
| index | Title |
| 31 | Deep anomaly detection of temporal heterogeneous data in AIOps: a survey Author(s):Jiayi GUI, Zhongnan MA, Hao ZHOU, ... Clicked:2536 Download:5741 Cited:0 <Full Text> <PPT> 503 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1551-1576 DOI:10.1631/FITEE.2400467 |
| 32 | XIRAC: an optimized product-oriented near-real-time operating system with unlimited tasks and an innovative... Author(s):Alireza ZIRAK Clicked:2526 Download:4062 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.4 P.568-587 DOI:10.1631/FITEE.2400102 |
| 33 | A subspace-based few-shot intrusion detection system for the Internet of Things Author(s):Zhihui LI, Congyuan XU, Kun DENG, ... Clicked:2510 Download:4705 Cited:0 <Full Text> <PPT> 751 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.6 P.862-876 DOI:10.1631/FITEE.2400556 |
| 34 | A UAV-enabled mobile edge computing paradigm for dependent tasks based on a computing power pool Author(s):Xuebin LAI, Yan GUO, Ming HE, Hao ... Clicked:2446 Download:3667 Cited:0 <Full Text> <PPT> 966 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.4 P.623-638 DOI:10.1631/FITEE.2400465 |
| 35 | In-process cutting temperature measurement for ultra-precision machining: a comprehensive review and future... Author(s):Shiquan LIU, Yuqi DING, Kaiyang XI... Clicked:2526 Download:3161 Cited:0 <Full Text> <PPT> 573 Journal of Zhejiang University Science A 2025 Vol.26 No.9 P.853-875 DOI:10.1631/jzus.A2500067 |
| 36 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ... Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ... Clicked:2465 Download:3115 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |