Chinese Journal of Electronics

Papers
(The median citation count of Chinese Journal of Electronics is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Efficient and Explicit Fourier Modal Method for Ultrathin Metallic Gratings77
Characteristic Mode Analysis for Thin Dielectric Sheets with Alternative Surface Integral Equation57
Quantum Differential Collision Distinguishing Attacks on Feistel Schemes39
Probe Machine Based Computing Model for Maximum Clique Problem33
29
Learning to Combine Answer Boundary Detection and Answer Re‐ranking for Phrase‐Indexed Question Answering25
Issue Information23
A Layout Method of Space-Based Pseudolite System Based on GDOP Geometry21
Issue Information21
High Power 170 GHz Frequency Doubler Based on GaAs Schottky Diodes19
Modeling and Measurement of 3D Solenoid Inductor Based on Through-Silicon Vias19
Trusted Network Evaluation Model Based on Comprehensive Trust18
Link Prediction Method Fusion with Local Structural Entropy for Directed Network17
A Bus Planning Algorithm for FPC Design in Complex Scenarios17
A Multi-Channel CMOS Analog Front-End Interface IC with 157.8 dB Current Detection Dynamic Range17
Fast Fading Channel Estimation for OFDM Systems with Complexity Reduction16
Recursive Feature Elimination Based Feature Selection in Modulation Classification for MIMO Systems15
Real-Time 3D Ultrasound Imaging System Based on a Hybrid Reconstruction Algorithm15
An Effective Power Optimization Approach Based on Whale Optimization Algorithm with Two-Populations and Mutation Strategies15
Predicting the Power Spectrum of Amplified OFDM Signals Using Higher‐Order Intercept Points15
A Wideband High-Gain Sawtooth Slot Array Antenna with Frequency-Scanning at Lower Frequency and Fixed-Beam at Higher Frequency15
The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation14
A Hybrid Entropy and Blockchain Approach for Network Security Defense in SDN-Based IIoT14
Survey on Fake Information Generation, Dissemination and Detection14
13
Improved Cross-Corpus Speech Emotion Recognition Using Deep Local Domain Adaptation12
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model12
A Review of Terahertz Sources Based on Planar Schottky Diodes12
Characteristic Mode Analysis: Application to Electromagnetic Radiation, Scattering, and Coupling Problems12
On-Chip Reconfigurable Microwave Photonic Processor11
A 16‐bit, ±10‐V Input Range SAR ADC with a 5‐V Supply Voltage and Mixed‐Signal Nonlinearity Calibration11
Integrated Intelligent Electromagnetic Radiator Design for Future THz Communication: A Review11
A 1.8‐V 240‐MHz 2.19‐mW Four‐Stage CMOS OTA with a Segmenting Frequency Compensation Technique11
Combination for Conflicting Interval‐Valued Belief Structures with CSUI‐DST Method10
Rapid Path Extraction and Three‐Dimensional Roaming of the Virtual Endonasal Endoscope10
Sitting or Standing Data Acquisition Based Breast Ultrasound Computed Tomography10
Characteristic Mode Design of Dual‐Band Reconfigurable Frequency Selective Surface10
Chaotic Signal Denoising Algorithm Based on Self‐Similarity10
Non-uniform Compressive Sensing Imaging Based on Image Saliency10
Message Authentication Codes Against Related‐Key Attacks Under LPN and LWE9
Exploring Potential Barrier Estimation Mechanism Based on Quantum Dynamics Framework9
A Pairing‐Free Certificateless Signcryption Scheme for Vehicular Ad Hoc Networks9
Microwave Tomographic Imaging of Anatomically Realistic Numerical Phantoms with Debye Dispersion for Breast Cancer Detection Using a Regularized Inverse Scattering Technique in the Time Domain9
Predicting circRNA-Disease Associations by Using Multi-Biomolecular Networks Based on Variational Graph Auto-Encoder with Attention Mechanism9
Enhancing Entity Relationship Extraction in Dialogue Texts Using Hypergraph and Heterogeneous Graph9
Real‐World Wireless Network Modeling and Optimization: From Model/Data‐Driven Perspective9
A 220 GHz Orthogonal Modulator Based on Subharmonic Mixers Using Anti‐Paralleled Schottky Diodes9
Multi-Sensor Fusion Adaptive Estimation for Nonlinear Under-Observed System with Multiplicative Noise8
Infrared and Visible Image Fusion Based on Blur Suppression Generative Adversarial Network8
Intracranial Epileptic Seizures Detection Based on an Optimized Neural Network Classifier8
Coherent Integration Algorithm for Frequency‐Agile and PRF‐Jittering Signals in Passive Localization8
Contents8
De-convolution and De-noising of SAR Based GPS Images Using Hybrid Particle Swarm Optimization8
Front Cover8
A Tightly Coupled Dipole Array with Diverse Element Reflection Phases for RCS Reduction8
Delay and Energy Consumption Oriented UAV Inspection Business Collaboration Computing Mechanism in Edge Computing Based Electric Power IoT8
Front Cover8
A Wideband Self‐Decoupled Microstrip Patch Antenna Array Using Characteristic Modes of Ground Plane8
Contents7
A General Authentication and Key Agreement Framework for Industrial Control System7
Extracting Integrated Features of Electronic Medical Records Big Data for Mortality and Phenotype Prediction7
Demand Learning and Cooperative Deployment of UAV Networks7
Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions7
Cellular V2X-Based Integrated Sensing and Communication System: Feasibility and Performance Analysis7
A Fast Startup Crystal Oscillator with Digital SAR-AFC Based Two-Step Injection7
Optimization on the Dynamic Train Coupling Process in High-Speed Railway7
DeepLogic: Priority Testing of Deep Learning Through Interpretable Logic Units7
A Note for Estimation About Average Differential Entropy of Continuous Bounded Space‐Time Random Field7
Characteristic Mode Analysis for Pattern Diversity and Beamforming: A Survey6
Miniaturized, Shared Electric and Magnetic Dipole, Pattern Diversity IoT Antenna for Sub-6 GHz Applications6
Research on Object Detection and Combination Clustering for Railway Switch Machine Gap Detection6
Antenna Selection Method for Distributed Dual-Function Radar Communication in MIMO System6
Contents6
An Accurate Near‐Field Distance Estimation Differential Algorithm6
Essential Protein Prediction Based on Shuffled Frog‐Leaping Algorithm6
Wideband Millimeter Wave Antenna with Cavity Backed Slotted Patch and Magneto-Electric Dipole6
Knowledge Graph Completion Method of Combining Structural Information with Semantic Information6
14-Bit SAR ADC with On-Chip Digital Bubble Sorting Calibration Technology6
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds6
Predicting Microbe‐Disease Association Based on Heterogeneous Network and Global Graph Feature Learning6
Ultralow Ohmic Contact in Recess-Free Ultrathin Barrier AlGaN/GaN Heterostructures Across a Wide Temperature Range6
Low Loss and Low EMI Noise Trench IGBT with Shallow Emitter Trench Controlled p-Type Dummy Region6
A CMOS 4‐Element Ku‐Band Phased‐Array Transceiver6
Realization of Complete Boolean Logic and Combinational Logic Functionalities on a Memristor-Based Universal Logic Circuit6
Comparative Analysis of Noise Margin Between Pure SET-SET and Hybrid SET-PMOS Inverters6
Non‐intrusive Load Monitoring Using Gramian Angular Field Color Encoding in Edge Computing6
Performance Analysis of Spatial Modulation Aided UAV Communication Systems in Cooperative Relay Networks6
Hybrid ITÖ Algorithm for Large-Scale Colored Traveling Salesman Problem6
A Novel Adaptive InSAR Phase Filtering Method Based on Complexity Factors6
Blind Signal Reception in Downlink Generalized Spatial Modulation Multiuser MIMO System Based on Minimum Output Energy5
Contents5
Visible Light Indoor Positioning System Based on Pisarenko Harmonic Decomposition and Neural Network5
Mode Purity Improvement of High‐Order Vortex Waves5
New Secondary Constructions of Generalized Bent Functions5
Editorial Board5
A Microstrip Leaky-Wave Antenna with Scanning Beams Horizontal to the Antenna Plane5
High-Efficiency Wideband Transmitarray Antenna Using Polarization-Rotating Elements with Parasitic Stubs5
Echo State Network Based on Improved Knowledge Distillation for Edge Intelligence5
Intelligent Orchestrating of IoT Microservices Based on Reinforcement Learning5
Issue Information5
5
Miniaturized, Wide Stopband Filter Based on Shielded Capacitively Loaded SIW Resonators5
Research on Health Stage Division of Switch Machine Based on Bray-Curtis Distance and Fisher Optimal Segmentation Method5
Time‐Resolved Spectroscopy for the Study of Perovskite5
Contents5
5
Collaborative Caching in Vehicular Edge Network Assisted by Cell-Free Massive MIMO5
Deep Contextual Representation Learning for Identifying Essential Proteins via Integrating Multisource Protein Features5
Keyword Extraction from Scientific Research Projects Based on SRP‐TF‐IDF4
A Lattice-Based Method for Recovering the Unknown Parameters of Truncated Multiple Recursive Generators with Constant4
Scheduling Pattern of Time Triggered Ethernet Based on Reinforcement Learning4
Just‐in‐Time Human Gesture Recognition Using WiFi Signals4
Deep Guided Attention Network for Joint Denoising and Demosaicing in Real Image4
A Review of Intelligent Configuration and Its Security for Complex Networks4
Contents4
Porn Streamer Recognition in Live Video Based on Multimodal Knowledge Distillation4
A Machine Learning Method for Differentiating and Predicting Human‐Infective Coronavirus Based on Physicochemical Features and Composition of the Spike Protein4
A Software Safety Requirements Elicitation Approach Based on Hazardous Control Action Tree Modelling4
FMR-GNet: Forward Mix-Hop Spatial-Temporal Residual Graph Network for 3D Pose Estimation4
Extraction Security of Sequential Aggregate Signatures4
Contents4
Frame Synchronization Method Based on Association Rules for CNAV-2 Messages4
Rating Prediction Model Based on Causal Inference Debiasing Method in Recommendation4
On UAV Serving Node Deployment for Temporary Coverage in Forest Environment: A Hierarchical Deep Reinforcement Learning Approach4
A Local Differential Privacy Hybrid Data Clustering Iterative Algorithm for Edge Computing4
Distribution of Reference Stations: Initial Explore on the Optimal Selection Strategy4
The Novel Instance Segmentation Method Based on Multi-Level Features and Joint Attention4
SwiftTheft: A Time-Efficient Model Extraction Attack Framework Against Cloud-Based Deep Neural Networks4
Analysis of Capacitance Characteristics of Light-Controlled Electrostatic Conversion Device4
A Combined Countermeasure Against Side-Channel and Fault Attack with Threshold Implementation Technique4
Joint Optimization Communication and Computing Resource for LEO Satellites with Edge Computing3
Hyperspectral Image Classification Based on A Multi‐Scale Weighted Kernel Network3
An Improved YOLOv7 Tiny Algorithm for Vehicle and Pedestrian Detection with Occlusion in Autonomous Driving3
An Intelligent Privacy Protection Scheme for Efficient Edge Computation Offloading in IoV3
Differential Analysis of ARX Block Ciphers Based on an Improved Genetic Algorithm3
A Directly Readable Halftone Multifunctional Color QR Code3
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps3
Linguistic Steganalysis via Fusing Multi-Granularity Attentional Text Features3
Joint Spectrum Sensing and Spectrum Access for Defending Massive SSDF Attacks: A Novel Defense Framework3
New Construction of Quadriphase Golay Complementary Pairs3
Research on Silicon‐Based Terahertz Communication Integrated Circuits3
A Quaternion Two‐Stream R‐CNN Network for Pixel‐Level Color Image Splicing Localization3
Knowledge Graph Completion Based on GCN of Multi‐Information Fusion and High‐Dimensional Structure Analysis Weight3
Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer3
Search Algorithm Based on Permutation Group by Quantum Walk on Hypergraphes3
Cryptanalysis of Full-Round Magpie Block Cipher3
A Semi-shared Hierarchical Joint Model for Sequence Labeling3
Self-Adaptive Discrete Cuckoo Search Algorithm for the Service Routing Problem with Time Windows and Stochastic Service Time3
IPFA-Net: Important Points Feature Aggregating Net for Point Cloud Classification and Segmentation3
Adaptive Simplified Chicken Swarm Optimization Based on Inverted S‐Shaped Inertia Weight3
A Dynamic Hysteresis Model of Piezoelectric Ceramic Actuators3
Stability Improvement for One Cycle Controlled Boost Converters Based on Energy Balance Principle3
Temporal Modal Analysis of Small Radiators3
An Improved Navigation Pseudolite Signal Structure Based on the Kasami Sequences and the Pulsing Scheme3
Enhancing Network Throughput via the Equal Interval Frame Aggregation Scheme for IEEE 802.11ax WLANs3
A Comprehensive Study on the Theory of Graphene Solution‐Gated Field Effect Transistor: Simulations and Experiments3
Vibration-Based Fault Diagnosis for Railway Point Machines Using VMD and Multiscale Fluctuation-Based Dispersion Entropy3
Rapid Phase Ambiguity Elimination Methods for DOA Estimator via Hybrid Massive MIMO Receive Array3
A Study of Epileptogenic Foci Localization Algorithm Based on Automatic Detection of Comprehensive Feature HFOs and RF-LR3
Linear Forgery Attacks on the Authenticated Encryption Cipher ACORN-Like3
FlowGANAnomaly: Flow-Based Anomaly Network Intrusion Detection with Adversarial Learning3
2
A CMA‐ES‐Based Adversarial Attack Against Black‐Box Object Detectors2
AttentionSplice: An Interpretable Multi‐Head Self‐Attention Based Hybrid Deep Learning Model in Splice Site Prediction2
Towards Evaluating the Robustness of Adversarial Attacks Against Image Scaling Transformation2
Color Context Binary Pattern Using Progressive Bit Correction for Image Classification2
Joint Transmit and Reflective Beamforming Design for Active IRS-Aided SWIPT Systems2
Fine-Grained Cross-Modal Fusion Based Refinement for Text-to-Image Synthesis2
Troy: Efficient Service Deployment for Windows Systems2
A Time-Area-Efficient and Compact ECSM Processor over GF (p)2
Targeted Adversarial Examples Generating Method Based on cVAE in Black Box Settings2
Adaptive Tensor Rank Approximation for Multi-View Subspace Clustering2
Convolutional Neural Networks of Whole Jujube Fruits Prediction Model Based on Multi-Spectral Imaging Method2
Differential Fault Attack on the Stream Cipher LIZARD2
Enhanced Acceleration for Generalized Nonconvex Low-Rank Matrix Learning2
Online Video Popularity Regression Prediction Model with Multichannel Dynamic Scheduling Based on User Behavior2
Fault Diagnosis for Railway Point Machines Using VMD Multi-Scale Permutation Entropy and ReliefF Based on Vibration Signals2
A Design of 2-Stage Voltage Ramp-Up SRAM Physical Unclonable Function2
A Novel Synchronization Method in Terahertz Large‐Scale Antenna Array System2
Weighted Linear Loss Large Margin Distribution Machine for Pattern Classification2
Labeled Multi‐Bernoulli Maneuvering Target Tracking Algorithm via TSK Iterative Regression Model2
Ultra‐thin Body Buried In 0.35 Ga 0.65 As Channel MOSFETs with Extremely Low Off‐current on Si Substrates2
Ergodic Capacity of NOMA-Based Overlay Cognitive Integrated Satellite-UAV-Terrestrial Networks2
A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution2
Marginal Attacks of Generating Adversarial Examples for Spam Filtering2
Prospects and Challenges of THz Precoding2
Energy-Efficient Driving Strategy for High-Speed Trains with Considering the Checkpoints2
Front Cover2
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks2
Secure Cloud Architecture for 5G Core Network2
Expression Complementary Disentanglement Network for Facial Expression Recognition2
The Squeeze & Excitation Normalization Based nnU-Net for Segmenting Head & Neck Tumors2
Joint Optimization of Trajectory and Task Offloading for Cellular-Connected Multi-UAV Mobile Edge Computing2
Geometrically Shaped 32QAM and Modified Binary Switching Coding Method in Underwater Visible Light Communication2
Design and Realization of Broadband Active Inductor Based Band Pass Filter2
Hypersonic Vehicle Trajectory Prediction Algorithm Based on Hough Transform2
Front Cover2
A Novel Blind Detection Algorithm Based on Spectrum Sharing and Coexistence for Machine-to-Machine Communication2
Editorial Board2
Rectangle Attack Against Type‐I Generalized Feistel Structures2
Design and Analysis of a 0.01‐to‐6GHz 31dBm‐ P 1dB 31.5%‐PAE Distributed Power Amplifier in 0.25‐µm GaAs Technology2
2
MADRL-Based 3D Deployment and User Association of Cooperative mmWave Aerial Base Stations for Capacity Enhancement2
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX2
Achieving Safe Deep Reinforcement Learning via Environment Comprehension Mechanism2
Unique Parameters Selection Strategy of Linear Canonical Wigner Distribution via Multiobjective Optimization Modeling2
A Helmet Detection Algorithm Based on Transformers with Deformable Attention Module2
Study on Coded Permutation Entropy of Finite Length Gaussian White Noise Time Series2
Optimized Design of Multi-Layer Absorber for Human Tissue Surface2
Backdoor Attacks on Image Classification Models in Deep Neural Networks2
An Improved Path Delay Variability Model via Multi-Level Fan-Out-of-4 Metric for Wide-Voltage-Range Digital CMOS Circuits2
DeepHGNN: A Novel Deep Hypergraph Neural Network2
W‐Band High‐Efficiency Waveguide Slot Array Antenna with Low Sidelobe Levels Based on Silicon Micromachining Technology2
Dispersed Computing Resource Discovery Model and Algorithm for Polymorphic Migration Network Architecture2
VLSI Design for High‐Precision Three‐Dimensional Depth Perception Chip2
A Beam-Steering Broadband Microstrip Antenna with High Isolation2
Designing Uncorrelated Multiple Antennas with Round Patterns Using Handset Metal Frames2
Principled Design of Translation, Scale, and Rotation Invariant Variation Operators for Metaheuristics1
Multiple Plasmonic Fano Resonances Revisited with Modified Transformation-Optics Theory1
Field‐Line‐Circuit Coupling Based Method for Predicting Radiated Electromagnetic Emission of IGBT‐PMSM Drive System1
Blockchain Meets Generative Behavior Steganography: A Novel Covert Communication Framework for Secure IoT Edge Computing1
Video Stabilization via Prediction with Time‐Series Network and Image Inpainting with Pyramid Fusion1
TAKAP: A Lightweight Three‐Party Authenticated Key Agreement Protocol with User Anonymity1
Teacher-Student Training Approach Using an Adaptive Gain Mask for LSTM-Based Speech Enhancement in the Airborne Noise Environment1
Contents1
Total Ionizing Dose Effect and Failure Mechanism of Digital Signal Processor1
A Unity‐Gain Buffer Assisted Noise‐Shaping SAR ADC Based on Error‐Feedback Structure1
An Algorithm of Deformation Image Correction Based on Spatial Mapping1
HRPose: Real-Time High-Resolution 6D Pose Estimation Network Using Knowledge Distillation1
Time Optimal Trajectory Planning Algorithm for Robotic Manipulator Based on Locally Chaotic Particle Swarm Optimization1
An Interactive Perception Method Based Collaborative Rating Prediction Algorithm1
Detecting Three‐Dimensional Associations in Large Data Set1
An Algorithm for Output Spectrum Analysis of Nonlinear System with Correlative Sources Based on Power Series1
Low‐Complexity Digital Equalizers for High‐Speed Underwater Optical Wireless Communication1
HiAtGang: How to Mine the Gangs Hidden Behind DDoS Attacks1
A Simple BCH Decoder for NoC Interconnects and SoC Buses1
Tongue Color Classification in TCM with Noisy Labels via Confident-Learning-Assisted Knowledge Distillation1
An Ultra-wideband Doubler Chain with 43–65 dBc Fundamental Rejection in Ku/K/Ka Band1
A Novel Neighborhood‐Weighted Sampling Method for Imbalanced Datasets1
Video‐Driven 2D Character Animation1
A Polarization Control Operator for Polarized Electromagnetic Wave Designing1
On the Linear Complexity of a Class of Periodic Sequences Derived from Euler Quotients1
A Survey: FPGA‐Based Dynamic Scheduling of Hardware Tasks1
Secret Sharing Schemes from Linear Codes over F2+vF2+v2F21
LaTLS: A Lattice‐Based TLS Proxy Protocol1
Smoothing Neural Network for Non‐Lipschitz Optimization with Linear Inequality Constraints1
Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation1
MalFSM: Feature Subset Selection Method for Malware Family Classification1
Distributed Cell-Free Massive MIMO Versus Cellular Massive MIMO Under UE Hardware Impairments1
A Model for Chinese Named Entity Recognition Based on Global Pointer and Adversarial Learning1
0.11505103111267