Xiaoqi Ma

Orcid: 0000-0003-0074-4192

According to our database1, Xiaoqi Ma authored at least 35 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Supercloseness analysis of the linear finite element method for a singularly perturbed convection-diffusion problem on Vulanović-Bakhvalov mesh.
Appl. Math. Lett., February, 2024

Supercloseness of the DDG method for a singularly perturbed convection diffusion problem on Shishkin mesh.
CoRR, 2024

2023
Supercloseness of the NIPG method for a singularly perturbed convection diffusion problem on Shishkin mesh in 2D.
Comput. Math. Appl., December, 2023

Supercloseness analysis of the nonsymmetric interior penalty Galerkin method for a singularly perturbed problem on Bakhvalov-type mesh.
Appl. Math. Lett., October, 2023

Supercloseness in a balanced norm of the NIPG method on Shishkin mesh for a reaction diffusion problem.
Appl. Math. Comput., May, 2023

Trust-based Approaches Towards Enhancing IoT Security: A Systematic Literature Review.
CoRR, 2023

Uniform convergence of optimal order of a local discontinuous Galerkin method on a Shishkin mesh under a balanced norm.
CoRR, 2023

Deep Learning in Breast Cancer Imaging: A Decade of Progress and Future Directions.
CoRR, 2023

Supercloseness of the NIPG method for a singularly perturbed convection diffusion problem on Shishkin mesh in 2D.
CoRR, 2023

Supercloseness analysis of the nonsymmetric interior penalty Galerkin method on Bakhvalov-type mesh.
CoRR, 2023

HM-PCGC: A Human-Machine Balanced Point Cloud Geometry Compression Scheme.
Proceedings of the IEEE International Conference on Image Processing, 2023

Scene Matters: Model-based Deep Video Compression.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
SC-Transformer++: Structured Context Transformer for Generic Event Boundary Detection.
CoRR, 2022

Foldingnet-Based Geometry Compression of Point Cloud with Multi Descriptions.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2022

Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2022

A Novel Approach to Identifying DDoS Traffic in the Smart Home Network via Exploratory Data Analysis.
AII, 2022

2021
Progress of graph model for conflict resolution in conflict analysis: A systematic review and bibliometrics research.
J. Intell. Fuzzy Syst., 2021

Supercloseness of the NIPG method for a singularly perturbed convection diffusion problem on Shishkin mesh.
CoRR, 2021

Exploring ensembles and uncertainty minimization in denoising networks.
CoRR, 2021

Finite element method on Shishkin mesh for a singularly perturbed problem with an interior layer.
Appl. Math. Lett., 2021

An Exploratory Data Analysis of the Network Behavior of Hive Home Devices.
Proceedings of the 8th International Conference on Internet of Things: Systems, 2021

Deep Gaussian Denoiser Epistemic Uncertainty and Decoupled Dual-Attention Fusion.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

2018
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation.
IEEE Trans. Inf. Forensics Secur., 2018

2013
Analysing and attacking the 4-way handshake of IEEE 802.11i standard.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2011
Database Deductive Access Control.
J. Comput., 2011

2009
On the Secure Sharing of Legacy Data.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Verifying security protocols by knowledge analysis.
Int. J. Secur. Networks, 2008

A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries.
Proceedings of the Global Healthgrid: e-Science Meets Biomedical Informatics, 2008

2007
A knowledge based approach to verifying cryptographic protocols.
PhD thesis, 2007

2006
Verifying and Fixing Password Authentication Protocol.
Proceedings of the Seventh International Conference on Software Engineering, 2006

2005
Formal verification of the Merchant Registration phase of the SET protocol.
Int. J. Autom. Comput., 2005

Proving secure properties of cryptographic protocols with knowledge based approach.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Knowledge Based Approach for Mechanically Verifying Security Protocols.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

A Mobile Agent Based Spam Filter System.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

An Agent Based Education Resource Purvey System.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...