default search action
Chuang Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Chuang Ma, Tiemin Zhang, Haikun Zheng, Jikang Yang, Ruitian Chen, Cheng Fang:
Measurement method for live chicken shank length based on improved ResNet and fused multi-source information. Comput. Electron. Agric. 221: 108965 (2024) - [j51]Jikang Yang, Tiemin Zhang, Cheng Fang, Haikun Zheng, Chuang Ma, Zhenlong Wu:
A detection method for dead caged hens based on improved YOLOv7. Comput. Electron. Agric. 226: 109388 (2024) - [j50]Jingnan Dong, Guangxia Xu, Chuang Ma, Jun Liu, Uchani Gutierrez Omar Cliff:
Blockchain-Based Certificate-Free Cross-Domain Authentication Mechanism for Industrial Internet. IEEE Internet Things J. 11(2): 3316-3330 (2024) - [j49]Haifeng Zhang, Feng Zhang, Huan Wang, Chuang Ma, Peican Zhu:
A novel privacy-preserving graph convolutional network via secure matrix multiplication. Inf. Sci. 657: 119897 (2024) - [j48]Jing Cai, Haihui Huang, Chuang Ma, Jun Liu:
A blockchain-based privacy protecting framework with multi-channel access control model for asset trading. Peer Peer Netw. Appl. 17(5): 2810-2829 (2024) - [j47]Xiao Ding, Huan Wang, Xi Zhang, Chuang Ma, Haifeng Zhang:
Dual nature of cyber-physical power systems and the mitigation strategies. Reliab. Eng. Syst. Saf. 244: 109958 (2024) - [j46]Qing Tian, Chuang Ma, Meng Cao, Jun Wan, Zhen Lei, Songcan Chen:
Unsupervised Multitarget Domain Adaptation With Dictionary-Bridged Knowledge Exploitation. IEEE Trans. Neural Networks Learn. Syst. 35(3): 3464-3477 (2024) - [j45]Xiao Ding, Haifeng Zhang, Chuang Ma, Xingyi Zhang, Kai Zhong:
User Identification Across Multiple Social Networks Based on Naive Bayes Model. IEEE Trans. Neural Networks Learn. Syst. 35(3): 4274-4285 (2024) - [j44]Chuang Ma, Tao Zuo, Haifeng Zhang:
Network Shortest Path Interdiction Problem Based on Generalized Set Coverage. IEEE Trans. Netw. Sci. Eng. 11(2): 2191-2203 (2024) - 2023
- [j43]Chuang Ma, Xin Ren, Guangxia Xu, Bo He:
FedGR: Federated Graph Neural Network for Recommendation Systems. Axioms 12(2): 170 (2023) - [j42]Guangxia Xu, Jingnan Dong, Chuang Ma, Jun Liu, Uchani Gutierrez Omar Cliff:
A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing. IEEE Internet Things J. 10(14): 11960-11974 (2023) - [j41]Chuang Ma, Shuaiwu Liu, Guangxia Xu:
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network. J. Cloud Comput. 12(1): 93 (2023) - [j40]Chuang Ma, Tang He, Jun Gao:
Skin scar segmentation based on saliency detection. Vis. Comput. 39(10): 4887-4899 (2023) - [c42]Guangxia Xu, Yuling Huang, Chuang Ma:
Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme. CloudNet 2023: 372-380 - [i9]Dinghua Shi, Zhifeng Chen, Chuang Ma, Guanrong Chen:
Computing persistent homology by spanning trees and critical simplices. CoRR abs/2302.09940 (2023) - 2022
- [j39]Qian Cheng, Shuqing Jiang, Feng Xu, Qian Wang, Yingjie Xiao, Ruyang Zhang, Jiuran Zhao, Jianbing Yan, Chuang Ma, Xiangfeng Wang:
Genome optimization via virtual simulation to accelerate maize hybrid breeding. Briefings Bioinform. 23(1) (2022) - [j38]Haikun Zheng, Cheng Fang, Tiemin Zhang, Hongzhi Zhao, Jikang Yang, Chuang Ma:
Shank length and circumference measurement algorithm of breeder chickens based on extraction of regional key points. Comput. Electron. Agric. 197: 106989 (2022) - [j37]Ting Zhang, Jingjing Zhai, Xiaorong Zhang, Lei Ling, Menghan Li, Shang Xie, Minggui Song, Chuang Ma:
Interactive Web-based Annotation of Plant MicroRNAs with iwa-miRNA. Genom. Proteom. Bioinform. 20(3): 557-567 (2022) - [j36]Guangxia Xu, Jiajun Zhang, Uchani Gutierrez Omar Cliff, Chuang Ma:
An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption. Int. J. Intell. Syst. 37(12): 10715-10750 (2022) - [j35]Yuqing Xu, Guangxia Xu, Chuang Ma, Zeliang An:
An Advancing Temporal Convolutional Network for 5G Latency Services via Automatic Modulation Recognition. IEEE Trans. Circuits Syst. II Express Briefs 69(6): 3002-3006 (2022) - [j34]Yuqing Xu, Guangxia Xu, Chuang Ma:
A Novel Blind High-Order Modulation Classifier Using Accumulated Constellation Temporal Convolution for OSTBC-OFDM Systems. IEEE Trans. Circuits Syst. II Express Briefs 69(9): 3959-3963 (2022) - [j33]Xiao Ding, Chuang Ma, Xingyi Zhang, Han-Shuang Chen, Hai-Feng Zhang:
SOIDP: Predicting Interlayer Links in Multiplex Networks. IEEE Trans. Comput. Soc. Syst. 9(4): 997-1007 (2022) - [j32]Qing Tian, Chuang Ma, Meng Cao, Songcan Chen, Hujun Yin:
A Convex Discriminant Semantic Correlation Analysis for Cross-View Recognition. IEEE Trans. Cybern. 52(2): 849-861 (2022) - [j31]Qing Tian, Heyang Sun, Chuang Ma, Meng Cao, Yi Chu, Songcan Chen:
Heterogeneous Domain Adaptation With Structure and Classification Space Alignment. IEEE Trans. Cybern. 52(10): 10328-10338 (2022) - 2021
- [j30]Huan Wang, Chuang Ma, Han-Shuang Chen, Hai-Feng Zhang:
Effects of asymptomatic infection and self-initiated awareness on the coupled disease-awareness dynamics in multiplex networks. Appl. Math. Comput. 400: 126084 (2021) - [j29]Zhixu Qiu, Siyuan Chen, Yuhong Qi, Chunni Liu, Jingjing Zhai, Shang Xie, Chuang Ma:
Exploring transcriptional switches from pairwise, temporal and population RNA-Seq data using deepTS. Briefings Bioinform. 22(3) (2021) - [j28]Jun Liu, Mingyue Xie, Shuyu Chen, Chuang Ma, Qianhong Gong:
An improved DPoS consensus mechanism in blockchain based on PLTS for the smart autonomous multi-robot system. Inf. Sci. 575: 528-541 (2021) - [j27]Guangxia Xu, Mengxiao Hu, Chuang Ma:
Secure and smart autonomous multi-robot systems for opinion spammer detection. Inf. Sci. 576: 681-693 (2021) - [j26]Qing Tian, Chuang Ma, Feng-Yuan Zhang, Shun Peng, Hui Xue:
Source-Free Unsupervised Domain Adaptation with Sample Transport Learning. J. Comput. Sci. Technol. 36(3): 606-616 (2021) - [j25]Guangxia Xu, Jingnan Dong, Chuang Ma:
A certificateless encryption scheme based on blockchain. Peer-to-Peer Netw. Appl. 14(5): 2952-2960 (2021) - [j24]Qi-ming Liu, Chuang Ma, Bing-Bing Xiang, Han-Shuang Chen, Haifeng Zhang:
Inferring Network Structure and Estimating Dynamical Process From Binary-State Data via Logistic Regression. IEEE Trans. Syst. Man Cybern. Syst. 51(8): 4639-4649 (2021) - [c41]Jun Liu, Sule Tang, Chuang Ma, Sishi Qin, Wei Li, Aidong Xu:
A community detection algorithm based on discrete mixed fruit fly optimization. BigDataSecurity 2021: 129-134 - [c40]Chuang Ma, Sishi Qin, Jinhao Hu, Li Yan:
Subway Flow Prediction Based on Improved Support Vector Machine. CSCloud/EdgeCom 2021: 115-120 - [c39]Chuang Ma, Xinting Hu, Shuaiwu Liu, Lei Liu:
Attention Based Multi-Unit Spatial-Temporal Network for Traffic Flow Forecasting. CSCloud/EdgeCom 2021: 225-230 - [i8]Chuang Ma, Dingchuan Xue, Shaoshuai Li, Zhengcheng Zhou, Yichao Zhu, Xu Guo:
Stiffness optimisation of graded microstructal configurations using asymptotic analysis and machine learning. CoRR abs/2110.06458 (2021) - 2020
- [j23]Jun Liu, Sule Tang, Guangxia Xu, Chuang Ma, Mingwei Lin:
A Novel Configuration Tuning Method Based on Feature Selection for Hadoop MapReduce. IEEE Access 8: 63862-63871 (2020) - [j22]Siyuan Chen, Chengzhi Ren, Jingjing Zhai, Jiantao Yu, Xuyang Zhao, Zelong Li, Ting Zhang, Wenlong Ma, Zhaoxue Han, Chuang Ma:
CAFU: a Galaxy framework for exploring unmapped RNA-Seq data. Briefings Bioinform. 21(2): 676-686 (2020) - [j21]Guangxia Xu, Linghao Zhang, Chuang Ma, Yanbing Liu:
A mixed attributes oriented dynamic SOM fuzzy cluster algorithm for mobile user classification. Inf. Sci. 515: 280-293 (2020) - [j20]Qing Tian, Heyang Sun, Chuang Ma, Meng Cao, Yi Chu:
Age Estimation via Selecting Discriminated Features and Preserving Geometry. KSII Trans. Internet Inf. Syst. 14(4): 1721-1737 (2020) - [j19]Chuang Ma, Han-Shuang Chen, Xiang Li, Ying-Cheng Lai, Hai-Feng Zhang:
Data Based Reconstruction of Duplex Networks. SIAM J. Appl. Dyn. Syst. 19(1): 124-150 (2020) - [c38]Chuang Ma, Haisheng You, Li Wang, Jiajun Zhang:
Intelligent Cybersecurity Situational Awareness Model Based on Deep Neural Network. CyberC 2020: 76-83 - [c37]Chuang Ma, Jiajun Zhang, Li Wang, Haisheng You:
Network Attack Detection Based on Kernel Principal Component Analysis and Decision Tree. CyberC 2020: 84-91 - [c36]Xiaoming Hu, Wenan Tan, Chuang Ma, Huajie Xu:
Certificateless Aggregate Signature Scheme with High Efficencicy in Vehicular Ad-hoc Network. EITCE 2020: 1008-1012 - [c35]Chuang Ma, Ge Li, Qi Zhang, Yiting Shao, Jing Wang, Shan Liu:
Fast Recolor Prediction Scheme in Point Cloud Attribute Compression. VCIP 2020: 50-53 - [i7]Qing Tian, Chuang Ma, Meng Cao, Songcan Chen:
Unsupervised Domain Adaptation Through Transferring both the Source-Knowledge and Target-Relatedness Simultaneously. CoRR abs/2003.08051 (2020)
2010 – 2019
- 2019
- [j18]Chuang Ma, Yongjian Yang, C. Ma:
Mobility-based sinknode-aided routing in disaster network under the background of big data. Clust. Comput. 22(5): 11583-11590 (2019) - [j17]Guangxia Xu, Zhijing Tang, Chuang Ma, Yanbing Liu, Mahmoud Daneshmand:
A Collaborative Filtering Recommendation Algorithm Based on User Confidence and Time Context. J. Electr. Comput. Eng. 2019: 7070487:1-7070487:12 (2019) - [j16]Jianwei Niu, Cong Zhang, Xiao Chen, Chuang Ma, Liyang Chen, Chao Tong:
A Novel Helmet Fitness Evaluation Device Based on the Flexible Pressure Sensor Matrix. Sensors 19(18): 3823 (2019) - [j15]Hai-Feng Zhang, Fang Xu, Zhongkui Bao, Chuang Ma:
Reconstructing of Networks With Binary-State Dynamics via Generalized Statistical Inference. IEEE Trans. Circuits Syst. I Regul. Pap. 66-I(4): 1608-1619 (2019) - [c34]Guangxia Xu, Peng Jiang, Chuang Ma, Mahmoud Daneshmand, Shaoci Xie:
VRPSOFC: a framework for focused crawler using mutation improving particle swarm optimization algorithm. ACM TUR-C 2019: 4:1-4:7 - [c33]Mengxiao Hu, Guangxia Xu, Chuang Ma, Mahmoud Daneshmand:
Detecting review spammer groups in dynamic review networks. ACM TUR-C 2019: 11:1-11:6 - [c32]Xiaoming Hu, Wenan Tan, Chengcheng Yu, Chuang Ma, Huajie Xu:
Security Anlysis of Certificateless Aggregate Signature Scheme in VANETs. CISP-BMEI 2019: 1-6 - [c31]Chuang Ma, Yanming Liang, Xiaofei Lyu:
Weather Analysis to Predict Rice Pest Using Neural Network and D-S Evidential Theory. CyberC 2019: 277-283 - [c30]Chuang Ma, Linfeng Li, Daiqi Zhou:
Water Quality Prediction of Small Watershed Based on Wavelet Neural Network. CyberC 2019: 456-463 - [c29]Dehua Chen, Chuang Ma, Yunying Wu:
Clinical Knowledge Graph Embeddings with Hierarchical Structure for Thyroid Treatment Recommendation. DASC/PiCom/DataCom/CyberSciTech 2019: 432-436 - [c28]Guangxia Xu, Mengxiao Hu, Chuang Ma, Mahmoud Daneshmand:
GSCPM: CPM-Based Group Spamming Detection in Online Product Reviews. ICC 2019: 1-6 - [c27]Yingwei Zhou, Tuoyang Zhou, Yuting Zhao, Haixiao Liu, Chi Zhang, Dan Wang, Jinshou Shi, Chuang Ma, Xin Wang, Xiai Wang, Jianwei Niu:
The Influence of Illuminance and Color Temperature on Target Dragging Task. IHSI 2019: 255-259 - [c26]Tuoyang Zhou, Yingwei Zhou, Dan Wang, Yuting Zhao, Haixiao Liu, Chi Zhang, Jinshou Shi, Chuang Ma, Xin Wang, Xiai Wang, Jianwei Niu:
The Influence of Target Layout on Dragging Performance Based on Eye-Control Technique. IHSI 2019: 265-270 - [c25]Xiao Chen, Cong Zhang, Chuang Ma, Haixiao Liu, Yanling Zheng, Yi Jiang, Yuanyuan Zu, Jianwei Niu:
Evaluation of Helmet Comfort Based on Flexible Pressure Sensor Matrix. IHSI 2019: 833-839 - 2018
- [j14]Liping Huang, Yongjian Yang, Xuehua Zhao, Chuang Ma, Hepeng Gao:
Sparse Data-Based Urban Road Travel Speed Prediction Using Probabilistic Principal Component Analysis. IEEE Access 6: 44022-44035 (2018) - [j13]Jingjing Zhai, Jie Song, Qian Cheng, Yunjia Tang, Chuang Ma:
PEA: an integrated R toolkit for plant epitranscriptome analysis. Bioinform. 34(21): 3747-3749 (2018) - [c24]Xiaoming Hu, Wenrong Jiang, Chuang Ma, Chengcheng Yu:
Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme. CISP-BMEI 2018: 1-9 - [c23]Chuang Ma:
A Congestion Control Protocol for Wireless Sensor Networks. CSoNet 2018: 356-367 - [c22]Chuang Ma, Dou Hu, Xinyi Wang, Wenlong Liu:
Online Taxi-Hailing Platform Using Blockchain Technology. CSPS (3) 2018: 891-897 - [c21]Xiaoming Hu, Wenrong Jiang, Chuang Ma, Chengcheng Yu:
Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme. ICCNS 2018: 12-16 - [c20]Xiaoming Hu, Wenrong Jiang, Chuang Ma, Taozhi Si, Chengcheng Yu:
Cryptography Teaching Based on Problem Oriented: Take the Knowledge Point of Designated Verifier Signature as an Example. ICEBT 2018: 73-77 - [c19]Guangxia Xu, Peng Jiang, Chuang Ma, Mahmoud Daneshmand:
A Focused Crawler Model Based on Mutation Improving Particle Swarm Optimization Algorithm. ICII 2018: 173-174 - [i6]Chuang Ma, Han-Shuang Chen, Xiang Li, Ying-Cheng Lai, Hai-Feng Zhang:
Data based reconstruction of complex cyberphysical networks. CoRR abs/1806.03405 (2018) - [i5]Chuang Ma, Bing-Bing Xiang, Han-Shuang Chen, Hai-Feng Zhang:
An improved belief propagation algorithm for detecting meso-scale structure in complex networks. CoRR abs/1808.09080 (2018) - 2017
- [j12]Xiaoming Hu, Chuang Ma, Taozhi Si, Wenrong Jiang, Huajie Xu, Wenan Tan:
改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier). 计算机科学 44(8): 168-175 (2017) - [j11]Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang, Chuang Ma:
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. Secur. Commun. Networks 2017: 7921782:1-7921782:9 (2017) - [c18]Zhixu Qiu, Yunjia Tang, Chuang Ma:
An Effective Strategy for Trait Combinations in Multiple-Trait Genomic Selection. ICIC (2) 2017: 230-239 - 2016
- [j10]Chijun Zhang, Yongjian Yang, Zhanwei Du, Chuang Ma:
Particle swarm optimization algorithm based on ontology model to support cloud computing applications. J. Ambient Intell. Humaniz. Comput. 7(5): 633-638 (2016) - [j9]Chuang Ma, Jang-Ping Sheu, Chao-Xiang Hsu:
A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks. J. Sensors 2016: 6168535:1-6168535:13 (2016) - [c17]Xiaoming Hu, Chuang Ma, Jian Wang, Huajie Xu, WenAn Tan:
An undeniable strong DSVS scheme with no bilinear pairings. CISP-BMEI 2016: 1944-1948 - [c16]Zhixu Qiu, Qian Cheng, Jie Song, Yunjia Tang, Chuang Ma:
Application of Machine Learning-Based Classification to Genomic Selection and Performance Improvement. ICIC (1) 2016: 412-421 - [i4]Chuang Ma, Tao Zhou, Hai-Feng Zhang:
Playing the role of weak clique property in link prediction: A friend recommendation model. CoRR abs/1601.05146 (2016) - [i3]Chuang Ma, Zhongkui Bao, Hai-Feng Zhang:
Improving the performance of link prediction by adaptively exploiting multiple structural features of networks. CoRR abs/1608.04533 (2016) - [i2]Bing-Bing Xiang, Zhongkui Bao, Chuang Ma, Xingyi Zhang, Han-Shuang Chen, Hai-Feng Zhang:
A Unified Method of Detecting Core-Periphery Structure and Community Structure in Networks. CoRR abs/1612.01704 (2016) - 2015
- [j8]Jang-Ping Sheu, Chih-Yin Lee, Chuang Ma:
A transmission protocol based on network coding in many-to-one delay tolerant networks. Int. J. Ad Hoc Ubiquitous Comput. 19(1/2): 19-28 (2015) - [j7]Pan Zhu, Yanhong Zhou, Libin Zhang, Chuang Ma:
DNA sequence and structure properties analysis reveals similarities and differences to promoters of stress responsive genes in Arabidopsis thaliana. Int. J. Data Min. Bioinform. 13(1): 1-12 (2015) - [c15]Zhanwei Du, Yongjian Yang, Chuang Ma, Yuan Bai:
Modelling Individual Negative Emotion Spreading Process with Mobile Phones. AAAI 2015: 4156-4157 - [c14]Jang-Ping Sheu, Chao-Xiang Hsu, Chuang Ma:
A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks. COMPSAC 2015: 659-664 - [i1]Ling-Ling Ma, Chuang Ma, Hai-Feng Zhang:
Identifying influential spreaders in complex networks based on gravity formula. CoRR abs/1505.02476 (2015) - 2014
- [j6]Jang-Ping Sheu, Shu-Hsun Wu, Chuang Ma, Wei-Kai Hu:
Design and implementation of a transmission protection protocol to improve the performance of wireless sensor networks in hybrid networks. Int. J. Ad Hoc Ubiquitous Comput. 17(4): 244-253 (2014) - [c13]Chuang Ma, Yongjian Yang, Zhanwei Du, Chijun Zhang:
Gaussian Process Machine Learning Based ITO Algorithm. BWCCA 2014: 38-41 - [c12]Chuang Ma, Yongjian Yang, Zhanwei Du, Chijun Zhang:
Overview of Routing Algorithm in Pocket Switched Networks. BWCCA 2014: 42-46 - [c11]Zhanwei Du, Chuang Ma, Yongjian Yang, Bo Yang:
Negative energy detector using cellphone bluetooth and contact list. UbiComp Adjunct 2014: 43-46 - [c10]Jang-Ping Sheu, Zong-Xiang Wu, Chuang Ma, R. B. Jagadeesha:
Interference-aware channel allocation algorithm with game theoretic approach for cognitive radio networks. ICPADS 2014: 41-46 - [c9]Chuang Ma, Yongjian Yang, Zhanwei Du, Chijun Zhang:
Poster: social mobility based routing in crowdsourced systems. MobiHoc 2014: 433-434 - 2013
- [j5]Xingchi Hu, Chuang Ma, Yanhong Zhou:
A novel two-layer SVM model in miRNA Drosha processing site detection. BMC Syst. Biol. 7(S-4): S4 (2013) - [j4]Jia Wang, Chuang Ma, Zheng Kou, Yanhong Zhou, Huai-Lan Liu:
Predicting transmission of avian influenza A viruses from avian to human by using informative physicochemical properties. Int. J. Data Min. Bioinform. 7(2): 166-179 (2013) - [c8]Jang-Ping Sheu, Chih-Yin Lee, Chuang Ma:
An Efficient Transmission Protocol Based on Network Coding in Delay Tolerant Networks. IMIS 2013: 399-404 - [c7]Jang-Ping Sheu, Chen-Hao Ko, Chuang Ma:
An approximation downlink bandwidth allocation scheme for IEEE 802.16 OFDMA system. WCNC 2013: 327-332 - [c6]Jang-Ping Sheu, Jung-Tzu Chang, Chuang Ma, Cheok-Pan Leong:
A cooperative MAC protocol based on 802.11 in wireless Ad hoc networks. WCNC 2013: 416-421 - 2012
- [j3]Chuang Ma, Hao Chen, Mingming Xin, Ruolin Yang, Xiangfeng Wang:
KGBassembler: a karyotype-based genome assembler for Brassicaceae species. Bioinform. 28(23): 3141-3143 (2012) - [c5]Xingchi Hu, Yanhong Zhou, Chuang Ma:
Recognizing drosha processing sites by a two-step prediction model with structure and sequence information. BIBM 2012: 1-4 - 2011
- [j2]Chuang Ma, Hongwei Liu, Haiying Zhou, Zhibo Wu, Xiao-Zong Yang, Xi-Bo Xiao:
A Fault-Tolerant Algorithm of Wireless Sensor Network Based on Recoverable Nodes. Intell. Autom. Soft Comput. 17(6): 737-747 (2011) - [j1]Chuang Ma, Jia Wang, Lun Li, Mo-Jie Duan, Yanhong Zhou:
Identification of true EST alignments for recognising transcribed regions. Int. J. Data Min. Bioinform. 5(5): 465-484 (2011) - [c4]Jia Wang, Chuang Ma, Dao Zhou, Libin Zhang, Yanhong Zhou:
Accurately Predicting Transcription Start Sites Using Logitlinear Model and Local Oligonucleotide Frequencies. ICIC (3) 2011: 107-114
2000 – 2009
- 2009
- [c3]Chuang Ma, Fangyuan Deng, Hui Liu, Yanhong Zhou:
Accurate Prediction of Alternatively Spliced Cassette Exons Using Evolutionary Conservation Information and Logitlinear Model. IJCBS 2009: 131-134 - 2006
- [c2]Chuang Ma, Dao Zhou, Yanhong Zhou:
Feature Mining and Integration for Improving the Prediction Accuracy of Translation Initiation Sites in Eukaryotic mRNAs. GCC Workshops 2006: 349-356 - 2005
- [c1]Changhong Wang, Baomin Feng, Guangcheng Ma, Chuang Ma:
Robust tracking control of space robots using fuzzy neural network. CIRA 2005: 181-185
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint