default search action
Tinghuai Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j101]Tinghuai Ma, Yuming Su, Mohamed Magdy Abdel Wahab, Alaa Abd El-Raouf Mohamed Khalil:
ZPDSN: spatio-temporal meteorological forecasting with topological data analysis. Appl. Intell. 55(1): 9 (2025) - 2024
- [j100]Rui Huang, Tinghuai Ma, Huan Rong, Kai Huang, Nan Bi, Ping Liu, Tao Du:
Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks. J. Cloud Comput. 13(1): 107 (2024) - [j99]Huan Rong, Shengjie Sun, Tinghuai Ma, Di Jin, Victor S. Sheng:
KGCDP-T: Interpreting knowledge graphs into text by content ordering and dynamic planning with three-level reconstruction. Knowl. Based Syst. 284: 111297 (2024) - [j98]Li Jia, Tinghuai Ma, Huan Rong, Victor S. Sheng, Xuejian Huang, Xintong Xie:
A Rearrangement and Restore-Based Mixer Model for Target-Oriented Multimodal Sentiment Classification. IEEE Trans. Artif. Intell. 5(6): 3109-3119 (2024) - [j97]Kexing Peng, Tinghuai Ma, Xin Yu, Huan Rong, Yurong Qian, Najla Al-Nabhan:
GCMA: An Adaptive Multiagent Reinforcement Learning Framework With Group Communication for Complex and Similar Tasks Coordination. IEEE Trans. Games 16(3): 670-682 (2024) - [j96]Kexing Peng, Tinghuai Ma, Li Jia, Huan Rong:
Enhancing Collaboration in Heterogeneous Multiagent Systems Through Communication Complementary Graph. IEEE Trans. Cybern. 54(11): 6881-6894 (2024) - [j95]Li Jia, Tinghuai Ma, Huan Rong, Najla Al-Nabhan:
Affective Region Recognition and Fusion Network for Target-Level Multimodal Sentiment Classification. IEEE Trans. Emerg. Top. Comput. 12(3): 688-699 (2024) - [j94]Tinghuai Ma, Kexing Peng, Huan Rong, Yurong Qian, Najla Al-Nabhan:
Hierarchical Coordination Multi-Agent Reinforcement Learning With Spatio-Temporal Abstraction. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 533-547 (2024) - [j93]Jianxin Liu, Tinghuai Ma, Yuming Su, Huan Rong, Alaa Abd El-Raouf Mohamed Khalil, Mohamed Magdy Abdel Wahab, Benjamin Kwapong Osibo:
Temporal patterns decomposition and Legendre projection for long-term time series forecasting. J. Supercomput. 80(16): 23407-23441 (2024) - [j92]Huan Rong, Xin Yu, Tinghuai Ma, Victor S. Sheng, Yang Zhou, Mznah Al-Rodhaan:
Three-stage Transferable and Generative Crowdsourced Comment Integration Framework Based on Zero- and Few-shot Learning with Domain Distribution Alignment. ACM Trans. Knowl. Discov. Data 18(3): 68:1-68:43 (2024) - [j91]Huan Rong, Minfeng Qian, Tinghuai Ma, Di Jin, Victor S. Sheng:
CoBjeason: Reasoning Covered Object in Image by Multi-Agent Collaboration Based on Informed Knowledge Graph. ACM Trans. Knowl. Discov. Data 18(5): 116:1-116:56 (2024) - [j90]Huan Rong, Gongchi Chen, Tinghuai Ma, Victor S. Sheng, Elisa Bertino:
FuFaction: Fuzzy Factual Inconsistency Correction on Crowdsourced Documents With Hybrid-Mask at the Hidden-State Level. IEEE Trans. Knowl. Data Eng. 36(1): 167-183 (2024) - 2023
- [j89]Bin Yang, Tinghuai Ma, Xuejian Huang:
ATFSAD: Enhancing Long Sequence Time-Series Forecasting on Air Temperature Prediction. IEEE Access 11: 92080-92091 (2023) - [j88]Yongsheng Hao, Jie Cao, Qi Wang, Tinghuai Ma, Qin Wang, Xin Zhang:
Meteorological data layout and task scheduling in a multi-cloud environment. Eng. Appl. Artif. Intell. 126: 106860 (2023) - [j87]Qing Tian, Heyang Sun, Shun Peng, Tinghuai Ma:
Self-adaptive label filtering learning for unsupervised domain adaptation. Frontiers Comput. Sci. 17(1): 171308 (2023) - [j86]Yongsheng Hao, Qi Wang, Jie Cao, Tinghuai Ma, Jinglin Du, Xin Zhang:
Interval grey number of energy consumption helps task offloading in the mobile environment. ICT Express 9(3): 446-451 (2023) - [j85]Xuejian Huang, Tinghuai Ma, Li Jia, Yuanjian Zhang, Huan Rong, Najla Alnabhan:
An effective multimodal representation and fusion method for multimodal intent recognition. Neurocomputing 548: 126373 (2023) - [j84]Tinghuai Ma, Qian Deng, Huan Rong, Najla Al-Nabhan:
A privacy-preserving trajectory data synthesis framework based on differential privacy. J. Inf. Secur. Appl. 77: 103550 (2023) - [j83]Yongsheng Hao, Qi Wang, Tinghuai Ma, Jinglin Du, Jie Cao:
Energy allocation and task scheduling in edge devices based on forecast solar energy with meteorological information. J. Parallel Distributed Comput. 177: 171-181 (2023) - [j82]Tinghuai Ma, Kexing Peng, Huan Rong, Yurong Qian:
AGRCNet: communicate by attentional graph relations in multi-agent reinforcement learning for traffic signal control. Neural Comput. Appl. 35(28): 21007-21022 (2023) - [j81]Weiguo Li, Hong Zhang, Wei Li, Tinghuai Ma:
Extraction of Winter Wheat Planting Area Based on Multi-Scale Fusion. Remote. Sens. 15(1): 164 (2023) - [j80]Tinghuai Ma, Zheng Zhang, Huan Rong, Najla Al-Nabhan:
SPK-CG: Siamese Network based Posterior Knowledge Selection Model for Knowledge Driven Conversation Generation. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(3): 88:1-88:16 (2023) - [j79]Qing Tian, Shun Peng, Tinghuai Ma:
Source-free Unsupervised Domain Adaptation with Trusted Pseudo Samples. ACM Trans. Intell. Syst. Technol. 14(2): 30:1-30:17 (2023) - 2022
- [j78]Honghao Zhou, Tinghuai Ma, Huan Rong, Yurong Qian, Yuan Tian, Najla Al-Nabhan:
MDMN: Multi-task and Domain Adaptation based Multi-modal Network for early rumor detection. Expert Syst. Appl. 195: 116517 (2022) - [j77]Fagen Song, Tinghuai Ma:
A location privacy protection method in spatial crowdsourcing. J. Inf. Secur. Appl. 65: 103095 (2022) - [j76]Xinchang Zhang, Changsen Xia, Tinghuai Ma, Lejun Zhang, Zilong Jin:
Optimizing Energy-Latency Tradeoff for Computation Offloading in SDIN-Enabled MEC-based IIoT. KSII Trans. Internet Inf. Syst. 16(12): 4081-4098 (2022) - [j75]Yuting Kong, Yurong Qian, Fuxiang Tan, Lu Bai, Jinxin Shao, Tinghuai Ma, Sergei Nikolayevich Tereshchenko:
CVDP k-means clustering algorithm for differential privacy based on coefficient of variation. J. Intell. Fuzzy Syst. 43(5): 6027-6045 (2022) - [j74]Tinghuai Ma, Huan Rong, Yongsheng Hao, Jie Cao, Yuan Tian, Mznah Al-Rodhaan:
A Novel Sentiment Polarity Detection Framework for Chinese. IEEE Trans. Affect. Comput. 13(1): 60-74 (2022) - [j73]Tinghuai Ma, Qian Pan, Huan Rong, Yurong Qian, Yuan Tian, Najla Al-Nabhan:
T-BERTSum: Topic-Aware Text Summarization Based on BERT. IEEE Trans. Comput. Soc. Syst. 9(3): 879-890 (2022) - [j72]Huan Rong, Victor S. Sheng, Tinghuai Ma, Yang Zhou, Mznah Al-Rodhaan:
A Self-Play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario. IEEE Trans. Knowl. Data Eng. 34(3): 1021-1037 (2022) - [j71]Mingming Yang, Tinghuai Ma, Qing Tian, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Aggregated squeeze-and-excitation transformations for densely connected convolutional networks. Vis. Comput. 38(8): 2661-2674 (2022) - [j70]Benjamin Kwapong Osibo, Zilong Jin, Tinghuai Ma, Bockarie Daniel Marah, Chengbo Zhang, Yuanfeng Jin:
An edge computational offloading architecture for ultra-low latency in smart mobile devices. Wirel. Networks 28(5): 2061-2075 (2022) - 2021
- [j69]Yuan Tian, Biao Song, Tinghuai Ma, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Bi-Tier Differential Privacy for Precise Auction-Based People-Centric IoT Service. IEEE Access 9: 55036-55044 (2021) - [j68]Tinghuai Ma, Huimin Yang, Qing Tian, Yuan Tian, Najla Al-Nabhan:
A Hybrid Chinese Conversation model based on retrieval and generation. Future Gener. Comput. Syst. 114: 481-490 (2021) - [j67]Tinghuai Ma, Fagen Song:
A Trajectory Privacy Protection Method Based on Random Sampling Differential Privacy. ISPRS Int. J. Geo Inf. 10(7): 454 (2021) - [j66]Fagen Song, Tinghuai Ma:
High utility differential privacy based on smooth sensitivity and individual ranking. Int. J. Inf. Comput. Secur. 15(2/3): 216-230 (2021) - [j65]Tinghuai Ma, Hongmei Wang, Lejun Zhang, Yuan Tian, Najla Al-Nabhan:
Graph classification based on structural features of significant nodes and spatial convolutional neural networks. Neurocomputing 423: 639-650 (2021) - [j64]Tinghuai Ma, Honghao Zhou, Yuan Tian, Najla Al-Nabhan:
A novel rumor detection algorithm based on entity recognition, sentence reconfiguration, and ordinary differential equation network. Neurocomputing 447: 224-234 (2021) - [j63]Tinghuai Ma, Zheng Zhang, Lei Guo, Xin Wang, Yurong Qian, Najla Al-Nabhan:
Semi-supervised Selective Clustering Ensemble based on constraint information. Neurocomputing 462: 412-425 (2021) - [j62]Tinghuai Ma, Mingming Yang, Huan Rong, Yurong Qian, Yuan Tian, Najla Al-Nabhan:
Dual-path CNN with Max Gated block for text-based person re-identification. Image Vis. Comput. 111: 104168 (2021) - [j61]Yongsheng Hao, Jie Cao, Qi Wang, Tinghuai Ma:
Energy-aware offloading based on priority in mobile cloud computing. Sustain. Comput. Informatics Syst. 31: 100563 (2021) - 2020
- [j60]Tinghuai Ma, Qian Pan, Hongmei Wang, Wenye Shao, Yuan Tian, Najla Al-Nabhan:
Graph classification algorithm based on graph structure embedding. Expert Syst. Appl. 161: 113715 (2020) - [j59]Tinghuai Ma, Qin Liu, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LGIEM: Global and local node influence based community detection. Future Gener. Comput. Syst. 105: 533-546 (2020) - [j58]Yunfang Chen, Li Wang, Dehao Qi, Tinghuai Ma, Wei Zhang:
Community Detection Based on DeepWalk Model in Large-Scale Networks. Secur. Commun. Networks 2020: 8845942:1-8845942:13 (2020) - [j57]Yonghua Gong, Lei Chen, Tinghuai Ma:
A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes. Secur. Commun. Networks 2020: 8887596:1-8887596:10 (2020) - [j56]Bockarie Daniel Marah, Zilong Jing, Tinghuai Ma, Raeed Alsabri, Raphael Anaadumba, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Smartphone Architecture for Edge-Centric IoT Analytics. Sensors 20(3): 892 (2020) - [j55]Tinghuai Ma, Te Yu, Xiuge Wu, Jie Cao, Alia Alabdulkarim, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Multiple clustering and selecting algorithms with combining strategy for selective clustering ensemble. Soft Comput. 24(20): 15129-15141 (2020) - [j54]Tinghuai Ma, Raeed Al-Sabri, Lejun Zhang, Bockarie Daniel Marah, Najla Al-Nabhan:
The Impact of Weighting Schemes and Stemming Process on Topic Modeling of Arabic Long and Short Texts. ACM Trans. Asian Low Resour. Lang. Inf. Process. 19(6): 81:1-81:23 (2020) - 2019
- [j53]Fagen Song, Tinghuai Ma, Yuan Tian, Mznah Al-Rodhaan:
A New Method of Privacy Protection: Random k-Anonymous. IEEE Access 7: 75434-75445 (2019) - [j52]Meili Tang, Qin Liu, Tinghuai Ma, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
$\mathcal{K}$ -Lowest-Influence Overlapping Nodes Based Community Detection in Complex Networks. IEEE Access 7: 109646-109661 (2019) - [j51]Tinghuai Ma, YuWei Zhao, Honghao Zhou, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Natural disaster topic extraction in Sina microblogging based on graph analysis. Expert Syst. Appl. 115: 346-355 (2019) - [j50]Yongsheng Hao, Jie Cao, Tinghuai Ma, Sai Ji:
Adaptive energy-aware scheduling method in a meteorological cloud. Future Gener. Comput. Syst. 101: 1142-1157 (2019) - [j49]Fan Xing, Tinghuai Ma, Meili Tang, Donghai Guan:
Friend circle identification in ego network based on hybrid method. Int. J. Ad Hoc Ubiquitous Comput. 30(4): 224-234 (2019) - [j48]YuWei Zhao, Tinghuai Ma, Yu Hao, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan:
ICRA: index based cache replacement algorithm for cloud storage. Int. J. Sens. Networks 29(1): 48-57 (2019) - [j47]Huan Rong, Tinghuai Ma, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Deep rolling: A novel emotion prediction model for a multi-participant communication context. Inf. Sci. 488: 158-180 (2019) - [j46]Yuan Tian, Mariya M. Kaleemullah, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma:
A privacy preserving location service for cloud-of-things system. J. Parallel Distributed Comput. 123: 215-222 (2019) - [j45]Alia Alabdulkarim, Mznah Al-Rodhaan, Tinghuai Ma, Yuan Tian:
PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices. Sensors 19(1): 142 (2019) - 2018
- [j44]Tinghuai Ma, Jingjing Qu, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm. IEEE Access 6: 7214-7223 (2018) - [j43]Tinghuai Ma, Yu Hao, Wenhai Shen, Yuan Tian, Mznah Al-Rodhaan:
An Improved Web Cache Replacement Algorithm Based on Weighting and Cost. IEEE Access 6: 27010-27017 (2018) - [j42]Yu Xue, Binping Zhao, Tinghuai Ma, Wei Pang:
A Self-Adaptive Fireworks Algorithm for Classification Problems. IEEE Access 6: 44406-44416 (2018) - [j41]Tinghuai Ma, Siyang Yu, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks. IEEE Access 6: 66621-66631 (2018) - [j40]Tinghuai Ma, Jing Jia, Yu Xue, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Protection of location privacy for moving kNN queries in social networks. Appl. Soft Comput. 66: 525-532 (2018) - [j39]Xiuge Wu, Tinghuai Ma, Jie Cao, Yuan Tian, Alia Alabdulkarim:
