SOAPdenovo-Trans: de novo transcriptome assembly with short RNA-Seq reads | Bioinformatics | 2014 | 621 |
CytoNCA: a cytoscape plugin for centrality analysis and evaluation of protein interaction networks | BioSystems | 2015 | 485 |
Drug repositioning based on comprehensive similarity measures and Bi-Random walk algorithm | Bioinformatics | 2016 | 190 |
Augmented Lyapunov functional and delay-dependent stability criteria for neutral systems | International Journal of Robust and Nonlinear Control | 2005 | 175 |
A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT | IEEE Transactions on Industrial Informatics | 2019 | 135 |
A fast hierarchical clustering algorithm for functional modules discovery in protein interaction networks | IEEE/ACM Transactions on Computational Biology and Bioinformatics | 2011 | 133 |
Partial Offloading Scheduling and Power Allocation for Mobile Edge Computing Systems | IEEE Internet of Things Journal | 2019 | 119 |
Stochastic differential delay equations of population dynamics | Journal of Mathematical Analysis and Applications | 2005 | 109 |
SDN/NFV-Empowered Future IoV With Enhanced Communication, Computing, and Caching | Proceedings of the IEEE | 2020 | 107 |
Construction and application of dynamic protein interaction network based on time course gene expression data | Proteomics | 2013 | 106 |
Computational drug repositioning using low-rank matrix approximation and randomized algorithms | Bioinformatics | 2018 | 102 |
Big Data Cleaning Based on Mobile Edge Computing in Industrial Sensor-Cloud | IEEE Transactions on Industrial Informatics | 2020 | 97 |
Dynamic analysis of a cracked magnetoelectroelastic medium under antiplane mechanical and inplane electric and magnetic impacts | International Journal of Solids and Structures | 2005 | 96 |
Synthesis of High-Quality Large-Area Homogenous 1T' MoTe from Chemical Vapor Deposition | Advanced Materials | 2016 | 88 |
An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model | IEEE Transactions on Industrial Informatics | 2020 | 86 |
An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box | IEEE Access | 2020 | 84 |
Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service | IEEE Transactions on Services Computing | 2019 | 84 |
A semi-supervised method for drug-target interaction prediction with consistency in networks | PLoS ONE | 2013 | 76 |
Effective identification of essential proteins based on priori knowledge, network topology and gene expressions | Methods | 2014 | 72 |
Mining consuming Behaviors with Temporal Evolution for Personalized Recommendation in Mobile Marketing Apps | Mobile Networks and Applications | 2020 | 70 |
GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy | IEEE Transactions on Information Forensics and Security | 2019 | 65 |
Trust based energy efficient data collection with unmanned aerial vehicle in edge network | Transactions on Emerging Telecommunications Technologies | 2020 | 63 |
Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles | IEEE Transactions on Industrial Informatics | 2020 | 63 |
Near-Optimal and Truthful Online Auction for Computation Offloading in Green Edge-Computing Systems | IEEE Transactions on Mobile Computing | 2020 | 63 |
Secure localization and location verification in wireless sensor networks: a survey | Journal of Supercomputing | 2013 | 62 |