Chinese Journal of Electronics

Papers
(The median citation count of Chinese Journal of Electronics is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Demand Learning and Cooperative Deployment of UAV Networks79
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model59
A Layout Method of Space-Based Pseudolite System Based on GDOP Geometry59
Rapid Path Extraction and Three‐Dimensional Roaming of the Virtual Endonasal Endoscope37
Combination for Conflicting Interval‐Valued Belief Structures with CSUI‐DST Method33
Coherent Integration Algorithm for Frequency‐Agile and PRF‐Jittering Signals in Passive Localization29
Low Loss and Low EMI Noise Trench IGBT with Shallow Emitter Trench Controlled p-Type Dummy Region24
Antenna Selection Method for Distributed Dual-Function Radar Communication in MIMO System22
14-Bit SAR ADC with On-Chip Digital Bubble Sorting Calibration Technology22
Research on Object Detection and Combination Clustering for Railway Switch Machine Gap Detection21
A Pairing‐Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks20
Multi-Sensor Fusion Adaptive Estimation for Nonlinear Under-Observed System with Multiplicative Noise18
An Accurate Near‐Field Distance Estimation Differential Algorithm17
Front Cover17
A Wideband Self‐Decoupled Microstrip Patch Antenna Array Using Characteristic Modes of Ground Plane17
Fast Fading Channel Estimation for OFDM Systems with Complexity Reduction17
Optimization on the Dynamic Train Coupling Process in High-Speed Railway17
A General Authentication and Key Agreement Framework for Industrial Control System17
Delay and Energy Consumption Oriented UAV Inspection Business Collaboration Computing Mechanism in Edge Computing Based Electric Power IoT16
Mode Purity Improvement of High‐Order Vortex Waves15
Rating Prediction Model Based on Causal Inference Debiasing Method in Recommendation15
A Comprehensive Study on the Theory of Graphene Solution‐Gated Field Effect Transistor: Simulations and Experiments15
A Software Safety Requirements Elicitation Approach Based on Hazardous Control Action Tree Modelling15
Frame Synchronization Method Based on Association Rules for CNAV-2 Messages15
High Power 170 GHz Frequency Doubler Based on GaAs Schottky Diodes15
Hyperspectral Image Classification Based on A Multi‐Scale Weighted Kernel Network14
A Review of Intelligent Configuration and Its Security for Complex Networks14
Time‐Resolved Spectroscopy for the Study of Perovskite14
FMR-GNet: Forward Mix-Hop Spatial-Temporal Residual Graph Network for 3D Pose Estimation14
Sensing Matrix Optimization for Random Stepped-Frequency Signal Based on Two-Dimensional Ambiguity Function13
Optimized Design of Multi-Layer Absorber for Human Tissue Surface13
Keyword Extraction from Scientific Research Projects Based on SRP‐TF‐IDF13
Hypersonic Vehicle Trajectory Prediction Algorithm Based on Hough Transform12
Online Video Popularity Regression Prediction Model with Multichannel Dynamic Scheduling Based on User Behavior12
Sharper Hardy Uncertainty Relations on Signal Concentration in Terms of Linear Canonical Transform11
Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization11
Timely Data Delivery for Energy‐Harvesting IoT Devices11
A Reframed Watermark Extraction Approach Using the ABC Algorithm11
Fine-Grained Cross-Modal Fusion Based Refinement for Text-to-Image Synthesis11
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks11
Teacher-Student Training Approach Using an Adaptive Gain Mask for LSTM-Based Speech Enhancement in the Airborne Noise Environment10
Dual Radial-Resonant Wide Beamwidth Circular Sector Microstrip Patch Antennas10
Phase Noise Effects on the Performance of High‐Order Digital Modulation Terahertz Communication System10
An Interactive Perception Method Based Collaborative Rating Prediction Algorithm10
A Low Complexity Distributed Multitarget Detection and Tracking Algorithm10
Convolutional Neural Networks of Whole Jujube Fruits Prediction Model Based on Multi-Spectral Imaging Method10
A Fine‐Grained Flash‐Memory Fragment Recognition Approach for Low‐Level Data Recovery9
Coupling Enhancement of THz Metamaterials Source with Parallel Multiple Beams9
CMOS Temperature Sensors: From Module Design to System Design9
Total Ionizing Dose Effect and Failure Mechanism of Digital Signal Processor9
STATE: A Clustering Algorithm Focusing on Edges Instead of Centers9
HRPose: Real-Time High-Resolution 6D Pose Estimation Network Using Knowledge Distillation9
Multi-Frequency-Ranging Positioning Algorithm for 5G OFDM Communication Systems9
Binary Sequences Derived from Dickson Permutation Polynomials over Binary Extension Field9
Joint Communication-Caching-Computing Resource Allocation for Bidirectional Data Computation in IRS-Assisted Hybrid UAV-Terrestrial Network9
Representation of Semantic Word Embeddings Based on SLDA and Word2vec Model9
Optical Space Time Pulse Position Modulation over Exponential Weibull Turbulence Channel8
A Risk Prediction Model Based on Crash History Data for Railway Trams8
A Single-Event-Transient Hardened Phase Locked Loop for Clock and Data Recovery8
Defects Recognition of Train Wheelset Tread Based on Improved Spiking Neural Network8
Word‐Based Method for Chinese Part‐of‐Speech via Parallel and Adversarial Network8
Study on Static Deflection Model of MEMS Capacitive Microwave Power Sensors8
Quaternion Quasi-Chebyshev Non-local Means for Color Image Denoising8
High‐Order Characteristic Modes Suppression for Cross‐Band Decoupling in Shared‐Aperture Antenna Array8
A Design and Comparative Investigation of Graded Al x Ga 1– x 8
Variance‐SNR Based Noise Suppression on Linear Canonical Choi‐Williams Distribution of LFM Signals8
A Novel Robust Online Extreme Learning Machine for the Non-Gaussian Noise8
Collaborative Service Provisioning for UAV-Assisted Mobile Edge Computing8
Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules8
Automatic Spectral Method of Mesh Segmentation Based on Fiedler Residual7
Semi‐supervised Robust Feature Selection with ℓq‐Norm Graph for Multiclass Classification7
Design of High Performance MXene/Oxide Structure Memristors for Image Recognition Applications7
Fast Cross-Platform Binary Code Similarity Detection Framework Based on CFGs Taking Advantage of NLP and Inductive GNN7
Multi-Scale Binocular Stereo Matching Based on Semantic Association7
LBA-EC: Load Balancing Algorithm Based on Weighted Bipartite Graph for Edge Computing7
Unsupervised Video Object Segmentation via Weak User Interaction and Temporal Modulation7
A Novel Wideband Wilkinson Pulse Combiner with Enhanced Low Frequency Isolation7
Towards Order-Preserving and Zero-Copy Communication on Shared Memory for Large Scale Simulation7
Rating Text Classification with Weighted Negative Supervision on Classifier Layer7
An Adaptive Interactive Multiple-Model Algorithm Based on End-to-End Learning7
Friendship Inference Based on Interest Trajectory Similarity and Co-Occurrence7
A Tightly Coupled Dipole Array with Diverse Element Reflection Phases for RCS Reduction6
A 220 GHz Orthogonal Modulator Based on Subharmonic Mixers Using Anti‐Paralleled Schottky Diodes6
Vibration Signal-Based Fault Diagnosis of Railway Point Machines via Double-Scale CNN6
Blind Signal Reception in Downlink Generalized Spatial Modulation Multiuser MIMO System Based on Minimum Output Energy6
RESS: A Reliable and Effcient Storage Scheme for Bitcoin Blockchain Based on Raptor Code6
Efficient and Explicit Fourier Modal Method for Ultrathin Metallic Gratings6
Chaotic Signal Denoising Algorithm Based on Self‐Similarity6
Sitting or Standing Data Acquisition Based Breast Ultrasound Computed Tomography6
Characteristic Mode Design of Dual‐Band Reconfigurable Frequency Selective Surface6
A Review of Terahertz Sources Based on Planar Schottky Diodes6
A Deep Deterministic Policy Gradient-Based Method for Enforcing Service Fault-Tolerance in MEC6
Detection and Classification of Small Traffic Signs Based on Cascade Network6
Microwave Tomographic Imaging of Anatomically Realistic Numerical Phantoms with Debye Dispersion for Breast Cancer Detection Using a Regularized Inverse Scattering Technique in the Time Domain6
Objective Information Theory Exemplified in Air Traffic Control System6
A Bus Planning Algorithm for FPC Design in Complex Scenarios6
Survey on Fake Information Generation, Dissemination and Detection6
Enhancing Entity Relationship Extraction in Dialogue Texts Using Hypergraph and Heterogeneous Graph6
Technique for Recovering Wavefront Phase Bad Points by Deep Learning6
Real-Time 3D Ultrasound Imaging System Based on a Hybrid Reconstruction Algorithm6
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network6
Utility Preserved Facial Image De‐identification Using Appearance Subspace Decomposition6
Unsupervised Cross‐Media Hashing Learning via Knowledge Graph6
Research on Health Stage Division of Switch Machine Based on Bray-Curtis Distance and Fisher Optimal Segmentation Method5
Analysis of Capacitance Characteristics of Light-Controlled Electrostatic Conversion Device5
Wideband Millimeter Wave Antenna with Cavity Backed Slotted Patch and Magneto-Electric Dipole5
Vibration-Based Fault Diagnosis for Railway Point Machines Using VMD and Multiscale Fluctuation-Based Dispersion Entropy5
Joint Spectrum Sensing and Spectrum Access for Defending Massive SSDF Attacks: A Novel Defense Framework5
Differential Fault Attack on the Stream Cipher LIZARD5
New Secondary Constructions of Generalized Bent Functions5
An Improved Navigation Pseudolite Signal Structure Based on the Kasami Sequences and the Pulsing Scheme5
A Microstrip Leaky-Wave Antenna with Scanning Beams Horizontal to the Antenna Plane5
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps5
Adaptive Simplified Chicken Swarm Optimization Based on Inverted S‐Shaped Inertia Weight5
MADRL-Based 3D Deployment and User Association of Cooperative mmWave Aerial Base Stations for Capacity Enhancement5
Characteristic Mode Analysis for Pattern Diversity and Beamforming: A Survey5
5
Realization of Complete Boolean Logic and Combinational Logic Functionalities on a Memristor-Based Universal Logic Circuit5
A Local Differential Privacy Hybrid Data Clustering Iterative Algorithm for Edge Computing5
A Directly Readable Halftone Multifunctional Color QR Code5
FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning5
IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence4
A Security Defense Method Against Eavesdroppers in the Communication-Based Train Control System4
A Helmet Detection Algorithm Based on Transformers with Deformable Attention Module4
Ultra‐thin Body Buried In 0.35 Ga 0.65 As Channel MOSFETs with Extremely Low Off‐current on Si Substrates4
YOLO-Drone: A Scale-Aware Detector for Drone Vision4
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain4
A Simple BCH Decoder for NoC Interconnects and SoC Buses4
Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge Computing4
Semantic Comprehension Method for Chinese Sentences Based on Minimal Semantic Structures and Its Application4
A Novel Neighborhood‐Weighted Sampling Method for Imbalanced Datasets4
A Fine-Grained Object Detection Model for Aerial Images Based on YOLOv5 Deep Neural Network4
DeepHGNN: A Novel Deep Hypergraph Neural Network4
A Design of 2-Stage Voltage Ramp-Up SRAM Physical Unclonable Function4
Secure Cloud Architecture for 5G Core Network4
A Novel Construction of Updatable Identity-Based Hash Proof System and Its Applications4
Video‐Driven 2D Character Animation4
A Survey: FPGA‐Based Dynamic Scheduling of Hardware Tasks4
Global Ramp Uniformity Correction Method for Super-Large Array CMOS Image Sensors4
An Edge‐Cloud Collaborative Cross‐Domain Identity‐Based Authentication Protocol with Privacy Protection4
Troy: Efficient Service Deployment for Windows Systems4
An Parallel FPGA SAT Solver Based on Multi‐Thread and Pipeline4
Marginal Attacks of Generating Adversarial Examples for Spam Filtering4
On the Linear Complexity of a Class of Periodic Sequences Derived from Euler Quotients4
Radiation Principle and Spatial Direct Modulation Method of a Low Frequency Antenna Based on Rotating Permanent Magnet4
Smoothing Neural Network for Non‐Lipschitz Optimization with Linear Inequality Constraints4
Wide Stopband Substrate Integrated Waveguide Filter Using Bisection and Trisection Coupling in Multilayer3
Exploring Potential Barrier Estimation Mechanism Based on Quantum Dynamics Framework3
Review on Security Defense Technology Research in Edge Computing Environment3
Remote Interference Source Localization: A Multi‐UAV‐Based Cooperative Framework3
Service Migration Algorithm Based on Markov Decision Process with Multiple Service Types and Multiple System Factors3
Front Cover3
Multi‐Traffic Targets Tracking Based on an Improved Structural Sparse Representation with Spatial‐Temporal Constraint3
Internet of Brain, Thought, Thinking, and Creation3
High Power GaN Doubler with High Duty Cycle Pulse Based on Local Non-Reflection Design3
Improving Knowledge Graph Completion Using Soft Rules and Adversarial Learning3
A Multi-Channel CMOS Analog Front-End Interface IC with 157.8 dB Current Detection Dynamic Range3
A Novel Re-weighted CTC Loss for Data Imbalance in Speech Keyword Spotting3
Comparative Analysis of Noise Margin Between Pure SET-SET and Hybrid SET-PMOS Inverters3
Link Prediction Method Fusion with Local Structural Entropy for Directed Network3
Front Cover3
Navigation for UAV Pair‐Supported Relaying in Unknown IoT Systems with Deep Reinforcement Learning3
A Multicarrier Phase‐Coded Waveform Design Scheme for Joint Radar and Communication System3
Technology Dependency of TID Response for a Custom Bandgap Voltage Reference in 65 nm to 28 nm Bulk CMOS Technologies3
Characterization and Properties of Bent‐Negabent Functions3
MSK‐PK: A Public‐Key Encryption Cryptosystem with Multiple Secret‐Keys3
DeepLogic: Priority Testing of Deep Learning Through Interpretable Logic Units3
A Novel Method for Maximum Power Point Tracking of the Grid-Connected Three-Phase Solar Systems Based on the PV Current Prediction3
A 16‐bit, ±10‐V Input Range SAR ADC with a 5‐V Supply Voltage and Mixed‐Signal Nonlinearity Calibration3
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams3
A Wideband High-Gain Sawtooth Slot Array Antenna with Frequency-Scanning at Lower Frequency and Fixed-Beam at Higher Frequency3
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings3
220 GHz Multi Circuit Integrated Front End Based on Solid‐State Circuits for High Speed Communication System3
Diagnostic Classification of Lung Cancer Using Deep Transfer Learning Technology and Multi‐Omics Data3
Formal Modeling of Frame Selection in Asynchronous TSN Communications3
Unsupervised, Supervised and Semi‐supervised Dimensionality Reduction by Low‐Rank Regression Analysis3
Quantum Wolf Pack Evolutionary Algorithm of Weight Decision‐Making Based on Fuzzy Control3
Design of Pyramidal Horn with Arbitrary E/H Plane Half-Power Beamwidth3
Message Authentication Codes Against Related‐Key Attacks Under LPN and LWE3
Front Cover3
ESE: Efficient Security Enhancement Method for the Secure Aggregation Protocol in Federated Learning3
Trusted Network Evaluation Model Based on Comprehensive Trust3
Joint Optimization of Trajectory and Task Offloading for Cellular-Connected Multi-UAV Mobile Edge Computing2
Antenna Decoupling Based on Characteristic Modes Cancellation2
A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution2
FSCIL-EACA: Few-Shot Class-Incremental Learning Network Based on Embedding Augmentation and Classifier Adaptation for Image Classification2
Investigating the Effects of $\mathrm{V}_{2}\mathrm{C}$ MXene on Improving the Switching Stability and Reducing the Operation Voltages of TiO2-Based Memristors2
Mode Competition of Low Voltage Backward Wave Oscillator near 500 GHz with Parallel Multi-Beam2
Targeted Adversarial Examples Generating Method Based on cVAE in Black Box Settings2
Subspace Clustering via Block-Diagonal Decomposition2
A Lattice-Based Method for Recovering the Unknown Parameters of Truncated Multiple Recursive Generators with Constant2
A Blockchain‐Based Flexible Data Auditing Scheme for the Cloud Service2
The Novel Instance Segmentation Method Based on Multi-Level Features and Joint Attention2
Secret Sharing Schemes from Linear Codes over F2+vF2+v2F22
Improved Cross-Corpus Speech Emotion Recognition Using Deep Local Domain Adaptation2
Contents2
Modeling and Measurement of 3D Solenoid Inductor Based on Through-Silicon Vias2
An Efficient and Fast Area Optimization Approach for Mixed Polarity Reed-Muller Logic Circuits2
A CMA‐ES‐Based Adversarial Attack Against Black‐Box Object Detectors2
An Algorithm of Deformation Image Correction Based on Spatial Mapping2
Achieving Safe Deep Reinforcement Learning via Environment Comprehension Mechanism2
A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network2
Just‐in‐Time Human Gesture Recognition Using WiFi Signals2
Lexicon‐Augmented Cross‐Domain Chinese Word Segmentation with Graph Convolutional Network2
Android Malware Detection Method Based on Permission Complement and API Calls2
A Recursive DRL-Based Resource Allocation Method for Multibeam Satellite Communication Systems2
Cross Modal Adaptive Few-Shot Learning Based on Task Dependence2
Search Algorithm Based on Permutation Group by Quantum Walk on Hypergraphes2
Study on the Impact of Imbalance Between Transmission Lines on Crosstalk: A Novel Perspective of Displacement Current2
Knowledge Graph Completion Based on GCN of Multi‐Information Fusion and High‐Dimensional Structure Analysis Weight2
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand2
Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer2
Towards V2I Age-Aware Fairness Access: A DQN Based Intelligent Vehicular Node Training and Test Method2
Enhancing Network Throughput via the Equal Interval Frame Aggregation Scheme for IEEE 802.11ax WLANs2
Low‐Complexity Digital Equalizers for High‐Speed Underwater Optical Wireless Communication2
De-convolution and De-noising of SAR Based GPS Images Using Hybrid Particle Swarm Optimization2
LaTLS: A Lattice‐Based TLS Proxy Protocol2
Contents2
Contents 20242
A Semi-shared Hierarchical Joint Model for Sequence Labeling2
An Ultra-wideband Doubler Chain with 43–65 dBc Fundamental Rejection in Ku/K/Ka Band2
Architecture Design of Protocol Controller Based on Traffic-Driven Software Defined Interconnection2
A Dynamic Hysteresis Model of Piezoelectric Ceramic Actuators2
Miniaturized, Wide Stopband Filter Based on Shielded Capacitively Loaded SIW Resonators2
Deformable Perfect Vortex Wave-Front Modulation Based on Geometric Metasurface in Microwave Regime2
Labeled Multi‐Bernoulli Maneuvering Target Tracking Algorithm via TSK Iterative Regression Model2
2
PLC for In-Vehicle Network: A DRL-Based Algorithm of Diversity Combination of OFDM Subcarriers2
Explainable Business Process Remaining Time Prediction Using Reachability Graph2
Zero-Cerd: A Self-Blindable Anonymous Authentication System Based on Blockchain2
Multimodal Cross-Attention Mechanism-Based Algorithm for Elderly Behavior Monitoring and Recognition2
High-Efficiency Wideband Transmitarray Antenna Using Polarization-Rotating Elements with Parasitic Stubs2
Hybrid Beamforming for Terahertz Wireless Communications with Beam Squint: A Survey2
A CMOS 4‐Element Ku‐Band Phased‐Array Transceiver2
Developer Cooperation Relationship and Attribute Similarity Based Community Detection in Software Ecosystem2
Intracranial Epileptic Seizures Detection Based on an Optimized Neural Network Classifier2
Efficient 3D Hilbert Curve Encoding and Decoding Algorithms2
Predicting Microbe‐Disease Association Based on Heterogeneous Network and Global Graph Feature Learning2
High‐Order Extended Kalman Filter Design for a Class of Complex Dynamic Systems with Polynomial Nonlinearities2
A Note for Estimation About Average Differential Entropy of Continuous Bounded Space‐Time Random Field2
Verifiable Multi‐Party Universal Blind Quantum Computing in Distributed Networks2
Multi-Dimensional QoS Evaluation and Optimization of Mobile Edge Computing for IoT: A Survey2
Time Optimal Trajectory Planning Algorithm for Robotic Manipulator Based on Locally Chaotic Particle Swarm Optimization2
Attention Guided Enhancement Network for Weakly Supervised Semantic Segmentation2
IPFA-Net: Important Points Feature Aggregating Net for Point Cloud Classification and Segmentation2
The Investigation of Data Voting Algorithm for Train Air-Braking System Based on Multi-Classification SVM and ANFIS1
Secure Scalar Product Protocols1
Model Checking Computation Tree Logic Over Multi-Valued Decision Processes and Its Reduction Techniques1
MalFSM: Feature Subset Selection Method for Malware Family Classification1
Multi-Time-Scale Variational Mode Decomposition-Based Robust Fault Diagnosis of Railway Point Machines Under Multiple Noises1
0.86482501029968