
| index | Title |
| 1 | Distributed anonymous data perturbation method for privacy-preserving data mining Author(s):Feng LI, Jin MA, Jian-hua LI Clicked:7952 Download:5786 Cited:3 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.7 P.952-963 DOI:10.1631/jzus.A0820320 |
| 2 | Preliminary screening and identification of stem cell-like sphere clones in a gallbladder cancer cell line ... Author(s):Bao-bing Yin, Shuang-jie Wu, Hua-j... Clicked:8905 Download:4017 Cited:15 <Full Text> Journal of Zhejiang University Science B 2011 Vol.12 No.4 P.256-263 DOI:10.1631/jzus.B1000303 |
| 3 | Triethoxysilane with oligo(ethylene oxide) substituent as film forming additive for graphite anode Author(s):Xue-ying Qin, Jing-lun Wang, Dao-p... Clicked:9221 Download:4381 Cited:2 <Full Text> Journal of Zhejiang University Science A 2013 Vol.14 No.7 P.514-519 DOI:10.1631/jzus.A1300026 |
| 4 | Large language model-enhanced probabilistic modeling for effective static analysis alarms Author(s):Xinlong PAN, Jianhua LI, Zhihong Z... Clicked:1583 Download:1786 Cited:0 <Full Text> <PPT> 281 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.10 P.1926-1941 DOI:10.1631/FITEE.2500038 |