
| index | Title |
| 1 | ε-inclusion: privacy preserving re-publication of dynamic datasets Author(s):Qiong WEI, Yan-sheng LU, Lei ZOU Clicked:6489 Download:3605 Cited:2 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1124-1133 DOI:10.1631/jzus.A071595 |
| 2 | Distributed anonymous data perturbation method for privacy-preserving data mining Author(s):Feng LI, Jin MA, Jian-hua LI Clicked:7952 Download:5786 Cited:3 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.7 P.952-963 DOI:10.1631/jzus.A0820320 |
| 3 | A secure threshold Paillier proxy signature scheme Author(s):Pei-yih TING, Xiao-wei HUANG, Jun-... Clicked:10619 Download:4871 Cited:1 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.3 P.206-213 DOI:10.1631/jzus.C0910493 |
| 4 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10064 Download:4319 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 5 | A survey of energy-efficient strategies for federated learning in mobile edge computing Author(s):Kang YAN, Nina SHU, Tao WU, Chunsh... Clicked:5334 Download:4313 Cited:0 <Full Text> <PPT> 1006 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.5 P.645-663 DOI:10.1631/FITEE.2300181 |
| 6 | Federated mutual learning: a collaborative machine learning method for heterogeneous data, models, and obje... Author(s):Tao SHEN, Jie ZHANG, Xinkang JIA, ... Clicked:3748 Download:6089 Cited:0 <Full Text> <PPT> 1373 Frontiers of Information Technology & Electronic Engineering 2023 Vol.24 No.10 P.1390-1402 DOI:10.1631/FITEE.2300098 |
| 7 | Reinforcement learning based privacy-preserving consensus tracking control of nonstrict-feedback discrete-t... Author(s):Yang YANG, Fanming HUANG, Dong YUE Clicked:3263 Download:4616 Cited:0 <Full Text> <PPT> 719 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.456-471 DOI:10.1631/FITEE.2300532 |
| 8 | A privacy-preserving vehicle trajectory clustering framework Author(s):Ran TIAN, Pulun GAO, Yanxing LIU Clicked:3798 Download:3442 Cited:0 <Full Text> <PPT> 912 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.7 P.988-1002 DOI:10.1631/FITEE.2300369 |
| 9 | Efficient privacy-preserving scheme for secure neural network inference Author(s):Liquan CHEN, Zixuan YANG, Peng ZHA... Clicked:2130 Download:4469 Cited:0 <Full Text> <PPT> 505 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1609-1623 DOI:10.1631/FITEE.2400371 |
| 10 | AOI-OPEN: federated operation and control for DAO-based trustworthy and intelligent AOI ecology Author(s):Yansong CAO, Yutong WANG, Jing YAN... Clicked:1610 Download:2909 Cited:0 <Full Text> <PPT> 523 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1209-1221 DOI:10.1631/FITEE.2400975 |
| 11 | Privacy-preserving bipartite consensus with cooperative–competitive interactions via a node decompos... Author(s):Licheng WANG, Yongling CHEN, Shuai... Clicked:1791 Download:1554 Cited:0 <Full Text> <PPT> 363 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.11 P.2114-2127 DOI:10.1631/FITEE.2500093 |
| 12 | Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG Clicked:275 Download:147 Cited:0 <Full Text> Journal of Zhejiang University Science 2026 Vol.27 No.4 P.1-10 DOI:10.1631/ENG.ITEE.2025.0138 |