Tsinghua Science and Technology

Papers
(The TQCC of Tsinghua Science and Technology is 11. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
AMTrans: Auto-Correlation Multi-Head Attention Transformer for Infrared Spectral Deconvolution292
Optimizing Risk-Aware Task Migration Algorithm Among Multiplex UAV Groups Through Hybrid Attention Multi-Agent Reinforcement Learning158
Proxy-Based Embedding Alignment for RGB-Infrared Person Re-Identification150
Few-Shot Graph Classification with Structural-Enhanced Contrastive Learning for Graph Data Copyright Protection146
Call for Papers—Special Issue on Hybrid Energy Storage System-Based Electric Vehicles: Actions and Challenges127
Restage: Relation Structure-Aware Hierarchical Heterogeneous Graph Embedding102
Deciphering a Million-Plus RSA Integer with Ultralow Local Field Coefficient h and Coupling Coefficient J of the Ising Model by D-Wave 2000Q99
Artificial Intelligence Enabled Future Wireless Electric Vehicles with Multi-Model Learning and Decision Making Models89
DEFOG: Deep Learning with Attention Mechanism Enabled Cross-Age Face Recognition70
A novel QoS-based IoT network security approach with lightweight lattice-based quantum attribute-based encryption69
High-Performance Flow Classification of Big Data Using Hybrid CPU-GPU Clusters of Cloud Environments64
Residual convolutional graph neural network with subgraph attention pooling56
Quality-aware user recruitment based on federated learning in mobile crowd sensing51
Optimized Consensus for Blockchain in Internet of Things Networks via Reinforcement Learning50
A dynamic and deadline-oriented road pricing mechanism for urban traffic management48
Intelligent Computational Model for Energy Efficiency and AI Automation of Network Devices in 5G Communication Environment45
A Deep Neural Collaborative Filtering Based Service Recommendation Method with Multi-Source Data for Smart Cloud-Edge Collaboration Applications44
Exact and Approximation Algorithms for the Multi-Depot Capacitated Arc Routing Problems44
Key Mechanisms on Resource Optimization Allocation in Minority Game Based on Reinforcement Learning43
An Optimal Pricing and Ordering Policy with Trapezoidal-Type Demand Under Partial Backlogged Shortages41
Effect of chloride Ion concentrations on luminescence peak blue shift of light-emitting diode using anti-solvent extraction of quasi-two-dimensional perovskite40
Acute Complication Prediction and Diagnosis Model CLSTM-BPR: A Fusion Method of Time Series Deep Learning and Bayesian Personalized Ranking38
Increasing the Maximum Capacity Path in a Network and Its Application for Improving the Connection Between Two Routers38
A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing37
Quantifying Bytes: Understanding Practical Value of Data Assets in Federated Learning37
MPformer: A Transformer-Based Model for Earthen Ruins Climate Prediction37
PG-CODE: Latent dirichlet allocation embedded policy knowledge graph for government department coordination37
IIN-FFD: Intra-Inter Network for Face Forgery Detection35
A Solution Supporting Secure Transmission of Big Data35
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication34
A Hybrid Air Quality Prediction Model Based on Empirical Mode Decomposition34
Focusing Ability Enhancement in Broadside Direction of Array: From UCA to UCCA33
Anomaly detection of industrial control systems based on transfer learning32
Fusing Syntactic Structure Information and Lexical Semantic Information for End-to-End Aspect-Based Sentiment Analysis32
Deep-EERA: DRL-Based Energy-Efficient Resource Allocation in UAV-Empowered Beyond 5G Networks32
Exploiting sparse representation in the P300 speller paradigm31
A Novel Popularity Extraction Method Applied in Session-Based Recommendation30
Anti-interference low-power double-edge triggered flip-flop based on C-elements30
Intrusion detection system using voting-based neural network30
Reset-Free Reinforcement Learning via Multi-State Recovery and Failure Prevention for Autonomous Robots30
Call for Papers: Special Issue on Neural Networks Depicted in ODEs with Applications29
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning29
A Two-Stage Approach for Electric Vehicle Routing Problem with Time Windows and Heterogeneous Recharging Stations29
Multi-Clock Snapshot Isolation Concurrency Control for NVM Database28
Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet28
Natural disasters warning for enterprises through fuzzy keywords search28
Optimizing the Perceptual Quality of Time-Domain Speech Enhancement with Reinforcement Learning27
Trident: Efficient and practical software network monitoring26
GGC: Gray-granger causality method for sensor correlation network structure mining on high-speed train26
Cost-Based Research on Energy Management Strategy of Electric Vehicles Using Hybird Energy Storage System26
Interface modification of TiO2 electron transport layer with PbCl2 for perovskiote solar cells with carbon electrode26
Indoor Human Fall Detection Algorithm Based on Wireless Sensing25
BSIN: A Behavior Schema of Information Networks Based on Approximate Bisimulation25
Few-Shot Object Detection via Dual-Domain Feature Fusion and Patch-Level Attention25
Time-Aware LSTM Neural Networks for Dynamic Personalized Recommendation on Business Intelligence24
Identification of Key Genes as Potential Drug Targets for Gastric Cancer24
Algorithms for the Prize-Collecting $k$-Steiner Tree Problem24
A multilevel splitting algorithm for quick sampling24
Exploring the Chameleon Effect of Contextual Dynamics in Temporal Knowledge Graph for Event Prediction24
Online Weakly DR-Submodular Optimization Under Stochastic Cumulative Constraints23
Self-Renewal Consortium Blockchain Based on Proof of Rest and Strong Smart Contracts23
An Improved Robust Sparse Convex Clustering21
Editorial21
Time-beacon beats Blockchain Trilemma20
Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks20
A Constraint Adaptive Multi-Tasking Differential Evolution Algorithm: Designed for Dispatch of Integrated Energy System in Coal Mine20
Arm PSA-Certified IoT Chip Security: A Case Study20
Evaluation Method of Motor Coordination Ability in Children Based on Machine Vision19
Distributed scheduling problems in intelligent manufacturing systems19
Multi-Influencing Factors Landslide Susceptibility Prediction Model Based on Monte Carlo Neural Network19
Transformer and GAN-Based Super-Resolution Reconstruction Network for Medical Images19
Dynamic Task Offloading for Mobile Edge Computing with Hybrid Energy Supply19
A Survey of Edge Caching: Key Issues and Challenges19
Object Counting Using a Refinement Network18
An Electrical Impedance Imaging System Towards Edge Intelligence for Non-Destructive Testing of Concrete18
TCLBM: A task chain-based load balancing algorithm for microservices17
Implementation of abstract MAC layer under jamming17
A High-Linear Radio Frequency Quadrature Modulator with Improved Sideband Suppression and Carrier Leakage Performance17
Characteristics of Controlled Bridge Circuit and Its Application in Magnetic Field Induction Measurement17
Data-Driven Collaborative Scheduling Method for Multi-Satellite Data-Transmission17
Information Purification Network for Remote Sensing Image Super-Resolution17
Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption16
DCVAE-adv: A Universal Adversarial Example Generation Method for White and Black Box Attacks16
GAAF: Searching Activation Functions for Binary Neural Networks Through Genetic Algorithm16
Attention-Enhanced and Knowledge-Fused Dual Item Representations Network for Recommendation16
Three Dimensional Metal-Surface Processing Parameter Generation Through Machine Learning-Based Nonlinear Mapping15
False Negative Sample Detection for Graph Contrastive Learning15
Deep reinforcement learning based mobile robot navigation: A review15
A Blockchain-Based Copyright Management Scheme for Open-Source Software and Hardware Designs15
A Temporal Knowledge Graph Embedding Model Based on Variable Translation15
Deep Time-Frequency Denoising Transform Defense for Spectrum Monitoring in Integrated Networks14
Machine Learning for Selecting Important Clinical Markers of Imaging Subgroups of Cerebral Small Vessel Disease Based on a Common Data Model14
Optimized relinearization algorithm of the multikey homomorphic encryption scheme14
A Differential Privacy Protection Protocol Based on Location Entropy14
Bilevel Optimal Infrastructure Planning Method for the Inland Battery Swapping Stations and Battery-Powered Ships14
Adversarial training for supervised relation extraction14
DeepSI: A Sensitive-Driven Testing Samples Generation Method of Whitebox CNN Model for Edge Computing14
A First Successful Factorization of RSA-2048 Integer by D-Wave Quantum Computer13
Plausible Heterogeneous Graph $k$-Anonymization for Social Networks13
Editorial13
980 nm Near-Infrared Light-Emitting Diode Using All-Inorganic Perovskite Nanocrystals Doped with Ytterbium Ions13
A GNSS Anti-Spoofing Technique Based on the Spatial Distribution Characteristic of the Residual Vectors13
PrivBV: Distance-aware encoding for distributed data with local differential privacy13
Approximation and Heuristic Algorithms for the Priority Facility Location Problem with Outliers13
LETRNG—A Lightweight and Efficient True Random Number Generator for GNU/Linux Systems12
Decoupled Two-Phase Framework for Class-Incremental Few-Shot Named Entity Recognition12
Prompting and Tuning: A Two-Stage Unsupervised Domain Adaptive Person Re-identification Method on Vision Transformer Backbone12
Core Decomposition and Maintenance in Bipartite Graphs12
More bang for your buck: Boosting performance with capped power consumption12
Near-Threshold Wide-Voltage Design Review12
Joint Beamforming Design for RIS-Assisted Cell-Free Network with Multi-Hop Transmissions12
Enhancing Power Line Insulator Health Monitoring with a Hybrid Generative Adversarial Network and YOLO3 Solution12
Loop Subgraph-Level Greedy Mapping Algorithm for Grid Coarse-Grained Reconfigurable Array11
A Variance Reducing Stochastic Proximal Method with Acceleration Techniques11
A Multi-Hyperparameter Prediction Framework for Distributed Energy Trading on Photovoltaic Network11
CAN: Effective cross features by global attention mechanism and neural network for ad click prediction11
CPT: A Configurable Predictability Testbed for DNN Inference in AVs11
Wearable Continuous Blood Pressure Monitoring Based on Pulsatile Cycle Volume Adjustment Method11
0.11697602272034