Follow
Jixin Ma
Jixin Ma
Professor of Computer Science
Verified email at gre.ac.uk
Title
Cited by
Cited by
Year
A general temporal theory
M Jixin, B Knight
The Computer Journal 37 (2), 114-123, 1994
1111994
A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map
J Liu, J Li, J Ma, N Sadiq, UA Bhatti, Y Ai
Applied Sciences 9 (4), 700, 2019
982019
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
JM Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu
IEEE Transaction on Cloud Computing, 2019
642019
A case based reasoning approach for the monitoring of business workflows
S Kapetanakis, M Petridis, B Knight, J Ma, L Bacon
Case-Based Reasoning. Research and Development: 18th International …, 2010
592010
Robust watermarking algorithm for medical volume data in internet of medical things
J Liu, J Ma, J Li, M Huang, N Sadiq, Y Ai
IEEE Access 8, 93939-93961, 2020
502020
Contourlet-DCT based multiple robust watermarkings for medical images
X Wu, J Li, R Tu, J Cheng, UA Bhatti, J Ma
Multimedia Tools and Applications 78, 8463-8480, 2019
442019
Outsourced decentralized multi-authority attribute based signature and its application in IoT
J Sun, Y Su, J Qin, J Hu, J Ma
IEEE Transactions on Cloud Computing 9 (3), 1195-1209, 2019
422019
A framework for historical case-based reasoning
J Ma, B Knight
Case-Based Reasoning Research and Development: 5th International Conference …, 2003
422003
A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map
J Liu, J Li, J Cheng, J Ma, N Sadiq, B Han, Q Geng, Y Ai
Computers, Materials & Continua 61 (2), 889-910, 2019
412019
Reified temporal logics: An overview
J Ma, B Knight
Artificial Intelligence Review 15, 189-217, 2001
412001
Time representation: A taxonomy of temporal models
B Knight, J Ma
Artificial Intelligence Review 7, 401-419, 1993
371993
A general temporal model supporting duration reasoning
B Knight, M Jixin
Ai Communications 5 (2), 75-84, 1992
271992
Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm
X Zhou, C Cao, J Ma, L Wang
Mathematical Problems in Engineering 2018 (1), 2685739, 2018
252018
Providing Explanations for the Intelligent Monitoring of Business Workflows Using Case-Based Reasoning.
S Kapetanakis, M Petridis, J Ma, L Bacon, T Roth-Berghofer, N Tintarev, ...
ExaCt, 25-36, 2010
252010
Primitive intervals versus point-based intervals: Rivals or allies?
J Ma, P Hayes
The Computer Journal 49 (1), 32-41, 2006
252006
Representing the dividing instant
J Ma, B Knight
The Computer Journal 46 (2), 213-222, 2003
252003
An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space
J Dai, J Ren, W Du, V Shikhin, J Ma
Neural Computing and Applications 32, 1413-1434, 2020
242020
Differential privacy of big data: an overview
X Yao, X Zhou, J Ma
2016 IEEE 2nd International Conference on Big Data Security on Cloud …, 2016
242016
Using eigen-decomposition method for weighted graph matching
G Zhao, B Luo, J Tang, J Ma
Advanced Intelligent Computing Theories and Applications. With Aspects of …, 2007
222007
[Retracted] Robust Zero Watermarking Algorithm for Medical Images Based on Zernike‐DCT
C Yang, J Li, UA Bhatti, J Liu, J Ma, M Huang
Security and Communication Networks 2021 (1), 4944797, 2021
212021
The system can't perform the operation now. Try again later.
Articles 1–20