Advanced Search



5 results found in all.
index Title
1Fuzzy pattern recognition method for assessing groundwater vulnerability to pollution in the Zhangji area
Author(s):MAO Yuan-yuan, ZHANG Xue-gang, WANG Lian-sheng  Clicked:7661  Download:5415  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.11 P.1917-1922  DOI:10.1631/jzus.2006.A1917
2Development of the science of mass casualty incident management: reflection on the medical response to the Wenchuan earthquake and Hangzhou bus fire
Author(s):Wei-feng Shen, Li-bing Jiang, Guan-yu Jiang, Mao Zhang, Yue-feng Ma, Xiao-jun He  Clicked:8069  Download:4593  Cited:2  <Full Text>  <PPT> 2969
Journal of Zhejiang University Science B  2014 Vol.15 No.12 P.1072-1080  DOI:10.1631/jzus.B1400225
3Interpreting the vulnerability of power systems in cascading failures using multi-graph convolutional networks
Author(s):Supaporn LONAPALAWONG, Changsheng CHEN, Can WANG, Wei CHEN  Clicked:5944  Download:7753  Cited:0  <Full Text>  <PPT> 1389
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.12 P.1848-1861  DOI:10.1631/FITEE.2200035
4A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng SHI, Yang ZHAI, Yahong HAN, Qinghua HU  Clicked:3058  Download:4382  Cited:0  <Full Text>  <PPT> 784
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
5Dynamic trust-based service function chain deployment method for disrupting attack chains
Author(s):Deqiang ZHOU, Xinsheng JI, Wei YOU, Hang QIU, Jie YANG, Yu ZHAO, Mingyan XU  Clicked:837  Download:725  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.12 P.2550-2568  DOI:10.1631/FITEE.2500218
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE