
| index | Title |
| 1 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He,... Clicked:10174 Download:4498 Cited:0 <Full Text> <PPT> 3029 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 2 | Faster fog-aided private set intersection with integrity preserving Author(s):Qiang Wang, Fu-cai Zhou, Tie-min M... Clicked:6946 Download:4431 Cited:0 <Full Text> <PPT> 2333 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1558-1568 DOI:10.1631/FITEE.1800518 |
| 3 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ... Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ... Clicked:2406 Download:2945 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |