Advanced Search



45 results found in all.
index Title
31Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
Author(s):S. Aashiq Banu, Rengarajan Amirtharajan  Clicked:8921  Download:8051  Cited:0  <Full Text>  <PPT> 2611
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.940-956  DOI:10.1631/FITEE.2000071
32Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG  Clicked:9136  Download:14452  Cited:0  <Full Text>  <PPT> 1413
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
33Verifier-local revocation group signatures with backward unlinkability from lattices
Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA  Clicked:9426  Download:12026  Cited:0  <Full Text>  <PPT> 1310
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.876-892  DOI:10.1631/FITEE.2000507
34An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
Author(s):Mengni BIE, Wei LI, Tao CHEN, Longmei NAN, Danyang YANG  Clicked:9803  Download:11370  Cited:0  <Full Text>  <PPT> 1782
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.1 P.134-144  DOI:10.1631/FITEE.2000325
35A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
Author(s):Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU  Clicked:4009  Download:7960  Cited:0  <Full Text>  <PPT> 1016
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.6 P.813-827  DOI:10.1631/FITEE.2200645
36A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Author(s):Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE  Clicked:4726  Download:10827  Cited:0  <Full Text>  <PPT> 1186
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.1045-1061  DOI:10.1631/FITEE.2200372
37TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Author(s):Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG  Clicked:4727  Download:5364  Cited:0  <Full Text>  <PPT> 1237
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1169-1180  DOI:10.1631/FITEE.2200498
38Reinforcement learning based privacy-preserving consensus tracking control of nonstrict-feedback discrete-time multi-agent systems
Author(s):Yang YANG, Fanming HUANG, Dong YUE  Clicked:3325  Download:4877  Cited:0  <Full Text>  <PPT> 743
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.456-471  DOI:10.1631/FITEE.2300532
39Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation
Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU  Clicked:3420  Download:2645  Cited:0  <Full Text>  <PPT> 839
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.10 P.1353-1369  DOI:10.1631/FITEE.2300749
40Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using an intelligent predictor
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YAN, Hui SHI, Xin PANG  Clicked:3782  Download:2830  Cited:0  <Full Text>  <PPT> 812
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1250-1265  DOI:10.1631/FITEE.2300750
41A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation
Author(s):Jia DUAN, Luanyun HU, Qiumei XIAO, Meiting LIU, Wenxin YU  Clicked:4212  Download:4874  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.427-440  DOI:10.1631/FITEE.2300755
42Efficient privacy-preserving scheme for secure neural network inference
Author(s):Liquan CHEN, Zixuan YANG, Peng ZHANG, Yang MA  Clicked:2204  Download:4718  Cited:0  <Full Text>  <PPT> 533
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1609-1623  DOI:10.1631/FITEE.2400371
43SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key
Author(s):Ming LI, Wenwen ZHOU, Mengdie WANG, Yushu ZHANG, Yong XIANG  Clicked:2185  Download:4442  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.6 P.847-861  DOI:10.1631/FITEE.2400721
44Reversible data hiding in encrypted domain based on NTRU and Chinese remainder theorem
Author(s):Xinyue ZHANG, Kunyi LAI, Xin TANG  Clicked:395  Download:183  Cited:0  <Full Text>
Journal of Zhejiang University Science  2026 Vol.27 No.4 P.1-10  DOI:10.1631/ENG.ITEE.2025.0138
45Dynamics of a two-disk dynamo loaded with a dual neuron circuit and its application
Author(s):Fuqiang WU1,2, Ying XU3, Huimin QI1, Jun MA4  Clicked:39  Download:7  Cited:0  <Full Text>
Journal of Zhejiang University Science A  In Press    DOI:
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE