Advanced Search



157 results found in all.
index Title
1516G autonomous radio access network empowered by artificial intelligence and network digital twin
Author(s):Guangyi LIU, Juan DENG, Yanhong ZHU, Na LI, Boxiao HAN, Shoufeng WANG, Hua RUI, Jingyu WANG, Jianhua ZHANG, Ying CUI, Yingping CUI, Yang YANG, Yan ZHANG, Jiangzhou WANG, Ye OUYANG, Xiaozhou YE, Tao CHEN, Rongpeng LI, Yongdong ZHU, Yuanyuan ZHANG, Li YANG, Sen BIAN, Wanfei SUN, Qingbi ZHENG, Zhou TONG, Huimin ZHANG, Zecai SHAO, Jiajun WU, Mancong KANG  Clicked:2235  Download:2295  Cited:0  <Full Text>  <PPT> 1131
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.2 P.161-213  DOI:10.1631/FITEE.2400569
152FedSTGCN: a novel federated spatiotemporal graph learning-based network intrusion detection method for the Internet of Things
Author(s):Yalu WANG, Jie LI, Zhijie HAN, Pu CHENG, Roshan KUMAR  Clicked:2461  Download:3106  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.7 P.1164-1179  DOI:10.1631/FITEE.2400932
153Active cybersecurity: vision, model, and key technologies
Author(s):Xiaosong ZHANG, Yukun ZHU, Xiong LI, Yongzhao ZHANG, Weina NIU, Fenghua XU, Junpeng HE, Ran YAN, Shiping HUANG  Clicked:2654  Download:4556  Cited:0  <Full Text>  <PPT> 695
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1243-1278  DOI:10.1631/FITEE.2500053
154Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture
Author(s):Sisi SHAO, Zhibo HE, Shangdong LIU, Weili ZHANG, Fei WU, Fukang ZENG, Jun ZUO, Longfei ZHOU, Yukun NIU, Yimu JI  Clicked:1478  Download:1762  Cited:0  <Full Text>  <PPT> 627
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.8 P.1279-1292  DOI:10.1631/FITEE.2400251
155Dynamic trust-based service function chain deployment method for disrupting attack chains
Author(s):Deqiang ZHOU, Xinsheng JI, Wei YOU, Hang QIU, Jie YANG, Yu ZHAO, Mingyan XU  Clicked:999  Download:810  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.12 P.2550-2568  DOI:10.1631/FITEE.2500218
156Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem
Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG  Clicked:395  Download:183  Cited:0  <Full Text>
Journal of Zhejiang University Science  2026 Vol.27 No.4 P.1-10  DOI:10.1631/ENG.ITEE.2025.0138
157An approach to characterize the power system security region by integrating distributionally robust optimization and Transformer-based deep learning
Author(s):Yuekai CHEN, Zhejing BAO*, Miao YU  Clicked:39  Download:11  Cited:0  <Full Text>
Journal of Zhejiang University Science  In Press    DOI:
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE