multiprocessor tasks62
Improved Dota2 lineup recommendation model based on a bidirectional LSTM58
Personalized real-time movie recommendation system: Practical prototype and evaluation56
A multi-objective optimization method of initial virtual machine fault-tolerant placement for star topological data centers of cloud systems55
Enhanced learning resource recommendation based on online learning style model52
Cybersecurity named entity recognition using bidirectional long short-term memory with conditional random fields49
Survey of pedestrian action recognition techniques for autonomous driving44
A PUF-based and cloud-assisted lightweight authentication for multi-hop body area network43
Dynamic Task Offloading for Mobile Edge Computing with Hybrid Energy Supply41
Consideration of the local correlation of learning behaviors to predict dropouts from MOOCs37
Dataflow Management in the Internet of Things: Sensing, Control, and Security37
Transportation mode identification with GPS trajectory data and GIS information36
Automatic modulation recognition based on CNN and GRU36
A time-aware dynamic service quality prediction approach for services35
Intrusion detection system using voting-based neural network34
A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing32
Preserving personalized location privacy in ride-hailing service32
Graph neural architecture search: A survey30
Machine learning-based multi-modal information perception for soft robotic hands30
Effect of image noise on the classification of skin lesions using deep convolutional neural networks30
An inception module CNN classifiers fusion method on pulmonary nodule diagnosis by signs29
Developments and applications of tunneling magnetoresistance sensors28
Quality-aware user recruitment based on federated learning in mobile crowd sensing28
Fractional-order proportional-integral-derivative linear active disturbance rejection control design and parameter optimization for hypersonic vehicles with actuator faults28
News keyword extraction algorithm based on semantic clustering and word graph model28
Access control and authorization in smart homes: A survey27
A data-driven clustering recommendation method for single-cell RNA-sequencing data27
Convergence of broadband and broadcast/multicast in maritime information networks26
Spatial-temporal ConvLSTM for vehicle driving intention prediction26
A novel hybrid method to analyze security vulnerabilities in Android applications26
TW-Co-MFC: Two-level weighted collaborative fuzzy clustering based on maximum entropy for multi-view data26
Event temporal relation extraction with attention mechanism and graph neural network25
Memristor-based signal processing for edge computing24
A novel cross-project software defect prediction algorithm based on transfer learning24
A generative method for steganography by cover synthesis with auxiliary semantics23
ePUF: A lightweight double identity verification in IoT23
Inertial motion tracking on mobile and wearable devices: Recent advancements and challenges22
5Ws of green and sustainable software22
A Chan-Vese model based on the Markov chain for unsupervised medical image segmentation22
Deep learning-based classification of the polar emotions of "moe"-style cartoon pictures22
Distributed Consensus for Blockchains in Internet-of-Things Networks21
Mobile multimedia computing in cyber-physical surveillance services through UAV-borne Video-SAR: A taxonomy of intelligent data processing for IoMT-enabled radar sensor networks20
A Survey of Human Action Recognition and Posture Prediction20
Enriching the transfer learning with pre-trained lexicon embedding for low-resource neural machine translation20
HTDet: A clustering method using information entropy for hardware Trojan detection20
Reliable data storage in heterogeneous wireless sensor networks by jointly optimizing routing and storage node deployment20
Security issues and defensive approaches in deep learning frameworks19
Smart attendance system based on frequency distribution algorithm with passive RFID tags19
A survey of game theory as applied to social networks17
Cross-modal complementary network with hierarchical fusion for multimodal sentiment classification17
A cascade model-aware generative adversarial example detection method17
Brief introduction of TianHe exascale prototype system17
POI neural-rec model via graph embedding representation17
A cross-layer cooperative jamming scheme for social internet of things16
Mutation testing for integer overflow in ethereum smart contracts16
Incremental face clustering with optimal summary learning via graph convolutional network16
Multi-agent modeling and simulation in the AI age16
Balance resource allocation for spark jobs based on prediction of the optimal resource16
Combining residual attention mechanisms and generative adversarial networks for hippocampus segmentation16
Context-aware social media user sentiment analysis15
Metabolite-disease association prediction algorithm combining DeepWalk and random forest15
MHGCN: Multiview highway graph convolutional network for cross-lingual entity alignment15
An architecture for software engineering gamification15
NetEPD: A network-based essential protein discovery platform15
Residual convolutional graph neural network with subgraph attention pooling14
Monte Carlo Simulation-Based Robust Workflow Scheduling for Spot Instances in Cloud Environments14
Efficient publication of distributed and overlapping graph data under differential privacy14
Modelling the dropout patterns of MOOC learners14
Challenges and opportunities in algorithmic solutions for re-balancing in bike sharing systems13
Robust segmentation method for noisy images based on an unsupervised denosing filter13
Modified multi-key fully homomorphic encryption based on NTRU cryptosystem without key-switching13
WAEAS: An optimization scheme of EAS scheduler for wearable applications13
Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption13
Link-privacy preserving graph embedding data publication with adversarial learning13
IDEA: A utility-enhanced approach to incomplete data stream anonymization13
CAN: Effective cross features by global attention mechanism and neural network for ad click prediction12
Overview of ultra-wideband transceivers—system architectures and applications12
A memory-related vulnerability detection approach based on vulnerability features12
A computer-aided system for ocular myasthenia gravis diagnosis12
Sampling-based approximate skyline query in sensor equipped IoT networks12
Study of texture segmentation and classification for grading small hepatocellular carcinoma based on CT images12
0.11834406852722