Jixin Ma
Jixin Ma
Professor of Computer Science
Verified email at
Cited by
Cited by
A general temporal theory
M Jixin, B Knight
The Computer Journal 37 (2), 114-123, 1994
A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map
J Liu, J Li, J Ma, N Sadiq, UA Bhatti, Y Ai
Applied Sciences 9 (4), 700, 2019
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
JM Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu
IEEE Transaction on Cloud Computing, 2019
A case based reasoning approach for the monitoring of business workflows
S Kapetanakis, M Petridis, B Knight, J Ma, L Bacon
Case-Based Reasoning. Research and Development: 18th International …, 2010
Robust watermarking algorithm for medical volume data in internet of medical things
J Liu, J Ma, J Li, M Huang, N Sadiq, Y Ai
IEEE Access 8, 93939-93961, 2020
Contourlet-DCT based multiple robust watermarkings for medical images
X Wu, J Li, R Tu, J Cheng, UA Bhatti, J Ma
Multimedia Tools and Applications 78, 8463-8480, 2019
Outsourced decentralized multi-authority attribute based signature and its application in IoT
J Sun, Y Su, J Qin, J Hu, J Ma
IEEE Transactions on Cloud Computing 9 (3), 1195-1209, 2019
A framework for historical case-based reasoning
J Ma, B Knight
Case-Based Reasoning Research and Development: 5th International Conference …, 2003
A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map
J Liu, J Li, J Cheng, J Ma, N Sadiq, B Han, Q Geng, Y Ai
Computers, Materials & Continua 61 (2), 889-910, 2019
Reified temporal logics: An overview
J Ma, B Knight
Artificial Intelligence Review 15, 189-217, 2001
Time representation: A taxonomy of temporal models
B Knight, J Ma
Artificial Intelligence Review 7, 401-419, 1993
A general temporal model supporting duration reasoning
B Knight, M Jixin
Ai Communications 5 (2), 75-84, 1992
Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm
X Zhou, C Cao, J Ma, L Wang
Mathematical Problems in Engineering 2018 (1), 2685739, 2018
Providing Explanations for the Intelligent Monitoring of Business Workflows Using Case-Based Reasoning.
S Kapetanakis, M Petridis, J Ma, L Bacon, T Roth-Berghofer, N Tintarev, ...
ExaCt, 25-36, 2010
Primitive intervals versus point-based intervals: Rivals or allies?
J Ma, P Hayes
The Computer Journal 49 (1), 32-41, 2006
Representing the dividing instant
J Ma, B Knight
The Computer Journal 46 (2), 213-222, 2003
An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space
J Dai, J Ren, W Du, V Shikhin, J Ma
Neural Computing and Applications 32, 1413-1434, 2020
Differential privacy of big data: an overview
X Yao, X Zhou, J Ma
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
Using eigen-decomposition method for weighted graph matching
G Zhao, B Luo, J Tang, J Ma
Advanced Intelligent Computing Theories and Applications. With Aspects of …, 2007
[Retracted] Robust Zero Watermarking Algorithm for Medical Images Based on Zernike‐DCT
C Yang, J Li, UA Bhatti, J Liu, J Ma, M Huang
Security and Communication Networks 2021 (1), 4944797, 2021
The system can't perform the operation now. Try again later.
Articles 1–20