# | Title | Journal | Year | Citations |
---|
1 | U-Net: Convolutional Networks for Biomedical Image Segmentation | Lecture Notes in Computer Science | 2015 | 27,139 |
2 | Microsoft COCO: Common Objects in Context | Lecture Notes in Computer Science | 2014 | 12,775 |
3 | SSD: Single Shot MultiBox Detector | Lecture Notes in Computer Science | 2016 | 11,879 |
4 | CBAM: Convolutional Block Attention Module | Lecture Notes in Computer Science | 2018 | 7,331 |
5 | Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment | Journal of the ACM | 1973 | 7,074 |
6 | Authoritative sources in a hyperlinked environment | Journal of the ACM | 1999 | 6,521 |
7 | Visualizing and Understanding Convolutional Networks | Lecture Notes in Computer Science | 2014 | 5,890 |
8 | Encoder-Decoder with Atrous Separable Convolution for Semantic Image Segmentation | Lecture Notes in Computer Science | 2018 | 5,282 |
9 | Robust principal component analysis? | Journal of the ACM | 2011 | 4,536 |
10 | Perceptual Losses for Real-Time Style Transfer and Super-Resolution | Lecture Notes in Computer Science | 2016 | 4,037 |
11 | Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems | Lecture Notes in Computer Science | 2001 | 3,986 |
12 | Identity-Based Encryption from the Weil Pairing | Lecture Notes in Computer Science | 2001 | 3,953 |
13 | Z3: An Efficient SMT Solver | Lecture Notes in Computer Science | 2008 | 3,666 |
14 | Identity Mappings in Deep Residual Networks | Lecture Notes in Computer Science | 2016 | 3,665 |
15 | Ensemble Methods in Machine Learning | Lecture Notes in Computer Science | 2000 | 3,642 |
16 | `` Direct Search'' Solution of Numerical and Statistical Problems | Journal of the ACM | 1961 | 3,455 |
17 | End-to-End Object Detection with Transformers | Lecture Notes in Computer Science | 2020 | 3,432 |
18 | Impossibility of distributed consensus with one faulty process | Journal of the ACM | 1985 | 3,214 |
19 | A Machine-Oriented Logic Based on the Resolution Principle | Journal of the ACM | 1965 | 2,951 |
20 | UNet++: A Nested U-Net Architecture for Medical Image Segmentation | Lecture Notes in Computer Science | 2018 | 2,913 |
21 | A Calculus of Communicating Systems | Lecture Notes in Computer Science | 1980 | 2,799 |
22 | A Fast Elitist Non-dominated Sorting Genetic Algorithm for Multi-objective Optimization: NSGA-II | Lecture Notes in Computer Science | 2000 | 2,772 |
23 | Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming | Journal of the ACM | 1995 | 2,443 |
24 | Fuzzy Identity-Based Encryption | Lecture Notes in Computer Science | 2005 | 2,424 |
25 | The Sybil Attack | Lecture Notes in Computer Science | 2002 | 2,402 |
26 | 3D U-Net: Learning Dense Volumetric Segmentation from Sparse Annotation | Lecture Notes in Computer Science | 2016 | 2,388 |
27 | Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems | Lecture Notes in Computer Science | 1996 | 2,328 |
28 | Firefly Algorithms for Multimodal Optimization | Lecture Notes in Computer Science | 2009 | 2,322 |
29 | DBpedia: A Nucleus for a Web of Open Data | Lecture Notes in Computer Science | 2007 | 2,317 |
30 | Machine Learning for High-Speed Corner Detection | Lecture Notes in Computer Science | 2006 | 2,310 |
31 | Learning a Deep Convolutional Network for Image Super-Resolution | Lecture Notes in Computer Science | 2014 | 2,310 |
32 | The String-to-String Correction Problem | Journal of the ACM | 1974 | 2,288 |
33 | Bigtable | ACM Transactions on Computer Systems | 2008 | 2,262 |
34 | A threshold of ln n for approximating set cover | Journal of the ACM | 1998 | 2,240 |
35 | Parameter selection in particle swarm optimization | Lecture Notes in Computer Science | 1998 | 2,169 |
36 | ShuffleNet V2: Practical Guidelines for Efficient CNN Architecture Design | Lecture Notes in Computer Science | 2018 | 2,162 |
37 | Stacked Hourglass Networks for Human Pose Estimation | Lecture Notes in Computer Science | 2016 | 2,160 |
38 | Open, Closed, and Mixed Networks of Queues with Different Classes of Customers | Journal of the ACM | 1975 | 2,130 |
39 | Aspect-oriented programming | Lecture Notes in Computer Science | 1997 | 2,119 |
40 | Fibonacci heaps and their uses in improved network optimization algorithms | Journal of the ACM | 1987 | 2,024 |
41 | Multiscale vessel enhancement filtering | Lecture Notes in Computer Science | 1998 | 2,012 |
42 | Indoor Segmentation and Support Inference from RGBD Images | Lecture Notes in Computer Science | 2012 | 2,011 |
43 | A Computing Procedure for Quantification Theory | Journal of the ACM | 1960 | 1,986 |
44 | Bundle Adjustment — A Modern Synthesis | Lecture Notes in Computer Science | 2000 | 1,968 |
45 | Image Super-Resolution Using Very Deep Residual Channel Attention Networks | Lecture Notes in Computer Science | 2018 | 1,935 |
46 | A logic of authentication | ACM Transactions on Computer Systems | 1990 | 1,934 |
47 | Distributed snapshots | ACM Transactions on Computer Systems | 1985 | 1,933 |
48 | Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems | Journal of the ACM | 1972 | 1,922 |
49 | BRIEF: Binary Robust Independent Elementary Features | Lecture Notes in Computer Science | 2010 | 1,883 |
50 | The part-time parliament | ACM Transactions on Computer Systems | 1998 | 1,881 |
51 | An optimal algorithm for approximate nearest neighbor searching fixed dimensions | Journal of the ACM | 1998 | 1,875 |
52 | Fully-Convolutional Siamese Networks for Object Tracking | Lecture Notes in Computer Science | 2016 | 1,871 |
53 | Modeling Relational Data with Graph Convolutional Networks | Lecture Notes in Computer Science | 2018 | 1,839 |
54 | Unreliable failure detectors for reliable distributed systems | Journal of the ACM | 1996 | 1,830 |
55 | Borderline-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning | Lecture Notes in Computer Science | 2005 | 1,797 |
56 | The click modular router | ACM Transactions on Computer Systems | 2000 | 1,785 |
57 | Reaching Agreement in the Presence of Faults | Journal of the ACM | 1980 | 1,720 |
58 | A desicion-theoretic generalization of on-line learning and an application to boosting | Lecture Notes in Computer Science | 1995 | 1,697 |
59 | An Algorithm for Subgraph Isomorphism | Journal of the ACM | 1976 | 1,696 |
60 | Public Key Encryption with Keyword Search | Lecture Notes in Computer Science | 2004 | 1,692 |
61 | A Technique for the Numerical Solution of Certain Integral Equations of the First Kind | Journal of the ACM | 1962 | 1,689 |
62 | XNOR-Net: ImageNet Classification Using Binary Convolutional Neural Networks | Lecture Notes in Computer Science | 2016 | 1,683 |
63 | Gaussian Processes in Machine Learning | Lecture Notes in Computer Science | 2004 | 1,679 |
64 | Activity Recognition from User-Annotated Acceleration Data | Lecture Notes in Computer Science | 2004 | 1,670 |
65 | A Discriminative Feature Learning Approach for Deep Face Recognition | Lecture Notes in Computer Science | 2016 | 1,634 |
66 | Practical byzantine fault tolerance and proactive recovery | ACM Transactions on Computer Systems | 2002 | 1,628 |
67 | Kademlia: A Peer-to-Peer Information System Based on the XOR Metric | Lecture Notes in Computer Science | 2002 | 1,623 |
68 | Short Signatures from the Weil Pairing | Lecture Notes in Computer Science | 2001 | 1,595 |
69 | LSD-SLAM: Large-Scale Direct Monocular SLAM | Lecture Notes in Computer Science | 2014 | 1,571 |
70 | Temporal Segment Networks: Towards Good Practices for Deep Action Recognition | Lecture Notes in Computer Science | 2016 | 1,555 |
71 | A New Method of Interpolation and Smooth Curve Fitting Based on Local Procedures | Journal of the ACM | 1970 | 1,544 |
72 | Ant Colony Optimization and Swarm Intelligence | Lecture Notes in Computer Science | 2004 | 1,528 |
73 | Sequential Operations in Digital Picture Processing | Journal of the ACM | 1966 | 1,524 |
74 | Accelerating the Super-Resolution Convolutional Neural Network | Lecture Notes in Computer Science | 2016 | 1,494 |
75 | Estimating attributes: Analysis and extensions of RELIEF | Lecture Notes in Computer Science | 1994 | 1,491 |
76 | CornerNet: Detecting Objects as Paired Keypoints | Lecture Notes in Computer Science | 2018 | 1,483 |
77 | PRESENT: An Ultra-Lightweight Block Cipher | Lecture Notes in Computer Science | 2007 | 1,467 |
78 | Two-Frame Motion Estimation Based on Polynomial Expansion | Lecture Notes in Computer Science | 2003 | 1,455 |
79 | A new approach to the maximum-flow problem | Journal of the ACM | 1988 | 1,452 |
80 | Linear Cryptanalysis Method for DES Cipher | Lecture Notes in Computer Science | 1994 | 1,446 |
81 | High Accuracy Optical Flow Estimation Based on a Theory for Warping | Lecture Notes in Computer Science | 2004 | 1,424 |
82 | Integer Programming Formulation of Traveling Salesman Problems | Journal of the ACM | 1960 | 1,421 |
83 | How to construct random functions | Journal of the ACM | 1986 | 1,417 |
84 | Correlation Power Analysis with a Leakage Model | Lecture Notes in Computer Science | 2004 | 1,405 |
85 | An Extensible SAT-solver | Lecture Notes in Computer Science | 2004 | 1,392 |
86 | End-to-end arguments in system design | ACM Transactions on Computer Systems | 1984 | 1,388 |
87 | P-Complete Approximation Problems | Journal of the ACM | 1976 | 1,379 |
88 | PRISM 4.0: Verification of Probabilistic Real-Time Systems | Lecture Notes in Computer Science | 2011 | 1,371 |
89 | Towards a Better Understanding of Context and Context-Awareness | Lecture Notes in Computer Science | 1999 | 1,360 |
90 | Learnability and the Vapnik-Chervonenkis dimension | Journal of the ACM | 1989 | 1,358 |
91 | Face Recognition with Local Binary Patterns | Lecture Notes in Computer Science | 2004 | 1,354 |
92 | A Theorem on Boolean Matrices | Journal of the ACM | 1962 | 1,321 |
93 | How bad is selfish routing? | Journal of the ACM | 2002 | 1,317 |
94 | On Single Image Scale-Up Using Sparse-Representations | Lecture Notes in Computer Science | 2012 | 1,303 |
95 | Efficient Identity-Based Encryption Without Random Oracles | Lecture Notes in Computer Science | 2005 | 1,298 |
96 | A Survey on Deep Transfer Learning | Lecture Notes in Computer Science | 2018 | 1,295 |
97 | Implementing remote procedure calls | ACM Transactions on Computer Systems | 1984 | 1,290 |
98 | Flower Pollination Algorithm for Global Optimization | Lecture Notes in Computer Science | 2012 | 1,289 |
99 | Certificateless Public Key Cryptography | Lecture Notes in Computer Science | 2003 | 1,283 |
100 | Colorful Image Colorization | Lecture Notes in Computer Science | 2016 | 1,279 |