
| index | Title |
| 1 | Non-interactive identity-based threshold signature scheme without random oracles Author(s):Xun SUN, Jian-hua LI, Shu-tang YAN... Clicked:7362 Download:4106 Cited:4 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.6 P.727-736 DOI:10.1631/jzus.A0720028 |
| 2 | Distributed anonymous data perturbation method for privacy-preserving data mining Author(s):Feng LI, Jin MA, Jian-hua LI Clicked:7949 Download:5785 Cited:3 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.7 P.952-963 DOI:10.1631/jzus.A0820320 |
| 3 | Antepartum hemorrhage from previous-cesarean-sectioned uterus as a potential sign of uterine artery pseudoa... Author(s):Ning Zhang, Wei-hua Lou, Xue-bin Z... Clicked:7471 Download:4439 Cited:2 <Full Text> <PPT> 2741 Journal of Zhejiang University Science B 2017 Vol.18 No.5 P.441-444 DOI:10.1631/jzus.B1600528 |
| 4 | Vascular complications following prophylactic balloon occlusion of the internal iliac arteries resolved by ... Author(s):Ning Zhang, Wei-hua Lou, Xue-bin Z... Clicked:6367 Download:4120 Cited:0 <Full Text> <PPT> 2494 Journal of Zhejiang University Science B 2017 Vol.18 No.3 P.272-276 DOI:10.1631/jzus.B1600315 |
| 5 | Cyber security meets artificial intelligence: a survey Author(s):Jian-hua Li Clicked:9396 Download:5155 Cited:0 <Full Text> <PPT> 2875 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1462-1474 DOI:10.1631/FITEE.1800573 |
| 6 | Security for cyberspace: challenges and opportunities Author(s):Jiang-xing WU, Jian-hua LI, Xin-sh... Clicked:5553 Download:3871 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1459-1461 DOI:10.1631/FITEE.1840000 |