
| index | Title |
| 1 | Cryptanalysis of an image encryption scheme based on the Hill cipher Author(s):Cheng-qing LI, Dan ZHANG, Guan-ron... Clicked:7421 Download:4715 Cited:7 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1118-1123 DOI:10.1631/jzus.A0720102 |
| 2 | Neuroprotective effects of flavonoids extracted from licorice on kainate-induced seizure in mice through th... Author(s):Ling-hui Zeng, Hua-dan Zhang, Cai-... Clicked:7969 Download:4098 Cited:12 <Full Text> Journal of Zhejiang University Science B 2013 Vol.14 No.11 P.1004-1012 DOI:10.1631/jzus.B1300138 |
| 3 | Heterochronic bilateral ectopic pregnancy after ovulation induction Author(s):Bo Zhu, Gu-feng Xu, Yi-feng Liu, F... Clicked:9896 Download:4357 Cited:1 <Full Text> <PPT> 2921 Journal of Zhejiang University Science B 2014 Vol.15 No.8 P.750-755 DOI:10.1631/jzus.B1400081 |
| 4 | No evidence of seed transmissibility of Tomato yellow leaf curl virus in Nicotiana benthamiana Author(s):Tábata Rosas-Díaz, Dan Zhang, Ro... Clicked:6229 Download:4249 Cited:1 <Full Text> Journal of Zhejiang University Science B 2017 Vol.18 No.5 P.437-440 DOI:10.1631/jzus.B1600463 |
| 5 | Global changes of 5-hydroxymethylcytosine and 5-methylcytosine from normal to tumor tissues are associated ... Author(s):Yi-ping Tian, Ai-fen Lin, Mei-fu G... Clicked:6694 Download:4569 Cited:0 <Full Text> <PPT> 2602 Journal of Zhejiang University Science B 2017 Vol.18 No.9 P.747-756 DOI:10.1631/jzus.B1600314 |
| 6 | Discrete element method-based prediction of areas prone to buried hill-controlled earth fissures Author(s):Yang Liu, Dan Zhang, Guang-ya Wang... Clicked:7730 Download:4895 Cited:0 <Full Text> <PPT> 3617 Journal of Zhejiang University Science A 2019 Vol.20 No.10 P.794-803 DOI:10.1631/jzus.A1900292 |
| 7 | Effects of angiotensin II receptor blocker usage on viral load, antibody dynamics, and transcriptional char... Author(s):Baihuan FENG, Dan ZHANG, Qi WANG, ... Clicked:7061 Download:4487 Cited:0 <Full Text> <PPT> 2885 Journal of Zhejiang University Science B 2021 Vol.22 No.4 P.330-340 DOI:10.1631/jzus.B2000730 |
| 8 | Dual-constraint burst image denoising method Author(s):Dan ZHANG, Lei ZHAO, Duanqing XU, ... Clicked:8651 Download:17637 Cited:0 <Full Text> <PPT> 1450 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.220-233 DOI:10.1631/FITEE.2000353 |
| 9 | A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy ... Author(s):Mengyu ZHANG, Zhenxue HE, Yijin WA... Clicked:2022 Download:4612 Cited:0 <Full Text> <PPT> 915 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.415-426 DOI:10.1631/FITEE.2400513 |
| 10 | An adaptive dung beetle optimizer based on an elastic annealing mechanism and its application to numerical ... Author(s):Lixin MIAO, Zhenxue HE, Xiaojun ZH... Clicked:1676 Download:3712 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1577-1595 DOI:10.1631/FITEE.2400967 |