default search action
Yen-Wu Ti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j15]Yi-Cheng Shih, Tian-Shyr Dai, Ying-Ping Chen, Yen-Wu Ti, Wun-Hao Wang, Yun Kuo:
Fund transfer fraud detection: Analyzing irregular transactions and customer relationships with self-attention and graph neural networks. Expert Syst. Appl. 259: 125211 (2025) - 2023
- [j14]Yanbin Luo, Weimin Dai, Yen-Wu Ti:
Improved sine algorithm for global optimization. Expert Syst. Appl. 213(Part): 118831 (2023) - 2022
- [j13]Yu-Yen Hsin, Tian-Shyr Dai, Yen-Wu Ti, Ming-Chuan Huang, Ting-Hui Chiang, Liang-Chih Liu:
Feature Engineering and Resampling Strategies for Fund Transfer Fraud With Limited Transaction Data and a Time-Inhomogeneous Modi Operandi. IEEE Access 10: 86101-86116 (2022) - [j12]Fan-Hsun Tseng, Yu-Shan Liang, Yen-Wu Ti, Chia-Mu Yu:
Intelligent reflecting surface-aided network planning. IET Commun. 16(20): 2406-2413 (2022) - [j11]Yen-Wu Ti, Shang-Kuan Chen, Wen-Cheng Wang:
A hierarchical particle swarm optimisation algorithm for cloud computing environment. Int. J. Inf. Comput. Secur. 18(1/2): 12-26 (2022) - [j10]Chia-Mu Yu, Kang-Cheng Chen, Ching-Tang Chang, Yen-Wu Ti:
SegNet: a network for detecting deepfake facial videos. Multim. Syst. 28(3): 793-814 (2022) - 2021
- [j9]Shang-Kuan Chen, Yen-Wu Ti:
A Design of Multi-Purpose Image-Based QR Code. Symmetry 13(12): 2446 (2021) - [c6]Yu-Yen Hsin, Tian-Shyr Dai, Yen-Wu Ti, Ming-Chuan Huang:
Interpretable Electronic Transfer Fraud Detection with Expert Feature Constructions. CIKM Workshops 2021 - 2020
- [j8]Yen-Wu Ti, Chia-Feng Wu, Chia-Mu Yu, Sy-Yen Kuo:
Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications. IEEE Access 8: 1715-1732 (2020) - [j7]Yen-Wu Ti, Shang-Kuan Chen, Wen-Chieh Wu:
A New Visual Cryptography-Based QR Code System for Medication Administration. Mob. Inf. Syst. 2020: 8885242:1-8885242:10 (2020)
2010 – 2019
- 2019
- [i1]Chia-Mu Yu, Ching-Tang Chang, Yen-Wu Ti:
Detecting Deepfake-Forged Contents with Separable Convolutional Neural Network and Image Segmentation. CoRR abs/1912.12184 (2019) - 2018
- [c5]Shang-Kuan Chen, Yen-Wu Ti:
Visual Cryptography with QR-Code Transparencies. IIH-MSP (2) 2018: 19-26 - 2014
- [j6]Shu-Ming Hsieh, Chiun-Chieh Hsu, Yen-Wu Ti, Chi-Jung Kuo:
Reducing the bottleneck of graph-based data mining by improving the efficiency of labeled graph isomorphism testing. Data Knowl. Eng. 91: 17-33 (2014) - 2013
- [c4]Shang-Kuan Chen, Gen-Han Wu, Yen-Wu Ti, Ran-Zan Wang, Wen-Pinn Fang, Chian-Jhu Lu:
Hierarchical Particle Swarm Optimization Algorithm of IPSVR Problem. ICGEC 2013: 231-238 - 2011
- [j5]Yuh-Dauh Lyuu, Tak-Man Ma, Yen-Wu Ti:
Linear-time compression of 2-manifold polygon meshes into information-theoretically optimal number of bits. Appl. Math. Comput. 217(21): 8432-8437 (2011) - [c3]Shang-Kuan Chen, Chiu-Jian Hsu, Yen-Wu Ti:
Hierarchical Three-Dimension Mesh Model Sharing. IIH-MSP 2011: 77-80 - 2010
- [j4]Yen-Wu Ti, Ching-Lueh Chang, Yuh-Dauh Lyuu, Alexander Shen:
Sets of k-Independent Strings. Int. J. Found. Comput. Sci. 21(3): 321-327 (2010)
2000 – 2009
- 2009
- [j3]Ching-Lueh Chang, Yuh-Dauh Lyuu, Yen-Wu Ti:
Testing Embeddability between Metric Spaces. Int. J. Found. Comput. Sci. 20(2): 313-329 (2009) - 2008
- [j2]Ching-Lueh Chang, Yuh-Dauh Lyuu, Yen-Wu Ti:
The complexity of Tarski's fixed point theorem. Theor. Comput. Sci. 401(1-3): 228-235 (2008) - [j1]Hong-Yiu Lin, Yuh-Dauh Lyuu, Tak-Man Ma, Yen-Wu Ti:
Testing whether a digraph contains H-free k-induced subgraphs. Theor. Comput. Sci. 407(1-3): 545-553 (2008) - [c2]Ching-Lueh Chang, Yen-Wu Ti, Yuh-Dauh Lyuu:
Testing Embeddability Between Metric Spaces. CATS 2008: 117-124 - 2006
- [c1]Tak-Man Ma, Yuh-Dauh Lyuu, Yen-Wu Ti:
An Efficient Algorithm for Finding Long Conserved Regions Between Genes. CompLife 2006: 42-51
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint