


Остановите войну!
for scientists:
Cheng Ma
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j13]Yang Li, Chao Fu, Tao Jiang, Yang Liu, Cheng Ma, Jan Bogaerts, Xinyang Wang:
A pipeline row operation method of CMOS image sensors. IEICE Electron. Express 18(6): 20210021 (2021) - [j12]Cheng Ma, Jiwen Lu
, Jie Zhou:
Rank-Consistency Deep Hashing for Scalable Multi-Label Image Search. IEEE Trans. Multim. 23: 3943-3956 (2021) - [c22]Cheng Ma, Wenkang Huang:
Named Entity Recognition and Event Extraction in Chinese Electronic Medical Records. CCKS (Evaluation Track) 2021: 133-138 - [c21]Ya Zhao, Cheng Ma, Zunlei Feng, Mingli Song:
Speech Guided Disentangled Visual Representation Learning for Lip Reading. ICMI 2021: 687-691 - [i7]Cheng Ma, Jiwen Lu, Jie Zhou:
Rank-Consistency Deep Hashing for Scalable Multi-Label Image Search. CoRR abs/2102.01486 (2021) - [i6]Cheng Ma, Yongming Rao, Jiwen Lu, Jie Zhou:
Structure-Preserving Image Super-Resolution. CoRR abs/2109.12530 (2021) - [i5]Ruili Feng, Cheng Ma, Chengji Shen, Xin Gao, Zhenjiang Liu, Xiaobo Li, Kairi Ou, Zhengjun Zha:
Weakly Supervised High-Fidelity Clothing Model Generation. CoRR abs/2112.07200 (2021) - 2020
- [j11]Cheng Ma
, Wei Shi, Chengang Dong, Lei Yang, Zhiquan Wang, Meilin Wu, Haiqing Wang, Chuanhui Zhong, Chaofan Li:
998 Multiplication Rate of GaAs Avalanche Semiconductor Switch Triggered by 0.567 nJ. IEEE Access 8: 116515-116519 (2020) - [j10]Cheng Ma
, Qi Zhao, Guoqi Li, Lei Deng, Guanrui Wang:
A deadlock-free physical mapping method on the many-core neural network chip. Neurocomputing 401: 327-337 (2020) - [j9]Yucong Lin, Yang Li, Keming Lu, Cheng Ma, Peng Zhao, Daiqi Gao, Zihao Fan, Zijie Cheng, Zheyu Wang, Sheng Yu
:
Long-distance disorder-disorder relation extraction with bootstrapped noisy data. J. Biomed. Informatics 109: 103529 (2020) - [j8]Guoqi Li, Pei Tang, Xumin Chen, Gaoxi Xiao
, Min Meng, Cheng Ma, Luping Shi:
Target control and expandable target control of complex networks. J. Frankl. Inst. 357(6): 3541-3564 (2020) - [c20]Cheng Ma, Zhenyu Jiang, Yongming Rao, Jiwen Lu
, Jie Zhou:
Deep Face Super-Resolution With Iterative Collaboration Between Attentive Recovery and Landmark Estimation. CVPR 2020: 5568-5577 - [c19]Cheng Ma, Yongming Rao, Yean Cheng, Ce Chen, Jiwen Lu
, Jie Zhou:
Structure-Preserving Super Resolution With Gradient Guidance. CVPR 2020: 7766-7775 - [i4]Cheng Ma, Zhenyu Jiang, Yongming Rao, Jiwen Lu, Jie Zhou:
Deep Face Super-Resolution with Iterative Collaboration between Attentive Recovery and Landmark Estimation. CoRR abs/2003.13063 (2020) - [i3]Cheng Ma, Yongming Rao, Yean Cheng, Ce Chen, Jiwen Lu, Jie Zhou:
Structure-Preserving Super Resolution with Gradient Guidance. CoRR abs/2003.13081 (2020)
2010 – 2019
- 2019
- [c18]Qi Zhao, Lei Deng, Guoqi Li, Guanrui Wang, Cheng Ma:
Efficient Mapping without Deadlock on the Many-core Neural Network Chip. ICCA 2019: 752-757 - [c17]Yucong Lin, Cheng Ma, Daiqi Gao, Zihao Fan, Zijie Cheng, Zheyu Wang, Sheng Yu:
Long distance entity relation extraction with article structure embedding and applied to mining medical knowledge. ICHI 2019: 1-7 - [c16]Cheng Ma, Jin Zhu, Yanping Yin, Xiaolong Li:
Design of Quartz Crystal Microbalance with ring electrode. IECON 2019: 6237-6242 - [i2]Yukuan Yang, Lei Deng, Peng Jiao, Yansong Chua, Jing Pei, Cheng Ma, Guoqi Li:
Transfer Learning in General Lensless Imaging through Scattering Media. CoRR abs/1912.12419 (2019) - 2018
- [c15]Cheng Ma, Zhixiang Chen
, Jiwen Lu
, Jie Zhou:
Rank-Consistency Multi-Label Deep Hashing. ICME 2018: 1-6 - 2017
- [j7]Zhen Zhang
, Cheng Ma
, Rong Zhu:
A FPGA-Based, Granularity-Variable Neuromorphic Processor and Its Application in a MIMO Real-Time Control System. Sensors 17(9): 1941 (2017) - [c14]Xiao Chu, Wei Yang, Wanli Ouyang
, Cheng Ma, Alan L. Yuille
, Xiaogang Wang:
Multi-context Attention for Human Pose Estimation. CVPR 2017: 5669-5678 - [i1]Xiao Chu, Wei Yang, Wanli Ouyang, Cheng Ma, Alan L. Yuille, Xiaogang Wang:
Multi-Context Attention for Human Pose Estimation. CoRR abs/1702.07432 (2017) - 2016
- [j6]Zhen Zhang
, Cheng Ma
, Rong Zhu:
Self-Tuning Fully-Connected PID Neural Network System for Distributed Temperature Sensing and Control of Instrument with Multi-Modules. Sensors 16(10): 1709 (2016) - [c13]Yuwei Wang, Min Liu, Bo Gao, Chenchong Qin, Cheng Ma:
I/O Congestion-Aware Computing Resource Assignment and Scheduling in Virtualized Cloud Environments. Trustcom/BigDataSE/ISPA 2016: 1280-1287 - 2015
- [j5]Cheng Ma, Liansheng Zhang:
On an exact penalty function method for nonlinear mixed discrete programming problems and its applications in search engine advertising problems. Appl. Math. Comput. 271: 642-656 (2015) - [j4]Tsan-Ming Choi
, Xun Li
, Cheng Ma:
Search-Based Advertising Auctions With Choice-Based Budget Constraint. IEEE Trans. Syst. Man Cybern. Syst. 45(8): 1178-1186 (2015) - [c12]Teng Chen, Leli Peng, Haibin Li, Ning Ding, Cheng Ma, Yuchun Chang:
A 2-V 40-MS/s 14-bit pipelined ADC for CMOS image sensor. ASICON 2015: 1-4 - [c11]Dong Wang, Lei Deng, Pei Tang, Cheng Ma, Jing Pei:
FPGA-based neuromorphic computing system with a scalable routing network. NVMTS 2015: 1-4 - [c10]Shikai Wang, Cheng Ma, Dong Wang, Jing Pei:
Extensible neuromorphic computing simulator based on a programmable hardware. NVMTS 2015: 1-3 - 2014
- [j3]Changyu Wang, Cheng Ma, Jinchuan Zhou:
A new class of exact penalty functions and penalty algorithms. J. Glob. Optim. 58(1): 51-73 (2014) - 2013
- [j2]Changyu Wang, Qian Liu, Cheng Ma:
Smoothing SQP algorithm for semismooth equations with box constraints. Comput. Optim. Appl. 55(2): 399-425 (2013) - [c9]Xinglong Ju
, Youxiang Duan, Cheng Ma, Haiyan Ju:
Predicting Service Execution Time towards a Runtime Monitoring Approach. CyberC 2013: 221-224 - [c8]Cheng Ma, Youxiang Duan, Xinglong Ju
, Fuchang Xu:
WS-S Evaluation Based on User Preferences and Ranking Mechanism. CyberC 2013: 298-301 - 2012
- [c7]Cheng Ma, Tianyuan Xiao:
MDA-Based Meta-modeling Technique for Collaborative Simulation. AsiaSim (1) 2012: 250-261 - 2011
- [c6]Li Li, Tianyuan Xiao, Wenhui Fan, Hongbo Sun, Cheng Ma:
Step-based Modeling & Simulation for Virtual Product Development. SIMULTECH 2011: 224-227 - 2010
- [j1]Haishan Wang, Cheng Ma, Huibo Jia:
Data Transmission System Design on 8b10b. Int. J. Web Appl. 2(2): 92-100 (2010)
2000 – 2009
- 2009
- [c5]Jianbin Kang, Haishan Wang, Cheng Ma, Huibo Jia:
2QF: A New Replacement Algorithm for Ro-RAT System. CSIE (4) 2009: 91-95 - [c4]Haishan Wang, Cheng Ma, Huibo Jia:
Extended MIMO Model Research of Seismic Specific Cable. ISPAN 2009: 272-277 - 2007
- [c3]Mingjian Sun, Yude Sun, Naizhang Feng, Cheng Ma:
Advanced RMPCT control strategy in CDU. ROBIO 2007: 2273-2277 - 2006
- [c2]Cheng Ma, Chengshun Jiang:
An Improved Entropy Function and Chaos Optimization Based Scheme for Two-Dimensional Entropic Image Segmentation. CIS 2006: 991-1000 - 2005
- [c1]Jiqi Jian, Cheng Ma, Huibo Jia:
Improved-FCM-Based Readout Segmentation and PRML Detection for Photochromic Optical Disks. FSKD (1) 2005: 514-522
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-05 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint