Chinese Journal of Electronics

Papers
(The median citation count of Chinese Journal of Electronics is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Research on Virtual Coupled Train Control Method Based on GPC & VAPF62
Towards V2I Age-Aware Fairness Access: A DQN Based Intelligent Vehicular Node Training and Test Method41
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference37
220 GHz Multi Circuit Integrated Front End Based on Solid‐State Circuits for High Speed Communication System28
Multi‐Scale Prediction of RUL and SOH for Lithium‐Ion Batteries Based on WNN‐UPF Combined Model23
Keyword Extraction from Scientific Research Projects Based on SRP‐TF‐IDF23
Time Optimal Trajectory Planning Algorithm for Robotic Manipulator Based on Locally Chaotic Particle Swarm Optimization19
Hippocampal Segmentation in Brain MRI Images Using Machine Learning Methods: A Survey18
A Machine Learning Method for Differentiating and Predicting Human‐Infective Coronavirus Based on Physicochemical Features and Composition of the Spike Protein17
Blockchain‐Empowered Dynamic Spectrum Management for Space‐Air‐Ground Integrated Network17
Digital Signal Processing for High‐Speed THz Communications17
A V2V Emergent Message Dissemination Scheme for 6G-Oriented Vehicular Networks16
Backdoor Attacks on Image Classification Models in Deep Neural Networks15
Real‐World Wireless Network Modeling and Optimization: From Model/Data‐Driven Perspective14
Ergodic Capacity of NOMA-Based Overlay Cognitive Integrated Satellite-UAV-Terrestrial Networks13
A Review of FPGA‐Based Custom Computing Architecture for Convolutional Neural Network Inference13
High‐Order Extended Kalman Filter Design for a Class of Complex Dynamic Systems with Polynomial Nonlinearities13
Predicting Microbe‐Disease Association Based on Heterogeneous Network and Global Graph Feature Learning12
Diagnostic Classification of Lung Cancer Using Deep Transfer Learning Technology and Multi‐Omics Data12
A Blockchain‐Based Flexible Data Auditing Scheme for the Cloud Service12
Trajectory Optimization and Power Allocation Scheme Based on DRL in Energy Efficient UAV‐Aided Communication Networks11
A Novel Integrated Path Planning Algorithm for Warehouse AGVs11
An Improved Grasshopper Optimization Algorithm for Global Optimization11
Secure Cloud Architecture for 5G Core Network11
An Asynchronous Quasi‐Cloud/Edge/Client Collaborative Federated Learning Mechanism for Fault Diagnosis10
A Quaternion Two‐Stream R‐CNN Network for Pixel‐Level Color Image Splicing Localization10
Non‐intrusive Load Monitoring Using Gramian Angular Field Color Encoding in Edge Computing10
Geometrically Shaped 32QAM and Modified Binary Switching Coding Method in Underwater Visible Light Communication9
Trust Evaluation Model Based on PSO and LSTM for Huge Information Environments9
Overlay CR-NOMA Assisted Intelligent Transportation System Networks with Imperfect SIC and CEEs9
MADRL-Based 3D Deployment and User Association of Cooperative mmWave Aerial Base Stations for Capacity Enhancement9
Delay and Energy Consumption Oriented UAV Inspection Business Collaboration Computing Mechanism in Edge Computing Based Electric Power IoT9
A Multi‐Granularity Density Peak Clustering Algorithm Based on Variational Mode Decomposition9
Joint Spectrum Sensing and Spectrum Access for Defending Massive SSDF Attacks: A Novel Defense Framework9
Quaternion Kernel Fisher Discriminant Analysis for Feature‐Level Multimodal Biometric Recognition8
Blockchain‐Based Reliable Fog‐Cloud Service Solution for IIoT8
An Edge‐Cloud Collaborative Cross‐Domain Identity‐Based Authentication Protocol with Privacy Protection8
A Novel Step‐by‐Step High‐Order Extended Kalman Filter Design for a Class of Complex Systems with Multiple Basic Multipliers8
A 1.8‐V 240‐MHz 2.19‐mW Four‐Stage CMOS OTA with a Segmenting Frequency Compensation Technique8
A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT8
Myocardial Infarction Detection and Localization with Electrocardiogram Based on Convolutional Neural Network8
Timely Data Delivery for Energy‐Harvesting IoT Devices8
A Reframed Watermark Extraction Approach Using the ABC Algorithm8
Knowledge Graph Completion Based on GCN of Multi‐Information Fusion and High‐Dimensional Structure Analysis Weight8
A Review of Terahertz Sources Based on Planar Schottky Diodes8
WCM‐WTrA: A Cross‐Project Defect Prediction Method Based on Feature Selection and Distance‐Weight Transfer Learning8
Labeled Multi‐Bernoulli Maneuvering Target Tracking Algorithm via TSK Iterative Regression Model8
Adaptive Simplified Chicken Swarm Optimization Based on Inverted S‐Shaped Inertia Weight8
Induction Motor Fault Diagnosis Based on Transfer Principal Component Analysis8
High Power 170 GHz Frequency Doubler Based on GaAs Schottky Diodes8
Prediction of Protein Subcellular Localization Based on Microscopic Images via Multi‐Task Multi‐Instance Learning7
SSIG: Single‐Sample Information Gain Model for Integrating Multi‐Omics Data to Identify Cancer Subtypes7
P2HBT: Partially Policy Hidden E‐Healthcare System with Black‐Box Traceability7
Vibration Signal-Based Fault Diagnosis of Railway Point Machines via Double-Scale CNN7
Efficient 3D Hilbert Curve Encoding and Decoding Algorithms7
Integrated Intelligent Electromagnetic Radiator Design for Future THz Communication: A Review7
Human Following for Outdoor Mobile Robots Based on Point‐Cloud's Appearance Model7
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks7
A Pairing‐Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks7
Remote Interference Source Localization: A Multi‐UAV‐Based Cooperative Framework6
Sigma-Mixed Unscented Kalman Filter-Based Fault Detection for Traction Systems in High-Speed Trains6
Internet of Brain, Thought, Thinking, and Creation6
Hybrid Beamforming for Terahertz Wireless Communications with Beam Squint: A Survey6
A New Edge Perturbation Mechanism for Privacy-Preserving Data Collection in IOT6
HRPose: Real-Time High-Resolution 6D Pose Estimation Network Using Knowledge Distillation6
A CMA‐ES‐Based Adversarial Attack Against Black‐Box Object Detectors6
Prospects and Challenges of THz Precoding6
A Fine-Grained Object Detection Model for Aerial Images Based on YOLOv5 Deep Neural Network6
An Improved Ionospheric Delay Correction Method for SBAS6
Image Inpainting Based on Improved Deep Convolutional Auto‐encoder Network6
A Design and Comparative Investigation of Graded Al x Ga 1– x 6
EAODroid: Android Malware Detection Based on Enhanced API Order6
Multi‐Traffic Targets Tracking Based on an Improved Structural Sparse Representation with Spatial‐Temporal Constraint6
A Novel Neighborhood‐Weighted Sampling Method for Imbalanced Datasets6
QoS-Aware Computation Offloading in LEO Satellite Edge Computing for IoT: A Game-Theoretical Approach6
Mobility-Aware Multi-Task Migration and Offloading Scheme for Internet of Vehicles6
AttentionSplice: An Interpretable Multi‐Head Self‐Attention Based Hybrid Deep Learning Model in Splice Site Prediction6
Request Merging Based Cross‐User Deduplication for Cloud Storage with Resistance Against Appending Chunks Attack6
Improved Cross-Corpus Speech Emotion Recognition Using Deep Local Domain Adaptation6
Utility Preserved Facial Image De‐identification Using Appearance Subspace Decomposition6
Student Performance Prediction Based on Behavior Process Similarity6
Malware Detection Algorithm Based on the Attention Mechanism and ResNet6
Dual Radial-Resonant Wide Beamwidth Circular Sector Microstrip Patch Antennas6
Enhanced Privacy Preserving for Social Networks Relational Data Based on Personalized Differential Privacy6
Online Video Popularity Regression Prediction Model with Multichannel Dynamic Scheduling Based on User Behavior6
Towards Evaluating the Robustness of Adversarial Attacks Against Image Scaling Transformation6
Non‐profiled Deep‐Learning‐Based Power Analysis of the SM4 and DES Algorithms6
Linguistic Steganalysis via Fusing Multi-Granularity Attentional Text Features6
A Model for Chinese Named Entity Recognition Based on Global Pointer and Adversarial Learning5
Marginal Attacks of Generating Adversarial Examples for Spam Filtering5
Multi‐level Deep Correlative Networks for Multi‐modal Sentiment Analysis5
Research on Global Clock Synchronization Mechanism in Software‐Defined Control Architecture5
Navigation for UAV Pair‐Supported Relaying in Unknown IoT Systems with Deep Reinforcement Learning5
Evaluation Model and Method of Margin in Electromagnetic Environmental Effects for Complex Systems5
Tongue Color Classification in TCM with Noisy Labels via Confident-Learning-Assisted Knowledge Distillation5
Achieving Safe Deep Reinforcement Learning via Environment Comprehension Mechanism5
Detection of Malicious PDF Files Using a Two‐Stage Machine Learning Algorithm5
Objective Information Theory Exemplified in Air Traffic Control System5
High‐Gain Dual Circularly Polarized Antenna for Air‐to‐Ground Wireless Link5
A Novel Trustworthiness Measurement Model Based on Weight and User Feedback5
Clustering for Topological Interference Management5
Hyperspectral Image Classification Based on A Multi‐Scale Weighted Kernel Network5
Recursive Feature Elimination Based Feature Selection in Modulation Classification for MIMO Systems5
Unsupervised Cross‐Media Hashing Learning via Knowledge Graph5
A Novel Collision Supervision and Avoidance Algorithm for Scalable MAC of Vehicular Networks5
A Short Text Classification Algorithm Based on Semantic Extension5
A Hybrid Music Recommendation Model Based on Personalized Measurement and Game Theory4
An Improved Global Shutter Pixel with Extended Output Range and Linearity of Compensation for CMOS Image Sensor4
An Encoding-Decoding Framework Based on CNN for circRNA-RBP Binding Sites Prediction4
Color Context Binary Pattern Using Progressive Bit Correction for Image Classification4
Research on Silicon‐Based Terahertz Communication Integrated Circuits4
SLA‐Aware and Energy‐Efficient VM Consolidation in Cloud Data Centers Using Host State 3rd‐Order Markov Chain Model4
Are Similar Bugs Fixed with Similar Change Operations? An Empirical Study4
Demand Learning and Cooperative Deployment of UAV Networks4
RESS: A Reliable and Effcient Storage Scheme for Bitcoin Blockchain Based on Raptor Code4
Dilated Convolutional Pixels Affinity Network for Weakly Supervised Semantic Segmentation4
Quantum Wolf Pack Evolutionary Algorithm of Weight Decision‐Making Based on Fuzzy Control4
Representation of Semantic Word Embeddings Based on SLDA and Word2vec Model4
Secure Localization Technology Based on Dynamic Trust Management in Wireless Sensor Networks4
W‐Band High‐Efficiency Waveguide Slot Array Antenna with Low Sidelobe Levels Based on Silicon Micromachining Technology4
Research on Column FPN and Black Level Calibration in Large Array CMOS Image Sensor4
Collaborative Caching in Vehicular Edge Network Assisted by Cell-Free Massive MIMO4
Research and Application of Machine Learning in Automatic Program Generation4
Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions4
High‐Order Extended Strong Tracking Filter4
The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation4
Android Malware Detection Method Based on Permission Complement and API Calls4
Improving Knowledge Graph Completion Using Soft Rules and Adversarial Learning4
Attribute‐Based Worker Selection Scheme by Using Blockchain in Decentralized Crowdsourcing Scenario4
Traffic Sign Recognition Using an Attentive Context Region‐Based Detection Framework4
Phase Noise Effects on the Performance of High‐Order Digital Modulation Terahertz Communication System4
An Efficient Algebraic Solution for Moving Source Localization from Quadruple Hybrid Measurements4
Hypersonic Vehicle Trajectory Prediction Algorithm Based on Hough Transform4
An Efficient SCF‐PEKS Without Random Oracle Under Simple Assumption4
Essential Protein Prediction Based on Shuffled Frog‐Leaping Algorithm4
Deep Learning and Its Application in Diabetic Retinopathy Screening4
CNN Based No‐Reference HDR Image Quality Assessment4
Convolution Theorem Associated with the QWFRFT4
Transformer-Based Under-Sampled Single-Pixel Imaging4
A Hierarchical Scheme for Video‐Based Person Re‐identification Using Lightweight PCANet and Handcrafted LOMO Features3
Lexicon‐Augmented Cross‐Domain Chinese Word Segmentation with Graph Convolutional Network3
Quantum Contextuality for Training Neural Networks3
Cyclic Remote Implementation of Partially Unknown Quantum Operations3
A Dynamic Hysteresis Model of Piezoelectric Ceramic Actuators3
Differential Analysis of ARX Block Ciphers Based on an Improved Genetic Algorithm3
