Jixin Ma

Orcid: 0000-0001-7458-7412

Affiliations:
  • University of Greenwich, School of Computing and Mathematical Sciences, London, UK (PhD 1994)


According to our database1, Jixin Ma authored at least 98 papers between 1992 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cross-directional consistency network with adaptive layer normalization for multi-spectral vehicle re-identification and a high-quality benchmark.
Inf. Fusion, December, 2023

Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud.
Inf. Sci., October, 2023

Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices.
IEEE Internet Things J., August, 2023

A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree.
Comput. J., January, 2023

Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing.
Comput. J., January, 2023

Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting.
IEEE Trans. Serv. Comput., 2023

Robust Zero-Watermarking Algorithm for Medical Images Based on AGAST-LATCH and DCT.
Proceedings of the 25th ACIS International Winter Conference on Software Engineering, 2023

Robust Zero-watermarking Algorithm for Medical Images Based on ORB and DCT.
Proceedings of the 25th ACIS International Winter Conference on Software Engineering, 2023

Robust Zero-watermarking Algorithm for Medical Images Based on GFTT-KAZE and DCT.
Proceedings of the 25th ACIS International Winter Conference on Software Engineering, 2023

SCALA: Scaling algorithm for multi-class imbalanced classification: A novel algorithm specifically designed for multi-class multiple minority imbalanced data problems.
Proceedings of the 8th International Conference on Machine Learning Technologies, 2023

Improved YOLOV5 based industrial surface defect detection method.
Proceedings of the International Conference on Computers, 2023

2022
Robust medical zero-watermarking algorithm based on Residual-DenseNet.
IET Biom., November, 2022

Robust zero-watermarking algorithm for medical images based on <i>K</i>-means and DCT.
Int. J. Wirel. Mob. Comput., 2022

WSC-Trans: A 3D network model for automatic multi-structural segmentation of temporal bone CT.
CoRR, 2022

Multi-spectral Vehicle Re-identification with Cross-directional Consistency Network and a High-quality Benchmark.
CoRR, 2022

A Model of Integrating Bert and BiGRU+ Attention Dual-channel Mechanism for Investor Sentiment Analysis of Stock Price Forecast.
Proceedings of the 24th IEEE/ACIS International Conference on Software Engineering, 2022

Robust Multi-watermarking Algorithm for Medical Images Using Patchwork-DCT.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Temporal Aspects in Big Data: Keynote Address.
Proceedings of the 7th IEEE/ACIS International Conference on Big Data, 2022

2021
Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT.
IEEE Trans. Cloud Comput., 2021

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021

A Machine Learning Approach to Predict the Trend of Obesity Prevalence at a Global Level.
Proceedings of the 6th IEEE/ACIS International Conference on Big Data, 2021

2020
An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space.
Neural Comput. Appl., 2020

The Effect That Auditory Distractions Have on a Visual P300 Speller While Utilizing Low-Cost Off-the-Shelf Equipment.
Comput., 2020

Robust Watermarking Algorithm for Medical Volume Data in Internet of Medical Things.
IEEE Access, 2020

Impact of Mental Fatigue during Repetitive Exercises of a Visual P300 Speller.
Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2020), 2020

Improving the performance of the Proof-of-Work Consensus Protocol Using Machine learning.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

2019
Fuzzy matching: multi-authority attribute searchable encryption without central authority.
Soft Comput., 2019

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks.
Sensors, 2019

A Secure Data Sharing Scheme with Designated Server.
Secur. Commun. Networks, 2019

A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment.
Secur. Commun. Networks, 2019

Contourlet-DCT based multiple robust watermarkings for medical images.
Multim. Tools Appl., 2019

Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud.
Int. J. Digit. Crime Forensics, 2019

An improved scheme for outsourced computation with attribute-based encryption.
Concurr. Comput. Pract. Exp., 2019

A Novel Distance Learning for Elastic Cross-Modal Audio-Visual Matching.
Proceedings of the IEEE International Conference on Multimedia & Expo Workshops, 2019

Comparison between a Passive and Active response task and their effect on the Amplitude and Latency of the P300 component for Visual Stimuli while using Low Fidelity Equipment.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

The Effect That an Auditory Distraction with Differing Levels of Intensity Have on a Visual P300 Speller While Utilizing Low Fidelity Equipment: Alongside the Development of a Taxonomy.
Proceedings of the 3rd International Conference on Computer-Human Interaction Research and Applications, 2019

Taxonomized Auditory Distractions with Varying Intensity Levels and Their Effect on a Visual P300 Speller While Utilising Low-Cost off-the-Shelf Equipment.
Proceedings of the Computer-Human Interaction Research and Applications, 2019

The Effect that Auxiliary Taxonomized Auditory Distractions have on a P300 Speller while utilising Low Fidelity Equipment.
Proceedings of the 11th Computer Science and Electronic Engineering Conference, 2019

2018
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication.
Secur. Commun. Networks, 2018

A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations.
Int. J. Softw. Innov., 2018

A prior regularized multi-layer graph ranking model for image saliency computation.
Neurocomputing, 2018

Sensor selection scheme in activity recognition based on hierarchical feature reduction.
Int. J. Distributed Sens. Networks, 2018

Golf swing classification with multiple deep convolutional neural networks.
Int. J. Distributed Sens. Networks, 2018

Presenting and Matching Time Series and State Sequences.
Proceedings of the 16th IEEE International Conference on Software Engineering Research, 2018

A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

A confidentiality preserving publicly verifiable computation for multivariate polynomials.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

The Public Verifiability of Public Key Encryption with Keyword Search.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Transfer Learning with Manifold Regularized Convolutional Neural Network.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Securely Outsourcing Decentralized Multi-authority Attribute Based Signature.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Differential Privacy of Big Data: An Overview.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Development of Temporal Logic-Based Fuzzy Decision Support System for Diagnosis of Acute Rheumatic Fever/Rheumatic Heart Disease.
Proceedings of the Research and Development in Intelligent Systems XXXII, 2015

2014
A Dynamic Multiple Digital Watermarking Model based on Temporal Series.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Using Structural Similarity for Effective Retrieval of Knowledge from Class Diagrams.
Proceedings of the Research and Development in Intelligent Systems XXX, 2013

A Fuzzy Logic-Based Decision Support System for the Diagnosis of Arthritis Pain for Rheumatic Fever Patients.
Proceedings of the Research and Development in Intelligent Systems XXX, 2013

Formulating the Temporal Causal Relationships Between Events and Their Results.
Proceedings of the Research and Development in Intelligent Systems XXX, 2013

2012
Matching State-Based Sequences with Rich Temporal Aspects.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Temporal model for business process.
Intell. Decis. Technol., 2011

Temporal Ordered Image Encryption.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

2010
Structure Based Feature Extraction in Basketball Zone-Defense Strategies.
Int. J. Comput. Sci. Appl., 2010

Efficient and Effective State-based Framework for News Video Retrival.
Int. J. Adv. Comp. Techn., 2010

BMQE System - A MQ Equations System based on Ergodic Matrix.
Proceedings of the SECRYPT 2010, 2010

A Case Based Reasoning Approach for the Monitoring of Business Workflows.
Proceedings of the Case-Based Reasoning. Research and Development, 2010

Providing Explanations for the Intelligent Monitoring of Business Workflows Using Case-Based Reasoning.
Proceedings of the Explanation-aware Computing, 2010

Cryptanalysis of the Bisectional MQ Equations System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A Robust Approach to Subsequence Matching.
Proceedings of the Software Engineering Research, 2009

Character-angle based video annotation.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009

Temporal Pattern Recognition in Video Clips Detection.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
A Sound and Complete Reified Temporal Logic.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

An Ontological Characterization of Time-Series and State-Sequences for Data Mining.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Deriving Explanations From Partial Temporal Information.
Proceedings of the Explanation-aware Computing, 2008

2007
Ontological considerations of time, meta-predicates and temporal propositions.
Appl. Ontology, 2007

State-based Time-Series Analysis and Prediction.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Image Content Authentication Algorithm Based on Laplace Spectra Feature.
Proceedings of the Third International Conference on Natural Computation, 2007

Using Eigen-Decomposition Method for Weighted Graph Matching.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Matching Scenarios Patterns by Using Linear Programming.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Navigation-based Algorithm for Matching Scenario Patterns.
Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition, 2007

2006
Primitive Intervals versus Point-Based Intervals: Rivals or Allies?
Comput. J., 2006

Event Models for Tumor Classification with SAGE Gene Expression Data.
Proceedings of the Computational Science, 2006

Support Vector Machines for Regression and Applications to Software Quality Prediction.
Proceedings of the Computational Science, 2006

Using Set Operations to Deal with the Frame Problem.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

2005
Visualizing a Temporal Consistence Checker.
Proceedings of the 9th International Conference on Information Visualisation, 2005

Representing and Recognizing Scenario Patterns.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

2003
Representing The Dividing Instant.
Comput. J., 2003

Identification and Doing Without It, V: A Formal Mathematical Analysis for a Case of Mix-Up of Individuals, and of Recovery from Failure to Attain Identification.
Cybern. Syst., 2003

A Framework for Historical Case-Based Reasoning.
Proceedings of the Case-Based Reasoning Research and Development, 2003

2001
Reified Temporal Logics: An Overview.
Artif. Intell. Rev., 2001

1999
Temporal representation of state transitions.
Artif. Intell. Eng. Des. Anal. Manuf., 1999

1997
Representing Temporal Relationships between Events and their Effects.
Proceedings of the 4th International Workshop on Temporal Representation and Reasoning, 1997

1996
A Reified Temporal Logic.
Comput. J., 1996

1994
Towards a general temporal theory.
PhD thesis, 1994

A Revised Theory of Action and Time Based on Intervals and Points.
Comput. J., 1994

A General Temporal Theory.
Comput. J., 1994

A Temporal Database Model Supporting Relative and Absolute Time.
Comput. J., 1994

1993
An extended temporal system based on points and intervals.
Inf. Syst., 1993

Time representation: A taxonomy of temporal models.
Artif. Intell. Rev., 1993

1992
A General Temporal Model Supporting Duration Reasoning.
AI Commun., 1992


  Loading...