Submit & Review

Published in

Chinese Journal of Electronics

Volume 33, Issue 3

05 May, 2024

Survey on Fake Information Generation, Dissemination and Detection
CUI Wanqiu, WANG Dawei, HAN Na
2024, 33(3): 573-583.   doi: 10.23919/cje.2022.00.362
Abstract(181) HTML(91) PDF(27)
Review of GAN-Based Research on Chinese Character Font Generation
WANG Xuanhong, LI Cong, SUN Zengguo, et al.
2024, 33(3): 584-600.   doi: 10.23919/cje.2022.00.402
Abstract(742) HTML(370) PDF(87)
A Survey on Graph Neural Network Acceleration: A Hardware Perspective
CHEN Shi, LIU Jingyu, SHEN Li
2024, 33(3): 601-622.   doi: 10.23919/cje.2023.00.135
Abstract(349) HTML(174) PDF(56)
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
WANG Yichuan, GAO Wen, HEI Xinhong, et al.
2024, 33(3): 623-634.   doi: 10.23919/cje.2022.00.196
Abstract(328) HTML(159) PDF(19)
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
QIAO Wenxiao, SUN Siwei, HU Lei
2024, 33(3): 635-644.   doi: 10.23919/cje.2023.00.127
Abstract(257) HTML(129) PDF(52)
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
NIU Zequn, XUE Jingfeng, WANG Yong, et al.
2024, 33(3): 645-656.   doi: 10.23919/cje.2022.00.360
Abstract(202) HTML(102) PDF(26)
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
WANG Hao, WANG Jinwei, HU Xuelong, et al.
2024, 33(3): 657-671.   doi: 10.23919/cje.2022.00.179
Abstract(284) HTML(141) PDF(35)
Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
2024, 33(3): 672-682.   doi: 10.23919/cje.2022.00.419
Abstract(288) HTML(146) PDF(27)

Review Articles