default search action
Xiu Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Xiu Ma, Xiaoze Liu, Ce Li, Ziyang Yu, Qi Zhang, Qiujian Lv, Yan Wang, Jianguo Jiang:
BehaMiner: System Behavior Mining for Audit Log Based on Graph Learning. WASA (1) 2024: 333-346 - 2023
- [j10]Leiqi Wang, Xiu Ma, Ning Li, Qiujian Lv, Yan Wang, Weiqing Huang, Haiyan Chen:
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks. Comput. Secur. 135: 103466 (2023) - [j9]Xueying Wang, Guangli Li, Xiu Ma, Xiaobing Feng:
Facilitating hardware-aware neural architecture search with learning-based predictive models. J. Syst. Archit. 137: 102838 (2023) - [j8]Guangli Li, Xiu Ma, Qiuchu Yu, Lei Liu, Huaxiao Liu, Xueying Wang:
CoAxNN: Optimizing on-device deep learning with conditional approximate neural networks. J. Syst. Archit. 143: 102978 (2023) - 2022
- [j7]Xiu Ma, Guangli Li, Lei Liu, Huaxiao Liu, Xueying Wang:
Accelerating deep neural network filter pruning with mask-aware convolutional computations on modern CPUs. Neurocomputing 505: 375-387 (2022) - [j6]Xiu Ma, Huaxiao Liu, Guang-Li Li, Lei Liu:
FlexPDA: A Flexible Programming Framework for Deep Learning Accelerators. J. Comput. Sci. Technol. 37(5): 1200-1220 (2022) - [j5]Guangli Li, Xiu Ma, Xueying Wang, Hengshan Yue, Jiansong Li, Lei Liu, Xiaobing Feng, Jingling Xue:
Optimizing deep neural networks on intelligent edge accelerators via flexible-rate filter pruning. J. Syst. Archit. 124: 102431 (2022) - [c7]Xiu Ma, Leiqi Wang, Qiujian Lv, Yan Wang, Qi Zhang, Jianguo Jiang:
CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis. IJCNN 2022: 1-8 - [c6]Fangtao Zhang, Xiu Ma, Weiqing Huang:
SeqA-ITD: User Behavior Sequence Augmentation for Insider Threat Detection at Multiple Time Granularities. IJCNN 2022: 1-7 - [c5]Yan Wang, Xiaowei Hou, Xiu Ma, Qiujian Lv:
A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert. WASA (2) 2022: 501-513 - 2021
- [c4]Guangli Li, Jingling Xue, Lei Liu, Xueying Wang, Xiu Ma, Xiao Dong, Jiansong Li, Xiaobing Feng:
Unleashing the Low-Precision Computation Potential of Tensor Cores on GPUs. CGO 2021: 90-102 - [c3]Xiu Ma, Guangli Li, Lei Liu, Huaxiao Liu, Lei Liu, Xiaobing Feng:
Understanding the Runtime Overheads of Deep Learning Inference on Edge Devices. ISPA/BDCloud/SocialCom/SustainCom 2021: 390-397 - 2020
- [j4]Guangli Li, Xiu Ma, Xueying Wang, Lei Liu, Jingling Xue, Xiaobing Feng:
Fusion-Catalyzed Pruning for Optimizing Deep Learning on Intelligent Edge Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3614-3626 (2020) - [c2]Guangli Li, Lei Liu, Xueying Wang, Xiu Ma, Xiaobing Feng:
Lance: efficient low-precision quantized winograd convolution for neural networks based on graphics processing units. ICASSP 2020: 3842-3846 - [i2]Guangli Li, Lei Liu, Xueying Wang, Xiu Ma, Xiaobing Feng:
LANCE: Efficient Low-Precision Quantized Winograd Convolution for Neural Networks Based on Graphics Processing Units. CoRR abs/2003.08646 (2020) - [i1]Guangli Li, Xiu Ma, Xueying Wang, Lei Liu, Jingling Xue, Xiaobing Feng:
Fusion-Catalyzed Pruning for Optimizing Deep Learning on Intelligent Edge Devices. CoRR abs/2010.16165 (2020)
2010 – 2019
- 2019
- [j3]Yuping Lai, Xiu Ma, Yanping Xu, Yongfa Ling, Chunlai Du, Jianhe Du, Yongmei Zhang, Yuan Ping:
Positive Data Modeling Using a Mixture of Mixtures of Inverted Beta Distributions. IEEE Access 7: 38146-38156 (2019) - [c1]Guangli Li, Xueying Wang, Xiu Ma, Lei Liu, Xiaobing Feng:
XDN: Towards Efficient Inference of Residual Neural Networks on Cambricon Chips. Bench 2019: 51-56 - 2017
- [j2]Hanquan Wang, Xiu Ma, Junliang Lu, Wen Gao:
An efficient time-splitting compact finite difference method for Gross-Pitaevskii equation. Appl. Math. Comput. 297: 131-144 (2017) - 2016
- [j1]Hanquan Wang, Yong Zhang, Xiu Ma, Jun Qiu, Yan Liang:
An efficient implementation of fourth-order compact finite difference scheme for Poisson equation with Dirichlet boundary conditions. Comput. Math. Appl. 71(9): 1843-1860 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint