default search action
Feng Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j39]Xiumin Wang, Feng Ma, Xuming Wang, Chen Chen:
Learning feature-weighted regularization discriminative correlation filters for real-time UAV tracking. Signal Process. 228: 109765 (2025) - 2024
- [j38]Jie Yang, Zhigang Jiang, Shuo Zhu, Wei Yan, Yanan Wang, Feng Ma:
An adaptive design optimization method for remanufacturing upgrade of spent products considering bidirectional customization demands. Adv. Eng. Informatics 62: 102598 (2024) - [j37]Huang Shunhu, Ma Feng, Qingshan Gong, Hua Zhang:
Efficient low-carbon manufacturing for CFRP composite machining based on deep networks. Int. J. Prod. Res. 62(17): 6090-6101 (2024) - [j36]Feng Ma, Zhe Kang, Chen Chen, Jie Sun, Xiaobin Xu, Jin Wang:
Identifying Ships From Radar Blips Like Humans Using a Customized Neural Network. IEEE Trans. Intell. Transp. Syst. 25(7): 7187-7205 (2024) - [c27]Feng Ma, Yanhui Tu, Maokui He, Ruoyu Wang, Shutong Niu, Lei Sun, Zhongfu Ye, Jun Du, Jia Pan, Chin-Hui Lee:
A Spatial Long-Term Iterative Mask Estimation Approach for Multi-Channel Speaker Diarization and Speech Recognition. ICASSP 2024: 12331-12335 - [i3]Yongle Chen, Feng Ma, Ying Zhang, YongZhong He, Haining Wang, Qiang Li:
AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale. CoRR abs/2406.12947 (2024) - [i2]Shutong Niu, Ruoyu Wang, Jun Du, Gaobin Yang, Yanhui Tu, Siyuan Wu, Shuangqing Qian, Huaxin Wu, Haitao Xu, Xueyang Zhang, Guolong Zhong, Xindi Yu, Jieru Chen, Mengzhi Wang, Di Cai, Tian Gao, Genshun Wan, Feng Ma, Jia Pan, Jianqing Gao:
The USTC-NERCSLIP Systems for the CHiME-8 NOTSOFAR-1 Challenge. CoRR abs/2409.02041 (2024) - 2023
- [j35]Shan Ma, Feng Ma, Chaoyu Tang:
An Energy-Efficient Optimal Operation Control Strategy for High-Speed Trains via a Symmetric Alternating Direction Method of Multipliers. Axioms 12(5): 489 (2023) - [j34]Bingsheng He, Feng Ma, Shengjie Xu, Xiaoming Yuan:
A rank-two relaxed parallel splitting version of the augmented Lagrangian method with step size in (0,2) for separable convex programming. Math. Comput. 92(342): 1633-1663 (2023) - [j33]Qing Wang, Jun Du, Huaxin Wu, Jia Pan, Feng Ma, Chin-Hui Lee:
A Four-Stage Data Augmentation Approach to ResNet-Conformer Based Acoustic Modeling for Sound Event Localization and Detection. IEEE ACM Trans. Audio Speech Lang. Process. 31: 1251-1264 (2023) - 2022
- [j32]Bingsheng He, Feng Ma, Shengjie Xu, Xiaoming Yuan:
A Generalized Primal-Dual Algorithm with Improved Convergence Condition for Saddle Point Problems. SIAM J. Imaging Sci. 15(3): 1157-1183 (2022) - [c26]Jue Wang, Huanzhang Lu, Yao Zhang, Feng Ma, Moufa Hu:
Temporal Factorized Bilinear Modules with 2D CNN for Action Recognition in Videos. ICCCS 2022: 261-266 - [c25]Yu Chen, Feng Ma, Hu Shun Huang:
Construction of Bank Credit White List Access System Based on Grey Clustering Algorithm. ICBICC 2022: 3:1-3:6 - 2021
- [j31]Jing Feng, Xiaobin Xu, Pan Liu, Feng Ma, Chengrong Ma, Zhigang Tao:
Slope Sliding Force Prediction via Belief Rule-Based Inferential Methodology. Int. J. Comput. Intell. Syst. 14(1): 965-977 (2021) - [j30]Feng Ma, Hua Zhang, Qingshan Gong, Kwok Keung Bernard Hon:
A novel energy efficiency grade evaluation approach for machining systems based on inherent energy efficiency. Int. J. Prod. Res. 59(19): 6022-6033 (2021) - [c24]Tilei Gao, Jinyu He, Tengyang Fan, Feng Ma:
Research on dynamic evolution method of software service based on trusted agent. DSIT 2021: 154-158 - [c23]Feng Ma, Ying Yang, Tilei Gao:
A new method of similarity measure for Vague Sets. DSIT 2021: 166-169 - [c22]Zhuoqun Liu, Yingjie Deng, Feng Ma, Jinming Du, Chao Xiong, Moufa Hu, Luping Zhang, Xuhuan Ji:
Target detection and tracking algorithm based on improved Mask RCNN and LMB. ICCAIS 2021: 1037-1041 - [c21]Qing Wang, Huaxin Wu, Zijun Jing, Feng Ma, Yi Fang, Yuxuan Wang, Tairan Chen, Jia Pan, Jun Du, Chin-Hui Lee:
A Model Ensemble Approach for Sound Event Localization and Detection. ISCSLP 2021: 1-5 - [i1]Qing Wang, Jun Du, Huaxin Wu, Jia Pan, Feng Ma, Chin-Hui Lee:
A Four-Stage Data Augmentation Approach to ResNet-Conformer Based Acoustic Modeling for Sound Event Localization and Detection. CoRR abs/2101.02919 (2021) - 2020
- [j29]Feng Ma, Yuan Huang:
Assessing the Scientific Impact of Individual Scholars With Multi-Scale H-Index. IEEE Access 8: 226942-226951 (2020) - [j28]Bingsheng He, Feng Ma, Xiaoming Yuan:
Optimally linearizing the alternating direction method of multipliers for convex programming. Comput. Optim. Appl. 75(2): 361-388 (2020) - [j27]Xinping Yan, Shu-wu Wang, Feng Ma, Yuan-chang Liu, Jin Wang:
A novel path planning approach for smart cargo ships based on anisotropic fast marching. Expert Syst. Appl. 159: 113558 (2020) - [j26]Chen Chen, Feng Ma, Jialun Liu, Rudy R. Negenborn, Yuan-chang Liu, Xinping Yan:
Controlling a cargo ship without human experience using deep Q-network. J. Intell. Fuzzy Syst. 39(5): 7363-7379 (2020) - [j25]Feng Ma:
Convergence study on the proximal alternating direction method with larger step size. Numer. Algorithms 85(2): 399-425 (2020) - [c20]Yanhui Tu, Jun Du, Lei Sun, Feng Ma, Jia Pan, Chin-Hui Lee:
A Space-and-Speaker-Aware Iterative Mask Estimation Approach to Multi-Channel Speech Recognition in the CHiME-6 Challenge. INTERSPEECH 2020: 96-100
2010 – 2019
- 2019
- [j24]Ma Feng, Zhang Hua, Kwok Keung Bernard Hon:
A Qualitative Model for Predicting Energy Consumption of Rapid Prototyping Processes-a Case of Fused Deposition Modeling Processe. IEEE Access 7: 184825-184831 (2019) - [j23]Feng Ma:
On relaxation of some customized proximal point algorithms for convex minimization: from variational inequality perspective. Comput. Optim. Appl. 73(3): 871-901 (2019) - [j22]Lei Sun, Jun Du, Tian Gao, Yi Fang, Feng Ma, Chin-Hui Lee:
A Speaker-Dependent Approach to Separation of Far-Field Multi-Talker Microphone Array Speech for Front-End Processing in the CHiME-5 Challenge. IEEE J. Sel. Top. Signal Process. 13(4): 827-840 (2019) - [j21]Yejun Xu, Feng Ma, Francisco Herrera:
Revisiting inconsistent judgments for incomplete fuzzy linguistic preference relations: Algorithms to identify and rectify ordinal inconsistencies. Knowl. Based Syst. 163: 305-319 (2019) - [j20]Feng Ma, Yiming Bi, Bin Gao:
A prediction-correction-based primal-dual hybrid gradient method for linearly constrained convex minimization. Numer. Algorithms 82(2): 641-662 (2019) - [j19]Yanhui Tu, Jun Du, Lei Sun, Feng Ma, Hai-Kun Wang, Jingdong Chen, Chin-Hui Lee:
An iterative mask estimation approach to deep learning based multi-channel speech recognition. Speech Commun. 106: 31-43 (2019) - [j18]Jia Li, Xiumin Chu, Wei He, Feng Ma, Reza Malekian, Zhixiong Li:
A Generalised Bayesian Inference Method for Maritime Surveillance Using Historical Data. Symmetry 11(2): 188 (2019) - [c19]Lei Sun, Jun Du, Tian Gao, Yi Fang, Feng Ma, Jia Pan, Chin-Hui Lee:
A Two-stage Single-channel Speaker-dependent Speech Separation Approach for Chime-5 Challenge. ICASSP 2019: 6650-6654 - [c18]Feng Ma, Li Chai, Jun Du, Diyuan Liu, Zhongfu Ye, Chin-Hui Lee:
Acoustic Model Ensembling Using Effective Data Augmentation for CHiME-5 Challenge. INTERSPEECH 2019: 1258-1262 - 2018
- [j17]Yan Zhou, Hua Zhang, Wei Yan, Feng Ma, Gongfa Li, Wenjun Chang:
Energy consumption component analysis mathematical model of grinder energy unit. Int. J. Comput. Sci. Math. 9(6): 612-620 (2018) - [j16]Yan Zhou, Hua Zhang, Wei Yan, Feng Ma, Gongfa Li, Wentao Cheng:
Energy consumption prediction model of plane grinder processing system based on BP neural network. Int. J. Wirel. Mob. Comput. 14(4): 320-327 (2018) - [j15]Bin Gao, Feng Ma:
Symmetric Alternating Direction Method with Indefinite Proximal Regularization for Linearly Constrained Convex Optimization. J. Optim. Theory Appl. 176(1): 178-204 (2018) - [j14]Kaizhan Huai, Mingfang Ni, Zhanke Yu, Xiang Zheng, Feng Ma:
A generalized inexact Uzawa method for stable principal component pursuit problem with nonnegative constraints. Numer. Algorithms 77(3): 653-674 (2018) - 2017
- [j13]Jing Xu, Aizhong Ye, Qingyun Duan, Feng Ma, Zheng Zhou:
Improvement of rank histograms for verifying the reliability of extreme event ensemble forecasts. Environ. Model. Softw. 92: 152-162 (2017) - [j12]Bingsheng He, Feng Ma, Xiaoming Yuan:
An Algorithmic Framework of Generalized Primal-Dual Hybrid Gradient Methods for Saddle Point Problems. J. Math. Imaging Vis. 58(2): 279-293 (2017) - [j11]Xinwang Zhang, Zipeng Chen, Yanqiang Gao, Feng Ma, Jiachen Hao, Guodong Zhu, Baoyong Chi:
An Interference-Robust Reconfigurable Receiver With Automatic Frequency-Calibrated LNA in 65-nm CMOS. IEEE Trans. Very Large Scale Integr. Syst. 25(11): 3113-3124 (2017) - [c17]Feng Ma, Xiaodong Liu, Ying Yang, Wei Yao, Jinjin Cai, Fang Wang:
ESBSC: Energy-Aware Service Brokering Strategy in Clouds. COMPSAC (2) 2017: 407-412 - [c16]Yanhui Tu, Jun Du, Lei Sun, Feng Ma, Chin-Hui Lee:
On Design of Robust Deep Models for CHiME-4 Multi-Channel Speech Recognition with Multiple Configurations of Array Microphones. INTERSPEECH 2017: 394-398 - [c15]Feng Ma, Yuan Huang:
Multi-Scale H-Index: A New Measure to Assess the Scientific Impact of Scholars. ISSI 2017: 680-690 - 2016
- [j10]Haikun Jia, Lixue Kuang, Wei Zhu, Zhiping Wang, Feng Ma, Zhihua Wang, Baoyong Chi:
A 77 GHz Frequency Doubling Two-Path Phased-Array FMCW Transceiver for Automotive Radar. IEEE J. Solid State Circuits 51(10): 2299-2311 (2016) - [j9]Feng Ma, Yu-Wang Chen, Zichao Huang, Xinping Yan, Jin Wang:
A novel approach of collision assessment for coastal radar surveillance. Reliab. Eng. Syst. Saf. 155: 179-195 (2016) - [j8]Bingsheng He, Feng Ma, Xiaoming Yuan:
Convergence Study on the Symmetric Version of ADMM with Larger Step Sizes. SIAM J. Imaging Sci. 9(3): 1467-1501 (2016) - [j7]Feng Ma, Xiaochuan Luo, Eugene Litvinov:
Cloud Computing for Power System Simulations at ISO New England - Experiences and Challenges. IEEE Trans. Smart Grid 7(6): 2596-2603 (2016) - [c14]Zhipeng Xie, Jun Du, Ian McLoughlin, Yong Xu, Feng Ma, Haikun Wang:
Deep neural network for robust speech recognition with auxiliary features from laser-Doppler vibrometer sensor. ISCSLP 2016: 1-5 - [c13]Eugene Litvinov, Feng Ma, Qiang Zhang, Xiaochuan Luo:
Cloud-based next-generation IT paradigm for the operations of future power systems. PSCC 2016: 1-7 - 2015
- [j6]Yejun Xu, Feng Ma, Weijun Xu, Huimin Wang:
An incomplete multi-granular linguistic model and its application in emergency decision of unconventional outburst incidents. J. Intell. Fuzzy Syst. 29(2): 619-633 (2015) - [j5]Yanhui Song, Feng Ma, Siluo Yang:
Comparative study on the obsolescence of humanities and social sciences in China: under the new situation of web. Scientometrics 102(1): 365-388 (2015) - [c12]Feng Ma, Xin-Wang Zhang, Baoyong Chi:
A 100M-1.5 GHz harmonic-rejection SDR receiver front-end. ASICON 2015: 1-4 - [c11]Haikun Jia, Baoyong Chi, Lixue Kuang, Wei Zhu, Zhiping Wang, Feng Ma, Zhihua Wang:
A frequency doubling two-path phased-array FMCW radar transceiver in 65nm CMOS. A-SSCC 2015: 1-4 - [c10]Feng Ma, Mingfang Ni, Bin Gao, Zhanke Yu:
An efficient algorithm for the weapon target assignment problem. ICIA 2015: 2093-2097 - 2014
- [j4]Yejun Xu, Feng Ma, Feifei Tao, Huimin Wang:
Some methods to deal with unacceptable incomplete 2-tuple fuzzy linguistic preference relations in group decision making. Knowl. Based Syst. 56: 179-190 (2014) - [c9]Yejun Xu, Feng Ma, Huimin Wang:
A revised procedure to estimate missing values in incomplete fuzzy preference relations. FUZZ-IEEE 2014: 279-284 - 2013
- [c8]Tianwen Li, Feng Ma, Weiyi Liu:
The core and the bargaining set for multi-choice games. FSKD 2013: 114-119 - [c7]Tianwen Li, Feng Ma, Weiyi Liu:
An Approach for Obtaining Bargaining Set in Multi-choice Games. IUKM 2013: 137-148 - [c6]Tianwen Li, Feng Ma, Weiyi Liu:
Multi-agent Oriented Stable Payoff with Cooperative Game. ICSI (2) 2013: 74-81 - 2012
- [c5]Ma Feng, Li Lei:
Research on constant-frequency hysteresis current control in differential three-level grid-connected inverter. IECON 2012: 730-733 - [c4]Feng Ma, Weiyi Liu:
An Improved Bayesian Inference Method for Data-Intensive Computing. ISICA 2012: 134-144 - 2010
- [j3]Siluo Yang, Feng Ma, Yanhui Song, Junping Qiu:
A longitudinal analysis of citation distribution breadth for Chinese scholars. Scientometrics 85(3): 755-765 (2010)
1990 – 1999
- 1998
- [j2]Feng Ma, Shaowei Xia:
A multiscale approach to automatic medical image segmentation using self-organizing map. J. Comput. Sci. Technol. 13(5): 402-409 (1998) - [c3]Feng Ma, Wenping Wang, Wai Wan Tsang, Zesheng Tang, Shaowei Xia, Xin Tong:
Probabilistic Segmentation of Volume Data for Visualization Using SOM-PNN Classifier. VVS 1998: 71-78 - 1997
- [j1]Hui Su, Bin Zhao, Feng Ma, Song Wang, Shaowei Xia:
A Fault-Tolerant Chinese Check Recognition System. Int. J. Pattern Recognit. Artif. Intell. 11(4): 571-593 (1997) - [c2]Song Wang, Feng Ma, Shaowei Xia:
A Chinese Bank Check Recognition System Based on the Fault Tolerant Technique. ICDAR 1997: 1038-1042 - [c1]Song Wang, Feng Ma, Shaowei Xia, Hui Su:
A fault tolerant Chinese bank check recognition system based on SOM neural networks. ICNN 1997: 2560-2565
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint