default search action
Junshui Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j11]Yuting Xu, Deeptak Verma, Robert P. Sheridan, Andy Liaw, Junshui Ma, Nicholas M. Marshall, John McIntosh, Edward C. Sherer, Vladimir Svetnik, Jennifer M. Johnston:
Deep Dive into Machine Learning Models for Protein Engineering. J. Chem. Inf. Model. 60(6): 2773-2790 (2020) - [c8]Antong Chen, Jennifer Saouaf, Bo Zhou, Randolph Crawford, Jianda Yuan, Junshui Ma, Richard Baumgartner, Shubing Wang, Gregory Goldmacher:
A Deep Learning-Facilitated Radiomics Solution for the Prediction of Lung Lesion Shrinkage in Non-Small Cell Lung Cancer Trials. ISBI 2020: 678-682 - [i1]Antong Chen, Jennifer Saouaf, Bo Zhou, Randolph Crawford, Jianda Yuan, Junshui Ma, Richard Baumgartner, Shubing Wang, Gregory Goldmacher:
A deep learning-facilitated radiomics solution for the prediction of lung lesion shrinkage in non-small cell lung cancer trials. CoRR abs/2003.02943 (2020)
2010 – 2019
- 2017
- [j10]Yuting Xu, Junshui Ma, Andy Liaw, Robert P. Sheridan, Vladimir Svetnik:
Demystifying Multitask Deep Neural Networks for Quantitative Structure-Activity Relationships. J. Chem. Inf. Model. 57(10): 2490-2504 (2017) - 2016
- [j9]Robert P. Sheridan, Wei Min Wang, Andy Liaw, Junshui Ma, Eric M. Gifford:
Extreme Gradient Boosting as a Method for Quantitative Structure-Activity Relationships. J. Chem. Inf. Model. 56(12): 2353-2360 (2016) - 2015
- [j8]Junshui Ma, Robert P. Sheridan, Andy Liaw, George E. Dahl, Vladimir Svetnik:
Deep Neural Nets as a Method for Quantitative Structure-Activity Relationships. J. Chem. Inf. Model. 55(2): 263-274 (2015) - 2012
- [c7]Fei Su, Huangling Zhou, Zhiyin Feng, Junshui Ma:
A biometric-based covert warning system using EEG. ICB 2012: 342-347 - 2010
- [c6]Fei Su, Liwen Xia, Anni Cai, Junshui Ma:
A dual-biometric-modality identification system based on fingerprint and EEG. BTAS 2010: 1-6 - [c5]Fei Su, Liwen Xia, Anni Cai, Yibing Wu, Junshui Ma:
EEG-based Personal Identification: from Proof-of-Concept to A Practical System. ICPR 2010: 3728-3731 - [c4]Fei Su, Liwen Xia, Anni Cai, Junshui Ma:
Evaluation of recording factors in EEG-based personal identification: A vital step in real implementations. SMC 2010: 3861-3866
2000 – 2009
- 2009
- [j7]Junshui Ma, Christopher Tong, Andy Liaw, Robert P. Sheridan, John Szumiloski, Vladimir Svetnik:
Generating hypotheses about molecular structure-activity relationships (SARs) by solving an optimization problem. Stat. Anal. Data Min. 2(3): 161-174 (2009) - 2004
- [j6]Junshui Ma, Ashok K. Krishnamurthy, Stanley C. Ahalt:
SVM training with duplicated samples and its application in SVM-based ensemble methods. Neurocomputing 61: 455-459 (2004) - [j5]Junshui Ma, James Theiler, Simon Perkins:
Two realizations of a general feature extraction framework. Pattern Recognit. 37(5): 875-887 (2004) - [c3]Mikhail Teverovskiy, Vinay Kumar, Junshui Ma, Angeliki Kotsianti, David Verbel, Ho-Yuen Pang, Yevgen Vengrenyuk, Stephen Fogarasi, Olivier Saidi, Ali Tabesh:
Improved Prediction of Prostate Cancer Recurrence Based on an Automated Tissue Image Analysis System. ISBI 2004: 257-260 - 2003
- [j4]Junshui Ma:
Function replacement vs. kernel trick. Neurocomputing 50: 479-483 (2003) - [j3]Junshui Ma, Xun Du, Stanley C. Ahalt:
2D HRR Radar Data Modeling and Processing. Multidimens. Syst. Signal Process. 14(1-3): 25-48 (2003) - [j2]Junshui Ma, James Theiler, Simon Perkins:
Accurate On-line Support Vector Regression. Neural Comput. 15(11): 2683-2703 (2003) - [j1]Junshui Ma, José-Luis Sancho-Gómez, Stanley C. Ahalt:
Nonlinear multiclass discriminant analysis. IEEE Signal Process. Lett. 10(7): 196-199 (2003) - [c2]Junshui Ma, Simon Perkins:
Online novelty detection on temporal sequences. KDD 2003: 613-618 - 2002
- [c1]Junshui Ma, Simon Perkins, James Theiler, Stanley C. Ahalt:
Modified Kernel-based Nonlinear Feature Extraction. ICMLA 2002: 127-132
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint