| index | Title |
| 151 | 6G autonomous radio access network empowered by artificial intelligence and network digital twin Author(s):Guangyi LIU, Juan DENG, Yanhong ZHU, Na LI, Boxiao HAN, Shoufeng WANG, Hua RUI, Jingyu WANG, Jianhua ZHANG, Ying CUI, Yingping CUI, Yang YANG, Yan ZHANG, Jiangzhou WANG, Ye OUYANG, Xiaozhou YE, Tao CHEN, Rongpeng LI, Yongdong ZHU, Yuanyuan ZHANG, Li YANG, Sen BIAN, Wanfei SUN, Qingbi ZHENG, Zhou TONG, Huimin ZHANG, Zecai SHAO, Jiajun WU, Mancong KANG Clicked:2242 Download:2301 Cited:0 <Full Text> <PPT> 1135 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.2 P.161-213 DOI:10.1631/FITEE.2400569 |
| 152 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the Internet of Things Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu CHENG, Roshan KUMAR Clicked:2465 Download:3114 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |
| 153 | Active cybersecurity: vision, model, and key technologies Author(s):Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG Clicked:2662 Download:4565 Cited:0 <Full Text> <PPT> 696 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.8 P.1243-1278 DOI:10.1631/FITEE.2500053 |
| 154 | Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture Author(s):Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI Clicked:1481 Download:1763 Cited:0 <Full Text> <PPT> 628 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.8 P.1279-1292 DOI:10.1631/FITEE.2400251 |
| 155 | Dynamic trust-based service function chain deployment method for disrupting attack chains Author(s):Deqiang ZHOU, Xinsheng JI, Wei YOU, Hang QIU, Jie YANG, Yu ZHAO, Mingyan XU Clicked:1000 Download:810 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.12 P.2550-2568 DOI:10.1631/FITEE.2500218 |
| 156 | Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG Clicked:402 Download:185 Cited:0 <Full Text> Journal of Zhejiang University Science 2026 Vol.27 No.4 P.1-10 DOI:10.1631/ENG.ITEE.2025.0138 |
| 157 | An approach to characterize the power system security region by integrating distributionally robust optimization and Transformer-based deep learning Author(s):Yuekai CHEN, Zhejing BAO*, Miao YU Clicked:42 Download:13 Cited:0 <Full Text> Journal of Zhejiang University Science In Press DOI: |
