Chuang Ma

Orcid: 0000-0002-5141-0734

According to our database1, Chuang Ma authored at least 97 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unsupervised Multitarget Domain Adaptation With Dictionary-Bridged Knowledge Exploitation.
IEEE Trans. Neural Networks Learn. Syst., March, 2024

User Identification Across Multiple Social Networks Based on Naive Bayes Model.
IEEE Trans. Neural Networks Learn. Syst., March, 2024

A novel privacy-preserving graph convolutional network via secure matrix multiplication.
Inf. Sci., February, 2024

Blockchain-Based Certificate-Free Cross-Domain Authentication Mechanism for Industrial Internet.
IEEE Internet Things J., January, 2024

Network Shortest Path Interdiction Problem Based on Generalized Set Coverage.
IEEE Trans. Netw. Sci. Eng., 2024

2023
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network.
J. Cloud Comput., December, 2023

Skin scar segmentation based on saliency detection.
Vis. Comput., October, 2023

A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing.
IEEE Internet Things J., July, 2023

FedGR: Federated Graph Neural Network for Recommendation Systems.
Axioms, February, 2023

Computing persistent homology by spanning trees and critical simplices.
CoRR, 2023

2022
An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption.
Int. J. Intell. Syst., December, 2022

Heterogeneous Domain Adaptation With Structure and Classification Space Alignment.
IEEE Trans. Cybern., 2022

A Convex Discriminant Semantic Correlation Analysis for Cross-View Recognition.
IEEE Trans. Cybern., 2022

SOIDP: Predicting Interlayer Links in Multiplex Networks.
IEEE Trans. Comput. Soc. Syst., 2022

An Advancing Temporal Convolutional Network for 5G Latency Services via Automatic Modulation Recognition.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

A Novel Blind High-Order Modulation Classifier Using Accumulated Constellation Temporal Convolution for OSTBC-OFDM Systems.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Interactive Web-based Annotation of Plant MicroRNAs with iwa-miRNA.
Genom. Proteom. Bioinform., 2022

Shank length and circumference measurement algorithm of breeder chickens based on extraction of regional key points.
Comput. Electron. Agric., 2022

Genome optimization via virtual simulation to accelerate maize hybrid breeding.
Briefings Bioinform., 2022

2021
Inferring Network Structure and Estimating Dynamical Process From Binary-State Data via Logistic Regression.
IEEE Trans. Syst. Man Cybern. Syst., 2021

A certificateless encryption scheme based on blockchain.
Peer-to-Peer Netw. Appl., 2021

Source-Free Unsupervised Domain Adaptation with Sample Transport Learning.
J. Comput. Sci. Technol., 2021

Secure and smart autonomous multi-robot systems for opinion spammer detection.
Inf. Sci., 2021

An improved DPoS consensus mechanism in blockchain based on PLTS for the smart autonomous multi-robot system.
Inf. Sci., 2021

Stiffness optimisation of graded microstructal configurations using asymptotic analysis and machine learning.
CoRR, 2021

Exploring transcriptional switches from pairwise, temporal and population RNA-Seq data using deepTS.
Briefings Bioinform., 2021

Effects of asymptomatic infection and self-initiated awareness on the coupled disease-awareness dynamics in multiplex networks.
Appl. Math. Comput., 2021

Subway Flow Prediction Based on Improved Support Vector Machine.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Attention Based Multi-Unit Spatial-Temporal Network for Traffic Flow Forecasting.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

A community detection algorithm based on discrete mixed fruit fly optimization.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

2020
Data Based Reconstruction of Duplex Networks.
SIAM J. Appl. Dyn. Syst., 2020

Age Estimation via Selecting Discriminated Features and Preserving Geometry.
KSII Trans. Internet Inf. Syst., 2020

A mixed attributes oriented dynamic SOM fuzzy cluster algorithm for mobile user classification.
Inf. Sci., 2020

Unsupervised Domain Adaptation Through Transferring both the Source-Knowledge and Target-Relatedness Simultaneously.
CoRR, 2020

CAFU: a Galaxy framework for exploring unmapped RNA-Seq data.
Briefings Bioinform., 2020

A Novel Configuration Tuning Method Based on Feature Selection for Hadoop MapReduce.
IEEE Access, 2020

Fast Recolor Prediction Scheme in Point Cloud Attribute Compression.
Proceedings of the 2020 IEEE International Conference on Visual Communications and Image Processing, 2020

Certificateless Aggregate Signature Scheme with High Efficencicy in Vehicular Ad-hoc Network.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Network Attack Detection Based on Kernel Principal Component Analysis and Decision Tree.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

Intelligent Cybersecurity Situational Awareness Model Based on Deep Neural Network.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

2019
Reconstructing of Networks With Binary-State Dynamics via Generalized Statistical Inference.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

A Novel Helmet Fitness Evaluation Device Based on the Flexible Pressure Sensor Matrix.
Sensors, 2019

A Collaborative Filtering Recommendation Algorithm Based on User Confidence and Time Context.
J. Electr. Comput. Eng., 2019

Mobility-based sinknode-aided routing in disaster network under the background of big data.
Clust. Comput., 2019

The Influence of Illuminance and Color Temperature on Target Dragging Task.
Proceedings of the Intelligent Human Systems Integration 2019, 2019

The Influence of Target Layout on Dragging Performance Based on Eye-Control Technique.
Proceedings of the Intelligent Human Systems Integration 2019, 2019

Evaluation of Helmet Comfort Based on Flexible Pressure Sensor Matrix.
Proceedings of the Intelligent Human Systems Integration 2019, 2019

GSCPM: CPM-Based Group Spamming Detection in Online Product Reviews.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Clinical Knowledge Graph Embeddings with Hierarchical Structure for Thyroid Treatment Recommendation.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Water Quality Prediction of Small Watershed Based on Wavelet Neural Network.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Weather Analysis to Predict Rice Pest Using Neural Network and D-S Evidential Theory.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Security Anlysis of Certificateless Aggregate Signature Scheme in VANETs.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

VRPSOFC: a framework for focused crawler using mutation improving particle swarm optimization algorithm.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Detecting review spammer groups in dynamic review networks.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
An improved belief propagation algorithm for detecting meso-scale structure in complex networks.
CoRR, 2018

Data based reconstruction of complex cyberphysical networks.
CoRR, 2018

PEA: an integrated R toolkit for plant epitranscriptome analysis.
Bioinform., 2018

Sparse Data-Based Urban Road Travel Speed Prediction Using Probabilistic Principal Component Analysis.
IEEE Access, 2018

A Focused Crawler Model Based on Mutation Improving Particle Swarm Optimization Algorithm.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Cryptography Teaching Based on Problem Oriented: Take the Knowledge Point of Designated Verifier Signature as an Example.
Proceedings of the 2nd International Conference on E-Education, 2018

Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

Online Taxi-Hailing Platform Using Blockchain Technology.
Proceedings of the Communications, Signal Processing, and Systems, 2018

A Congestion Control Protocol for Wireless Sensor Networks.
Proceedings of the Computational Data and Social Networks - 7th International Conference, 2018

Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

2017
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications.
Secur. Commun. Networks, 2017

改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier).
计算机科学, 2017

An Effective Strategy for Trait Combinations in Multiple-Trait Genomic Selection.
Proceedings of the Intelligent Computing Theories and Application, 2017

2016
A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks.
J. Sensors, 2016

Particle swarm optimization algorithm based on ontology model to support cloud computing applications.
J. Ambient Intell. Humaniz. Comput., 2016

A Unified Method of Detecting Core-Periphery Structure and Community Structure in Networks.
CoRR, 2016

Playing the role of weak clique property in link prediction: A friend recommendation model.
CoRR, 2016

Improving the performance of link prediction by adaptively exploiting multiple structural features of networks.
CoRR, 2016

Application of Machine Learning-Based Classification to Genomic Selection and Performance Improvement.
Proceedings of the Intelligent Computing Theories and Application, 2016

An undeniable strong DSVS scheme with no bilinear pairings.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
DNA sequence and structure properties analysis reveals similarities and differences to promoters of stress responsive genes in Arabidopsis thaliana.
Int. J. Data Min. Bioinform., 2015

A transmission protocol based on network coding in many-to-one delay tolerant networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015

Identifying influential spreaders in complex networks based on gravity formula.
CoRR, 2015

Modelling Individual Negative Emotion Spreading Process with Mobile Phones.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Design and implementation of a transmission protection protocol to improve the performance of wireless sensor networks in hybrid networks.
Int. J. Ad Hoc Ubiquitous Comput., 2014

Poster: social mobility based routing in crowdsourced systems.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Interference-aware channel allocation algorithm with game theoretic approach for cognitive radio networks.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Negative energy detector using cellphone bluetooth and contact list.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Overview of Routing Algorithm in Pocket Switched Networks.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Gaussian Process Machine Learning Based ITO Algorithm.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
Predicting transmission of avian influenza A viruses from avian to human by using informative physicochemical properties.
Int. J. Data Min. Bioinform., 2013

A novel two-layer SVM model in miRNA Drosha processing site detection.
BMC Syst. Biol., 2013

An approximation downlink bandwidth allocation scheme for IEEE 802.16 OFDMA system.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A cooperative MAC protocol based on 802.11 in wireless Ad hoc networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An Efficient Transmission Protocol Based on Network Coding in Delay Tolerant Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
KGBassembler: a karyotype-based genome assembler for <i>Brassicaceae</i> species.
Bioinform., 2012

Recognizing drosha processing sites by a two-step prediction model with structure and sequence information.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine, 2012

2011
Identification of true EST alignments for recognising transcribed regions.
Int. J. Data Min. Bioinform., 2011

A Fault-Tolerant Algorithm of Wireless Sensor Network Based on Recoverable Nodes.
Intell. Autom. Soft Comput., 2011

Accurately Predicting Transcription Start Sites Using Logitlinear Model and Local Oligonucleotide Frequencies.
Proceedings of the Bio-Inspired Computing and Applications, 2011

2009
Accurate Prediction of Alternatively Spliced Cassette Exons Using Evolutionary Conservation Information and Logitlinear Model.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

2006
Feature Mining and Integration for Improving the Prediction Accuracy of Translation Initiation Sites in Eukaryotic mRNAs.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

2005
Robust tracking control of space robots using fuzzy neural network.
Proceedings of the CIRA 2005, 2005


  Loading...