
| index | Title |
| 1 | Cryptanalysis of an image encryption scheme based on the Hill cipher Author(s):Cheng-qing LI, Dan ZHANG, Guan-ron... Clicked:7399 Download:4708 Cited:7 <Full Text> Journal of Zhejiang University Science A 2008 Vol.9 No.8 P.1118-1123 DOI:10.1631/jzus.A0720102 |
| 2 | Neuroprotective effects of flavonoids extracted from licorice on kainate-induced seizure in mice through th... Author(s):Ling-hui Zeng, Hua-dan Zhang, Cai-... Clicked:7894 Download:4088 Cited:12 <Full Text> Journal of Zhejiang University Science B 2013 Vol.14 No.11 P.1004-1012 DOI:10.1631/jzus.B1300138 |
| 3 | Heterochronic bilateral ectopic pregnancy after ovulation induction Author(s):Bo Zhu, Gu-feng Xu, Yi-feng Liu, F... Clicked:9870 Download:4309 Cited:1 <Full Text> <PPT> 2909 Journal of Zhejiang University Science B 2014 Vol.15 No.8 P.750-755 DOI:10.1631/jzus.B1400081 |
| 4 | No evidence of seed transmissibility of Tomato yellow leaf curl virus in Nicotiana benthamiana Author(s):Tábata Rosas-Díaz, Dan Zhang, Ro... Clicked:6202 Download:4216 Cited:1 <Full Text> Journal of Zhejiang University Science B 2017 Vol.18 No.5 P.437-440 DOI:10.1631/jzus.B1600463 |
| 5 | Global changes of 5-hydroxymethylcytosine and 5-methylcytosine from normal to tumor tissues are associated ... Author(s):Yi-ping Tian, Ai-fen Lin, Mei-fu G... Clicked:6662 Download:4536 Cited:0 <Full Text> <PPT> 2588 Journal of Zhejiang University Science B 2017 Vol.18 No.9 P.747-756 DOI:10.1631/jzus.B1600314 |
| 6 | Discrete element method-based prediction of areas prone to buried hill-controlled earth fissures Author(s):Yang Liu, Dan Zhang, Guang-ya Wang... Clicked:7692 Download:4853 Cited:0 <Full Text> <PPT> 3600 Journal of Zhejiang University Science A 2019 Vol.20 No.10 P.794-803 DOI:10.1631/jzus.A1900292 |
| 7 | Effects of angiotensin II receptor blocker usage on viral load, antibody dynamics, and transcriptional char... Author(s):Baihuan FENG, Dan ZHANG, Qi WANG, ... Clicked:7005 Download:4437 Cited:0 <Full Text> <PPT> 2871 Journal of Zhejiang University Science B 2021 Vol.22 No.4 P.330-340 DOI:10.1631/jzus.B2000730 |
| 8 | Dual-constraint burst image denoising method Author(s):Dan ZHANG, Lei ZHAO, Duanqing XU, ... Clicked:8620 Download:17584 Cited:0 <Full Text> <PPT> 1438 Frontiers of Information Technology & Electronic Engineering 2022 Vol.23 No.2 P.220-233 DOI:10.1631/FITEE.2000353 |
| 9 | A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy ... Author(s):Mengyu ZHANG, Zhenxue HE, Yijin WA... Clicked:1986 Download:4497 Cited:0 <Full Text> <PPT> 904 Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.3 P.415-426 DOI:10.1631/FITEE.2400513 |
| 10 | An adaptive dung beetle optimizer based on an elastic annealing mechanism and its application to numerical ... Author(s):Lixin MIAO, Zhenxue HE, Xiaojun ZH... Clicked:1629 Download:3612 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.9 P.1577-1595 DOI:10.1631/FITEE.2400967 |