# | Title | Journal | Year | Citations |
---|
|
1 | $l_{2}-l_{\infty}$ Model Reduction for Switched LPV Systems With Average Dwell Time | IEEE Transactions on Automatic Control | 2008 | 195 |
2 | Exponential H∞ filtering for switched linear systems with interval time‐varying delay | International Journal of Robust and Nonlinear Control | 2009 | 137 |
3 | Bounds for the normalised Jensen functional | Bulletin of the Australian Mathematical Society | 2006 | 124 |
4 | A flexible payment scheme and its role-based access control | IEEE Transactions on Knowledge and Data Engineering | 2005 | 109 |
5 | Hash function based on chaotic tent maps | IEEE Transactions on Circuits and Systems Part 2: Express Briefs | 2005 | 105 |
6 | Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system | World Wide Web | 2013 | 104 |
7 | A Prospective Study of the Effectiveness of the New Zealand Meningococcal B Vaccine | American Journal of Epidemiology | 2007 | 98 |
8 | SwinDeW-a p2p-based decentralized workflow management system | IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans | 2006 | 70 |
9 | Effectively finding relevant web pages from linkage information | IEEE Transactions on Knowledge and Data Engineering | 2003 | 66 |
10 | Hermite–Hadamard type inequalities for conformable fractional integrals | Revista De La Real Academia De Ciencias Exactas, Fisicas Y Naturales - Serie A: Matematicas | 2018 | 60 |
11 | Understanding secondary–tertiary transition in mathematics | International Journal of Mathematical Education in Science and Technology | 2009 | 58 |
12 | Exploring Sampling in the Detection of Multicategory EEG Signals | Computational and Mathematical Methods in Medicine | 2015 | 54 |
13 | Effective Collaboration with Information Sharing in Virtual Universities | IEEE Transactions on Knowledge and Data Engineering | 2009 | 52 |
14 | Security of Chien's efficient time-bound hierarchical key assignment scheme | IEEE Transactions on Knowledge and Data Engineering | 2005 | 51 |
15 | An overview of content-based image retrieval techniques | | 0 | 50 |
16 | H ∞ model reduction for discrete-time Markov jump linear systems with partially known transition probabilities | International Journal of Control | 2009 | 49 |
17 | Multi-stage AUV-aided Localization for Underwater Wireless Sensor Networks | | 2011 | 48 |
18 | Gabor Wavelet Associative Memory for Face Recognition | IEEE Transactions on Neural Networks | 2005 | 45 |
19 | Delay‐dependent exponential stability for switched delay systems | Optimal Control Applications and Methods | 2009 | 45 |
20 | AdaBoost algorithm with random forests for predicting breast cancer survivability | | 2008 | 44 |
21 | Achieving secure and flexible M-services through tickets | IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans | 2003 | 43 |
22 | Efficient and short certificateless signatures secure against realistic adversaries | Journal of Supercomputing | 2011 | 40 |
23 | μ-Dependent model reduction for uncertain discrete-time switched linear systems with average dwell time | International Journal of Control | 2009 | 38 |
24 | Facial Expression Classification using Gabor and Log-Gabor Filters | | 0 | 37 |
25 | On the declarative and procedural semantics of deductive object-oriented systems | Journal of Intelligent Information Systems | 1995 | 36 |
26 | A Kernel Autoassociator Approach to Pattern Classification | IEEE Transactions on Systems, Man, and Cybernetics | 2005 | 36 |
27 | Tourism Blog Visualizer for better tour planning | Journal of Vacation Marketing | 2008 | 36 |
28 | Parity space-based fault detection for Markovian jump systems | International Journal of Systems Science | 2009 | 33 |
29 | Modelling User Behaviour for Web Recommendation Using LDA Model | | 2008 | 32 |
30 | Web Services Discovery Based on Latent Semantic Approach | | 2008 | 30 |
31 | Detecting Suspicious Texts Using Machine Learning Techniques | Applied Sciences (Switzerland) | 2020 | 30 |
32 | Identity-based fault-tolerant conference key agreement | IEEE Transactions on Dependable and Secure Computing | 2004 | 29 |
33 | Refinements of the generalised trapezoid and Ostrowski inequalities for functions of bounded variation | Archiv Der Mathematik | 2008 | 28 |
34 | Hermite‐Hadamard type inequalities for generalized Riemann‐Liouville fractional integrals of h‐convex functions | Mathematical Methods in the Applied Sciences | 2021 | 28 |
35 | Lowness for Kurtz randomness | Journal of Symbolic Logic | 2009 | 25 |
36 | Lowness and nullsets | Journal of Symbolic Logic | 2006 | 24 |
37 | Unobtrusive Mattress-Based Identification of Hypertension by Integrating Classification and Association Rule Mining | Sensors | 2019 | 23 |
38 | Reverse inequalities for the numerical radius of linear operators in Hilbert spaces | Bulletin of the Australian Mathematical Society | 2006 | 22 |
39 | TOTALLY ω-COMPUTABLY ENUMERABLE DEGREES AND BOUNDING CRITICAL TRIPLES | Journal of Mathematical Logic | 2007 | 22 |
40 | Refinement of the Jensen integral inequality | Open Mathematics | 2016 | 21 |
41 | Comparative Evaluation of Web Image Search Engines for Multimedia Applications | | 0 | 20 |
42 | Cluster Analysis and Optimization in Color-Based Clustering for Image Abstract | | 2007 | 20 |
43 | Modelling the wetting and cooking of a single cereal grain | IMA Journal of Management Mathematics | 2000 | 19 |
44 | A secure conference scheme for mobile communications | IEEE Transactions on Wireless Communications | 2003 | 19 |
45 | Robust H ∞ Control for Class of Discrete-Time Markovian Jump Systems with Time-Varying Delays Based on Delta Operator | Circuits, Systems, and Signal Processing | 2008 | 18 |
46 | Off-Line Signature Recognition and Verification by Kernel Principal Component Self-Regression | | 2006 | 17 |
47 | Reverses of the Schwarz inequality generalising a Klamkin–McLenaghan result | Bulletin of the Australian Mathematical Society | 2006 | 17 |
48 | Classification of Privacy-preserving Distributed Data Mining protocols | | 2011 | 17 |
49 | Exploring the complementarity of THz pulse imaging and DCE-MRIs: Toward a unified multi-channel classification and a deep learning framework | Computer Methods and Programs in Biomedicine | 2016 | 17 |
50 | Two Ostrowski type inequalities for the Stieltjes integral of monotonic functions | Bulletin of the Australian Mathematical Society | 2007 | 16 |