| index | Title |
| 136 | Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system Author(s):Huifang YU, Xiaoping BAI Clicked:4008 Download:3217 Cited:0 <Full Text> <PPT> 526 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.3 P.461-471 DOI:10.1631/FITEE.2300248 |
| 137 | SCFformer: a binary data hiding method against JPEG compression based on spatial channel fusion Transformer Author(s):Xintao DUAN, Chun LI, Bingxin WEI, Guoming WU, Chuan QIN, Haewoon NAM Clicked:3488 Download:4787 Cited:0 <Full Text> <PPT> 662 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.728-741 DOI:10.1631/FITEE.2300762 |
| 138 | Advances in halide perovskite semiconductors for energy-integrated and energy-resolved X-ray detection Author(s):Yibin LAI, Yang Michael YANG Clicked:3358 Download:3366 Cited:0 <Full Text> <PPT> 955 Journal of Zhejiang University Science A 2024 Vol.25 No.10 P.824-840 DOI:10.1631/jzus.A2300660 |
| 139 | SRIS-Net: a robust image steganography algorithm based on feature score maps Author(s):Ai XIAO, Zhi LI, Guomei WANG, Long ZHENG, Haoyuan SUN Clicked:3542 Download:5894 Cited:0 <Full Text> <PPT> 928 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.930-945 DOI:10.1631/FITEE.2400069 |
| 140 | Lightweight authentication scheme for edge control systems in Industrial Internet of Things Author(s):Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO Clicked:3862 Download:1241 Cited:0 <Full Text> <PPT> 1109 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.11 P.1466-1478 DOI:10.1631/FITEE.2400497 |
| 141 | A survey of binary code representation technology Author(s):Taiyan WANG, Qingsong XIE, Lu YU, Zulie PAN, Min ZHANG Clicked:3860 Download:5474 Cited:0 <Full Text> <PPT> 792 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.671-694 DOI:10.1631/FITEE.2400088 |
| 142 | Effect of terminal boundary protection on the spread of computer viruses: modeling and simulation Author(s):Kai GAO, Lixin ZHANG, Yabing YAO, Yang YANG, Fuzhong NIAN Clicked:2318 Download:3505 Cited:0 <Full Text> <PPT> 410 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1637-1648 DOI:10.1631/FITEE.2400236 |
| 143 | Anti-quantum cross-chain identity authentication approach using dynamic group signature Author(s):Huifang YU, Mengjie HUANG Clicked:2112 Download:4473 Cited:0 <Full Text> <PPT> 699 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.742-752 DOI:10.1631/FITEE.2400443 |
| 144 | Federated deep reinforcement learning based computation offloading in a low Earth orbit satellite edge computing system Author(s):Min JIA, Jian WU, Xinyu WANG, Qing GUO Clicked:3053 Download:5682 Cited:0 <Full Text> <PPT> 879 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.5 P.805-815 DOI:10.1631/FITEE.2400448 |
| 145 | XL-RIS empowered near-field physical layer security against jamming and eavesdropping attacks Author(s):Zelong CUI, Jun LIU, Gang YANG Clicked:2942 Download:4189 Cited:0 <Full Text> <PPT> 1789 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.12 P.1750-1758 DOI:10.1631/FITEE.2400477 |
| 146 | Shared-weight multimodal translation model for recognizing Chinese variant characters Author(s):Yuankang SUN, Bing LI, Lexiang LI, Peng YANG, Dongmei YANG Clicked:2255 Download:5045 Cited:0 <Full Text> <PPT> 632 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1066-1082 DOI:10.1631/FITEE.2400504 |
| 147 | Implications of bacteria‒bacteria interactions within the plant microbiota for plant health and productivity Author(s):Giovanni Davide BARONE, Yaqi ZHOU, Hongkai WANG, Sunde XU, Zhonghua MA, Tomislav CERNAVA, Yun CHEN Clicked:3254 Download:2618 Cited:0 <Full Text> <PPT> 692 Journal of Zhejiang University Science B 2024 Vol.25 No.12 P.1039-1054 DOI:10.1631/jzus.B2300914 |
| 148 | Efficient privacy-preserving scheme for secure neural network inference Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA Clicked:2205 Download:4718 Cited:0 <Full Text> <PPT> 533 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1609-1623 DOI:10.1631/FITEE.2400371 |
| 149 | Deep anomaly detection of temporal heterogeneous data in AIOps: a survey Author(s):Jiayi GUI, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU Clicked:2532 Download:5726 Cited:0 <Full Text> <PPT> 502 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1551-1576 DOI:10.1631/FITEE.2400467 |
| 150 | SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG, Yushu ZHANG, Yong XIANG Clicked:2187 Download:4442 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.847-861 DOI:10.1631/FITEE.2400721 |
