Advanced Search



9 results found in all.
index Title
1Improving the precision of the keyword-matching pornographic text filtering method using a hybrid model
Author(s):SU Gui-yang, LI Jian-hua, MA Ying-hua, LI Sheng-hong  Clicked:11481  Download:4701  Cited:8  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.9 P.1106-1113  DOI:10.1631/jzus.2004.1106
2Multiple hashes of single key with passcode for multiple accounts
Author(s):LEE Kok-wah, EWE Hong-tat  Clicked:7144  Download:4259  Cited:2  <Full Text>
Journal of Zhejiang University Science A  2007 Vol.8 No.8 P.1183-1190  DOI:10.1631/jzus.2007.A1183
3Building a highly available and intrusion tolerant database security and protection system (DSPS)
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:5183  Download:3022  Cited:0  <Full Text>
Journal of Zhejiang University Science  2003 Vol.4 No.3 P.287-293  DOI:10.1631/jzus.2003.0287
4A reference model for database security proxy
Author(s):CAI Liang, YANG Xiao-hu, DONG Jin-xiang  Clicked:5481  Download:3245  Cited:0  <Full Text>
Journal of Zhejiang University Science  2002 Vol.3 No.1 P.30-36  DOI:10.1631/jzus.2002.0030
5Joint cooperative beamforming and artificial noise design for secure AF relay networks with energy-harvesting eavesdroppers
Author(s):He-hao Niu, Bang-ning Zhang, Dao-xing Guo, Yu-zhen Huang, Ming-yue Lu  Clicked:9091  Download:3922  Cited:1  <Full Text>  <PPT> 2603
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.6 P.850-862  DOI:10.1631/FITEE.1601832
6Resource allocation for physical-layer security in OFDMA downlink with imperfect CSI
Author(s):Wei Yang, Jing Mao, Chen Chen, Xiang Cheng, Liu-qing Yang, Hai-ge Xiang  Clicked:8959  Download:4180  Cited:0  <Full Text>  <PPT> 2641
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.3 P.398-408  DOI:10.1631/FITEE.1700026
7Preserving privacy information flow security in composite service evolution
Author(s):Huan-feng Peng, Zhi-qiu Huang, Lin-yuan Liu, Yong Li, Da-juan Fan, Yu-qing Wang  Clicked:8550  Download:3333  Cited:0  <Full Text>  <PPT> 2160
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.5 P.626-638  DOI:10.1631/FITEE.1700359
8On the role of optimization algorithms in ownership-preserving data mining
Author(s):Muhammad Kamran, Ehsan Ullah Munir  Clicked:8979  Download:3154  Cited:0  <Full Text>  <PPT> 2086
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.2 P.151-164  DOI:10.1631/FITEE.1601479
9A review on cyber security named entity recognition
Author(s):Chen Gao, Xuan Zhang, Mengting Han, Hui Liu  Clicked:8348  Download:7717  Cited:0  <Full Text>  <PPT> 2406
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.9 P.1153-1168  DOI:10.1631/FITEE.2000286
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE