default search action
Liangli Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Taoyuan Li, Liangli Ma, Jiwei Qin, Wei Ren:
DTGCN: a method combining dependency tree and graph convolutional networks for Chinese long-interval named entity relationship extraction. J. Ambient Intell. Humaniz. Comput. 14(10): 13361-13373 (2023) - 2022
- [j14]Yaoxun Liu, Liangli Ma, Muyuan Wang:
GAIN: A Gated Adaptive Feature Interaction Network for Click-Through Rate Prediction. Sensors 22(19): 7280 (2022) - [c15]Xianyu Meng, Liangli Ma, Yingxue Zhou:
Research on Locking Suspect by Using Mathematical Model. ICCDE 2022: 105-110 - [c14]Xianyu Meng, Liangli Ma, Yingxue Zhou:
Analysis and Example Implementation of Data Visualization Technology. ICMVA 2022: 56-60 - [c13]Ningbo Liu, Liangli Ma, Wei Ren, Muyuan Wang:
An Improved ACS Algorithm by CA for Task Scheduling in Heterogeneous Multiprocessing Environments. NCTCS 2022: 216-235
2010 – 2019
- 2019
- [j13]Jiwei Qin, Liangli Ma, Qing Liu:
Pruning Optimization over Threshold-Based Historical Continuous Query. Algorithms 12(5): 107 (2019) - [j12]Jiwei Qin, Liangli Ma, Jinghua Niu:
THBase: A Coprocessor-Based Scheme for Big Trajectory Data Management. Future Internet 11(1): 10 (2019) - [j11]Fei Liao, Liangli Ma, Jingjing Pei, Linshan Tan:
Combined Self-Attention Mechanism for Chinese Named Entity Recognition in Military. Future Internet 11(8): 180 (2019) - [j10]Jiwei Qin, Liangli Ma, Qing Liu:
DFTHR: A Distributed Framework for Trajectory Similarity Query Based on HBase and Redis. Inf. 10(2): 77 (2019) - [p1]Liangli Ma, Jinyi Guo, Wei Ren, Yi Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
A watermark-based in situ access-control model for image big data. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 67-87 - 2017
- [j9]Liangli Ma, Qing Liu:
减少重建数据量的冗余编码技术研究 (Researches of Redundancy Coding Technologies on Reducing Reconstruction Data Amount). 计算机科学 44(Z6): 463-469 (2017) - 2016
- [j8]Kai Su, Liangli Ma, Bin Xiao, Huaiqiang Zhang:
Web service QoS prediction by neighbor information combined non-negative matrix factorization. J. Intell. Fuzzy Syst. 30(6): 3593-3604 (2016) - 2014
- [j7]Wei Ren, Jiahua Lin, Qiang Cao, Liangli Ma:
LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing. Int. J. Internet Protoc. Technol. 8(2/3): 122-129 (2014) - [j6]Kai Su, Liangli Ma, Xiaoming Guo, Yufei Sun:
An Efficient Discrete Invasive Weed Optimization Algorithm for Web Services Selection. J. Softw. 9(3): 709-715 (2014) - 2013
- [j5]Wei Ren, Liangli Ma, Yi Ren:
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid. Int. J. Distributed Sens. Networks 9 (2013) - [j4]Wei Ren, Liangli Ma, Yi Ren:
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j3]Wei Ren, Liangli Ma, Yi Ren:
LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j2]Wei Ren, Linchen Yu, Liangli Ma, Yi Ren:
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j1]Liangli Ma, Jingchun Sun, Yongjie Li:
Comparing General Paradigms on Data Secrecy Protection for Outsourced Files in Mobile Cloud Computing. J. Networks 7(9): 1449-1455 (2012) - [c12]Liangli Ma, Haohan Liu, Zebo Feng:
An Equipment Failure Prediction Accuracy Improvement Method Based on the Gray GM(1, 1) Model. AICI 2012: 294-300 - [c11]Zebo Feng, Xiaoping Wu, Liangli Ma, Wei Ren:
uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks. ISICA 2012: 66-73
2000 – 2009
- 2009
- [c10]Yongbao Liu, Liangli Ma, Shuhong Huang:
A Fault Detection and Isolation Model Based on Conditional Finite State Machine for Gas Turbine. ICNC (2) 2009: 477-481 - [c9]Yongbao Liu, Liangli Ma, Shuhong Huang:
Construct Fault Diagnosis Model Based on Fault Dependency Relationship Matrix. PACCS 2009: 318-321 - 2007
- [c8]Liangli Ma, Yongjie Li:
Constructing a Reference Model of a Grouped-Metadata Object and Its Change Model. CIT 2007: 897-902 - [c7]Liangli Ma, Houxiang Wang, Yongjie Li:
Construct Metadata Model based on Coupling Information to Increase the Testability of Component-based Software. AICCSA 2007: 24-31 - [c6]Liangli Ma, Houxiang Wang, Yongjie Li:
A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration Testing. AICCSA 2007: 32-39 - [c5]Liangli Ma, Fuliang Guo:
Construct Metadata Based on Change Model Using for Component-Based Software Regression Testing. FSKD (1) 2007: 747-751 - [c4]Liangli Ma, Houxiang Wang, Yongjie Li:
A Reference Model of Grouped-Metadata Object and a Change Model based on it Appling for Component-based Software Integration Testing. ICSEM 2007: 127-134 - 2006
- [c3]Liangli Ma, Houxiang Wang, Yongjie Li:
Using Component Metadata based on Dependency Relationships Matrix to improve the Testability of Component-based Software. ICDIM 2006: 13-18 - [c2]Liangli Ma, Houxiang Wang, Yansheng Lu:
The Design of Dependency Relationships Matrix to improve the testability of Component-based Software. QSIC 2006: 93-98 - [c1]Liangli Ma, Yansheng Lu, Mengren Liu:
The Research and Design of Layered-metadata used for Component-based Software Testing. SEKE 2006: 720-723
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint