Advanced Search



153 results found in all.
index Title
91A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Author(s):Ya Qin, Guo-wei Shen, Wen-bo Zhao, Yan-ping Chen, Miao Yu, Xin Jin  Clicked:8436  Download:2662  Cited:0  <Full Text>  <PPT> 2080
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.872-884  DOI:10.1631/FITEE.1800520
92A block-based secure and robust watermarking scheme for color images based on multi-resolution decomposition and de-correlation
Author(s):Muhammad Imran, Bruce A. Harvey, Muhammad Atif, Adnan Ali Memon  Clicked:7266  Download:2796  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.946-963  DOI:10.1631/FITEE.1700667
93Man-machine verification of mouse trajectory based on the random forest model
Author(s):Zhen-yi Xu, Yu Kang, Yang Cao, Yu-xiao Yang  Clicked:7247  Download:2745  Cited:0  <Full Text>  <PPT> 1920
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.925-929  DOI:10.1631/FITEE.1700442
94Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model
Author(s):Ya Xiao, Zhi-jie Fan, Amiya Nayak, Cheng-xiang Tan  Clicked:7786  Download:2501  Cited:0  <Full Text>  <PPT> 1843
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1195-1208  DOI:10.1631/FITEE.1800436
95FinBrain: when finance meets AI 2.0
Author(s):Xiao-lin Zheng, Meng-ying Zhu, Qi-bing Li, Chao-chao Chen, Yan-chao Tan  Clicked:8125  Download:3242  Cited:0  <Full Text>  <PPT> 2050
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.914-924  DOI:10.1631/FITEE.1700822
96Correlation power attack on a message authentication code based on SM3
Author(s):Ye Yuan, Kai-ge Qu, Li-ji Wu, Jia-wei Ma, Xiang-min Zhang  Clicked:8029  Download:2646  Cited:0  <Full Text>  <PPT> 1853
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.930-945  DOI:10.1631/FITEE.1800312
97Future Internet: trends and challenges
Author(s):Jiao Zhang, Tao Huang, Shuo Wang, Yun-jie Liu  Clicked:7000  Download:2609  Cited:0  <Full Text>  <PPT> 1861
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.9 P.1185-1194  DOI:10.1631/FITEE.1800445
98Nanoscale cryptographic architecture design using quantum-dot cellular automata
Author(s):Bikash Debnath, Jadav Chandra Das, Debashis De  Clicked:6591  Download:3269  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.11 P.1578-1586  DOI:10.1631/FITEE.1800458
99Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA
Author(s):Vijay Dahiphale, Gaurav Bansod, Ankur Zambare, Narayan Pisharoty  Clicked:7322  Download:3172  Cited:0  <Full Text>  <PPT> 1927
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.4 P.615-628  DOI:10.1631/FITEE.1800681
100MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:7532  Download:3455  Cited:0  <Full Text>  <PPT> 1892
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
101Design innovation of mesoscale robotic swarms: applications to cooperative urban sensing and mapping
Author(s):Audelia G. Dharmawan, Gim Song Soh, Shaohui Foong, Roland Bouffanais, Kristin L. Wood  Clicked:7557  Download:2353  Cited:0  <Full Text>  <PPT> 2024
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1618-1631  DOI:10.1631/FITEE.1900384
102Recent progress on the study of distributed economic dispatch in smart grid: an overview
Author(s):Guanghui Wen, Xinghuo Yu, Zhiwei Liu  Clicked:5735  Download:8517  Cited:0  <Full Text>  <PPT> 1940
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.1 P.25-39  DOI:10.1631/FITEE.2000205
103An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
Author(s):Masoud Kaveh, Abolfazl Falahati  Clicked:6404  Download:10940  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.1010-1019  DOI:10.1631/FITEE.2000043
104Complex systems and networks with their applications
Author(s):Jin-de Cao, Yang Liu, Jian-quan Lu, Leszek Rutkowski  Clicked:4738  Download:2172  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.2 P.195-198  DOI:10.1631/FITEE.2020000
105Gene editing: an instrument for practical application of gene biology to plant breeding
Author(s):Yuan-Yuan Tan, Hao Du, Xia Wu, Yan-Hua Liu, Meng Jiang, Shi-Yong Song, Liang Wu, Qing-Yao Shu  Clicked:4459  Download:2882  Cited:0  <Full Text>  <PPT> 1718
Journal of Zhejiang University Science B  2020 Vol.21 No.6 P.460-473  DOI:10.1631/jzus.B1900633
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE