Skip navigation

Items where Greenwich Author is "Ma, Dr Jixin"

Items where Greenwich Author is "Ma, Dr Jixin"

Up a level
Export as [feed] RSS
Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: Artificial intelligence, AI, Frame Problem, Set Operations | Bayesian networks, structure learning, mutual information, genetic algorithm | Business Process Modeling techniques, Ontology, Ontology mapping, Temporal Logic, Semantics | Decision Support System, Fuzzy Reasoning | Dividing Instant (DI), temporal model | Encrypted medical images, zero-watermarking, DTCWT, perceptual hash, chaotic map | General Similarity Measurement, (GSM), temporal order, temporal duration, temporal gap | Harris-SURF-DCT; chaotic map; medical images | Hybrid-key, Ergodic matrix, Image encryption, Statistical analysis, Diffusion | Hyperchaos, Internet of medical things, medical volume data, robust watermark, 3DDTCWT-DCT | Machine Learning, Clinical Decision Support System | Marine Communication, Delay Tolerance, Wireless Network | Medical image, Contourlet-DCT, Zero watermarking, Robust | Multi-authority, cloud computing, searchable encryption, attribute-based encryption, fuzzy identity | Supply Chain, e-Pedigree, Multiparty Security, Anti-counterfeiting, Differential Privacy, Temporal Relation | Temporal Theory, Fuzzy Logic, Clinic Decision Support System | Vehicle Re-ID; multi-spectral representation; cross-directional center consistency; layer normalization; benchmark dataset | algorithm, temporal pattern recognition, basketball zone-defense | artificial intelligence (incl. Robotics), mathematical logic and formal languages, computer applications in administrative data processing, computer applications in social and behavioral sciences, operations research/decision theory | artificial intelligence, data mining, knowledge discovery, rheumatic fever, arthritis pain, temporal logic, fuzzy logic, fuzzy rules, knowledge-based, fuzzy inference, defuziffication | artificial intelligence, robotics, data mining, knowledge discovery | artificial intelligence, robotics, mathematical logic and formal languages, computation by abstract devices, algorithm analysis and problem complexity, image processing and computer vision, database management | attribute based signature, anonymous authentication, outsourcing computation, access control. | attribute-based signature; multi-authority; IoT authentication; proof of knowledge; aggregated anonymous key issue; Blakley secret sharing | bisectional multivariate quadratic equation, counterfeit, cryptography, ergodic matrix, RFID | blind watermarking scheme; entropy-based support vector machine; optimized quantum genetic algorithm | blockchain; information sharing; government; cross-chain | brain-computer interface (BCI), electroencephalography (EEG), event-related potential (ERP), P300 speller (P3), distractions, taxonomy | business process, action, event, model, temporal representation | case based reasoning, business workflows, temporal reasoning, graph similarity | case history patterns, case-based reasoning systems | case-base reasoning, business workflows, temporal reasoning, graph similarity, explanation | cloud storage auditing, proxy update, revoked proxy, expired proxy | cloud storage, data integrity auditing, data security, biometric data | completeness, reified temporal logic | computer software, bionics, programming, time representation, | copyright protection; voiceprint recognition model; watermarking; blockchain; black-box; Mel spectrogram | data sharing; key-aggregate; conjunctive keyword query; standard model | derivation, explanation, temporal reasoning | differential privacy, statistical databases, data mining, utility, big data | distance learning; elastic cross-modal audio-visual matching; cross-modality; audio-visual matching; elastic multi-way matching; distance learning | ergodic matrix, bisectional, multivariate quadratic, fixing variables, NP-hard, complexity theory, Galois fields, polynomials, public key cryptography | feature extraction, graphical representation, structure relationship, video clip detection, basketball zone-defense | finite field, linear equation, gaussian elimination | general temporal constraint (GTC), general time theory, causal relationship | graph matching, node-similarity | graph ranking, boundary connectivity, background possibility, foreground possibility, multiple layer | henon map, multi-watermarking, DTCWT-DCT, robustness | hybrid-key, ergodic matrix, symmetric, asymmetric, entropy, diffusion | identification, individual identity, mathematical representations | information hiding technology, copyright enforcement scheme | information systems, business productivity | keyword search; data verifiability; AVL tree | knowledge bases, process control | knowledge representation, computational intelligence | logical formalism, reification, temporal logic | logical formalism, reification, temporal logic, reified temporal logic (RTL) | medical images; zero watermarking algorithm; Zernike-DCT | medical text classification | membership function, input/output, parameter, fuzzy rules, rheumatic fever | methodology, event models | multivariate quadratic, finite field, relinearization, cryptanalysis, public key cryptosystems | ontological classification, time elements, meta-predicates, temporal propositions | ontology, time-series, data mining, state-sequence | pattern recognition, time-series, state-sequence matching | person re-identification, manifold ranking, local maximal occurrence, weighted descriptor | points, intervals, relative temporal knowledge, transaction time, valid time | process algebra, temporal logic, temporal reasoning, calculus, delay effects, ontologies, pressing | processes/events, knowledge-based systems, relative time, temporal databases | public verifiability, confidentiality-preserving public verifiable computation (CPPVC), multivariate polynomial evaluation, matrix-vector multiplication | reasoning, uncertain knowledge, incomplete temporal knowledge | rheumatic fever, arthritis pain, temporal logic, fuzzy logic, fuzzy rules, knowledge-based, fuzzy inference, defuziffication | searchable encryption; bloom filter; hierarchical clustering; TF-IDF; multi-keyword ranked; wildcard keyword | selective data sharing; key-aggregate searchable encryption; KGA; multi-owner; verifiable | software metrics, vector machines, software quality, regression, software quality prediction | state sequences | state-based systems, temporal reasoning, time-series analysis and prediction | state-sequence matching, optimal temporal common subsequence, news video retrieval | structural similarity, knowledge class diagrams, artificial intelligence, robotics, data mining, knowledge discovery | temporal knowledge, legal discourse, absolute temporal knowledge, relative temporal knowledge, legal text | temporal knowledge, uncertainty, incompleteness, cognition, computers, finite element methods, knowledge based systems, sufficient conditions | temporal logic, reified temporal logic, semantics, syntax | temporal ontology, time intervals, time points | temporal representation, state transitions, industrial real-time systems | time modelling, temporal modelling, temporal relationships, time model | time theory, time-series, state-sequences, subsequence matching, similarity model | time, common universal reference, knowledge-based systems, temporal information | time, time structure, treatment of intervals, temporal ontology | video annotation system, clips organization, feature description, pattern determination, basketball zone-defence detection, simulation | wireless sensor networks, cloud computing, Internet of Things, public key encryption with keyword search, off-line keyword guessing attack, on-line keyword guessing attack
Number of items: 91.

Artificial intelligence, AI, Frame Problem, Set Operations

Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.

Bayesian networks, structure learning, mutual information, genetic algorithm

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

Business Process Modeling techniques, Ontology, Ontology mapping, Temporal Logic, Semantics

Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)

Decision Support System, Fuzzy Reasoning

Ma, Jixin, Pandey, Sanjib Raj and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of decision support system for the diagnosis of arthritis pain for rheumatic fever patients: Based on the fuzzy approach. Journal of Algorithms and Computational Technology, 9 (3). pp. 265-290. ISSN 1748-3018 (Print), 1748-3026 (Online) (doi:https://doi.org/10.1260/1748-3018.9.3.265)

Dividing Instant (DI), temporal model

Ma, Jixin and Knight, Brian (2003) Representing the dividing instant. The Computer Journal, 46 (2). pp. 213-222. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/46.2.213)

Encrypted medical images, zero-watermarking, DTCWT, perceptual hash, chaotic map

Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)

General Similarity Measurement, (GSM), temporal order, temporal duration, temporal gap

Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.

Harris-SURF-DCT; chaotic map; medical images

Gong, Cheng ORCID: 0000-0002-0666-2529 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Gong, Ming, Ma, Jixin ORCID: 0000-0001-7458-7412 , Huang, Mengxing and Xue, Xingsi (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map. Security and Communication Networks, 2021:3084153. pp. 1-13. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/3084153)

Hybrid-key, Ergodic matrix, Image encryption, Statistical analysis, Diffusion

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

Hyperchaos, Internet of medical things, medical volume data, robust watermark, 3DDTCWT-DCT

Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)

Machine Learning, Clinical Decision Support System

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2020) A supervised machine learning approach to generate the auto rule for clinical decision support system. Trends in Medicine, 20 (3). pp. 1-9. ISSN 1594-2848 (doi:https://doi.org/10.15761/TiM.1000232)

Marine Communication, Delay Tolerance, Wireless Network

Shi, Yao, Li, Hui, Du, Wen-Cai, Ma, Jixin and Li, Fa-Bin (2016) Modeling and performance analysis of marine DTN networks with Nodes-cluster in an ad hoc sub-net. In: 2016 International Conference on Computer Engineering and Information Systems (CEIS-16). Advances in Computer Science Research, 52 . Atlantis Press, pp. 182-187. ISBN 978-94-6252-283-1 ISSN 2352-538X (doi:https://doi.org/10.2991/ceis-16.2016.36)

Medical image, Contourlet-DCT, Zero watermarking, Robust

Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)

Multi-authority, cloud computing, searchable encryption, attribute-based encryption, fuzzy identity

Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)

Supply Chain, e-Pedigree, Multiparty Security, Anti-counterfeiting, Differential Privacy, Temporal Relation

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

Temporal Theory, Fuzzy Logic, Clinic Decision Support System

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of temporal logic-based fuzzy decision support system for diagnosis of acute rheumatic fever/rheumatic heart disease. In: Research and Development in Intelligent Systems. Springer International Publishing Switzerland 2015, XXXII . Springer, Cham, Switzerland, pp. 213-228. ISBN 978-3-319-25030-4 ISSN 978-3-319-25032-8 (Online) (doi:https://doi.org/10.1007/978-3-319-25032-8_17)

Vehicle Re-ID; multi-spectral representation; cross-directional center consistency; layer normalization; benchmark dataset

Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)

algorithm, temporal pattern recognition, basketball zone-defense

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, Miltos, Zhai, Sulan and Tang, Jin (2009) Temporal pattern recognition in video clips detection. In: Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009). Computer Society Press, Los Alamitos, CA, USA, pp. 416-421. ISBN 9780769536415 (doi:https://doi.org/10.1109/ICIS.2009.144)

artificial intelligence (incl. Robotics), mathematical logic and formal languages, computer applications in administrative data processing, computer applications in social and behavioral sciences, operations research/decision theory

Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)

artificial intelligence, data mining, knowledge discovery, rheumatic fever, arthritis pain, temporal logic, fuzzy logic, fuzzy rules, knowledge-based, fuzzy inference, defuziffication

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

artificial intelligence, robotics, data mining, knowledge discovery

Ma, J., Petridis, M. and Knight, B. (2013) Formulating the temporal causal relationships between events and their results. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Cham, Switzerland, pp. 199-210. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_14)

artificial intelligence, robotics, mathematical logic and formal languages, computation by abstract devices, algorithm analysis and problem complexity, image processing and computer vision, database management

Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)

attribute based signature, anonymous authentication, outsourcing computation, access control.

Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)

attribute-based signature; multi-authority; IoT authentication; proof of knowledge; aggregated anonymous key issue; Blakley secret sharing

Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)

bisectional multivariate quadratic equation, counterfeit, cryptography, ergodic matrix, RFID

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

blind watermarking scheme; entropy-based support vector machine; optimized quantum genetic algorithm

Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)

blockchain; information sharing; government; cross-chain

Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)

brain-computer interface (BCI), electroencephalography (EEG), event-related potential (ERP), P300 speller (P3), distractions, taxonomy

Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)

business process, action, event, model, temporal representation

Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)

case based reasoning, business workflows, temporal reasoning, graph similarity

Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)

case history patterns, case-based reasoning systems

Zhao, Guoxing, Luo, Bin and Ma, Jixin (2006) Matching case history patterns in case-based reasoning. In: Huang, De-Shuang, Li, Kang and Irwin, G.W., (eds.) Intelligent computing in signal processing and pattern recognition: International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Lecture notes in control and information sciences, 345 (345). Springer Verlag, Berlin, pp. 312-321. ISBN 9783540372578 ISSN 0170-8643 (doi:https://doi.org/10.1007/978-3-540-37258-5_32)

case-base reasoning, business workflows, temporal reasoning, graph similarity, explanation

Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)

cloud storage auditing, proxy update, revoked proxy, expired proxy

Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)

cloud storage, data integrity auditing, data security, biometric data

Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)

completeness, reified temporal logic

Zhao, Guoxing, Ma, Jixin, Shen, Fuxing and Petridis, Miltos (2008) A sound and complete reified temporal logic. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 111-116. ISBN 978-0-7695-3263-9 (doi:https://doi.org/10.1109/SNPD.2008.16)

computer software, bionics, programming, time representation,

Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.

copyright protection; voiceprint recognition model; watermarking; blockchain; black-box; Mel spectrogram

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

data sharing; key-aggregate; conjunctive keyword query; standard model

Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)

derivation, explanation, temporal reasoning

Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Deriving explanations from partial temporal information. In: Proceedings of the Third International Workshop on Explanation-aware Computing (ExaCt-2008), Patras, Greece, July 21-22, 2008. CEUR-WS.org (391). CEUR Workshop Proceedings (CEUR-WS.org), Aachen, Germany. ISBN 9789606843037 ISSN 1613-0073

differential privacy, statistical databases, data mining, utility, big data

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

distance learning; elastic cross-modal audio-visual matching; cross-modality; audio-visual matching; elastic multi-way matching; distance learning

Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)

ergodic matrix, bisectional, multivariate quadratic, fixing variables, NP-hard, complexity theory, Galois fields, polynomials, public key cryptography

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

feature extraction, graphical representation, structure relationship, video clip detection, basketball zone-defense

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038

finite field, linear equation, gaussian elimination

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

general temporal constraint (GTC), general time theory, causal relationship

Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Characterizing the most general temporal constraint. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece. (Unpublished)

graph matching, node-similarity

Zhao, Guoxing, Petridis, Miltos, Sidorov, Grigori and Ma, Jixin (2008) A critical examination of node-similarity based graph matching algorithms. Research In Computing Science, 40. pp. 73-82. ISSN 1870-4069

graph ranking, boundary connectivity, background possibility, foreground possibility, multiple layer

Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)

henon map, multi-watermarking, DTCWT-DCT, robustness

Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)

hybrid-key, ergodic matrix, symmetric, asymmetric, entropy, diffusion

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

identification, individual identity, mathematical representations

Nissan, Ephraim and Ma, Jixin (2003) Identification and doing without it, V: A formal mathematical analysis for a case of mix-up of individuals, and of recovery from failure to attain identification. Cybernetics and Systems: An International Journal, 34 (6-7). pp. 531-549. ISSN 0196-9722 (Print), 1087-6553 (Online) (doi:https://doi.org/10.1080/01969720302858)

information hiding technology, copyright enforcement scheme

Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)

information systems, business productivity

Ma, Jixin (2004) Temporal Representation and Reasoning in Information Systems. In: Proceedings of the Eighth Pacific Asia Conference on Information Systems. Electronic Commerce Research Center, China, pp. 15-16.

keyword search; data verifiability; AVL tree

Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)

knowledge bases, process control

Ma, Jixin and Knight, Brian (1996) Building temporal constraints into knowledge bases for process control: an examination [Reply to author's reply]. Engineering Applications of Artificial Intelligence, 9 (1). pp. 95-96. ISSN 0952-1976 (doi:https://doi.org/10.1016/0952-1976(95)00065-8)

knowledge representation, computational intelligence

Ma, Jixin and Knight, Brian (2006) Using set operations to deal with the frame problem. In: Yao, Yiyu, (ed.) Proceedings of the Fifth IEEE International Conference on Cognitive Informatics. IEEE Computer Society, Los Alamitos, CA, USA, pp. 447-452. ISBN 1424404754 (doi:https://doi.org/10.1109/COGINF.2006.365530)

logical formalism, reification, temporal logic

Ma, J. and Knight, B. (2001) Reified temporal logics: an overview. Artificial Intelligence Review, 15 (3). pp. 189-217. ISSN 0269-2821 (Print), 1573-7462 (Online) (doi:https://doi.org/10.1023/A:1011018426725)

logical formalism, reification, temporal logic, reified temporal logic (RTL)

Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)

medical images; zero watermarking algorithm; Zernike-DCT

Yang, Chengshan ORCID: 0000-0003-1926-8798 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Liu, Jing, Ma, Jixin, Huang, Mengxing and Xue, Xingsi (2021) Robust zero watermarking algorithm for medical images based on Zernike-DCT. Security and Communication Networks, 2021:4944797. pp. 1-8. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/4944797)

medical text classification

Liang, Shengbin, Chen, Xinan ORCID: 0000-0001-7641-3897 , Ma, Jixin ORCID: 0000-0001-7458-7412 , Du, Wencai ORCID: 0000-0003-0428-0057 , Ma, Huawei ORCID: 0000-0002-7432-5583 and Li, Xingwang (2021) An improved double channel long short-term memory model for medical text classification. Journal of Healthcare Engineering, 2021:6664893. pp. 1-8. ISSN 2040-2295 (Print), 2040-2309 (Online) (doi:https://doi.org/10.1155/2021/6664893)

membership function, input/output, parameter, fuzzy rules, rheumatic fever

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)

methodology, event models

Jin, Xin, Xu, Anbang, Zhao, Guoxing, Ma, Jixin and Bie, Rongfang (2006) Event models for tumor classification with SAGE gene expression data. Lecture Notes in Computer Science, 3992. pp. 775-782. ISSN 0302-9743 (doi:https://doi.org/10.1007/11758525_104)

multivariate quadratic, finite field, relinearization, cryptanalysis, public key cryptosystems

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

ontological classification, time elements, meta-predicates, temporal propositions

Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838

ontology, time-series, data mining, state-sequence

Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)

pattern recognition, time-series, state-sequence matching

Zheng, Aihua, Ma, Jixin, Petridis, M. and Xiao, Bai (2010) Order, duration and gap - take them all. In: Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 647-651. ISBN 9781424455386 (doi:https://doi.org/10.1109/ICCSIT.2010.5564860)

person re-identification, manifold ranking, local maximal occurrence, weighted descriptor

Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)

points, intervals, relative temporal knowledge, transaction time, valid time

Ma, J., Knight, B. and Ibrahim, M. (1996) A qualitative temporal information system for process control. Advances in Engineering Software, 25 (2-3). pp. 235-241. ISSN 0965-9978 (doi:https://doi.org/10.1016/0965-9978(95)00090-9)

process algebra, temporal logic, temporal reasoning, calculus, delay effects, ontologies, pressing

Ma, J., Knight, B. and Peng, T. (1997) Representing temporal relationships between events and their effects. In: Proceedings: Fourth International Workshop on Temporal Representation and Reasoning. IEEE Computer Society Press, Los Alamitos, California, USA, pp. 148-152. ISBN 0818679379 (doi:https://doi.org/10.1109/TIME.1997.600796)

processes/events, knowledge-based systems, relative time, temporal databases

Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)

public verifiability, confidentiality-preserving public verifiable computation (CPPVC), multivariate polynomial evaluation, matrix-vector multiplication

Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)

reasoning, uncertain knowledge, incomplete temporal knowledge

Ma, Jixin, Zheng, Aihua, Knight, Brian, Petridis, Miltos and Luo, Bin (2009) Reasoning about uncertain and incomplete temporal knowledge. In: International Conference on Artificial Intelligence and Pattern Recognition 2009 (AIPR- 2009). Curran Associates, Inc., Red Hook, NY, USA, pp. 49-55. ISBN 978-1615676576

rheumatic fever, arthritis pain, temporal logic, fuzzy logic, fuzzy rules, knowledge-based, fuzzy inference, defuziffication

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

searchable encryption; bloom filter; hierarchical clustering; TF-IDF; multi-keyword ranked; wildcard keyword

Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)

selective data sharing; key-aggregate searchable encryption; KGA; multi-owner; verifiable

Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)

software metrics, vector machines, software quality, regression, software quality prediction

Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)

state sequences

Ma, Jixin, Zheng, Aihua, Bie, R., Peridis, M., Zhai, S. and Luo, B. (2009) State-sequence based pattern recognition in basketball zone-defense strategies. Journal of Electronics and Computer Science, 11 (1). pp. 35-44. ISSN 1229-425X

state-based systems, temporal reasoning, time-series analysis and prediction

Ma, Jixin (2008) A framework for state-based time-series analysis and prediction. International Journal of Computer & Information Science, 9 (1). pp. 21-28. ISSN 1525-9293

state-sequence matching, optimal temporal common subsequence, news video retrieval

Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)

Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)

structural similarity, knowledge class diagrams, artificial intelligence, robotics, data mining, knowledge discovery

Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)

temporal knowledge, legal discourse, absolute temporal knowledge, relative temporal knowledge, legal text

Knight, B., Ma, J. and Nissan, E. (1998) Representing temporal knowledge in legal discourse. Information & Communications Technology Law, 7 (3). pp. 199-211. ISSN 1360-0834 (Print), 1469-8404 (Online) (doi:https://doi.org/10.1080/13600834.1998.9965791)

temporal knowledge, uncertainty, incompleteness, cognition, computers, finite element methods, knowledge based systems, sufficient conditions

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

temporal logic, reified temporal logic, semantics, syntax

Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.

temporal ontology, time intervals, time points

Ma, Jixin and Hayes, Pat (2005) Addressing time intervals. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05) [Proceedings]. International Joint Conferences on Artificial Intelligence, Edinburgh, UK, pp. 29-38.

temporal representation, state transitions, industrial real-time systems

Ma, Jixin, Knight, Brian and Nissan, Ephraim (1999) Temporal representation of state transitions. AI EDAM, 13 (2). pp. 67-78. ISSN 0890-0604 (Print), 1469-1760 (Online) (doi:https://doi.org/10.1017/S0890060499132025)

time modelling, temporal modelling, temporal relationships, time model

Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069

time theory, time-series, state-sequences, subsequence matching, similarity model

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)

time, common universal reference, knowledge-based systems, temporal information

Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)

time, time structure, treatment of intervals, temporal ontology

Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)

video annotation system, clips organization, feature description, pattern determination, basketball zone-defence detection, simulation

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)

wireless sensor networks, cloud computing, Internet of Things, public key encryption with keyword search, off-line keyword guessing attack, on-line keyword guessing attack

Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)

This list was generated on Fri Apr 19 14:15:36 2024 UTC.