A comparative study of clustering ensemble algorithms. Comput. Electr. Eng. 68: 603-615 (2018) - [j38]Qing Tian, Songcan Chen, Tinghuai Ma:
Ordinal space projection learning via neighbor classes representation. Comput. Vis. Image Underst. 174: 24-32 (2018) - [j37]Tinghuai Ma, Yu Hao, Xiafei Suo, Yu Xue, Jie Cao:
A weighted collaboration network generalization method for privacy protection in C-DBLP. Intell. Data Anal. 22(1): 3-19 (2018) - [j36]Tinghuai Ma, Dongdong Jia, Honghao Zhou, Yu Xue, Jie Cao:
Feature selection using forest optimization algorithm based on contribution degree. Intell. Data Anal. 22(6): 1189-1207 (2018) - [j35]Yu Xue, Binping Zhao, Tinghuai Ma, Alex X. Liu:
An evolutionary classification method based on fireworks algorithm. Int. J. Bio Inspired Comput. 11(3): 149-158 (2018) - [j34]Jiongming Jiang, Yu Xue, Tinghuai Ma, Zhongyang Chen:
Improved artificial bee colony algorithm with differential evolution for the numerical optimisation problems. Int. J. Comput. Sci. Eng. 16(1): 73-84 (2018) - [j33]Binping Zhao, Yu Xue, Bin Xu, Tinghuai Ma, Jingfa Liu:
Multi-objective classification based on NSGA-II. Int. J. Comput. Sci. Math. 9(6): 539-546 (2018) - [j32]Pengjie Ren, Zhumin Chen, Jun Ma, Shuaiqiang Wang, Zhiwei Zhang, Zhaochun Ren, Tinghuai Ma:
User session level diverse reranking of search results. Neurocomputing 274: 66-79 (2018) - [j31]Tinghuai Ma, Wenye Shao, Yongsheng Hao, Jie Cao:
Graph classification based on graph set reconstruction and graph kernel feature reduction. Neurocomputing 296: 33-45 (2018) - [j30]Weiwei Yuan, Donghai Guan, Tinghuai Ma, Asad Masood Khattak:
Classification with class noises through probabilistic sampling. Inf. Fusion 41: 57-67 (2018) - [j29]Weiwei Yuan, Donghai Guan, Qi Zhu, Tinghuai Ma:
Novel mislabeled training data detection algorithm. Neural Comput. Appl. 29(10): 673-683 (2018) - [j28]Huan Rong, Tinghuai Ma, Meili Tang, Jie Cao:
A novel subgraph K+ -isomorphism method in social network based on graph similarity detection. Soft Comput. 22(8): 2583-2601 (2018) - [j27]Yu Xue, Jiongming Jiang, Binping Zhao, Tinghuai Ma:
A self-adaptive artificial bee colony algorithm based on global best for global optimization. Soft Comput. 22(9): 2935-2952 (2018) - 2017
- [j26]Fan Xing, Chengbing Zhou, Xiafei Suo, Tinghuai Ma, Yuanfeng Jin:
Chinese collaboration network data recompiled based on weights and labels. Int. J. Commun. Networks Distributed Syst. 18(3/4): 312-328 (2017) - [j25]Jian Li, Tinghuai Ma, Meili Tang, Wenhai Shen, Yuanfeng Jin:
Improved FIFO Scheduling Algorithm Based on Fuzzy Clustering in Cloud Computing. Inf. 8(1): 25 (2017) - [j24]Donghai Guan, Weiwei Yuan, Tinghuai Ma, Asad Masood Khattak, Francis Chow:
Cost-sensitive elimination of mislabeled training data. Inf. Sci. 402: 170-181 (2017) - 2016
- [j23]Tinghuai Ma, Huan Rong, Changhong Ying, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Detect structural-connected communities based on BSCHEF in C-DBLP. Concurr. Comput. Pract. Exp. 28(2): 311-330 (2016) - [j22]Tinghuai Ma, Xichao Xu, Meili Tang, Yuanfeng Jin, Wenhai Shen:
MHBase: A Distributed Real-Time Query Scheme for Meteorological Data Based on HBase. Future Internet 8(1): 6 (2016) - [j21]Tinghuai Ma, Limin Guo, Meili Tang, Yuan Tian, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness. IEICE Trans. Inf. Syst. 99-D(6): 1512-1520 (2016) - [j20]Yu Xue, Binping Zhao, Tinghuai Ma:
Performance analysis for clustering algorithms. Int. J. Comput. Sci. Math. 7(5): 485-493 (2016) - [j19]Yuliang Zhang, Tinghuai Ma, Jie Cao, Meili Tang:
K-anonymisation of social network by vertex and edge modification. Int. J. Embed. Syst. 8(2/3): 206-216 (2016) - [j18]Yinghua Lv, Tinghuai Ma, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171: 9-22 (2016) - [j17]Tinghuai Ma, Yao Wang, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LED: A fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207: 488-500 (2016) - 2015
- [j16]Wei Tian, Tinghuai Ma, Yuhui Zheng, Xin Wang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Weighted curvature-preserving PDE image filtering method. Comput. Math. Appl. 70(6): 1336-1344 (2015) - [j15]Tinghuai Ma, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
KDVEM : a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12): 1165-1184 (2015) - [j14]Tinghuai Ma, Yinhua Lu, Sunyuan Shi, Wei Tian, Xin Wang, Donghai Guan:
Data resource discovery model based on hybrid architecture in data grid environment. Concurr. Comput. Pract. Exp. 27(3): 507-525 (2015) - [j13]Yu Xue, Shuiming Zhong, Tinghuai Ma, Jie Cao:
A Hybrid Evolutionary Algorithm for Numerical Optimization Problem. Intell. Autom. Soft Comput. 21(4): 473-490 (2015) - [j12]Tinghuai Ma, Jinjuan Zhou, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Sungyoung Lee:
Social Network and Tag Sources Based Augmenting Collaborative Recommender System. IEICE Trans. Inf. Syst. 98-D(4): 902-910 (2015) - [j11]Yu Xue, Jiongming Jiang, Tinghuai Ma, Chi Li:
The performance research of artificial bee colony algorithm on the large scale global optimisation problems. Int. J. Wirel. Mob. Comput. 9(3): 300-305 (2015) - 2014
- [j10]Donghai Guan, Weiwei Yuan, Tinghuai Ma, Sungyoung Lee:
Detecting potential labeling errors for bioinformatics by multiple voting. Knowl. Based Syst. 66: 28-35 (2014) - [j9]Tinghuai Ma, Chenghui Wu, Wei Tian, Wenhai Shen:
The performance improvements of highly-concurrent grid-based server. Simul. Model. Pract. Theory 42: 129-146 (2014) - 2013
- [j8]Tinghuai Ma, Qiaoqiao Yan, Wei Tian, Donghai Guan, Sungyoung Lee:
Replica creation strategy based on quantum evolutionary algorithm in data gird. Knowl. Based Syst. 42: 85-96 (2013) - 2012
- [j7]Tinghuai Ma, Donghai Guan, Sungyoung Lee, Hao Cao:
An efficient distributed weather data sharing system based on agent. Int. Arab J. Inf. Technol. 9(2): 170-178 (2012) - 2011
- [j6]Jin Wang, Tinghuai Ma, Jinsung Cho, Sungyoung Lee:
An energy efficient and load balancing routing algorithm for wireless sensor networks. Comput. Sci. Inf. Syst. 8(4): 991-1007 (2011) - [j5]Tinghuai Ma, Sen Yan, Jin Wang, Sungyoung Lee:
Privacy preserving in ubiquitous computing: Classification & hierarchy. Comput. Sci. Inf. Syst. 8(4): 1185-1206 (2011) - [j4]Tinghuai Ma, Wei Tian, B. Wang, D. H. Guan, Sung Young Lee:
Weather data sharing system: an agent-based distributed data management. IET Softw. 5(1): 21-31 (2011) - [j3]Tinghuai Ma, Qiaoqiao Yan, Wenjie Liu, Cui Mengmeng:
A survey on grid task scheduling. Int. J. Comput. Appl. Technol. 41(3/4): 303-309 (2011) - [j2]Tinghuai Ma, Wei Tian, Donghai Guan, Sungyoung Lee:
Quantizing Personal Privacy in Ubiquitous Computing. KSII Trans. Internet Inf. Syst. 5(9): 1653-1667 (2011) - 2010
- [j1]Tinghuai Ma, Jian Ge, Wei Tian, Yali Wang, Erasmus Sowah:
Virtual Resource Management Based Meteorological Computational Grid . J. Convergence Inf. Technol. 5(10): 131-140 (2010)
Conference and Workshop Papers
- 2023
- [c26]Jiajing Zhang, Neng Xu, Jinlan Chen, Tinghuai Ma:
MOFC: Network Embedding Based on Multi-Orders Friends Contribution for User Identification. ACAI 2023: 233-241 - [c25]Huan Rong, Victor S. Sheng, Tinghuai Ma, Yang Zhou, Mznah Al-Rodhaan:
A Self-play and Sentiment-Emphasized Comment Integration Framework Based on Deep Q-Learning in a Crowdsourcing Scenario : Extended Abstract. ICDE 2023: 3847-3848 - 2020
- [c24]Zhijie Zhang, Lejun Zhang, Waqas Rasheed, Zilong Jin, Tinghuai Ma, Huiling Chen, Guangquan Xu:
The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper Protocol. FCS 2020: 215-230 - 2018
- [c23]Honghao Zhou, Tinghuai Ma, Jing Jia, Yuan Tian, Mznah Al-Rodhaan:
EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension. ICCCS (3) 2018: 32-43 - [c22]Qin Liu, Tinghuai Ma, Jian Li, Wenhai Shen:
Workflow Task Scheduling Algorithm Based on IFCM and IACO. ICCCS (2) 2018: 377-388 - [c21]Yu Qiao, Zilong Jin, Kan Yao, Tinghuai Ma:
An Energy-Efficient Cooperative Spectrum Sensing Scheme based on D-S Theory in Cognitive Radio Sensor Networks. IMCOM 2018: 58:1-58:6 - 2017
- [c20]Fan Chen, Hongjie He, Tinghuai Ma, Shu Yan:
Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling. ICCCS (2) 2017: 162-174 - 2016
- [c19]Yu Xue, Binping Zhao, Tinghuai Ma:
Classification Based on Fireworks Algorithm. BIC-TA (2) 2016: 35-40 - [c18]Yu Xue, Tao Tang, Tinghuai Ma:
Classification Based on Brain Storm Optimization Algorithm. BIC-TA (1) 2016: 371-376 - 2014
- [c17]Bo Zhao, Yu Zhou, Zhengyu Zhang, Ying Na, Tinghuai Ma:
Information Quantity Based Automatic Reconstruction of Shredded Chinese Documents. ICTAI 2014: 1016-1020 - [c16]Yuan Tian, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma:
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration. ISBAST 2014: 166-170 - 2012
- [c15]Jian Ge, Tinghuai Ma, Qiaoqiao Yan, Yonggang Yan, Wei Tian:
Training Pool Selection for Semi-supervised Learning. ISNN (1) 2012: 524-532 - 2011
- [c14]Tinghuai Ma, Jian Ge, Jin Wang:
Combining active learning and semi-supervised for improving learning performance. ISABEL 2011: 173:1-173:5 - [c13]Wenjie Liu, Jingfa Liu, Hao Xiao, Tinghuai Ma, Yu Zheng:
Multiparty Simultaneous Quantum Secure Direct Communication Based on GHZ States and Mutual Authentication. ISNN (3) 2011: 209-218 - [c12]Jin Wang, Jinsung Cho, Sungyoung Lee, Tinghuai Ma:
Real time services for future cloud computing enabled vehicle networks. WCSP 2011: 1-5 - 2010
- [c11]Tinghuai Ma, Jiazhao Leng, Keyi Li:
Full-scale privacy preserving for association rule mining. FSKD 2010: 1668-1672 - [c10]Tinghuai Ma, Jian Ge, Hao Cao, Yali Wang:
Design and Implementation of Virtual Resources Management in Meteorology Grid. GCC 2010: 58-63 - 2009
- [c9]Wei Tian, Wenjie Liu, Tinghuai Ma:
Study and Implementation of Chinese Intelligent Question Answering System Based on Restricted Domain. WGEC 2009: 217-220 - [c8]Wenxia Xuan, Shengjun Xue, Tinghuai Ma:
Architecture of Collaborative Design Based on Grid. WGEC 2009: 244-247 - [c7]Xianhua Wu, Tinghuai Ma, Ye Tian:
The Empirical Impact of Internal Knowledge Structure on the Endogenous Industrial Clusters Innovation. WGEC 2009: 721-725 - 2008
- [c6]Wenjie Liu, Hanwu Chen, Tinghuai Ma, Wei Tian:
An Efficient Deterministic Secure Quantum Communication Scheme with W State. CIS (1) 2008: 52-55 - [c5]Tinghuai Ma, Shin-Dug Kim, Jun Wang, Yawei Zhao:
Privacy Preserving in Ubiquitous Computing: Challenges & Issues. ICEBE 2008: 297-301 - [c4]Wenjie Liu, Hanwu Chen, Tinghuai Ma, Jingfa Liu:
Efficient Deterministic Secure Quantum Communication with Cluster State. PACIIA (1) 2008: 722-726 - 2007
- [c3]Tinghuai Ma, Meili Tang:
Evaluation of High-tech Program Based on Rough Set Theory. SNPD (2) 2007: 850-854 - 2006
- [c2]Tinghuai Ma, Meili Tang:
Weighted Rough Set Model. ISDA (1) 2006: 481-485 - 2005
- [c1]Tinghuai Ma, Yong-Deak Kim, Qiang Ma, Meili Tang, Weican Zhou:
Context-aware implementation based on CBR for smart home. WiMob (4) 2005: 112-115
Editorship
- 2023
- [e4]Yuan Tian, Tinghuai Ma, Qingshan Jiang, Qi Liu, Muhammad Khurram Khan:
Big Data and Security - 4th International Conference, ICBDS 2022, Xiamen, China, December 8-12, 2022, Proceedings. Communications in Computer and Information Science 1796, Springer 2023, ISBN 978-981-99-3299-3 [contents] - 2022
- [e3]Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan, Victor S. Sheng, Zhaoqing Pan:
Big Data and Security - Third International Conference, ICBDS 2021, Shenzhen, China, November 26-28, 2021, Proceedings. Communications in Computer and Information Science 1563, Springer 2022, ISBN 978-981-19-0851-4 [contents] - 2021
- [e2]Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan:
Big Data and Security - Second International Conference, ICBDS 2020, Singapore, Singapore, December 20-22, 2020, Revised Selected Papers. Communications in Computer and Information Science 1415, Springer 2021, ISBN 978-981-16-3149-8 [contents] - 2020
- [e1]Yuan Tian, Tinghuai Ma, Muhammad Khurram Khan:
Big Data and Security - First International Conference, ICBDS 2019, Nanjing, China, December 20-22, 2019, Revised Selected Papers. Communications in Computer and Information Science 1210, Springer 2020, ISBN 978-981-15-7529-7 [contents]
Informal and Other Publications
- 2020
- [i1]Tinghuai Ma, Mingming Yang, Huan Rong, Yurong Qian, Yuan Tian, Najla Al-Nabhan:
Dual-path CNN with Max Gated block for Text-Based Person Re-identification. CoRR abs/2009.09343 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint