default search action
Zhen Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j44]Weiqiang Ni, Dan Wei, Zequn Peng, Zhen Ma, Songming Zhu, Rong Tang, Xuelei Tian, Jian Zhao, Zhangying Ye:
An appetite assessment method for fish in outdoor ponds with anti-shadow disturbance. Comput. Electron. Agric. 221: 108940 (2024) - [j43]Tianyun Shi, Pengyue Guo, Rui Wang, Zhen Ma, Wanpeng Zhang, Wentao Li, Huijin Fu, Hao Hu:
A Survey on Multi-Sensor Fusion Perimeter Intrusion Detection in High-Speed Railways. Sensors 24(17): 5463 (2024) - 2023
- [j42]Yihan Meng, He Xu, Zhen Ma, Jiaqiang Zhou, Daquan Hui:
Detail-semantic guide network based on spatial attention for surface defect detection with fewer samples. Appl. Intell. 53(6): 7022-7040 (2023) - [j41]Min Zhang, Wen Lin, Zhen Ma, Jun Yang, Yan Zhang:
Users' health information sharing intention in strong ties social media: context of emerging markets. Libr. Hi Tech 41(3): 853-876 (2023) - [j40]Vahid Hajihashemi, Abdorreza Alavi Gharahbagh, Azam Bastanfard, Hugo S. Oliveira, Gonçalo Almeida, Zhen Ma, João Manuel R. S. Tavares:
A Hierarchical modified AV1 codec for compression cartesian form of holograms in holo and object planes. Multim. Tools Appl. 82(6): 8303-8321 (2023) - [j39]Wenzhe Bi, Li Tian, Chao Li, Zhen Ma, Haiyang Pan:
Wind-induced failure analysis of a transmission tower-line system with long-term measured data and orientation effect. Reliab. Eng. Syst. Saf. 229: 108875 (2023) - [j38]Wenzhe Bi, Li Tian, Chao Li, Zhen Ma:
A Kriging-based probabilistic framework for multi-hazard performance assessment of transmission tower-line systems under coupled wind and rain loads. Reliab. Eng. Syst. Saf. 240: 109615 (2023) - 2022
- [j37]Zhi-Ping Tang, Zhen Ma, Yun He, Ruo-Chuan Liu, Bin-Bin Jin, Dong-Yue Wen, Rong Wen, Hai-Hui Yin, Cheng-Cheng Qiu, Rui-Zhi Gao, Yan Ma, Hong Yang:
Ultrasound-based radiomics for predicting different pathological subtypes of epithelial ovarian cancer before surgery. BMC Medical Imaging 22(1): 147 (2022) - 2021
- [j36]Zhen Ma, José J. M. Machado, João Manuel R. S. Tavares:
Weakly Supervised Video Anomaly Detection Based on 3D Convolution and LSTM. Sensors 21(22): 7508 (2021) - 2020
- [j35]Jinying Lin, Zhen Ma, Randy Gomez, Keisuke Nakamura, Bo He, Guangliang Li:
A Review on Interactive Reinforcement Learning From Human Social Feedback. IEEE Access 8: 120757-120765 (2020) - [j34]Zhen Ma:
Reachability Analysis of Neural Masses and Seizure Control Based on Combination Convolutional Neural Network. Int. J. Neural Syst. 30(1): 1950023:1-1950023:15 (2020) - 2019
- [j33]Zhen Ma, Qiang Li, Xiangyu Meng:
Discovering Suspicious APT Families Through a Large-Scale Domain Graph in Information-Centric IoT. IEEE Access 7: 13917-13926 (2019) - [j32]Zhen Ma, Tian Tian, Wenfeng Qi:
A New Distinguishing Attack on Grain-V1 with 111 Initialization Rounds. J. Syst. Sci. Complex. 32(3): 970-984 (2019) - [j31]Xinyang Jiang, Qiang Li, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo:
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. Peer-to-Peer Netw. Appl. 12(5): 1385-1402 (2019) - [j30]Zhen Ma, Xiyuan Chen:
Fiber Bragg Gratings Sensors for Aircraft Wing Shape Measurement: Recent Applications and Technical Analysis. Sensors 19(1): 55 (2019) - 2018
- [j29]Yu-Jie Dong, Tian Tian, Wen-Feng Qi, Zhen Ma:
The adjacency graphs of FSRs with a class of affine characteristic functions. Finite Fields Their Appl. 53: 21-35 (2018) - [j28]Zhen Ma:
Neurophysiological Analysis of the Genesis Mechanism of EEG During the Interictal and Ictal Periods Using a Multiple Neural Masses Model. Int. J. Neural Syst. 28(1): 1750027:1-1750027:14 (2018) - [j27]Xipeng Pan, Dengxian Yang, Lingqiao Li, Zhenbing Liu, Huihua Yang, Zhiwei Cao, Yubei He, Zhen Ma, Yiyi Chen:
Cell detection in pathology and microscopy images with multi-scale fully convolutional neural networks. World Wide Web 21(6): 1721-1743 (2018) - 2017
- [j26]Zhen Ma, João Manuel R. S. Tavares:
Effective features to classify skin lesions in dermoscopic images. Expert Syst. Appl. 84: 92-101 (2017) - [j25]Zhen Ma, Tian Tian, Wen-Feng Qi:
Improved conditional differential attacks on Grain v1. IET Inf. Secur. 11(1): 46-53 (2017) - [j24]Zhen Ma, Tian Tian, Wen-Feng Qi:
Conditional differential attacks on Grain-128a stream cipher. IET Inf. Secur. 11(3): 139-145 (2017) - [j23]Zhen Ma, Tian Tian, Wen-Feng Qi:
Internal state recovery of Grain v1 employing guess-and-determine attack. IET Inf. Secur. 11(6): 363-368 (2017) - [j22]Zhen Ma, De-gan Zhang, Jie Chen, Yuexian Hou:
Shadow detection of moving objects based on multisource information in Internet of things. J. Exp. Theor. Artif. Intell. 29(3): 649-661 (2017) - 2016
- [j21]Roberta B. Oliveira, Mercedes E. Filho, Zhen Ma, João P. Papa, Aledir Silveira Pereira, João Manuel R. S. Tavares:
Computational methods for the image segmentation of pigmented skin lesions: A review. Comput. Methods Programs Biomed. 131: 127-141 (2016) - [j20]Zhen Ma, De-gan Zhang, Si Liu, Wen-bin Li:
New AODV Routing Method for Mobile Wireless Mesh Network (MWMN). Intell. Autom. Soft Comput. 22(3): 431-438 (2016) - [j19]Xiangwei Bu, Xiaoyan Wu, Zhen Ma, Rui Zhang, Jiaqi Huang:
Novel auxiliary error compensation design for the adaptive neural control of a constrained flexible air-breathing hypersonic vehicle. Neurocomputing 171: 313-324 (2016) - [j18]Xiangwei Bu, Xiaoyan Wu, Jiaqi Huang, Zhen Ma, Rui Zhang:
Minimal-learning-parameter based simplified adaptive neural back-stepping control of flexible air-breathing hypersonic vehicles without virtual controllers. Neurocomputing 175: 816-825 (2016) - [j17]Xiangwei Bu, Xiaoyan Wu, Rui Zhang, Zhen Ma, Jiaqi Huang:
A neural approximation-based novel back-stepping control scheme for air-breathing hypersonic vehicles with uncertain parameters. J. Syst. Control. Eng. 230(3): 231-243 (2016) - [j16]Zhen Ma, João Manuel R. S. Tavares:
A Novel Approach to Segment Skin Lesions in Dermoscopic Images Based on a Deformable Model. IEEE J. Biomed. Health Informatics 20(2): 615-623 (2016) - [j15]Zhen Ma, Gongpu Wang, Yulong Zou, Bo Ai:
Joint sensing and transmission for cognitive amplify-and-forward two-way relay networks. Wirel. Commun. Mob. Comput. 16(17): 2809-2823 (2016) - 2015
- [j14]Zhen Ma, Weidong Zhou, Yanli Zhang, Shujuan Geng:
Epileptogenic zone localization and seizure control in coupled neural mass models. Biol. Cybern. 109(6): 671-683 (2015) - [j13]Zhen Ma, Wen-Feng Qi, Tian Tian:
On affine sub-families of the NFSR in Grain. Des. Codes Cryptogr. 75(2): 199-212 (2015) - [j12]Cheng Lu, Zhen Ma, Mrinal Mandal:
Automated segmentation of the epidermis area in skin whole slide histopathological images. IET Image Process. 9(9): 735-742 (2015) - [j11]Xiangwei Bu, Xiaoyan Wu, Zhen Ma, Rui Zhang:
Nonsingular direct neural control of air-breathing hypersonic vehicle via back-stepping. Neurocomputing 153: 164-173 (2015) - [j10]Xiangwei Bu, Xiaoyan Wu, Rui Zhang, Zhen Ma, Jiaqi Huang:
Tracking differentiator design for the robust backstepping control of a flexible air-breathing hypersonic vehicle. J. Frankl. Inst. 352(4): 1739-1765 (2015) - [j9]Mercedes E. Filho, Zhen Ma, João Manuel R. S. Tavares:
A Review of the Quantification and Classification of Pigmented Skin Lesions: From Dedicated to Hand-Held Devices. J. Medical Syst. 39(11): 177 (2015) - [j8]Ke Xu, Xin Liu, Zhen Ma, Yifeng Zhong, Wenlong Chen:
Exploring the policy selection of the P2P VoD system: A simulation-based research. Peer-to-Peer Netw. Appl. 8(3): 459-473 (2015) - 2014
- [j7]Shujuan Geng, Weidong Zhou, Xiuhe Zhao, Qi Yuan, Zhen Ma, Jiwen Wang:
Bifurcation and oscillation in a time-delay neural mass model. Biol. Cybern. 108(6): 747-756 (2014) - 2013
- [j6]Zhen Ma, Weidong Zhou, Shujuan Geng, Qi Yuan, Xueli Li:
Synchronization regulation in a model of coupled neural masses. Biol. Cybern. 107(2): 131-140 (2013) - [j5]Zhen Ma, Renato M. Natal Jorge, Teresa Mascarenhas, João Manuel R. S. Tavares:
Segmentation of female pelvic organs in axial magnetic resonance images using coupled geometric deformable models. Comput. Biol. Medicine 43(4): 248-258 (2013) - [j4]Zhen Ma, Wen-Feng Qi, Tian Tian:
On the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. J. Complex. 29(2): 173-181 (2013) - 2012
- [j3]Zhen Ma, Ke Xu, Jiangchuan Liu, Haiyang Wang:
Measurement, modeling and enhancement of BitTorrent-based VoD system. Comput. Networks 56(3): 1103-1117 (2012) - 2008
- [j2]Junying Zhang, Le Wei, Xuerong Feng, Zhen Ma, Yue Wang:
Pattern Expression Nonnegative Matrix Factorization: Algorithm and Applications to Blind Source Separation. Comput. Intell. Neurosci. 2008 (2008) - 2007
- [j1]Zhen Ma, David M. Klymyshyn, Sven Achenbach, Martin Börner, Nina Dambrowsky, Jürgen Mohr:
An Ultra-Deep High-Q Microwave Cavity Resonator Fabricated Using Deep X-Ray Lithography. IEICE Trans. Electron. 90-C(12): 2192-2197 (2007)
Conference and Workshop Papers
- 2024
- [c34]Yuwen Zou, Wenjun Fan, Zhen Ma:
Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense. ARES 2024: 28:1-28:12 - 2023
- [c33]Fangkai Yang, Lu Wang, Zhenyu Xu, Jue Zhang, Liqun Li, Bo Qiao, Camille Couturier, Chetan Bansal, Soumya Ram, Si Qin, Zhen Ma, Íñigo Goiri, Eli Cortez, Terry Yang, Victor Rühle, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
Snape: Reliable and Low-Cost Computing with Mixture of Spot and On-Demand VMs. ASPLOS (3) 2023: 631-643 - [c32]Zhen Ma, Qianqian Li, Mingshan Xie, Yan He:
Design and Research of a Universal Dual-side Butt Flip Machine. ICCDA 2023: 48-53 - 2022
- [c31]Hui Wang, Jinying Lin, Zhen Ma, Yurii Vasylkiv, Heike Brock, Keisuke Nakamura, Randy Gomez, Bo He, Guangliang Li:
Affective Behavior Learning for Social Robot Haru with Implicit Evaluative Feedback. IROS 2022: 3881-3888 - [c30]Fangkai Yang, Bowen Pang, Jue Zhang, Bo Qiao, Lu Wang, Camille Couturier, Chetan Bansal, Soumya Ram, Si Qin, Zhen Ma, Iñigo Goiri, Eli Cortez, Senthil Baladhandayutham, Victor Rühle, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
Spot Virtual Machine Eviction Prediction in Microsoft Cloud. WWW (Companion Volume) 2022: 152-156 - 2021
- [c29]Lichao Xu, Zhen Ma, Jiayuan Meng, Minpeng Xu, Tzyy-Ping Jung, Dong Ming:
Improving Transfer Performance of Deep Learning with Adaptive Batch Normalization for Brain-computer Interfaces*. EMBC 2021: 5800-5803 - [c28]Yihan Meng, He Xu, Zhen Ma, Jiaqiang Zhou, Daquan Hui:
Production of Data Set Based on Adjustable Rotary Table and Part Identification Based on Deep Learning. I2MTC 2021: 1-6 - [c27]Jiaqiang Zhou, He Xu, Zhen Ma, Yihan Meng, Daquan Hui:
Sparse Point Cloud Generation Based on Turntable 2D Lidar and Point Cloud Assembly in Augmented Reality Environment. I2MTC 2021: 1-6 - [c26]Junwei Wang, Xiyuan Chen, Xin Shao, Zhen Ma:
An Adaptive Optimization Strict Reverse Navigation Algorithm for Ship Fine Alignment Process. ICMTEL (1) 2021: 137-144 - [c25]Zhen Ma, Xiyuan Chen, Junwei Wang:
Verification of Deformation Measurement Method Based on FBG Sensor. ICMTEL (1) 2021: 437-441 - [c24]Yurii Vasylkiv, Zhen Ma, Guangliang Li, Eleanor Sandry, Heike Brock, Keisuke Nakamura, Pourang Irani, Randy Gomez:
Automating Behavior Selection for Affective Telepresence Robot. ICRA 2021: 2026-2032 - [c23]Hantao Xu, Lianhuan Han, Bingqian Du, Yang Wang, Zhen Ma, Zhong-Qun Tian, Zhao-Wu Tian, Dongping Zhan:
Electrochemical Nanoimprint Lithography. NEMS 2021: 1337-1340 - [c22]Yurii Vasylkiv, Zhen Ma, Guangliang Li, Heike Brock, Keisuke Nakamura, Pourang Irani, Randy Gomez:
Shaping Affective Robot Haru's Reactive Response. RO-MAN 2021: 989-996 - 2020
- [c21]Haiqing Yu, Minpeng Xu, Jiayuan Meng, Zhen Ma, Dong Ming:
Classification of auditory attention focuses during speech perception. EMBC 2020: 3074-3077 - 2019
- [c20]Lai Tu, Zhen Ma, Benxiong Huang:
Analysis and Prediction of Differential Parking Behaviors. DASC/PiCom/DataCom/CyberSciTech 2019: 44-49 - [c19]Xiaojun Xing, Haoran Gui, Zhen Ma, Xiaoran Chen, Yingzhe Cai:
Multi-source Fault Tolerant Integrated Navigation for a Certain UAV Based on INS/BD/RP/TAN. ICCA 2019: 313-318 - 2017
- [c18]Qianli D. Y. Ma, Zhen Ma, Changjuan Ji, Kai Yin, Ting Zhu, Chunhua Bian:
Artificial object edge detection based on enhanced Canny algorithm for high-speed railway apparatus identification. CISP-BMEI 2017: 1-6 - [c17]Xiaojun Xing, Zhen Ma, Haibo Yu, Tuo Li, Zhuoya Wang, Yaohong Qu:
Pressure casting control for thin-walled parts based on dynamic matrix control. ICNC-FSKD 2017: 2938-2941 - 2016
- [c16]Dexin Zhao, Zhen Ma, Degan Zhang:
A Distributed and Adaptive Trust Evaluation Algorithm for MANET. Q2SWinet@MSWiM 2016: 47-54 - 2015
- [c15]Dexin Zhao, Liangliang Qin, Pengjie Liu, Zhen Ma, Yukun Li:
Computing Terms Semantic Relatedness by Knowledge in Wikipedia. IEEE WISA 2015: 107-111 - [c14]Zhen Ma, Tengchan Zeng, Gongpu Wang, Feifei Gao:
Signal detection for ambient backscatter system with multiple receiving antennas. CWIT 2015: 50-53 - [c13]De-gan Zhang, Zhen Ma, Dexin Zhao, Jin-Jie Song, Si Liu:
Novel Adaptive Queue Intelligent Management Algorithm. MASS 2015: 483-485 - [c12]De-gan Zhang, Wen-bin Li, Zhen Ma, Si Liu, Jin-Jie Song:
New Dv-Distance Algorithm Based on Path for Wireless Sensor Network. MASS 2015: 491-493 - [c11]De-gan Zhang, Wen-bin Li, Zhen Ma:
New service discovery algorithm based on DHT for mobile application. SECON 2015: 145-147 - 2014
- [c10]Zhen Ma, João Manuel R. S. Tavares:
Segmentation of Skin Lesions Using Level Set Method. CompIMAGE 2014: 228-233 - 2012
- [c9]Zhen Ma, Ke Xu, Yifeng Zhong:
Exploring the policy selection of P2P VoD system - A simulation based research. IWQoS 2012: 1-4 - [c8]Lin Zhang, Zhen Ma, Zhong Zhou, Wei Wu:
Laplacian-Based Feature Preserving Mesh Simplification. PCM 2012: 378-389 - 2011
- [c7]Yin Liu, Baojin Wang, Ke Xu, Zhen Ma:
PACC: A Path Associativity Congestion Control and Throughput Model For Multi-path TCP. ICCS 2011: 1278-1287 - 2010
- [c6]Song Lin, Jianping Wu, Ke Xu, Zhen Ma:
The Minimum Server Bandwidth in Peer-Assisted VoD Systems. ICCCN 2010: 1-7 - [c5]Haiyang Wang, Jiangchuan Liu, Bo Chen, Ke Xu, Zhen Ma:
On Tracker Selection for Peer-to-Peer Traffic Locality. Peer-to-Peer Computing 2010: 1-10 - 2009
- [c4]Zhen Ma, João Manuel R. S. Tavares, Renato M. Natal Jorge:
A Review on the Current Segmentation Algorithms for Medical Images. IMAGAPP 2009: 135-140 - 2008
- [c3]Zhen Ma, Jianlei Li, Feng Gong, Xianjiang Zhang:
Application on Unloading Transient Electromagnetic Computation of Brushless AC Exciter with Magnet. RAM 2008: 671-675 - 2006
- [c2]Zhen Ma, Jitao Wu, Zhonghua Luo:
Road extraction from high-resolution satellite images using level set methods. CompIMAGE 2006: 261-266 - 2005
- [c1]Zhen Ma, David M. Klymyshyn, Sven Achenbach:
LIGA Cavity Resonator for K-Band Applications. ICMENS 2005: 106-109
Informal and Other Publications
- 2024
- [i2]Xiaolong Xue, Guangyong Shang, Zhen Ma, Minghui Xu, Hechuan Guo, Kun Li, Xiuzhen Cheng:
DataSafe: Copyright Protection with PUF Watermarking and Blockchain Tracking. CoRR abs/2405.19099 (2024) - 2020
- [i1]Zhen Ma, He Xu, Yonghui Zhang, Junlong Chen, Dongbo Zhao, Siqing Chen:
Augmented Reality on the Large Scene Based on a Markerless Registration Framework. CoRR abs/2003.01256 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint