Chinese Journal of Electronics

Papers
(The TQCC of Chinese Journal of Electronics is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Demand Learning and Cooperative Deployment of UAV Networks79
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model59
A Layout Method of Space-Based Pseudolite System Based on GDOP Geometry59
Rapid Path Extraction and Three‐Dimensional Roaming of the Virtual Endonasal Endoscope37
Combination for Conflicting Interval‐Valued Belief Structures with CSUI‐DST Method33
Coherent Integration Algorithm for Frequency‐Agile and PRF‐Jittering Signals in Passive Localization29
Low Loss and Low EMI Noise Trench IGBT with Shallow Emitter Trench Controlled p-Type Dummy Region24
14-Bit SAR ADC with On-Chip Digital Bubble Sorting Calibration Technology22
Antenna Selection Method for Distributed Dual-Function Radar Communication in MIMO System22
Research on Object Detection and Combination Clustering for Railway Switch Machine Gap Detection21
A Pairing‐Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks20
Multi-Sensor Fusion Adaptive Estimation for Nonlinear Under-Observed System with Multiplicative Noise18
An Accurate Near‐Field Distance Estimation Differential Algorithm17
Front Cover17
A Wideband Self‐Decoupled Microstrip Patch Antenna Array Using Characteristic Modes of Ground Plane17
Fast Fading Channel Estimation for OFDM Systems with Complexity Reduction17
Optimization on the Dynamic Train Coupling Process in High-Speed Railway17
A General Authentication and Key Agreement Framework for Industrial Control System17
Delay and Energy Consumption Oriented UAV Inspection Business Collaboration Computing Mechanism in Edge Computing Based Electric Power IoT16
Mode Purity Improvement of High‐Order Vortex Waves15
Rating Prediction Model Based on Causal Inference Debiasing Method in Recommendation15
A Comprehensive Study on the Theory of Graphene Solution‐Gated Field Effect Transistor: Simulations and Experiments15
A Software Safety Requirements Elicitation Approach Based on Hazardous Control Action Tree Modelling15
Frame Synchronization Method Based on Association Rules for CNAV-2 Messages15
High Power 170 GHz Frequency Doubler Based on GaAs Schottky Diodes15
Hyperspectral Image Classification Based on A Multi‐Scale Weighted Kernel Network14
A Review of Intelligent Configuration and Its Security for Complex Networks14
Time‐Resolved Spectroscopy for the Study of Perovskite14
FMR-GNet: Forward Mix-Hop Spatial-Temporal Residual Graph Network for 3D Pose Estimation14
Sensing Matrix Optimization for Random Stepped-Frequency Signal Based on Two-Dimensional Ambiguity Function13
Optimized Design of Multi-Layer Absorber for Human Tissue Surface13
Keyword Extraction from Scientific Research Projects Based on SRP‐TF‐IDF13
Hypersonic Vehicle Trajectory Prediction Algorithm Based on Hough Transform12
Online Video Popularity Regression Prediction Model with Multichannel Dynamic Scheduling Based on User Behavior12
Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization11
Timely Data Delivery for Energy‐Harvesting IoT Devices11
A Reframed Watermark Extraction Approach Using the ABC Algorithm11
Fine-Grained Cross-Modal Fusion Based Refinement for Text-to-Image Synthesis11
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks11
Sharper Hardy Uncertainty Relations on Signal Concentration in Terms of Linear Canonical Transform11
Dual Radial-Resonant Wide Beamwidth Circular Sector Microstrip Patch Antennas10
Phase Noise Effects on the Performance of High‐Order Digital Modulation Terahertz Communication System10
An Interactive Perception Method Based Collaborative Rating Prediction Algorithm10
A Low Complexity Distributed Multitarget Detection and Tracking Algorithm10
Convolutional Neural Networks of Whole Jujube Fruits Prediction Model Based on Multi-Spectral Imaging Method10
Teacher-Student Training Approach Using an Adaptive Gain Mask for LSTM-Based Speech Enhancement in the Airborne Noise Environment10
A Fine‐Grained Flash‐Memory Fragment Recognition Approach for Low‐Level Data Recovery9
Coupling Enhancement of THz Metamaterials Source with Parallel Multiple Beams9
CMOS Temperature Sensors: From Module Design to System Design9
Total Ionizing Dose Effect and Failure Mechanism of Digital Signal Processor9
STATE: A Clustering Algorithm Focusing on Edges Instead of Centers9
HRPose: Real-Time High-Resolution 6D Pose Estimation Network Using Knowledge Distillation9
Multi-Frequency-Ranging Positioning Algorithm for 5G OFDM Communication Systems9
Binary Sequences Derived from Dickson Permutation Polynomials over Binary Extension Field9
Joint Communication-Caching-Computing Resource Allocation for Bidirectional Data Computation in IRS-Assisted Hybrid UAV-Terrestrial Network9
Representation of Semantic Word Embeddings Based on SLDA and Word2vec Model9
Optical Space Time Pulse Position Modulation over Exponential Weibull Turbulence Channel8
A Risk Prediction Model Based on Crash History Data for Railway Trams8
A Single-Event-Transient Hardened Phase Locked Loop for Clock and Data Recovery8
Defects Recognition of Train Wheelset Tread Based on Improved Spiking Neural Network8
Word‐Based Method for Chinese Part‐of‐Speech via Parallel and Adversarial Network8
Study on Static Deflection Model of MEMS Capacitive Microwave Power Sensors8
Quaternion Quasi-Chebyshev Non-local Means for Color Image Denoising8
High‐Order Characteristic Modes Suppression for Cross‐Band Decoupling in Shared‐Aperture Antenna Array8
A Design and Comparative Investigation of Graded Al x Ga 1– x 8
Variance‐SNR Based Noise Suppression on Linear Canonical Choi‐Williams Distribution of LFM Signals8
A Novel Robust Online Extreme Learning Machine for the Non-Gaussian Noise8
Collaborative Service Provisioning for UAV-Assisted Mobile Edge Computing8
Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules8
Design of High Performance MXene/Oxide Structure Memristors for Image Recognition Applications7
Fast Cross-Platform Binary Code Similarity Detection Framework Based on CFGs Taking Advantage of NLP and Inductive GNN7
Multi-Scale Binocular Stereo Matching Based on Semantic Association7
LBA-EC: Load Balancing Algorithm Based on Weighted Bipartite Graph for Edge Computing7
Unsupervised Video Object Segmentation via Weak User Interaction and Temporal Modulation7
A Novel Wideband Wilkinson Pulse Combiner with Enhanced Low Frequency Isolation7
Towards Order-Preserving and Zero-Copy Communication on Shared Memory for Large Scale Simulation7
Rating Text Classification with Weighted Negative Supervision on Classifier Layer7
An Adaptive Interactive Multiple-Model Algorithm Based on End-to-End Learning7
Friendship Inference Based on Interest Trajectory Similarity and Co-Occurrence7
Automatic Spectral Method of Mesh Segmentation Based on Fiedler Residual7
Semi‐supervised Robust Feature Selection with ℓq‐Norm Graph for Multiclass Classification7
Survey on Fake Information Generation, Dissemination and Detection6
A 220 GHz Orthogonal Modulator Based on Subharmonic Mixers Using Anti‐Paralleled Schottky Diodes6
Blind Signal Reception in Downlink Generalized Spatial Modulation Multiuser MIMO System Based on Minimum Output Energy6
Technique for Recovering Wavefront Phase Bad Points by Deep Learning6
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network6
Utility Preserved Facial Image De‐identification Using Appearance Subspace Decomposition6
Unsupervised Cross‐Media Hashing Learning via Knowledge Graph6
A Tightly Coupled Dipole Array with Diverse Element Reflection Phases for RCS Reduction6
Characteristic Mode Design of Dual‐Band Reconfigurable Frequency Selective Surface6
A Review of Terahertz Sources Based on Planar Schottky Diodes6
Microwave Tomographic Imaging of Anatomically Realistic Numerical Phantoms with Debye Dispersion for Breast Cancer Detection Using a Regularized Inverse Scattering Technique in the Time Domain6
Vibration Signal-Based Fault Diagnosis of Railway Point Machines via Double-Scale CNN6
RESS: A Reliable and Effcient Storage Scheme for Bitcoin Blockchain Based on Raptor Code6
Efficient and Explicit Fourier Modal Method for Ultrathin Metallic Gratings6
Chaotic Signal Denoising Algorithm Based on Self‐Similarity6
Sitting or Standing Data Acquisition Based Breast Ultrasound Computed Tomography6
Enhancing Entity Relationship Extraction in Dialogue Texts Using Hypergraph and Heterogeneous Graph6
Real-Time 3D Ultrasound Imaging System Based on a Hybrid Reconstruction Algorithm6
A Deep Deterministic Policy Gradient-Based Method for Enforcing Service Fault-Tolerance in MEC6
Detection and Classification of Small Traffic Signs Based on Cascade Network6
Objective Information Theory Exemplified in Air Traffic Control System6
A Bus Planning Algorithm for FPC Design in Complex Scenarios6
Characteristic Mode Analysis for Pattern Diversity and Beamforming: A Survey5
5
Realization of Complete Boolean Logic and Combinational Logic Functionalities on a Memristor-Based Universal Logic Circuit5
A Local Differential Privacy Hybrid Data Clustering Iterative Algorithm for Edge Computing5
A Directly Readable Halftone Multifunctional Color QR Code5
FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning5
Research on Health Stage Division of Switch Machine Based on Bray-Curtis Distance and Fisher Optimal Segmentation Method5
Analysis of Capacitance Characteristics of Light-Controlled Electrostatic Conversion Device5
Wideband Millimeter Wave Antenna with Cavity Backed Slotted Patch and Magneto-Electric Dipole5
Vibration-Based Fault Diagnosis for Railway Point Machines Using VMD and Multiscale Fluctuation-Based Dispersion Entropy5
Joint Spectrum Sensing and Spectrum Access for Defending Massive SSDF Attacks: A Novel Defense Framework5
Differential Fault Attack on the Stream Cipher LIZARD5
New Secondary Constructions of Generalized Bent Functions5
An Improved Navigation Pseudolite Signal Structure Based on the Kasami Sequences and the Pulsing Scheme5
A Microstrip Leaky-Wave Antenna with Scanning Beams Horizontal to the Antenna Plane5
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps5
Adaptive Simplified Chicken Swarm Optimization Based on Inverted S‐Shaped Inertia Weight5
MADRL-Based 3D Deployment and User Association of Cooperative mmWave Aerial Base Stations for Capacity Enhancement5
An Edge‐Cloud Collaborative Cross‐Domain Identity‐Based Authentication Protocol with Privacy Protection4
Troy: Efficient Service Deployment for Windows Systems4
An Parallel FPGA SAT Solver Based on Multi‐Thread and Pipeline4
Marginal Attacks of Generating Adversarial Examples for Spam Filtering4
On the Linear Complexity of a Class of Periodic Sequences Derived from Euler Quotients4
Radiation Principle and Spatial Direct Modulation Method of a Low Frequency Antenna Based on Rotating Permanent Magnet4
Smoothing Neural Network for Non‐Lipschitz Optimization with Linear Inequality Constraints4
IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence4
A Security Defense Method Against Eavesdroppers in the Communication-Based Train Control System4
A Helmet Detection Algorithm Based on Transformers with Deformable Attention Module4
Ultra‐thin Body Buried In 0.35 Ga 0.65 As Channel MOSFETs with Extremely Low Off‐current on Si Substrates4
YOLO-Drone: A Scale-Aware Detector for Drone Vision4
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain4
A Simple BCH Decoder for NoC Interconnects and SoC Buses4
Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge Computing4
Semantic Comprehension Method for Chinese Sentences Based on Minimal Semantic Structures and Its Application4
A Novel Neighborhood‐Weighted Sampling Method for Imbalanced Datasets4
A Fine-Grained Object Detection Model for Aerial Images Based on YOLOv5 Deep Neural Network4
DeepHGNN: A Novel Deep Hypergraph Neural Network4
A Design of 2-Stage Voltage Ramp-Up SRAM Physical Unclonable Function4
Secure Cloud Architecture for 5G Core Network4
A Novel Construction of Updatable Identity-Based Hash Proof System and Its Applications4
Video‐Driven 2D Character Animation4
A Survey: FPGA‐Based Dynamic Scheduling of Hardware Tasks4
Global Ramp Uniformity Correction Method for Super-Large Array CMOS Image Sensors4
0.078020095825195