Advanced Search



9 results found in all.
index Title
1Improving the precision of the keyword-matching pornographic text filtering method using a hybrid model
Author(s):SU Gui-yang, LI Jian-hua, MA Ying-hua, LI Sheng-hong  Clicked:10749  Download:4017  Cited:8  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.9 P.1106-1113  DOI:10.1631/jzus.2004.1106
2Multiple hashes of single key with passcode for multiple accounts
Author(s):LEE Kok-wah, EWE Hong-tat  Clicked:6137  Download:3854  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.8 P.1183-1190  DOI:10.1631/jzus.2007.A1183
3Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:4529  Download:2713  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
4A reference model for database security proxy
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:4894  Download:2764  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.1 P.30-36  DOI:10.1631/jzus.2002.0030
5Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers
Author(s):He-hao Niu, Bang-ning Zhang, Dao-xing Guo, Yu-zhen Huang, Ming-yue Lu  Clicked:7236  Download:2652  Cited:1  <Full Text>  <PPT> 2038
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.6 P.850-862  DOI:10.1631/FITEE.1601832
6Resource allocation for physical-layer security in OFDMA downlink with imperfect CSI
Author(s):Wei Yang, Jing Mao, Chen Chen, Xiang Cheng, Liu-qing Yang, Hai-ge Xiang  Clicked:7842  Download:2969  Cited:0  <Full Text>  <PPT> 2061
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.3 P.398-408  DOI:10.1631/FITEE.1700026
7Preserving privacy information flow security in composite service evolution
Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang  Clicked:6825  Download:2304  Cited:0  <Full Text>  <PPT> 1770
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.626-638  DOI:10.1631/FITEE.1700359
8On the role of optimization algorithms in ownership-preserving data mining
Author(s):Muhammad Kamran, Ehsan Ullah Munir  Clicked:7752  Download:2325  Cited:0  <Full Text>  <PPT> 1677
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.2 P.151-164  DOI:10.1631/FITEE.1601479
9A review on cyber security named entity recognition
Author(s):Chen Gao, Xuan Zhang, Mengting Han, Hui Liu  Clicked:7202  Download:6005  Cited:0  <Full Text>  <PPT> 1895
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.9 P.1153-1168  DOI:10.1631/FITEE.2000286
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE