Advanced Search



9 results found in all.
index Title
1Identification and characterization of plasma membrane aquaporins isolated from fiber cells of Calotropis procera
Author(s):Usman Aslam, Asia Khatoon, Hafiza Masooma Naseer Cheema, Aftab Bashir  Clicked:6541  Download:3348  Cited:1  <Full Text>
Journal of Zhejiang University Science B  2013 Vol.14 No.7 P.586-595  DOI:10.1631/jzus.B1200233
2Role of jasmonic acid in improving tolerance of rapeseed (Brassica napus L.) to Cd toxicity
Author(s):Essa Ali, Nazim Hussain, Imran Haider Shamsi, Zahra Jabeen, Muzammil Hussain Siddiqui, Li-xi Jiang  Clicked:5224  Download:2937  Cited:0  <Full Text>  <PPT> 2001
Journal of Zhejiang University Science B  2018 Vol.19 No.2 P.130-146  DOI:10.1631/jzus.B1700191
3A keyed-hashing based self-synchronization mechanism for port address hopping communication
Author(s):Yue-bin Luo, Bao-sheng Wang, Xiao-feng Wang, Bo-feng Zhang  Clicked:8317  Download:2775  Cited:0  <Full Text>  <PPT> 2207
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.5 P.719-728  DOI:10.1631/FITEE.1601548
4Scientific workflow execution system based on mimic defense in the cloud environment
Author(s):Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng  Clicked:6478  Download:2404  Cited:0  <Full Text>  <PPT> 1929
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1522-1536  DOI:10.1631/FITEE.1800621
5Game theoretic analysis for the mechanism of moving target defense
Author(s):Gui-lin Cai, Bao-sheng Wang, Qian-qian Xing  Clicked:7686  Download:2556  Cited:0  <Full Text>  <PPT> 2062
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.2017-2034  DOI:10.1631/FITEE.1601797
6Optimized deployment of a radar network based on an improved firefly algorithm
Author(s):Xue-jun Zhang, Wei Jia, Xiang-min Guan, Guo-qiang Xu, Jun Chen, Yan-bo Zhu  Clicked:7758  Download:2607  Cited:0  <Full Text>  <PPT> 2059
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.3 P.425-437  DOI:10.1631/FITEE.1800749
7Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines
Author(s):Chao Yang, Yun-fei Guo, Hong-chao Hu, Ya-wen Wang, Qing Tong, Ling-shu Li  Clicked:6471  Download:2486  Cited:0  <Full Text>  <PPT> 1909
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.5 P.731-748  DOI:10.1631/FITEE.1800526
8Clinical value of the emergency department in screening and diagnosis of COVID-19 in China
Author(s):Qin Zhang, Jian Pan, Min-Xing Zhao, Yuan-Qiang Lu  Clicked:6304  Download:2985  Cited:0  <Full Text>  <PPT> 2208
Journal of Zhejiang University Science B  2020 Vol.21 No.5 P.388-393  DOI:10.1631/jzus.B2010011
9Detection and localization of cyber attacks on water treatment systems: an entropy-based approach
Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, Zhenyong ZHANG, Qiang WEI  Clicked:8104  Download:11159  Cited:0  <Full Text>  <PPT> 583
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.4 P.587-603  DOI:10.1631/FITEE.2000546
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE