Items where Author is "Ma, Jixin"
Up a level |
(GSM)
Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.
3DDTCWT-DCT
Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)
access control
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
action
Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)
aggregated anonymous key issue
Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)
AI
Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.
algorithm
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, Miltos, Zhai, Sulan and Tang, Jin (2009) Temporal pattern recognition in video clips detection. In: Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009). Computer Society Press, Los Alamitos, CA, USA, pp. 416-421. ISBN 9780769536415 (doi:https://doi.org/10.1109/ICIS.2009.144)
algorithm analysis and problem complexity
Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)
anonymous authentication
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
Anti-counterfeiting
Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)
arthritis pain
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
artificial intelligence
Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)
Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.
artificial intelligence (incl. Robotics)
Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)
asymmetric
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)
attribute based signature
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
attribute-based encryption
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)
attribute-based signature
Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)
audio-visual matching
Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)
autonomics
Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)
AVL tree
Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)
background possibility
Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)
basketball zone-defence detection
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)
basketball zone-defense
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, Miltos, Zhai, Sulan and Tang, Jin (2009) Temporal pattern recognition in video clips detection. In: Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009). Computer Society Press, Los Alamitos, CA, USA, pp. 416-421. ISBN 9780769536415 (doi:https://doi.org/10.1109/ICIS.2009.144)
Bayesian networks
Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)
benchmark dataset
Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)
big data
Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)
biometric data
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
bionics
Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.
bisectional
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
bisectional multivariate quadratic equation
Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)
black-box
Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)
Blakley secret sharing
Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)
blind watermarking scheme
Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)
blockchain
Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)
Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)
bloom filter
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)
boundary connectivity
Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)
brain-computer interface (BCI)
Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)
business process
Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)
Business Process Modeling techniques
Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)
business productivity
Ma, Jixin (2004) Temporal Representation and Reasoning in Information Systems. In: Proceedings of the Eighth Pacific Asia Conference on Information Systems. Electronic Commerce Research Center, China, pp. 15-16.
business workflows
Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)
Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)
case based reasoning
Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)
case history patterns
Zhao, Guoxing, Luo, Bin and Ma, Jixin (2006) Matching case history patterns in case-based reasoning. In: Huang, De-Shuang, Li, Kang and Irwin, G.W., (eds.) Intelligent computing in signal processing and pattern recognition: International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Lecture notes in control and information sciences, 345 (345). Springer Verlag, Berlin, pp. 312-321. ISBN 9783540372578 ISSN 0170-8643 (doi:https://doi.org/10.1007/978-3-540-37258-5_32)
case-base reasoning
Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)
case-based reasoning systems
Zhao, Guoxing, Luo, Bin and Ma, Jixin (2006) Matching case history patterns in case-based reasoning. In: Huang, De-Shuang, Li, Kang and Irwin, G.W., (eds.) Intelligent computing in signal processing and pattern recognition: International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Lecture notes in control and information sciences, 345 (345). Springer Verlag, Berlin, pp. 312-321. ISBN 9783540372578 ISSN 0170-8643 (doi:https://doi.org/10.1007/978-3-540-37258-5_32)
causal relationship
Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Characterizing the most general temporal constraint. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece. (Unpublished)
chaotic map
Gong, Cheng ORCID: 0000-0002-0666-2529 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Gong, Ming, Ma, Jixin ORCID: 0000-0001-7458-7412 , Huang, Mengxing and Xue, Xingsi (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map. Security and Communication Networks, 2021:3084153. pp. 1-13. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/3084153)
Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)
Clinic Decision Support System
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of temporal logic-based fuzzy decision support system for diagnosis of acute rheumatic fever/rheumatic heart disease. In: Research and Development in Intelligent Systems. Springer International Publishing Switzerland 2015, XXXII . Springer, Cham, Switzerland, pp. 213-228. ISBN 978-3-319-25030-4 ISSN 978-3-319-25032-8 (Online) (doi:https://doi.org/10.1007/978-3-319-25032-8_17)
Clinical Decision Support System
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2020) A supervised machine learning approach to generate the auto rule for clinical decision support system. Trends in Medicine, 20 (3). pp. 1-9. ISSN 1594-2848 (doi:https://doi.org/10.15761/TiM.1000232)
clips organization
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)
cloud computing
Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)
cloud storage
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
cloud storage auditing
Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)
cognition
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
common universal reference
Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)
completeness
Zhao, Guoxing, Ma, Jixin, Shen, Fuxing and Petridis, Miltos (2008) A sound and complete reified temporal logic. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 111-116. ISBN 978-0-7695-3263-9 (doi:https://doi.org/10.1109/SNPD.2008.16)
complexity theory
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
computation by abstract devices
Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)
computational intelligence
Ma, Jixin and Knight, Brian (2006) Using set operations to deal with the frame problem. In: Yao, Yiyu, (ed.) Proceedings of the Fifth IEEE International Conference on Cognitive Informatics. IEEE Computer Society, Los Alamitos, CA, USA, pp. 447-452. ISBN 1424404754 (doi:https://doi.org/10.1109/COGINF.2006.365530)
computer applications in administrative data processing
Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)
computer applications in social and behavioral sciences
Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)
computer software
Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.
computers
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
confidentiality-preserving public verifiable computation (CPPVC)
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)
conjunctive keyword query
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)
Contourlet-DCT
Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)
copyright enforcement scheme
Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)
copyright protection
Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)
counterfeit
Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)
cross-chain
Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)
cross-directional center consistency
Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)
cross-modality
Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)
cryptanalysis
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)
cryptography
Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)
data integrity auditing
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
data mining
Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)
Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)
data security
Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)
data sharing
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)
data verifiability
Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)
database management
Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)
Decision Support System
Ma, Jixin, Pandey, Sanjib Raj and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of decision support system for the diagnosis of arthritis pain for rheumatic fever patients: Based on the fuzzy approach. Journal of Algorithms and Computational Technology, 9 (3). pp. 265-290. ISSN 1748-3018 (Print), 1748-3026 (Online) (doi:https://doi.org/10.1260/1748-3018.9.3.265)
defuziffication
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
Delay Tolerance
Shi, Yao, Li, Hui, Du, Wen-Cai, Ma, Jixin and Li, Fa-Bin (2016) Modeling and performance analysis of marine DTN networks with Nodes-cluster in an ad hoc sub-net. In: 2016 International Conference on Computer Engineering and Information Systems (CEIS-16). Advances in Computer Science Research, 52 . Atlantis Press, pp. 182-187. ISBN 978-94-6252-283-1 ISSN 2352-538X (doi:https://doi.org/10.2991/ceis-16.2016.36)
derivation
Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Deriving explanations from partial temporal information. In: Proceedings of the Third International Workshop on Explanation-aware Computing (ExaCt-2008), Patras, Greece, July 21-22, 2008. CEUR-WS.org (391). CEUR Workshop Proceedings (CEUR-WS.org), Aachen, Germany. ISBN 9789606843037 ISSN 1613-0073
Differential Privacy
Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)
Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)
diffusion
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)
Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.
distance learning
Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)
Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)
distractions
Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)
Dividing Instant (DI)
Ma, Jixin and Knight, Brian (2003) Representing the dividing instant. The Computer Journal, 46 (2). pp. 213-222. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/46.2.213)
DTCWT
Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)
DTCWT-DCT
Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)
e-Pedigree
Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)
elastic cross-modal audio-visual matching
Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)
elastic multi-way matching
Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)
electroencephalography (EEG)
Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)
Encrypted medical images
Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)
entropy
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)
entropy-based support vector machine
Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)
ergodic matrix
Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.
event
Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)
event models
Jin, Xin, Xu, Anbang, Zhao, Guoxing, Ma, Jixin and Bie, Rongfang (2006) Event models for tumor classification with SAGE gene expression data. Lecture Notes in Computer Science, 3992. pp. 775-782. ISSN 0302-9743 (doi:https://doi.org/10.1007/11758525_104)
event-related potential (ERP)
Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)
expired proxy
Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)
explanation
Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)
Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Deriving explanations from partial temporal information. In: Proceedings of the Third International Workshop on Explanation-aware Computing (ExaCt-2008), Patras, Greece, July 21-22, 2008. CEUR-WS.org (391). CEUR Workshop Proceedings (CEUR-WS.org), Aachen, Germany. ISBN 9789606843037 ISSN 1613-0073
feature description
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)
feature extraction
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038
finite element methods
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
finite field
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729
fixing variables
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
foreground possibility
Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)
Frame Problem
Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.
fuzzy identity
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)
fuzzy inference
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
Fuzzy Logic
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of temporal logic-based fuzzy decision support system for diagnosis of acute rheumatic fever/rheumatic heart disease. In: Research and Development in Intelligent Systems. Springer International Publishing Switzerland 2015, XXXII . Springer, Cham, Switzerland, pp. 213-228. ISBN 978-3-319-25030-4 ISSN 978-3-319-25032-8 (Online) (doi:https://doi.org/10.1007/978-3-319-25032-8_17)
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
Fuzzy Reasoning
Ma, Jixin, Pandey, Sanjib Raj and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of decision support system for the diagnosis of arthritis pain for rheumatic fever patients: Based on the fuzzy approach. Journal of Algorithms and Computational Technology, 9 (3). pp. 265-290. ISSN 1748-3018 (Print), 1748-3026 (Online) (doi:https://doi.org/10.1260/1748-3018.9.3.265)
fuzzy rules
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
Galois fields
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
gaussian elimination
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729
General Similarity Measurement
Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.
general temporal constraint (GTC)
Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Characterizing the most general temporal constraint. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece. (Unpublished)
general time theory
Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Characterizing the most general temporal constraint. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece. (Unpublished)
genetic algorithm
Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)
government
Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)
graph matching
Zhao, Guoxing, Petridis, Miltos, Sidorov, Grigori and Ma, Jixin (2008) A critical examination of node-similarity based graph matching algorithms. Research In Computing Science, 40. pp. 73-82. ISSN 1870-4069
graph ranking
Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)
graph similarity
Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)
Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)
graphical representation
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038
Harris-SURF-DCT
Gong, Cheng ORCID: 0000-0002-0666-2529 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Gong, Ming, Ma, Jixin ORCID: 0000-0001-7458-7412 , Huang, Mengxing and Xue, Xingsi (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map. Security and Communication Networks, 2021:3084153. pp. 1-13. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/3084153)
henon map
Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)
hierarchical clustering
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)
hybrid-key
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)
Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.
Hyperchaos
Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)
identification
Nissan, Ephraim and Ma, Jixin (2003) Identification and doing without it, V: A formal mathematical analysis for a case of mix-up of individuals, and of recovery from failure to attain identification. Cybernetics and Systems: An International Journal, 34 (6-7). pp. 531-549. ISSN 0196-9722 (Print), 1087-6553 (Online) (doi:https://doi.org/10.1080/01969720302858)
Image encryption
Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.
image processing and computer vision
Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)
incomplete temporal knowledge
Ma, Jixin, Zheng, Aihua, Knight, Brian, Petridis, Miltos and Luo, Bin (2009) Reasoning about uncertain and incomplete temporal knowledge. In: International Conference on Artificial Intelligence and Pattern Recognition 2009 (AIPR- 2009). Curran Associates, Inc., Red Hook, NY, USA, pp. 49-55. ISBN 978-1615676576
incompleteness
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
individual identity
Nissan, Ephraim and Ma, Jixin (2003) Identification and doing without it, V: A formal mathematical analysis for a case of mix-up of individuals, and of recovery from failure to attain identification. Cybernetics and Systems: An International Journal, 34 (6-7). pp. 531-549. ISSN 0196-9722 (Print), 1087-6553 (Online) (doi:https://doi.org/10.1080/01969720302858)
industrial real-time systems
Ma, Jixin, Knight, Brian and Nissan, Ephraim (1999) Temporal representation of state transitions. AI EDAM, 13 (2). pp. 67-78. ISSN 0890-0604 (Print), 1469-1760 (Online) (doi:https://doi.org/10.1017/S0890060499132025)
information hiding technology
Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)
information sharing
Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)
information systems
Ma, Jixin (2004) Temporal Representation and Reasoning in Information Systems. In: Proceedings of the Eighth Pacific Asia Conference on Information Systems. Electronic Commerce Research Center, China, pp. 15-16.
input/output
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)
Internet of medical things
Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)
Internet of Things
Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)
IoT authentication
Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)
key-aggregate
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)
key-aggregate searchable encryption
Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)
keyword search
Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)
KGA
Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)
knowledge based systems
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
knowledge bases
Ma, Jixin and Knight, Brian (1996) Building temporal constraints into knowledge bases for process control: an examination [Reply to author's reply]. Engineering Applications of Artificial Intelligence, 9 (1). pp. 95-96. ISSN 0952-1976 (doi:https://doi.org/10.1016/0952-1976(95)00065-8)
knowledge class diagrams
Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)
knowledge discovery
Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
knowledge representation
Ma, Jixin and Knight, Brian (2006) Using set operations to deal with the frame problem. In: Yao, Yiyu, (ed.) Proceedings of the Fifth IEEE International Conference on Cognitive Informatics. IEEE Computer Society, Los Alamitos, CA, USA, pp. 447-452. ISBN 1424404754 (doi:https://doi.org/10.1109/COGINF.2006.365530)
knowledge-based
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
knowledge-based systems
Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)
Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)
layer normalization
Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)
linear equation
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729
local maximal occurrence
Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)
logical formalism
Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)
Machine Learning
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2020) A supervised machine learning approach to generate the auto rule for clinical decision support system. Trends in Medicine, 20 (3). pp. 1-9. ISSN 1594-2848 (doi:https://doi.org/10.15761/TiM.1000232)
manifold ranking
Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)
Marine Communication
Shi, Yao, Li, Hui, Du, Wen-Cai, Ma, Jixin and Li, Fa-Bin (2016) Modeling and performance analysis of marine DTN networks with Nodes-cluster in an ad hoc sub-net. In: 2016 International Conference on Computer Engineering and Information Systems (CEIS-16). Advances in Computer Science Research, 52 . Atlantis Press, pp. 182-187. ISBN 978-94-6252-283-1 ISSN 2352-538X (doi:https://doi.org/10.2991/ceis-16.2016.36)
mathematical logic and formal languages
Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)
Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)
mathematical representations
Nissan, Ephraim and Ma, Jixin (2003) Identification and doing without it, V: A formal mathematical analysis for a case of mix-up of individuals, and of recovery from failure to attain identification. Cybernetics and Systems: An International Journal, 34 (6-7). pp. 531-549. ISSN 0196-9722 (Print), 1087-6553 (Online) (doi:https://doi.org/10.1080/01969720302858)
matrix-vector multiplication
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)
Medical image
Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)
medical images
Yang, Chengshan ORCID: 0000-0003-1926-8798 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Liu, Jing, Ma, Jixin, Huang, Mengxing and Xue, Xingsi (2021) Robust zero watermarking algorithm for medical images based on Zernike-DCT. Security and Communication Networks, 2021:4944797. pp. 1-8. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/4944797)
Gong, Cheng ORCID: 0000-0002-0666-2529 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Gong, Ming, Ma, Jixin ORCID: 0000-0001-7458-7412 , Huang, Mengxing and Xue, Xingsi (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map. Security and Communication Networks, 2021:3084153. pp. 1-13. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/3084153)
medical text classification
Liang, Shengbin, Chen, Xinan ORCID: 0000-0001-7641-3897 , Ma, Jixin ORCID: 0000-0001-7458-7412 , Du, Wencai ORCID: 0000-0003-0428-0057 , Ma, Huawei ORCID: 0000-0002-7432-5583 and Li, Xingwang (2021) An improved double channel long short-term memory model for medical text classification. Journal of Healthcare Engineering, 2021:6664893. pp. 1-8. ISSN 2040-2295 (Print), 2040-2309 (Online) (doi:https://doi.org/10.1155/2021/6664893)
medical volume data
Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)
Mel spectrogram
Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)
membership function
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)
meta-predicates
Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838
methodology
Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)
Jin, Xin, Xu, Anbang, Zhao, Guoxing, Ma, Jixin and Bie, Rongfang (2006) Event models for tumor classification with SAGE gene expression data. Lecture Notes in Computer Science, 3992. pp. 775-782. ISSN 0302-9743 (doi:https://doi.org/10.1007/11758525_104)
model
Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)
multi-authority
Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)
multi-keyword ranked
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)
multi-owner
Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)
multi-spectral representation
Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)
multi-watermarking
Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)
Multiparty Security
Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)
multiple layer
Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)
multivariate polynomial evaluation
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)
multivariate quadratic
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
mutual information
Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)
news video retrieval
Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)
Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)
node-similarity
Zhao, Guoxing, Petridis, Miltos, Sidorov, Grigori and Ma, Jixin (2008) A critical examination of node-similarity based graph matching algorithms. Research In Computing Science, 40. pp. 73-82. ISSN 1870-4069
NP-hard
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
off-line keyword guessing attack
Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)
on-line keyword guessing attack
Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)
ontological classification
Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838
Ontology
Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)
Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)
Ontology mapping
Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)
operations research/decision theory
Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)
optimal temporal common subsequence
Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)
Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)
optimized quantum genetic algorithm
Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)
outsourcing computation
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)
P300 speller (P3)
Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)
parameter
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)
pattern determination
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)
pattern recognition
Zheng, Aihua, Ma, Jixin, Petridis, M. and Xiao, Bai (2010) Order, duration and gap - take them all. In: Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 647-651. ISBN 9781424455386 (doi:https://doi.org/10.1109/ICCSIT.2010.5564860)
perceptual hash
Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)
person re-identification
Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)
polynomials
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
process control
Ma, Jixin and Knight, Brian (1996) Building temporal constraints into knowledge bases for process control: an examination [Reply to author's reply]. Engineering Applications of Artificial Intelligence, 9 (1). pp. 95-96. ISSN 0952-1976 (doi:https://doi.org/10.1016/0952-1976(95)00065-8)
processes/events
Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)
programming
Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.
proof of knowledge
Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)
proxy update
Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)
public key cryptography
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188
public key cryptosystems
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)
public key encryption with keyword search
Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)
public verifiability
Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)
reasoning
Ma, Jixin, Zheng, Aihua, Knight, Brian, Petridis, Miltos and Luo, Bin (2009) Reasoning about uncertain and incomplete temporal knowledge. In: International Conference on Artificial Intelligence and Pattern Recognition 2009 (AIPR- 2009). Curran Associates, Inc., Red Hook, NY, USA, pp. 49-55. ISBN 978-1615676576
regression
Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)
reification
Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)
reified temporal logic
Zhao, Guoxing, Ma, Jixin, Shen, Fuxing and Petridis, Miltos (2008) A sound and complete reified temporal logic. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 111-116. ISBN 978-0-7695-3263-9 (doi:https://doi.org/10.1109/SNPD.2008.16)
Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.
reified temporal logic (RTL)
Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)
relative time
Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)
relinearization
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)
revoked proxy
Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)
RFID
Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)
rheumatic fever
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
robotics
Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)
Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)
Robust
Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)
robust watermark
Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)
robustness
Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)
searchable encryption
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)
selective data sharing
Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)
Semantics
Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)
Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.
Set Operations
Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.
similarity model
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)
simulation
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)
software metrics
Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)
software paradigm
Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)
software quality
Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)
software quality prediction
Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)
software strategy
Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)
standard model
Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)
state sequences
Ma, Jixin, Zheng, Aihua, Bie, R., Peridis, M., Zhai, S. and Luo, B. (2009) State-sequence based pattern recognition in basketball zone-defense strategies. Journal of Electronics and Computer Science, 11 (1). pp. 35-44. ISSN 1229-425X
state transitions
Ma, Jixin, Knight, Brian and Nissan, Ephraim (1999) Temporal representation of state transitions. AI EDAM, 13 (2). pp. 67-78. ISSN 0890-0604 (Print), 1469-1760 (Online) (doi:https://doi.org/10.1017/S0890060499132025)
state-based systems
Ma, Jixin (2008) A framework for state-based time-series analysis and prediction. International Journal of Computer & Information Science, 9 (1). pp. 21-28. ISSN 1525-9293
state-sequence
Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)
state-sequence matching
Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)
Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)
Zheng, Aihua, Ma, Jixin, Petridis, M. and Xiao, Bai (2010) Order, duration and gap - take them all. In: Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 647-651. ISBN 9781424455386 (doi:https://doi.org/10.1109/ICCSIT.2010.5564860)
state-sequences
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)
Statistical analysis
Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.
statistical databases
Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)
structural similarity
Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)
structure learning
Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)
structure relationship
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038
subsequence matching
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)
sufficient conditions
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
Supply Chain
Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)
symmetric
Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)
syntax
Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.
taxonomy
Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)
temporal databases
Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)
temporal duration
Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.
temporal gap
Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.
temporal information
Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)
temporal knowledge
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
Temporal Logic
Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)
Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.
Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.
Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)
temporal model
Ma, Jixin and Knight, Brian (2003) Representing the dividing instant. The Computer Journal, 46 (2). pp. 213-222. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/46.2.213)
temporal modelling
Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069
temporal ontology
Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)
Ma, Jixin and Hayes, Pat (2005) Addressing time intervals. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05) [Proceedings]. International Joint Conferences on Artificial Intelligence, Edinburgh, UK, pp. 29-38.
temporal order
Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.
temporal pattern recognition
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, Miltos, Zhai, Sulan and Tang, Jin (2009) Temporal pattern recognition in video clips detection. In: Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009). Computer Society Press, Los Alamitos, CA, USA, pp. 416-421. ISBN 9780769536415 (doi:https://doi.org/10.1109/ICIS.2009.144)
temporal propositions
Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838
temporal reasoning
Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)
Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)
Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Deriving explanations from partial temporal information. In: Proceedings of the Third International Workshop on Explanation-aware Computing (ExaCt-2008), Patras, Greece, July 21-22, 2008. CEUR-WS.org (391). CEUR Workshop Proceedings (CEUR-WS.org), Aachen, Germany. ISBN 9789606843037 ISSN 1613-0073
Ma, Jixin (2008) A framework for state-based time-series analysis and prediction. International Journal of Computer & Information Science, 9 (1). pp. 21-28. ISSN 1525-9293
Temporal Relation
Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)
temporal relationships
Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069
temporal representation
Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)
Ma, Jixin, Knight, Brian and Nissan, Ephraim (1999) Temporal representation of state transitions. AI EDAM, 13 (2). pp. 67-78. ISSN 0890-0604 (Print), 1469-1760 (Online) (doi:https://doi.org/10.1017/S0890060499132025)
Temporal Theory
Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of temporal logic-based fuzzy decision support system for diagnosis of acute rheumatic fever/rheumatic heart disease. In: Research and Development in Intelligent Systems. Springer International Publishing Switzerland 2015, XXXII . Springer, Cham, Switzerland, pp. 213-228. ISBN 978-3-319-25030-4 ISSN 978-3-319-25032-8 (Online) (doi:https://doi.org/10.1007/978-3-319-25032-8_17)
TF-IDF
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)
time
Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)
Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)
time elements
Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838
time intervals
Ma, Jixin and Hayes, Pat (2005) Addressing time intervals. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05) [Proceedings]. International Joint Conferences on Artificial Intelligence, Edinburgh, UK, pp. 29-38.
time model
Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069
time modelling
Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069
time points
Ma, Jixin and Hayes, Pat (2005) Addressing time intervals. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05) [Proceedings]. International Joint Conferences on Artificial Intelligence, Edinburgh, UK, pp. 29-38.
time representation
Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.
time structure
Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)
time theory
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)
time-series
Zheng, Aihua, Ma, Jixin, Petridis, M. and Xiao, Bai (2010) Order, duration and gap - take them all. In: Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 647-651. ISBN 9781424455386 (doi:https://doi.org/10.1109/ICCSIT.2010.5564860)
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)
Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)
time-series analysis and prediction
Ma, Jixin (2008) A framework for state-based time-series analysis and prediction. International Journal of Computer & Information Science, 9 (1). pp. 21-28. ISSN 1525-9293
treatment of intervals
Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)
uncertain knowledge
Ma, Jixin, Zheng, Aihua, Knight, Brian, Petridis, Miltos and Luo, Bin (2009) Reasoning about uncertain and incomplete temporal knowledge. In: International Conference on Artificial Intelligence and Pattern Recognition 2009 (AIPR- 2009). Curran Associates, Inc., Red Hook, NY, USA, pp. 49-55. ISBN 978-1615676576
uncertainty
Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)
utility
Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)
vector machines
Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)
Vehicle Re-ID
Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)
verifiable
Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)
video annotation system
Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)
video clip detection
Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038
voiceprint recognition model
Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)
watermarking
Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)
weighted descriptor
Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)
wildcard keyword
Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)
Wireless Network
Shi, Yao, Li, Hui, Du, Wen-Cai, Ma, Jixin and Li, Fa-Bin (2016) Modeling and performance analysis of marine DTN networks with Nodes-cluster in an ad hoc sub-net. In: 2016 International Conference on Computer Engineering and Information Systems (CEIS-16). Advances in Computer Science Research, 52 . Atlantis Press, pp. 182-187. ISBN 978-94-6252-283-1 ISSN 2352-538X (doi:https://doi.org/10.2991/ceis-16.2016.36)
wireless sensor networks
Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)
Zernike-DCT
Yang, Chengshan ORCID: 0000-0003-1926-8798 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Liu, Jing, Ma, Jixin, Huang, Mengxing and Xue, Xingsi (2021) Robust zero watermarking algorithm for medical images based on Zernike-DCT. Security and Communication Networks, 2021:4944797. pp. 1-8. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/4944797)
Zero watermarking
Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)
zero watermarking algorithm
Yang, Chengshan ORCID: 0000-0003-1926-8798 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Liu, Jing, Ma, Jixin, Huang, Mengxing and Xue, Xingsi (2021) Robust zero watermarking algorithm for medical images based on Zernike-DCT. Security and Communication Networks, 2021:4944797. pp. 1-8. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/4944797)
zero-watermarking
Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)