2.7K
Articles
20.6K
Citations
1.5
avg. Impact Factor
61
h-index

Most Cited Articles of School of Computer Science and Technology in 2010

TitleJournalYearCitations
Image analysis by Bessel–Fourier momentsPattern Recognition201094
Semi-supervised clustering algorithm for community structure detection in complex networksPhysica A: Statistical Mechanics and Its Applications201094
Relation between concept lattice reduction and rough set reductionKnowledge-Based Systems201081
Stability analysis of a SEIQV epidemic model for rapid spreading wormsComputers and Security201073
Sparse reconstruction for quantitative bioluminescence tomography based on the incomplete variables truncated conjugate gradient methodOptics Express201071
Certificateless signcryption scheme in the standard modelInformation Sciences201071
Colored timed Petri nets for modeling and analysis of cluser toolsAsian Journal of Control201051
Process vs resource-oriented Petri net modeling of automated manufacturing systemsAsian Journal of Control201042
Efficient signcryption between TPKC and IDPKC and its multi-receiver constructionScience China Information Sciences201039
SAR Image Despeckling Using Edge Detection and Feature Clustering in Bandelet DomainIEEE Geoscience and Remote Sensing Letters201038
Statistical Sinogram Smoothing for Low-Dose CT With Segmentation-Based Adaptive FilteringIEEE Transactions on Nuclear Science201037
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing201036
Multicontourlet-Based Adaptive Fusion of Infrared and Visible Remote Sensing ImagesIEEE Geoscience and Remote Sensing Letters201028
Spectral clustering for detecting protein complexes in protein–protein interaction (PPI) networksMathematical and Computer Modelling201028
A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16mIEEE Communications Letters201026
Suboptimal liveness-enforcing supervisor design for a class of generalised Petri nets using partial siphon enumeration and mathematical programmingInternational Journal of Systems Science201025
On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity☆Information Sciences201025
Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocolInformation Sciences201021
Minutiae and modified Biocode fusion for fingerprint-based key generationJournal of Network and Computer Applications201020
Fast source reconstruction for bioluminescence tomography based on sparse regularizationIEEE Transactions on Biomedical Engineering201019
Short-ciphertext and BDH-based CCA2 secure certificateless encryptionScience China Information Sciences201017
Backstepping control for periodically time-varying systems using high-order neural network and Fourier series expansionISA Transactions201017
Characteristic stabilized finite element method for the transient Navier–Stokes equationsComputer Methods in Applied Mechanics and Engineering201017
Video steganography using motion vector and linear block codes201016
A highly secure identity-based authenticated key-exchange protocol for satellite communicationJournal of Communications and Networks201016