default search action
Xiaoxiao Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Xiaoxiao Ma 0001 — University of Massachusetts Lowell, Department of Computer Science, Lowell, MA, USA
- Xiaoxiao Ma 0002 — Macquarie University, School of Computing, Sydney, Australia (and 1 more)
- Xiaoxiao Ma 0003 — Xidian University, School of Artificial Intelligence, Xi'an, China
- Xiaoxiao Ma 0004 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
- Xiaoxiao Ma 0005 — Chinese Academy of Sciences, Institute of Software, Beijing, China
- Xiaoxiao Ma 0006 — University of Science and Technology of China, Hefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Xiaoxiao Ma, Yingqing Xiao:
Computing eigenvalues of quasi-rational Said-Ball-Vandermonde matrices. Adv. Comput. Math. 50(5): 93 (2024) - 2023
- [j22]Fengcheng Guo, Chuang Sun, Ning Sun, Xiaoxiao Ma, Wensong Liu:
Integrated Quantitative Evaluation Method of SAR Filters. Remote. Sens. 15(5): 1409 (2023) - [j21]Peng Zhao, Simin Cheng, Yongxiang Feng, Fei Liang, Xinrong Zhang, Xiaoxiao Ma, Wenhui Wang:
Automated and Miniaturized Pico-Liter Metabolite Extraction System for Single-Cell Mass Spectrometry. IEEE Trans. Biomed. Eng. 70(2): 470-478 (2023) - [i3]Xiaoxiao Ma, Chunzhi Yi, Zhicai Zhong, Hui Zhou, Baichun Wei, Haiqi Zhu, Feng Jiang:
BDEC: Brain Deep Embedded Clustering model. CoRR abs/2309.09984 (2023) - 2022
- [j20]Zhao Yang, Xiao-Xiao Ma:
Computing eigenvalues of quasi-rational Bernstein-Vandermonde matrices to high relative accuracy. Numer. Linear Algebra Appl. 29(3) (2022) - 2021
- [c10]Xiaoxiao Ma, Zhixing Xu, Ningyun Lu, Zujin Wang, Bin Jiang:
Performance Degradation Analysis of Railway Vehicle Door System Based on Density Peak Clustering. CAA SAFEPROCESS 2021: 1-6 - [c9]Xinyu Tan, Yiyang Bian, Xiaoxiao Ma:
Do I Need A Tune-up? An Experimental Study of App Usage on Driving Performance Improvement. PACIS 2021: 110 - 2020
- [j19]Bo Cheng, Shiai Cui, Xiaoxiao Ma, Chenbin Liang:
Research on an Urban Building Area Extraction Method with High-Resolution PolSAR Imaging Based on Adaptive Neighborhood Selection Neighborhoods for Preserving Embedding. ISPRS Int. J. Geo Inf. 9(2): 109 (2020) - [j18]Meng-Meng Zheng, Zheng-Hai Huang, Xiao-Xiao Ma:
Nonemptiness and Compactness of Solution Sets to Generalized Polynomial Complementarity Problems. J. Optim. Theory Appl. 185(1): 80-98 (2020) - [j17]Xiao-Xiao Ma, Meng-Meng Zheng, Zheng-Hai Huang:
A Note on the Nonemptiness and Compactness of Solution Sets of Weakly Homogeneous Variational Inequalities. SIAM J. Optim. 30(1): 132-148 (2020) - [c8]Xiaoxiao Ma, Hongli Li, Song Ye, Qian Zhao, Wuliang Yin:
Eddy Current Phase Gradient and Its Identification of Conductive Material Defects. I2MTC 2020: 1-6 - [c7]Perttu Hämäläinen, Amin Babadi, Xiaoxiao Ma, Jaakko Lehtinen:
PPO-CMA: Proximal Policy Optimization with Covariance Matrix Adaptation. MLSP 2020: 1-6
2010 – 2019
- 2018
- [c6]Yuan Jia, Xiaoxiao Ma:
Stress Distribution of Given Information in Chinese Reading Texts. INTERSPEECH 2018: 2171-2175 - [c5]Bo Cheng, Xiaoxiao Ma, Chenbin Liang:
SAR Target Recognition Based on Joint Sparse Representation of Complementary Features. SSIP 2018: 29-34 - [i2]Perttu Hämäläinen, Amin Babadi, Xiaoxiao Ma, Jaakko Lehtinen:
PPO-CMA: Proximal Policy Optimization with Covariance Matrix Adaptation. CoRR abs/1810.02541 (2018) - 2017
- [j16]Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Guang Zeng, Wenbao Han:
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud. Int. J. Found. Comput. Sci. 28(6): 705-724 (2017) - [j15]Xiaoxiao Ma, Gang Yu:
可公开定责的密文策略属性基加密方案 (Publicly Accountable Ciphertext-policy Attribute-based Encryption Scheme). 计算机科学 44(5): 160-165 (2017) - [c4]Perttu Hämäläinen, Xiaoxiao Ma, Jari Takatalo, Julian Togelius:
Predictive Physics Simulation in Game Mechanics. CHI PLAY 2017: 497-505 - [c3]Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Junjie Zeng:
Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse. CSS 2017: 337-351 - [c2]Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng:
Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. ICICS 2017: 172-179 - 2016
- [j14]Xiaoxiao Ma, Zhibin Pan, Sen Hu, Lingfei Wang:
Large capacity and high quality reversible data hiding method based on enhanced side match vector quantization. Multim. Tools Appl. 75(1): 71-91 (2016) - [j13]Zhibin Pan, Sen Hu, Xiaoxiao Ma, Lingfei Wang:
A novel reversible data hiding using border point and localization. Multim. Tools Appl. 75(2): 1285-1299 (2016) - [j12]Zhibin Pan, Lingfei Wang, Sen Hu, Xiaoxiao Ma:
Reversible data hiding in encrypted image using new embedding pattern and multiple judgments. Multim. Tools Appl. 75(14): 8595-8607 (2016) - 2015
- [j11]Zhibin Pan, Xiaoxiao Ma, Xiaoman Deng:
New reversible full-embeddable information hiding method for vector quantisation indices based on locally adaptive complete coding list. IET Image Process. 9(1): 22-30 (2015) - [j10]Xiaoxiao Ma, Zhibin Pan, Sen Hu, Lingfei Wang:
Enhanced side match vector quantisation based on constructing complementary state codebook. IET Image Process. 9(4): 290-299 (2015) - [j9]Xiaoxiao Ma, Zhibin Pan, Yang Li, Jie Fang:
High-quality initial codebook design method of vector quantisation using grouping strategy. IET Image Process. 9(11): 986-992 (2015) - [j8]Zhibin Pan, Sen Hu, Xiaoxiao Ma, Lingfei Wang:
A new lossless data hiding method based on joint neighboring coding. J. Vis. Commun. Image Represent. 26: 14-23 (2015) - [j7]Xiaoxiao Ma, Zhibin Pan, Sen Hu, Lingfei Wang:
Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy. J. Vis. Commun. Image Represent. 28: 60-70 (2015) - [j6]Xiaoxiao Ma, Zhibin Pan, Sen Hu, Lingfei Wang:
High-fidelity reversible data hiding scheme based on multi-predictor sorting and selecting mechanism. J. Vis. Commun. Image Represent. 28: 71-82 (2015) - [j5]Xiaoxiao Ma, Zhibin Pan, Sen Hu, Lingfei Wang:
New high-performance reversible data hiding method for VQ indices based on improved locally adaptive coding scheme. J. Vis. Commun. Image Represent. 30: 191-200 (2015) - [j4]Zhibin Pan, Sen Hu, Xiaoxiao Ma, Lingfei Wang:
Reversible data hiding based on local histogram shifting with multilayer embedding. J. Vis. Commun. Image Represent. 31: 64-74 (2015) - 2014
- [j3]Lingfei Wang, Zhibin Pan, Xiaoxiao Ma, Sen Hu:
A novel high-performance reversible data hiding scheme using SMVQ and improved locally adaptive coding method. J. Vis. Commun. Image Represent. 25(2): 454-465 (2014) - 2013
- [j2]Zhibin Pan, Xiaoxiao Ma, Xiaoman Deng, Sen Hu:
Low bit-rate information hiding method based on search-order-coding technique. J. Syst. Softw. 86(11): 2863-2869 (2013) - 2011
- [c1]Min Peng, Xiaoxiao Ma, Ye Tian, Ming Yang, Hua Long, Quanchen Lin, Xiaojun Xia:
The Web Information Extraction for Update Summarization Based on Shallow Parsing. 3PGCIC 2011: 109-114 - 2010
- [j1]Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han:
Provable secure identity based generalized signcryption scheme. Theor. Comput. Sci. 411(40-42): 3614-3624 (2010) - [i1]Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han:
Provable Secure Identity Based Generalized Signcryption Scheme. CoRR abs/1004.1304 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint