Xinyi Ma

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Algorithmic Modeling of Generation Z's Therapeutic Toys Consumption Behavior in an Emotional Economy Context.
Algorithms, 2025

UAV Trajectory Optimization for Radio Map Updating: A Transformer-Based DRL Approach.
Proceedings of the 101st IEEE Vehicular Technology Conference, 2025

2024
Wave Height Mapping From HF Radar-Measured Surface Current Data Based on a Cascaded LSTM Network.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

A recommendation approach of scientific non-patent literature on the basis of heterogeneous information network.
J. Informetrics, 2024

Recognition of vehicle license plates in highway scenes with deep fusion network and connectionist temporal classification.
IET Image Process., 2024

An EMI Reduction Charge Pump With a Hybrid Modulation Technique for Motor Drive Applications in 0.18 um BCD Process.
IEEE Access, 2024

Research on Methods of Vehicle Image Retrieval in Expressway Scenarios Based on Deep Learning Neural Network.
Proceedings of the 8th International Conference on Robotics, Control and Automation, 2024

Research on Methods of Pavement Distress Detection Based on Object Detection Convolutional Neural Network.
Proceedings of the 8th International Conference on Robotics, Control and Automation, 2024

MetaGXplore: Integrating Multi-Omics Data with Graph Convolutional Networks for Pan-cancer Patient Metastasis Identification.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2024

2023
Deep Siamese Multi-level Feature Network for VIS and NIR Image Matching.
Proceedings of the 2nd International Conference on Signal Processing, 2023

Age of Information in UAV-Assisted Real-Time IoT Systems with Obstacle Avoidance.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2020
The Influence of the Reform of Entrance Examination on University Development.
Proceedings of the Human Centered Computing - 6th International Conference, 2020

2008
A Network Security Risk Assessment Framework Based on Game Theory.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...