Advanced Search



155 results found in all.
index Title
136Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
Author(s):Huifang YU, Xiaoping BAI  Clicked:3629  Download:2581  Cited:0  <Full Text>  <PPT> 451
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.461-471  DOI:10.1631/FITEE.2300248
137SCFformer: a binary data hiding method against JPEG compression based on spatial channel fusion Transformer
Author(s):Xintao DUAN, Chun LI, Bingxin WEI, Guoming WU, Chuan QIN, Haewoon NAM  Clicked:3054  Download:3406  Cited:0  <Full Text>  <PPT> 538
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.728-741  DOI:10.1631/FITEE.2300762
138Advances in halide perovskite semiconductors for energy-integrated and energy-resolved X-ray detection
Author(s):Yibin LAI, Yang Michael YANG  Clicked:2982  Download:2734  Cited:0  <Full Text>  <PPT> 836
Journal of Zhejiang University Science A  2024 Vol.25 No.10 P.824-840  DOI:10.1631/jzus.A2300660
139SRIS-Net: a robust image steganography algorithm based on feature score maps
Author(s):Ai XIAO, Zhi LI, Guomei WANG, Long ZHENG, Haoyuan SUN  Clicked:3070  Download:4528  Cited:0  <Full Text>  <PPT> 740
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.930-945  DOI:10.1631/FITEE.2400069
140Lightweight authentication scheme for edge control systems in Industrial Internet of Things
Author(s):Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO  Clicked:3419  Download:628  Cited:0  <Full Text>  <PPT> 1028
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.11 P.1466-1478  DOI:10.1631/FITEE.2400497
141A survey of binary code representation technology
Author(s):Taiyan WANG, Qingsong XIE, Lu YU, Zulie PAN, Min ZHANG  Clicked:2540  Download:3785  Cited:0  <Full Text>  <PPT> 622
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.671-694  DOI:10.1631/FITEE.2400088
142Effect of terminal boundary protection on the spread of computer viruses: modeling and simulation
Author(s):Kai GAO, Lixin ZHANG, Yabing YAO, Yang YANG, Fuzhong NIAN  Clicked:1891  Download:2549  Cited:0  <Full Text>  <PPT> 266
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1637-1648  DOI:10.1631/FITEE.2400236
143Anti-quantum cross-chain identity authentication approach using dynamic group signature
Author(s):Huifang YU, Mengjie HUANG  Clicked:1707  Download:3034  Cited:0  <Full Text>  <PPT> 543
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.742-752  DOI:10.1631/FITEE.2400443
144Federated deep reinforcement learning based computation offloading in a low Earth orbit satellite edge computing system
Author(s):Min JIA, Jian WU, Xinyu WANG, Qing GUO  Clicked:2537  Download:4259  Cited:0  <Full Text>  <PPT> 736
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.805-815  DOI:10.1631/FITEE.2400448
145XL-RIS empowered near-field physical layer security against jamming and eavesdropping attacks
Author(s):Zelong CUI, Jun LIU, Gang YANG  Clicked:2580  Download:2807  Cited:0  <Full Text>  <PPT> 1683
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.12 P.1750-1758  DOI:10.1631/FITEE.2400477
146Shared-weight multimodal translation model for recognizing Chinese variant characters
Author(s):Yuankang SUN, Bing LI, Lexiang LI, Peng YANG, Dongmei YANG  Clicked:1853  Download:3494  Cited:0  <Full Text>  <PPT> 471
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1066-1082  DOI:10.1631/FITEE.2400504
147Implications of bacteria‒bacteria interactions within the plant microbiota for plant health and productivity
Author(s):Giovanni Davide BARONE, Yaqi ZHOU, Hongkai WANG, Sunde XU, Zhonghua MA, Tomislav CERNAVA, Yun CHEN  Clicked:2740  Download:1937  Cited:0  <Full Text>  <PPT> 557
Journal of Zhejiang University Science B  2024 Vol.25 No.12 P.1039-1054  DOI:10.1631/jzus.B2300914
148Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA  Clicked:1770  Download:3238  Cited:0  <Full Text>  <PPT> 371
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
149Deep anomaly detection of temporal heterogeneous data in AIOps: a survey
Author(s):Jiayi GUI, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU  Clicked:2041  Download:4112  Cited:0  <Full Text>  <PPT> 300
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1551-1576  DOI:10.1631/FITEE.2400467
150SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG, Yushu ZHANG, Yong XIANG  Clicked:1787  Download:3077  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE