Advanced Search



157 results found in all.
index Title
91A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Author(s):Ya Qin, Guo-wei Shen, Wen-bo Zhao, Yan-ping Chen, Miao Yu, Xin Jin  Clicked:10352  Download:4124  Cited:0  <Full Text>  <PPT> 2526
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.872-884  DOI:10.1631/FITEE.1800520
92A block-based secure and robust watermarking scheme for color images based on multi-resolution decomposition and de-correlation
Author(s):Muhammad Imran, Bruce A. Harvey, Muhammad Atif, Adnan Ali Memon  Clicked:8886  Download:4181  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.946-963  DOI:10.1631/FITEE.1700667
93Man-machine verification of mouse trajectory based on the random forest model
Author(s):Zhen-yi Xu, Yu Kang, Yang Cao, Yu-xiao Yang  Clicked:9168  Download:4298  Cited:0  <Full Text>  <PPT> 2321
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.925-929  DOI:10.1631/FITEE.1700442
94Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model
Author(s):Ya Xiao, Zhi-jie Fan, Amiya Nayak, Cheng-xiang Tan  Clicked:9792  Download:3968  Cited:0  <Full Text>  <PPT> 2381
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1195-1208  DOI:10.1631/FITEE.1800436
95FinBrain: when finance meets AI 2.0
Author(s):Xiao-lin Zheng, Meng-ying Zhu, Qi-bing Li, Chao-chao Chen, Yan-chao Tan  Clicked:9592  Download:4781  Cited:0  <Full Text>  <PPT> 2716
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.914-924  DOI:10.1631/FITEE.1700822
96Correlation power attack on a message authentication code based on SM3
Author(s):Ye Yuan, Kai-ge Qu, Li-ji Wu, Jia-wei Ma, Xiang-min Zhang  Clicked:9653  Download:4080  Cited:0  <Full Text>  <PPT> 2315
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.930-945  DOI:10.1631/FITEE.1800312
97Future Internet: trends and challenges
Author(s):Jiao Zhang, Tao Huang, Shuo Wang, Yun-jie Liu  Clicked:8507  Download:4099  Cited:0  <Full Text>  <PPT> 2331
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1185-1194  DOI:10.1631/FITEE.1800445
98Nanoscale cryptographic architecture design using quantum-dot cellular automata
Author(s):Bikash Debnath, Jadav Chandra Das, Debashis De  Clicked:7809  Download:4678  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.11 P.1578-1586  DOI:10.1631/FITEE.1800458
99Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA
Author(s):Vijay Dahiphale, Gaurav Bansod, Ankur Zambare, Narayan Pisharoty  Clicked:8403  Download:4667  Cited:0  <Full Text>  <PPT> 2292
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.4 P.615-628  DOI:10.1631/FITEE.1800681
100MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:9560  Download:4994  Cited:0  <Full Text>  <PPT> 2243
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
101Design innovation of mesoscale robotic swarms: applications to cooperative urban sensing and mapping
Author(s):Audelia G. Dharmawan, Gim Song Soh, Shaohui Foong, Roland Bouffanais, Kristin L. Wood  Clicked:9415  Download:3824  Cited:0  <Full Text>  <PPT> 2480
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1618-1631  DOI:10.1631/FITEE.1900384
102Recent progress on the study of distributed economic dispatch in smart grid: an overview
Author(s):Guanghui Wen, Xinghuo Yu, Zhiwei Liu  Clicked:7627  Download:10743  Cited:0  <Full Text>  <PPT> 2443
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.1 P.25-39  DOI:10.1631/FITEE.2000205
103An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
Author(s):Masoud Kaveh, Abolfazl Falahati  Clicked:7695  Download:13825  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.1010-1019  DOI:10.1631/FITEE.2000043
104Complex systems and networks with their applications
Author(s):Jin-de Cao, Yang Liu, Jian-quan Lu, Leszek Rutkowski  Clicked:6705  Download:3809  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.2 P.195-198  DOI:10.1631/FITEE.2020000
105Gene editing: an instrument for practical application of gene biology to plant breeding
Author(s):Yuan-Yuan Tan, Hao Du, Xia Wu, Yan-Hua Liu, Meng Jiang, Shi-Yong Song, Liang Wu, Qing-Yao Shu  Clicked:5960  Download:4798  Cited:0  <Full Text>  <PPT> 2285
Journal of Zhejiang University Science B  2020 Vol.21 No.6 P.460-473  DOI:10.1631/jzus.B1900633
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE