Tsinghua Science and Technology

Papers
(The TQCC of Tsinghua Science and Technology is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Proxy-Based Embedding Alignment for RGB-Infrared Person Re-Identification318
Call for Papers—Special Issue on Hybrid Energy Storage System-Based Electric Vehicles: Actions and Challenges170
Restage: Relation Structure-Aware Hierarchical Heterogeneous Graph Embedding157
Resource Management and Trajectory Optimization for UAV-IRS Assisted Maritime Edge Computing Networks154
Design of a Maritime Autoencoder Communication System Based on Attention Mechanisms and DenseBlock131
Deciphering a Million-Plus RSA Integer with Ultralow Local Field Coefficient h and Coupling Coefficient J of the Ising Model by D-Wave 2000Q107
DEFOG: Deep Learning with Attention Mechanism Enabled Cross-Age Face Recognition100
A novel QoS-based IoT network security approach with lightweight lattice-based quantum attribute-based encryption94
Graph Structure Learning for Robust Recommendation79
High-Performance Flow Classification of Big Data Using Hybrid CPU-GPU Clusters of Cloud Environments73
Residual convolutional graph neural network with subgraph attention pooling54
Optimized Consensus for Blockchain in Internet of Things Networks via Reinforcement Learning53
Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models51
Exact and Approximation Algorithms for the Multi-Depot Capacitated Arc Routing Problems48
A dynamic and deadline-oriented road pricing mechanism for urban traffic management48
Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment48
An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages47
Key Mechanisms on Resource Optimization Allocation in Minority Game Based on Reinforcement Learning46
Quality-aware user recruitment based on federated learning in mobile crowd sensing45
Algorithmic Perspectives on Active Object Recognition Systems: A Survey45
Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection45
Fast and Efficient Algorithm for Tibetan Jiu Chess Gameplay Data Collecting Based on Improved YOLOv8n Model44
Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning43
AMTrans: Auto-Correlation Multi-Head Attention Transformer for Infrared Spectral Deconvolution43
A Deep Neural Collaborative Filtering Based Service Recommendation Method with Multi-Source Data for Smart Cloud-Edge Collaboration Applications42
Acute Complication Prediction and Diagnosis Model CLSTM-BPR: A Fusion Method of Time Series Deep Learning and Bayesian Personalized Ranking39
Increasing the Maximum Capacity Path in a Network and Its Application for Improving the Connection Between Two Routers39
Quantifying Bytes: Understanding Practical Value of Data Assets in Federated Learning36
Fusing Syntactic Structure Information and Lexical Semantic Information for End-to-End Aspect-Based Sentiment Analysis35
Deep-EERA: DRL-Based Energy-Efficient Resource Allocation in UAV-Empowered Beyond 5G Networks35
IIN-FFD: Intra-Inter Network for Face Forgery Detection34
A Solution Supporting Secure Transmission of Big Data34
MPformer: A Transformer-Based Model for Earthen Ruins Climate Prediction34
Multi-Agent Reinforcement Learning Optimization for Virtual Coupled Train Set Problem in CBTC Systems33
CAE-IF: An Anomaly Detection Approach Based on Temporal Representation of the Reconstruction Error33
Mode-Difference-Based Vortex Microwave Photon Anti-Chaff-Jamming Radar33
A Hybrid Air Quality Prediction Model Based on Empirical Mode Decomposition32
Optimizing Federated Incremental Learning: Efficient Malicious Data Removal for Big Data Analytics32
PG-CODE: Latent dirichlet allocation embedded policy knowledge graph for government department coordination31
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication31
Focusing Ability Enhancement in Broadside Direction of Array: From UCA to UCCA31
Reset-Free Reinforcement Learning via Multi-State Recovery and Failure Prevention for Autonomous Robots30
Anomaly detection of industrial control systems based on transfer learning30
Call for Papers: Special Issue on Neural Networks Depicted in ODEs with Applications30
Accurate and Scalable Anomaly Detection in Maternal Health Monitoring Systems30
Anti-interference low-power double-edge triggered flip-flop based on C-elements30
A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing30
Role Identification Based Method for Cyberbullying Analysis in Social Edge Computing29
Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet29
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning28
A Two-Stage Approach for Electric Vehicle Routing Problem with Time Windows and Heterogeneous Recharging Stations27
ASNHC:Adaptive Switching Node with Hybrid Backscatter and Wireless Powered Communication27
Motion-Force Control of Redundant Manipulators: A Kinematics Approach to Synchronized Learning and Control of Position and Orientation26
Multi-Clock Snapshot Isolation Concurrency Control for NVM Database26
A Novel Popularity Extraction Method Applied in Session-Based Recommendation26
Privacy-Preserving Unobtrusive Fall Detection for Older Adults: A Highly Generalized Deep Anomaly Detection Model26
Causality-Based Contrastive Incremental Learning Framework for Domain Generalization25
Few-Shot Object Detection via Dual-Domain Feature Fusion and Patch-Level Attention24
Exploring the Chameleon Effect of Contextual Dynamics in Temporal Knowledge Graph for Event Prediction24
Algorithms for the Prize-Collecting $k$-Steiner Tree Problem24
BSIN: A Behavior Schema of Information Networks Based on Approximate Bisimulation23
Indoor Human Fall Detection Algorithm Based on Wireless Sensing23
Client to Server: Heterogeneous distribution Knowledge transfer for Federated Learning 23
GGC: Gray-granger causality method for sensor correlation network structure mining on high-speed train23
Finite-Time Stability for Fuzzy Systems: A Weighted Sum-Based Dynamic Event-Triggered Mechanism22
Incorporating multi-scale module kernel for disease-gene identification in biological networks22
Identification of Key Genes as Potential Drug Targets for Gastric Cancer21
Decision-making Approach for Complex Network Defense Based on FlipIt Game21
Cost-Based Research on Energy Management Strategy of Electric Vehicles Using Hybird Energy Storage System20
Optimizing the Perceptual Quality of Time-Domain Speech Enhancement with Reinforcement Learning20
Self-Renewal Consortium Blockchain Based on Proof of Rest and Strong Smart Contracts19
An Improved Robust Sparse Convex Clustering19
Interface modification of TiO2 electron transport layer with PbCl2 for perovskiote solar cells with carbon electrode19
Online Weakly DR-Submodular Optimization Under Stochastic Cumulative Constraints19
Editorial19
Time-Aware LSTM Neural Networks for Dynamic Personalized Recommendation on Business Intelligence18
Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks18
Transformer and GAN-Based Super-Resolution Reconstruction Network for Medical Images18
Time-beacon beats Blockchain Trilemma18
A Survey of Zero-shot Image Classification: Concepts, Developments and Challenges18
Distributed scheduling problems in intelligent manufacturing systems17
Dynamic Task Offloading for Mobile Edge Computing with Hybrid Energy Supply17
Arm PSA-Certified IoT Chip Security: A Case Study17
A Survey of Edge Caching: Key Issues and Challenges17
Object Counting Using a Refinement Network16
Development and Application of Magnetoresistive Sensors in Current Detection16
Multi-Influencing Factors Landslide Susceptibility Prediction Model Based on Monte Carlo Neural Network16
A Constraint Adaptive Multi-Tasking Differential Evolution Algorithm: Designed for Dispatch of Integrated Energy System in Coal Mine16
Evaluation Method of Motor Coordination Ability in Children Based on Machine Vision16
Coevolutionary SGD for Improving Generalization16
Optimal Decisions for a Fresh Agricultural Product Supply Chain with Altruistic Behavior under Blockchain Technology15
Implementation of abstract MAC layer under jamming15
Fast and Scalable GPU-Based RPA Decoder for Reed-Muller Codes15
Performance Analysis for Digital Twin Enabled Vehicular Platoon based V2V Communication15
A Light Application Level Virtualization Framework with Zero-Copy and Migration Agent15
A High-Linear Radio Frequency Quadrature Modulator with Improved Sideband Suppression and Carrier Leakage Performance14
An Electrical Impedance Imaging System Towards Edge Intelligence for Non-Destructive Testing of Concrete14
Characteristics of Controlled Bridge Circuit and Its Application in Magnetic Field Induction Measurement14
Data-Driven Collaborative Scheduling Method for Multi-Satellite Data-Transmission14
Information Purification Network for Remote Sensing Image Super-Resolution14
Attention-Enhanced and Knowledge-Fused Dual Item Representations Network for Recommendation13
False Negative Sample Detection for Graph Contrastive Learning13
A Blockchain-Based Copyright Management Scheme for Open-Source Software and Hardware Designs13
Trust-Aware Hybrid Collaborative Recommendation with Locality-Sensitive Hashing13
Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption13
DCVAE-adv: A Universal Adversarial Example Generation Method for White and Black Box Attacks13
GAAF: Searching Activation Functions for Binary Neural Networks Through Genetic Algorithm13
A Robust Transformer-Based Method for Object Tracking under Prolonged Occlusion13
Deep Time-Frequency Denoising Transform Defense for Spectrum Monitoring in Integrated Networks12
Enhancing Medical Assistance Through Secure Federated Edge Data Augmentation with Local Differential Privacy in Non-IID Scenarios12
CCDive: A Deep Dive into Code Clone Detection Using Local Sequence Alignment12
A GNSS Anti-Spoofing Technique Based on the Spatial Distribution Characteristic of the Residual Vectors12
Hiding Functions within Functions: Steganography by Implicit Neural Representations12
A Temporal Knowledge Graph Embedding Model Based on Variable Translation12
Adversarial training for supervised relation extraction12
Plausible Heterogeneous Graph $k$-Anonymization for Social Networks12
Improving the SGD Optimizer from the Perspective of ODE for Plant Disease Identification12
Deep reinforcement learning based mobile robot navigation: A review12
DeepSI: A Sensitive-Driven Testing Samples Generation Method of Whitebox CNN Model for Edge Computing12
980 nm Near-Infrared Light-Emitting Diode Using All-Inorganic Perovskite Nanocrystals Doped with Ytterbium Ions11
Bilevel Optimal Infrastructure Planning Method for the Inland Battery Swapping Stations and Battery-Powered Ships11
A First Successful Factorization of RSA-2048 Integer by D-Wave Quantum Computer11
Core Decomposition and Maintenance in Bipartite Graphs11
Machine Learning for Selecting Important Clinical Markers of Imaging Subgroups of Cerebral Small Vessel Disease Based on a Common Data Model11
Three Dimensional Metal-Surface Processing Parameter Generation Through Machine Learning-Based Nonlinear Mapping11
Optimized relinearization algorithm of the multikey homomorphic encryption scheme11
Editorial11
Decoupled Two-Phase Framework for Class-Incremental Few-Shot Named Entity Recognition11
A Differential Privacy Protection Protocol Based on Location Entropy11
Approximation and Heuristic Algorithms for the Priority Facility Location Problem with Outliers11
LETRNG—A Lightweight and Efficient True Random Number Generator for GNU/Linux Systems11
Joint Beamforming Design for RIS-Assisted Cell-Free Network with Multi-Hop Transmissions11
Coevolutionary Neural Dynamics Considering Multiple Strategies for Nonconvex Optimization10
CAN: Effective cross features by global attention mechanism and neural network for ad click prediction10
Wearable Continuous Blood Pressure Monitoring Based on Pulsatile Cycle Volume Adjustment Method10
Enhancing Power Line Insulator Health Monitoring with a Hybrid Generative Adversarial Network and YOLO3 Solution10
eTSDF: An Energy-Efficient Accelerator for TSDF-Based 3D Scene Reconstruction in FPGAs10
A Time-varying Hill Cipher for Dynamic Image Cryptography10
A Multi-Hyperparameter Prediction Framework for Distributed Energy Trading on Photovoltaic Network10
Near-Threshold Wide-Voltage Design Review10
PrivBV: Distance-aware encoding for distributed data with local differential privacy10
A Variance Reducing Stochastic Proximal Method with Acceleration Techniques10
Prompting and Tuning: A Two-Stage Unsupervised Domain Adaptive Person Re-identification Method on Vision Transformer Backbone10
0.084672927856445