Advanced Search



10 results found in all.
index Title
1Identification and characterization of plasma membrane aquaporins isolated from fiber cells of Calotropis procera
Author(s):Usman Aslam, Asia Khatoon, Hafiza Masooma Naseer Cheema, Aftab Bashir  Clicked:7295  Download:3675  Cited:1  <Full Text>
Journal of Zhejiang University Science B  2013 Vol.14 No.7 P.586-595  DOI:10.1631/jzus.B1200233
2Role of jasmonic acid in improving tolerance of rapeseed (Brassica napus L.) to Cd toxicity
Author(s):Essa Ali, Nazim Hussain, Imran Haider Shamsi, Zahra Jabeen, Muzammil Hussain Siddiqui, Li-xi Jiang  Clicked:5915  Download:3330  Cited:0  <Full Text>  <PPT> 2261
Journal of Zhejiang University Science B  2018 Vol.19 No.2 P.130-146  DOI:10.1631/jzus.B1700191
3A keyed-hashing based self-synchronization mechanism for port address hopping communication
Author(s):Yue-bin Luo, Bao-sheng Wang, Xiao-feng Wang, Bo-feng Zhang  Clicked:9941  Download:3180  Cited:0  <Full Text>  <PPT> 2579
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.5 P.719-728  DOI:10.1631/FITEE.1601548
4Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng  Clicked:7986  Download:2908  Cited:0  <Full Text>  <PPT> 2278
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
5Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:8547  Download:3065  Cited:0  <Full Text>  <PPT> 2488
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
6Optimized deployment of a radar network based on an improved firefly algorithm
Author(s):Xue-jun Zhang, Wei Jia, Xiang-min Guan, Guo-qiang Xu, Jun Chen, Yan-bo Zhu  Clicked:8617  Download:3058  Cited:0  <Full Text>  <PPT> 2274
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.3 P.425-437  DOI:10.1631/FITEE.1800749
7Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:7099  Download:2960  Cited:0  <Full Text>  <PPT> 2194
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
8Clinical value of the emergency department in screening and diagnosis of COVID-19 in China
Author(s):Qin Zhang, Jian Pan, Min-Xing Zhao, Yuan-Qiang Lu  Clicked:7540  Download:3693  Cited:0  <Full Text>  <PPT> 2519
Journal of Zhejiang University Science B  2020 Vol.21 No.5 P.388-393  DOI:10.1631/jzus.B2010011
9Detection and localization of cyber attacks on water treatment systems: an entropy-based approach
Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI  Clicked:9343  Download:12495  Cited:0  <Full Text>  <PPT> 899
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.4 P.587-603  DOI:10.1631/FITEE.2000546
10Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture
Author(s):Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI  Clicked:532  Download:476  Cited:0  <Full Text>  <PPT> 277
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1279-1292  DOI:10.1631/FITEE.2400251
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE