


default search action
Dan Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Dan Ma 0001
— Northeastern University, State Key Laboratory of Synthetical Automation for Process Industries, Shenyang, China
- Dan Ma 0002
— Singapore Management University, School of Information Systems, Singapore (and 1 more)
- Dan Ma 0003
— Tianjin University, School of Electrical and Information Engineering, China
- Dan Ma 0004
— Duke University, Neurosurgery and Biomedical Engineering Department, Durham, USA (and 1 more)
- Dan Ma 0005
— University of Electronic Science and Technology of China (UESTC), SMILE Lab, School of Computer Science and Engineering, Chengdu, China
- Dan Ma 0006 — Xi'an Jiaotong University, School of Electronic and Information Engineering, China
- Dan Ma 0007
— Renmin University of China, School of Information, Research Institute of Smart Senior Care, Beijing, China
- Dan Ma 0008
— Meituan Inc., Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Dan Ma, Jialing Dong, Chien-Chiang Lee:
Influence of perceived risk on consumers' intention and behavior in cross-border e-commerce transactions: A case study of the Tmall Global platform. Int. J. Inf. Manag. 81: 102854 (2025) - 2024
- [j21]Lili Li, Yalin Chen, Dan Ma, Qingjun Guo:
Anti-asynchrony output regulation for switched systems under switching-Q-learning event-triggering against DoS attacks. Sci. China Inf. Sci. 67(11) (2024) - [j20]Yuzhuo Zhao, Dan Ma:
Adaptive prescribed performance control for uncertain nonlinear HOFA systems with time delay. Int. J. Syst. Sci. 55(12): 2442-2453 (2024) - [j19]Dong Wei, Wu Sun, Xiaofeng Zou, Dan Ma, Huarong Xu, Panfeng Chen, Chaoshu Yang, Mei Chen, Hui Li:
An anomaly detection model for multivariate time series with anomaly perception. PeerJ Comput. Sci. 10: e2172 (2024) - [j18]Shengjie Xia, Wu Sun, Xiaofeng Zou, Panfeng Chen, Dan Ma, Huarong Xu, Mei Chen, Hui Li:
MFAM-AD: an anomaly detection model for multivariate time series using attention mechanism to fuse multi-scale features. PeerJ Comput. Sci. 10: e2201 (2024) - [j17]Shengjie Ji, Dan Ma
, Lunxin Pan
, Wenan Wang
, Xiaohang Peng
, Joan Toluwani Amos, Honorine Niyigena Ingabire
, Min Li, Ying Wang, Dezhong Yao
, Peng Ren
:
Automated Prediction of Infant Cognitive Development Risk by Video: A Pilot Study. IEEE J. Biomed. Health Informatics 28(2): 690-701 (2024) - [c24]Jianhang Zhang, Dan Ma:
A Novel State Decomposition-Based Privacy-Preserving Algorithm for Distributed Optimization Over Directed Networks. ASCC 2024: 1145-1150 - [i2]Joymallya Chakraborty, Wei Xia, Anirban Majumder, Dan Ma, Walid Chaabene, Naveed Janvekar:
DetoxBench: Benchmarking Large Language Models for Multitask Fraud & Abuse Detection. CoRR abs/2409.06072 (2024) - 2023
- [j16]He Ni
, Hao Xu
, Dan Ma
, Jun Fan
:
Contextual combinatorial bandit on portfolio management. Expert Syst. Appl. 221: 119677 (2023) - [j15]Wenxu Zhang
, Tong Zhao, Zhongkai Zhao, Dan Ma, Feiran Liu:
Performance analysis of deep reinforcement learning-based intelligent cooperative jamming method confronting multi-functional networked radar. Signal Process. 207: 108965 (2023) - [j14]Dan Ma:
Pose recognition in national dance using contour model, hidden Markov model, and Baum-Welch algorithm. Soft Comput. 27(20): 15353-15364 (2023) - [j13]Yazhou Zhang
, Dan Ma
, Prayag Tiwari
, Chen Zhang
, Mehedi Masud
, Mohammad Shorfuzzaman
, Dawei Song
:
Stance-level Sarcasm Detection with BERT and Stance-centered Graph Attention Networks. ACM Trans. Internet Techn. 23(2): 27:1-27:21 (2023) - [j12]Wenxu Zhang
, Dan Ma
, Zhongkai Zhao
, Feiran Liu:
Design of Cognitive Jamming Decision-Making System Against MFR Based on Reinforcement Learning. IEEE Trans. Veh. Technol. 72(8): 10048-10062 (2023) - [c23]Ying Yang, Dan Ma, Yingwei Zhang:
Zero-Gradient-Sum Algorithm-Based Distributed Optimization in Finite Time for Agents on Signed Networks. ACC 2023: 228-233 - [c22]Zijing Banyan, Xiaofeng Zou, Huarong Xu, Dan Ma, Chuan Lin, Bo Zhang, Mei Chen, Hui Li:
Towards Performance Analysis for Online Data Science Learning Platform. ICCSE (2) 2023: 357-371 - [c21]Dan Ma, Mengyao Fu, Jie Fang, Zhao Cai:
Disentangling the Relationship between Portfolio Homogenization and Transaction of Non-fungible Tokens. ICIS 2023 - [c20]Tianlu Zhou, Dan Ma, Nan Feng:
An Economic Analysis of Third-Party Software Reliability Improvement using the Bug Bounty Program. ICIS 2023 - [c19]Dan Ma:
Clinical applications of fast and quantitative MR fingerprinting. Biomedical Applications in Molecular, Structural, and Functional Imaging 2023 - [c18]Yue Cheng, Dan Ma:
From Seekers to Providers: Investigating the Transition of Participation Style in Online Health Communities. PACIS 2023: 42 - [c17]Tianlu Zhou, Dan Ma, Nan Feng:
The Use of Bug Bounty Programs for Software Reliability Improvement. PACIS 2023: 99 - 2022
- [j11]Xiaobin Tang, Nuo Lei, Manru Dong, Dan Ma
:
Stock Price Prediction Based on Natural Language Processing1. Complex. 2022: 9031900:1-9031900:15 (2022) - [j10]Jin Li
, Dan Ma
, Wei Wang:
SL(n) Contravariant Vector Valuations. Discret. Comput. Geom. 67(4): 1211-1228 (2022) - [j9]Yuzhuo Zhao, Dan Ma, Hongwei Ma:
Adaptive Neural Network Control of Thermoacoustic Instability in Rijke Tube: A Fully Actuated System Approach. J. Syst. Sci. Complex. 35(2): 586-603 (2022) - 2021
- [j8]Shezhou Luo, Weiwei Liu
, Yaqian Zhang, Cheng Wang, Xiaohuan Xi, Sheng Nie, Dan Ma, Yi Lin, Guoqing Zhou
:
Maize and soybean heights estimation from unmanned aerial vehicle (UAV) LiDAR data. Comput. Electron. Agric. 182: 106005 (2021) - [c16]Zengfeng Zeng, Dan Ma, Haiqin Yang
, Zhen Gou, Jianping Shen:
Automatic Intent-Slot Induction for Dialogue Systems. WWW 2021: 2578-2589 - [i1]Zengfeng Zeng, Dan Ma, Haiqin Yang, Zhen Gou, Jianping Shen:
Automatic Intent-Slot Induction for Dialogue Systems. CoRR abs/2103.08886 (2021) - 2020
- [c15]Xueyan Ma, Dan Ma:
Delay Margin for Containment Control of Second-Order Multi-Agent Systems Over Directed Graphs. ICARCV 2020: 154-159 - [c14]Dan Ma
, Haidong Liu
, Dawei Song
:
Word Graph Network: Understanding Obscure Sentences on Social Media for Violation Comment Detection. NLPCC (1) 2020: 738-750
2010 – 2019
- 2019
- [j7]Shezhou Luo, Cheng Wang, Xiaohuan Xi, Sheng Nie, Xieyu Fan, Hanyue Chen, Dan Ma, Jinfu Liu, Jie Zou, Yi Lin, Guoqing Zhou
:
Estimating forest aboveground biomass using small-footprint full-waveform airborne LiDAR data. Int. J. Appl. Earth Obs. Geoinformation 83 (2019) - [j6]Xing Qiao, Dan Ma:
Reliability and Numerical Analysis of a Robot Safety System. J. Syst. Sci. Complex. 32(4): 1072-1092 (2019) - [c13]Zexi Lu, Dan Ma, Juan Wang:
Delay Robustness of Second-Order Uncertain Nonlinear Delay Systems under PID Control*. CCTA 2019: 1068-1073 - [c12]Luyao Wang, Zhuoyuw Li, Dan Ma:
Finite-Time Adaptive Consensus of Second-Order Nonlinear Leader-Following Multi-Agent Systems with Switching Topology. ICCA 2019: 1218-1223 - 2018
- [j5]Dong Wang, Doutian Ren, Kuo Li, Yiming Feng, Dan Ma, Xiangguo Yan, Gang Wang
:
Epileptic Seizure Detection in Long-Term EEG Recordings by Using Wavelet-Based Directed Transfer Function. IEEE Trans. Biomed. Eng. 65(11): 2591-2599 (2018) - [c11]Jiale Zhao, Shuangzhi Li, Dan Ma, Xiaomin Mu:
Research on Joint Mode Selection and Resource Allocation Scheme in D2D Networks. CyberC 2018 - [c10]Jia Liu, Zhenzhen Quan, Dan Ma, Tao Yang:
Anti-Windup $\boldsymbol{L}_{\infty}$ Event-Triggered Control for Linear Systems with Actuator Saturation and Persistent Bounded Disturbance. ICARCV 2018: 626-631 - 2017
- [c9]Xiaojing Li, Tingting Zhang, Dan Ma, Bin Cao, Qinyu Zhang
:
Location privacy protection in asynchronous localization networks by resource allocation approaches. ICC Workshops 2017: 1061-1066 - 2016
- [j4]Dan Ma, Jun Liu
, Junyi Huang
, Huali Li, Ping Liu
, Huijuan Chen, Jing Qian:
Spectral Similarity Assessment Based on a Spectrum Reflectance-Absorption Index and Simplified Curve Patterns for Hyperspectral Remote Sensing. Sensors 16(2): 152 (2016) - [c8]Dan Ma, Ning Wang, Xiaomin Mu:
Resource allocation for hybrid mode device-to-device communication networks. WCSP 2016: 1-5 - 2015
- [c7]Qiang Zhang, Dengkang Zhao, Shaojun Zuo, Tingting Zhang, Dan Ma:
A low complexity NLOS error mitigation method in UWB localization. ICCC 2015: 1-5 - 2013
- [j3]Xing Qiao, Dan Ma, Fu Zheng
, Guangtian Zhu:
The Well-Posedness and Stability Analysis of a Computer Series System. J. Appl. Math. 2013: 131076:1-131076:9 (2013) - 2011
- [j2]Junhua Tang, Jinhai Xu, Shiwen Wan, Dan Ma
:
Comprehensive Evaluation and Selection System of Coal Distributors with Analytic Hierarchy Process and Artificial Neural Network. J. Comput. 6(2): 208-215 (2011) - 2010
- [j1]Dan Ma, Shengwu Zhou, Haojin Lv:
Three-Dimensional Nonlinear Dynamic Model and Macro Control of Real Estate. Intell. Inf. Manag. 2(5): 325-328 (2010)
2000 – 2009
- 2009
- [c6]Xing Qiao, Zhaoxing Li, Dan Ma:
Exponential Asymptotic Stability of a Two-Unit Standby Redundant Electronic Equipment System under Human Failure. ISNN (1) 2009: 244-252 - 2004
- [c5]Dan Ma, Wei Zhang, Qinghua Li:
Dynamic Scheduling Algorithm for Parallel Real-Time Jobs in Heterogeneous System. CIT 2004: 462-466 - [c4]Wei Zhang, Shangfen Guo, Dan Ma:
A General Model for Heterogeneous Web Services Integration. AWCC 2004: 374-379 - 2003
- [c3]Dan Ma, Wei Zhang:
A Static Task Scheduling Algorithm in Grid Computing. GCC (2) 2003: 153-156 - [c2]Dan Ma, Wei Zhang, Hong-jun Zhang:
A New Agent-Based Distributed Model of Grid Service Advertisement and Discovery. GCC (2) 2003: 157-160 - [c1]Wei Zhang, Jun Zhang, Dan Ma, Benli Wang, YunTao Chen:
An Extension of Grid Service: Grid Mobile Service. GCC (2) 2003: 507-512
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-17 01:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint