Submit & Review

Published in

Chinese Journal of Electronics

Volume 33, Issue 3

05 May, 2024

Survey on Fake Information Generation, Dissemination and Detection
CUI Wanqiu, WANG Dawei, HAN Na
2024, 33(3): 573-583.   doi: 10.23919/cje.2022.00.362
Abstract(61) HTML(31) PDF(11)
Review of GAN-Based Research on Chinese Character Font Generation
WANG Xuanhong, LI Cong, SUN Zengguo, et al.
2024, 33(3): 584-600.   doi: 10.23919/cje.2022.00.402
Abstract(657) HTML(328) PDF(76)
A Survey on Graph Neural Network Acceleration: A Hardware Perspective
CHEN Shi, LIU Jingyu, SHEN Li
2024, 33(3): 601-622.   doi: 10.23919/cje.2023.00.135
Abstract(282) HTML(140) PDF(45)
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
WANG Yichuan, GAO Wen, HEI Xinhong, et al.
2024, 33(3): 623-634.   doi: 10.23919/cje.2022.00.196
Abstract(241) HTML(116) PDF(10)
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
QIAO Wenxiao, SUN Siwei, HU Lei
2024, 33(3): 635-644.   doi: 10.23919/cje.2023.00.127
Abstract(222) HTML(111) PDF(47)
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
NIU Zequn, XUE Jingfeng, WANG Yong, et al.
2024, 33(3): 645-656.   doi: 10.23919/cje.2022.00.360
Abstract(176) HTML(90) PDF(24)
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
WANG Hao, WANG Jinwei, HU Xuelong, et al.
2024, 33(3): 657-671.   doi: 10.23919/cje.2022.00.179
Abstract(242) HTML(121) PDF(30)
Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
2024, 33(3): 672-682.   doi: 10.23919/cje.2022.00.419
Abstract(257) HTML(130) PDF(24)

Review Articles