Follow
Xiaoqi Ma
Title
Cited by
Cited by
Year
Identifying influential spreaders by gravity model
Z Li, T Ren, X Ma, S Liu, Y Zhang, T Zhou
Scientific reports 9 (1), 8387, 2019
1962019
NHL Pathological Image Classification Based on Hierarchical Local Information and GoogLeNet‐Based Representations
J Bai, H Jiang, S Li, X Ma
BioMed research international 2019 (1), 1065652, 2019
392019
Implementation of hybrid artificial intelligence technique to detect covert channels attack in new generation internet protocol IPv6
A Salih, X Ma, E Peytchev
Leadership, Innovation and Entrepreneurship as Driving Forces of the Global …, 2017
222017
A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries
T Solomonides
Global Healthgrid: E-Science Meets Biomedical Informatics: Proceedings of …, 2008
17*2008
Analysing and attacking the 4-way handshake of IEEE 802.11 i standard
A Alabdulatif, X Ma, L Nolle
8th International Conference for Internet Technology and Secured …, 2013
162013
Security concerns in cloud computing
X Ma
2012 Fourth International Conference on Computational and Information …, 2012
162012
Construction of pancreatic cancer classifier based on SVM optimized by improved FOA
H Jiang, D Zhao, R Zheng, X Ma
BioMed research international 2015 (1), 781023, 2015
152015
Transfer learning and fusion model for classification of epileptic pet images
H Jiang, F Gao, X Duan, Z Bai, Z Wang, X Ma, YW Chen
Innovation in Medicine and Healthcare Systems, and Multimedia: Proceedings …, 2019
92019
Verifying and fixing password authentication protocol
X Ma, R McCrindle, X Cheng
Seventh ACIS International Conference on Software Engineering, Artificial …, 2006
92006
Biometric identity-based cryptography for e-Government environment
D Aljeaid, X Ma, C Langensiepen
2014 Science and Information Conference, 581-588, 2014
72014
Verifying security protocols by knowledge analysis
X Ma, X Cheng
International Journal of Security and Networks 3 (3), 183-192, 2008
72008
New intelligent heuristic algorithm to mitigate security vulnerabilities in IPv6
A Salih, X Ma, E Peytchev
IJIS International Journal of Information Security 4, 2015
62015
Managing identities in cloud computing environments
X Ma
2015 2nd International Conference on Information Science and Control …, 2015
52015
Analysis of security protocols using finite-state machines
D Aljeaid, X Ma, C Langensiepen
International Journal of Advanced Research in Artificial Intelligence …, 2015
52015
Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11 i Standard
A Alabdulatif, X Ma
International Journal for Information Security Research (IJISR) 3 (34), 439-448, 2013
52013
Formal verification of the Merchant Registration phase of the SET protocol
XQ Ma, XC Cheng
International Journal of Automation and Computing 2 (2), 155-162, 2005
52005
A mobile agent based spam filter system
X Cheng, X Ma, L Wang, S Zhong
Computational Intelligence and Security: International Conference, CIS 2005 …, 2005
52005
A framework for proving the correctness of cryptographic protocol properties by linear temporal logic
X Ma
International Journal of Digital Society (IJDS) 41 (12), 749-757, 2013
32013
Knowledge based approach for mechanically verifying security protocols
X Ma, X Cheng, R McCrindle
INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE 19, 1572, 2005
32005
An exploratory data analysis of the network behavior of hive home devices
A Wali, O Apejoye, J He, X Ma
2021 8th International Conference on Internet of Things: Systems, Management …, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20