Advanced Search



10 results found in all.
index Title
1Integrated criteria for covert channel auditing
Author(s):Chang-da WANG, Shi-guang JU  Clicked:6036  Download:3960  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.6 P.737-743  DOI:10.1631/jzus.A071510
2NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:12459  Download:8845  Cited:7  <Full Text>  <PPT> 3045
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
3Moving target defense: state of the art and characteristics
Author(s):Gui-lin CAI, Bao-sheng WANG, Wei HU, Tian-zuo WANG  Clicked:9561  Download:6701  Cited:1  <Full Text>  <PPT> 2666
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.11 P.1122-1153  DOI:10.1631/FITEE.1601321
4Enhancing security of NVM-based main memory with dynamic Feistel network mapping
Author(s):Fang-ting Huang, Dan Feng, Wen Xia, Wen Zhou, Yu-cheng Zhang, Min Fu, Chun-tao Jiang, Yu-kun Zhou  Clicked:9850  Download:4454  Cited:0  <Full Text>  <PPT> 2646
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.7 P.847-863  DOI:10.1631/FITEE.1601652
5Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Yang, Xin-jie Zhao, Shi-ze Guo, Kui Ren  Clicked:8647  Download:7526  Cited:0  <Full Text>  <PPT> 2692
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
6RCDS: a right-confirmable data-sharing model based on symbol mapping coding and blockchain
Author(s):Liang WANG, Shunjiu HUANG, Lina ZUO, Jun LI, Wenyuan LIU  Clicked:4465  Download:15316  Cited:0  <Full Text>  <PPT> 1086
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1194-1213  DOI:10.1631/FITEE.2200659
7A survey of binary code representation technology
Author(s):Taiyan WANG, Qingsong XIE, Lu YU, Zulie PAN, Min ZHANG  Clicked:2669  Download:3988  Cited:0  <Full Text>  <PPT> 664
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.671-694  DOI:10.1631/FITEE.2400088
8Shared-weight multimodal translation model for recognizing Chinese variant characters
Author(s):Yuankang SUN, Bing LI, Lexiang LI, Peng YANG, Dongmei YANG  Clicked:1955  Download:3693  Cited:0  <Full Text>  <PPT> 504
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1066-1082  DOI:10.1631/FITEE.2400504
9Multi-perspective consistency checking for large language model hallucination detection: a black-box zero-resource approach
Author(s):Linggang KONG, Xiaofeng ZHONG, Jie CHEN, Haoran FU, Yongjie WANG  Clicked:511  Download:275  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.11 P.2298-2309  DOI:10.1631/FITEE.2500180
10Mind the Gap: towards generalizable autonomous penetration testing via domain randomization and meta-reinforcement learning
Author(s):Shicheng ZHOU, Jingju LIU, Yuliang LU, Jiahai YANG, Yue ZHANG, Jie CHEN  Clicked:573  Download:532  Cited:0  <Full Text>  <PPT> 293
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.12 P.2511-2528  DOI:10.1631/FITEE.2500100
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE