Wanli Ma

Orcid: 0000-0002-6172-020X

According to our database1, Wanli Ma authored at least 131 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Knowledge Distillation for Road Detection based on cross-model Semi-Supervised Learning.
CoRR, 2024

2023
Noda iteration for computing generalized tensor eigenpairs.
J. Comput. Appl. Math., November, 2023

Perturbations of Tensor-Schur decomposition and its applications to multilinear control systems and facial recognitions.
Neurocomputing, August, 2023

DiverseNet: Decision Diversified Semi-supervised Semantic Segmentation Networks for Remote Sensing Imagery.
CoRR, 2023

Noda Iteration for Computing Generalized Tensor Eigenpairs.
CoRR, 2023

A novel approach for apple leaf disease image segmentation in complex scenes based on two-stage DeepLabv3+ with adaptive loss.
Comput. Electron. Agric., 2023

Confidence Guided Semi-Supervised Learning in Land Cover Classification.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

2022
AMM-FuseNet: Attention-Based Multi-Modal Image Fusion Network for Land Cover Mapping.
Remote. Sens., 2022

Corrigendum to "Research on regional differences and influencing factors of green technology innovation efficiency of China's high-tech industry" [J. Comput. Appl. Math. 369 (2020) 112597].
J. Comput. Appl. Math., 2022

High-precision Density Mapping of Marine Debris and Floating Plastics via Satellite Imagery.
CoRR, 2022

Reinforcement Learning Approach to Clear Paths of Robots in Elevator Environment.
CoRR, 2022

IoT Equipment Monitoring System Based on C5.0 Decision Tree and Time-Series Analysis.
IEEE Access, 2022

2021
Biometric recognition system performance measures for lossy compression on EEG signals.
Log. J. IGPL, 2021

Static Analysis for Android Malware detection with Document Vectors.
Proceedings of the 2021 International Conference on Data Mining, 2021

Exploiting the Dual-Tree Complex Wavelet Transform for Ship Wake Detection in SAR Imagery.
Proceedings of the IEEE International Conference on Acoustics, 2021

Key Nodes Evaluation in Opportunistic Networks Based on Influence Between Nodes.
Proceedings of the Wireless Sensor Networks - 15th China Conference, 2021

2020
Research on regional differences and influencing factors of green technology innovation efficiency of China's high-tech industry.
J. Comput. Appl. Math., 2020

Light Weight Automatic Modulation Classification for Edge Devices in Spectrum Sensing Wireless Networks.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020

Wavelet-based denoising for EEG-based pattern recognition systems.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Application of Deep Learning in Automated Meal Recognition.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

A Sparse Learning Based Detector with Enhanced Mismatched Signals Rejection Capabilities.
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020

Attribute Revocable Data Sharing Scheme Based on Blockchain and CP-ABE.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
A Study on Combining EEG Signals and Crytography for Bitcoin Security.
Aust. J. Intell. Inf. Process. Syst., 2019

EEG-Based Person Authentication with Variational Universal Background Model.
Proceedings of the Network and System Security - 13th International Conference, 2019

EEG-based Person Authentication System in Different Brain States.
Proceedings of the 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER), 2019

Deep Learning Approach to Biogeographical Ancestry Inference.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Investigating the effects of lossy compression on age, gender and alcoholic information in EEG signals.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

vUBM: A Variational Universal Background Model for EEG-Based Person Authentication.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

2018
A Study of Combined Lossy Compression and Person Identification on EEG Signals.
Proceedings of the International Joint Conference SOCO'18-CISIS'18-ICEUTE'18, 2018

On the Study of Impacts of Brain Conditions on EEG-based Cryptographic Key Generation Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

Emotional Influences on Cryptographic Key Generation Systems using EEG signals.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

A Study of Combined Lossy Compression and Seizure Detection on Epileptic EEG Signals.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018

Impact of lossy data compression techniques on EEG-based pattern recognition systems.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

2017
Random Number Generators Basedon EEG Non-linear and ChaoticCharacteristics.
J. Cyber Secur. Mobil., 2017

Decision tree algorithms for image data type identification.
Log. J. IGPL, 2017

Ownership protection of outsourced biomedical time series data based on optimal watermarking scheme in data mining.
Australas. J. Inf. Syst., 2017

EEG-Based Random Number Generators.
Proceedings of the Network and System Security - 11th International Conference, 2017

On The Study of EEG-based Cryptographic Key Generation.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Investigating The Impact Of Epilepsy On EEG-based Cryptographic Key Generation Systems.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

An intelligent learning-based watermarking scheme for outsourced biomedical time series data.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Wavelet transform and adaptive arithmetic coding techniques for EEG lossy compression.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Investigating the possibility of applying EEG lossy compression to EEG-based user authentication.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Experimental Study on the Effects of Watermarking Techniques on EEG-Based Application System Performance.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Learning Concept Graphs from Online Educational Data.
J. Artif. Intell. Res., 2016

High-Frequency and ETP-Efficient Range-Matching Scheme.
Circuits Syst. Signal Process., 2016

Fuzzy Kernel Stochastic Gradient Descent machines.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

A proposed pattern recognition framework for EEG-based smart blind watermarking system.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

2015
Tensor decomposition and application in image classification with histogram of oriented gradients.
Neurocomputing, 2015

Concept Graph Learning from Educational Data.
Proceedings of the Eighth ACM International Conference on Web Search and Data Mining, 2015

A study on the stability of EEG signals for user authentication.
Proceedings of the 7th International IEEE/EMBS Conference on Neural Engineering, 2015

Least square Support Vector Machine for large-scale dataset.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Graph-based semi-supervised Support Vector Data Description for novelty detection.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Enhancing Performance of EEG-based Emotion Recognition Systems Using Feature Smoothing.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

A Proposed Blind DWT-SVD Watermarking Scheme for EEG Data.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Analysing the Robust EEG Channel Set for Person Authentication.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

A Locality Preserving Approach for Kernel PCA.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Conditional Entropy Approach to Multichannel EEG-Based Person Identification.
Proceedings of the International Joint Conference, 2015

Investigating the Impacts of Brain Conditions on EEG-Based Person Identification.
Proceedings of the International Joint Conference, 2015

A New Approach to Compressed File Fragment Identification.
Proceedings of the International Joint Conference, 2015

2014
Semantic Similarity Measure Using Relational and Latent Topic Features.
Int. J. Comput. Linguistics Appl., 2014

EEG-Based User Authentication Using Artifacts.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

A New Approach to Executable File Fragment Detection in Network Forensics.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Proposed Approach to Compound File Fragment Identification.
Proceedings of the Network and System Security - 8th International Conference, 2014

Efficient Structured Matrix Rank Minimization.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Investigating the impacts of epilepsy on EEG-based person identification systems.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Multi-factor EEG-based user authentication.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Using EEG artifacts for BCI applications.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Robust Support Vector Machine.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

A Novel Sphere-Based Maximum Margin Classification Method.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

The impact of data fragment sizes on file type recognition.
Proceedings of the 10th International Conference on Natural Computation, 2014

An approach to detect network attacks applied for network forensics.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Tensor decomposition of dense SIFT descriptors in object recognition.
Proceedings of the 22th European Symposium on Artificial Neural Networks, 2014

Using Shannon Entropy as EEG Signal Feature for Fast Person Identification.
Proceedings of the 22th European Symposium on Artificial Neural Networks, 2014

2013
Proximity multi-sphere support vector clustering.
Neural Comput. Appl., 2013

EEG-Based Person Verification Using Multi-Sphere SVDD and UBM.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Fuzzy Multi-Sphere Support Vector Data Description.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Motor Imagery EEG-Based Person Verification.
Proceedings of the Advances in Computational Intelligence, 2013

Parallel Support Vector Data Description.
Proceedings of the Advances in Computational Intelligence, 2013

Object recognition in a context-aware application.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Fuzzy entropy semi-supervised support vector data description.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Maximal margin learning vector quantisation.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

A general aggregate model for improving multi-class brain-computer interface systems' performance.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Improved HOG Descriptors in Image Classification with CP Decomposition.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

A Study on the Feasibility of Using EEG Signals for Authentication Purpose.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

EEG-Based Age and Gender Recognition Using Tensor Decomposition and Speech Features.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

EEG-Based User Authentication in Multilevel Security Systems.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
A hierarchical geostatistical model of walking style variety.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

A unified model for support vector machine and support vector data description.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Deterministic Annealing Multi-Sphere Support Vector Data Description.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

A Comprehensive Survey of the Feature Extraction Methods in the EEG Research.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

Fuzzy Multi-sphere Support Vector Data Description.
Proceedings of the FUZZ-IEEE 2012, 2012

2011
Impact of restrictive composition policy on user password choices.
Behav. Inf. Technol., 2011

Multiple Distribution Data Description Learning Algorithm for Novelty Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Grammatical Dependency-Based Relations for Term Weighting in Text Classification.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2011

Multiple distribution data description learning method for novelty detection.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

Multi-Sphere Support Vector Clustering.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

A Novel Parameter Refinement Approach to One Class Support Vector Machine.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Generalised Support Vector Machine for Brain-Computer Interface.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Concentration Distribution of PAHs in the Filter and Foam from the Air.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Adaptable Term Weighting Framework for Text Classification.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2011

A New Term Ranking Method based on Relation Extraction and Graph Model for Text Classification.
Proceedings of the Thirty-Fourth Australasian Computer Science Conference, 2011

2010
Modeling Style and Variation in Human Motion.
Proceedings of the 2010 Eurographics/ACM SIGGRAPH Symposium on Computer Animation, 2010

Password Entropy and Password Quality.
Proceedings of the Fourth International Conference on Network and System Security, 2010

An optimal sphere and two large margins approach for novelty detection.
Proceedings of the International Joint Conference on Neural Networks, 2010

A Theoretical Framework for Multi-sphere Support Vector Data Description.
Proceedings of the Neural Information Processing. Models and Applications, 2010

Fuzzy feature weighting techniques for vector quantisation.
Proceedings of the FUZZ-IEEE 2010, 2010

A new support vector machine method for medical image classification.
Proceedings of the 2nd European Workshop on Visual Information Processing, 2010

A practical study on shape space and its occupancy in negative selection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
Fuzzy Subspace Hidden Markov Models for Pattern Recognition.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009

A Multi-agent Security Architecture.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Automated network feature weighting-based intrusion detection systems.
Proceedings of the 3rd IEEE International Conference on System of Systems Engineering, 2008

Automated network feature weighting-based anomaly detection.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A study on the feature selection of network traffic for intrusion detection purpose.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Negative Selection with Antigen Feedback in Intrusion Detection.
Proceedings of the Artificial Immune Systems, 7th International Conference, 2008

2007
Handwriting Recognition Applications for Tablet PCs.
J. Adv. Comput. Intell. Intell. Informatics, 2007

Fuzzy Observable Markov Models for Pattern Recognition.
J. Adv. Comput. Intell. Intell. Informatics, 2007

The Good and Not So Good of Enforcing Password Composition Rules.
Inf. Secur. J. A Glob. Perspect., 2007

A Multi-agent Security Framework for e-Health Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Using Tuple Space to Coordinate Multiagent Activities.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Fuzzy Normalisation Methods for Typist Verification.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

On Extendable Software Architecture for Spam Email Filtering.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Possibility Theory-Based Approach to Spam Email Detection.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Fuzzy Vector Quantization for Network Intrusion Detection.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

2006
A Novel Approach to Programming: Agent Based Software Engineering.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Using Windows Printer Drivers for Solaris Applications - An Application of Multiagent System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Detecting Image Based Spam Email.
Proceedings of the Advances in Hybrid Information Technology, 2006

2005
On an IT Security Framework.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Multiple Agents Based Intrusion Detection System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

1996
Programming with transactions and chemical abstract machine.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996

1994
Graphical Assistance in Parallel Program Development.
Proceedings of the Proceedings IEEE Symposium on Visual Languages, 1994

An Overview of Temporal and Modal Logic Programming.
Proceedings of the Temporal Logic, First International Conference, 1994


  Loading...