Advanced Search



38 results found in all.
index Title
31Underwater object detection by fusing features from different representations of sonar data
Author(s):Fei WANG, Wanyu LI, Miao LIU, Jingchun ZHOU, Weishi ZHANG  Clicked:3370  Download:2250  Cited:0  <Full Text>  <PPT> 732
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.6 P.828-843  DOI:10.1631/FITEE.2200429
32Design and application of new storage systems
Author(s):Guangyan ZHANG, Dan FENG, Keqin LI, Zili SHAO, Nong XIAO, Jin XIONG, Weimin ZHENG  Clicked:2701  Download:4290  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.5 P.633-636  DOI:10.1631/FITEE.2310000
33MyWAL: performance optimization by removing redundant input/output stack in key-value store
Author(s):Xiao ZHANG, Mengyu LI, Michael NGULUBE, Yonghao CHEN, Yiping ZHAO  Clicked:3605  Download:3040  Cited:0  <Full Text>  <PPT> 746
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.980-993  DOI:10.1631/FITEE.2200496
34A cloud-edge-device collaborative offloading scheme with heterogeneous tasks and its performance evaluation
Author(s):Xiaojun BAI, Yang ZHANG, Haixing WU, Yuting WANG, Shunfu JIN  Clicked:2703  Download:8492  Cited:0  <Full Text>  <PPT> 741
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.5 P.664-684  DOI:10.1631/FITEE.2300128
35Digital twin system framework and information model for industry chain based on industrial Internet
Author(s):Wenxuan WANG, Yongqin LIU, Xudong CHAI, Lin ZHANG  Clicked:11734  Download:1842  Cited:0  <Full Text>  <PPT> 575
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.7 P.951-967  DOI:10.1631/FITEE.2300123
36Algorithm for 3D point cloud steganalysis based on composite operator feature enhancement
Author(s):Shuai REN, Hao GONG, Suya ZHENG  Clicked:951  Download:921  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.1 P.62-78  DOI:10.1631/FITEE.2400360
37Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA  Clicked:1123  Download:1911  Cited:0  <Full Text>  <PPT> 39
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
386G autonomous radio access network empowered by artificial intelligence and network digital twin
Author(s):Guangyi LIU, Juan DENG, Yanhong ZHU, Na LI, Boxiao HAN, Shoufeng WANG, Hua RUI, Jingyu WANG, Jianhua ZHANG, Ying CUI, Yingping CUI, Yang YANG, Yan ZHANG, Jiangzhou WANG, Ye OUYANG, Xiaozhou YE, Tao CHEN, Rongpeng LI, Yongdong ZHU, Yuanyuan ZHANG, Li YANG, Sen BIAN, Wanfei SUN, Qingbi ZHENG, Zhou TONG, Huimin ZHANG, Zecai SHAO, Jiajun WU, Mancong KANG  Clicked:977  Download:914  Cited:0  <Full Text>  <PPT> 555
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.2 P.161-213  DOI:10.1631/FITEE.2400569
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE