Advanced Search



153 results found in all.
index Title
136Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
Author(s):Huifang YU, Xiaoping BAI  Clicked:2656  Download:1541  Cited:0  <Full Text>  <PPT> 29
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.461-471  DOI:10.1631/FITEE.2300248
137SCFformer: a binary data hiding method against JPEG compression based on spatial channel fusion Transformer
Author(s):Xintao DUAN, Chun LI, Bingxin WEI, Guoming WU, Chuan QIN, Haewoon NAM  Clicked:1668  Download:1564  Cited:0  <Full Text>  <PPT> 241
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.728-741  DOI:10.1631/FITEE.2300762
138Advances in halide perovskite semiconductors for energy-integrated and energy-resolved X-ray detection
Author(s):Yibin LAI, Yang Michael YANG  Clicked:1708  Download:1767  Cited:0  <Full Text>  <PPT> 481
Journal of Zhejiang University Science A  2024 Vol.25 No.10 P.824-840  DOI:10.1631/jzus.A2300660
139SRIS-Net: a robust image steganography algorithm based on feature score maps
Author(s):Ai XIAO, Zhi LI, Guomei WANG, Long ZHENG, Haoyuan SUN  Clicked:1623  Download:2828  Cited:0  <Full Text>  <PPT> 381
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.930-945  DOI:10.1631/FITEE.2400069
140Lightweight authentication scheme for edge control systems in Industrial Internet of Things
Author(s):Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO  Clicked:1848  Download:413  Cited:0  <Full Text>  <PPT> 631
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.11 P.1466-1478  DOI:10.1631/FITEE.2400497
141A survey of binary code representation technology
Author(s):Taiyan WANG, Qingsong XIE, Lu YU, Zulie PAN, Min ZHANG  Clicked:1181  Download:1664  Cited:0  <Full Text>  <PPT> 249
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.671-694  DOI:10.1631/FITEE.2400088
142The effect of terminal boundary protection on the spread of computer viruses: modeling and simulation
Author(s):Kai GAO, Lixin ZHANG, Yabing YAO, Yang YANG, Fuzhong NIAN  Clicked:842  Download:969  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  In Press    DOI:
143Anti-quantum cross-chain identity authentication approach using dynamic group signature
Author(s):Huifang YU, Mengjie HUANG  Clicked:698  Download:1208  Cited:0  <Full Text>  <PPT> 230
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.742-752  DOI:10.1631/FITEE.2400443
144Federated deep reinforcement learning based computation offloading in a low Earth orbit satellite edge computing system
Author(s):Min JIA, Jian WU, Xinyu WANG, Qing GUO  Clicked:974  Download:1927  Cited:0  <Full Text>  <PPT> 312
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.805-815  DOI:10.1631/FITEE.2400448
145XL-RIS empowered near-field physical layer security against jamming and eavesdropping attacks
Author(s):Zelong CUI, Jun LIU, Gang YANG  Clicked:1110  Download:1187  Cited:0  <Full Text>  <PPT> 1331
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.12 P.1750-1758  DOI:10.1631/FITEE.2400477
146Shared-weight multimodal translation model for recognizing Chinese variant characters
Author(s):Yuankang SUN, Bing LI, Lexiang LI, Peng YANG, Dongmei YANG  Clicked:631  Download:1362  Cited:0  <Full Text>  <PPT> 31
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1066-1082  DOI:10.1631/FITEE.2400504
147Implications of bacteria‒bacteria interactions within the plant microbiota for plant health and productivity
Author(s):Giovanni Davide BARONE, Yaqi ZHOU, Hongkai WANG, Sunde XU, Zhonghua MA, Tomislav CERNAVA, Yun CHEN  Clicked:1488  Download:1003  Cited:0  <Full Text>  <PPT> 216
Journal of Zhejiang University Science B  2024 Vol.25 No.12 P.1039-1054  DOI:10.1631/jzus.B2300914
148Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA  Clicked:591  Download:1310  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  In Press    DOI:
149Deep anomaly detection of temporal heterogeneous data in AIOps: a survey?
Author(s):Jiayi GU, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU  Clicked:565  Download:1107  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  In Press    DOI:
150SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG, Yushu ZHANG, Yong XIANG  Clicked:835  Download:1194  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE