Остановите войну!
for scientists:
default search action
Kun Ma
Publications
- 2024
- [j18]Qiuchen Meng, Lei Wei, Kun Ma, Ming Shi, Xinyi Lin, Joshua W. K. Ho, Yinqing Li, Xuegong Zhang:
scDecouple: decoupling cellular response from infected proportion bias in scCRISPR-seq. Briefings Bioinform. 25(2) (2024) - [i4]Kun Ma, Cong Xu, Zeyuan Chen, Wei Zhang:
Pattern-wise Transparent Sequential Recommendation. CoRR abs/2402.11480 (2024) - 2022
- [j17]Hsi-Yuan Huang, Yang-Chi-Dung Lin, Shi-Dong Cui, Yixian Huang, Yun Tang, Jia-Tong Xu, Jiayang Bao, Yulin Li, Jia Wen, Hua-Li Zuo, Weijuan Wang, Jing Li, Jie Ni, Yini Ruan, Liping Li, Yidan Chen, Yue-Yang Xie, Zihao Zhu, Xiao-Xuan Cai, Xin-Yi Chen, Lantian Yao, Yi-Gang Chen, Yijun Luo, Shupeng Luxu, Mengqi Luo, Chih-Min Chiu, Kun Ma, Lizhe Zhu, Gui-Juan Cheng, Chen Bai, Ying-Chih Chiang, Liping Wang, Feng-Xiang Wei, Tzong-Yi Lee, Hsien-Da Huang:
miRTarBase update 2022: an informative resource for experimentally validated miRNA-target interactions. Nucleic Acids Res. 50(D1): 222-230 (2022) - [c22]Kun Ma, Tao Xu, Yingying Zhang, Baocheng Sha:
Research on Self-Attention Image Description Technology Based on Object Detection. AIAM 2022: 333-338 - [c21]Kun Ma, Zhiying Liu, Lijiao Yang, Ning Sun, Yujun Wang, Ziliang Qiu:
Research on the Evaluation of the Classical Chinese Difficulty in the Compulsory Education Stage. IALP 2022: 353-357 - 2020
- [j16]Kun Ma, Guangming Zhuang, Huasheng Zhang, Guowei Zhao, Yuqian Lin, Jie Wang:
Improved Non-Fragile State Feedback Control for Stochastic Jump Systems With Uncertain Parameters and Mode-Dependent Time-Varying Delays. IEEE Access 8: 97676-97688 (2020) - [j15]Kun Ma, Guangming Zhuang, Wei Sun, Yanqian Wang, Yongmin Li, Junwei Lu:
Improved non-fragile feedback control for stochastic jump system based on observer and quantized measurement. J. Frankl. Inst. 357(17): 12433-12453 (2020) - [c17]Guowei Zhao, Kun Ma, Guangming Zhuang, Wei Sun, Yuqian Lin, Jie Wang:
Admissibilization for DJSs with distributed delay and discrete state delay. ICSSE 2020: 1-4 - 2019
- [c15]Kun Ma, Lijiao Yang:
Automatic Extraction and Quantitative Evaluation of the Character Relationship Networks from Children's Literature works. IALP 2019: 188-193 - [c14]Jianyu Zheng, Kun Ma, Xuemei Tang, Shichen Liang:
Exploring Characteristics of Word Co-occurrence Network in Translated Chinese. IALP 2019: 261-266 - 2018
- [j11]Guangyu Gao, Cen Han, Kun Ma, Chi Harold Liu, Gangyi Ding, Erwu Liu:
Optimal feature combination analysis for crowd saliency prediction. J. Vis. Commun. Image Represent. 50: 1-8 (2018) - 2017
- [j10]Quanming Luo, Jian Huang, Qingqing He, Kun Ma, Luowei Zhou:
Analysis and Design of a Single-Stage Isolated AC-DC LED Driver With a Voltage Doubler Rectifier. IEEE Trans. Ind. Electron. 64(7): 5807-5817 (2017) - 2016
- [j9]Yi Zhang, Yue Xu, Kun Ma:
New type of a generalized variable-coefficient Kadomtsev-Petviashvili equation with self-consistent sources and its Grammian-type solutions. Commun. Nonlinear Sci. Numer. Simul. 37: 77-89 (2016) - [c9]Kun Ma, Guangyu Gao, Gangyi Ding, Chi Harold Liu, Erwu Liu:
Crowd saliency prediction with optimal feature combinations. WCSP 2016: 1-5 - 2015
- [j7]Taotao Zhang, Kun Ma:
Analysis of Dynamic Properties of Piezoelectric Structure under Impact Load. Micromachines 6(10): 1577-1587 (2015) - 2014
- [j6]Minhui Zou, Kun Ma, Kaijie Wu, Edwin Hsing-Mean Sha:
Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists. J. Comput. Sci. Technol. 29(4): 646-655 (2014) - [j5]Kun Ma, Kaijie Wu:
Error Detection and Recovery for ECC: A New Approach Against Side-Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(4): 627-637 (2014) - [j4]Xiaolan Tang, Juhua Pu, Kun Ma, Zhang Xiong:
Cooperative transmission control scheme using erasure coding for vehicular delay-tolerant networks. J. Supercomput. 68(3): 1462-1486 (2014) - [c8]Xiaotong Cui, Kun Ma, Liang Shi, Kaijie Wu:
High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery. DAC 2014: 157:1-157:6 - [c7]Ziyang Qi, Kun Ma, Qiang Zhou, Yici Cai:
RSMT construction algorithm based on Congestion-Oriented Flexibility. LASCAS 2014: 1-4 - 2012
- [j2]Kun Ma, Han Liang, Kaijie Wu:
Homomorphic Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack. IEEE Trans. Computers 61(7): 1040-1049 (2012) - 2011
- [c6]Kun Ma, Kaijie Wu:
LOEDAR: A low cost error detection and recovery scheme for ECC. DATE 2011: 1010-1015 - 2009
- [c5]Jing Ma, Kun Ma:
Strong Simultaneous Stabilization for a Class of Generalized Linear System. HIS (3) 2009: 499-503
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint