


Остановите войну!
for scientists:
Ke Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- Ke Ma 0001
— School of Computer Science and Technology, University of Chinese Academy of Sciences, China
- Ke Ma 0002
— Shanghai Jiao Tong University, Shanghai, China (and 1 more)
- Ke Ma 0003
— Pacific Northwest National Laboratory, Richland, WA, USA (and 1 more)
- Ke Ma 0004 — Rutgers University, Piscataway, NJ, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j36]Zhong Li
, Xueting Yang, Cheng Wang
, Ke Ma, Changjun Jiang
:
Crowd-Learning: A Behavior-Based Verification Method in Software-Defined Vehicular Networks With MEC Framework. IEEE Internet Things J. 9(2): 1622-1639 (2022) - [j35]Ke Ma
, Li-Ping Chen, Qian Fang, Xue-Fei Hong:
Machine Learning in Conventional Tunnel Deformation in High In Situ Stress Regions. Symmetry 14(3): 513 (2022) - [j34]Peng Peng
, Jiaxun Lu
, Shuting Tao
, Ke Ma
, Yi Zhang
, Hongwei Wang
, Heming Zhang
:
Progressively Balanced Supervised Contrastive Representation Learning for Long-Tailed Fault Diagnosis. IEEE Trans. Instrum. Meas. 71: 1-12 (2022) - [c33]Souradeep Chakraborty, Ke Ma, Rajarsi Gupta, Beatrice Knudsen, Gregory J. Zelinsky, Joel H. Saltz, Dimitris Samaras:
Visual Attention Analysis Of Pathologists Examining Whole Slide Images Of Prostate Cancer. ISBI 2022: 1-5 - [i10]Souradeep Chakraborty, Ke Ma, Rajarsi Gupta, Beatrice Knudsen, Gregory J. Zelinsky, Joel H. Saltz, Dimitris Samaras:
Visual attention analysis of pathologists examining whole slide images of Prostate cancer. CoRR abs/2202.08437 (2022) - 2021
- [j33]Yan Chen
, Ke Ma
, Lie Yang, Song Yu, Siqi Cai, Longhan Xie
:
Trunk compensation electromyography features purification and classification model using generative adversarial network. Biomed. Signal Process. Control. 65: 102345 (2021) - [j32]Yan Chen
, Song Yu, Qing Cai, Shuangyuan Huang, Ke Ma, Haiqing Zheng, Longhan Xie
:
A spasticity assessment method for voluntary movement using data fusion and machine learning. Biomed. Signal Process. Control. 65: 102353 (2021) - [j31]Shaofeng Han
, Changyan He, Ke Ma, Yang Yang
:
A study for lens capsule tearing during capsulotomy by finite element simulation. Comput. Methods Programs Biomed. 203: 106025 (2021) - [j30]Sicong Liu, Bin Guo
, Ke Ma, Zhiwen Yu, Junzhao Du:
AdaSpring: Context-adaptive and Runtime-evolutionary Deep Model Compression for Mobile Applications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 24:1-24:22 (2021) - [j29]Bingkun Gao, Ke Ma, Hongbo Bi
, Ling Wang, Chenlei Wu:
Learning high resolution reservation for human pose estimation. Multim. Tools Appl. 80(19): 29251-29265 (2021) - [j28]Ke Ma
, Dongxuan He, Hancun Sun, Zhaocheng Wang
, Sheng Chen
:
Deep Learning Assisted Calibrated Beam Training for Millimeter-Wave Communication Systems. IEEE Trans. Commun. 69(10): 6706-6721 (2021) - [j27]Weiya Wang
, Geng Yang
, Lin Bao, Ke Ma, Hao Zhou, Yunlu Bai:
Travel Trajectory Frequent Pattern Mining Based on Differential Privacy Protection. Wirel. Commun. Mob. Comput. 2021: 6379530:1-6379530:14 (2021) - [c32]Meng Gao, Renke He, Ke Ma:
Describing and Visualizing Sustainable Product-Service System (S.PSS) Applied to Distributed Water-Energy-Food (WEF) Nexus. AHFE (3) 2021: 323-330 - [c31]Jingwei Zhang, Ke Ma, John S. Van Arnam, Rajarsi Gupta, Joel H. Saltz, Maria Vakalopoulou, Dimitris Samaras:
A Joint Spatial and Magnification Based Attention Framework for Large Scale Histopathology Classification. CVPR Workshops 2021: 3776-3784 - [c30]Wenkui Jin, Xurong Shan, Ke Ma:
Research on Information Visualization Design for Public Health Security Emergencies. HCI (3) 2021: 325-336 - [c29]Ke Ma, Dongxuan He, Hancun Sun, Zhaocheng Wang:
Deep Learning Assisted mmWave Beam Prediction with Prior Low-frequency Information. ICC 2021: 1-6 - [c28]Wenchao Zhou, Yifan Cai, Yanqing Peng, Sheng Wang, Ke Ma, Feifei Li:
VeriDB: An SGX-based Verifiable Database. SIGMOD Conference 2021: 2182-2194 - [i9]Ke Ma, Dongxuan He, Hancun Sun, Zhaocheng Wang, Sheng Chen:
Deep Learning Assisted Calibrated Beam Training for Millimeter-Wave Communication Systems. CoRR abs/2101.05206 (2021) - [i8]Sicong Liu, Bin Guo, Ke Ma, Zhiwen Yu, Junzhao Du:
AdaSpring: Context-adaptive and Runtime-evolutionary Deep Model Compression for Mobile Applications. CoRR abs/2101.11800 (2021) - [i7]David Puljiz, Bowen Zhou, Ke Ma, Björn Hein:
HAIR: Head-mounted AR Intention Recognition. CoRR abs/2102.11162 (2021) - [i6]Xiang Bai, Hanchen Wang, Liya Ma, Yongchao Xu, Jiefeng Gan, Ziwei Fan, Fan Yang, Ke Ma, Jiehua Yang, Song Bai, Chang Shu, Xinyu Zou, Renhao Huang, Changzheng Zhang, Xiaowu Liu, Dandan Tu, Chuou Xu, Wenqing Zhang, Xi Wang, Anguo Chen, Yu Zeng, Dehua Yang, Ming-Wei Wang, Nagaraj Holalkere, Neil J. Halin, Ihab R. Kamel, Jia Wu, Xuehua Peng, Xiang Wang, Jianbo Shao, Pattanasak Mongkolwat, Jianjun Zhang, Weiyang Liu, Michael Roberts, Zhongzhao Teng, Lucian Beer, Lorena Escudero Sanchez, Evis Sala, Daniel L. Rubin, Adrian Weller, Joan Lasenby, Chuangsheng Zheng, Jianming Wang, Zhen Li, Carola-Bibiane Schönlieb, Tian Xia:
Advancing COVID-19 Diagnosis with Privacy-Preserving Collaboration in Artificial Intelligence. CoRR abs/2111.09461 (2021) - [i5]Ke Ma, Zhaocheng Wang, Wenqiang Tian, Sheng Chen, Lajos Hanzo:
Deep Learning for Beam Management: Opportunities, State-of-the-Arts and Challenges. CoRR abs/2111.11177 (2021) - 2020
- [j26]Ke Ma
, Sébastien Thomassey
, Xianyi Zeng:
Development of a central order processing system for optimizing demand-driven textile supply chains: a real case based simulation study. Ann. Oper. Res. 291(1): 627-656 (2020) - [j25]Rui Ma, Yue Liu, Ke Ma, Xu An Wang:
Identification and addressing of internet of things based on distributed ID. Int. J. Embed. Syst. 12(2): 195-205 (2020) - [j24]Liquan Zhao, Ke Ma:
Stagewise Weak Orthogonal Matching Pursuit Algorithm Based on Adaptive Weak Threshold and Arithmetic Mean. J. Inf. Process. Syst. 16(6): 1343-1358 (2020) - [j23]Ke Ma, Geng Yang, Yang Xiang:
RCBAC: A risk-aware content-based access control model for large-scale text data. J. Netw. Comput. Appl. 167: 102733 (2020) - [j22]Lie Yang
, Yong Tian, Yonghao Song, Nachuan Yang, Ke Ma, Longhan Xie:
A novel feature separation model exchange-GAN for facial expression recognition. Knowl. Based Syst. 204: 106217 (2020) - [j21]Ke Ma
