1.7K(top 0.1%)
papers
30.4K(top 1%)
citations
75(top 1%)
h-index
137(top 1%)
g-index
3.4K
all documents
43.0K
doc citations
2.2K
citing journals

Top Articles

#TitleJournalYearCitations
1LIME: Low-Light Image Enhancement via Illumination Map EstimationIEEE Transactions on Image Processing20171,388
2Benchmarking Single-Image Dehazing and BeyondIEEE Transactions on Image Processing20191,002
3A review of uncertainty quantification in deep learning: Techniques, applications and challengesInformation Fusion2021876
4An Underwater Image Enhancement Benchmark Dataset and BeyondIEEE Transactions on Image Processing2020805
5Cyber-Physical Systems Security—A SurveyIEEE Internet of Things Journal2017672
6Joint Optic Disc and Cup Segmentation Based on Multi-Label Deep Network and Polar TransformationIEEE Transactions on Medical Imaging2018606
7Reversible Data Hiding in Encrypted Images by Reserving Room Before EncryptionIEEE Transactions on Information Forensics and Security2013550
8Integrating blockchain for data sharing and collaboration in mobile healthcare applications2017393
9Generalized Latent Multi-View Subspace ClusteringIEEE Transactions on Pattern Analysis and Machine Intelligence2020392
10Cluster-Based Co-Saliency DetectionIEEE Transactions on Image Processing2013360
11Low-Light Image Enhancement via a Deep Hybrid NetworkIEEE Transactions on Image Processing2019307
12Automated pulmonary nodule detection in CT images using deep convolutional neural networksPattern Recognition2019306
13High Capacity Reversible Data Hiding in Encrypted Images by Patch-Level Sparse RepresentationIEEE Transactions on Cybernetics2016298
14Underwater Image Enhancement via Medium Transmission-Guided Multi-Color Space EmbeddingIEEE Transactions on Image Processing2021295
15Disc-Aware Ensemble Network for Glaucoma Screening From Fundus ImageIEEE Transactions on Medical Imaging2018264
16Deep People Counting in Extremely Dense Crowds2015256
17Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud StorageIEEE Transactions on Information Forensics and Security2019242
18Identity-Based Distributed Provable Data Possession in Multicloud StorageIEEE Transactions on Services Computing2015239
19Domain Adaptation for Image Dehazing2020235
20PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless NetworksIEEE Transactions on Vehicular Technology2016221
21Distributed Aggregate Privacy-Preserving Authentication in VANETsIEEE Transactions on Intelligent Transportation Systems2017221
22On Deep Learning for Trust-Aware Recommendations in Social NetworksIEEE Transactions on Neural Networks and Learning Systems2017218
23Deep Human Parsing with Active Template RegressionIEEE Transactions on Pattern Analysis and Machine Intelligence2015212
24Single Image Dehazing via Multi-scale Convolutional Neural Networks with Holistic EdgesInternational Journal of Computer Vision2020210
25A Class of Two-Weight and Three-Weight Codes and Their Applications in Secret SharingIEEE Transactions on Information Theory2015188
26Saliency Detection for Stereoscopic Images Based on Depth Confidence Analysis and Multiple Cues FusionIEEE Signal Processing Letters2016188
27FS-Net: A Flow Sequence Network For Encrypted Traffic Classification2019187
28Single Image Deraining: A Comprehensive Benchmark Analysis2019178
29Clustering Approach Based on Mini Batch Kmeans for Intrusion Detection System Over Big DataIEEE Access2018177
30Consistent and Specific Multi-View Subspace ClusteringProceedings of the AAAI Conference on Artificial Intelligence2018175
31Leaky Cauldron on the Dark Land2017169
32Image Deblurring via Enhanced Low-Rank PriorIEEE Transactions on Image Processing2016165
33A Fast Uyghur Text Detector for Complex Background ImagesIEEE Transactions on Multimedia2018164
34Enhancing privacy through caching in location-based services2015163
35A privacy preserving three-factor authentication protocol for e-Health cloudsJournal of Supercomputing2016161
36Privacy-preserving outsourced classification in cloud computingCluster Computing2018161
37Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoTIEEE Internet of Things Journal2019160
38Auditable $\sigma $ -Time Outsourced Attribute-Based Encryption for Access Control in Cloud ComputingIEEE Transactions on Information Forensics and Security2018157
39Dense Attention Fluid Network for Salient Object Detection in Optical Remote Sensing ImagesIEEE Transactions on Image Processing2021157
40An efficient two-factor user authentication scheme with unlinkability for wireless sensor networksPeer-to-Peer Networking and Applications2015156
41A Blockchain Based Truthful Incentive Mechanism for Distributed P2P ApplicationsIEEE Access2018155
42A Unified Semi-Supervised Community Detection Framework Using Latent Space Graph RegularizationIEEE Transactions on Cybernetics2015152
43SEED: Semantics Enhanced Encoder-Decoder Framework for Scene Text Recognition2020145
44Automatic Virtual Network Embedding: A Deep Reinforcement Learning Approach With Graph Convolutional NetworksIEEE Journal on Selected Areas in Communications2020145
45Total Variation Regularized RPCA for Irregularly Moving Object Detection Under Dynamic BackgroundIEEE Transactions on Cybernetics2016141
46ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples2019134
47Semi-Supervised Image DehazingIEEE Transactions on Image Processing2020133
48Graph Structured Network for Image-Text Matching2020132
49Structural Correlation Filter for Robust Visual Tracking2016130
50An Efficient Privacy-Preserving Ranked Keyword Search MethodIEEE Transactions on Parallel and Distributed Systems2016130