Items where Greenwich Author is "Ma, Dr Jixin"
Up a level |
Artificial intelligence, AI, Frame Problem, Set Operations
Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.
Bayesian networks, structure learning, mutual information, genetic algorithm
Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)
Business Process Modeling techniques, Ontology, Ontology mapping, Temporal Logic, Semantics
Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)
Decision Support System, Fuzzy Reasoning
Ma, Jixin, Pandey, Sanjib Raj and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of decision support system for the diagnosis of arthritis pain for rheumatic fever patients: Based on the fuzzy approach. Journal of Algorithms and Computational Technology, 9 (3). pp. 265-290. ISSN 1748-3018 (Print), 1748-3026 (Online) (doi:https://doi.org/10.1260/1748-3018.9.3.265)
Dividing Instant (DI), temporal model
Ma, Jixin and Knight, Brian (2003) Representing the dividing instant. The Computer Journal, 46 (2). pp. 213-222. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/46.2.213)
Encrypted medical images, zero-watermarking, DTCWT, perceptual hash, chaotic map
Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)
General Similarity Measurement, (GSM), temporal order, temporal duration, temporal gap
Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.
Harris-SURF-DCT; chaotic map; medical images
Gong, Cheng ORCID: 0000-0002-0666-2529 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Gong, Ming, Ma, Jixin ORCID: 0000-0001-7458-7412 , Huang, Mengxing and Xue, Xingsi (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map. Security and Communication Networks, 2021:3084153. pp. 1-13. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/3084153)
Hybrid-key, Ergodic matrix, Image encryption, Statistical analysis, Diffusion
Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.
Hyperchaos, Internet of medical things, medical volume data, robust watermark, 3DDTCWT-DCT
Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)
Machine Learning, Clinical Decision Support System
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2020) A supervised machine learning approach to generate the auto rule for clinical decision support system. Trends in Medicine, 20 (3). pp. 1-9. ISSN 1594-2848 (doi:https://doi.org/10.15761/TiM.1000232)
Marine Communication, Delay Tolerance, Wireless Network
Shi, Yao, Li, Hui, Du, Wen-Cai, Ma, Jixin and Li, Fa-Bin (2016) Modeling and performance analysis of marine DTN networks with Nodes-cluster in an ad hoc sub-net. In: 2016 International Conference on Computer Engineering and Information Systems (CEIS-16). Advances in Computer Science Research, 52 . Atlantis Press, pp. 182-187. ISBN 978-94-6252-283-1 ISSN 2352-538X (doi:https://doi.org/10.2991/ceis-16.2016.36)
Medical image, Contourlet-DCT, Zero watermarking, Robust
Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)
Multi-authority, cloud computing, searchable encryption, attribute-based encryption, fuzzy identity
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)
Supply Chain, e-Pedigree, Multiparty Security, Anti-counterfeiting, Differential Privacy, Temporal Relation
Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)
Temporal Theory, Fuzzy Logic, Clinic Decision Support System
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of temporal logic-based fuzzy decision support system for diagnosis of acute rheumatic fever/rheumatic heart disease. In: Research and Development in Intelligent Systems. Springer International Publishing Switzerland 2015, XXXII . Springer, Cham, Switzerland, pp. 213-228. ISBN 978-3-319-25030-4 ISSN 978-3-319-25032-8 (Online) (doi:https://doi.org/10.1007/978-3-319-25032-8_17)
Vehicle Re-ID; multi-spectral representation; cross-directional center consistency; layer normalization; benchmark dataset
Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)
algorithm, temporal pattern recognition, basketball zone-defense
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, Miltos, Zhai, Sulan and Tang, Jin (2009) Temporal pattern recognition in video clips detection. In: Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009). Computer Society Press, Los Alamitos, CA, USA, pp. 416-421. ISBN 9780769536415 (doi:https://doi.org/10.1109/ICIS.2009.144)
artificial intelligence (incl. Robotics), mathematical logic and formal languages, computer applications in administrative data processing, computer applications in social and behavioral sciences, operations research/decision theory
Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)
artificial intelligence, data mining, knowledge discovery, rheumatic fever, arthritis pain, temporal logic, fuzzy logic, fuzzy rules, knowledge-based, fuzzy inference, defuziffication
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
artificial intelligence, robotics, data mining, knowledge discovery
Ma, J., Petridis, M. and Knight, B. (2013) Formulating the temporal causal relationships between events and their results. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Cham, Switzerland, pp. 199-210. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_14)
artificial intelligence, robotics, mathematical logic and formal languages, computation by abstract devices, algorithm analysis and problem complexity, image processing and computer vision, database management
Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)
attribute based signature, anonymous authentication, outsourcing computation, access control.
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
attribute-based signature; multi-authority; IoT authentication; proof of knowledge; aggregated anonymous key issue; Blakley secret sharing
Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)
bisectional multivariate quadratic equation, counterfeit, cryptography, ergodic matrix, RFID
Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)
blind watermarking scheme; entropy-based support vector machine; optimized quantum genetic algorithm
Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)
blockchain; information sharing; government; cross-chain
Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)
brain-computer interface (BCI), electroencephalography (EEG), event-related potential (ERP), P300 speller (P3), distractions, taxonomy
Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)
business process, action, event, model, temporal representation
Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)
case based reasoning, business workflows, temporal reasoning, graph similarity
Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)
case history patterns, case-based reasoning systems
Zhao, Guoxing, Luo, Bin and Ma, Jixin (2006) Matching case history patterns in case-based reasoning. In: Huang, De-Shuang, Li, Kang and Irwin, G.W., (eds.) Intelligent computing in signal processing and pattern recognition: International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Lecture notes in control and information sciences, 345 (345). Springer Verlag, Berlin, pp. 312-321. ISBN 9783540372578 ISSN 0170-8643 (doi:https://doi.org/10.1007/978-3-540-37258-5_32)
case-base reasoning, business workflows, temporal reasoning, graph similarity, explanation
Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)
cloud storage auditing, proxy update, revoked proxy, expired proxy
Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)
cloud storage, data integrity auditing, data security, biometric data
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
completeness, reified temporal logic
Zhao, Guoxing, Ma, Jixin, Shen, Fuxing and Petridis, Miltos (2008) A sound and complete reified temporal logic. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 111-116. ISBN 978-0-7695-3263-9 (doi:https://doi.org/10.1109/SNPD.2008.16)
computer software, bionics, programming, time representation,
Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.
copyright protection; voiceprint recognition model; watermarking; blockchain; black-box; Mel spectrogram
Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)
data sharing; key-aggregate; conjunctive keyword query; standard model
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)
derivation, explanation, temporal reasoning
Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Deriving explanations from partial temporal information. In: Proceedings of the Third International Workshop on Explanation-aware Computing (ExaCt-2008), Patras, Greece, July 21-22, 2008. CEUR-WS.org (391). CEUR Workshop Proceedings (CEUR-WS.org), Aachen, Germany. ISBN 9789606843037 ISSN 1613-0073
differential privacy, statistical databases, data mining, utility, big data
Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)
distance learning; elastic cross-modal audio-visual matching; cross-modality; audio-visual matching; elastic multi-way matching; distance learning
Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)
ergodic matrix, bisectional, multivariate quadratic, fixing variables, NP-hard, complexity theory, Galois fields, polynomials, public key cryptography
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
feature extraction, graphical representation, structure relationship, video clip detection, basketball zone-defense
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038
finite field, linear equation, gaussian elimination
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729
general temporal constraint (GTC), general time theory, causal relationship
Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Characterizing the most general temporal constraint. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece. (Unpublished)
graph matching, node-similarity
Zhao, Guoxing, Petridis, Miltos, Sidorov, Grigori and Ma, Jixin (2008) A critical examination of node-similarity based graph matching algorithms. Research In Computing Science, 40. pp. 73-82. ISSN 1870-4069
graph ranking, boundary connectivity, background possibility, foreground possibility, multiple layer
Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)
henon map, multi-watermarking, DTCWT-DCT, robustness
Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)
hybrid-key, ergodic matrix, symmetric, asymmetric, entropy, diffusion
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)
identification, individual identity, mathematical representations
Nissan, Ephraim and Ma, Jixin (2003) Identification and doing without it, V: A formal mathematical analysis for a case of mix-up of individuals, and of recovery from failure to attain identification. Cybernetics and Systems: An International Journal, 34 (6-7). pp. 531-549. ISSN 0196-9722 (Print), 1087-6553 (Online) (doi:https://doi.org/10.1080/01969720302858)
information hiding technology, copyright enforcement scheme
Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)
information systems, business productivity
Ma, Jixin (2004) Temporal Representation and Reasoning in Information Systems. In: Proceedings of the Eighth Pacific Asia Conference on Information Systems. Electronic Commerce Research Center, China, pp. 15-16.
keyword search; data verifiability; AVL tree
Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)
knowledge bases, process control
Ma, Jixin and Knight, Brian (1996) Building temporal constraints into knowledge bases for process control: an examination [Reply to author's reply]. Engineering Applications of Artificial Intelligence, 9 (1). pp. 95-96. ISSN 0952-1976 (doi:https://doi.org/10.1016/0952-1976(95)00065-8)
knowledge representation, computational intelligence
Ma, Jixin and Knight, Brian (2006) Using set operations to deal with the frame problem. In: Yao, Yiyu, (ed.) Proceedings of the Fifth IEEE International Conference on Cognitive Informatics. IEEE Computer Society, Los Alamitos, CA, USA, pp. 447-452. ISBN 1424404754 (doi:https://doi.org/10.1109/COGINF.2006.365530)
logical formalism, reification, temporal logic
Ma, J. and Knight, B. (2001) Reified temporal logics: an overview. Artificial Intelligence Review, 15 (3). pp. 189-217. ISSN 0269-2821 (Print), 1573-7462 (Online) (doi:https://doi.org/10.1023/A:1011018426725)
logical formalism, reification, temporal logic, reified temporal logic (RTL)
Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)
medical images; zero watermarking algorithm; Zernike-DCT
Yang, Chengshan ORCID: 0000-0003-1926-8798 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Liu, Jing, Ma, Jixin, Huang, Mengxing and Xue, Xingsi (2021) Robust zero watermarking algorithm for medical images based on Zernike-DCT. Security and Communication Networks, 2021:4944797. pp. 1-8. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/4944797)
medical text classification
Liang, Shengbin, Chen, Xinan ORCID: 0000-0001-7641-3897 , Ma, Jixin ORCID: 0000-0001-7458-7412 , Du, Wencai ORCID: 0000-0003-0428-0057 , Ma, Huawei ORCID: 0000-0002-7432-5583 and Li, Xingwang (2021) An improved double channel long short-term memory model for medical text classification. Journal of Healthcare Engineering, 2021:6664893. pp. 1-8. ISSN 2040-2295 (Print), 2040-2309 (Online) (doi:https://doi.org/10.1155/2021/6664893)
membership function, input/output, parameter, fuzzy rules, rheumatic fever
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)
methodology, event models
Jin, Xin, Xu, Anbang, Zhao, Guoxing, Ma, Jixin and Bie, Rongfang (2006) Event models for tumor classification with SAGE gene expression data. Lecture Notes in Computer Science, 3992. pp. 775-782. ISSN 0302-9743 (doi:https://doi.org/10.1007/11758525_104)
multivariate quadratic, finite field, relinearization, cryptanalysis, public key cryptosystems
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)
ontological classification, time elements, meta-predicates, temporal propositions
Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838
ontology, time-series, data mining, state-sequence
Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)
pattern recognition, time-series, state-sequence matching
Zheng, Aihua, Ma, Jixin, Petridis, M. and Xiao, Bai (2010) Order, duration and gap - take them all. In: Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 647-651. ISBN 9781424455386 (doi:https://doi.org/10.1109/ICCSIT.2010.5564860)
person re-identification, manifold ranking, local maximal occurrence, weighted descriptor
Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)
points, intervals, relative temporal knowledge, transaction time, valid time
Ma, J., Knight, B. and Ibrahim, M. (1996) A qualitative temporal information system for process control. Advances in Engineering Software, 25 (2-3). pp. 235-241. ISSN 0965-9978 (doi:https://doi.org/10.1016/0965-9978(95)00090-9)
process algebra, temporal logic, temporal reasoning, calculus, delay effects, ontologies, pressing
Ma, J., Knight, B. and Peng, T. (1997) Representing temporal relationships between events and their effects. In: Proceedings: Fourth International Workshop on Temporal Representation and Reasoning. IEEE Computer Society Press, Los Alamitos, California, USA, pp. 148-152. ISBN 0818679379 (doi:https://doi.org/10.1109/TIME.1997.600796)
processes/events, knowledge-based systems, relative time, temporal databases
Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)
public verifiability, confidentiality-preserving public verifiable computation (CPPVC), multivariate polynomial evaluation, matrix-vector multiplication
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)
reasoning, uncertain knowledge, incomplete temporal knowledge
Ma, Jixin, Zheng, Aihua, Knight, Brian, Petridis, Miltos and Luo, Bin (2009) Reasoning about uncertain and incomplete temporal knowledge. In: International Conference on Artificial Intelligence and Pattern Recognition 2009 (AIPR- 2009). Curran Associates, Inc., Red Hook, NY, USA, pp. 49-55. ISBN 978-1615676576
rheumatic fever, arthritis pain, temporal logic, fuzzy logic, fuzzy rules, knowledge-based, fuzzy inference, defuziffication
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
searchable encryption; bloom filter; hierarchical clustering; TF-IDF; multi-keyword ranked; wildcard keyword
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)
selective data sharing; key-aggregate searchable encryption; KGA; multi-owner; verifiable
Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)
software metrics, vector machines, software quality, regression, software quality prediction
Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)
state sequences
Ma, Jixin, Zheng, Aihua, Bie, R., Peridis, M., Zhai, S. and Luo, B. (2009) State-sequence based pattern recognition in basketball zone-defense strategies. Journal of Electronics and Computer Science, 11 (1). pp. 35-44. ISSN 1229-425X
state-based systems, temporal reasoning, time-series analysis and prediction
Ma, Jixin (2008) A framework for state-based time-series analysis and prediction. International Journal of Computer & Information Science, 9 (1). pp. 21-28. ISSN 1525-9293
state-sequence matching, optimal temporal common subsequence, news video retrieval
Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)
Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)
structural similarity, knowledge class diagrams, artificial intelligence, robotics, data mining, knowledge discovery
Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)
temporal knowledge, legal discourse, absolute temporal knowledge, relative temporal knowledge, legal text
Knight, B., Ma, J. and Nissan, E. (1998) Representing temporal knowledge in legal discourse. Information & Communications Technology Law, 7 (3). pp. 199-211. ISSN 1360-0834 (Print), 1469-8404 (Online) (doi:https://doi.org/10.1080/13600834.1998.9965791)
temporal knowledge, uncertainty, incompleteness, cognition, computers, finite element methods, knowledge based systems, sufficient conditions
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
temporal logic, reified temporal logic, semantics, syntax
Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.
temporal ontology, time intervals, time points
Ma, Jixin and Hayes, Pat (2005) Addressing time intervals. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05) [Proceedings]. International Joint Conferences on Artificial Intelligence, Edinburgh, UK, pp. 29-38.
temporal representation, state transitions, industrial real-time systems
Ma, Jixin, Knight, Brian and Nissan, Ephraim (1999) Temporal representation of state transitions. AI EDAM, 13 (2). pp. 67-78. ISSN 0890-0604 (Print), 1469-1760 (Online) (doi:https://doi.org/10.1017/S0890060499132025)
time modelling, temporal modelling, temporal relationships, time model
Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069
time theory, time-series, state-sequences, subsequence matching, similarity model
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)
time, common universal reference, knowledge-based systems, temporal information
Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)
time, time structure, treatment of intervals, temporal ontology
Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)
video annotation system, clips organization, feature description, pattern determination, basketball zone-defence detection, simulation
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)
wireless sensor networks, cloud computing, Internet of Things, public key encryption with keyword search, off-line keyword guessing attack, on-line keyword guessing attack
Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)