Zhi Ma
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Life Cycle Mining Deformation Monitoring and Analysis Using Sentinel-1 and Radarsat-2 InSAR Time Series.
Remote. Sens., July, 2024
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing.
J. Netw. Syst. Manag., July, 2024
Identification of essential plasma protein using manifold regularized sparse group-lasso for prediction of Alzheimer's disease.
Displays, January, 2024
Towards Practical Requirement Analysis and Verification: A Case Study on Software IP Components in Aerospace Embedded Systems.
CoRR, 2024
EfficientNet-ECA: A lightweight network based on efficient channel attention for class-imbalanced welding defects classification.
Adv. Eng. Informatics, 2024
Proceedings of the Theoretical Aspects of Software Engineering, 2024
Proceedings of the 26th International Conference on Advanced Communications Technology, 2024
2023
J. Adv. Comput. Intell. Intell. Informatics, July, 2023
Comput. Appl. Math., June, 2023
2022
Briefings Bioinform., 2022
Long-Term Person Re-identification with Dramatic Appearance Change: Algorithm and Benchmark.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
2021
J. Comput. Sci. Technol., 2021
2020
Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator.
Quantum Inf. Process., 2020
Int. J. Intell. Syst., 2020
2013
Easily Implemented Rate Compatible Reconciliation Protocol for Quantum Key Distribution
CoRR, 2013
2010
Mechanism of MicroRNA-Target Interaction: Molecular Dynamics Simulations and Thermodynamics Analysis.
PLoS Comput. Biol., 2010
Sci. China Inf. Sci., 2010
2009
Grain Quality Evaluation Method Based on Combination of BP Neural Networks with D-S Evidence Theory.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
2006
Proceedings of the Theory and Applications of Models of Computation, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2004
IEEE Trans. Inf. Theory, 2004
IACR Cryptol. ePrint Arch., 2004