Image analysis by Bessel–Fourier moments | Pattern Recognition | 2010 | 94 |
Semi-supervised clustering algorithm for community structure detection in complex networks | Physica A: Statistical Mechanics and Its Applications | 2010 | 94 |
Relation between concept lattice reduction and rough set reduction | Knowledge-Based Systems | 2010 | 81 |
Stability analysis of a SEIQV epidemic model for rapid spreading worms | Computers and Security | 2010 | 73 |
Sparse reconstruction for quantitative bioluminescence tomography based on the incomplete variables truncated conjugate gradient method | Optics Express | 2010 | 71 |
Certificateless signcryption scheme in the standard model | Information Sciences | 2010 | 71 |
Colored timed Petri nets for modeling and analysis of cluser tools | Asian Journal of Control | 2010 | 51 |
Process vs resource-oriented Petri net modeling of automated manufacturing systems | Asian Journal of Control | 2010 | 42 |
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction | Science China Information Sciences | 2010 | 39 |
SAR Image Despeckling Using Edge Detection and Feature Clustering in Bandelet Domain | IEEE Geoscience and Remote Sensing Letters | 2010 | 38 |
Statistical Sinogram Smoothing for Low-Dose CT With Segmentation-Based Adaptive Filtering | IEEE Transactions on Nuclear Science | 2010 | 37 |
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing | | 2010 | 36 |
Multicontourlet-Based Adaptive Fusion of Infrared and Visible Remote Sensing Images | IEEE Geoscience and Remote Sensing Letters | 2010 | 28 |
Spectral clustering for detecting protein complexes in protein–protein interaction (PPI) networks | Mathematical and Computer Modelling | 2010 | 28 |
A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m | IEEE Communications Letters | 2010 | 26 |
Suboptimal liveness-enforcing supervisor design for a class of generalised Petri nets using partial siphon enumeration and mathematical programming | International Journal of Systems Science | 2010 | 25 |
On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity☆ | Information Sciences | 2010 | 25 |
Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol | Information Sciences | 2010 | 21 |
Minutiae and modified Biocode fusion for fingerprint-based key generation | Journal of Network and Computer Applications | 2010 | 20 |
Fast source reconstruction for bioluminescence tomography based on sparse regularization | IEEE Transactions on Biomedical Engineering | 2010 | 19 |
Short-ciphertext and BDH-based CCA2 secure certificateless encryption | Science China Information Sciences | 2010 | 17 |
Backstepping control for periodically time-varying systems using high-order neural network and Fourier series expansion | ISA Transactions | 2010 | 17 |
Characteristic stabilized finite element method for the transient Navier–Stokes equations | Computer Methods in Applied Mechanics and Engineering | 2010 | 17 |
Video steganography using motion vector and linear block codes | | 2010 | 16 |
A highly secure identity-based authenticated key-exchange protocol for satellite communication | Journal of Communications and Networks | 2010 | 16 |