default search action
Xiaoqi Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Shasha Liu, Xiaowei Liu, Xiaoqi Ma, Changliang Yan:
Supercloseness analysis of the linear finite element method for a singularly perturbed convection-diffusion problem on Vulanović-Bakhvalov mesh. Appl. Math. Lett. 148: 108860 (2024) - [j10]Changliang Yan, Xiaowei Liu, Xiaoqi Ma, Shasha Liu:
Superconvergence analysis of the conforming discontinuous Galerkin method on a Bakhvalov-type mesh for singularly perturbed reaction-diffusion equation. Appl. Math. Lett. 158: 109227 (2024) - [c16]Yichen Zhou, Xinfeng Zhang, Xiaoqi Ma, Yingzhan Xu, Kai Zhang, Li Zhang:
Dynamic point cloud compression with spatio-temporal transformer-style modeling. DCC 2024: 53-62 - [i13]Xiaoqi Ma, Jin Zhang, Xinyi Feng, Chunxiao Zhang:
Supercloseness of the DDG method for a singularly perturbed convection diffusion problem on Shishkin mesh. CoRR abs/2402.08912 (2024) - [i12]Xiaoqi Ma, Jin Zhang:
Supercloseness of the HDG method on Shishkin mesh for a singularly perturbed convection diffusion problem in 2D. CoRR abs/2406.18948 (2024) - [i11]Jiajun Liu, Yibing Wang, Hanghang Ma, Xiaoping Wu, Xiaoqi Ma, Xiaoming Wei, Jianbin Jiao, Enhua Wu, Jie Hu:
Kangaroo: A Powerful Video-Language Model Supporting Long-context Video Input. CoRR abs/2408.15542 (2024) - 2023
- [j9]Xiaoqi Ma, Jin Zhang:
Supercloseness in a balanced norm of the NIPG method on Shishkin mesh for a reaction diffusion problem. Appl. Math. Comput. 444: 127828 (2023) - [j8]Xiaoqi Ma, Jin Zhang:
Supercloseness analysis of the nonsymmetric interior penalty Galerkin method for a singularly perturbed problem on Bakhvalov-type mesh. Appl. Math. Lett. 144: 108701 (2023) - [j7]Xiaoqi Ma, Jin Zhang:
Supercloseness of the NIPG method for a singularly perturbed convection diffusion problem on Shishkin mesh in 2D. Comput. Math. Appl. 152: 81-90 (2023) - [c15]Lv Tang, Xinfeng Zhang, Gai Zhang, Xiaoqi Ma:
Scene Matters: Model-based Deep Video Compression. ICCV 2023: 12447-12457 - [c14]Xiaoqi Ma, Yingzhan Xu, Xinfeng Zhang, Lv Tang, Kai Zhang, Li Zhang:
HM-PCGC: A Human-Machine Balanced Point Cloud Geometry Compression Scheme. ICIP 2023: 2265-2269 - [i10]Xiaoqi Ma, Jin Zhang:
Supercloseness analysis of the nonsymmetric interior penalty Galerkin method on Bakhvalov-type mesh. CoRR abs/2303.02365 (2023) - [i9]Xiaoqi Ma, Jin Zhang:
Supercloseness of the NIPG method for a singularly perturbed convection diffusion problem on Shishkin mesh in 2D. CoRR abs/2303.03827 (2023) - [i8]Lv Tang, Xinfeng Zhang, Gai Zhang, Xiaoqi Ma:
Scene Matters: Model-based Deep Video Compression. CoRR abs/2303.04557 (2023) - [i7]Luyang Luo, Xi Wang, Yi Lin, Xiaoqi Ma, Andong Tan, Ronald C. K. Chan, Varut Vardhanabhuti, Winnie CW Chu, Kwang-Ting Cheng, Hao Chen:
Deep Learning in Breast Cancer Imaging: A Decade of Progress and Future Directions. CoRR abs/2304.06662 (2023) - [i6]Xiaoqi Ma, Jin Zhang, Wenchao Zheng:
Uniform convergence of optimal order of a local discontinuous Galerkin method on a Shishkin mesh under a balanced norm. CoRR abs/2310.13313 (2023) - [i5]Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka, Xiaoqi Ma:
Trust-based Approaches Towards Enhancing IoT Security: A Systematic Literature Review. CoRR abs/2311.11705 (2023) - 2022
- [c13]Asmau Wali, Oluwasegun Apejoye, Thejavathy Raja, Jun He, Xiaoqi Ma:
A Novel Approach to Identifying DDoS Traffic in the Smart Home Network via Exploratory Data Analysis. AII 2022: 478-498 - [c12]Thejavathy Vengappa Raja, Zoheir Ezziane, Jun He, Xiaoqi Ma, Asmau Wali-Zubai Kazaure:
Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models. CyberC 2022: 12-18 - [c11]Xiaoqi Ma, Qian Yin, Xinfeng Zhang, Lv Tang:
Foldingnet-Based Geometry Compression of Point Cloud with Multi Descriptions. ICME Workshops 2022: 1-6 - [i4]Dexiang Hong, Xiaoqi Ma, Xinyao Wang, Congcong Li, Yufei Wang, Longyin Wen:
SC-Transformer++: Structured Context Transformer for Generic Event Boundary Detection. CoRR abs/2206.12634 (2022) - 2021
- [j6]Jin Zhang, Xiaoqi Ma, Yanhui Lv:
Finite element method on Shishkin mesh for a singularly perturbed problem with an interior layer. Appl. Math. Lett. 121: 107509 (2021) - [j5]Xinyu Zhou, Xiaoqi Ma:
Progress of graph model for conflict resolution in conflict analysis: A systematic review and bibliometrics research. J. Intell. Fuzzy Syst. 41(6): 5835-5846 (2021) - [c10]Xiaoqi Ma, Xiaoyu Lin, Majed El Helou, Sabine Süsstrunk:
Deep Gaussian Denoiser Epistemic Uncertainty and Decoupled Dual-Attention Fusion. ICIP 2021: 1629-1633 - [c9]Asmau Wali, Oluwasegun Apejoye, Jun He, Xiaoqi Ma:
An Exploratory Data Analysis of the Network Behavior of Hive Home Devices. IOTSMS 2021: 1-8 - [i3]Xiaoqi Ma, Xiaoyu Lin, Majed El Helou, Sabine Süsstrunk:
Deep Gaussian Denoiser Epistemic Uncertainty and Decoupled Dual-Attention Fusion. CoRR abs/2101.04631 (2021) - [i2]Xiaoqi Ma:
Exploring ensembles and uncertainty minimization in denoising networks. CoRR abs/2101.09798 (2021) - [i1]Jin Zhang, Xiaoqi Ma:
Supercloseness of the NIPG method for a singularly perturbed convection diffusion problem on Shishkin mesh. CoRR abs/2112.06201 (2021)
2010 – 2019
- 2018
- [j4]Ming Tang, Pengbo Wang, Xiaoqi Ma, Wenjie Chang, Huanguo Zhang, Guojun Peng, Jean-Luc Danger:
An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation. IEEE Trans. Inf. Forensics Secur. 13(12): 3008-3018 (2018) - 2013
- [c8]Abdullah A. Alabdulatif, Xiaoqi Ma, Lars Nolle:
Analysing and attacking the 4-way handshake of IEEE 802.11i standard. ICITST 2013: 382-387 - 2011
- [j3]Xiaoqi Ma:
Database Deductive Access Control. J. Comput. 6(5): 1024-1031 (2011)
2000 – 2009
- 2009
- [c7]Douglas Russell, David J. Power, Mark Slaymaker, Ghita Kouadri Mostéfaoui, Xiaoqi Ma, Andrew Simpson:
On the Secure Sharing of Legacy Data. ITNG 2009: 1676-1679 - 2008
- [j2]Xiaoqi Ma, Xiaochun Cheng:
Verifying security protocols by knowledge analysis. Int. J. Secur. Networks 3(3): 183-192 (2008) - [c6]Andrew C. Simpson, David J. Power, Douglas Russell, Mark Slaymaker, Ghita Kouadri Mostéfaoui, Xiaoqi Ma, Graeme Wilson:
A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries. HealthGrid 2008: 3-12 - 2007
- [b1]Xiaoqi Ma:
A knowledge based approach to verifying cryptographic protocols. University of Reading, UK, 2007 - 2006
- [c5]Xiaoqi Ma, Rachel McCrindle, Xiaochun Cheng:
Verifying and Fixing Password Authentication Protocol. SNPD 2006: 324-329 - 2005
- [j1]Xiaoqi Ma, Xiao-Chun Cheng:
Formal verification of the Merchant Registration phase of the SET protocol. Int. J. Autom. Comput. 2(2): 155-162 (2005) - [c4]Xiaochun Cheng, Xin He, Xiaoqi Ma, Dongdai Zhou, Peijun Duan, Shaochun Zhong:
An Agent Based Education Resource Purvey System. CIS (1) 2005: 381-386 - [c3]Xiaochun Cheng, Xiaoqi Ma, Long Wang, Shaochun Zhong:
A Mobile Agent Based Spam Filter System. CIS (1) 2005: 422-427 - [c2]Xiaoqi Ma, Xiaochun Cheng, Rachel McCrindle:
Knowledge Based Approach for Mechanically Verifying Security Protocols. IJCAI 2005: 1572-1573 - [c1]Xiaochun Cheng, Xiaoqi Ma, Maggie Xiaoyan Cheng, Scott C.-H. Huang:
Proving secure properties of cryptographic protocols with knowledge based approach. IPCCC 2005: 3-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint