default search action
Jianqing Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j6]Xiaofang Chen, Jianqing Ma, June Wei, Shuiqing Yang:
The role of perceived integration in WeChat usages for seeking information and sharing comments: A social capital perspective. Inf. Manag. 58(1): 103280 (2021)
2010 – 2019
- 2017
- [j5]Ziwen Huang, Xiangwen Li, Jianqing Ma:
Z3-Connectivity of Claw-Free Graphs. Graphs Comb. 33(1): 123-140 (2017) - 2016
- [j4]Xiangwen Li, Jianqing Ma:
Z_3-connectivity of K_{1, 3}-free graphs without induced cycle of length at least 5. Ars Math. Contemp. 11(1): 35-47 (2016) - 2014
- [j3]Jianqing Ma, Xiangwen Li:
Nowhere-zero 3-flows of claw-free graphs. Discret. Math. 336: 57-68 (2014) - 2013
- [j2]Ping Yi, Ting Zhu, Jianqing Ma, Yue Wu:
An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 17(3-4): 269-292 (2013) - 2011
- [j1]Dengfeng Yao, Yunfeng Qiu, Hairui Huang, Zaixin Du, Jianqing Ma:
A survey of technology accessibility problems faced by older users in China. Univers. Access Inf. Soc. 10(4): 373-390 (2011) - [c13]Aifeng Wu, Jianqing Ma, Shiyong Zhang:
Towards realistic mobility modeling for vehicular ad hoc networks. SpringSim (ANSS) 2011: 57-67
2000 – 2009
- 2009
- [c12]Tianyuan Chen, Lei Chang, Jianqing Ma, Wei Zhang, Feng Gao:
HOCT: A Highly Scalable Algorithm for Training Linear CRF on Modern Hardware. ICDM Workshops 2009: 276-281 - [c11]Ping Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma:
Security in Wireless Mesh Networks: Challenges and Solutions. ITNG 2009: 423-428 - [c10]Wei Zhang, Lei Chang, Jianqing Ma, YiPing Zhong:
Aggregation Models for People Finding in Enterprise Corpora. KSEM 2009: 180-191 - [c9]Dengfeng Yao, Yunfeng Qiu, Zaixin Du, Jianqing Ma, Harry Huang:
A survey of technology accessibility problems faced by older users in China. W4A 2009: 16-25 - 2008
- [c8]Ting Yuan, Jianqing Ma, YiPing Zhong, Shiyong Zhang:
Efficient Self-Healing Key Distribution with Limited Group Membership for Communication-Constrained Networks. EUC (1) 2008: 453-458 - [c7]Ting Yuan, Jianqing Ma, YiPing Zhong, Shiyong Zhang:
Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks. IMSCCS 2008: 83-90 - [c6]Ting Yuan, Shiyong Zhang, YiPing Zhong, Jianqing Ma:
KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks. IPCCC 2008: 193-200 - 2006
- [c5]Jianqing Ma, Shiyong Zhang, YiPing Zhong, Yu Wu:
PEAN: A Public Key Authentication Scheme in Wireless Sensor and Actor Network. CIT 2006: 230 - [c4]Bo Yu, Jianqing Ma, Zhi Wang, Dilin Mao, Chuanshan Gao:
Key Establishment Between Heterogenous Nodes in Wireless Sensor and Actor Networks. APWeb Workshops 2006: 196-205 - [c3]Jianqing Ma, Shiyong Zhang, YiPing Zhong, Xiaowen Tong:
SeLoc: Secure Localization for Wireless Sensor and Actor Network. MASS 2006: 864-869 - [c2]Jianqing Ma, Shiyong Zhang, YiPing Zhong, Xiaowen Tong:
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks. WISA 2006: 60-73 - 2005
- [c1]Jianqing Ma, YiPing Zhong, Shiyong Zhang:
Frequency-hopping based Secure Schemes in Sensornets. CIT 2005: 459-463
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint