| index | Title |
| 1 | Protection of mobile location privacy by using blind signature Author(s):LIAO Jian, QI Ying-hao, HUANG Pei-wei, RONG Meng-tian, LI Sheng-hong Clicked:6975 Download:4305 Cited:43 <Full Text> Journal of Zhejiang University Science A 2006 Vol.7 No.6 P.984-989 DOI:10.1631/jzus.2006.A0984 |
| 2 | A fine-grained access control model for relational databases Author(s):Jie Shi, Hong Zhu Clicked:10143 Download:4327 Cited:6 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.8 P.575-586 DOI:10.1631/jzus.C0910466 |
| 3 | EDA: an enhanced dual-active algorithm for location privacy preservation in mobile P2P networks Author(s):Yan-zhe Che, Kevin Chiew, Xiao-yan Hong, Qiang Yang, Qin-ming He Clicked:9361 Download:4243 Cited:0 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.5 P.356-373 DOI:10.1631/jzus.C1200267 |
| 4 | Preserving privacy information flow security in composite service evolution Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang Clicked:8875 Download:3947 Cited:0 <Full Text> <PPT> 2253 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.5 P.626-638 DOI:10.1631/FITEE.1700359 |
| 5 | Generic user revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Hai Jiang, Kuan-ching Li Clicked:9049 Download:4462 Cited:0 <Full Text> <PPT> 2804 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.11 P.1362-1384 DOI:10.1631/FITEE.1800405 |
| 6 | Generic attribute revocation systems for attribute-based encryption in cloud storage Author(s):Genlang Chen, Zhiqian Xu, Jia-jian Zhang, Guo-jun Wang, Hai Jiang, Miao-qing Huang Clicked:10117 Download:3956 Cited:0 <Full Text> <PPT> 2605 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.6 P.773-786 DOI:10.1631/FITEE.1800512 |
| 7 | MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data Author(s):Mukti Padhya, Devesh C. Jinwala Clicked:9559 Download:4994 Cited:0 <Full Text> <PPT> 2243 Frontiers of Information Technology & Electronic Engineering 2019 Vol.20 No.12 P.1717-1748 DOI:10.1631/FITEE.1800192 |
| 8 | Self-deployed execution environment for high performance computing Author(s):Mingtian SHAO, Kai LU, Wenzhe ZHANG Clicked:8022 Download:13725 Cited:0 <Full Text> <PPT> 1156 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.6 P.845-857 DOI:10.1631/FITEE.2100016 |
| 9 | A power resource dispatching framework with a privacy protection function in the Power Internet of Things Author(s):Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU Clicked:5211 Download:8824 Cited:0 <Full Text> <PPT> 1199 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.9 P.1354-1368 DOI:10.1631/FITEE.2100518 |
| 10 | A survey of energy-efficient strategies for federated learning in mobile edge computing Author(s):Kang YAN, Nina SHU, Tao WU, Chunsheng LIU, Panlong YANG Clicked:5416 Download:4398 Cited:0 <Full Text> <PPT> 1034 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.5 P.645-663 DOI:10.1631/FITEE.2300181 |
| 11 | PPDO: a privacy-preservation-aware delay optimization task-offloading algorithm for collaborative edge computing Author(s):Chao JING, Jianwu XU Clicked:3778 Download:4840 Cited:0 <Full Text> <PPT> 948 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.1 P.27-41 DOI:10.1631/FITEE.2300741 |
| 12 | An efficient online histogram publication method for data streams with local differential privacy Author(s):Tao TAO, Funan ZHANG, Xiujun WANG, Xiao ZHENG, Xin ZHAO Clicked:3034 Download:3559 Cited:0 <Full Text> <PPT> 958 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.8 P.1096-1109 DOI:10.1631/FITEE.2300368 |
| 13 | Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU Clicked:3420 Download:2645 Cited:0 <Full Text> <PPT> 839 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.10 P.1353-1369 DOI:10.1631/FITEE.2300749 |
| 14 | A privacy-preserving vehicle trajectory clustering framework Author(s):Ran TIAN, Pulun GAO, Yanxing LIU Clicked:3865 Download:3529 Cited:0 <Full Text> <PPT> 934 Frontiers of Information Technology & Electronic Engineering 2024 Vol.25 No.7 P.988-1002 DOI:10.1631/FITEE.2300369 |
| 15 | Adaptive layer splitting for wireless large language model inference in edge computing: a model-based reinforcement learning approach Author(s):Yuxuan CHEN, Rongpeng LI, Xiaoxue YU, Zhifeng ZHAO, Honggang ZHANG Clicked:3978 Download:4609 Cited:0 <Full Text> <PPT> 874 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.2 P.278-292 DOI:10.1631/FITEE.2400468 |
