Deep search:Searching for "Malicious attacks" in 'KEYWORD Got 6 items.
index Title
1Robust lossless data hiding scheme
Author(s):Xian-ting ZENG, Xue-zeng PAN, Ling...  Clicked:10394  Download:5389  Cited:3  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.2 P.101-110  DOI:10.1631/jzus.C0910177
2A lightweight authentication scheme with user untraceability
Author(s):Kuo-Hui Yeh  Clicked:8289  Download:3204  Cited:2  <Full Text>  <PPT> 2237
Frontiers of Information Technology & Electronic Engineering  2015 Vol.16 No.4 P.259-271  DOI:10.1631/FITEE.1400232
3Secure connectivity analysis in unmanned aerial vehicle networks
Author(s):Xin Yuan, Zhi-yong Feng, Wen-jun X...  Clicked:8049  Download:2937  Cited:0  <Full Text>  <PPT> 1996
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.3 P.409-422  DOI:10.1631/FITEE.1700032
4Enhancing security of NVM-based main memory with dynamic Feistel network mapping
Author(s):Fang-ting Huang, Dan Feng, Wen Xia...  Clicked:7987  Download:3163  Cited:0  <Full Text>  <PPT> 2177
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.7 P.847-863  DOI:10.1631/FITEE.1601652
5An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
Author(s):Masoud Kaveh, Abolfazl Falahati  Clicked:6230  Download:10469  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.1010-1019  DOI:10.1631/FITEE.2000043
6Towards resilient average consensus inmulti-agent systems: a detection and compensation approach
Author(s):Chongrong FANG, Wenzhe ZHENG, Zhiy...  Clicked:2303  Download:1940  Cited:0  <Full Text>  <PPT> 423
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.2 P.182-196  DOI:10.1631/FITEE.2300467
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE