Name
Affiliation
Papers
JUN MA
School of Computer Science and Technology, Shandong University, 250101, Jinan, China
56
Collaborators
Citations 
PageRank 
136
47
19.80
Referers 
Referees 
References 
191
959
335
Search Limit
100959
Title
Citations
PageRank
Year
A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX10.352022
Loss odyssey in medical image segmentation60.482021
Robust Supervised And Semi-Supervised Twin Extreme Learning Machines For Pattern Classification00.342021
Adaptive robust learning framework for twin support vector machine classification10.352021
A novel twin minimax probability machine for classification and regression00.342020
Capped L1-norm Distance Metric-Based Fast Robust Twin Bounded Support Vector Machine00.342020
Twin minimax probability extreme learning machine for pattern recognition.00.342020
Projection multi-birth support vector machinea for multi-classification00.342020
Supervised and semi-supervised twin parametric-margin regularized extreme learning machine00.342020
Cappedl(1)-Norm Distance Metric-Based Fast Robust Twin Extreme Learning Machine00.342020
Particle Filtering for Localization of Broadband Sound Source Using an Ocean-Bottom Seismometer Sensor.00.342019
Multilevel Thresholding Segmentation for Color Image Using Modified Moth-Flame Optimization.20.362019
Adaptive Safe Semi-Supervised Extreme Machine Learning.00.342019
System Dynamics Simulation-Based Model For Coordination Of A Three-Level Spare Parts Supply Chain10.352019
Modified Grasshopper Algorithm-Based Multilevel Thresholding for Color Image Segmentation.30.372019
A Chaotic Electromagnetic Field Optimization Algorithm Based on Fuzzy Entropy for Multilevel Thresholding Color Image Segmentation10.342019
Automatic dental root CBCT image segmentation based on CNN and level set method.00.342019
Lagrangian supervised and semi-supervised extreme learning machine00.342019
A robust method to discover influential users in social networks.00.342019
Alexithymia and mobile phone addiction in Chinese undergraduate students: The roles of mobile phone use patterns00.342019
Collaborative Filtering Based Recommendation Algorithm For Recommending Active Molecules For Protein Targets00.342018
Hydrological Analysis Using Satellite Remote Sensing Big Data and CREST Model.10.402018
A robust demodulation method based on signal intensity in wireless laser communications00.342018
Gene set analysis methods: a systematic comparison.00.342018
Using Hybrid Similarity-Based Collaborative Filtering Method For Compound Activity Prediction00.342018
Statistical and Hydrological Evaluations of Multi-Satellite Precipitation Products over Fujiang River Basin in Humid Southeast China.00.342018
Extended Common Information Model For Distribution Network Production Repair Platform00.342018
Multi-hop underwater acoustic networks based on BATS codes.00.342018
Mapping Forest and Their Spatial-Temporal Changes From 2007 to 2015 in Tropical Hainan Island by Integrating ALOS/ALOS-2 L-Band SAR and Landsat Optical Images.10.372018
Using the Encoder Embedded Framework of Dimensionality Reduction Based on Multiple Drugs Properties for Drug Recommendation.00.342018
Projections onto Convex Sets Super-Resolution Reconstruction Based on Point Spread Function Estimation of Low-Resolution Remote Sensing Images.40.412017
Finger Printing On The Web00.342017
Constructing Negative Links from Multi-facet of Social Media.00.342017
LWTP - An Improved Automatic Image Annotation Method Based on Image Segmentation.00.342017
Finite Element Thermal Model and Simulation for a Cylindrical Li-Ion Battery.10.382017
Research On Highway Passenger Segmentation Based On Canopy-Kmeans Clustering Algorithm Under Parallel Computing Framework00.342017
State-of-Health Estimation for Lithium-Ion Batteries Based on the Multi-Island Genetic Algorithm and the Gaussian Process Regression.00.342017
An Insider Threat Detection Method Based on Business Process Mining00.342017
M-SBIR: An Improved Sketch-Based Image Retrieval Method Using Visual Word Mapping.30.392017
Business Process Mining based Insider Threat Detection System.00.342016
A Context-Aware Method for Top-k Recommendation in Smart TV.00.342016
An Optimized DHT for Linux Package Distribution00.342016
Security Issues Of Wireless Sensor Networks Based On Target Tracking00.342016
Multimodal-Based Supervised Learning For Image Search Reranking00.342015
Dtmf: A User Adaptive Model For Hybrid Recommendation00.342015
Mining and ranking users’ intents behind queries30.422015
Combining Positive And Negative Feedbacks With Factored Similarity Matrix For Recommender Systems00.342015
An ensemble method for unbalanced sentiment classification40.382015
Social Trust Aware Item Recommendation for Implicit Feedback.100.492015
Efficient Influence Maximization Based On Three Degrees Of Influence Theory00.342015
  • 1
  • 2