Skip navigation

Items where Author is "Ma, Jixin"

Items where Author is "Ma, Jixin"

Up a level
Export as [feed] RSS
Group by: Item Type | Uncontrolled Keywords | No Grouping
(GSM) 3DDTCWT-DCT access control action aggregated anonymous key issue AI algorithm algorithm analysis and problem complexity anonymous authentication Anti-counterfeiting arthritis pain artificial intelligence artificial intelligence (incl. Robotics) asymmetric attribute based signature attribute-based encryption attribute-based signature audio-visual matching autonomics AVL tree background possibility basketball zone-defence detection basketball zone-defense Bayesian networks benchmark dataset big data biometric data bionics bisectional bisectional multivariate quadratic equation black-box Blakley secret sharing blind watermarking scheme blockchain bloom filter boundary connectivity brain-computer interface (BCI) business process Business Process Modeling techniques business productivity business workflows case based reasoning case history patterns case-base reasoning case-based reasoning systems causal relationship chaotic map Clinic Decision Support System Clinical Decision Support System clips organization cloud computing cloud storage cloud storage auditing cognition common universal reference completeness complexity theory computation by abstract devices computational intelligence computer applications in administrative data processing computer applications in social and behavioral sciences computer software computers confidentiality-preserving public verifiable computation (CPPVC) conjunctive keyword query Contourlet-DCT copyright enforcement scheme copyright protection counterfeit cross-chain cross-directional center consistency cross-modality cryptanalysis cryptography data integrity auditing data mining data security data sharing data verifiability database management Decision Support System defuziffication Delay Tolerance derivation Differential Privacy diffusion distance learning distractions Dividing Instant (DI) DTCWT DTCWT-DCT e-Pedigree elastic cross-modal audio-visual matching elastic multi-way matching electroencephalography (EEG) Encrypted medical images entropy entropy-based support vector machine ergodic matrix event event models event-related potential (ERP) expired proxy explanation feature description feature extraction finite element methods finite field fixing variables foreground possibility Frame Problem fuzzy identity fuzzy inference Fuzzy Logic Fuzzy Reasoning fuzzy rules Galois fields gaussian elimination General Similarity Measurement general temporal constraint (GTC) general time theory genetic algorithm government graph matching graph ranking graph similarity graphical representation Harris-SURF-DCT henon map hierarchical clustering hybrid-key Hyperchaos identification Image encryption image processing and computer vision incomplete temporal knowledge incompleteness individual identity industrial real-time systems information hiding technology information sharing information systems input/output Internet of medical things Internet of Things IoT authentication key-aggregate key-aggregate searchable encryption keyword search KGA knowledge based systems knowledge bases knowledge class diagrams knowledge discovery knowledge representation knowledge-based knowledge-based systems layer normalization linear equation local maximal occurrence logical formalism Machine Learning manifold ranking Marine Communication mathematical logic and formal languages mathematical representations matrix-vector multiplication Medical image medical images medical text classification medical volume data Mel spectrogram membership function meta-predicates methodology model multi-authority multi-keyword ranked multi-owner multi-spectral representation multi-watermarking Multiparty Security multiple layer multivariate polynomial evaluation multivariate quadratic mutual information news video retrieval node-similarity NP-hard off-line keyword guessing attack on-line keyword guessing attack ontological classification Ontology Ontology mapping operations research/decision theory optimal temporal common subsequence optimized quantum genetic algorithm outsourcing computation P300 speller (P3) parameter pattern determination pattern recognition perceptual hash person re-identification polynomials process control processes/events programming proof of knowledge proxy update public key cryptography public key cryptosystems public key encryption with keyword search public verifiability reasoning regression reification reified temporal logic reified temporal logic (RTL) relative time relinearization revoked proxy RFID rheumatic fever robotics Robust robust watermark robustness searchable encryption selective data sharing Semantics Set Operations similarity model simulation software metrics software paradigm software quality software quality prediction software strategy standard model state sequences state transitions state-based systems state-sequence state-sequence matching state-sequences Statistical analysis statistical databases structural similarity structure learning structure relationship subsequence matching sufficient conditions Supply Chain symmetric syntax taxonomy temporal databases temporal duration temporal gap temporal information temporal knowledge Temporal Logic temporal model temporal modelling temporal ontology temporal order temporal pattern recognition temporal propositions temporal reasoning Temporal Relation temporal relationships temporal representation Temporal Theory TF-IDF time time elements time intervals time model time modelling time points time representation time structure time theory time-series time-series analysis and prediction treatment of intervals uncertain knowledge uncertainty utility vector machines Vehicle Re-ID verifiable video annotation system video clip detection voiceprint recognition model watermarking weighted descriptor wildcard keyword Wireless Network wireless sensor networks Zernike-DCT Zero watermarking zero watermarking algorithm zero-watermarking
Number of items: 364.

(GSM)

Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.

3DDTCWT-DCT

Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)

access control

Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)

action

Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)

aggregated anonymous key issue

Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)

AI

Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.

algorithm

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, Miltos, Zhai, Sulan and Tang, Jin (2009) Temporal pattern recognition in video clips detection. In: Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009). Computer Society Press, Los Alamitos, CA, USA, pp. 416-421. ISBN 9780769536415 (doi:https://doi.org/10.1109/ICIS.2009.144)

algorithm analysis and problem complexity

Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)

anonymous authentication

Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)

Anti-counterfeiting

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

arthritis pain

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

artificial intelligence

Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)

Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.

artificial intelligence (incl. Robotics)

Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)

asymmetric

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

attribute based signature

Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)

attribute-based encryption

Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)

attribute-based signature

Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)

audio-visual matching

Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)

autonomics

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

AVL tree

Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)

background possibility

Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)

basketball zone-defence detection

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)

basketball zone-defense

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, Miltos, Zhai, Sulan and Tang, Jin (2009) Temporal pattern recognition in video clips detection. In: Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009). Computer Society Press, Los Alamitos, CA, USA, pp. 416-421. ISBN 9780769536415 (doi:https://doi.org/10.1109/ICIS.2009.144)

Bayesian networks

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

benchmark dataset

Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)

big data

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

biometric data

Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)

bionics

Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.

bisectional

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

bisectional multivariate quadratic equation

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

black-box

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

Blakley secret sharing

Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)

blind watermarking scheme

Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)

blockchain

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)

bloom filter

Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)

boundary connectivity

Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)

brain-computer interface (BCI)

Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)

business process

Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)

Business Process Modeling techniques

Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)

business productivity

Ma, Jixin (2004) Temporal Representation and Reasoning in Information Systems. In: Proceedings of the Eighth Pacific Asia Conference on Information Systems. Electronic Commerce Research Center, China, pp. 15-16.

business workflows

Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)

Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)

case based reasoning

Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)

case history patterns

Zhao, Guoxing, Luo, Bin and Ma, Jixin (2006) Matching case history patterns in case-based reasoning. In: Huang, De-Shuang, Li, Kang and Irwin, G.W., (eds.) Intelligent computing in signal processing and pattern recognition: International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Lecture notes in control and information sciences, 345 (345). Springer Verlag, Berlin, pp. 312-321. ISBN 9783540372578 ISSN 0170-8643 (doi:https://doi.org/10.1007/978-3-540-37258-5_32)

case-base reasoning

Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)

case-based reasoning systems

Zhao, Guoxing, Luo, Bin and Ma, Jixin (2006) Matching case history patterns in case-based reasoning. In: Huang, De-Shuang, Li, Kang and Irwin, G.W., (eds.) Intelligent computing in signal processing and pattern recognition: International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Lecture notes in control and information sciences, 345 (345). Springer Verlag, Berlin, pp. 312-321. ISBN 9783540372578 ISSN 0170-8643 (doi:https://doi.org/10.1007/978-3-540-37258-5_32)

causal relationship

Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Characterizing the most general temporal constraint. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece. (Unpublished)

chaotic map

Gong, Cheng ORCID: 0000-0002-0666-2529 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Gong, Ming, Ma, Jixin ORCID: 0000-0001-7458-7412 , Huang, Mengxing and Xue, Xingsi (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map. Security and Communication Networks, 2021:3084153. pp. 1-13. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/3084153)

Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)

Clinic Decision Support System

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of temporal logic-based fuzzy decision support system for diagnosis of acute rheumatic fever/rheumatic heart disease. In: Research and Development in Intelligent Systems. Springer International Publishing Switzerland 2015, XXXII . Springer, Cham, Switzerland, pp. 213-228. ISBN 978-3-319-25030-4 ISSN 978-3-319-25032-8 (Online) (doi:https://doi.org/10.1007/978-3-319-25032-8_17)

Clinical Decision Support System

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2020) A supervised machine learning approach to generate the auto rule for clinical decision support system. Trends in Medicine, 20 (3). pp. 1-9. ISSN 1594-2848 (doi:https://doi.org/10.15761/TiM.1000232)

clips organization

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)

cloud computing

Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)

Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)

cloud storage

Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)

cloud storage auditing

Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)

cognition

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

common universal reference

Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)

completeness

Zhao, Guoxing, Ma, Jixin, Shen, Fuxing and Petridis, Miltos (2008) A sound and complete reified temporal logic. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 111-116. ISBN 978-0-7695-3263-9 (doi:https://doi.org/10.1109/SNPD.2008.16)

complexity theory

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

computation by abstract devices

Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)

computational intelligence

Ma, Jixin and Knight, Brian (2006) Using set operations to deal with the frame problem. In: Yao, Yiyu, (ed.) Proceedings of the Fifth IEEE International Conference on Cognitive Informatics. IEEE Computer Society, Los Alamitos, CA, USA, pp. 447-452. ISBN 1424404754 (doi:https://doi.org/10.1109/COGINF.2006.365530)

computer applications in administrative data processing

Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)

computer applications in social and behavioral sciences

Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)

computer software

Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.

computers

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

confidentiality-preserving public verifiable computation (CPPVC)

Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)

conjunctive keyword query

Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)

Contourlet-DCT

Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)

copyright enforcement scheme

Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)

copyright protection

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

counterfeit

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

cross-chain

Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)

cross-directional center consistency

Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)

cross-modality

Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)

cryptanalysis

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

cryptography

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

data integrity auditing

Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)

data mining

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)

data security

Shen, Wenting, Qin, Jing, Yu, Jia, Hao, Rong, Hu, Jiankun and Ma, Jixin (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Transactions on Cloud Computing, 9 (4). pp. 1408-1421. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2921553)

data sharing

Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)

data verifiability

Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)

database management

Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)

Decision Support System

Ma, Jixin, Pandey, Sanjib Raj and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of decision support system for the diagnosis of arthritis pain for rheumatic fever patients: Based on the fuzzy approach. Journal of Algorithms and Computational Technology, 9 (3). pp. 265-290. ISSN 1748-3018 (Print), 1748-3026 (Online) (doi:https://doi.org/10.1260/1748-3018.9.3.265)

defuziffication

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

Delay Tolerance

Shi, Yao, Li, Hui, Du, Wen-Cai, Ma, Jixin and Li, Fa-Bin (2016) Modeling and performance analysis of marine DTN networks with Nodes-cluster in an ad hoc sub-net. In: 2016 International Conference on Computer Engineering and Information Systems (CEIS-16). Advances in Computer Science Research, 52 . Atlantis Press, pp. 182-187. ISBN 978-94-6252-283-1 ISSN 2352-538X (doi:https://doi.org/10.2991/ceis-16.2016.36)

derivation

Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Deriving explanations from partial temporal information. In: Proceedings of the Third International Workshop on Explanation-aware Computing (ExaCt-2008), Patras, Greece, July 21-22, 2008. CEUR-WS.org (391). CEUR Workshop Proceedings (CEUR-WS.org), Aachen, Germany. ISBN 9789606843037 ISSN 1613-0073

Differential Privacy

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

diffusion

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

distance learning

Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)

Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)

distractions

Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)

Dividing Instant (DI)

Ma, Jixin and Knight, Brian (2003) Representing the dividing instant. The Computer Journal, 46 (2). pp. 213-222. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/46.2.213)

DTCWT

Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)

DTCWT-DCT

Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)

e-Pedigree

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

elastic cross-modal audio-visual matching

Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)

elastic multi-way matching

Wang, Rui, Huang, Huaibo, Zhang, Xufeng, Ma, Jixin and Zheng, Aihua (2019) A novel distance learning for elastic cross-modal audio-visual matching. In: 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Shanghai, China, 8th - 12th July 2019. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 300-305. ISBN 978-1538692141; 978-1538692134; 978-1538692158 (doi:https://doi.org/10.1109/ICMEW.2019.00-70)

electroencephalography (EEG)

Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)

Encrypted medical images

Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)

entropy

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

entropy-based support vector machine

Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)

ergodic matrix

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

event

Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)

event models

Jin, Xin, Xu, Anbang, Zhao, Guoxing, Ma, Jixin and Bie, Rongfang (2006) Event models for tumor classification with SAGE gene expression data. Lecture Notes in Computer Science, 3992. pp. 775-782. ISSN 0302-9743 (doi:https://doi.org/10.1007/11758525_104)

event-related potential (ERP)

Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)

expired proxy

Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)

explanation

Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)

Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Deriving explanations from partial temporal information. In: Proceedings of the Third International Workshop on Explanation-aware Computing (ExaCt-2008), Patras, Greece, July 21-22, 2008. CEUR-WS.org (391). CEUR Workshop Proceedings (CEUR-WS.org), Aachen, Germany. ISBN 9789606843037 ISSN 1613-0073

feature description

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)

feature extraction

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038

finite element methods

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

finite field

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

fixing variables

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

foreground possibility

Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)

Frame Problem

Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.

fuzzy identity

Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)

fuzzy inference

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

Fuzzy Logic

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of temporal logic-based fuzzy decision support system for diagnosis of acute rheumatic fever/rheumatic heart disease. In: Research and Development in Intelligent Systems. Springer International Publishing Switzerland 2015, XXXII . Springer, Cham, Switzerland, pp. 213-228. ISBN 978-3-319-25030-4 ISSN 978-3-319-25032-8 (Online) (doi:https://doi.org/10.1007/978-3-319-25032-8_17)

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

Fuzzy Reasoning

Ma, Jixin, Pandey, Sanjib Raj and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of decision support system for the diagnosis of arthritis pain for rheumatic fever patients: Based on the fuzzy approach. Journal of Algorithms and Computational Technology, 9 (3). pp. 265-290. ISSN 1748-3018 (Print), 1748-3026 (Online) (doi:https://doi.org/10.1260/1748-3018.9.3.265)

fuzzy rules

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

Galois fields

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

gaussian elimination

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

General Similarity Measurement

Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.

general temporal constraint (GTC)

Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Characterizing the most general temporal constraint. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece. (Unpublished)

general time theory

Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Characterizing the most general temporal constraint. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece. (Unpublished)

genetic algorithm

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

government

Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)

graph matching

Zhao, Guoxing, Petridis, Miltos, Sidorov, Grigori and Ma, Jixin (2008) A critical examination of node-similarity based graph matching algorithms. Research In Computing Science, 40. pp. 73-82. ISSN 1870-4069

graph ranking

Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)

graph similarity

Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)

Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)

graphical representation

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038

Harris-SURF-DCT

Gong, Cheng ORCID: 0000-0002-0666-2529 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Gong, Ming, Ma, Jixin ORCID: 0000-0001-7458-7412 , Huang, Mengxing and Xue, Xingsi (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map. Security and Communication Networks, 2021:3084153. pp. 1-13. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/3084153)

henon map

Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)

hierarchical clustering

Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)

hybrid-key

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

Hyperchaos

Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)

identification

Nissan, Ephraim and Ma, Jixin (2003) Identification and doing without it, V: A formal mathematical analysis for a case of mix-up of individuals, and of recovery from failure to attain identification. Cybernetics and Systems: An International Journal, 34 (6-7). pp. 531-549. ISSN 0196-9722 (Print), 1087-6553 (Online) (doi:https://doi.org/10.1080/01969720302858)

Image encryption

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

image processing and computer vision

Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)

incomplete temporal knowledge

Ma, Jixin, Zheng, Aihua, Knight, Brian, Petridis, Miltos and Luo, Bin (2009) Reasoning about uncertain and incomplete temporal knowledge. In: International Conference on Artificial Intelligence and Pattern Recognition 2009 (AIPR- 2009). Curran Associates, Inc., Red Hook, NY, USA, pp. 49-55. ISBN 978-1615676576

incompleteness

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

individual identity

Nissan, Ephraim and Ma, Jixin (2003) Identification and doing without it, V: A formal mathematical analysis for a case of mix-up of individuals, and of recovery from failure to attain identification. Cybernetics and Systems: An International Journal, 34 (6-7). pp. 531-549. ISSN 0196-9722 (Print), 1087-6553 (Online) (doi:https://doi.org/10.1080/01969720302858)

industrial real-time systems

Ma, Jixin, Knight, Brian and Nissan, Ephraim (1999) Temporal representation of state transitions. AI EDAM, 13 (2). pp. 67-78. ISSN 0890-0604 (Print), 1469-1760 (Online) (doi:https://doi.org/10.1017/S0890060499132025)

information hiding technology

Zhou, Xiaoyi, Cao, Chunjie, Ma, Jixin and Wang, Longjuan (2018) Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm. Mathematical Problems in Engineering, 2018:2685739. pp. 1-9. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2018/2685739)

information sharing

Zhang, Lu, Ma, Jiarong, An, Yuting, Zhang, Tianshuo, Ma, Jixin, Feng, Chen and Xiaoyi, Zhou (2022) A Systematic review of blockchain technology for government information sharing. Computers, Materials & Continua, 74 (1):49856. pp. 1161-1181. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2023.032452)

information systems

Ma, Jixin (2004) Temporal Representation and Reasoning in Information Systems. In: Proceedings of the Eighth Pacific Asia Conference on Information Systems. Electronic Commerce Research Center, China, pp. 15-16.

input/output

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)

Internet of medical things

Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)

Internet of Things

Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)

IoT authentication

Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)

key-aggregate

Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)

key-aggregate searchable encryption

Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)

keyword search

Wang, Qing, Zhang, Xi, Qin, Jing, Ma, Jixin and Huang, Xinyi (2021) A verifiable symmetric searchable encryption scheme based on the AVL tree. The Computer Journal:bxab152. pp. 1-10. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab152)

KGA

Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)

knowledge based systems

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

knowledge bases

Ma, Jixin and Knight, Brian (1996) Building temporal constraints into knowledge bases for process control: an examination [Reply to author's reply]. Engineering Applications of Artificial Intelligence, 9 (1). pp. 95-96. ISSN 0952-1976 (doi:https://doi.org/10.1016/0952-1976(95)00065-8)

knowledge class diagrams

Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)

knowledge discovery

Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

knowledge representation

Ma, Jixin and Knight, Brian (2006) Using set operations to deal with the frame problem. In: Yao, Yiyu, (ed.) Proceedings of the Fifth IEEE International Conference on Cognitive Informatics. IEEE Computer Society, Los Alamitos, CA, USA, pp. 447-452. ISBN 1424404754 (doi:https://doi.org/10.1109/COGINF.2006.365530)

knowledge-based

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

knowledge-based systems

Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)

Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)

layer normalization

Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)

linear equation

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

local maximal occurrence

Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)

logical formalism

Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)

Machine Learning

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2020) A supervised machine learning approach to generate the auto rule for clinical decision support system. Trends in Medicine, 20 (3). pp. 1-9. ISSN 1594-2848 (doi:https://doi.org/10.15761/TiM.1000232)

manifold ranking

Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)

Marine Communication

Shi, Yao, Li, Hui, Du, Wen-Cai, Ma, Jixin and Li, Fa-Bin (2016) Modeling and performance analysis of marine DTN networks with Nodes-cluster in an ad hoc sub-net. In: 2016 International Conference on Computer Engineering and Information Systems (CEIS-16). Advances in Computer Science Research, 52 . Atlantis Press, pp. 182-187. ISBN 978-94-6252-283-1 ISSN 2352-538X (doi:https://doi.org/10.2991/ceis-16.2016.36)

mathematical logic and formal languages

Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)

Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)

mathematical representations

Nissan, Ephraim and Ma, Jixin (2003) Identification and doing without it, V: A formal mathematical analysis for a case of mix-up of individuals, and of recovery from failure to attain identification. Cybernetics and Systems: An International Journal, 34 (6-7). pp. 531-549. ISSN 0196-9722 (Print), 1087-6553 (Online) (doi:https://doi.org/10.1080/01969720302858)

matrix-vector multiplication

Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)

Medical image

Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)

medical images

Yang, Chengshan ORCID: 0000-0003-1926-8798 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Liu, Jing, Ma, Jixin, Huang, Mengxing and Xue, Xingsi (2021) Robust zero watermarking algorithm for medical images based on Zernike-DCT. Security and Communication Networks, 2021:4944797. pp. 1-8. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/4944797)

Gong, Cheng ORCID: 0000-0002-0666-2529 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Gong, Ming, Ma, Jixin ORCID: 0000-0001-7458-7412 , Huang, Mengxing and Xue, Xingsi (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map. Security and Communication Networks, 2021:3084153. pp. 1-13. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/3084153)

medical text classification

Liang, Shengbin, Chen, Xinan ORCID: 0000-0001-7641-3897 , Ma, Jixin ORCID: 0000-0001-7458-7412 , Du, Wencai ORCID: 0000-0003-0428-0057 , Ma, Huawei ORCID: 0000-0002-7432-5583 and Li, Xingwang (2021) An improved double channel long short-term memory model for medical text classification. Journal of Healthcare Engineering, 2021:6664893. pp. 1-8. ISSN 2040-2295 (Print), 2040-2309 (Online) (doi:https://doi.org/10.1155/2021/6664893)

medical volume data

Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)

Mel spectrogram

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

membership function

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)

meta-predicates

Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838

methodology

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

Jin, Xin, Xu, Anbang, Zhao, Guoxing, Ma, Jixin and Bie, Rongfang (2006) Event models for tumor classification with SAGE gene expression data. Lecture Notes in Computer Science, 3992. pp. 775-782. ISSN 0302-9743 (doi:https://doi.org/10.1007/11758525_104)

model

Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)

multi-authority

Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)

Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)

multi-keyword ranked

Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)

multi-owner

Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)

multi-spectral representation

Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)

multi-watermarking

Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)

Multiparty Security

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

multiple layer

Xiao, Yun, Jiang, Bo, Tu, Zhengzheng, Ma, Jixin and Tang, Jin ORCID: 0000-0002-2194-0179 (2018) A prior regularized multi-layer graph ranking model for image saliency computation. Neurocomputing, 315 (13). pp. 234-245. ISSN 0925-2312 (doi:https://doi.org/10.1016/j.neucom.2018.06.072)

multivariate polynomial evaluation

Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)

multivariate quadratic

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

mutual information

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

news video retrieval

Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)

Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)

node-similarity

Zhao, Guoxing, Petridis, Miltos, Sidorov, Grigori and Ma, Jixin (2008) A critical examination of node-similarity based graph matching algorithms. Research In Computing Science, 40. pp. 73-82. ISSN 1870-4069

NP-hard

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

off-line keyword guessing attack

Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)

on-line keyword guessing attack

Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)

ontological classification

Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838

Ontology

Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)

Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)

Ontology mapping

Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)

operations research/decision theory

Ma, Jixin and Knight, Brian (2003) A framework for historical case-based reasoning. In: Case-Based Reasoning Research and Development: 5th International Conference on Case-Based Reasoning, ICCBR 2003 Trondheim, Norway, June 23–26, 2003 Proceedings. Lecture Notes in Computer Science (2689). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 246-260. ISBN 9783540404330 ISSN 0302-9743 (doi:https://doi.org/10.1007/3-540-45006-8_21)

optimal temporal common subsequence

Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)

Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)

optimized quantum genetic algorithm

Zhang, Jun, Zhou, Xiaoyi ORCID: 0000-0003-3777-9479 , Yang, Jilin, Cao, Chunjie ORCID: 0000-0001-9439-8256 and Ma, Jixin (2019) Adaptive robust blind watermarking scheme improved by entropy-based SVM and optimized quantum genetic algorithm. Mathematical Problems in Engineering, 2019:7817809. pp. 1-16. ISSN 1024-123X (Print), 1563-5147 (Online) (doi:https://doi.org/10.1155/2019/7817809)

outsourcing computation

Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:https://doi.org/10.1109/TCC.2019.2902380)

P300 speller (P3)

Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)

parameter

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)

pattern determination

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)

pattern recognition

Zheng, Aihua, Ma, Jixin, Petridis, M. and Xiao, Bai (2010) Order, duration and gap - take them all. In: Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 647-651. ISBN 9781424455386 (doi:https://doi.org/10.1109/ICCSIT.2010.5564860)

perceptual hash

Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)

person re-identification

Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)

polynomials

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

process control

Ma, Jixin and Knight, Brian (1996) Building temporal constraints into knowledge bases for process control: an examination [Reply to author's reply]. Engineering Applications of Artificial Intelligence, 9 (1). pp. 95-96. ISSN 0952-1976 (doi:https://doi.org/10.1016/0952-1976(95)00065-8)

processes/events

Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)

programming

Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.

proof of knowledge

Su, Ye ORCID: 0000-0002-4912-3197 , Zhang, Xi, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Efficient and flexible multi-authority attribute-based authentication for IoT devices. IEEE Internet of Things Journal. p. 1. ISSN 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2023.3263497)

proxy update

Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)

public key cryptography

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

public key cryptosystems

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

public key encryption with keyword search

Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)

public verifiability

Sun, Jiameng ORCID: 0000-0003-3153-7698 , Zhu, Binrui, Qin, Jing ORCID: 0000-0003-2380-0396 , Hu, Jiankun ORCID: 0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2018/5275132)

reasoning

Ma, Jixin, Zheng, Aihua, Knight, Brian, Petridis, Miltos and Luo, Bin (2009) Reasoning about uncertain and incomplete temporal knowledge. In: International Conference on Artificial Intelligence and Pattern Recognition 2009 (AIPR- 2009). Curran Associates, Inc., Red Hook, NY, USA, pp. 49-55. ISBN 978-1615676576

regression

Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)

reification

Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)

reified temporal logic

Zhao, Guoxing, Ma, Jixin, Shen, Fuxing and Petridis, Miltos (2008) A sound and complete reified temporal logic. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. IEEE Conference Publications . Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 111-116. ISBN 978-0-7695-3263-9 (doi:https://doi.org/10.1109/SNPD.2008.16)

Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.

reified temporal logic (RTL)

Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)

relative time

Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)

relinearization

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

revoked proxy

Shen, Wenting, Qin, Jing ORCID: 0000-0003-2380-0396 and Ma, Jixin (2019) A lightweight identity-based cloud storage auditing supporting proxy update and workload-based payment. Security and Communication Networks, 2019:8275074. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2019/8275074)

RFID

Zhou, Xiaoyi, Ma, Jixin, Yao, Xiaoming and Li, Honglei (2018) A novel RFID anti-counterfeiting based on bisectional multivariate quadratic equations. International Journal of Software Innovation, 6 (2):1. ISSN 2166-7160 (Print), 2166-7179 (Online) (doi:https://doi.org/10.4018/IJSI.2018040101)

rheumatic fever

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2014) Fuzzy membership function and input/output parameter for diagnosis of rheumatic fever. International Transactions on Information Science and Technology (ITIST), 2 (6). pp. 10-15. ISSN 2325-6567 (Print), 2325-6575 (Online)

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

robotics

Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)

Ma, Jixin and Luo, Bin (2005) Representing and recognizing scenario patterns. In: Fuzzy Systems and Knowledge Discovery: Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part II. Lecture Notes in Computer Science (3614). Springer Berlin Heidelberg, Berlin, Heidelberg, Germany, pp. 140-149. ISBN 9783540283317 ISSN 0302-9743 (doi:https://doi.org/10.1007/11540007_18)

Robust

Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)

robust watermark

Liu, Jing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Li, Jingbing, Huang, Mengxing ORCID: 0000-0002-5709-703X , Sadiq, Naveed and Ai, Yang (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access, 8. pp. 93939-93961. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2995015)

robustness

Liu, Jing, Li, Jingbing ORCID: 0000-0002-9031-6433 , Ma, Jixin, Sadiq, Naveed, Bhatti, Uzair and Ai, Yang (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Applied Sciences, 9 (4):700. ISSN 2076-3417 (doi:https://doi.org/10.3390/app9040700)

searchable encryption

Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)

Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:https://doi.org/10.1007/s00500-017-2849-3)

selective data sharing

Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)

Semantics

Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)

Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.

Set Operations

Ma, Jixin (1999) An Approach to the Frame Problem Based on Set Operations. In: IJCAI-99 Workshop on Nonmonotonic Reasoning, Action and Change, 31 July - 6 August 1999, Stockholm, Sweden.

similarity model

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)

simulation

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)

software metrics

Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)

software paradigm

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

software quality

Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)

software quality prediction

Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)

software strategy

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

standard model

Liu, Jinlu, Zhao, Bo, Qin, Jing ORCID: 0000-0003-2380-0396 , Hou, Xinyi and Ma, Jixin ORCID: 0000-0001-7458-7412 (2023) Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud. Information Sciences:119336. ISSN 0020-0255 (doi:https://doi.org/10.1016/j.ins.2023.119336)

state sequences

Ma, Jixin, Zheng, Aihua, Bie, R., Peridis, M., Zhai, S. and Luo, B. (2009) State-sequence based pattern recognition in basketball zone-defense strategies. Journal of Electronics and Computer Science, 11 (1). pp. 35-44. ISSN 1229-425X

state transitions

Ma, Jixin, Knight, Brian and Nissan, Ephraim (1999) Temporal representation of state transitions. AI EDAM, 13 (2). pp. 67-78. ISSN 0890-0604 (Print), 1469-1760 (Online) (doi:https://doi.org/10.1017/S0890060499132025)

state-based systems

Ma, Jixin (2008) A framework for state-based time-series analysis and prediction. International Journal of Computer & Information Science, 9 (1). pp. 21-28. ISSN 1525-9293

state-sequence

Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)

state-sequence matching

Zheng, Aihua, Ma, Jixin, Zhou, Xiaoyi and Luo, Bin (2010) Efficient and effective state-based framework for news video retrieval. International Journal of Advancements in Computing Technology, 2 (4). pp. 151-161. ISSN 2005-8039 (Print), 2233-9337 (Online) (doi:https://doi.org/10.4156/ijact.vol2.issue4.16)

Zheng, Aihua, Zhou, Xiaoyi, Ma, Jixin and Petridis, Miltos (2010) The optimal temporal common subsequence. In: 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. IEEE Computer Society, Piscataway, USA, pp. 316-321. ISBN 9781424473243 (print), 9788988678220 (online)

Zheng, Aihua, Ma, Jixin, Petridis, M. and Xiao, Bai (2010) Order, duration and gap - take them all. In: Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 647-651. ISBN 9781424455386 (doi:https://doi.org/10.1109/ICCSIT.2010.5564860)

state-sequences

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)

Statistical analysis

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

statistical databases

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

structural similarity

Wolf, Markus, Petridis, Miltos and Ma, Jixin (2013) Using structural similarity for effective retrieval of knowledge from class diagrams. In: Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013, The Thirty-third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence. Springer International Publishing, Switzerland, pp. 185-198. ISBN 9783319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_13)

structure learning

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

structure relationship

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038

subsequence matching

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)

sufficient conditions

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

Supply Chain

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

symmetric

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

syntax

Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.

taxonomy

Schembri, Patrick ORCID: 0000-0002-7808-5871 , Pelc, Maruisz and Ma, Jixin (2020) The effect that auditory distractions have on a visual P300 speller while utilizing low-cost off-the-shelf equipment. Computers, 9 (3):68. ISSN 2073-431X (Online) (doi:https://doi.org/10.3390/computers9030068)

temporal databases

Knight, Brian and Ma, Jixin (1997) Temporal management using relative time in knowledge-based process control. Engineering Applications of Artificial Intelligence, 10 (3). pp. 269-280. ISSN 0952-1976 (doi:https://doi.org/10.1016/S0952-1976(97)00003-1)

temporal duration

Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.

temporal gap

Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.

temporal information

Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)

temporal knowledge

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

Temporal Logic

Chishti, Irfan, Ma, Jixin and Knight, Brian (2014) Ontology mapping of business process modeling based on formal temporal logic. International Journal of Advanced Computer Science and Applications, 5 (7):15. pp. 95-104. ISSN 2158-107X (Print), 2156-5570 (Online) (doi:https://doi.org/10.14569/IJACSA.2014.050715)

Pandey, Sanjib Raj, Ma, Jixin, Lai, Choi-Hong ORCID: 0000-0002-7558-6398 and Njovu, Chiyaba (2013) A fuzzy logic-based decision support system for the diagnosis of arthritis pain for rheumatic fever patients. In: Research and Development in Intelligent Systems XXX: Incorporating Applications and Innovations in Intelligent Systems XXI Proceedings of AI-2013. Springer International Publishing, Switzerland, pp. 259-264. ISBN 978-3319026206 (doi:https://doi.org/10.1007/978-3-319-02621-3_18)

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2013) Temporal logic–based fuzzy decision support system for rheumatic fever and rheumatic heart diseases in Nepal. In: NDA Journal/Souvenir: 28th Annual Conference. Nepalese Doctors’ Association (UK), UK, p. 23.

Zhao, Guoxing, Ma, Jixin and Petridis, Miltos (2008) The completeness and soundness of temporal theories. In: ECAI-08 Workshop on Spatial and Temporal Reasoning, 22 Jul 2008, University of Patras, Patras, Greece.

Ma, Jixin and Knight, Brian (1996) A reified temporal logic. The Computer Journal, 39 (9). pp. 800-807. ISSN 0010-4620 (doi:https://doi.org/10.1093/comjnl/39.9.800)

temporal model

Ma, Jixin and Knight, Brian (2003) Representing the dividing instant. The Computer Journal, 46 (2). pp. 213-222. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/46.2.213)

temporal modelling

Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069

temporal ontology

Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)

Ma, Jixin and Hayes, Pat (2005) Addressing time intervals. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05) [Proceedings]. International Joint Conferences on Artificial Intelligence, Edinburgh, UK, pp. 29-38.

temporal order

Zheng, Aihua, Ma, Jixin, Tang, Jin and Luo, Bin (2012) Matching state-based sequences with rich temporal aspects. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. pp. 2463-2464.

temporal pattern recognition

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, Miltos, Zhai, Sulan and Tang, Jin (2009) Temporal pattern recognition in video clips detection. In: Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009). Computer Society Press, Los Alamitos, CA, USA, pp. 416-421. ISBN 9780769536415 (doi:https://doi.org/10.1109/ICIS.2009.144)

temporal propositions

Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838

temporal reasoning

Kapetanakis, Stelios, Petridis, Miltos, Ma, Jixin, Knight, Brian and Bacon, Liz (2011) Enhancing similarity measures and context provision for the intelligent monitoring of business processes in CBR-WIMS. In: 19th International Conference on Case Based Reasoning: Workshop 1 - Process-oriented Case-Based Reasoning (PO-CBR), 12-15 September 2011, Greenwich, London. (Unpublished)

Kapetanakis, Stelios, Petridis, Miltos, Knight, Brian, Ma, Jixin and Bacon, Liz (2010) A case based reasoning approach for the monitoring of business workflows. In: Case-Based Reasoning. Research and Development: 18th International Conference on Case-Based Reasoning, ICCBR 2010, Alessandria, Italy, July 19-22, 2010. Proceedings. Lecture Notes in Computer Science, 6176 . Springer, Berlin, Germany, pp. 390-405. ISBN 9783642142734 (doi:https://doi.org/10.1007/978-3-642-14274-1_29)

Ma, Jixin, Knight, Brian and Petridis, Miltos (2008) Deriving explanations from partial temporal information. In: Proceedings of the Third International Workshop on Explanation-aware Computing (ExaCt-2008), Patras, Greece, July 21-22, 2008. CEUR-WS.org (391). CEUR Workshop Proceedings (CEUR-WS.org), Aachen, Germany. ISBN 9789606843037 ISSN 1613-0073

Ma, Jixin (2008) A framework for state-based time-series analysis and prediction. International Journal of Computer & Information Science, 9 (1). pp. 21-28. ISSN 1525-9293

Temporal Relation

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

temporal relationships

Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069

temporal representation

Petridis, Miltos, Ma, Jixin and Knight, Brian (2011) Temporal model for business process. Intelligent Decision Technologies, 5 (4). pp. 321-331. ISSN 1872-4981 (Print), 1875-8843 (Online) (doi:https://doi.org/10.3233/IDT-2011-0115)

Ma, Jixin, Knight, Brian and Nissan, Ephraim (1999) Temporal representation of state transitions. AI EDAM, 13 (2). pp. 67-78. ISSN 0890-0604 (Print), 1469-1760 (Online) (doi:https://doi.org/10.1017/S0890060499132025)

Temporal Theory

Pandey, Sanjib Raj, Ma, Jixin and Lai, Choi-Hong ORCID: 0000-0002-7558-6398 (2015) Development of temporal logic-based fuzzy decision support system for diagnosis of acute rheumatic fever/rheumatic heart disease. In: Research and Development in Intelligent Systems. Springer International Publishing Switzerland 2015, XXXII . Springer, Cham, Switzerland, pp. 213-228. ISBN 978-3-319-25030-4 ISSN 978-3-319-25032-8 (Online) (doi:https://doi.org/10.1007/978-3-319-25032-8_17)

TF-IDF

Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)

time

Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)

Ma, Jixin, Knight, Brian, Petridis, Miltiadis and Mineh, Amin (2005) Visualizing a temporal consistency checker. In: Proceedings. Ninth International Conference on Information Visualisation. IEEE Computer Society, Los Alamitos, CA, USA, pp. 686-691. ISBN 0769523978 ISSN 1550-6037 (doi:https://doi.org/10.1109/IV.2005.151)

time elements

Ma, Jixin (2007) Ontological considerations of time, meta-predicates and temporal propositions. Applied Ontology, 2 (1). pp. 37-66. ISSN 1570-5838

time intervals

Ma, Jixin and Hayes, Pat (2005) Addressing time intervals. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05) [Proceedings]. International Joint Conferences on Artificial Intelligence, Edinburgh, UK, pp. 29-38.

time model

Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069

time modelling

Ma, Jixin, Knight, Brian and Petridis, Miltos (2006) A versatile characterization of causal relationships. Research In Computing Science, 26. pp. 15-24. ISSN 1870-4069

time points

Ma, Jixin and Hayes, Pat (2005) Addressing time intervals. In: Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05) [Proceedings]. International Joint Conferences on Artificial Intelligence, Edinburgh, UK, pp. 29-38.

time representation

Ma, Jixin (1994) Towards a general temporal theory. PhD thesis, University of Greenwich.

time structure

Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)

time theory

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)

time-series

Zheng, Aihua, Ma, Jixin, Petridis, M. and Xiao, Bai (2010) Order, duration and gap - take them all. In: Proceedings 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010. Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 647-651. ISBN 9781424455386 (doi:https://doi.org/10.1109/ICCSIT.2010.5564860)

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2009) A robust approach to subsequence matching. In: Lee, Roger and Ishii, Naohiro, (eds.) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence (253). Springer-Verlag, Berlin / Heidelberg, Germany, pp. 39-49. ISBN 9783642054402 (doi:https://doi.org/10.1007/978-3-642-05441-9_4)

Ma, Jixin, Bie, Rongfang and Zhao, Guoxing (2008) An ontological characterization of time-series and state-sequences for data mining. Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008. FSKD '08. Institute of Electrical and Electronics Engineers, Inc., Piscataway, NJ, USA, pp. 325-329. ISBN 978-0-7695-3305-6 (doi:https://doi.org/10.1109/FSKD.2008.2)

time-series analysis and prediction

Ma, Jixin (2008) A framework for state-based time-series analysis and prediction. International Journal of Computer & Information Science, 9 (1). pp. 21-28. ISSN 1525-9293

treatment of intervals

Ma, Jixin and Hayes, Pat (2006) Primitive intervals versus point-based intervals: rivals or allies? The Computer Journal, 49 (1). pp. 32-41. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxh151)

uncertain knowledge

Ma, Jixin, Zheng, Aihua, Knight, Brian, Petridis, Miltos and Luo, Bin (2009) Reasoning about uncertain and incomplete temporal knowledge. In: International Conference on Artificial Intelligence and Pattern Recognition 2009 (AIPR- 2009). Curran Associates, Inc., Red Hook, NY, USA, pp. 49-55. ISBN 978-1615676576

uncertainty

Ma, Jixin, Knight, Brian, Petridis, Miltos and Bai, Xiao (2010) A graphical representation for uncertain and incomplete temporal knowledge. In: Proceedings 2010 Second WRI Global Congress on Intelligent Systems - GCIS 2010. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 117-120. ISBN 9781424492473 (doi:https://doi.org/10.1109/GCIS.2010.219)

utility

Ma, Jixin, Yao, Xiaoming and Zhou, Xiaoyi (2016) Differential privacy of Big Data: An overview. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance. IEEE Computer Society, pp. 7-12. ISBN 978-1-5090-2403-2/16 (doi:https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9)

vector machines

Jin, Xin, Liu, Zhaodong, Bie, Rongfang, Zhao, Guoxing and Ma, Jixin (2006) Support vector machines for regression and applications to software quality prediction. In: Alexandrov, Vassil N., van Albada, Geert Dick, Sloot, Peter M.A. and Dongarra, Jack, (eds.) Computational Science – ICCS 2006. 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV. Lecture Notes in Computer Science (3994). Springer Berlin Heidelberg, Berlin / Heidelberg, Germany, pp. 781-788. ISBN 978-3-540-34385-1 ISSN 0302-9743 (Print), 1611-3349 (Online) (doi:https://doi.org/10.1007/11758549_105)

Vehicle Re-ID

Zheng, Aihua, Zhu, Xianpeng, Ma, Zhiqi, Li, Chenglong ORCID: 0000-0002-7233-2739 , Tang, Jin and Ma, Jixin (2023) Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark. Information Fusion, 100:101901. pp. 1-16. ISSN 1566-2535 (Print), 1872-6305 (Online) (doi:https://doi.org/10.1016/j.inffus.2023.101901)

verifiable

Liu, Jinlu ORCID: 0000-0003-1186-8545 , Wei, Zhongkai, Qin, Jing ORCID: 0000-0003-2380-0396 , Zhao, Bo and Ma, Jixin (2023) Verifiable key-aggregate searchable encryption with a designated server in multi-owner setting. IEEE Transactions on Services Computing, 16 (6). pp. 4233-4247. ISSN 1939-1374 (Online) (doi:https://doi.org/10.1109/TSC.2023.3315957)

video annotation system

Zheng, Aihua, Ma, Jixin, Luo, Bin, Petridis, M. and Tang, Jin (2009) Character-angle based video annotation. In: Computer Science and Information Technology. Institute of Electrical and Electronic Engineers, Inc, Piscataway, NJ, USA, pp. 19-24. ISBN 978-83-60810-22-4 ISSN 1896-7094 (doi:https://doi.org/10.1109/IMCSIT.2009.5352786)

video clip detection

Zheng, Aihua, Ma, Jixin, Petridis, Miltos, Tang, Jin and Luo, Bin (2010) Structure based feature extraction in basketball zone-defense strategies. International Journal of Computer Science and Applications, 7 (3). pp. 18-32. ISSN 0972-9038

voiceprint recognition model

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

watermarking

Zhang, Jing, Dai, Long, Xu, Liaoran ORCID: 0009-0001-4182-5979 , Ma, Jixin ORCID: 0000-0001-7458-7412 and Zhou, Xiaoyi (2023) Black-Box watermarking and blockchain for IP protection of voiceprint recognition model. Electronics, 12 (17):3697. pp. 1-16. ISSN 2079-9292 (Online) (doi:https://doi.org/10.3390/electronics12173697)

weighted descriptor

Wang, Foqin, Zhang, Xuehan, Ma, Jixin, Tang, Jin and Zheng, Aihua (2017) Manifold ranking weighted local maximal occurrence descriptor for person re-identification. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, pp. 111-114. ISBN 978-1509057566 (doi:https://doi.org/10.1109/SERA.2017.7965715)

wildcard keyword

Liu, Jinlu, Zhao, Bo, Qin, Jing, Zhang, Xi and Ma, Jixin (2021) Multi-keyword ranked searchable encryption with the wildcard keyword for data sharing in cloud computing. The Computer Journal:bxab153. pp. 1-13. ISSN 0010-4620 (Print), 1460-2067 (Online) (doi:https://doi.org/10.1093/comjnl/bxab153)

Wireless Network

Shi, Yao, Li, Hui, Du, Wen-Cai, Ma, Jixin and Li, Fa-Bin (2016) Modeling and performance analysis of marine DTN networks with Nodes-cluster in an ad hoc sub-net. In: 2016 International Conference on Computer Engineering and Information Systems (CEIS-16). Advances in Computer Science Research, 52 . Atlantis Press, pp. 182-187. ISBN 978-94-6252-283-1 ISSN 2352-538X (doi:https://doi.org/10.2991/ceis-16.2016.36)

wireless sensor networks

Zhu, Binrui, Susilo, Willy ORCID: 0000-0002-1562-5105 , Qin, Jing, Guo, Fuchun, Zhao, Zhen and Ma, Jixin (2019) A secure and efficient data sharing and searching scheme in wireless sensor networks. Sensors, 19 (11):2583. pp. 1-23. ISSN 1424-8220 (Online) (doi:https://doi.org/10.3390/s19112583)

Zernike-DCT

Yang, Chengshan ORCID: 0000-0003-1926-8798 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Liu, Jing, Ma, Jixin, Huang, Mengxing and Xue, Xingsi (2021) Robust zero watermarking algorithm for medical images based on Zernike-DCT. Security and Communication Networks, 2021:4944797. pp. 1-8. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/4944797)

Zero watermarking

Wu, Xiaoqi, Li, Jingbing ORCID: 0000-0002-2386-3728 , Tu, Rong, Cheng, Jieren, Bhatti, Uzair Aslam and Ma, Jixin (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimedia Tools and Applications, 78 (7). pp. 8463-8480. ISSN 1380-7501 (Print), 1573-7721 (Online) (doi:https://doi.org/10.1007/s11042-018-6877-5)

zero watermarking algorithm

Yang, Chengshan ORCID: 0000-0003-1926-8798 , Li, Jingbing ORCID: 0000-0001-6636-4710 , Bhatti, Uzair Aslam, Liu, Jing, Ma, Jixin, Huang, Mengxing and Xue, Xingsi (2021) Robust zero watermarking algorithm for medical images based on Zernike-DCT. Security and Communication Networks, 2021:4944797. pp. 1-8. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:https://doi.org/10.1155/2021/4944797)

zero-watermarking

Liu, Jing, Li, Jingbing, Cheng, Jieren, Ma, Jixin, Sadiq, Naveed, Han, Baoru, Geng, Qiang and Ai, Yang (2019) A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Computers, Materials & Continua, 61 (2). pp. 889-910. ISSN 1546-2218 (Print), 1546-2226 (Online) (doi:https://doi.org/10.32604/cmc.2019.06034)

This list was generated on Thu Nov 21 15:25:22 2024 UTC.