Advanced Search



157 results found in all.
index Title
1516G autonomous radio access network empowered by artificial intelligence and network digital twin
Author(s):Guangyi LIU, Juan DENG, Yanhong ZHU, Na LI, Boxiao HAN, Shoufeng WANG, Hua RUI, Jingyu WANG, Jianhua ZHANG, Ying CUI, Yingping CUI, Yang YANG, Yan ZHANG, Jiangzhou WANG, Ye OUYANG, Xiaozhou YE, Tao CHEN, Rongpeng LI, Yongdong ZHU, Yuanyuan ZHANG, Li YANG, Sen BIAN, Wanfei SUN, Qingbi ZHENG, Zhou TONG, Huimin ZHANG, Zecai SHAO, Jiajun WU, Mancong KANG  Clicked:2242  Download:2301  Cited:0  <Full Text>  <PPT> 1135
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.2 P.161-213  DOI:10.1631/FITEE.2400569
152FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the Internet of Things
Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu CHENG, Roshan KUMAR  Clicked:2465  Download:3114  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1164-1179  DOI:10.1631/FITEE.2400932
153Active cybersecurity: vision, model, and key technologies
Author(s):Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG  Clicked:2662  Download:4565  Cited:0  <Full Text>  <PPT> 696
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1243-1278  DOI:10.1631/FITEE.2500053
154Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture
Author(s):Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI  Clicked:1481  Download:1763  Cited:0  <Full Text>  <PPT> 628
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1279-1292  DOI:10.1631/FITEE.2400251
155Dynamic trust-based service function chain deployment method for disrupting attack chains
Author(s):Deqiang ZHOU, Xinsheng JI, Wei YOU, Hang QIU, Jie YANG, Yu ZHAO, Mingyan XU  Clicked:1000  Download:810  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.12 P.2550-2568  DOI:10.1631/FITEE.2500218
156Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem
Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG  Clicked:402  Download:185  Cited:0  <Full Text>
Journal of Zhejiang University Science  2026 Vol.27 No.4 P.1-10  DOI:10.1631/ENG.ITEE.2025.0138
157An approach to characterize the power system security region by integrating distributionally robust optimization and Transformer-based deep learning
Author(s):Yuekai CHEN, Zhejing BAO*, Miao YU  Clicked:42  Download:13  Cited:0  <Full Text>
Journal of Zhejiang University Science  In Press    DOI:
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE