Combinatorial group testing and its applications D Du, FK Hwang, F Hwang World Scientific, 2000 | 1401 | 2000 |
Improving wireless sensor network lifetime through power aware organization M Cardei, DZ Du Wireless networks 11, 333-340, 2005 | 1251 | 2005 |
Fuzzy multi-criteria decision making: theory and applications with recent developments C Kahraman Springer Science & Business Media, 2008 | 877 | 2008 |
Regular languages S Yu Handbook of Formal Languages: Volume 1 Word, Language, Grammar, 41-110, 1997 | 615 | 1997 |
Relay sensor placement in wireless sensor networks X Cheng, DZ Du, L Wang, B Xu Wireless Networks 14, 347-355, 2008 | 609 | 2008 |
Theory of computational complexity DZ Du, KI Ko John Wiley & Sons, 2011 | 496 | 2011 |
Spatial statistics in ArcGIS LM Scott, MV Janikas Handbook of applied spatial analysis: Software tools, methods and …, 2009 | 444 | 2009 |
A polynomial‐time approximation scheme for the minimum‐connected dominating set in ad hoc wireless networks X Cheng, X Huang, D Li, W Wu, DZ Du Networks: An International Journal 42 (4), 202-208, 2003 | 363 | 2003 |
Handbook of combinatorial optimization D Du, PM Pardalos Springer Science & Business Media, 1998 | 348* | 1998 |
Wireless sensor networks with energy efficient organization M Cardei, D MacCallum, MX Cheng, M Min, X Jia, D Li, DZ Du Journal of Interconnection Networks 3 (03n04), 213-229, 2002 | 335 | 2002 |
Pooling designs and nonadaptive group testing: important tools for DNA sequencing FK Hwang, D Du World Scientific, 2006 | 324 | 2006 |
A proof of the Gilbert-Pollak conjecture on the Steiner ratio DZ Du, FK Hwang Algorithmica 7, 121-135, 1992 | 303 | 1992 |
Minimax and applications DZ Du, PM Pardalos Springer Science & Business Media, 1995 | 302 | 1995 |
Approximations for Steiner trees with minimum number of Steiner points D Chen, DZ Du, XD Hu, GH Lin, L Wang, G Xue Theoretical Computer Science 262 (1-2), 83-99, 2001 | 266 | 2001 |
Design and analysis of approximation algorithms D Du, KI Ko, X Hu Springer, 2012 | 263 | 2012 |
Invisible backdoor attacks on deep neural networks via steganography and regularization S Li, M Xue, BZH Zhao, H Zhu, X Zhang IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020 | 259 | 2020 |
On greedy construction of connected dominating sets in wireless networks Y Li, MT Thai, F Wang, CW Yi, PJ Wan, DZ Du Wireless Communications and Mobile Computing 5 (8), 927-932, 2005 | 241 | 2005 |
Inverse problems: Tikhonov theory and algorithms K Ito, B Jin World Scientific, 2014 | 238 | 2014 |
Connected Domination in Multihop Ad Hoc Wireless Networks. M Cardei, MX Cheng, X Cheng, DZ Du JCIS, 251-255, 2002 | 236 | 2002 |
A decision criterion for the optimal number of clusters in hierarchical clustering Y Jung, H Park, DZ Du, BL Drake Journal of Global Optimization 25 (1), 91-111, 2003 | 233 | 2003 |