Development and validation of a new nomogram to screen for MAFLD
Zou, Haoxuan, Zhao, Fanrong, Lv, Xiuhe, Ma, Xiaopu, Xie, Yan
Published in Lipids in health and disease (08.12.2022)
Published in Lipids in health and disease (08.12.2022)
Get full text
Journal Article
Comparing similarities and differences between NAFLD, MAFLD, and MASLD in the general U.S. population
Zou, Haoxuan, Ma, Xiaopu, Pan, Wen, Xie, Yan
Published in Frontiers in nutrition (Lausanne) (08.07.2024)
Published in Frontiers in nutrition (Lausanne) (08.07.2024)
Get full text
Journal Article
Survival Prediction for Non-Small Cell Lung Cancer Based on Multimodal Fusion and Deep Learning
Ma, Xiaopu, Ning, Fei, Xu, Xiaofeng, Shan, Jiangdan, Li, He, Tian, Xiao, Li, Shuai
Published in IEEE access (2024)
Published in IEEE access (2024)
Get full text
Journal Article
Specifying and enforcing the principle of least privilege in role-based access control
Ma, Xiaopu, Li, Ruixuan, Lu, Zhengding, Lu, Jianfeng, Dong, Meng
Published in Concurrency and computation (25.08.2011)
Published in Concurrency and computation (25.08.2011)
Get full text
Journal Article
RAR: A role-and-risk based flexible framework for secure collaboration
Hu, Jinwei, Li, Ruixuan, Lu, Zhengding, Lu, Jianfeng, Ma, Xiaopu
Published in Future generation computer systems (01.05.2011)
Published in Future generation computer systems (01.05.2011)
Get full text
Journal Article
Assessment of the clinical value of five noninvasive predictors of metabolic dysfunction-associated steatotic liver disease in Han Chinese adults
Ma, Xiaopu, Zou, Haoxuan, Zhan, Junyi, Gao, Junzhu, Xie, Yan
Published in European journal of gastroenterology & hepatology (01.10.2024)
Published in European journal of gastroenterology & hepatology (01.10.2024)
Get more information
Journal Article
EXCLF: A LDoS attack detection & mitigation model based on programmable data plane
Tang, Dan, Cao, Hongbo, Zhang, Jiliang, Qin, Zheng, Liang, Wei, Ma, Xiaopu
Published in Computer networks (Amsterdam, Netherlands : 1999) (01.10.2024)
Published in Computer networks (Amsterdam, Netherlands : 1999) (01.10.2024)
Get full text
Journal Article
Mining constraints in role-based access control
Ma, Xiaopu, Li, Ruixuan, Lu, Zhengding, Wang, Wei
Published in Mathematical and computer modelling (2012)
Published in Mathematical and computer modelling (2012)
Get full text
Journal Article
Role mining based on permission cardinality constraint and user cardinality constraint
Ma, Xiaopu, Li, Ruixuan, Wang, Hongwei, Li, Huaqing
Published in Security and communication networks (10.09.2015)
Published in Security and communication networks (10.09.2015)
Get full text
Journal Article
Role mining based on cardinality constraints
Li, Ruixuan, Li, Huaqing, Gu, Xiwu, Li, Yuhua, Ye, Wei, Ma, Xiaopu
Published in Concurrency and computation (25.08.2015)
Published in Concurrency and computation (25.08.2015)
Get full text
Journal Article
A Feature Extraction Algorithm Using Data Fusion in Human Face Recognition System
Xiaopu Ma, Xing Wang
Published in 2009 2nd International Congress on Image and Signal Processing (01.10.2009)
Published in 2009 2nd International Congress on Image and Signal Processing (01.10.2009)
Get full text
Conference Proceeding
Face Fusion Recognition Based on Bit-Plane Image
Ma, Xiaopu, Liu, Changwang, Zhao, Li
Published in The Open automation and control systems journal (19.08.2015)
Published in The Open automation and control systems journal (19.08.2015)
Get full text
Journal Article
SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup
Ruixuan Li, Li Nie, Xiaopu Ma, Meng Dong, Wei Wang
Published in 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (01.11.2011)
Published in 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (01.11.2011)
Get full text
Conference Proceeding
Global Static Separation of Duty in Multi-domains
Xiaopu Ma, Ruixuan Li, Zhengding Lu, Jianfeng Lu
Published in 2009 International Conference on Multimedia Information Networking and Security (01.11.2009)
Published in 2009 International Conference on Multimedia Information Networking and Security (01.11.2009)
Get full text
Conference Proceeding