default search action
Jun Ma 0015
Person information
- affiliation: National University of Defense Technology, College of Computer, Changsha, China
Other persons with the same name
- Jun Ma — disambiguation page
- Jun Ma 0001 — Shandong University, School of Computer Science and Technology, Jinan, China (and 1 more)
- Jun Ma 0002 — University of Wollongong, SMART Infrastructure Facility, NSW, Australia (and 2 more)
- Jun Ma 0003 — Lanzhou University of Technology, China (and 1 more)
- Jun Ma 0004 — University of Aizu, Graduate Department of Computer and Information Systems, Aizu-Wakamatsu, Japan
- Jun Ma 0005 — Fudan University, State Key Laboratory of ASIC & System, Shanghai, China
- Jun Ma 0006 — Qualcomm, San Diego, CA, USA (and 1 more)
- Jun Ma 0007 — Marvell Semiconductors Inc., Santa Clara, CA, USA (and 1 more)
- Jun Ma 0008 — Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China (and 1 more)
- Jun Ma 0009 — Kunming University of Science and Technology, Faculty of Information Engineering and Automation, Yunnan Key Laboratory of Artificial Intelligence, Kunming, China (and 1 more)
- Jun Ma 0010 — Nanjing University, Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, Nanjing, China
- Jun Ma 0011 — Broadcom Corporation, Irvine, CA, USA (and 2 more)
- Jun Ma 0012 — Shanghai Jiao Tong University, School of Microelectronics, Shanghai, China
- Jun Ma 0013 — Northwest Minzu University, School of Mathematics and Computer Science, Lanzhou, China
- Jun Ma 0014 — Qualcomm, Inc., San Diego, USA (and 1 more)
- Jun Ma 0016 — University of Toronto, Department of Laboratory Medicine and Pathobiology, ON, Canada (and 1 more)
- Jun Ma 0017 — Shanghai Jiaotong University, Department of Mathematics, Shanghai, China
- Jun Ma 0018 — Ping An Technology, China
- Jun Ma 0019 — Macquarie University, Department of Statistics, North Ryde, Australia
- Jun Ma 0020 — North Minzu University, School of Mathematics and Information Sciences, Yinchuan, China (and 1 more)
- Jun Ma 0021 — Chinese Academy of Sciences, Institute of Plasma Physics, Hefei, China
- Jun Ma 0022 — Fudan University, School of Life Sciences, Institute of Biodiversity Science, Key Laboratory for Biodiversity Science and Ecological Engineering, National Observations and Research Station for Wetland Ecosystems of the Yangtze Estuary, Shanghai, China
- Jun Ma 0023 — Beijing Forestry University, Beijing Key Laboratory of Precision Forestry, Beijing, China
- Jun Ma 0024 — Hunan University, College of Electrical and Information Engineering, Changsha, China
- Jun Ma 0025 — Hohai University, Business School, Jiangsu Water Resources and Sustainable Development Research Center, Nanjing, China
- Jun Ma 0026 — Xidian University, School of Telecommunications Engineering, Xi'an, China (and 1 more)
- Jun Ma 0027 — University of Calgary, Department of Mechanical and Manufacturing Engineering, Calgary, Canada
- Jun Ma 0028 — University of Minnesota, Department of Neurosurgery, Minneapolis, MN, USA
- Jun Ma 0029 — Amazon, Seattle, WA, USA (and 1 more)
- Benedict Jun Ma (aka: Jun Ma 0030) — University of Hong Kong, Department of Industrial and Manufacturing Systems Engineering, Hong Kong (and 1 more)
- Jun Ma 0031 — Guilin University of Electronic Technology, School of Electronic Engineering and Automation, Guangxi, China
- Jun Ma 0032 — North Carolina State University, Department of Statistics, Bioinformatics Research Center, Raleigh, NC, USA
- Jun Ma 0033 — Cincinnati Children's Research Foundation, Division of Developmental Biology, Cincinnati, OH, USA
- Jun Ma 0034 — University of Science and Technology of China, School of Data Science, Hefei, China (and 1 more)
- Jun Ma 0035 — Dalian University of Technology, School of Mechanical Engineering, Dalian, China
- Jun Ma 0036 — Tongji University, School of Automotive Studies, Design and Innovation College, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Bin Ji, Shasha Li, Hao Xu, Jie Yu, Jun Ma, Huijun Liu, Jing Yang:
Span-based joint entity and relation extraction augmented with sequence tagging mechanism. Sci. China Inf. Sci. 67(5) (2024) - [j14]Huijun Liu, Bin Ji, Jie Yu, Shasha Li, Jun Ma, Zibo Yi, Mengxue Du, Miaomiao Li, Jie Liu, Zeyao Mo:
A More Context-Aware Approach for Textual Adversarial Attacks Using Probability Difference-Guided Beam Search. IEEE Trans. Knowl. Data Eng. 36(6): 2316-2328 (2024) - [c36]Huijun Liu, Bin Ji, Jie Yu, Shasha Li, Jun Ma, Miaomiao Li, Xi Wang:
Offline Textual Adversarial Attacks against Large Language Models. IJCNN 2024: 1-9 - [c35]Shezheng Song, Shasha Li, Jie Yu, Shan Zhao, Xiaopeng Li, Jun Ma, Xiaodong Liu, Zhuo Li, Xiaoguang Mao:
DIM: Dynamic Integration of Multimodal Entity Linking with Large Language Model. PRCV (5) 2024: 187-200 - [i14]Xiaopeng Li, Shasha Li, Bin Ji, Shezheng Song, Xi Wang, Jun Ma, Jie Yu, Xiaodong Liu, Jing Wang, Weimin Zhang:
SWEA: Changing Factual Knowledge in Large Language Models via Subject Word Embedding Altering. CoRR abs/2401.17809 (2024) - [i13]Shezheng Song, Shasha Li, Shan Zhao, Xiaopeng Li, Chengyu Wang, Jie Yu, Jun Ma, Tianwei Yan, Bin Ji, Xiaoguang Mao:
DWE+: Dual-Way Matching Enhanced Framework for Multimodal Entity Linking. CoRR abs/2404.04818 (2024) - [i12]Shezheng Song, Shasha Li, Shan Zhao, Chengyu Wang, Xiaopeng Li, Jie Yu, Qian Wan, Jun Ma, Tianwei Yan, Wentao Ma, Xiaoguang Mao:
PTA: Enhancing Multimodal Sentiment Analysis through Pipelined Prediction and Translation-based Alignment. CoRR abs/2406.00017 (2024) - [i11]Shezheng Song, Shasha Li, Jie Yu, Shan Zhao, Xiaopeng Li, Jun Ma, Xiaodong Liu, Zhuo Li, Xiaoguang Mao:
DIM: Dynamic Integration of Multimodal Entity Linking with Large Language Model. CoRR abs/2407.12019 (2024) - [i10]Xiaopeng Li, Shangwen Wang, Shezheng Song, Bin Ji, Huijun Liu, Shasha Li, Jun Ma, Jie Yu:
Identifying Knowledge Editing Types in Large Language Models. CoRR abs/2409.19663 (2024) - 2023
- [j13]Haochen He, Erci Xu, Shanshan Li, Zhouyang Jia, Si Zheng, Yue Yu, Jun Ma, Xiangke Liao:
When Database Meets New Storage Devices: Understanding and Exposing Performance Mismatches via Configurations. Proc. VLDB Endow. 16(7): 1712-1725 (2023) - [c34]Shulin Zhou, Zhijie Jiang, Shanshan Li, Xiaodong Liu, Zhouyang Jia, Yuanliang Zhang, Jun Ma, Haibo Mi:
WMWatcher: Preventing Workload-Related Misconfigurations in Production Environment. APSEC 2023: 279-288 - [c33]Mengxue Du, Shasha Li, Jie Yu, Jun Ma, Huijun Liu, Miaomiao Li, Bin Ji:
DADR: A Denoising Approach for Dense Retrieval Model Training. APWeb/WAIM (3) 2023: 159-173 - [c32]Xi Deng, Shasha Li, Jie Yu, Jun Ma:
HM-Transformer: Hierarchical Multi-modal Transformer for Long Document Image Understanding. APWeb/WAIM (4) 2023: 232-245 - [c31]Huijun Liu, Jie Yu, Jun Ma, Shasha Li:
A Novel Ranking Method for Textual Adversarial Attack. MLNLP 2023: 73-77 - [c30]Miaomiao Li, Jie Yu, Jun Ma, Shasha Li, Huijun Liu, Mengxue Du, Bin Ji:
QAE: A Hard-Label Textual Attack Considering the Comprehensive Quality of Adversarial Examples. NLPCC (2) 2023: 520-532 - [c29]Jing Yang, Bin Ji, Shasha Li, Jun Ma, Long Peng, Jie Yu:
Dynamic Multi-View Fusion Mechanism for Chinese Relation Extraction. PAKDD (1) 2023: 405-417 - [c28]Yingwei Ma, Yue Yu, Shanshan Li, Zhouyang Jia, Jun Ma, Rulin Xu, Wei Dong, Xiangke Liao:
MulCS: Towards a Unified Deep Representation for Multilingual Code Search. SANER 2023: 120-131 - [i9]Jing Yang, Bin Ji, Shasha Li, Jun Ma, Long Peng, Jie Yu:
Dynamic Multi-View Fusion Mechanism For Chinese Relation Extraction. CoRR abs/2303.05082 (2023) - 2022
- [j12]Huijun Liu, Jie Yu, Jun Ma, Shasha Li, Bin Ji, Zibo Yi, Miaomiao Li, Long Peng, Xiaodong Liu:
Textual adversarial attacks by exchanging text-self words. Int. J. Intell. Syst. 37(12): 12212-12234 (2022) - [j11]Zibo Yi, Shasha Li, Jun Ma, Jie Yu, Yusong Tan, Qingbo Wu:
Towards an Efficient and Robust Adversarial Attack Against Neural Text Classifier. Int. J. Pattern Recognit. Artif. Intell. 36(11): 2253007:1-2253007:22 (2022) - [j10]Bin Ji, Yalong Xie, Jie Yu, Shasha Li, Jun Ma, Yun Ji, Huijun Liu:
A novel bundling learning paradigm for named entity recognition. Knowl. Based Syst. 248: 108825 (2022) - [j9]Jie Yu, Bin Ji, Shasha Li, Jun Ma, Huijun Liu, Hao Xu:
S-NER: A Concise and Efficient Span-Based Model for Named Entity Recognition. Sensors 22(8): 2852 (2022) - [c27]Wuhang Lin, Shasha Li, Chen Zhang, Bin Ji, Jie Yu, Jun Ma, Zibo Yi:
SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder. APWeb/WAIM (2) 2022: 69-84 - [c26]Bin Ji, Shasha Li, Shaoduo Gan, Jie Yu, Jun Ma, Huijun Liu, Jing Yang:
Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes. COLING 2022: 1842-1854 - [c25]Lianghao Shen, Yusong Tan, Pian Tao, Pan Dong, Jun Ma:
Extending Take-Grant Model for More Flexible Privilege Propagation. CSSE 2022: 445-450 - [c24]Mengxue Du, Shasha Li, Jie Yu, Jun Ma, Bin Ji, Huijun Liu, Wuhang Lin, Zibo Yi:
Topic-Grained Text Representation-Based Model for Document Retrieval. ICANN (3) 2022: 776-788 - [c23]Hao Xu, Long Peng, Xiaodong Liu, Menglin Zhang, Jun Ma, Jie Yu, Zibo Yi:
KylinTune: DQN-based Energy-efficient Model for Browser in Mobile Devices. IPCCC 2022: 254-262 - [c22]Lianghao Shen, Yusong Tan, Pan Dong, Jun Ma, Xiaoling Li:
A Simple and Efficient Object-Capability Revocation Method. ITCC 2022: 132-138 - [i8]Bin Ji, Shasha Li, Jie Yu, Jun Ma, Huijun Liu:
Win-Win Cooperation: Bundling Sequence and Span Models for Named Entity Recognition. CoRR abs/2207.03300 (2022) - [i7]Mengxue Du, Shasha Li, Jie Yu, Jun Ma, Bin Ji, Huijun Liu, Wuhang Lin, Zibo Yi:
Topic-Grained Text Representation-based Model for Document Retrieval. CoRR abs/2207.04656 (2022) - [i6]Wuhang Lin, Shasha Li, Chen Zhang, Bin Ji, Jie Yu, Jun Ma, Zibo Yi:
SummScore: A Comprehensive Evaluation Metric for Summary Quality Based on Cross-Encoder. CoRR abs/2207.04660 (2022) - [i5]Bin Ji, Shasha Li, Shaoduo Gan, Jie Yu, Jun Ma, Huijun Liu:
Few-shot Named Entity Recognition with Entity-level Prototypical Network Enhanced by Dispersedly Distributed Prototypes. CoRR abs/2208.08023 (2022) - [i4]Huijun Liu, Jie Yu, Shasha Li, Jun Ma, Bin Ji:
A Context-Aware Approach for Textual Adversarial Attack through Probability Difference Guided Beam Search. CoRR abs/2208.08029 (2022) - [i3]Bin Ji, Hao Xu, Jie Yu, Shasha Li, Jun Ma, Yuke Ji, Huijun Liu:
A Two-Phase Paradigm for Joint Entity-Relation Extraction. CoRR abs/2208.08659 (2022) - [i2]Bin Ji, Shasha Li, Hao Xu, Jie Yu, Jun Ma, Huijun Liu, Jing Yang:
Span-based joint entity and relation extraction augmented with sequence tagging mechanism. CoRR abs/2210.12720 (2022) - 2021
- [c21]Jianling Li, Wuhang Lin, Shasha Li, Jie Yu, Jun Ma:
Hierarchical Encoder-Decoder Summary Model with an Instructor for Long Academic Papers. ICCCS 2021: 536-540 - [c20]Wuhang Lin, Jianling Li, Zibo Yi, Bin Ji, Shasha Li, Jie Yu, Jun Ma:
A Unified Summarization Model with Semantic Guide and Keyword Coverage Mechanism. ICANN (5) 2021: 333-344 - [c19]Yijia Liu, Shasha Li, Jie Yu, Yusong Tan, Jun Ma, Qingbo Wu:
Many-To-Many Chinese ICD-9 Terminology Standardization Based on Neural Networks. ICIC (2) 2021: 430-441 - [c18]Xiaohu Du, Jie Yu, Shasha Li, Zibo Yi, Hai Liu, Jun Ma:
Combating Word-level Adversarial Text with Robust Adversarial Training. IJCNN 2021: 1-8 - [c17]Liming Yang, Yi Ren, Jianbo Guan, Bao Li, Jun Ma, Peng Han, Yusong Tan:
FastDCF: A Partial Index Based Distributed and Scalable Near-Miss Code Clone Detection Approach for Very Large Code Repositories. PDCAT 2021: 210-222 - [i1]Bin Ji, Shasha Li, Jie Yu, Jun Ma, Huijun Liu:
Boosting Span-based Joint Entity and Relation Extraction via Squence Tagging Mechanism. CoRR abs/2105.10080 (2021) - 2020
- [j8]Bin Ji, Shasha Li, Jie Yu, Jun Ma, Jintao Tang, Qingbo Wu, Yusong Tan, Huijun Liu, Yun Ji:
Research on Chinese medical named entity recognition based on collaborative cooperation of multiple neural network models. J. Biomed. Informatics 104: 103395 (2020) - [j7]Pan Dong, Zhe Jiang, Alan Burns, Yan Ding, Jun Ma:
Build real-time communication for hybrid dual-OS system. J. Syst. Archit. 107: 101774 (2020) - [c16]Bin Ji, Jie Yu, Shasha Li, Jun Ma, Qingbo Wu, Yusong Tan, Huijun Liu:
Span-based Joint Entity and Relation Extraction with Attention-based Span-specific and Contextual Semantic Representations. COLING 2020: 88-99 - [c15]Xiaohu Du, Zibo Yi, Shasha Li, Jun Ma, Jie Yu, Yusong Tan, Qinbo Wu:
Generating More Effective and Imperceptible Adversarial Text Examples for Sentiment Classification. ICAIS (1) 2020: 422-433
2010 – 2019
- 2019
- [j6]Huaizhe Zhou, Haihe Ba, Yongjun Wang, Zhiying Wang, Jun Ma, Yunshi Li, Huidong Qiao:
Tenant-Oriented Monitoring for Customized Security Services in the Cloud. Symmetry 11(2): 252 (2019) - [c14]Yi Ren, Jianbo Guan, Jun Ma, Yusong Tan, Qingbo Wu, Yan Ding:
CLASC: A Changelog Based Automatic Code Source Classification Method for Operating System Packages. APSEC 2019: 378-385 - [c13]Pan Dong, Zhe Jiang, Alan Burns, Yan Ding, Jun Ma:
Work-in-Progress: Real-Time RPC for Hybrid Dual-OS System. RTSS 2019: 532-535 - 2017
- [j5]Yong Cheng, Jun Ma, Jiangchun Ren, Songzhu Mei, Zhiying Wang:
UTrustDisk: An Efficient Data Protection Scheme for Building Trusted USB Flash Disk. KSII Trans. Internet Inf. Syst. 11(4): 2276-2291 (2017) - [j4]Qintao Shen, Li Zhang, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu:
上下文敏感的控制流完整性保护的改进方法 (Improved Method of Context-sensitive Control Flow Integrity Protection). 计算机科学 44(11): 87-90 (2017) - [c12]Yong Cheng, Huaizhe Zhou, Jun Ma, Zhiying Wang:
Efficient CP-ABE with Non-monotonic Access Structures. ICCCS (2) 2017: 315-325 - 2016
- [c11]Shaoduo Gan, Jiexin Zhang, Jie Yu, Xiaoling Li, Jun Ma, Lei Luo, Qingbo Wu:
A novel optimization scheme for caching in locality-aware P2P networks. ISCC 2016: 1024-1031 - [c10]Qi Zhang, Jie Yu, Lei Luo, Jun Ma, Qingbo Wu, Shasha Li:
An Optimized DHT for Linux Package Distribution. ISPDC 2016: 298-305 - [c9]Lu Si, Jie Yu, Lei Luo, Jun Ma, Qingbo Wu, Shasha Li:
ROP-Hunt: Detecting Return-Oriented Programming Attacks in Applications. SpaCCS 2016: 131-144 - [c8]Zibo Yi, Jun Ma, Lei Luo, Jie Yu, Qingbo Wu:
Improving JavaScript Malware Classifier's Security against Evasion by Particle Swarm Optimization. Trustcom/BigDataSE/ISPA 2016: 1734-1740 - [c7]Shaoduo Gan, Jie Yu, Xiaoling Li, Jun Ma, Lei Luo, Qingbo Wu, Shasha Li:
ERPC: An Edge-Resources Based Framework to Reduce Bandwidth Cost in the Personal Cloud. WAIM (2) 2016: 444-456 - 2015
- [j3]Weihua Zhang, Xiaoyong Li, Jun Ma, Jie Yu:
REPS: 一种高效的容错并行概率流Skyline查询方法 (REPS: An Efficient Fault-tolerant Approach for Parallel Skyline Queries over Probabilistic Data Streams). 计算机科学 42(8): 225-230 (2015) - [j2]Jie Yu, Qiang Li, Shasha Li, Jun Ma, Zhoujun Li:
基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks). 计算机科学 42(Z6): 263-265 (2015) - 2013
- [j1]Yong Cheng, Zhiying Wang, Jun Ma, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren:
Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. J. Zhejiang Univ. Sci. C 14(2): 85-97 (2013) - 2011
- [c6]Yong Cheng, Jiangjiang Wu, Songzhu Mei, Zhiying Wang, Jun Ma, Jiangchun Ren, Ke Yan:
Mailbook: privacy-protecting social networking via email. ICIMCS 2011: 90-94 - [c5]Songzhu Mei, Jiangjiang Wu, Yong Cheng, Jun Ma, Jiangchun Ren, Xiaoxing Li:
Trusted Bytecode Virtual Machine Module: Towards Dynamic Remote Attestation in Cloud Computing. IPTC 2011: 19-23 - [c4]Jiangjiang Wu, Jie Zhou, Jun Ma, Songzhu Mei, Jiangchun Ren:
An Active Data Leakage Prevention Model for Insider Threat. IPTC 2011: 39-42 - [c3]Yong Cheng, Zhiying Wang, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren, Jun Ma:
SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk. TrustCom 2011: 381-388
2000 – 2009
- 2008
- [c2]Jun Ma, Jiangchun Ren, Zhiying Wang, Yaokai Zhu:
Research of a Secure File System for Protection of Intellectual Property Right. WAIM 2008: 661-665 - 2005
- [c1]Fang Liu, Kui Dai, Zhiying Wang, Jun Ma:
Research on Fuzzy Group Decision Making in Security Risk Assessment. ICN (2) 2005: 1114-1121
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint