以第一作者或通信作者发表的论文
2025年
[1]Junchi MA, Yuzhu DING, Sulei HUANG, Zongtao DUAN, Lei TANG. TEMPORISE: Extracting Semantic Representations of Varied Input Executions for Silent Data Corruption Evaluation[J]. Future Generation Computer Systems, 2025: 107734. (SCI 2区,CCF C类期刊)
2024年
[1]马骏驰,张源,段宗涛,唐蕾. 考虑充电需求的电动汽车行为策略研究综述[J]. 交通运输工程学报,2024,24(6):66-79.(长安大学中文期刊目录A区)
[2]Yaguang Hu, Yanan Gu, Yichen Song, Yuelei Zhao, Jiachen Wang, Junchi MA, Fang Sui. Differential expression and prognostic value of tlr4 in kidney renal clear cell carcinoma[J]. Molecular and Cellular Probes, 2024, 75: 101959.(通信作者,SCI 3区)
2023年
[1]Junchi MA, Sulei HUANG, Zongtao DUAN, Lei TANG, Luyang WANG. SLOGAN: SDC Probability Estimation Using Structured Graph Attention Network[C]. Asia and South Pacific Design Automation Conference, pp. 296-301, Tokyo, Japan, 2023.(CCF C类会议)
[2]Junchi MA, Yuan Zhang, Zongtao Duan, et al. PROLIFIC: Deep Reinforcement Learning for Efficient EV Fleet Scheduling and Charging[J]. Sustainability, 2023, 15(18): 13553.(SCI 3区)
[3]马骏驰,迪晓鑫,段宗涛,唐蕾. 程序表示学习综述[J]. 浙江大学学报(工学版), 2023, 57(1): 155-169.(长安大学中文期刊目录A区)
[4]黄甦雷,马骏驰,段宗涛.基于图神经网络的程序脆弱性指数评估方法[J].计算机应用研究, 2023, 40(4):6.(通信作者)
[5]Xing J, Gu Y, Song Y, J Ma, F Sui. MYO5A overexpression promotes invasion and correlates with low lymphocyte infiltration in head and neck squamous carcinoma[J]. BMC cancer, 2023, 23(1): 1-14.(SCI 2区,共同通信作者)
[6]Hao N, Li M, Wang J, J Ma, Q Jia, F Sui. High PGAP3 expression is associated with lymph node metastasis and low CD8+ T cell in patients with HER2+ breast cancer[J]. Pathology Research and Practice, 2023, 251: 154890.(SCI 4区,共同通信作者)
2022年
[1]Junchi MA, Zongtao DUAN, Lei TANG. Deep Soft Error Propagation Modeling Using Graph Attention Network[J]. Journal of Electronic Testing, 2022: 1-17. (SCI 4区,CCF C类期刊)
2021年
[1]Junchi MA, Zongtao DUAN, Lei TANG.GATPS: An attention-based graph neural network for predicting SDC-causing instructions[C]. IEEE VLSI Test Symposium, pp.1-7, 2021.(CCF C类会议)
2020年之前
[1]Junchi MA, Zongtao DUAN, Lei TANG. A Methodology to Assess Output Vulnerability Factors for Detecting Silent Data Corruption[J]. IEEE Access, 2019, 7: 118135-118145. (SCI)
[2]Junchi MA, Yun WANG. Characterization of stack behavior under soft errors[C]. Design, Automation & Test in Europe Conference & Exhibition, pp.1534-1539, Lausanne, Switzerland,2017.(CCF B类会议)
[3]Junchi MA, Dengyun YU, et al. Detecting Silent Data Corruptions in Aerospace-based Computing Using Program Invariants[J]. International Journal of Aerospace Engineering, 2016, 1-10. (SCI)
[4]马骏驰,汪芸. 一种基于不变量的软错误检测方法[J]. 软件学报, 2016, 27(2): 219-230.
[5]马骏驰,汪芸等. 基于错误传播分析的SDC脆弱指令识别方法研究[J]. 计算机研究与发展,2016, 53(9): 1943.