
| index | Title |
| 1 | Cryptanalysis of an image encryption scheme based on the Hill cipher Author(s):Cheng-qing LI, Dan ZHANG, Guan-ron... Clicked:7424 Download:4719 Cited:7 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1118-1123 DOI:10.1631/jzus.A0720102 |
| 2 | Neuroprotective effects of flavonoids extracted from licorice on kainate-induced seizure in mice through th... Author(s):Ling-hui Zeng, Hua-dan Zhang, Cai-... Clicked:7971 Download:4099 Cited:12 <Full Text> Journal of Zhejiang University Science B 2013 Vol.14 No.11 P.1004-1012 DOI:10.1631/jzus.B1300138 |
| 3 | Heterochronic bilateral ectopic pregnancy after ovulation induction Author(s):Bo Zhu, Gu-feng Xu, Yi-feng Liu, F... Clicked:9896 Download:4361 Cited:1 <Full Text> <PPT> 2922 Journal of Zhejiang University Science B 2014 Vol.15 No.8 P.750-755 DOI:10.1631/jzus.B1400081 |
| 4 | No evidence of seed transmissibility of Tomato yellow leaf curl virus in Nicotiana benthamiana Author(s):Tábata Rosas-Díaz, Dan Zhang, Ro... Clicked:6231 Download:4254 Cited:1 <Full Text> Journal of Zhejiang University Science B 2017 Vol.18 No.5 P.437-440 DOI:10.1631/jzus.B1600463 |
| 5 | Global changes of 5-hydroxymethylcytosine and 5-methylcytosine from normal to tumor tissues are associated ... Author(s):Yi-ping Tian, Ai-fen Lin, Mei-fu G... Clicked:6702 Download:4574 Cited:0 <Full Text> <PPT> 2607 Journal of Zhejiang University Science B 2017 Vol.18 No.9 P.747-756 DOI:10.1631/jzus.B1600314 |
| 6 | Discrete element method-based prediction of areas prone to buried hill-controlled earth fissures Author(s):Yang Liu, Dan Zhang, Guang-ya Wang... Clicked:7736 Download:4902 Cited:0 <Full Text> <PPT> 3624 Journal of Zhejiang University Science A 2019 Vol.20 No.10 P.794-803 DOI:10.1631/jzus.A1900292 |
| 7 | Effects of angiotensin II receptor blocker usage on viral load, antibody dynamics, and transcriptional char... Author(s):Baihuan FENG, Dan ZHANG, Qi WANG, ... Clicked:7061 Download:4493 Cited:0 <Full Text> <PPT> 2888 Journal of Zhejiang University Science B 2021 Vol.22 No.4 P.330-340 DOI:10.1631/jzus.B2000730 |
| 8 | Dual-constraint burst image denoising method Author(s):Dan ZHANG, Lei ZHAO, Duanqing XU, ... Clicked:8653 Download:17642 Cited:0 <Full Text> <PPT> 1451 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.220-233 DOI:10.1631/FITEE.2000353 |
| 9 | A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy ... Author(s):Mengyu ZHANG, Zhenxue HE, Yijin WA... Clicked:2027 Download:4635 Cited:0 <Full Text> <PPT> 923 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.415-426 DOI:10.1631/FITEE.2400513 |
| 10 | An adaptive dung beetle optimizer based on an elastic annealing mechanism and its application to numerical ... Author(s):Lixin MIAO, Zhenxue HE, Xiaojun ZH... Clicked:1684 Download:3728 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1577-1595 DOI:10.1631/FITEE.2400967 |