Advanced Search



157 results found in all.
index Title
136Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
Author(s):Huifang YU, Xiaoping BAI  Clicked:4007  Download:3217  Cited:0  <Full Text>  <PPT> 526
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.461-471  DOI:10.1631/FITEE.2300248
137SCFformer: a binary data hiding method against JPEG compression based on spatial channel fusion Transformer
Author(s):Xintao DUAN, Chun LI, Bingxin WEI, Guoming WU, Chuan QIN, Haewoon NAM  Clicked:3486  Download:4787  Cited:0  <Full Text>  <PPT> 662
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.728-741  DOI:10.1631/FITEE.2300762
138Advances in halide perovskite semiconductors for energy-integrated and energy-resolved X-ray detection
Author(s):Yibin LAI, Yang Michael YANG  Clicked:3357  Download:3366  Cited:0  <Full Text>  <PPT> 955
Journal of Zhejiang University Science A  2024 Vol.25 No.10 P.824-840  DOI:10.1631/jzus.A2300660
139SRIS-Net: a robust image steganography algorithm based on feature score maps
Author(s):Ai XIAO, Zhi LI, Guomei WANG, Long ZHENG, Haoyuan SUN  Clicked:3541  Download:5894  Cited:0  <Full Text>  <PPT> 928
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.930-945  DOI:10.1631/FITEE.2400069
140Lightweight authentication scheme for edge control systems in Industrial Internet of Things
Author(s):Wenli SHANG, Xudong WEN, Zhuo CHEN, Wenze XIONG, Zhiwei CHANG, Zhong CAO  Clicked:3862  Download:1241  Cited:0  <Full Text>  <PPT> 1109
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.11 P.1466-1478  DOI:10.1631/FITEE.2400497
141A survey of binary code representation technology
Author(s):Taiyan WANG, Qingsong XIE, Lu YU, Zulie PAN, Min ZHANG  Clicked:3856  Download:5474  Cited:0  <Full Text>  <PPT> 792
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.671-694  DOI:10.1631/FITEE.2400088
142Effect of terminal boundary protection on the spread of computer viruses: modeling and simulation
Author(s):Kai GAO, Lixin ZHANG, Yabing YAO, Yang YANG, Fuzhong NIAN  Clicked:2314  Download:3505  Cited:0  <Full Text>  <PPT> 410
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1637-1648  DOI:10.1631/FITEE.2400236
143Anti-quantum cross-chain identity authentication approach using dynamic group signature
Author(s):Huifang YU, Mengjie HUANG  Clicked:2112  Download:4473  Cited:0  <Full Text>  <PPT> 699
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.742-752  DOI:10.1631/FITEE.2400443
144Federated deep reinforcement learning based computation offloading in a low Earth orbit satellite edge computing system
Author(s):Min JIA, Jian WU, Xinyu WANG, Qing GUO  Clicked:3053  Download:5682  Cited:0  <Full Text>  <PPT> 879
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.805-815  DOI:10.1631/FITEE.2400448
145XL-RIS empowered near-field physical layer security against jamming and eavesdropping attacks
Author(s):Zelong CUI, Jun LIU, Gang YANG  Clicked:2942  Download:4189  Cited:0  <Full Text>  <PPT> 1789
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.12 P.1750-1758  DOI:10.1631/FITEE.2400477
146Shared-weight multimodal translation model for recognizing Chinese variant characters
Author(s):Yuankang SUN, Bing LI, Lexiang LI, Peng YANG, Dongmei YANG  Clicked:2254  Download:5045  Cited:0  <Full Text>  <PPT> 632
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1066-1082  DOI:10.1631/FITEE.2400504
147Implications of bacteria‒bacteria interactions within the plant microbiota for plant health and productivity
Author(s):Giovanni Davide BARONE, Yaqi ZHOU, Hongkai WANG, Sunde XU, Zhonghua MA, Tomislav CERNAVA, Yun CHEN  Clicked:3248  Download:2618  Cited:0  <Full Text>  <PPT> 692
Journal of Zhejiang University Science B  2024 Vol.25 No.12 P.1039-1054  DOI:10.1631/jzus.B2300914
148Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA  Clicked:2204  Download:4718  Cited:0  <Full Text>  <PPT> 533
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
149Deep anomaly detection of temporal heterogeneous data in AIOps: a survey
Author(s):Jiayi GUI, Zhongnan MA, Hao ZHOU, Yan SU, Miaoru ZHANG, Ke YU, Xiaofei WU  Clicked:2531  Download:5726  Cited:0  <Full Text>  <PPT> 502
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1551-1576  DOI:10.1631/FITEE.2400467
150SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG, Yushu ZHANG, Yong XIANG  Clicked:2186  Download:4442  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE