Liangli Ma

According to our database1, Liangli Ma authored at least 30 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
DTGCN: a method combining dependency tree and graph convolutional networks for Chinese long-interval named entity relationship extraction.
J. Ambient Intell. Humaniz. Comput., October, 2023

2022
GAIN: A Gated Adaptive Feature Interaction Network for Click-Through Rate Prediction.
Sensors, 2022

An Improved ACS Algorithm by CA for Task Scheduling in Heterogeneous Multiprocessing Environments.
Proceedings of the Theoretical Computer Science - 40th National Conference, 2022

Analysis and Example Implementation of Data Visualization Technology.
Proceedings of the ICMVA 2022: The 5th International Conference on Machine Vision and Applications, Singapore, February 18, 2022

Research on Locking Suspect by Using Mathematical Model.
Proceedings of the ICCDE 2022: The 8th International Conference on Computing and Data Engineering, Bangkok, Thailand, January 11, 2022

2019
DFTHR: A Distributed Framework for Trajectory Similarity Query Based on HBase and Redis.
Inf., 2019

THBase: A Coprocessor-Based Scheme for Big Trajectory Data Management.
Future Internet, 2019

Combined Self-Attention Mechanism for Chinese Named Entity Recognition in Military.
Future Internet, 2019

Pruning Optimization over Threshold-Based Historical Continuous Query.
Algorithms, 2019

A watermark-based in situ access-control model for image big data.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2017
减少重建数据量的冗余编码技术研究 (Researches of Redundancy Coding Technologies on Reducing Reconstruction Data Amount).
计算机科学, 2017

2016
Web service QoS prediction by neighbor information combined non-negative matrix factorization.
J. Intell. Fuzzy Syst., 2016

2014
An Efficient Discrete Invasive Weed Optimization Algorithm for Web Services Selection.
J. Softw., 2014

LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing.
Int. J. Internet Protoc. Technol., 2014

2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
Int. J. Distributed Sens. Networks, 2013

LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.
Int. J. Distributed Sens. Networks, 2013

APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks.
Int. J. Distributed Sens. Networks, 2013

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid.
Int. J. Distributed Sens. Networks, 2013

2012
Comparing General Paradigms on Data Secrecy Protection for Outsourced Files in Mobile Cloud Computing.
J. Networks, 2012

uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

An Equipment Failure Prediction Accuracy Improvement Method Based on the Gray GM(1, 1) Model.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2009
Construct Fault Diagnosis Model Based on Fault Dependency Relationship Matrix.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

A Fault Detection and Isolation Model Based on Conditional Finite State Machine for Gas Turbine.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2007
Construct Metadata Based on Change Model Using for Component-Based Software Regression Testing.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration Testing.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Construct Metadata Model based on Coupling Information to Increase the Testability of Component-based Software.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Constructing a Reference Model of a Grouped-Metadata Object and Its Change Model.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
The Research and Design of Layered-metadata used for Component-based Software Testing.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

The Design of Dependency Relationships Matrix to improve the testability of Component-based Software.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

Using Component Metadata based on Dependency Relationships Matrix to improve the Testability of Component-based Software.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006


  Loading...