Advanced Search



10 results found in all.
index Title
1Identification and characterization of plasma membrane aquaporins isolated from fiber cells of Calotropis procera
Author(s):Usman Aslam, Asia Khatoon, Hafiza Masooma Naseer Cheema, Aftab Bashir  Clicked:7838  Download:3976  Cited:1  <Full Text>
Journal of Zhejiang University Science B  2013 Vol.14 No.7 P.586-595  DOI:10.1631/jzus.B1200233
2Role of jasmonic acid in improving tolerance of rapeseed (Brassica napus L.) to Cd toxicity
Author(s):Essa Ali, Nazim Hussain, Imran Haider Shamsi, Zahra Jabeen, Muzammil Hussain Siddiqui, Li-xi Jiang  Clicked:7445  Download:4348  Cited:0  <Full Text>  <PPT> 2547
Journal of Zhejiang University Science B  2018 Vol.19 No.2 P.130-146  DOI:10.1631/jzus.B1700191
3A keyed-hashing based self-synchronization mechanism for port address hopping communication
Author(s):Yue-bin Luo, Bao-sheng Wang, Xiao-feng Wang, Bo-feng Zhang  Clicked:10618  Download:4125  Cited:0  <Full Text>  <PPT> 2829
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.5 P.719-728  DOI:10.1631/FITEE.1601548
4Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng  Clicked:8743  Download:3891  Cited:0  <Full Text>  <PPT> 2474
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
5Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:9368  Download:3974  Cited:0  <Full Text>  <PPT> 2692
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
6Optimized deployment of a radar network based on an improved firefly algorithm
Author(s):Xue-jun Zhang, Wei Jia, Xiang-min Guan, Guo-qiang Xu, Jun Chen, Yan-bo Zhu  Clicked:9467  Download:4167  Cited:0  <Full Text>  <PPT> 2568
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.3 P.425-437  DOI:10.1631/FITEE.1800749
7Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:7874  Download:4044  Cited:0  <Full Text>  <PPT> 2467
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
8Clinical value of the emergency department in screening and diagnosis of COVID-19 in China
Author(s):Qin Zhang, Jian Pan, Min-Xing Zhao, Yuan-Qiang Lu  Clicked:8295  Download:4818  Cited:0  <Full Text>  <PPT> 2920
Journal of Zhejiang University Science B  2020 Vol.21 No.5 P.388-393  DOI:10.1631/jzus.B2010011
9Detection and localization of cyber attacks on water treatment systems: an entropy-based approach
Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI  Clicked:10406  Download:14218  Cited:0  <Full Text>  <PPT> 1200
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.4 P.587-603  DOI:10.1631/FITEE.2000546
10Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture
Author(s):Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI  Clicked:1363  Download:1535  Cited:0  <Full Text>  <PPT> 559
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1279-1292  DOI:10.1631/FITEE.2400251
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE