default search action
Zhi Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Zhi Ma 0001 — State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China (and 3 more)
- Zhi Ma 0002 — Nanjing University, State Key Laboratory for Novel Software Technology, Nanjing, China
- Zhi Ma 0003 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, Beijing, China
- Zhi Ma 0004 — Northwestern Polytechnical University, School of Aeronautics, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Yue Zhang, Qiang Zhan, Zhi Ma:
EfficientNet-ECA: A lightweight network based on efficient channel attention for class-imbalanced welding defects classification. Adv. Eng. Informatics 62: 102737 (2024) - [j12]Zhi Ma, Xi Guan, Yiqun Liu, Wei Shao:
Identification of essential plasma protein using manifold regularized sparse group-lasso for prediction of Alzheimer's disease. Displays 81: 102578 (2024) - [j11]Lingyi Xu, Wenbin Liu, Zhiwei Wang, Jianxiao Luo, Jinjiang Wang, Zhi Ma:
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing. J. Netw. Syst. Manag. 32(3): 49 (2024) - [j10]Zhi Ma, Xiaoqing Yang, Lei Xie, Wei Dong:
Life Cycle Mining Deformation Monitoring and Analysis Using Sentinel-1 and Radarsat-2 InSAR Time Series. Remote. Sens. 16(13): 2335 (2024) - [c9]Wei Cheng, Yuxing Pan, Zhi Ma, Yincai Cai, Yuan Li, Ting Peng:
Tunnel Construction Site Monitoring and Digital Twin System. ICACT 2024: 389-394 - [c8]Jingjing Jiang, Mengfei Yang, Lei Qiao, Tingyu Wang, Zhi Ma, Shaofeng Li, Shenghui Zhu:
An Adaptive Real-Time Garbage Collection Method Based on File Write Prediction. TASE 2024: 224-241 - [i3]Zhi Ma, Cheng Wen, Jie Su, Ming Zhao, Bin Yu, Xu Lu, Cong Tian:
Towards Practical Requirement Analysis and Verification: A Case Study on Software IP Components in Aerospace Embedded Systems. CoRR abs/2404.00795 (2024) - 2023
- [j9]Chao Du, Zhi Ma, Yiting Liu:
Quantum synchronizable codes from repeated-root quasi-cyclic codes. Comput. Appl. Math. 42(4) (2023) - [j8]Zhi Ma, Lei Zhao, Longsheng Wei:
Single Human Parsing Based on Visual Attention and Feature Enhancement. J. Adv. Comput. Intell. Intell. Informatics 27(4): 561-566 (2023) - 2022
- [j7]Zhi Ma, Yang Young Lu, Yiwen Wang, Renhao Lin, Zizi Yang, Fang Zhang, Ying Wang:
Metric learning for comparing genomic data with triplet network. Briefings Bioinform. 23(5) (2022) - [c7]Mengmeng Liu, Zhi Ma, Tao Li, Yanfeng Jiang, Kai Wang:
Long-Term Person Re-identification with Dramatic Appearance Change: Algorithm and Benchmark. ACM Multimedia 2022: 6406-6415 - 2021
- [j6]Zhi Ma, Lei Qiao, Mengfei Yang, Shao-Feng Li, Jin-Kun Zhang:
Verification of Real Time Operating System Exception Management Based on SPARCv8. J. Comput. Sci. Technol. 36(6): 1367-1387 (2021) - 2020
- [j5]Kai Wang, Zhi Ma, Shiyan Chen, Jinni Yang, Keke Zhou, Tao Li:
A benchmark for clothes variation in person re-identification. Int. J. Intell. Syst. 35(12): 1881-1898 (2020) - [j4]Weilong Wang, Xiangdong Meng, Yangyang Fei, Zhi Ma:
Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator. Quantum Inf. Process. 19(7): 196 (2020)
2010 – 2019
- 2013
- [i2]Zhengchao Wei, Zhi Ma:
Easily Implemented Rate Compatible Reconciliation Protocol for Quantum Key Distribution. CoRR abs/1305.6244 (2013) - 2010
- [j3]Shuqin Zhong, Zhi Ma, Yajie Xu:
Constructing quantum error correcting code via logic function. Sci. China Inf. Sci. 53(3): 515-523 (2010) - [j2]Yonghua Wang, Yan Li, Zhi Ma, Wei Yang, Chunzhi Ai:
Mechanism of MicroRNA-Target Interaction: Molecular Dynamics Simulations and Thermodynamics Analysis. PLoS Comput. Biol. 6(7) (2010)
2000 – 2009
- 2009
- [c6]Xin-yuan Yang, Zhi Ma, Xin Lu, Hong-Xin Li:
Quantum Secure Direct Communication Based on Partially Entangled States. IAS 2009: 11-14 - [c5]Tong Zhen, Zhi Ma, Yuhua Zhu, Qiuwen Zhang:
Grain Quality Evaluation Method Based on Combination of BP Neural Networks with D-S Evidence Theory. JCAI 2009: 312-315 - 2008
- [c4]Qiuwen Zhang, Tong Zhen, Yuhua Zhu, Wenshuai Zhang, Zhi Ma:
A Hybrid Intelligent Algorithm for the Vehicle Routing with Time Windows. ICIC (1) 2008: 47-54 - 2007
- [c3]Xin Lü, Zhi Ma:
Quantum Information Security Protocols and Quantum Coding Theory. SNPD (2) 2007: 352-356 - 2006
- [c2]Xin Lü, Zhi Ma:
Information Assurance Evaluation for Network Information Systems. CIS 2006: 869-877 - [c1]Zhi Ma, Xin Lu, Keqin Feng, Dengguo Feng:
On Non-binary Quantum BCH Codes. TAMC 2006: 675-683 - 2004
- [j1]Keqin Feng, Zhi Ma:
A finite Gilbert-Varshamov bound for pure stabilizer quantum codes. IEEE Trans. Inf. Theory 50(12): 3323-3325 (2004) - [i1]Xin Lü, Zhi Ma, Dengguo Feng:
Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes. IACR Cryptol. ePrint Arch. 2004: 229 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-09 23:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint