Items where Author is "Ma, X"

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 63.

GILLANI, F., ALI CHATHA, K., SADIQ JAJJA, S., CAO, D. and MA, X., 2024. Unpacking digital transformation: identifying key enablers, transition stages and digital archetypes. Technological Forecasting and Social Change, 203: 123335. ISSN 0040-1625

CAO, D., MEADOW, M. and MA, X., 2023. Thinking fast and slow: a revised SOR model for an empirical examination of impulse buying at a luxury fashion outlet. European Journal of Marketing. ISSN 0309-0566

MIAO, Y., HUANG, N., MA, X., ZHANG, Q. and HAN, J., 2023. On exploring pose estimation as an auxiliary learning task for visible–infrared person re-identification. Neurocomputing, 556: 126652. ISSN 0925-2312

GILLANI, F., CAO, D. and MA, X., 2023. Making beef farming supply chains sustainable: unearthing the role of cognitive digital twins. In: Proceedings of BAM2023 Conference. British Academy of Management.

YUAN, H., BOAKES, M., MA, X., CAO, D. and LI, S., 2023. Visualising personal data flows: insights from a case study of Booking.com. In: C. CABANILLAS and F. PÉREZ, eds., Intelligent information systems: CAiSE forum 2023, Zaragoza, Spain, June 12–16, 2023, proceedings. Cham: Springer, pp. 52-60. ISBN 9783031346736

RAJA, T.V., EZZIANE, Z., HE, J., MA, X. and KAZAURE, A.W.-Z., 2023. Detection of DDoS attack on smart home infrastructure using artificial intelligence models. In: 2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE. ISBN 9798350331554

WALI, A., APEJOYE, O., RAJA, T., HE, J. and MA, X., 2023. A novel approach to identifying DDoS traffic in the smart home network via exploratory data analysis. In: Applied Intelligence and Informatics: Second International Conference, AII 2022, Reggio Calabria, Italy, September 1–3, 2022, proceedings. Cham: Springer, pp. 478-498. ISBN 9783031248009

ZHAO, R., BAL, J. and MA, X., 2021. Creating lean and agile supply chains with blockchain. In: 2021 The 3rd International Conference on Blockchain Technology (ICBCT 2021). Proceedings. New York: ACM, pp. 135-146. ISBN 9781450389624

WIERINGA, J., KANNAN, P.K., MA, X., REUTTERER, T., RISSELADA, H. and SKIERA, B., 2021. Data analytics in a privacy-concerned world. Journal of Business Research, 122, pp. 915-925. ISSN 0148-2963

MIAO, Y., LIN, Z., MA, X., DING, G. and HAN, J., 2021. Learning transformation-invariant local descriptors with low-coupling binary codes. IEEE Transactions on Image Processing, 30, pp. 7554-7566. ISSN 1057-7149

WALI, A., APEJOYE, O., HE, J. and MA, X., 2021. An exploratory data analysis of the network behavior of hive home devices. In: J.M. LAURET, M. ABDEL-MAGUID, Y. JARARWEH and E. BENKHELIFA, eds., 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS). Piscataway: Institute of Electrical and Electronics Engineers. ISBN 9781665458689

LI, Z., REN, T., MA, X., LIU, S., ZHANG, Y. and ZHOU, T., 2019. Identifying influential spreaders by gravity model. Scientific Reports, 9: 8387. ISSN 2045-2322

BAI, J., JIANG, H., LI, S. and MA, X., 2019. NHL pathological image classification based on hierarchical local information and GoogLeNet-based representations. BioMed Research International, 2019: 1065652. ISSN 2314-6133

GUO, Y., LIN, S., MA, X., BAL, J. and LI, C.-T., 2019. Homogeneous feature transfer and heterogeneous location fine-tuning for cross-city property appraisal framework. In: R. ISLAM, Y. SING KOH, Y. ZHAO, G. WARWICK, D. STIRLING, C.-T. LI and Z. ISLAM, eds., Data mining: 16th Australasian Conference, AusDM 2018, Bahrurst, NSW, Australia, November 28–30, 2018, revised selected papers. Singapore: Springer, pp. 161-174. ISBN 9789811366604

JIANG, H., GAO, F., DUAN, X., BAI, Z., WANG, Z., MA, X. and CHEN, Y.-W., 2019. Transfer learning and fusion model for classification of epileptic PET images. In: Y.-W. CHEN, A. ZIMMERMANN, R.J. HOWLETT and L.C. JAIN, eds., Innovation in medicine and healthcare systems, and multimedia. Proceedings of KES-InMed-19 and KES-IIMSS-19 conferences. Smart innovation, systems and technologies (SIST) (145). Springer, Singapore, pp. 71-79. ISBN 9789811385650

SALIH, A., MA, X. and PEYTCHEV, E., 2017. Implementation of hybrid artificial intelligence technique to detect covert channels in new generation network protocol IPv6. In: R. BENLAMRI and M. SPARER, eds., Leadership, innovation and entrepreneurship as driving forces of the global economy: proceedings of the 2016 International Conference on Leadership, Innovation and Entrepreneurship (ICLIE). Springer proceedings in business and economics . Cham: Springer, pp. 173-190. ISBN 9783319434339

SALIH, A., MA, X. and PEYTCHEV, E., 2015. New intelligent heuristic algorithm to mitigate security vulnerabilities in IPv6. IJIS International Journal of Information Security, 4. ISSN 2382-2619

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2015. Analysis of security protocols using finite-state machines. International Journal of Advanced Research in Artificial Intelligence (IJARAI), 4 (4), pp. 46-53. ISSN 2165-4069

JIANG, H., ZHAO, D., ZHENG, R. and MA, X., 2015. Construction of pancreatic cancer classifier based on SVM optimized by improved FOA. BioMed Research International, 2015, p. 781023. ISSN 2314-6133

SALIH, A., MA, X. and PEYTCHEV, E., 2015. Detection and classification of covert channels in IPv6 using enhanced machine learning. In: 2015 International Conference on Computer Technology and Information Systems (ICCTIS’ 2015), Dubai, United Arab Emirates, 13-15 August 2015.

MA, X., 2015. Managing identities in cloud computing environments. In: The Second International Conference on Information Science and Control Engineering, Shanghai, China, April 2015.

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2015. A new biometric ID-based cryptography protocol and security analysis using Petri nets. In: 6th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016), Singapore, 27-28 July 2015.

MA, X., BAL, J. and ISSA, A., 2014. A fast and economic ontology engineering approach towards improving capability matching: application to an online engineering collaborative platform. Computers in Industry, 65 (9), pp. 1264-1275. ISSN 0166-3615

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2014. Biometric identity-based cryptography for e-Government environment. In: 2014 Science and Information Conference (SAI), London, 27-29 August 2014, London.

ALJEAID, D., MA, X. and LANGENSIEPEN, C., 2014. Modelling and simulation of a biometric identity-based cryptography. International Journal of Advanced Research in Artificial Intelligence (IJARAI), pp. 35-44.

BAL, J., ISSA, A. and MA, X., 2014. Orchestrating new markets using cloud services. In: L.M. CAMARINHA-MATOS and H. AFSARMANESH, eds., Collaborative systems for smart networked environments: 15th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2014, Amsterdam, The Netherlands, October 6-8, 2014. Proceedings. Springer International Publishing, pp. 161-168. ISBN 9783662526057

MA, X., NG, I. and POGREBNA, G., 2014. Smart home, smart things and smart me in the smart city: the hub-of-all-things resource integration and enabling tool (HARRIET). In: IET Conference on Future Intelligent Cities. Stevenage: Institution of Engineering and Technology. ISBN 9781849199810

ALABDULATIF, A., MA, X. and NOLLE, L., 2013. Analysing and attacking the 4-way handshake of IEEE 802.11i standard. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST), London, 9 December 2013. IEEE, pp. 382-387. ISBN 9781908320209

ALABDULATIF, A. and MA, X., 2013. Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard. International Journal for Information Security Research (IJISR), 3 (34), pp. 439-448. ISSN 2042-4639

ALABDULATIF, A., MA, X. and NOLLE, L., 2013. A framework for proving the correctness of cryptographic protocol properties by linear temporal logic. International Journal of Digital Society (IJDS), 4 (2), pp. 789-797. ISSN 2040-2570

MA, X., 2012. Security concerns in cloud computing. In: The Fourth International Conference on Computational and Information Sciences, Chongqing, China, August 2012, Chongqing, China.

ALABDULATIF, A., MA, X. and NOLLE, L., 2012. A framework for cryptographic protocol analysis using linear temporal logic. In: International Conference on Information Society (i-Society 2012), London, June 2012, London.

WANG, X., HE, F., MA, X., MAO, C., HODGMAN, C., LU, C. and WU, P., 2011. OsCAND1 is required for crown root emergence in rice. Molecular Plant, 4 (2), pp. 289-299. ISSN 1674-2052

MA, X., 2011. Database deductive access control. Journal of Computers, 6 (5), pp. 1024-1031. ISSN 1796-203X

MA, X., 2010. Database deductive access control. In: R. QUI and H. ZHAO, eds., Proceedings of 2010 WASE International Conference on Information Engineering. IEEE, pp. 121-124. ISBN 9780769540801

MA, X., 2010. Resisting tracker attacks by query terms analysis. Key Engineering Materials, 450 (1), pp. 385-388. ISSN 1013-9826

RUSSELL, D., POWER, D., SLAYMAKER, M., MOSTEFAOUI, G.K., MA, X. and SIMPSON, A., 2009. On the secure sharing of legacy data. In: 6th International Conference onInformation Technology: New Generations (ITNG 2009), Las Vegas, Nevada, 27-29 April 2009, Las Vegas.

XIA, S., MA, X., YU, L. and PAN, G., 2008. DFT study on chemical adsorption of Zn(II) on γ-MnOOH surfaces. Chemical Journal of Chinese Universities, 29 (9), pp. 1804-1809. ISSN 1005-9040

MA, X., CHENG, X., HUANG, S. and CHENG, M., 2008. Mechanical verification of cryptographic protocols. In: S. HUANG, D. MACCALLUM and D.Z. DU, eds., Network security. Springer.

MA, X. and CHENG, X., 2008. Verifying security protocols by knowledge analysis. International Journal of Security and Networks, 3 (3), pp. 183-192.

SIMPSON, A., POWER, D., RUSSELL, D., MOSTEFAOUI, G.K., SLAYMAKER, M., MA, X. and WILSON, G., 2008. The development, testing, and deployment of a web services infrastructure for distributed healthcare delivery and research. In: K.M.D. KHAN and K. KHAN, eds., Managing web services quality: measuring outcomes and effectiveness. Idea Group.

SIMPSON, A., POWER, D., RUSSELL, D., SLAYMAKER, M., MOSTEFAOUI, G., MA, X. and WILSON, G., 2008. A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries. Studies in Health Technology and Informatics, 138, pp. 3-12. ISSN 0926-9630

SIMPSON, A., POWER, D., RUSSELL, D., SLAYMAKER, M., MOSTEFAOUI, G.K., MA, X. and WILSON, G., 2008. A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries. In: Proceedings of HealthGrid 2008, Chicago.

MA, X. and CHENG, X., 2006. Syntax, semantics and type theory of a security protocol verification framework. In: IEEE SMC UK-RI Conference on Advances in Cybernetic Systems 2006, Sheffield, September 2006, Sheffield.

MA, X., MCCRINDLE, R. and CHENG, X., 2006. Verifying and fixing password authenticationprotocol. In: Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Network, and Parallel/Distributed Computing (SNPD 2006) and the 2nd ACIS International Workshop on Self-Assembling Wireless Networks (SAWN 2006), Las Vegas.

MA, X. and CHENG, X., 2005. Formal verification of merchant registration phase of SET protocol. In: Proceedings of the 11th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2005), Sheffield.

MA, X. and CHENG, X., 2005. Formal verification of merchant registration phase of SETProtocol. International Journal of Automation and Computing, 2005 (2), pp. 155-162.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Knowledge based approach for mechanical lyverifying security protocols. In: The Nineteenth International Joint Conference on Artificial Intelligence (IJCAI 2005), Edinburgh, Scotland, 30 July - 5 August 2005, Edinburgh.

CHENG, X., MA, X., CHENG, M. and HUANG, S.C.H., 2005. Proving secure properties of cryptographic protocols. In: 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), Phoenix, Arizona, 7-9 April 2005, Phoenix, Arizona.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Secrecy proofs of SET purchase request phase. In: Proceedings of the 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China.

MA, X., CHENG, X. and MCCRINDLE, R., 2005. Verifying cardholder registration phase in SET protocol. In: Proceedings of the 2005 IEEE SMC UK-RI Conference on Applied Cybernetics (AC2005), London.

MA, X. and CHENG, X., 2005. Verifying cryptographic protocols. IEEE Journal of Intelligent Cybernetic Systems, 2005 (1).

CHENG, X., HE, X., MA, X., ZHOU, D., DUAN, P. and ZHONG, S., 2005. An agent based education resource purvey system. In: The 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, 15-19 December 2005, Xi'an, China.

CHENG, X., HE, X., MA, X., ZHOU, D., DUAN, P. and ZHONG, S., 2005. An agent based education resource purvey system. Lecture Notes in Computer Science, 3801, pp. 381-386. ISSN 0302-9743

CHENG, X., MA, X., WANG, L. and ZHONG, S., 2005. A mobile agent based spam filter system. In: The 2005 International Conference on Computational Intelligence and Security (CIS'05), Xi'an, China, 15-19 December 2005, Xi'an, China.

CHENG, X., MA, X., WANG, L. and ZHONG, S., 2005. A mobile agent based spam filter system. Lecture Notes in Computer Science, 3801, pp. 422-427. ISSN 0302-9743

HE, R., ZHONG, S., CHENG, X. and MA, X., 2005. A personalised search engine for Chinese educational resources. In: Proceedings of the 2005 IEEE SMC UK-RI Conference on Applied Cybernetics (AC2005), London.

MA, X., 2004. Free software and open source movement. Kunming: Yunnan University Press.

SUN, P., MA, X., CHENG, X., YU, X. and ZHONG, S., 2004. Knowledge management for e-learning system. In: Proceedings of the 10th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2004), Liverpool.

MA, X. and CHENG, X., 2004. Verifying cryptographic protocols. In: Proceedings of the IEEESMC UK-RI 3rd Conference on Intelligent Cybernetic Systems (ICS'04), Londonderry.

MA, X., YE, Y. and SUN, Y., 2004. An implementation of resource reservation schemein real-time operating system. Journal of the Graduate School of the Chinese Academy of Sciences, 21 (1), pp. 113-118.

HE, X., MA, X., CHENG, X., YU, X. and ZHONG, S., 2004. A mobile agent based intrusion detection system. In: Proceedings of the 10th Annual Conference of Chinese Automation and Computing Society in UK (CACSUK 2004), Liverpool.

MA, X. and SUN, Y., 2002. Two effective real-time synchronization protocols in reservation-based real-time systems. In: Proceedings of the 8th Joint International Computer Conference, Ningbo, China.

This list was generated on Thu Mar 28 19:03:31 2024 UTC.