default search action
Xuebin Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Tao Wang, Xiaojun Su, Yuchao Liang, Xu Luo, Xiao Hu, Ting Xia, Xuebin Ma, Yongchun Zuo, Huilin Xia, Lei Yang:
Integrated deep learning model for automatic detection and classification of stenosis in coronary angiography. Comput. Biol. Chem. 112: 108184 (2024) - [j12]Xuebin Ma, Zinan Ding, Xiaoyan Zhang:
ST-TrajGAN: A synthetic trajectory generation algorithm for privacy preservation. Future Gener. Comput. Syst. 161: 226-238 (2024) - [j11]Xuebin Ma, Tao Luo, Xuebin Li, Changyu Liu, Nana Liu, Qiang Liu, Kun Zhang, Jie Chen, Liming Zhu:
Inversion of Near-Surface Aerosol Equivalent Complex Refractive Index Based on Aethalometer, Micro-Pulse Lidar and Portable Optical Particle Profiler. Remote. Sens. 16(2): 279 (2024) - [j10]Changyu Liu, Shumei Deng, Kaixuan Yang, Xuebin Ma, Kun Zhang, Xuebin Li, Tao Luo:
The Unmanned Aerial Vehicle-Based Estimation of Turbulent Heat Fluxes in the Sub-Surface of Urban Forests Using an Improved Semi-Empirical Triangle Method. Remote. Sens. 16(15): 2830 (2024) - [j9]Wuyungerile Li, Na Zong, Kaifeng Liu, Pengyu Li, Xuebin Ma:
A privacy-preserving group decision making expert system for medical diagnosis based on dynamic knowledge base. Wirel. Networks 30(7): 6237-6247 (2024) - [c29]Tao Yang, Xuebin Ma:
AdaDP-CFL: Cluster Federated Learning with Adaptive Clipping Threshold Differential Privacy. IWQoS 2024: 1-10 - 2023
- [j8]Maobo Zheng, Xiaojian Zhang, Xuebin Ma:
Unsupervised Domain Adaptation with Differentially Private Gradient Projection. Int. J. Intell. Syst. 2023: 1-16 (2023) - [j7]Maochan Zhen, Mingjian Yi, Tao Luo, Feifei Wang, Kaixuan Yang, Xuebin Ma, Shengcheng Cui, Xuebin Li:
Application of a Fusion Model Based on Machine Learning in Visibility Prediction. Remote. Sens. 15(5): 1450 (2023) - [j6]Hanjiu Zhang, Liming Zhu, Gang Sun, Kun Zhang, Ying Liu, Xuebin Ma, Haojia Zhang, Qing Liu, Shengcheng Cui, Tao Luo, Xuebin Li, Ningquan Weng:
A Multi-Model Ensemble Pattern Method to Estimate the Refractive Index Structure Parameter Profile and Integrated Astronomical Parameters in the Atmosphere. Remote. Sens. 15(6): 1584 (2023) - [c28]Xuebin Ma, Nan Xiang, Yulan Gao:
RL-KDA: A K-degree Anonymity Algorithm Based on Reinforcement Learning. COMPSAC 2023: 729-734 - [c27]Xuebin Ma, Xuejian Qi, Yulei Meng, Tao Yang:
Improved Bayesian network differential privacy data-releasing method based on junction tree. COMPSAC 2023: 759-764 - [c26]Xuebin Ma, Shengyi Guan, Yanan Lang:
Differential Privacy Frequent Closed Itemset Mining over Data Stream. TrustCom 2023: 865-872 - 2022
- [j5]Nana Liu, Shengcheng Cui, Tao Luo, Shunping Chen, Kaixuan Yang, Xuebin Ma, Gang Sun, Xuebin Li:
Characteristics of Aerosol Extinction Hygroscopic Growth in the Typical Coastal City of Qingdao, China. Remote. Sens. 14(24): 6288 (2022) - [c25]Nan Xiang, Xuebin Ma:
TKDA: An Improved Method for K-degree Anonymity in Social Graphs. ISCC 2022: 1-6 - [c24]Xuebin Ma, Ren Yang, Maobo Zheng:
RDP-WGAN: Image Data Privacy Protection Based on Rényi Differential Privacy. MSN 2022: 320-324 - [c23]Xuebin Ma, Ganghong Liu, Aixin Lin:
Publishing Weighted Graph with Node Differential Privacy. MSN 2022: 803-808 - [c22]Aixin Lin, Xuebin Ma:
PU_Bpub: High-Dimensional Data Release Mechanism Based on Spectral Clustering with Local Differential Privacy. WASA (2) 2022: 572-581 - 2021
- [c21]Jiangna Xing, Xuebin Ma:
DP-gSpan: A Pattern Growth-based Differentially Private Frequent Subgraph Mining Algorithm. TrustCom 2021: 397-404 - [c20]Xuebin Ma, Haijiang Liu, Shengyi Guan:
Improving the Effect of Frequent Itemset Mining with Hadamard Response under Local Differential Privacy. TrustCom 2021: 436-443 - 2020
- [j4]Ganghong Liu, Xuebin Ma, Wuyungerile Li:
Publishing Node Strength Distribution With Node Differential Privacy. IEEE Access 8: 217642-217650 (2020) - [c19]Xuebin Ma, Jingyu Yang, Shengyi Guan:
Differentially Private Social Graph Publishing for Community Detection. SecureComm (2) 2020: 208-214 - [c18]Ren Yang, Xuebin Ma, Xiangyu Bai, Xiangdong Su:
Differential Privacy Images Protection Based on Generative Adversarial Network. TrustCom 2020: 1688-1695 - [c17]Shengyi Guan, Xuebin Ma, Wuyungerile Li, Xiangyu Bai:
DP-Eclat: A Vertical Frequent Itemset Mining Algorithm Based on Differential Privacy. TrustCom 2020: 1696-1703 - [c16]Xuejian Qi, Xuebin Ma, Xiangyu Bai, Wuyungerile Li:
Differential privacy preserving data publishing based on Bayesian network. TrustCom 2020: 1718-1726
2010 – 2019
- 2019
- [j3]Xuebin Ma, Po Yang, Shengyi Guan:
Overlapping Community Detection Algorithm Based on Edge Strength. IEEE Access 7: 126642-126650 (2019) - [j2]Xuebin Ma, Xiaojuan Zhang, Ren Yang:
Reliable Energy-Aware Routing Protocol in Delay-Tolerant Mobile Sensor Networks. Wirel. Commun. Mob. Comput. 2019: 5746374:1-5746374:11 (2019) - [c15]Ruichao Gao, Xuebin Ma:
Dynamic Data Publishing with Differential Privacy via Reinforcement Learning. COMPSAC (1) 2019: 746-752 - [c14]Xuebin Ma, Chengrui Zhang:
A Gigabit Real-time Ethernet for Manufacture Automation Control. ICSAI 2019: 1040-1045 - 2018
- [c13]Ruichao Gao, Xuebin Ma:
Dynamic Data Histogram Publishing Based on Differential Privacy. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 737-743 - [c12]Mingzhu Li, Xuebin Ma:
Bayesian Networks-Based Data Publishing Method Using Smooth Sensitivity. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 795-800 - 2017
- [c11]Po Yang, Xuebin Ma:
Selection Strategy of Nodes with the Greatest Influence on Community Structure. CyberC 2017: 199-205 - 2016
- [j1]Xuebin Ma, Aili Li, Xiaojuan Zhang, Leilei Jia, Jing Xiao:
稀疏机会网络中基于固定中继节点与消息相关性的缓存管理策略 (Buffer Management Based on Stationary Relay Nodes and Message Correlation in Sparse Opportunistic Networks). 计算机科学 43(Z11): 296-300 (2016) - 2015
- [c10]Yu Lei, Jiantao Zhou, Yongqiang Gao, Liu Jing, Xuebin Ma:
Dynamic Web Service Composition Based on State Space Searching. ICPADS 2015: 821-826 - 2014
- [c9]Xuebin Ma, Zhenchao Ouyang, Jing Bai, Xin Zhan:
Time Routing: A Community Based Routing Protocol for Opportunistic Networks. CIT 2014: 20-25 - [c8]Xuebin Ma, Zhenchao Ouyang, Lin Bai, Xin Zhan, Xiangyu Bai:
An overlapping community detection algorithm for opportunistic networks. ComComAP 2014: 110-115 - [c7]Lin Bai, Xuebin Ma, Zhenchao Ouyang, Xin Zhan:
Heterogeneous probabilistic model based spray routing protocol for delay tolerant networks. ICUFN 2014: 340-345 - [c6]Xuebin Ma, Zhenchao Ouyang, Liting Wang, Jing Bai:
A social aggregation based combination movement model for opportunistic networks. ICUFN 2014: 565-570 - 2010
- [c5]Xuebin Ma, Ruiyuan Xu, Nobuaki Minematsu, Yu Qiao, Keikichi Hirose, Aijun Li:
Dialect-based speaker classification using speaker-invariant dialect features. ISCSLP 2010: 171-176
2000 – 2009
- 2009
- [c4]Xuebin Ma, Akira Nemoto, Nobuaki Minematsu, Yu Qiao, Keikichi Hirose:
Structural analysis of dialects, sub-dialects and sub-sub-dialects of Chinese. INTERSPEECH 2009: 2219-2222 - 2008
- [c3]Tao Wen, Gang Wang, Quan Guo, Xuebin Ma:
An Optimal Association Rule Mining Algorithm Based on Knowledge Grid. FSKD (2) 2008: 572-575 - 2007
- [c2]Xuebin Ma, Tao Wen, Quan Guo, Gang Wang:
An Enhanced Dynamic and Distributed Domain-Based Handoff Scheme for Mobile IPv6. CIT 2007: 375-380 - 2006
- [c1]Gang Wang, Tao Wen, Quan Guo, Xuebin Ma:
A Knowledge Grid Architecture Based on Mobile Agent. SKG 2006: 48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint