
| index | Title |
| 1 | Non-interactive identity-based threshold signature scheme without random oracles Author(s):Xun SUN, Jian-hua LI, Shu-tang YAN... Clicked:7359 Download:4106 Cited:4 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.6 P.727-736 DOI:10.1631/jzus.A0720028 |
| 2 | Distributed anonymous data perturbation method for privacy-preserving data mining Author(s):Feng LI, Jin MA, Jian-hua LI Clicked:7946 Download:5784 Cited:3 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.7 P.952-963 DOI:10.1631/jzus.A0820320 |
| 3 | Antepartum hemorrhage from previous-cesarean-sectioned uterus as a potential sign of uterine artery pseudoa... Author(s):Ning Zhang, Wei-hua Lou, Xue-bin Z... Clicked:7470 Download:4434 Cited:2 <Full Text> <PPT> 2738 Journal of Zhejiang University Science B 2017 Vol.18 No.5 P.441-444 DOI:10.1631/jzus.B1600528 |
| 4 | Vascular complications following prophylactic balloon occlusion of the internal iliac arteries resolved by ... Author(s):Ning Zhang, Wei-hua Lou, Xue-bin Z... Clicked:6364 Download:4106 Cited:0 <Full Text> <PPT> 2484 Journal of Zhejiang University Science B 2017 Vol.18 No.3 P.272-276 DOI:10.1631/jzus.B1600315 |
| 5 | Cyber security meets artificial intelligence: a survey Author(s):Jian-hua Li Clicked:9390 Download:5150 Cited:0 <Full Text> <PPT> 2873 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1462-1474 DOI:10.1631/FITEE.1800573 |
| 6 | Security for cyberspace: challenges and opportunities Author(s):Jiang-xing WU, Jian-hua LI, Xin-sh... Clicked:5552 Download:3868 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1459-1461 DOI:10.1631/FITEE.1840000 |