Chinese Journal of Electronics

Papers
(The median citation count of Chinese Journal of Electronics is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Review on the Technological Development and Application of UAV Systems84
A Multi‐queue Approach of Energy Efficient Task Scheduling for Sensor Hubs52
Research on Virtual Coupled Train Control Method Based on GPC & VAPF45
A Short Text Classification Method Based on N ‐Gram and CNN44
220 GHz Multi Circuit Integrated Front End Based on Solid‐State Circuits for High Speed Communication System28
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing23
Towards V2I Age-Aware Fairness Access: A DQN Based Intelligent Vehicular Node Training and Test Method20
Facial Beauty Prediction Based on Lighted Deep Convolution Neural Network with Feature Extraction Strengthened19
Condition Monitoring for Railway Point Machines Based on Sound Analysis and Support Vector Machine19
Keyword Extraction from Scientific Research Projects Based on SRP‐TF‐IDF17
Multi‐Scale Prediction of RUL and SOH for Lithium‐Ion Batteries Based on WNN‐UPF Combined Model16
Backdoor Attacks on Image Classification Models in Deep Neural Networks15
Multi‐channel Sliced Deep RCNN with Residual Network for Text Classification13
Hippocampal Segmentation in Brain MRI Images Using Machine Learning Methods: A Survey13
Retransmission Number Aware Channel Access Scheme for IEEE 802.11ax Based WLAN12
Time Optimal Trajectory Planning Algorithm for Robotic Manipulator Based on Locally Chaotic Particle Swarm Optimization12
High‐Order Extended Kalman Filter Design for a Class of Complex Dynamic Systems with Polynomial Nonlinearities12
Digital Signal Processing for High‐Speed THz Communications11
Analysis of Propagation Characteristics of Electromagnetic Disturbance from the Off‐Line of Pantograph‐Catenary in High‐Speed Railway Viaducts11
A Machine Learning Method for Differentiating and Predicting Human‐Infective Coronavirus Based on Physicochemical Features and Composition of the Spike Protein11
Blockchain‐Empowered Dynamic Spectrum Management for Space‐Air‐Ground Integrated Network10
A Review of FPGA‐Based Custom Computing Architecture for Convolutional Neural Network Inference10
An Asynchronous Quasi‐Cloud/Edge/Client Collaborative Federated Learning Mechanism for Fault Diagnosis9
Hyperspectral Image Classification Based on Unsupervised Heterogeneous Domain Adaptation CycleGan9
A Blockchain‐Based Flexible Data Auditing Scheme for the Cloud Service9
A Novel Integrated Path Planning Algorithm for Warehouse AGVs9
Non‐intrusive Load Monitoring Using Gramian Angular Field Color Encoding in Edge Computing8
Diagnostic Classification of Lung Cancer Using Deep Transfer Learning Technology and Multi‐Omics Data8
Ergodic Capacity of NOMA-Based Overlay Cognitive Integrated Satellite-UAV-Terrestrial Networks8
MADRL-Based 3D Deployment and User Association of Cooperative mmWave Aerial Base Stations for Capacity Enhancement8
A Quaternion Two‐Stream R‐CNN Network for Pixel‐Level Color Image Splicing Localization8
Real‐World Wireless Network Modeling and Optimization: From Model/Data‐Driven Perspective8
An Improved Grasshopper Optimization Algorithm for Global Optimization8
Certificateless Public Verification for Data Storage and Sharing in the Cloud8
Induction Motor Fault Diagnosis Based on Transfer Principal Component Analysis8
Predicting Microbe‐Disease Association Based on Heterogeneous Network and Global Graph Feature Learning8
A 1.8‐V 240‐MHz 2.19‐mW Four‐Stage CMOS OTA with a Segmenting Frequency Compensation Technique8
Improved EMD Based on Piecewise Cubic Hermite Interpolation and Mirror Extension8
A Multi‐Granularity Density Peak Clustering Algorithm Based on Variational Mode Decomposition8
Trust Evaluation Model Based on PSO and LSTM for Huge Information Environments8
Quaternion Kernel Fisher Discriminant Analysis for Feature‐Level Multimodal Biometric Recognition7
An Edge‐Cloud Collaborative Cross‐Domain Identity‐Based Authentication Protocol with Privacy Protection7
LC‐Z‐Source Inverter Design and Control7
A Secure and Privacy‐Preserving Watermark Based Medical Image Sharing Method7
A Reframed Watermark Extraction Approach Using the ABC Algorithm7
Iterative Interference Cancellation for Non‐orthogonal Multiple Access System7
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference7
A Novel Step‐by‐Step High‐Order Extended Kalman Filter Design for a Class of Complex Systems with Multiple Basic Multipliers7
A Pairing‐Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks7
A Text Similarity Measurement Based on Semantic Fingerprint of Characteristic Phrases6
Speech Signal Processing on Graphs: Graph Topology, Graph Frequency Analysis and Denoising6
Geometrically Shaped 32QAM and Modified Binary Switching Coding Method in Underwater Visible Light Communication6
P2HBT: Partially Policy Hidden E‐Healthcare System with Black‐Box Traceability6
Constrained Unscented Kalman Filtering for Bearings‐Only Maneuvering Target Tracking6
Human Following for Outdoor Mobile Robots Based on Point‐Cloud's Appearance Model6
Labeled Multi‐Bernoulli Maneuvering Target Tracking Algorithm via TSK Iterative Regression Model6
An Improved Ionospheric Delay Correction Method for SBAS6
Trajectory Optimization and Power Allocation Scheme Based on DRL in Energy Efficient UAV‐Aided Communication Networks6
Malware Detection Algorithm Based on the Attention Mechanism and ResNet6
SSIG: Single‐Sample Information Gain Model for Integrating Multi‐Omics Data to Identify Cancer Subtypes6
Discovering the Association of Algae with Physicochemical Variables in Erhai Lake6
A Novel Modified Tree‐Seed Algorithm for High‐Dimensional Optimization Problems6
A Novel Collision Supervision and Avoidance Algorithm for Scalable MAC of Vehicular Networks5
Performance Modeling Based on GSPN for Cyberspace Mimic DNS5
A Generalized Information Security Model SOCMD for CMD Systems5
Towards Evaluating the Robustness of Adversarial Attacks Against Image Scaling Transformation5
Adaptive Simplified Chicken Swarm Optimization Based on Inverted S‐Shaped Inertia Weight5
Multi‐level Deep Correlative Networks for Multi‐modal Sentiment Analysis5
High Power 170 GHz Frequency Doubler Based on GaAs Schottky Diodes5
Objective Information Theory Exemplified in Air Traffic Control System5
Utility Preserved Facial Image De‐identification Using Appearance Subspace Decomposition5
Myocardial Infarction Detection and Localization with Electrocardiogram Based on Convolutional Neural Network5
Efficient 3D Hilbert Curve Encoding and Decoding Algorithms5
Deep Fault Diagnosis for Rotating Machinery with Scarce Labeled Samples5
Knowledge Graph Completion Based on GCN of Multi‐Information Fusion and High‐Dimensional Structure Analysis Weight5
Detection of Malicious PDF Files Using a Two‐Stage Machine Learning Algorithm5
Prediction of Protein Subcellular Localization Based on Microscopic Images via Multi‐Task Multi‐Instance Learning5
Evaluation Model and Method of Margin in Electromagnetic Environmental Effects for Complex Systems5
Words in Pairs Neural Networks for Text Classification5
Non‐profiled Deep‐Learning‐Based Power Analysis of the SM4 and DES Algorithms5
Joint Spectrum Sensing and Spectrum Access for Defending Massive SSDF Attacks: A Novel Defense Framework5
Request Merging Based Cross‐User Deduplication for Cloud Storage with Resistance Against Appending Chunks Attack5
Blockchain‐Based Dynamic Group Key Agreement Protocol for Ad Hoc Network5
Research of Neural Network Structural Optimization Based on Information Entropy4
Optimal Quinary Cyclic Codes with Minimum Distance Four4
Are Similar Bugs Fixed with Similar Change Operations? An Empirical Study4
Research and Application of Machine Learning in Automatic Program Generation4
Design and Analysis of Double One Out of Two with a Hot Standby Safety Redundant Structure4
Research on Global Clock Synchronization Mechanism in Software‐Defined Control Architecture4
A V2V Emergent Message Dissemination Scheme for 6G-Oriented Vehicular Networks4
A Novel Trustworthiness Measurement Model Based on Weight and User Feedback4
Transparent Computing: Development and Current Status4
Phase Noise Effects on the Performance of High‐Order Digital Modulation Terahertz Communication System4
AttentionSplice: An Interpretable Multi‐Head Self‐Attention Based Hybrid Deep Learning Model in Splice Site Prediction4
Hypersonic Vehicle Trajectory Prediction Algorithm Based on Hough Transform4
Linguistic Steganalysis via Fusing Multi-Granularity Attentional Text Features4
SLA‐Aware and Energy‐Efficient VM Consolidation in Cloud Data Centers Using Host State 3rd‐Order Markov Chain Model4
Integrated Intelligent Electromagnetic Radiator Design for Future THz Communication: A Review4
An Efficient SCF‐PEKS Without Random Oracle Under Simple Assumption4
Remote Interference Source Localization: A Multi‐UAV‐Based Cooperative Framework4
Multi‐Traffic Targets Tracking Based on an Improved Structural Sparse Representation with Spatial‐Temporal Constraint4
Attribute‐Based Worker Selection Scheme by Using Blockchain in Decentralized Crowdsourcing Scenario4
Enhanced Privacy Preserving for Social Networks Relational Data Based on Personalized Differential Privacy4
A New Edge Perturbation Mechanism for Privacy-Preserving Data Collection in IOT4
Achieving Safe Deep Reinforcement Learning via Environment Comprehension Mechanism4
Secure Cloud Architecture for 5G Core Network4
Spatio‐Temporal Generative Adversarial Networks4
Deep Learning and Its Application in Diabetic Retinopathy Screening4
Hyperspectral Image Classification Based on A Multi‐Scale Weighted Kernel Network4
A Simultaneous Cartoon‐Texture Image Segmentation and Image Decomposition Method4
Quantum Teleportation via Qutrit Entangled State4
Image Inpainting Based on Improved Deep Convolutional Auto‐encoder Network4
A Short Text Classification Algorithm Based on Semantic Extension4
Student Performance Prediction Based on Behavior Process Similarity4
An Improved Global Shutter Pixel with Extended Output Range and Linearity of Compensation for CMOS Image Sensor4
A Novel Neighborhood‐Weighted Sampling Method for Imbalanced Datasets4
Online Video Popularity Regression Prediction Model with Multichannel Dynamic Scheduling Based on User Behavior4
Multipath Suppressing Method Based on Pseudorange Model Using Modified Teaching‐Learning Based Optimization Algorithm3
Quantum Contextuality for Training Neural Networks3
Convolution Theorem Associated with the QWFRFT3
Integrated Polarity Optimization of MPRM Circuits Based on Improved Multi‐objective Particle Swarm Optimization3
Accurate Analysis of Connectivity and Resilience for a Class of Wireless Sensor Networks3
A Feature Optimized Deep Learning Model for Clinical Data Mining3
Dilated Convolutional Pixels Affinity Network for Weakly Supervised Semantic Segmentation3
Ultrasound Computed Tomography of Knee Joint3
STATE: A Clustering Algorithm Focusing on Edges Instead of Centers3
Investigations on the Effect of Electrical Contact Degradation on High Speed Wide‐Band Signal Integrity3
HSRDN: High‐Speed Router Design for Various NoC Topologies3
Classification and Early Warning Model of Terrorist Attacks Based on Optimal GCN3
A Fine-Grained Object Detection Model for Aerial Images Based on YOLOv5 Deep Neural Network3
RMHSForest: Relative Mass and Half‐Space Tree Based Forest for Anomaly Detection3
Recurrent Neural Networks for Computing the Moore‐Penrose Inverse with Momentum Learning3
IMM Robust Cardinality Balance Multi‐Bernoulli Filter for Multiple Maneuvering Target Tracking with Interval Measurement3
3
Overlay CR-NOMA Assisted Intelligent Transportation System Networks with Imperfect SIC and CEEs3
Advancing Graph Convolution Network with Revised Laplacian Matrix3
WCM‐WTrA: A Cross‐Project Defect Prediction Method Based on Feature Selection and Distance‐Weight Transfer Learning3
Differential Analysis of ARX Block Ciphers Based on an Improved Genetic Algorithm3
EAODroid: Android Malware Detection Based on Enhanced API Order3
A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT3
Research on High Precision Tracking Method of Guided Transport Vehicle Based on Autonomous Combination Positioning3
Multi‐feedback Pairwise Ranking via Adversarial Training for Recommender3
Video Stabilization via Prediction with Time‐Series Network and Image Inpainting with Pyramid Fusion3
Traffic Sign Recognition Using an Attentive Context Region‐Based Detection Framework3
Total Ionizing Dose Effect and Failure Mechanism of Digital Signal Processor3
Robust Reconstruction of Block Sparse Signals from Adaptively One‐Bit Measurements3
An Efficient Algebraic Solution for Moving Source Localization from Quadruple Hybrid Measurements3
Android Malware Detection Method Based on Permission Complement and API Calls3
Clustering for Topological Interference Management3
Cyclic Remote Implementation of Partially Unknown Quantum Operations3
A CMA‐ES‐Based Adversarial Attack Against Black‐Box Object Detectors3
Spatial Sound‐History, Principle, Progress and Challenge3
Porn Streamer Recognition in Live Video Based on Multimodal Knowledge Distillation3
Hybrid Beamforming for Terahertz Wireless Communications with Beam Squint: A Survey3
Time‐Resolved Spectroscopy for the Study of Perovskite3
Differential Fault Attack on GIFT3
Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions3
A 400MHz Single‐Chip CMOS Transceiver for Long Range High Definition Video Transmission in UAV Application3
Fast Fading Channel Estimation for OFDM Systems with Complexity Reduction3
A Formation Reconfiguration Algorithm for Multi‐UAVs Based on Distributed Cooperative Coevolutionary with an Adaptive Grouping Strategy3
Optimal Weighting Method for Reducing Digital Satellite TV Differential Timing Error3
Blockchain‐Based Reliable Fog‐Cloud Service Solution for IIoT3
Prospects and Challenges of THz Precoding3
Marginal Attacks of Generating Adversarial Examples for Spam Filtering3
CNN Based No‐Reference HDR Image Quality Assessment3
Timely Data Delivery for Energy‐Harvesting IoT Devices3
Video‐Driven 2D Character Animation2
Delay and Energy Consumption Oriented UAV Inspection Business Collaboration Computing Mechanism in Edge Computing Based Electric Power IoT2
A Class of New Quadratic Vectorial Bent Functions2
A 16‐bit Hybrid ADC with Circular‐Adder‐Based Counting for 15μm Pitch 640×512 LWIR FPAs2
Nondeterministic Fuzzy Simulation and Bisimulation2
Lexicon‐Augmented Cross‐Domain Chinese Word Segmentation with Graph Convolutional Network2
Vibration Signal-Based Fault Diagnosis of Railway Point Machines via Double-Scale CNN2
Targeted Adversarial Examples Generating Method Based on cVAE in Black Box Settings2
High‐Order Extended Strong Tracking Filter2
Differential Fault Attack on the Stream Cipher LIZARD2
Intracranial Epileptic Seizures Detection Based on an Optimized Neural Network Classifier2
Quantum Wolf Pack Evolutionary Algorithm of Weight Decision‐Making Based on Fuzzy Control2
An Improved Navigation Pseudolite Signal Structure Based on the Kasami Sequences and the Pulsing Scheme2
Biomedical Named Entity Recognition Based on Self‐supervised Deep Belief Network2
Improving Knowledge Graph Completion Using Soft Rules and Adversarial Learning2
Application of Maximum Entropy Theorem in Channel Estimation2
Joint Bayesian and Greedy Recovery for Compressive Sensing2
A Comprehensive Study on the Theory of Graphene Solution‐Gated Field Effect Transistor: Simulations and Experiments2
On the p ‐Adic Complexity of the Ding‐Helleseth‐Martinsen Binary Sequences2
A Fast Evolutionary Learning to Optimize CNN2
Segment‐Adaptive Spread Spectrum Audio Watermarking Using NSGA‐II2
Essential Protein Prediction Based on Shuffled Frog‐Leaping Algorithm2
Dual Radial-Resonant Wide Beamwidth Circular Sector Microstrip Patch Antennas2
Demand Learning and Cooperative Deployment of UAV Networks2
HRPose: Real-Time High-Resolution 6D Pose Estimation Network Using Knowledge Distillation2
Frequency Synchronization Based on a Cascading Cross‐Correlation Function for CO‐FBMC‐OQAM2
A Novel Goodness of Fit Test Spectrum Sensing Using Extreme Eigenvalues2
Analytical Models of Passive Linear Structures in Printed Circuit Boards2
A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution2
TGSIFT: Robust SIFT Descriptor Based on Tensor Gradient for Hyperspectral Images2
Color Context Binary Pattern Using Progressive Bit Correction for Image Classification2
A Novel Adaptive Noise Resistance Method Used for AIS Real‐Time Signal Detection2
W‐Band High‐Efficiency Waveguide Slot Array Antenna with Low Sidelobe Levels Based on Silicon Micromachining Technology2
A 16‐bit, ±10‐V Input Range SAR ADC with a 5‐V Supply Voltage and Mixed‐Signal Nonlinearity Calibration2
Transformer-Based Under-Sampled Single-Pixel Imaging2
Feature Fusion Based Hand Gesture Recognition Method for Automotive Interfaces2
Internet of Brain, Thought, Thinking, and Creation2
Asymptotically Good Additive Cyclic Codes2
OSFPMiner: An Optimal Weighted Traversal Software Patterns Miner Based on Complex Network2
A Novel Method for Maximum Power Point Tracking of the Grid-Connected Three-Phase Solar Systems Based on the PV Current Prediction2
2
A Design and Comparative Investigation of Graded Al x Ga 1– x 2
Fusion of Infrared and Visible Images Based on Infrared Object Extraction2
GridNet‐3D: A Novel Real‐Time 3D Object Detection Algorithm Based on Point Cloud2
Quantitative Method Based on Cotangent Similarity Degree in Three‐Valued Łukasiewicz Logic2
Remote Attestation for Intelligent Electronic Devices in Smart Grid Based on Trusted Level Measurement2
Baguena: A Practical Proof of Stake Protocol with a Robust Delegation Mechanism2
Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation2
Unique Parameters Selection Strategy of Linear Canonical Wigner Distribution via Multiobjective Optimization Modeling2
The Kernel Dynamics of Convolutional Neural Networks in Manifolds2
Navigation for UAV Pair‐Supported Relaying in Unknown IoT Systems with Deep Reinforcement Learning2
Zero-Cerd: A Self-Blindable Anonymous Authentication System Based on Blockchain2
Ancient Character Recognition: A Novel Image Dataset of Shui Manuscript Characters and Classification Model2
Research on Column FPN and Black Level Calibration in Large Array CMOS Image Sensor2
Chaotic Signal Denoising Algorithm Based on Self‐Similarity2
Asymptotically Optimal Golay-ZCZ Sequence Sets with Flexible Length2
Single Fully Differential Second Generation Current Conveyor Based Four‐Quadrant Analog Multiplier Design and Its Applications2
A Novel Fast Dimension‐Reducing Ranked Query Method with High Security for Encrypted Cloud Data LIU Lianggui and LIU Zhengjin (School of Information Science and Technology, Zhejiang Sci‐Tech Universit2
Sigma-Mixed Unscented Kalman Filter-Based Fault Detection for Traction Systems in High-Speed Trains2
Efficient Task Decomposition for Sequential Crowdsourced Task Solving2
Track-Oriented Marginal Poisson Multi-Bernoulli Mixture Filter for Extended Target Tracking2
Deep Contextual Representation Learning for Identifying Essential Proteins via Integrating Multisource Protein Features2
A Review of Terahertz Sources Based on Planar Schottky Diodes2
Robust Centralized CFAR Detection for Multistatic Sonar Systems2
An Efficient Post‐quantum Identity‐Based Signature2
A Region‐Based Analysis for the Feature Concatenation in Deep Forests2
Just‐in‐Time Human Gesture Recognition Using WiFi Signals2
Infrared and Visible Image Fusion Based on Blur Suppression Generative Adversarial Network1
A Simplified Computational Model of Mushroom Body for Tethered Bees' Abdominal Swing Behavior Induced by Optic Flow1
Predicting the Power Spectrum of Amplified OFDM Signals Using Higher‐Order Intercept Points1
Rapid Path Extraction and Three‐Dimensional Roaming of the Virtual Endonasal Endoscope1
1
CNQ: Compressor‐Based Non‐uniform Quantization of Deep Neural Networks1
A Note for Estimation About Average Differential Entropy of Continuous Bounded Space‐Time Random Field1
Verifying Diagnosability of Discrete Event System with Logical Formula1
Sitting or Standing Data Acquisition Based Breast Ultrasound Computed Tomography1
Message Authentication Codes Against Related‐Key Attacks Under LPN and LWE1
A Layout Method of Space-Based Pseudolite System Based on GDOP Geometry1
Contents1
Video Saliency Detection via Pairwise Interaction1
A 220 GHz Orthogonal Modulator Based on Subharmonic Mixers Using Anti‐Paralleled Schottky Diodes1
Improved Cross-Corpus Speech Emotion Recognition Using Deep Local Domain Adaptation1
Trusted Network Evaluation Model Based on Comprehensive Trust1
An Optimal Stability Matching Algorithm for DAG Blockchain Based on Matching Theory1
0.024748086929321