default search action
Hsuan-Yu Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Chuan-Chi Lai, Hsuan-Yu Lin, Chuan-Ming Liu:
Distributed Indexing Schemes for K-Dominant Skyline Analytics on Uncertain Edge-IoT Data. IEEE Trans. Emerg. Top. Comput. 12(3): 878-890 (2024) - 2023
- [j11]Leven J. Zheng, Yuanyuan Anna Wang, Hsuan-Yu Lin, Wei Liu:
Understanding circular economy adoption by SMEs: a case study on organizational legitimacy and Industry 4.0. Ind. Manag. Data Syst. 123(4): 1157-1177 (2023) - [j10]Ren-Hung Hwang, Jia-You Lin, Sun-Ying Hsieh, Hsuan-Yu Lin, Chia-Liang Lin:
Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks. Sensors 23(2): 853 (2023) - [c11]Yi-Chiao Fang, Xi-Liang Zhao, Hsuan-Yu Lin, Yu-Cheng Yang, Jiun-In Guo, Chih-Peng Fan:
YOLO Deep-Learning Based Driver Behaviors Detection and Effective Gaze Estimation by Head Poses for Driver Monitor System. GCCE 2023: 82-83 - [i2]Chuan-Chi Lai, Hsuan-Yu Lin, Chuan-Ming Liu:
Distributed Indexing Schemes for k-Dominant Skyline Analytics on Uncertain Edge-IoT Data. CoRR abs/2310.12116 (2023) - 2022
- [j9]Ying-Dar Lin, Jehoshua-Hanky Pratama, Didik Sudyana, Yuan-Cheng Lai, Ren-Hung Hwang, Po-Ching Lin, Hsuan-Yu Lin, Wei-Bin Lee, Chen-Kuo Chiang:
ELAT: Ensemble Learning with Adversarial Training in defending against evaded intrusions. J. Inf. Secur. Appl. 71: 103348 (2022) - 2021
- [j8]Ching-Nung Yang, Xiaotian Wu, Hsuan-Yu Lin, Cheonshik Kim:
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolation. J. Inf. Secur. Appl. 61: 102910 (2021) - [c10]Chuan-Chi Lai, Hsuan-Yu Lin, Chuan-Ming Liu:
Highly Efficient Indexing Scheme for k-Dominant Skyline Processing over Uncertain Data Streams. WOCC 2021: 97-101 - [i1]Chuan-Chi Lai, Hsuan-Yu Lin, Chuan-Ming Liu:
Highly Efficient Indexing Scheme for k-Dominant Skyline Processing over Uncertain Data Streams. CoRR abs/2111.08300 (2021)
2010 – 2019
- 2019
- [c9]Yi-Jen Su, Pei-Yu Huang, Wu-Chih Hu, Hsuan-Yu Lin, Chen-Yu Kao, Shan-Hsiung Hsieh, Chun-Li Lin:
Using Feature Selection to Improve Performance of Three-Tier Intrusion Detection System. AINA Workshops 2019: 776-785 - [c8]Feng-Chi Chen, Pin-Shen Lee, Yun-Yu Huang, Huang-Chi Wu, Hsuan-Yu Lin:
Interactions between Inter Partes Review and Hatch-Waxman Litigations. CIBCB 2019: 1-4 - [c7]Chih-Ming Chu, Hsuan-Yu Lin:
Study of RFID Board Game Cloud Computing System. ICCE-TW 2019: 1-2 - [c6]Hsuan-Yu Lin, Yu-Hsuan Chiu, Wei-Chieh Liao, Ray-I Chang:
Service-Oriented Architecture for Intelligent Management with Data Analytics and Visualization. SOCA 2019: 73-78 - 2014
- [j7]Chih-Hai Yang, Hsuan-Yu Lin, Chiang-Ping Chen:
Measuring the efficiency of NBA teams: additive efficiency decomposition in two-stage DEA. Ann. Oper. Res. 217(1): 565-589 (2014) - [c5]Hsuan-Yu Lin, Shan-Hsiung Hsieh, Kuo Hong Chen, Tzu Chen Wu:
Large-scale mobile internet performance measurement in Taiwan. ICUFN 2014: 516-519 - 2011
- [j6]Nai-Shing Yen, Jie-Li Tsai, Pei-Ling Chen, Hsuan-Yu Lin, Arbee L. P. Chen:
Effects of typographic variables on eye-movement measures in reading Chinese from a screen. Behav. Inf. Technol. 30(6): 797-808 (2011) - [j5]Chun-Hsi Chen, Hsuan-Yu Lin, Chia-Lin Pan, Feng-Chi Chen:
The genomic features that affect the lengths of 5' untranslated regions in multicellular eukaryotes. BMC Bioinform. 12(S-9): S3 (2011) - [c4]Hsuan-Yu Lin, Chi-Hsin Yu, Hsin-Hsi Chen:
Query-Dependent Rank Aggregation with Local Models. AIRS 2011: 1-12 - [c3]Chun-Hsi Chen, Hsuan-Yu Lin, Chia-Lin Pan, Feng-Chi Chen:
The Length Evolution of 5' Untranslated Regions - The Stochastic Model Revisited. BIBE 2011: 162-166
2000 – 2009
- 2008
- [j4]Chia-Chang Hu, Hsuan-Yu Lin:
Multiuser Detection Using Adaptive Multistage Matrix Wiener Filtering Schemes with Stage-Selection Criteria in DS-UWB. EURASIP J. Adv. Signal Process. 2008 (2008) - [j3]Chia-Chang Hu, Hsuan-Yu Lin:
Multiple-access interference suppression employing block-adaptation filtering technique in multipath DS-CDMA. IEEE Trans. Wirel. Commun. 7(2): 458-463 (2008) - 2007
- [c2]Chia-Chang Hu, Hsuan-Yu Lin, Yong-Sheng Cheng, Ching-Wen Tang:
Efficient MMSE Multistage Filtering Schemes with Filter-Stage Adaptation Criteria for Ultrawide Bandwidth Signals. CCNC 2007: 619-623 - [c1]Chia-Chang Hu, Hsuan-Yu Lin, Tsung-Hsien Liu, Yong-Sheng Cheng:
Time-Hopping UWB Multiuser Detection Using Adaptive Multistage Matrix Wiener Filtering Schemes. ICC 2007: 2540-2544 - 2006
- [j2]Chia-Chang Hu, Hsuan-Yu Lin, Yu-Fan Chen, Jyh-Horng Wen:
Space-Time Joint Interference Cancellation Using Fuzzy-Inference-Based Adaptive Filtering Techniques in Frequency-Selective Multipath Channels. EURASIP J. Adv. Signal Process. 2006 (2006) - 2005
- [j1]Hsuan-Yu Lin, Chia-Chang Hu, Yu-Fan Chen, Jyh-Horng Wen:
An adaptive robust LMS employing fuzzy step size and partial update. IEEE Signal Process. Lett. 12(8): 545-548 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint