# | Title | Journal | Year | Citations |
---|
1 | U-Net: Convolutional Networks for Biomedical Image Segmentation | Lecture Notes in Computer Science | 2015 | 27,139 |
2 | LIBSVM | ACM Transactions on Intelligent Systems and Technology | 2011 | 25,138 |
3 | The Structure and Function of Complex Networks | SIAM Review | 2003 | 14,326 |
4 | Microsoft COCO: Common Objects in Context | Lecture Notes in Computer Science | 2014 | 12,775 |
5 | A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting | Journal of Computer and System Sciences | 1997 | 12,470 |
6 | SSD: Single Shot MultiBox Detector | Lecture Notes in Computer Science | 2016 | 11,879 |
7 | Data clustering | ACM Computing Surveys | 1999 | 10,544 |
8 | The concept of a linguistic variable and its application to approximate reasoning—I | Information Sciences | 1975 | 10,321 |
9 | A tutorial on support vector regression | Statistics and Computing | 2004 | 8,373 |
10 | CBAM: Convolutional Block Attention Module | Lecture Notes in Computer Science | 2018 | 7,331 |
11 | Anomaly detection | ACM Computing Surveys | 2009 | 7,176 |
12 | Tensor Decompositions and Applications | SIAM Review | 2009 | 7,108 |
13 | A tutorial on spectral clustering | Statistics and Computing | 2007 | 6,927 |
14 | Power-Law Distributions in Empirical Data | SIAM Review | 2009 | 6,595 |
15 | Graph-Based Algorithms for Boolean Function Manipulation | IEEE Transactions on Computers | 1986 | 6,529 |
16 | Fractional Brownian Motions, Fractional Noises and Applications | SIAM Review | 1968 | 6,147 |
17 | Visualizing and Understanding Convolutional Networks | Lecture Notes in Computer Science | 2014 | 5,890 |
18 | Machine learning in automated text categorization | ACM Computing Surveys | 2002 | 5,873 |
19 | Convergence Properties of the Nelder--Mead Simplex Method in Low Dimensions | SIAM Journal on Optimization | 1998 | 5,762 |
20 | GSA: A Gravitational Search Algorithm | Information Sciences | 2009 | 5,379 |
21 | Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation | Lecture Notes in Computer Science | 2018 | 5,282 |
22 | A theory of timed automata | Theoretical Computer Science | 1994 | 5,188 |
23 | Face recognition | ACM Computing Surveys | 2003 | 4,953 |
24 | The Anatomy of the Grid: Enabling Scalable Virtual Organizations | International Journal of High Performance Computing Applications | 2001 | 4,854 |
25 | The Mathematics of Infectious Diseases | SIAM Review | 2000 | 4,795 |
26 | Introduction to special issue on large-scale machine learning | ACM Transactions on Intelligent Systems and Technology | 2011 | 4,794 |
27 | The concept of a linguistic variable and its application to approximate reasoning-III | Information Sciences | 1975 | 4,693 |
28 | WinBUGS - A Bayesian modelling framework: Concepts, structure, and extensibility | Statistics and Computing | 2000 | 4,470 |
29 | A Singular Value Thresholding Algorithm for Matrix Completion | SIAM Journal on Optimization | 2010 | 4,242 |
30 | Perceptual Losses for Real-Time Style Transfer and Super-Resolution | Lecture Notes in Computer Science | 2016 | 4,037 |
31 | Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems | Lecture Notes in Computer Science | 2001 | 3,986 |
32 | Identity-Based Encryption from the Weil Pairing | Lecture Notes in Computer Science | 2001 | 3,953 |
33 | Atomic Decomposition by Basis Pursuit | SIAM Review | 2001 | 3,868 |
34 | Object tracking | ACM Computing Surveys | 2006 | 3,845 |
35 | Global sensitivity indices for nonlinear mathematical models and their Monte Carlo estimates | Mathematics and Computers in Simulation | 2001 | 3,693 |
36 | Z3: An Efficient SMT Solver | Lecture Notes in Computer Science | 2008 | 3,666 |
37 | Identity Mappings in Deep Residual Networks | Lecture Notes in Computer Science | 2016 | 3,665 |
38 | Ensemble Methods in Machine Learning | Lecture Notes in Computer Science | 2000 | 3,642 |
39 | Discrete Cosine Transform | IEEE Transactions on Computers | 1974 | 3,511 |
40 | Twitter mood predicts the stock market | Journal of Computational Science | 2011 | 3,478 |
41 | A survey of image registration techniques | ACM Computing Surveys | 1992 | 3,447 |
42 | End-to-End Object Detection with Transformers | Lecture Notes in Computer Science | 2020 | 3,432 |
43 | Semidefinite Programming | SIAM Review | 1996 | 3,418 |
44 | Renormalization group analysis of turbulence. I. Basic theory | Journal of Scientific Computing | 1986 | 3,379 |
45 | On sequential Monte Carlo sampling methods for Bayesian filtering | Statistics and Computing | 2000 | 3,335 |
46 | Voronoi diagrams—a survey of a fundamental geometric data structure | ACM Computing Surveys | 1991 | 3,299 |
47 | Linear logic | Theoretical Computer Science | 1987 | 3,288 |
48 | Julia: A Fresh Approach to Numerical Computing | SIAM Review | 2017 | 3,220 |
49 | Analysis of Discrete Ill-Posed Problems by Means of the L-Curve | SIAM Review | 1992 | 3,153 |
50 | A genetic algorithm tutorial | Statistics and Computing | 1994 | 3,018 |
51 | UNet++: A Nested U-Net Architecture for Medical Image Segmentation | Lecture Notes in Computer Science | 2018 | 2,913 |
52 | A Calculus of Communicating Systems | Lecture Notes in Computer Science | 1980 | 2,799 |
53 | Practical Bayesian model evaluation using leave-one-out cross-validation and WAIC | Statistics and Computing | 2017 | 2,776 |
54 | A Fast Elitist Non-dominated Sorting Genetic Algorithm for Multi-objective Optimization: NSGA-II | Lecture Notes in Computer Science | 2000 | 2,772 |
55 | Federated Machine Learning | ACM Transactions on Intelligent Systems and Technology | 2019 | 2,687 |
56 | A Nonlinear Mapping for Data Structure Analysis | IEEE Transactions on Computers | 1969 | 2,685 |
57 | An Interior Trust Region Approach for Nonlinear Minimization Subject to Bounds | SIAM Journal on Optimization | 1996 | 2,653 |
58 | On Upstream Differencing and Godunov-Type Schemes for Hyperbolic Conservation Laws | SIAM Review | 1983 | 2,638 |
59 | The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver | IEEE Transactions on Computers | 1980 | 2,617 |
60 | A calculus of mobile processes, I | Information and Computation | 1992 | 2,527 |
61 | Probabilistic encryption | Journal of Computer and System Sciences | 1984 | 2,464 |
62 | Metaheuristics in combinatorial optimization | ACM Computing Surveys | 2003 | 2,445 |
63 | Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization | SIAM Review | 2010 | 2,443 |
64 | Image retrieval | ACM Computing Surveys | 2008 | 2,430 |
65 | Fuzzy Identity-Based Encryption | Lecture Notes in Computer Science | 2005 | 2,424 |
66 | The Sybil Attack | Lecture Notes in Computer Science | 2002 | 2,402 |
67 | The interdisciplinary study of coordination | ACM Computing Surveys | 1994 | 2,388 |
68 | 3D U-Net: Learning Dense Volumetric Segmentation from Sparse Annotation | Lecture Notes in Computer Science | 2016 | 2,388 |
69 | The many faces of publish/subscribe | ACM Computing Surveys | 2003 | 2,358 |
70 | Finding Structure with Randomness: Probabilistic Algorithms for Constructing Approximate Matrix Decompositions | SIAM Review | 2011 | 2,357 |
71 | ROUGH FUZZY SETS AND FUZZY ROUGH SETS* | International Journal of General Systems | 1990 | 2,330 |
72 | Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems | Lecture Notes in Computer Science | 1996 | 2,328 |
73 | Firefly Algorithms for Multimodal Optimization | Lecture Notes in Computer Science | 2009 | 2,322 |
74 | The particle swarm optimization algorithm: convergence analysis and parameter selection | Information Processing Letters | 2003 | 2,320 |
75 | DBpedia: A Nucleus for a Web of Open Data | Lecture Notes in Computer Science | 2007 | 2,317 |
76 | Machine Learning for High-Speed Corner Detection | Lecture Notes in Computer Science | 2006 | 2,310 |
77 | Learning a Deep Convolutional Network for Image Super-Resolution | Lecture Notes in Computer Science | 2014 | 2,310 |
78 | An Algorithmic Introduction to Numerical Simulation of Stochastic Differential Equations | SIAM Review | 2001 | 2,307 |
79 | The Algorithmic Foundations of Differential Privacy | Foundations and Trends in Theoretical Computer Science | 2013 | 2,288 |
80 | The concept of a linguistic variable and its application to approximate reasoning—II | Information Sciences | 1975 | 2,251 |
81 | A survey on concept drift adaptation | ACM Computing Surveys | 2014 | 2,221 |
82 | Mixture Densities, Maximum Likelihood and the EM Algorithm | SIAM Review | 1984 | 2,194 |
83 | Optical tomography in medical imaging | Inverse Problems | 1999 | 2,176 |
84 | Parameter selection in particle swarm optimization | Lecture Notes in Computer Science | 1998 | 2,169 |
85 | ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture Design | Lecture Notes in Computer Science | 2018 | 2,162 |
86 | Stacked Hourglass Networks for Human Pose Estimation | Lecture Notes in Computer Science | 2016 | 2,160 |
87 | Aspect-oriented programming | Lecture Notes in Computer Science | 1997 | 2,119 |
88 | Normal-Boundary Intersection: A New Method for Generating the Pareto Surface in Nonlinear Multicriteria Optimization Problems | SIAM Journal on Optimization | 1998 | 2,117 |
89 | Operations on fuzzy numbers | International Journal of Systems Science | 1978 | 2,109 |
90 | Similarity relations and fuzzy orderings | Information Sciences | 1971 | 2,105 |
91 | Data-intensive applications, challenges, techniques and technologies: A survey on Big Data | Information Sciences | 2014 | 2,076 |
92 | Firefly algorithm, stochastic test functions and design optimisation | International Journal of Bio-Inspired Computation | 2010 | 2,075 |
93 | An algorithm for drawing general undirected graphs | Information Processing Letters | 1989 | 2,033 |
94 | Multiscale vessel enhancement filtering | Lecture Notes in Computer Science | 1998 | 2,012 |
95 | Indoor Segmentation and Support Inference from RGBD Images | Lecture Notes in Computer Science | 2012 | 2,011 |
96 | From Sparse Solutions of Systems of Equations to Sparse Modeling of Signals and Images | SIAM Review | 2009 | 1,972 |
97 | Bundle Adjustment — A Modern Synthesis | Lecture Notes in Computer Science | 2000 | 1,968 |
98 | Some geometric aggregation operators based on intuitionistic fuzzy sets | International Journal of General Systems | 2006 | 1,967 |
99 | Reservoir computing approaches to recurrent neural network training | Computer Science Review | 2009 | 1,963 |
100 | A Survey of Methods for Explaining Black Box Models | ACM Computing Surveys | 2019 | 1,952 |