Advanced Search



18 results found in all.
index Title
1Fuzzy pattern recognition method for assessing groundwater vulnerability to pollution in the Zhangji area
Author(s):MAO Yuan-yuan, ZHANG Xue-gang, WANG Lian-sheng  Clicked:7661  Download:5415  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.11 P.1917-1922  DOI:10.1631/jzus.2006.A1917
2Reliability assessment of networks-on-chip based on analytical models
Author(s):Mojtaba VALINATAJ, Siamak MOHAMMADI, Saeed SAFARI  Clicked:7731  Download:4275  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2009 Vol.10 No.12 P.1801-1814  DOI:10.1631/jzus.A0820853
3Development of the science of mass casualty incident management: reflection on the medical response to the Wenchuan earthquake and Hangzhou bus fire
Author(s):Wei-feng Shen, Li-bing Jiang, Guan-yu Jiang, Mao Zhang, Yue-feng Ma, Xiao-jun He  Clicked:8069  Download:4593  Cited:2  <Full Text>  <PPT> 2969
Journal of Zhejiang University Science B  2014 Vol.15 No.12 P.1072-1080  DOI:10.1631/jzus.B1400225
4Feasibility of diagnosing unstable plaque in patients with acute coronary syndrome using iMap-IVUS
Author(s):Jian Liu, Zhao Wang, Wei-min Wang, Qi Li, Yu-liang Ma, Chuan-fen Liu, Ming-yu Lu, Hong Zhao  Clicked:8382  Download:4341  Cited:1  <Full Text>  <PPT> 3022
Journal of Zhejiang University Science B  2015 Vol.16 No.11 P.924-930  DOI:10.1631/jzus.B1500206
5Hybrid-augmented intelligence: collaboration and cognition
Author(s):Nan-ning Zheng, Zi-yi Liu, Peng-ju Ren, Yong-qiang Ma, Shi-tao Chen, Si-yu Yu, Jian-ru Xue, Ba-dong Chen, Fei-yue Wang  Clicked:11253  Download:6549  Cited:0  <Full Text>  <PPT> 3889
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.2 P.153-179  DOI:10.1631/FITEE.1700053
6Authors’ response to the comment on “Antepartum hemorrhage from previous-cesarean-sectioned uterus as a potential sign of uterine artery pseudoaneurysm”
Author(s):Ning Zhang, Wen Di  Clicked:6213  Download:2885  Cited:0  <Full Text>
Journal of Zhejiang University Science B  2017 Vol.18 No.8 P.725-726  DOI:10.1631/jzus.B17r0241
7Efficient vulnerability detection based on an optimized rule-checking static analysis technique
Author(s):Deng Chen, Yan-duo Zhang, Wei Wei, Shi-xun Wang, Ru-bing Huang, Xiao-lin Li, Bin-bin Qu, Sheng Jiang  Clicked:8718  Download:4175  Cited:0  <Full Text>  <PPT> 2566
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.3 P.332-345  DOI:10.1631/FITEE.1500379
8NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers
Author(s):Yu-jun Xiao, Wen-yuan Xu, Zhen-hua Jia, Zhuo-ran Ma, Dong-lian Qi  Clicked:9353  Download:5560  Cited:0  <Full Text>  <PPT> 4290
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.4 P.519-534  DOI:10.1631/FITEE.1601540
9Security for cyberspace: challenges and opportunities
Author(s):Jiang-xing WU, Jian-hua LI, Xin-sheng JI  Clicked:5487  Download:3723  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1459-1461  DOI:10.1631/FITEE.1840000
10Bioengineering models of female reproduction
Author(s):Maria E. Zubizarreta, Shuo Xiao  Clicked:2825  Download:2811  Cited:0  <Full Text>
Bio-Design and Manufacturing  2020 Vol.3 No.3 P.237-251  DOI:10.1007/s42242-020-00082-8
11On the role of hemodynamics in predicting rupture of the abdominal aortic aneurysm
Author(s):Maria Antonietta Boniforti, Lorenzo Di Bella, Roberto Magini  Clicked:7450  Download:4477  Cited:0  <Full Text>  <PPT> 2020
Journal of Zhejiang University Science A  2021 Vol.22 No.12 P.957-978  DOI:10.1631/jzus.A2100308
12Interpreting the vulnerability of power systems in cascading failures using multi-graph convolutional networks
Author(s):Supaporn LONAPALAWONG, Changsheng CHEN, Can WANG, Wei CHEN  Clicked:5944  Download:7756  Cited:0  <Full Text>  <PPT> 1389
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.12 P.1848-1861  DOI:10.1631/FITEE.2200035
13Automatic discovery of stateful variables in network protocol software based on replay analysis
Author(s):Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU  Clicked:21273  Download:6199  Cited:0  <Full Text>  <PPT> 1122
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.3 P.403-416  DOI:10.1631/FITEE.2200275
14A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng SHI, Yang ZHAI, Yahong HAN, Qinghua HU  Clicked:3059  Download:4383  Cited:0  <Full Text>  <PPT> 785
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
15Large language model-enhanced probabilistic modeling for effective static analysis alarms
Author(s):Xinlong PAN, Jianhua LI, Zhihong ZHOU, Gaolei LI, Xiuzhen CHEN, Jin MA, Jun WU, Quanhai ZHANG  Clicked:1438  Download:1597  Cited:0  <Full Text>  <PPT> 233
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.10 P.1926-1941  DOI:10.1631/FITEE.2500038
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE