
| index | Title |
| 31 | Deep anomaly detection of temporal heterogeneous data in AIOps: a survey Author(s):Jiayi GUI, Zhongnan MA, Hao ZHOU, ... Clicked:2531 Download:5726 Cited:0 <Full Text> <PPT> 502 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1551-1576 DOI:10.1631/FITEE.2400467 |
| 32 | XIRAC: an optimized product-oriented near-real-time operating system with unlimited tasks and an innovative... Author(s):Alireza ZIRAK Clicked:2522 Download:4049 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.4 P.568-587 DOI:10.1631/FITEE.2400102 |
| 33 | A subspace-based few-shot intrusion detection system for the Internet of Things Author(s):Zhihui LI, Congyuan XU, Kun DENG, ... Clicked:2504 Download:4689 Cited:0 <Full Text> <PPT> 750 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.862-876 DOI:10.1631/FITEE.2400556 |
| 34 | A UAV-enabled mobile edge computing paradigm for dependent tasks based on a computing power pool Author(s):Xuebin LAI, Yan GUO, Ming HE, Hao ... Clicked:2436 Download:3660 Cited:0 <Full Text> <PPT> 965 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.4 P.623-638 DOI:10.1631/FITEE.2400465 |
| 35 | In-process cutting temperature measurement for ultra-precision machining: a comprehensive review and future... Author(s):Shiquan LIU, Yuqi DING, Kaiyang XI... Clicked:2521 Download:3144 Cited:0 <Full Text> <PPT> 571 Journal of Zhejiang University Science A 2025 Vol.26 No.9 P.853-875 DOI:10.1631/jzus.A2500067 |
| 36 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ... Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ... Clicked:2463 Download:3106 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |