| index | Title |
| 106 | A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations Author(s):Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu Clicked:8814 Download:11669 Cited:0 <Full Text> <PPT> 2528 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.6 P.866-879 DOI:10.1631/FITEE.1900709 |
| 107 | Asymmetric pixel confusion algorithm for images based on RSA and Arnold transform Author(s):Xiao-ling Huang, You-xia Dong, Kai-xin Jiao, Guo-dong Ye Clicked:8241 Download:6489 Cited:0 <Full Text> <PPT> 2239 Frontiers of Information Technology & Electronic Engineering 2020 Vol.21 No.12 P.1783-1794 DOI:10.1631/FITEE.2000241 |
| 108 | EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things Author(s):Weiyong Yang, Wei Liu, Xingshen Wei, Zixin Guo, Kangle Yang, Hao Huang, Longyun Qi Clicked:9171 Download:9151 Cited:0 <Full Text> <PPT> 2245 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.3 P.374-399 DOI:10.1631/FITEE.1900636 |
| 109 | Novel efficient identity-based signature on lattices Author(s):Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao Clicked:8723 Download:8298 Cited:0 <Full Text> <PPT> 2139 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.2 P.244-250 DOI:10.1631/FITEE.1900318 |
| 110 | Hydrogen agronomy: research progress and prospects Author(s):Yue-qiao Wang, Yu-hao Liu, Shu Wang, Hong-mei Du, Wen-biao Shen Clicked:13203 Download:8196 Cited:0 <Full Text> <PPT> 6561 Journal of Zhejiang University Science B 2020 Vol.21 No.11 P.841-855 DOI:10.1631/jzus.B2000386 |
| 111 | Identity-based threshold proxy re-encryption scheme from lattices and its applications Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG Clicked:9140 Download:14452 Cited:0 <Full Text> <PPT> 1413 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.258-277 DOI:10.1631/FITEE.2000366 |
| 112 | ECGID: a human identification method based on adaptive particle swarm optimization and the bidirectional LSTM model Author(s):Yefei Zhang, Zhidong Zhao, Yanjun Deng, Xiaohong Zhang, Yu Zhang Clicked:10410 Download:8654 Cited:0 <Full Text> <PPT> 2289 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.12 P.1641-1654 DOI:10.1631/FITEE.2000511 |
| 113 | A review on cyber security named entity recognition Author(s):Chen Gao, Xuan Zhang, Mengting Han, Hui Liu Clicked:8869 Download:8463 Cited:0 <Full Text> <PPT> 2551 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.9 P.1153-1168 DOI:10.1631/FITEE.2000286 |
| 114 | Verifier-local revocation group signatures with backward unlinkability from lattices Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA Clicked:9430 Download:12026 Cited:0 <Full Text> <PPT> 1310 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.6 P.876-892 DOI:10.1631/FITEE.2000507 |
| 115 | Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis Author(s):Rongkuan MA, Hao ZHENG, Jingyi WANG, Mufeng WANG, Qiang WEI, Qiang WEI Clicked:9407 Download:16982 Cited:0 <Full Text> <PPT> 1495 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.3 P.351-360 DOI:10.1631/FITEE.2000709 |
| 116 | Post-quantum blind signcryption scheme from lattice Author(s):Huifang Yu, Lu Bai Clicked:7467 Download:11371 Cited:0 <Full Text> <PPT> 2260 Frontiers of Information Technology & Electronic Engineering 2021 Vol.22 No.6 P.891-901 DOI:10.1631/FITEE.2000099 |
| 117 | Theory and techniques for "intellicise" wireless networks Author(s):Ping ZHANG, Mugen PENG, Shuguang CUI, Zhaoyang ZHANG, Guoqiang MAO, Zhi QUAN, Tony Q. S. QUEK, Bo RONG Clicked:7355 Download:6191 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.1 P.1-4 DOI:10.1631/FITEE.2210000 |
| 118 | An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG Clicked:9804 Download:11370 Cited:0 <Full Text> <PPT> 1782 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.1 P.134-144 DOI:10.1631/FITEE.2000325 |
| 119 | Flow control characteristics of the digital and mechanical redundancy control electric modulation valve Author(s):He LIU, Bin ZHAO, Bo WANG, Long QUAN, Yun-xiao HAO, Yun-wei LI Clicked:3695 Download:3336 Cited:0 <Full Text> <PPT> 1321 Journal of Zhejiang University Science A 2022 Vol.23 No.8 P.599-609 DOI:10.1631/jzus.A2100526 |
| 120 | A power resource dispatching framework with a privacy protection function in the Power Internet of Things Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU Clicked:5212 Download:8824 Cited:0 <Full Text> <PPT> 1199 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.9 P.1354-1368 DOI:10.1631/FITEE.2100518 |
