Jun Ma
Orcid: 0000-0003-2258-0854Affiliations:
- National University of Defense Technology, College of Computer, Changsha, China
According to our database1,
Jun Ma
authored at least 66 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
9
1
8
1
2
1
2
2
1
5
7
6
5
2
2
1
5
4
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A More Context-Aware Approach for Textual Adversarial Attacks Using Probability Difference-Guided Beam Search.
IEEE Trans. Knowl. Data Eng., June, 2024
CoRR, 2024
MOSABench: Multi-Object Sentiment Analysis Benchmark for Evaluating Multimodal Large Language Models Understanding of Complex Image.
CoRR, 2024
PTA: Enhancing Multimodal Sentiment Analysis through Pipelined Prediction and Translation-based Alignment.
CoRR, 2024
SWEA: Changing Factual Knowledge in Large Language Models via Subject Word Embedding Altering.
CoRR, 2024
Span-based joint entity and relation extraction augmented with sequence tagging mechanism.
Sci. China Inf. Sci., 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
When Database Meets New Storage Devices: Understanding and Exposing Performance Mismatches via Configurations.
Proc. VLDB Endow., 2023
Proceedings of the IEEE International Conference on Software Analysis, 2023
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
QAE: A Hard-Label Textual Attack Considering the Comprehensive Quality of Adversarial Examples.
Proceedings of the Natural Language Processing and Chinese Computing, 2023
Proceedings of the 6th International Conference on Machine Learning and Natural Language Processing, 2023
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023
HM-Transformer: Hierarchical Multi-modal Transformer for Long Document Image Understanding.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
2022
Int. J. Intell. Syst., December, 2022
Sensors, 2022
Knowl. Based Syst., 2022
Int. J. Pattern Recognit. Artif. Intell., 2022
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search.
CoRR, 2022
Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes.
CoRR, 2022
CoRR, 2022
Proceedings of the ITCC 2022: 4th International Conference on Information Technology and Computer Communications, Guangzhou, China, June 23, 2022
Proceedings of the IEEE International Performance, 2022
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022
Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes.
Proceedings of the 29th International Conference on Computational Linguistics, 2022
SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
2021
Boosting Span-based Joint Entity and Relation Extraction via Squence Tagging Mechanism.
CoRR, 2021
FastDCF: A Partial Index Based Distributed and Scalable Near-Miss Code Clone Detection Approach for Very Large Code Repositories.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Intelligent Computing Theories and Application, 2021
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
Hierarchical Encoder-Decoder Summary Model with an Instructor for Long Academic Papers.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
Research on Chinese medical named entity recognition based on collaborative cooperation of multiple neural network models.
J. Biomed. Informatics, 2020
Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
Span-based Joint Entity and Relation Extraction with Attention-based Span-specific and Contextual Semantic Representations.
Proceedings of the 28th International Conference on Computational Linguistics, 2020
2019
Symmetry, 2019
Proceedings of the IEEE Real-Time Systems Symposium, 2019
CLASC: A Changelog Based Automatic Code Source Classification Method for Operating System Packages.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019
2017
上下文敏感的控制流完整性保护的改进方法 (Improved Method of Context-sensitive Control Flow Integrity Protection).
计算机科学, 2017
KSII Trans. Internet Inf. Syst., 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
ERPC: An Edge-Resources Based Framework to Reduce Bandwidth Cost in the Personal Cloud.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016
Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
2015
REPS: 一种高效的容错并行概率流Skyline查询方法 (REPS: An Efficient Fault-tolerant Approach for Parallel Skyline Queries over Probabilistic Data Streams).
计算机科学, 2015
基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks).
计算机科学, 2015
2013
Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage.
J. Zhejiang Univ. Sci. C, 2013
2011
SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
Proceedings of the ICIMCS 2011, 2011
2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
2005
Proceedings of the Networking, 2005