
| index | Title |
| 1 | Cryptanalysis of an identity-based public auditing protocol for cloud storage Author(s):Li-bing Wu, Jing Wang, De-biao He,... Clicked:10185 Download:4510 Cited:0 <Full Text> <PPT> 3031 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.12 P.1972-1977 DOI:10.1631/FITEE.1601530 |
| 2 | Faster fog-aided private set intersection with integrity preserving Author(s):Qiang Wang, Fu-cai Zhou, Tie-min M... Clicked:6992 Download:4447 Cited:0 <Full Text> <PPT> 2337 Frontiers of Information Technology & Electronic Engineering 2018 Vol.19 No.12 P.1558-1568 DOI:10.1631/FITEE.1800518 |
| 3 | FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the ... Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu ... Clicked:2424 Download:2996 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2025 Vol.26 No.7 P.1164-1179 DOI:10.1631/FITEE.2400932 |