default search action
Peijun Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Min Zhou, Hong Zhou, Mengwei Si, Guangjie Gao, Xiaojin Chen, Xiaoxiao Zhu, Kui Dang, Peijun Ma, Xiaohua Ma, Xuefeng Zheng, Zhihong Liu, Jincheng Zhang, Yuhao Zhang, Yue Hao:
71 GHz-fmax β-Ga2O3-on-SiC RF Power MOSFETs with Record Pout=3.1 W/mm and PAE=50.8% at 2 GHz, Pout= 2.3 W/mm at 4 GHz, and Low Microwave Noise Figure. VLSI Technology and Circuits 2024: 1-2 - 2021
- [j30]Jiangyi Shi, Xinyuan Zhang, Peijun Ma, Weitao Pan, Pengfei Li, Zhengguang Tang:
Hardware Trojan Designs Based on High-Low Probability and Partitioned Combinational Logic With a Malicious Reset Signal. IEEE Trans. Circuits Syst. II Express Briefs 68(6): 2152-2156 (2021) - 2020
- [j29]Jiangyi Shi, Bo Zhao, Zhengguang Tang, Peijun Ma, Zhixiong Di:
A self-clocked binary-seaching digital low-dropout regulator with fast transient response. IEICE Electron. Express 17(21): 20200297 (2020)
2010 – 2019
- 2017
- [j28]Zhen Yu, Zhen Yang, Xiaohong Su, Peijun Ma:
Evaluation and comparison of ten data race detection techniques. Int. J. High Perform. Comput. Netw. 10(4/5): 279-288 (2017) - [j27]Naifeng Wen, Xiaohong Su, Peijun Ma, Lingling Zhao, Yan-hang Zhang:
Online UAV path planning in uncertain and hostile environments. Int. J. Mach. Learn. Cybern. 8(2): 469-487 (2017) - [j26]Ming Zhao, Lingling Zhao, Xiaohong Su, Peijun Ma, Yan-hang Zhang:
Improved discrete mapping differential evolution for multi-unmanned aerial vehicles cooperative multi-targets assignment under unified model. Int. J. Mach. Learn. Cybern. 8(3): 765-780 (2017) - 2016
- [j25]Hao Shu, Jiangyi Shi, Peijun Ma, Huaxi Gu, Weitao Pan, Lin-An Yang:
Dual priority congestion aware shared-resource Network-on-Chip architecture. IEICE Electron. Express 13(7): 20160142 (2016) - [j24]Bochao Zhao, Peijun Ma, Yang Lu, Jiaxin Zheng, Hengshuang Zhang, Zuo-Chen Shi, Xiaohua Ma, Yue Hao:
A novel graphical method for dual-frequency two sections transformer. IEICE Electron. Express 13(12): 20160509 (2016) - [j23]Zhen Yu, Xiaohong Su, Peijun Ma:
Slider: an online and active deadlock avoider by serial execution of critical sections. Int. J. High Perform. Syst. Archit. 6(1): 36-50 (2016) - [j22]Jing Qiu, Xiaohong Su, Peijun Ma:
Using Reduced Execution Flow Graph to Identify Library Functions in Binary Code. IEEE Trans. Software Eng. 42(2): 187-202 (2016) - [c25]Jiangyi Shi, Hongwei Liu, Peijun Ma:
A monopulse scheme in Radar angle-measurement based on Beam-Comparison. CISP-BMEI 2016: 1263-1267 - [c24]Zhen Yang, Zhen Yu, Xiaohong Su, Peijun Ma:
RaceTracker: Effective and efficient detection of data races. SNPD 2016: 293-300 - 2015
- [j21]Dandan Gong, Xiaohong Su, Tiantian Wang, Peijun Ma, Wang Yu:
State dependency probabilistic model for fault localization. Inf. Softw. Technol. 57: 430-445 (2015) - [j20]Tonghua Su, Hongliang Dai, Jian Zhang, Peijun Ma, Shengchun Deng:
面向连续叠写的高精简中文手写识别方法研究 (Study on High Compact Recognition Method for Continuously Overlaid Chinese Handwriting). 计算机科学 42(7): 300-304 (2015) - [j19]Jing Qiu, Xiaohong Su, Peijun Ma:
Identifying functions in binary code with reverse extended control flow graphs. J. Softw. Evol. Process. 27(10): 793-820 (2015) - [j18]Zhixiong Di, Yue Hao, Jiangyi Shi, Peijun Ma:
A High-Throughput VLSI Architecture Design of Arithmetic Encoder in JPEG2000. J. Signal Process. Syst. 81(2): 227-247 (2015) - [c23]Lingling Zhao, Yingjun Zhang, Peijun Ma, Xiaohong Su, Chunmei Shi:
Intuitionistic Fuzzy Sets with Shannon Relative Entropy. BIOSIGNALS 2015: 150-157 - [c22]Peijun Ma, Shuai Wang, Lingling Zhao, Michael G. Pecht, Xiaohong Su, Zhe Ye:
An improved exponential model for predicting the remaining useful life of lithium-ion batteries. ICPHM 2015: 1-6 - [c21]Zhe Ye, Lingling Zhao, Zhuo Wang, Peijun Ma, Xiaohong Su, Long Pang, Michael G. Pecht:
A dual-level approach for lithium-ion battery RUL prognosis. ICPHM 2015: 1-6 - [c20]Jing Qiu, Xiaohong Su, Peijun Ma:
Library functions identification in binary code by using graph isomorphism testings. SANER 2015: 261-270 - [i1]Junjie Wang, Lingling Zhao, Xiaohong Su, Peijun Ma:
Distributed Computation Particle PHD filter. CoRR abs/1503.03769 (2015) - 2014
- [j17]Tiantian Wang, Kechao Wang, Xiaohong Su, Peijun Ma:
Detection of semantically similar code. Frontiers Comput. Sci. 8(6): 996-1011 (2014) - [j16]Yixin Bian, Günes Koru, Xiaohong Su, Peijun Ma:
Corrigendum to: "SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones": [J. Syst. Softw. 86 (2013) 2077-2093]. J. Syst. Softw. 88: 250 (2014) - [j15]Hao Shu, Peijun Ma, Jiangyi Shi, Zhao Xu, Lin-An Yang:
SRNoC: A novel high performance Shared-Resource routing scheme for Network-on-Chip. Microelectron. J. 45(8): 1103-1117 (2014) - [j14]Wei Pan, Peijun Ma, Qinghua Hu, Xiaohong Su, Chaoqi Ma:
Comparative analysis on margin based feature selection algorithms. Int. J. Mach. Learn. Cybern. 5(3): 339-367 (2014) - [c19]Chunmei Shi, Lingling Zhao, Peijun Ma, Xiaohong Su, Junjie Wang, Chiping Zhang:
Multi-object Tracking Based on Particle Probability Hypothesis Density Tracker in Microscopic Video. BIBE 2014: 69-75 - [c18]Tonghua Su, Songze Li, Peijun Ma, Shengchun Deng, Guangsheng Liang:
Scalable Prototype Learning Using GPUs. ICIAR (1) 2014: 309-319 - 2013
- [j13]Dandan Gong, Tiantian Wang, Xiaohong Su, Peijun Ma:
A test-suite reduction approach to improving fault-localization effectiveness. Comput. Lang. Syst. Struct. 39(3): 95-108 (2013) - [j12]Yixin Bian, Günes Koru, Xiaohong Su, Peijun Ma:
SPAPE: A semantic-preserving amorphous procedure extraction method for near-miss clones. J. Syst. Softw. 86(8): 2077-2093 (2013) - [j11]Yong Guo, Peijun Ma, Xiaohong Su:
Dynamic Collection of Reliability-Related Data and Reliability Evaluation for Internet software. J. Softw. 8(6): 1390-1397 (2013) - [j10]Wei Pan, Qinghua Hu, Peijun Ma, Xiaohong Su:
Robust feature selection based on regularized brownboost loss. Knowl. Based Syst. 54: 180-198 (2013) - [c17]Lingling Zhao, Xianglei Dong, Peijun Ma, Xiaohong Su, Chunmei Shi:
A New Multi-sensor Track Association Approach Based on Intuitionistic Fuzzy Clustering. IAIT 2013: 256-266 - [c16]Tonghua Su, Peijun Ma, Tong Wei, Shu Liu, Shengchun Deng:
Exploring MPE/MWE Training for Chinese Handwriting Recognition. ICDAR 2013: 1275-1279 - [c15]Zhixiang Tong, Qiankun Zhuang, Qi Guo, Peijun Ma:
Research on Technologies of Software Requirements Prioritization. ISCTCS 2013: 9-21 - 2012
- [j9]Yuanlong Chen, Dong Li, Peijun Ma:
Implementation of Multi-objective Evolutionary Algorithm for Task Scheduling in Heterogeneous Distributed Systems. J. Softw. 7(6): 1367-1374 (2012) - [j8]Peng Li, Peijun Ma, Xiaohong Su, Ching-Nung Yang:
Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23(3): 441-453 (2012) - [c14]Shu Liu, Peijun Ma, Dong Li:
The Exploration and Practice of Gradually Industrialization Model in Software Engineering Education - A Factual Instance of the Excellent Engineer Plan of China. CSEE&T 2012: 23-31 - [c13]Zhenwei Lu, Lingling Zhao, Xiaohong Su, Peijun Ma:
A STPHD-Based Multi-sensor Fusion Method. ICONIP (3) 2012: 100-107 - [c12]Peng Li, Peijun Ma, Dong Li:
Aspect Ratio Invariant Visual Cryptography Scheme with Optional Size Expansion. IIH-MSP 2012: 219-222 - [c11]Wei Pan, Peijun Ma, Xiaohong Su:
Feature Weighting Algorithm Based on Margin and Linear Programming. RSCTC 2012: 388-396 - 2011
- [j7]Tiantian Wang, Xiaohong Su, Peijun Ma, Yuying Wang, Kuanquan Wang:
Ability-training-oriented automated assessment in introductory programming course. Comput. Educ. 56(1): 220-226 (2011) - [j6]Yong Du, Qinghua Hu, Degang Chen, Peijun Ma:
Kernelized Fuzzy Rough Sets Based Yawn Detection for Driver Fatigue Monitoring. Fundam. Informaticae 111(1): 65-79 (2011) - [j5]Yong Du, Qinghua Hu, Pengfei Zhu, Peijun Ma:
Rule learning for classification based on neighborhood covering reduction. Inf. Sci. 181(24): 5457-5467 (2011) - [c10]Yingjun Zhang, Peijun Ma, Xiaohong Su, Chiping Zhang:
Entropy on interval-valued intuitionistic fuzzy sets and its application in multi-attribute decision making. FUSION 2011: 1-7 - [c9]Li Xu, Peijun Ma, Xiaohong Su:
Selective Track Fusion. ICONIP (3) 2011: 18-25 - [c8]Kang Li, Hongye Jia, Honghu Gong, Jiangyi Shi, Peijun Ma:
Optimization of QDR SRAM Controller in Network Processor. ISCID (1) 2011: 254-257 - [c7]Yong Du, Qinghua Hu, Peijun Ma, Xiaohong Su:
Driver Status Recognition by Neighborhood Covering Rules. RSKT 2011: 327-336 - 2010
- [j4]Jiquan Ma, Peijun Ma, Xiaohong Su:
Solder Joints Detection Method Based on Surface Recovery. Comput. Inf. Sci. 3(2): 163-170 (2010) - [j3]Qinghua Hu, Wei Pan, Shuang An, Peijun Ma, Jin-Mao Wei:
An efficient gene selection technique for cancer recognition based on neighborhood mutual information. Int. J. Mach. Learn. Cybern. 1(1-4): 63-74 (2010) - [c6]Lingling Zhao, Peijun Ma, Xiaohong Su, Hongtao Zhang:
A new multi-target state estimation algorithm for PHD particle filter. FUSION 2010: 1-8
2000 – 2009
- 2008
- [c5]Tiantian Wang, Xiaohong Su, Peijun Ma:
Program Normalization for Removing Code Variations. CSSE (2) 2008: 306-309 - [c4]Tiantian Wang, Xiaohong Su, Peijun Ma:
Normalization for Removing Code Variations in Modular Programs. ISCSCT (2) 2008: 21-24 - 2007
- [j2]Tiantian Wang, Xiaohong Su, Yuying Wang, Peijun Ma:
Semantic similarity-based grading of student programs. Inf. Softw. Technol. 49(2): 99-107 (2007) - [c3]Ying Bi, Peijun Ma, Yixin Jing, Doo-Kwon Baik:
Speech Tagging Based Improvement of the RSS Polymerization News. CIS 2007: 1000-1004 - 2005
- [j1]Ming-e Jing, Yue Hao, Jinfeng Zhang, Peijun Ma:
Efficient parametric yield optimization of VLSI circuit by uniform design sampling method. Microelectron. Reliab. 45(1): 155-162 (2005) - 2003
- [c2]Tianxu Zhao, Xuchao Duan, Yue Hao, Peijun Ma:
Reliability Estimation Model of ICs Interconnect Based on Uniform Distribution of Defects on a Chip. DFT 2003: 11-17 - 2001
- [c1]Tianxu Zhao, Yue Hao, Peijun Ma, Taifeng Chen:
Relation between Reliability and Yield of IC's Based on Discrete Defect Distribution Model. DFT 2001: 48-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint