| index | Title |
| 151 | 6G autonomous radio access network empowered by artificial intelligence and network digital twin Author(s):Guangyi LIU, Juan DENG, Yanhong ZHU, Na LI, Boxiao HAN, Shoufeng WANG, Hua RUI, Jingyu WANG, Jianhua ZHANG, Ying CUI, Yingping CUI, Yang YANG, Yan ZHANG, Jiangzhou WANG, Ye OUYANG, Xiaozhou YE, Tao CHEN, Rongpeng LI, Yongdong ZHU, Yuanyuan ZHANG, Li YANG, Sen BIAN, Wanfei SUN, Qingbi ZHENG, Zhou TONG, Huimin ZHANG, Zecai SHAO, Jiajun WU, Mancong KANG Clicked:2235 Download:2295 Cited:0 <Full Text> <PPT> 1131 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.2 P.161-213 DOI:10.1631/FITEE.2400569 |
| 152 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the Internet of Things Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu CHENG, Roshan KUMAR Clicked:2461 Download:3106 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |
| 153 | Active cybersecurity: vision, model, and key technologies Author(s):Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG Clicked:2654 Download:4556 Cited:0 <Full Text> <PPT> 695 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.8 P.1243-1278 DOI:10.1631/FITEE.2500053 |
| 154 | Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture Author(s):Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI Clicked:1478 Download:1762 Cited:0 <Full Text> <PPT> 627 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.8 P.1279-1292 DOI:10.1631/FITEE.2400251 |
| 155 | Dynamic trust-based service function chain deployment method for disrupting attack chains Author(s):Deqiang ZHOU, Xinsheng JI, Wei YOU, Hang QIU, Jie YANG, Yu ZHAO, Mingyan XU Clicked:999 Download:810 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.12 P.2550-2568 DOI:10.1631/FITEE.2500218 |
| 156 | Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG Clicked:395 Download:183 Cited:0 <Full Text> Journal of Zhejiang University Science 2026 Vol.27 No.4 P.1-10 DOI:10.1631/ENG.ITEE.2025.0138 |
| 157 | An approach to characterize the power system security region by integrating distributionally robust optimization and Transformer-based deep learning Author(s):Yuekai CHEN, Zhejing BAO*, Miao YU Clicked:39 Download:11 Cited:0 <Full Text> Journal of Zhejiang University Science In Press DOI: |