Time‐Resolved Spectroscopy for the Study of Perovskite3
Multipath Suppressing Method Based on Pseudorange Model Using Modified Teaching‐Learning Based Optimization Algorithm3
A Tightly Coupled Dipole Array with Diverse Element Reflection Phases for RCS Reduction3
Fast Fading Channel Estimation for OFDM Systems with Complexity Reduction3
Dual-Band Flexible MIMO Antenna with Self-Isolation Enhancement Structure for Wearable Applications3
Differential Fault Attack on GIFT3
Video Stabilization via Prediction with Time‐Series Network and Image Inpainting with Pyramid Fusion3
Total Ionizing Dose Effect and Failure Mechanism of Digital Signal Processor3
An Parallel FPGA SAT Solver Based on Multi‐Thread and Pipeline3
Zero-Cerd: A Self-Blindable Anonymous Authentication System Based on Blockchain3
LBA-EC: Load Balancing Algorithm Based on Weighted Bipartite Graph for Edge Computing3
Advancing Graph Convolution Network with Revised Laplacian Matrix3
Just‐in‐Time Human Gesture Recognition Using WiFi Signals3
Porn Streamer Recognition in Live Video Based on Multimodal Knowledge Distillation3
A Comprehensive Study on the Theory of Graphene Solution‐Gated Field Effect Transistor: Simulations and Experiments3
Intracranial Epileptic Seizures Detection Based on an Optimized Neural Network Classifier3
Cryptanalysis of AEGIS‐1283
Developer Cooperation Relationship and Attribute Similarity Based Community Detection in Software Ecosystem3
A Secure Mutual Authentication Protocol Based on Visual Cryptography Technique for IoT-Cloud3
Principled Design of Translation, Scale, and Rotation Invariant Variation Operators for Metaheuristics3
Classification and Early Warning Model of Terrorist Attacks Based on Optimal GCN3
Attention Guided Enhancement Network for Weakly Supervised Semantic Segmentation3
Recurrent Neural Networks for Computing the Moore‐Penrose Inverse with Momentum Learning3
RMHSForest: Relative Mass and Half‐Space Tree Based Forest for Anomaly Detection3
On UAV Serving Node Deployment for Temporary Coverage in Forest Environment: A Hierarchical Deep Reinforcement Learning Approach3
A Directly Readable Halftone Multifunctional Color QR Code3
FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning3
IMM Robust Cardinality Balance Multi‐Bernoulli Filter for Multiple Maneuvering Target Tracking with Interval Measurement3
A 16‐bit, ±10‐V Input Range SAR ADC with a 5‐V Supply Voltage and Mixed‐Signal Nonlinearity Calibration3
Predicting the Power Spectrum of Amplified OFDM Signals Using Higher‐Order Intercept Points3
Variance‐SNR Based Noise Suppression on Linear Canonical Choi‐Williams Distribution of LFM Signals3
STATE: A Clustering Algorithm Focusing on Edges Instead of Centers3
Radiation Principle and Spatial Direct Modulation Method of a Low Frequency Antenna Based on Rotating Permanent Magnet3
Teacher-Student Training Approach Using an Adaptive Gain Mask for LSTM-Based Speech Enhancement in the Airborne Noise Environment3
Fast Cross-Platform Binary Code Similarity Detection Framework Based on CFGs Taking Advantage of NLP and Inductive GNN2
DeepHGNN: A Novel Deep Hypergraph Neural Network2
Feature Fusion Based Hand Gesture Recognition Method for Automotive Interfaces2
A Deep Deterministic Policy Gradient-Based Method for Enforcing Service Fault-Tolerance in MEC2
2
A Note for Estimation About Average Differential Entropy of Continuous Bounded Space‐Time Random Field2
Network Element Placement for Space‐Air‐Ground Integrated Network: A Tutorial2
Targeted Adversarial Examples Generating Method Based on cVAE in Black Box Settings2
Joint Feature Representation and Classifier Learning Based Unsupervised Domain Adaption ELM2
Asymptotically Optimal Golay-ZCZ Sequence Sets with Flexible Length2
Cryptanalysis of Full-Round Magpie Block Cipher2
A Novel Method for Maximum Power Point Tracking of the Grid-Connected Three-Phase Solar Systems Based on the PV Current Prediction2
Enhancing Network Throughput via the Equal Interval Frame Aggregation Scheme for IEEE 802.11ax WLANs2
On the p ‐Adic Complexity of the Ding‐Helleseth‐Martinsen Binary Sequences2
Deep Contextual Representation Learning for Identifying Essential Proteins via Integrating Multisource Protein Features2
Secure Scalar Product Protocols2
A Fast Evolutionary Learning to Optimize CNN2
MalFSM: Feature Subset Selection Method for Malware Family Classification2
A Survey: FPGA‐Based Dynamic Scheduling of Hardware Tasks2
2
Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation2
Characteristic Mode Design of Dual‐Band Reconfigurable Frequency Selective Surface2
The Kernel Dynamics of Convolutional Neural Networks in Manifolds2
An Optimal Stability Matching Algorithm for DAG Blockchain Based on Matching Theory2
Double‐Layer Positional Encoding Embedding Method for Cross‐Platform Binary Function Similarity Detection2
A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution2
Quantitative Method Based on Cotangent Similarity Degree in Three‐Valued Łukasiewicz Logic2
Automatic Spectral Method of Mesh Segmentation Based on Fiedler Residual2
PLC for In-Vehicle Network: A DRL-Based Algorithm of Diversity Combination of OFDM Subcarriers2
Quaternion Quasi-Chebyshev Non-local Means for Color Image Denoising2
A Novel Goodness of Fit Test Spectrum Sensing Using Extreme Eigenvalues2
An Improved Navigation Pseudolite Signal Structure Based on the Kasami Sequences and the Pulsing Scheme2
Defects Recognition of Train Wheelset Tread Based on Improved Spiking Neural Network2
Extraction Security of Sequential Aggregate Signatures2
Track-Oriented Marginal Poisson Multi-Bernoulli Mixture Filter for Extended Target Tracking2
An Efficient Post‐quantum Identity‐Based Signature2
Design and Fabrication of Reflective Phase Shifter for Two‐Dimensional Terahertz Beam‐Scanning Reflectarray2
One and Two‐Weight ℤ 2 R 2 Additive Codes2
A Unity‐Gain Buffer Assisted Noise‐Shaping SAR ADC Based on Error‐Feedback Structure2
Hyperspectral Image Super-Resolution Based on Spatial-Spectral Feature Extraction Network2
Optimization on the Dynamic Train Coupling Process in High-Speed Railway2
GridNet‐3D: A Novel Real‐Time 3D Object Detection Algorithm Based on Point Cloud2
Infrared and Visible Image Fusion Based on Blur Suppression Generative Adversarial Network2
Video‐Driven 2D Character Animation2
Chaotic Signal Denoising Algorithm Based on Self‐Similarity2
Circuit Modeling and Performance Analysis of GNR@SWCNT Bundle Interconnects2
A Novel Quarter‐Circular Arc Multi‐Direction Piezoelectric VEH and Its Theoretical Model2
Extracting Integrated Features of Electronic Medical Records Big Data for Mortality and Phenotype Prediction2
Ancient Character Recognition: A Novel Image Dataset of Shui Manuscript Characters and Classification Model2
Unique Parameters Selection Strategy of Linear Canonical Wigner Distribution via Multiobjective Optimization Modeling2
Contents2
Analytical Models of Passive Linear Structures in Printed Circuit Boards2
Differential Fault Attack on the Stream Cipher LIZARD2
ESE: Efficient Security Enhancement Method for the Secure Aggregation Protocol in Federated Learning2
Intelligent Orchestrating of IoT Microservices Based on Reinforcement Learning2
A Miniaturized Bandwidth Reconfigurable Bandpass Chip Filter with Semi‐lumped Topology and GaAs pHEMT Technology2
No Reference Image Sharpness Assessment Based on Global Color Difference Variation2
2
Robust Centralized CFAR Detection for Multistatic Sonar Systems2
Fusion of Infrared and Visible Images Based on Infrared Object Extraction2
Cross Modal Adaptive Few-Shot Learning Based on Task Dependence2
Deep Guided Attention Network for Joint Denoising and Demosaicing in Real Image2
Monaural Speech Separation Using Dual-Output Deep Neural Network with Multiple Joint Constraint2
A Region‐Based Analysis for the Feature Concatenation in Deep Forests2
A 220 GHz Orthogonal Modulator Based on Subharmonic Mixers Using Anti‐Paralleled Schottky Diodes2
Segment‐Adaptive Spread Spectrum Audio Watermarking Using NSGA‐II2
A Layout Method of Space-Based Pseudolite System Based on GDOP Geometry2
A Novel Serially Concatenated GMSK System for Satellite Communications2
Rapid Path Extraction and Three‐Dimensional Roaming of the Virtual Endonasal Endoscope2
Sitting or Standing Data Acquisition Based Breast Ultrasound Computed Tomography1
Real-Time 3D Ultrasound Imaging System Based on a Hybrid Reconstruction Algorithm1
0.087275981903076