


default search action
Yan Ma 0003
Person information
- affiliation: Macao Polytechnic University, Faculty of Applied Sciences, China
- affiliation: Beijing University of Posts and Telecommunications (BUPT), Institute of Network Technology, China
Other persons with the same name
- Yan Ma — disambiguation page
- Yan Ma 0001
— Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, China - Yan Ma 0002
— Northwestern Polytechnical University, School of Software, Xian, Shaanxi, China (and 2 more) - Yan Ma 0004
— Jilin University, Department of Control Science and Engineering, National Key Laboratory of Automotive Chassis Integration and Bionics, Changchun, China - Yan Ma 0005
— Shanghai Normal University, College of Information, Mechanical and Electrical Engineering, China - Yan Ma 0006
— Kean University, NJ, USA (and 1 more) - Yan Ma 0007
— Beihang University, School of Instrumentation and Optoelectronic Engineering, Beijing, China - Yan Ma 0008
— Beijing Union University, College of Robotics, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j22]Yide Yu
, Huijie Li
, Dennis Wong
, Anmin Hu
, Jian Huo
, Yan Ma
, Yue Liu
:
POMA-C: A Framework for Solving the Problem of Precise Anesthesia Control Under Incomplete Observation Environment in Low-Income Areas. IEEE Access 13: 4098-4116 (2025)
[j21]Qingle Wu
, Yuanhui Liang
, Benjamin K. Ng
, Chan-Tong Lam
, Yan Ma
:
Low-Complexity Data-Driven Communication Neural Receivers. IEEE Access 13: 9325-9334 (2025)
[j20]Pei Zhang
, Yunzhe Wang, Hanyan Yin
, Botong Wu
, Qi Wang, Xiaohong Huang
, Yan Ma
, Jilong Wang
, Congcong Miao
:
Predictive Configuration on DHCP in WLANs. IEEE Trans. Netw. 33(6): 3286-3301 (2025)
[c30]Wenhao Liu, Zhenyi Lu, Xinyu Hu, Jerry Zhang, Dailin Li, Jiacheng Cen, Huilin Cao, Haiteng Wang, Yuhan Li, Kun Xie, Dandan Li, Pei Zhang, Chengbo Zhang, Yuxiang Ren, Xiaohong Huang, Yan Ma:
STORM-BORN: A Challenging Mathematical Derivations Dataset Curated via a Human-in-the-Loop Multi-Agent Framework. ACL (Findings) 2025: 23938-23958
[c29]Zhiyu Wen, Pei Zhang, Yanxu Fu, Xiaohong Huang, Yan Ma, Qian Zhang, Han Zhang, Ming Zhao:
Log-Based Anomaly Detection with Multi-level Progressive Temporal-Semantic Fusion. ICCCN 2025: 1-6
[c28]Zhiyu Wen, Pei Zhang, Ming Zhang, Xiaohong Huang, Dandan Li, Kun Xie, Yan Ma:
Domain Generalization with CLIP-Based Multi-modal Calibration Distillation. ICONIP (4) 2025: 384-395
[c27]Yanxu Fu
, Pei Zhang
, Han Zhang
, Xiaohong Huang
, Yan Ma
, Kun Xie
, Dandan Li
:
BGPFlow: Flow-based Feature Extraction for BGP Anomaly Detection. NGNO@MM 2025: 13-20
[i3]Wenhao Liu, Zhenyi Lu, Xinyu Hu, Jierui Zhang, Dailin Li, Jiacheng Cen, Huilin Cao, Haiteng Wang, Yuhan Li, Kun Xie, Dandan Li, Pei Zhang, Chengbo Zhang, Yuxiang Ren, Xiaohong Huang, Yan Ma:
STORM-BORN: A Challenging Mathematical Derivations Dataset Curated via a Human-in-the-Loop Multi-Agent Framework. CoRR abs/2506.01531 (2025)- 2024
[j19]Yide Yu
, Yue Liu
, Dennis Wong
, Huijie Li
, José Vicente Egas López
, Yan Ma
:
CAGE: A Curiosity-Driven Graph-Based Explore-Exploit Algorithm for Solving Deterministic Environment MDPs With Limited Episode Problem. IEEE Access 12: 144106-144121 (2024)
[i2]Yide Yu, Yue Liu, Xiaochen Yuan, Dennis Wong, Huijie Li, Yan Ma:
A Model-free Biomimetics Algorithm for Deterministic Partially Observable Markov Decision Process. CoRR abs/2412.14614 (2024)- 2023
[c26]Yide Yu
, Yan Ma, Yue Liu, Dennis Wong, Kin Lei, José Vicente Egas López:
Measuring the State-Observation-Gap in POMDPs: An Exploration of Observation Confidence and Weighting Algorithms. AIAI (1) 2023: 137-148- 2022
[j18]Lei Yan
, Maode Ma
, Dandan Li, Xiaohong Huang, Yan Ma, Kun Xie
:
A flexible and lightweight privacy-preserving handshake protocol based on DTLShps for IoT. Comput. Networks 216: 109169 (2022)
[j17]Yonghui Huang, Yi Sun
, Kaixiang Lin, Bowen Xie, Jiayang Fan, Yan Ma:
An Effective Reconstruction Method of the APT Attack Based on Hidden Markov Model. J. Circuits Syst. Comput. 31(6): 2250108:1-2250108:16 (2022)- 2021
[j16]Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang, Bo Su, Liang Zhao:
Research on the on-demand scheduling algorithm of intelligent routing load based on SDN. Int. J. Internet Protoc. Technol. 14(1): 23-32 (2021)
[c25]Qingle Wu, Su-Kit Tang
, Yuanhui Liang
, Chan-Tong Lam, Yan Ma:
A Low Complexity Model-Driven Deep Learning LDPC Decoding Algorithm. ICCCS 2021: 558-563- 2020
[j15]Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang, Yanxiao Liu:
Applying cheating identifiable secret sharing scheme in multimedia security. EURASIP J. Image Video Process. 2020(1): 42 (2020)
[j14]Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang, Bo Su, Liang Zhao:
User information intrusion prediction method based on empirical mode decomposition and spectrum feature detection. Int. J. Inf. Commun. Technol. 16(2): 99-111 (2020)
[j13]Yan Ma, Lei Yan
, Xiaohong Huang, Maode Ma
, Dandan Li:
DTLShps: SDN-Based DTLS Handshake Protocol Simplification for IoT. IEEE Internet Things J. 7(4): 3349-3362 (2020)
[j12]Dan-dan Li
, Lin-Yan Chen, Ya Cao, Xiaohong Huang, Fei Gao, Yan Ma:
The effect on (2, N, 2) Bell tests with distributed measurement dependence. Quantum Inf. Process. 19(9): 339 (2020)
2010 – 2019
- 2019
[j11]Donggao Du
, Yi Sun, Yan Ma, Fei Xiao
:
A Novel Approach to Detect Malware Variants Based on Classified Behaviors. IEEE Access 7: 81770-81782 (2019)
[c24]Lei Yan
, Maode Ma
, Yan Ma:
TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT. SpaCCS 2019: 166-182- 2018
[j10]Wenhua Shao
, Haiyong Luo, Fang Zhao, Yan Ma, Zhongliang Zhao, Antonino Crivello
:
Indoor Positioning Based on Fingerprint-Image and Deep Learning. IEEE Access 6: 74699-74712 (2018)
[j9]Zhaowen Lin, Fei Xiao, Yi Sun, Yan Ma, Cong-Cong Xing, Jun Huang:
A Secure Encryption-Based Malware Detection System. KSII Trans. Internet Inf. Syst. 12(4): 1799-1818 (2018)
[c23]Zehua Zhao, Yan Ma, Qun Cong:
GDSF-Based Low Access Latency Web Proxy Caching Replacement Algorithm. CSAI/ICIMT 2018: 232-236
[c22]Yunlong Lu, Xiaohong Huang, Yan Ma, Maode Ma:
A Weighted Context Graph Model for Fast Data Leak Detection. ICC 2018: 1-6
[c21]Liying Cheng, Pei Zhang, Yan Ma:
Route leakage detection algorithm based on new feature discovery. ICCIP 2018: 222-226- 2017
[j8]Shen Yan
, Xiaohong Huang, Maode Ma, Pei Zhang, Yan Ma:
A Novel Efficient Address Mutation Scheme for IPv6 Networks. IEEE Access 5: 7724-7736 (2017)
[j7]Bin Jia
, Xiaohong Huang, Rujun Liu, Yan Ma:
A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning. J. Electr. Comput. Eng. 2017: 4975343:1-4975343:9 (2017)- 2016
[j6]Xiaohong Huang, Qiong Sun, Maode Ma, Yan Ma:
H-LCFST: a hash lowest cost first search tree for flexible packet classification. Int. J. Netw. Manag. 26(4): 286-307 (2016)- 2014
[c20]Yahong Guo, Xiaohong Huang, Ming Di, Yan Ma:
Research on modeling and development process for passive interoperability testing. CCIS 2014: 732-737
[c19]Junxue Liang, Xiaolin Xu, Zhaowen Lin, Yan Ma, Hongjuan Pei, Xiaohong Huang, Jian Li, Hong-Xia Niu:
SDViNet: A software defined virtual network management platform in IaaS cloud. LANMAN 2014: 1-6- 2013
[c18]Shen Yan, Qin Zhao, Xiaohong Huang, Yan Ma:
Partial-state Asymmetric NAT: Universal and asymmetric IPv6 address mapping. ICCT 2013: 378-382- 2012
[j5]Jia Liu, Canfeng Chen, Yan Ma:
Modeling Neighbor Discovery in Bluetooth Low Energy Networks. IEEE Commun. Lett. 16(9): 1439-1441 (2012)
[j4]Jun Huang, Yoshiaki Tanaka, Yan Ma:
On Approximating a Multicast Routing Tree with Multiple Quality-of-Service Constraints. IEICE Trans. Commun. 95-B(6): 2005-2012 (2012)
[j3]Jun Huang, Xiaohong Huang, Yan Ma:
Routing with multiple quality-of-services constraints: An approximation perspective. J. Netw. Comput. Appl. 35(1): 469-479 (2012)
[j2]Jun Huang, Changqiao Xu, Qiang Duan, Yan Ma, Gabriel-Miro Muntean
:
Novel End-to-End Quality of Service Provisioning Algorithms for Multimedia Services in Virtualization-Based Future Internet. IEEE Trans. Broadcast. 58(4): 569-579 (2012)
[c17]Ruozhou Yu
, Xudong Yang, Jun Huang, Qiang Duan, Yan Ma, Yoshiaki Tanaka:
QoS-aware service selection in virtualization-based Cloud computing. APNOMS 2012: 1-8
[c16]Pei Zhang, Xiaohong Huang, Xin Sun, Hao Wang, Yan Ma:
Privacy-preserving anomaly detection across multi-domain networks. FSKD 2012: 1066-1070
[c15]Junxue Liang, Zhaowen Lin, Yan Ma:
OF-NEDL: An OpenFlow Networking Experiment Description Language Based on XML. WISM 2012: 686-697- 2011
[j1]Jun Huang, Xiaohong Huang, Yan Ma, Yanbing Liu:
High-dimensional objective optimizer: An evolutionary algorithm and its nonlinear analysis. Expert Syst. Appl. 38(7): 8921-8928 (2011)- 2010
[c14]Jun Huang, Xiaohong Huang, Yan Ma:
An Effective Approximation Scheme for Multiconstrained Quality-of-Service Routing. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
[c13]Xu Tian, Qiong Sun, Xiaohong Huang, Yan Ma:
A Dynamic Online Traffic Classification Methodology Based on Data Stream Mining. CSIE (1) 2009: 298-302
[c12]Qiong Sun, Xiaohong Huang, Yan Ma:
IPv6 End-to-End QoS Provision in Heterogeneous Networks Using Aggregated Flow Label. CSIE (2) 2009: 438-441
[c11]Weihai Li, Yan Ma, Qing Ma, Xiaohong Huang:
Dynamic Dictionary Design for SIP Signaling Compression. CSIE (1) 2009: 448-451
[c10]Haijun Zhao, Yan Ma, Xiaohong Huang, Fang Zhao:
Forecasting Heartbeat Delay for Failure Detection over Internet Using Nonlinear System. CSIE (5) 2009: 589-593
[c9]Qiong Sun, Xiaohong Huang, Wei Yang, Xiaoju Zhou, Yan Ma, Cong Wang:
ClassBenchv6: An IPv6 Packet Classification Benchmark. GLOBECOM 2009: 1-6
[c8]Li Han, Songxiang Cen, Jian Ma, Yan Ma:
Identify Intimate Social Relationship in Blogsphere. Infoscale 2009: 14-25- 2008
[c7]Haijun Zhao, Yan Ma, Xiaohong Huang, Fang Zhao:
Performance Evaluation of Heartbeat-Style Failure Detector over Proactive and Reactive Routing Protocols for Mobile Ad Hoc Network. APNOMS 2008: 370-379
[c6]Xiaohong Huang, Xiaoyu Zhao, Guofeng Zhao, Wenjian Jiang, Dongqu Zheng, Qiong Sun, Yan Ma:
A Novel Level-Based IPv6 Routing Lookup Algorithm. GLOBECOM 2008: 2319-2323
[c5]Qiong Sun, Xiaohong Huang, Xiaoju Zhou, Yan Ma:
A Dynamic Binary Hash Scheme for IPv6 Lookup. GLOBECOM 2008: 2324-2328
[i1]Zheng Sun, Xiaohong Huang, Yan Ma:
Load Balancing Strategies to Solve Flowshop Scheduling on Parallel Computing. CoRR abs/0809.3285 (2008)- 2007
[c4]Zhenqiang Li, Dongqu Zheng, Yan Ma:
Using Bit Selection to Do Routing Table Lookup. FAW 2007: 204-215
[c3]Zhenqiang Li, Dongqu Zheng, Yan Ma:
Tree, Segment Table, and Route Bucket: A Multi-Stage Algorithm for IPv6 Routing Table Lookup. INFOCOM 2007: 2426-2430- 2006
[c2]Zhenqiang Li, Yan Ma:
Trie-based Observations on the Routing Tables. FCST 2006: 157-163
[c1]Yidong Cui, Bin Zhang, Yan Ma:
A Novel Approach to Link Utilization Measurement. ISPA Workshops 2006: 1098-1106
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-15 22:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







