Jun Ma

Orcid: 0000-0003-2258-0854

Affiliations:
  • National University of Defense Technology, College of Computer, Changsha, China


According to our database1, Jun Ma authored at least 52 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SWEA: Changing Factual Knowledge in Large Language Models via Subject Word Embedding Altering.
CoRR, 2024

2023
When Database Meets New Storage Devices: Understanding and Exposing Performance Mismatches via Configurations.
Proc. VLDB Endow., 2023

MulCS: Towards a Unified Deep Representation for Multilingual Code Search.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Dynamic Multi-View Fusion Mechanism for Chinese Relation Extraction.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

QAE: A Hard-Label Textual Attack Considering the Comprehensive Quality of Adversarial Examples.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

A Novel Ranking Method for Textual Adversarial Attack.
Proceedings of the 6th International Conference on Machine Learning and Natural Language Processing, 2023

WMWatcher: Preventing Workload-Related Misconfigurations in Production Environment.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Textual adversarial attacks by exchanging text-self words.
Int. J. Intell. Syst., December, 2022

S-NER: A Concise and Efficient Span-Based Model for Named Entity Recognition.
Sensors, 2022

A novel bundling learning paradigm for named entity recognition.
Knowl. Based Syst., 2022

Towards an Efficient and Robust Adversarial Attack Against Neural Text Classifier.
Int. J. Pattern Recognit. Artif. Intell., 2022

Span-based joint entity and relation extraction augmented with sequence tagging mechanism.
CoRR, 2022

A Two-Phase Paradigm for Joint Entity-Relation Extraction.
CoRR, 2022

A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search.
CoRR, 2022

Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes.
CoRR, 2022

Win-Win Cooperation: Bundling Sequence and Span Models for Named Entity Recognition.
CoRR, 2022

A Simple and Efficient Object-Capability Revocation Method.
Proceedings of the ITCC 2022: 4th International Conference on Information Technology and Computer Communications, Guangzhou, China, June 23, 2022

KylinTune: DQN-based Energy-efficient Model for Browser in Mobile Devices.
Proceedings of the IEEE International Performance, 2022

Topic-Grained Text Representation-Based Model for Document Retrieval.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Extending Take-Grant Model for More Flexible Privilege Propagation.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Boosting Span-based Joint Entity and Relation Extraction via Squence Tagging Mechanism.
CoRR, 2021

FastDCF: A Partial Index Based Distributed and Scalable Near-Miss Code Clone Detection Approach for Very Large Code Repositories.
Proceedings of the Parallel and Distributed Computing, Applications and Technologies, 2021

Combating Word-level Adversarial Text with Robust Adversarial Training.
Proceedings of the International Joint Conference on Neural Networks, 2021

Many-To-Many Chinese ICD-9 Terminology Standardization Based on Neural Networks.
Proceedings of the Intelligent Computing Theories and Application, 2021

A Unified Summarization Model with Semantic Guide and Keyword Coverage Mechanism.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Hierarchical Encoder-Decoder Summary Model with an Instructor for Long Academic Papers.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Build real-time communication for hybrid dual-OS system.
J. Syst. Archit., 2020

Research on Chinese medical named entity recognition based on collaborative cooperation of multiple neural network models.
J. Biomed. Informatics, 2020

Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Span-based Joint Entity and Relation Extraction with Attention-based Span-specific and Contextual Semantic Representations.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2019
Tenant-Oriented Monitoring for Customized Security Services in the Cloud.
Symmetry, 2019

Work-in-Progress: Real-Time RPC for Hybrid Dual-OS System.
Proceedings of the IEEE Real-Time Systems Symposium, 2019

CLASC: A Changelog Based Automatic Code Source Classification Method for Operating System Packages.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2017
上下文敏感的控制流完整性保护的改进方法 (Improved Method of Context-sensitive Control Flow Integrity Protection).
计算机科学, 2017

UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk.
KSII Trans. Internet Inf. Syst., 2017

Efficient CP-ABE with Non-monotonic Access Structures.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
ERPC: An Edge-Resources Based Framework to Reduce Bandwidth Cost in the Personal Cloud.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

ROP-Hunt: Detecting Return-Oriented Programming Attacks in Applications.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

An Optimized DHT for Linux Package Distribution.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

A novel optimization scheme for caching in locality-aware P2P networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
REPS: 一种高效的容错并行概率流Skyline查询方法 (REPS: An Efficient Fault-tolerant Approach for Parallel Skyline Queries over Probabilistic Data Streams).
计算机科学, 2015

基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks).
计算机科学, 2015

2013
Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage.
J. Zhejiang Univ. Sci. C, 2013

2011
SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An Active Data Leakage Prevention Model for Insider Threat.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

Mailbook: privacy-protecting social networking via email.
Proceedings of the ICIMCS 2011, 2011

2008
Research of a Secure File System for Protection of Intellectual Property Right.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

2005
Research on Fuzzy Group Decision Making in Security Risk Assessment.
Proceedings of the Networking, 2005


  Loading...