, Pan Zhang, Zhiyuan Mao:
Study on large-scale crowd evacuation method in cultural museum using mutation prediction RFID. Pers. Ubiquitous Comput. 24(2): 177-191 (2020) - [j20]Junren Shi, Dongye Sun, Datong Qin, Minghui Hu, Yingzhe Kan, Ke Ma, Ruibo Chen:
Planning the trajectory of an autonomous wheel loader and tracking its trajectory via adaptive model predictive control. Robotics Auton. Syst. 131: 103570 (2020) - [j19]Rob Worley
, Ke Ma, Gavin Sailor, Michele M. Schirru, Rob Dwyer-Joyce, Joby B. Boxall
, Tony J. Dodd, Richard Collins, Sean R. Anderson
:
Robot Localization in Water Pipes Using Acoustic Signals and Pose Graph Optimization. Sensors 20(19): 5584 (2020) - [j18]Siqi Cai
, Guofeng Li
, Enze Su, Xuyang Wei, Shuangyuan Huang
, Ke Ma
, Haiqing Zheng
, Longhan Xie
:
Real-Time Detection of Compensatory Patterns in Patients With Stroke to Reduce Compensation During Robotic Rehabilitation Therapy. IEEE J. Biomed. Health Informatics 24(9): 2630-2638 (2020) - [j17]Peiyao Zhao, Ke Ma, Zhaocheng Wang
, Sheng Chen
:
Virtual Angular-Domain Channel Estimation for FDD Based Massive MIMO Systems With Partial Orthogonal Pilot Design. IEEE Trans. Veh. Technol. 69(5): 5164-5178 (2020) - [c27]Sagnik Das, Hassan A. Sial, Ke Ma, Ramón Baldrich, María Vanrell, Dimitris Samaras:
Intrinsic Decomposition of Document Images In-the-Wild. BMVC 2020 - [c26]Ke Ma, Bo Zhao, Leonid Sigal:
Attribute-Guided Image Generation from Layout. BMVC 2020 - [c25]Ke Zhong, Zhihao Jiang, Ke Ma, Sebastian Angel:
A file system for safely interacting with untrusted USB flash drives. HotStorage 2020 - [c24]Peng Wang, Ke Ma, Jianming Lian
, Donald J. Hammerstrom
:
Anomaly Detection of Transactive Energy Systems with Competitive Markets. ISGT 2020: 1-5 - [c23]Dexin Wang, Ke Ma, Peng Wang, Jianming Lian
, Donald J. Hammerstrom
:
Frequency-domain Flexibility Characterization of Heterogeneous End-use Loads for Grid Services. ISGT 2020: 1-5 - [c22]Ke Ma, Peiyao Zhao, Zhaocheng Wang:
Deep Learning Assisted Beam Prediction Using Out-of-Band Information. VTC Spring 2020: 1-5 - [i4]Yang Lu, Jianming Lian, Minghui Zhu, Ke Ma, Wei Zhang:
Cyber-Resilient Transactive Energy System Design over Insecure Communication Links. CoRR abs/2008.00152 (2020) - [i3]Ke Ma, Bo Zhao, Leonid Sigal:
Attribute-guided image generation from layout. CoRR abs/2008.11932 (2020) - [i2]Sagnik Das, Hassan Ahmed Sial, Ke Ma, Ramon Baldrich, María Vanrell, Dimitris Samaras:
Intrinsic Decomposition of Document Images In-the-Wild. CoRR abs/2011.14447 (2020)
2010 – 2019
- 2019
- [j16]Ke Ma
, Hao Wang
:
Influence of Exclusive Lanes for Connected and Autonomous Vehicles on Freeway Traffic Flow. IEEE Access 7: 50168-50178 (2019) - [j15]Xiangping Li
, Guangming Dai, Maocai Wang, Zuowen Liao, Ke Ma:
A Two-Stage Ensemble of Differential Evolution Variants for Numerical Optimization. IEEE Access 7: 56504-56519 (2019) - [j14]Shuangyuan Huang
, Siqi Cai
, Guofeng Li, Yan Chen, Ke Ma, Longhan Xie:
sEMG-Based Detection of Compensation Caused by Fatigue During Rehabilitation Therapy: A Pilot Study. IEEE Access 7: 127055-127065 (2019) - [j13]Yan Chen
, Song Yu
, Ke Ma
, Shuangyuan Huang
, Guofeng Li
, Siqi Cai
, Longhan Xie
:
A Continuous Estimation Model of Upper Limb Joint Angles by Using Surface Electromyography and Deep Learning Method. IEEE Access 7: 174940-174950 (2019) - [j12]Ke Ma
, Rudrajeet Pal
, Eva Gustafsson:
What modelling research on supply chain collaboration informs us? Identifying key themes and future directions through a literature review. Int. J. Prod. Res. 57(7): 2203-2225 (2019) - [c21]Ke Ma, Peng Wang, Thiagarajan Ramachandran, Jianming Lian
, Donald J. Hammerstrom
:
Optimal Iterative Method for Network Utility Maximization with Intertemporal Dynamic Constraints. CCTA 2019: 543-548 - [c20]Ke Ma, Yixiang Zhang, Jing Cao:
A New Paradigm of Addressing the Complexity of Entrepreneurial Community Design Leveraging Augmented Reality. HCI (LBP) 2019: 192-201 - [c19]Ke Ma
, Geng Yang
:
CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data. ICAIS (3) 2019: 517-529 - [c18]Sagnik Das, Ke Ma, Zhixin Shu, Dimitris Samaras, Roy Shilkrot:
DewarpNet: Single-Image Document Unwarping With Stacked 3D and 2D Regression Networks. ICCV 2019: 131-140 - [c17]Harith R. Wickramasinghe, Weiyao Wang, Ke Ma, Georgios Konstantinou:
Thermal Characterization of the Alternate Arm Converter for HVDC Applications. ICIT 2019: 556-561 - [c16]Ke Ma, Jing Cao:
Design Pattern as a Practical Tool for Designing Adaptive Interactions Connecting Human and Social Robots. IHSI 2019: 613-617 - [c15]Peixi Liu, Tianqi Mao, Ke Ma, Jiaxuan Chen, Zhaocheng Wang:
Three-Dimensional Visible Light Positioning Using Regression Neural Network. IWCMC 2019: 156-160 - [c14]Ke Ma, Yindi Jing:
Receiver Design and SER Analysis of Massive MIMO Uplink With Mixed-Resolution ADCs. PACRIM 2019: 1-6 - 2018
- [j11]Yang Yu, Junwei Wang
, Ke Ma, Wei Sun:
Seru system balancing: Definition, formulation, and exact solution. Comput. Ind. Eng. 122: 318-325 (2018) - [j10]Ke Ma
, Long Guo, Wangheng Liu:
Investigation of the Spatial Clustering Properties of Seismic Time Series: A Comparative Study from Shallow to Intermediate-Depth Earthquakes. Complex. 2018: 7169482:1-7169482:10 (2018) - [j9]Chong Zhou
, Guangming Dai, Cuijun Zhang, Xiangping Li, Ke Ma:
Entropy based evolutionary algorithm with adaptive reference points for many-objective optimization problems. Inf. Sci. 465: 232-247 (2018) - [j8]Ke Ma, Yichuan Zhang, Zhongxuan Yang:
Research on Mass Real Estate Evaluation Mode Based on BP Neural Network Model. J. Adv. Comput. Intell. Intell. Informatics 22(7): 1099-1103 (2018) - [c13]Ke Ma, Zhixin Shu, Xue Bai, Jue Wang
, Dimitris Samaras:
DocUNet: Document Image Unwarping via a Stacked U-Net. CVPR 2018: 4700-4709 - 2017
- [j7]Gen Li, Ke Ma, Jian Sun, Gui Jin, Mingxin Qin, Hua Feng:
Twenty-Four-Hour Real-Time Continuous Monitoring of Cerebral Edema in Rabbits Based on a Noninvasive and Noncontact System of Magnetic Induction. Sensors 17(3): 537 (2017) - [c12]Ke Ma, Michele M. Schirru, Ali Hassan Zahraee, Rob Dwyer-Joyce
, Joby B. Boxall
, Tony J. Dodd
, Richard Collins
, Sean R. Anderson
:
PipeSLAM: Simultaneous localisation and mapping in feature sparse water pipes using the Rao-Blackwellised particle filter. AIM 2017: 1459-1464 - [c11]Ke Ma, Minh Hoai, Dimitris Samaras:
Large-scale Continual Road Inspection: Visual Infrastructure Assessment in the Wild. BMVC 2017 - [c10]Ke Ma, Michele M. Schirru, Ali Hassan Zahraee, Rob Dwyer-Joyce
, Joby B. Boxall
, Tony J. Dodd
, Richard Collins
, Sean R. Anderson
:
Robot mapping and localisation in metal water pipes using hydrophone induced vibration and map alignment by dynamic time warping. ICRA 2017: 2548-2553 - [c9]Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang:
Defenses Against Wormhole Attacks in Wireless Sensor Networks. NSS 2017: 413-426 - 2016
- [j6]Zhiqing Meng, Ke Ma, Ying Zheng:
基于核函数技术的时尚服装需求预测方法 (Forecasting Method for Fashion Clothing Demand Based on Kernel Functions Technology). 计算机科学 43(Z11): 455-460 (2016) - [j5]Yaocheng Shi, Ke Ma, Daoxin Dai:
Sensitivity Enhancement in Si Nanophotonic Waveguides Used for Refractive Index Sensing. Sensors 16(3): 324 (2016) - [c8]Ke Ma, Tomas F. Yago Vicente, Dimitris Samaras, Michael Petrucci, Daniel L. Magnus:
Texture classification for rail surface condition evaluation. WACV 2016: 1-9 - [i1]Wei Yang, Yuchen Cao, Ke Ma, Hailong Zhang, Yongbin Zhou, Baofeng Li:
Leakage Characterizing and Detecting Based on Communication Theory. IACR Cryptol. ePrint Arch. 2016: 922 (2016) - 2015
- [j4]Hua Zhong, Ke Ma, Yang Zhou:
Modified BM3D algorithm for image denoising using nonlocal centralization prior. Signal Process. 106: 342-347 (2015) - [c7]Fang Yuan, Jia-Hong Liang, Yue-Wen Fu, Han-Cheng Xu, Ke Ma:
A hybrid sampling strategy with optimized Probabilistic Roadmap Method. FSKD 2015: 2298-2302 - [c6]Ke Ma, Juanjuan Zhu
, Tony J. Dodd
, Richard Collins
, Sean R. Anderson
:
Robot Mapping and Localisation for Feature Sparse Water Pipes Using Voids as Landmarks. TAROS 2015: 161-166 - 2013
- [j3]Zhengzhao Liang
, Nuwen Xu, Ke Ma, Shibin Tang, Chunan Tang:
Microseismic Monitoring and Numerical Simulation of Rock Slope Failure. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j2]Erik E. Kostandyan, Ke Ma:
Reliability estimation with uncertainties consideration for high power IGBTs in 2.3 MW wind turbine converter system. Microelectron. Reliab. 52(9-10): 2403-2408 (2012) - 2011
- [j1]Jin Wu, Ke Ma, Weidong Nie, Ning Qu:
A novel CMOS high accuracy fast speed OTA for switched-capacitor filters. IEICE Electron. Express 8(12): 884-889 (2011) - [c5]Jihong Ouyang, Ke Ma, Ling Ma:
A new model for topological relations between convex regions. FSKD 2011: 1344-1348
2000 – 2009
- 2009
- [c4]Ke Ma, Joshua C. T. Khoo, Ian T. H. Brown:
The Application of an Ambulatory Multi-Parameter Monitoring System Measuring Emotional Stress. BMEI 2009: 1-4 - [c3]Yang Li, Zheng Li, Nenghai Yu, Ke Ma:
APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing. CloudCom 2009: 529-540 - [c2]Wei Wang, Jinghuai Gao, Kang Li, Ke Ma, Xia Zhang:
Structure-oriented Gaussian filter for seismic detail preserving smoothing. ICIP 2009: 601-604 - 2008
- [c1]Changxin Song, Ke Ma:
Predicting Protein Function by Genomic Data-Mining. ICIC (3) 2008: 229-235
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-22 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint