Journal of Zhejiang University


  

Advanced Search



153 results found in all.
index Title
106A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations
Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu  Clicked:7278  Download:9003  Cited:0  <Full Text>  <PPT> 2011
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.866-879  DOI:10.1631/FITEE.1900709
107Asymmetric pixel confusion algorithm for images based on RSA and Arnold transform
Author(s):Xiao-ling Huang, You-xia Dong, Kai-xin Jiao, Guo-dong Ye  Clicked:6475  Download:4538  Cited:0  <Full Text>  <PPT> 1860
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.12 P.1783-1794  DOI:10.1631/FITEE.2000241
108EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things
Author(s):Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi  Clicked:7317  Download:6610  Cited:0  <Full Text>  <PPT> 1822
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.3 P.374-399  DOI:10.1631/FITEE.1900636
109Novel efficient identity-based signature on lattices
Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao  Clicked:7091  Download:6273  Cited:0  <Full Text>  <PPT> 1793
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.2 P.244-250  DOI:10.1631/FITEE.1900318
110Hydrogen agronomy: research progress and prospects
Author(s):Yue-qiao Wang, Yu-hao Liu, Shu Wang, Hong-mei Du, Wen-biao Shen  Clicked:10334  Download:5816  Cited:0  <Full Text>  <PPT> 5418
Journal of Zhejiang University Science B  2020 Vol.21 No.11 P.841-855  DOI:10.1631/jzus.B2000386
111Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG  Clicked:7734  Download:11727  Cited:0  <Full Text>  <PPT> 994
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
112ECGID: a human identification method based on adaptive particle swarm optimization and the bidirectional LSTM model
Author(s):Yefei Zhang, Zhidong Zhao, Yanjun Deng, Xiaohong Zhang, Yu Zhang  Clicked:8249  Download:6685  Cited:0  <Full Text>  <PPT> 1610
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.12 P.1641-1654  DOI:10.1631/FITEE.2000511
113A review on cyber security named entity recognition
Author(s):Chen Gao, Xuan Zhang, Mengting Han, Hui Liu  Clicked:7433  Download:6087  Cited:0  <Full Text>  <PPT> 1946
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.9 P.1153-1168  DOI:10.1631/FITEE.2000286
114Verifier-local revocation group signatures with backward unlinkability from lattices
Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA  Clicked:7690  Download:9619  Cited:0  <Full Text>  <PPT> 769
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.876-892  DOI:10.1631/FITEE.2000507
115Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis
Author(s):Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, Qiang WEI  Clicked:7961  Download:13876  Cited:0  <Full Text>  <PPT> 887
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.351-360  DOI:10.1631/FITEE.2000709
116Post-quantum blind signcryption scheme from lattice
Author(s):Huifang Yu, Lu Bai  Clicked:5818  Download:8464  Cited:0  <Full Text>  <PPT> 1848
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.6 P.891-901  DOI:10.1631/FITEE.2000099
117Theory and techniques for "intellicise" wireless networks
Author(s):Ping ZHANG, Mugen PENG, Shuguang CUI, Zhaoyang ZHANG, Guoqiang MAO, Zhi QUAN, Tony Q. S. QUEK, Bo RONG  Clicked:4621  Download:4108  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.1-4  DOI:10.1631/FITEE.2210000
118An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG  Clicked:7268  Download:8911  Cited:0  <Full Text>  <PPT> 1168
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.134-144  DOI:10.1631/FITEE.2000325
119Flow control characteristics of the digital and mechanical redundancy control electric modulation valve
Author(s):He LIU, Bin ZHAO, Bo WANG, Long QUAN, Yun-xiao HAO, Yun-wei LI  Clicked:1957  Download:1538  Cited:0  <Full Text>  <PPT> 689
Journal of Zhejiang University Science A  2022 Vol.23 No.8 P.599-609  DOI:10.1631/jzus.A2100526
120A power resource dispatching framework with a privacy protection function in the Power Internet of Things
Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU  Clicked:3655  Download:6529  Cited:0  <Full Text>  <PPT> 771
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1354-1368  DOI:10.1631/FITEE.2100518
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE