default search action
Yi-Hui Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Yi-Hui Chen, Meng-Yu Tsai, Shih-Hsin Chen:
Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models. IVSP 2024: 171-174 - [i1]Yi-Hui Chen, Eric Jui-Lin Lu, Kwan-Ho Cheng:
Integrating Multi-Head Convolutional Encoders with Cross-Attention for Improved SPARQL Query Translation. CoRR abs/2408.13432 (2024) - 2023
- [j37]Yi-Hui Chen, Eric Jui-Lin Lu, Jin-De Lin:
Enhancing SPARQL Query Performance With Recurrent Neural Networks. IEEE Access 11: 92209-92224 (2023) - 2022
- [j36]Yi-Hui Chen, Eric Jui-Lin Lu, Ying-Yen Lin:
Efficient SPARQL Queries Generator for Question Answering Systems. IEEE Access 10: 99850-99860 (2022) - [j35]Pei-Yu Lin, Wen-Shao Lan, Yi-Hui Chen, Wen-Chuan Wu:
A Confidential QR Code Approach with Higher Information Privacy. Entropy 24(2): 284 (2022) - [j34]Yi-Hui Chen, Jia-Ye Lee, Min-Hsien Chiang, Shih-Hsin Chen:
Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix. Symmetry 14(7): 1445 (2022) - 2021
- [j33]Yi-Hui Chen, Eric Jui-Lin Lu, Ting-An Ou:
Intelligent SPARQL Query Generation for Natural Language Processing Systems. IEEE Access 9: 158638-158650 (2021) - [j32]Shih-Hsin Chen, Chun-Wei Wang, I-Hsin Tai, Ken-Pen Weng, Yi-Hui Chen, Kai-Sheng Hsieh:
Modified YOLOv4-DenseNet Algorithm for Detection of Ventricular Septal Defects in Ultrasound Images. Int. J. Interact. Multim. Artif. Intell. 6(7): 101 (2021) - [c36]Yi-Hui Chen, Pei-Yu Lin:
Integrated Hamming Coding Operation to Reversible Data Hiding Scheme for Encrypted Images. SNPD 2021: 198-201 - 2020
- [j31]Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang:
Research on the Secure Financial Surveillance Blockchain Systems. Int. J. Netw. Secur. 22(4): 708-716 (2020) - [j30]Yi-Hui Chen, Eric Jui-Lin Lu, Ya-Wen Cheng:
Categorization of Multiple Documents Using Fuzzy Overlapping Clustering Based on Formal Concept Analysis. Int. J. Softw. Eng. Knowl. Eng. 30(5): 631-647 (2020) - [c35]Shih-Hsin Chen, I-Hsin Tai, Yi-Hui Chen, Ken-Pen Weng, Kai-Sheng Hsieh:
Data Augmentation for a Deep Learning Framework for Ventricular Septal Defect Ultrasound Image Classification. ICPR Workshops (4) 2020: 310-322 - [c34]Yudong Wu, Mingyao Shen, Yi-Hui Chen, Yuanyuan Zhou:
Tuning applications for efficient GPU offloading to in-memory processing. ICS 2020: 37:1-37:12 - [c33]Yi-Hui Chen, Eric Jui-Lin Lu, Sheng-Chia Lin:
Ontology-based Dynamic Semantic Annotation for Social Image Retrieval. MDM 2020: 337-341
2010 – 2019
- 2019
- [c32]Yi-Hui Chen, Hsin-Pei Wu, Wei-Liang Liaw:
Data Embedding Technique in Encrypted Image Using Hamming Coding. ICCE-TW 2019: 1-2 - 2018
- [j29]Chin-Chen Chang, Yi-Ping Chiu, Chia-Chen Lin, Yi-Hui Chen:
Distortion Free Progressive BTC based Secret Image Sharing. J. Netw. Intell. 3(3): 195-213 (2018) - [c31]Shih-Hsin Chen, Yi-Hui Chen:
A New Two-objective Single Machine Scheduling Problem Considers a Past-sequence-dependent Setup Time and Learning Effect. ICKII 2018: 309-312 - 2017
- [j28]Pei-Yu Lin, Yi-Hui Chen:
High payload secret hiding technology for QR codes. EURASIP J. Image Video Process. 2017: 14 (2017) - [j27]Ying-Hsuan Huang, Ching-Chun Chang, Yi-Hui Chen:
Hybrid secret hiding schemes based on absolute moment block truncation coding. Multim. Tools Appl. 76(5): 6159-6174 (2017) - [c30]Shih-Hsin Chen, Yi-Hui Chen:
A Content-Based Image Retrieval Method Based on the Google Cloud Vision API and WordNet. ACIIDS (1) 2017: 651-662 - 2016
- [j26]Yi-Hui Chen, Eric Jui-Lin Lu, Yao-Tsan Chang, Shiuan-Yin Huang:
RDF-Chord: A hybrid PDMS for P2P systems. Comput. Stand. Interfaces 43: 53-67 (2016) - [c29]Yi-Hui Chen, Eric Jui-Lin Lu, Sheng-Jia Lin:
Exploiting Semantic Connectivity in Redefined Data Representation for Image Retrieval. BigMM 2016: 322-325 - [c28]Pei-Yu Lin, Yi-Hui Chen:
QR code steganography with secret payload enhancement. ICME Workshops 2016: 1-5 - 2015
- [j25]Yi-Hui Chen, Panyaporn Prangjarote, Chih-Yang Lin:
Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images. Int. J. Netw. Secur. 17(3): 238-242 (2015) - [j24]Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai, I-Chun Weng:
Repairable Image Authentication Scheme. Int. J. Netw. Secur. 17(4): 439-444 (2015) - [j23]Rou-Fei Chen, Ching-Weei Lin, Yi-Hui Chen, Tai-Chien He, Li-Yuan Fei:
Detecting and Characterizing Active Thrust Fault and Deep-Seated Landslides in Dense Forest Areas of Southern Taiwan Using Airborne LiDAR DEM. Remote. Sens. 7(11): 15443-15466 (2015) - [c27]Pei-Yu Lin, Chin-Hung Teng, Yi-Hui Chen:
Diverse augmented reality exhibitions for differential users based upon private quick response code. APSIPA 2015: 1121-1125 - [c26]Yi-Hui Chen, Ching-Hu Lu, Po-Yu Hsu:
Multilayered information encryption scheme with fine-grained authentication. APSIPA 2015: 1126-1130 - [c25]Pei-Yu Lin, Yuan-Yu Tsai, Yin-Chi Kuo, Yi-Hui Chen, Chi-Shiang Chan:
Embedding information on search-order codes of VQ indices by rearranging the indicators. ICCE-TW 2015: 504-505 - 2014
- [j22]Yi-Hui Chen, Eric Jui-Lin Lu, Meng-Fang Tsai:
Finding keywords in blogs: Efficient keyword extraction in blog mining via user behaviors. Expert Syst. Appl. 41(2): 663-670 (2014) - [j21]Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai:
An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix. Int. J. Netw. Secur. 16(4): 313-317 (2014) - [j20]Chi-Shiang Chan, Yung-Chen Chou, Yi-Hui Chen, Yuan-Yu Tsai:
Role-Balance Based Multi-Secret Images Sharing using Boolean Operations. KSII Trans. Internet Inf. Syst. 8(5): 1785-1800 (2014) - [j19]Chia-Chen Lin, Chin-Chen Chang, Yi-Hui Chen:
A Novel SVD-based watermarking Scheme for Protecting Rightful Ownership of Digital Images. J. Inf. Hiding Multim. Signal Process. 5(2): 124-143 (2014) - [j18]Chin-Chen Chang, Yi-Hui Chen, Lin-Yi Chuang:
Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques. J. Inf. Hiding Multim. Signal Process. 5(3): 342-352 (2014) - [j17]Ing-Chau Chang, Eric Jui-Lin Lu, Shiuan-Yin Huang, Yi-Hui Chen:
An RDF-based P2P overlay network supporting range and wildcard queries. J. Netw. Comput. Appl. 46: 124-138 (2014) - [c24]Yi-Hui Chen, Chi-Shiang Chan, Po-Yu Hsu, Wei-Lin Huang:
Tagged visual cryptography with access control. ICME Workshops 2014: 1-5 - [c23]Chi-Shiang Chan, Yi-Hui Chen, Pei-Yu Lin:
An Image Hiding Method by Applying Tree Structure on Linking Pixels. IIH-MSP 2014: 110-113 - [c22]Pei-Yu Lin, Yi-Hui Chen, Jun-Chou Chuang:
A (n, n)-threshold Secret Sharing Scheme for Barcode Application. ICS 2014: 1023-1028 - [c21]Yi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu, Tsung Hau Lin:
Classify Blog Articles Using Queried Keywords. ICS 2014: 1062-1068 - [c20]Yi-Hui Chen, Eric Jui-Lin Lu, Hsueh-Chun Chien:
Automatically Categorizing Blog Articles Using Ontology Tree Built by DBpedia. ICS 2014: 1229-1238 - 2013
- [j16]Chi-Cheng Chang, Chaoyun Liang, Yi-Hui Chen:
Is learner self-assessment reliable and valid in a Web-based portfolio environment for high school students? Comput. Educ. 60(1): 325-334 (2013) - [j15]Jen-Ho Yang, Ya-Fen Chang, Yi-Hui Chen:
An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment. Inf. Technol. Control. 42(4): 315-324 (2013) - [j14]Yin-Jen Chiang, Pei-Yu Lin, Ran-Zan Wang, Yi-Hui Chen:
Blind QR Code Steganographic Approach Based upon Error Correction Capability. KSII Trans. Internet Inf. Syst. 7(10): 2527-2543 (2013) - [j13]Pei-Yu Lin, Yi-Hui Chen, Chin-Chen Chang, Jung-San Lee:
Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism. Image Vis. Comput. 31(4): 311-321 (2013) - [c19]Yi-Hui Chen, Eric Jui-Lin Lu, Chu-Fan Wang:
Privacy image protection using fine-grained mosaic technique. APSIPA 2013: 1-4 - [c18]Pei-Yu Lin, Yi-Hui Chen, Ming-Chieh Hsu, Fu-Ming Juang:
Secret sharing mechanism with cheater detection. APSIPA 2013: 1-4 - [c17]Wen-Chuan Wu, Zi-Wei Lin, Yi-Hui Chen:
A vision-based navigation system for Tamsui historical buildings. APSIPA 2013: 1-7 - [c16]Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai:
Self-Authentication Mechanism with Recovery Ability for Digital Images. CISIS 2013: 299-304 - [c15]Yi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu:
A Blog Clustering Approach Based on Queried Keywords. ISBAST 2013: 1-9 - [c14]Pei-Yu Lin, Yi-Hui Chen, Eric Jui-Lin Lu, Ping-Jung Chen:
Secret Hiding Mechanism Using QR Barcode. SITIS 2013: 22-25 - 2012
- [j12]Chi-Cheng Chang, Cheng-Chuan Chen, Yi-Hui Chen:
Reflective behaviors under a web-based portfolio assessment environment for high school students in a computer course. Comput. Educ. 58(1): 459-469 (2012) - [j11]Yi-Hui Chen, Chin-Chen Chang:
Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy. J. Digit. Inf. Manag. 10(1): 39-49 (2012) - [c13]Chiao-Chih Huang, Yi-Hui Chen, Yuan-Yu Tsai, Chi-Shiang Chan:
An Image Hiding Method by Linking Multiple Pixels with XOR Operator. ICGEC 2012: 39-42 - [c12]Yi-Hui Chen, Ci-Wei Lan:
A Self-Authentication Mechanism for a (3, 3)-threshold Secret Sharing Scheme. UIC/ATC 2012: 1006-1008 - 2011
- [j10]Chi-Cheng Chang, Kuo-Hung Tseng, Pao-Nan Chou, Yi-Hui Chen:
Reliability and validity of Web-based portfolio peer assessment: A case study for a senior high school's students taking computer course. Comput. Educ. 57(1): 1306-1316 (2011) - [j9]Chin-Chen Chang, Yi-Hui Chen, Hsin-Chi Wang:
Meaningful secret sharing technique with authentication and remedy abilities. Inf. Sci. 181(14): 3073-3084 (2011) - [c11]Chi-Wei Lan, Yi-Hui Chen, Tyrone Grandison, Angus F. M. Huang, Jen-Yao Chung, Li-Feng Tseng:
A Privacy Reinforcement Approach against De-identified Dataset. ICEBE 2011: 370-375 - [c10]Chih-Yang Lin, Wei-Wen Chang, Yi-Hui Chen:
Intelligent Projector System Based on Computer Vision. ICGEC 2011: 176-179 - [c9]Yi-Hui Chen, Chi-Wei Lan, Chiao-Chih Huang:
A Verifiable Visual Cryptography Scheme. ICGEC 2011: 192-195 - [c8]Chih-Yang Lin, Chao-Chin Chang, Yi-Hui Chen, Panyaporn Prangjarote:
Multimedia Privacy Protection System for Mobil Environments. IIH-MSP 2011: 133-136 - [c7]Chia-Chen Lin, Li-Cheng Yang, Yi-Hui Chen:
Data Hiding Scheme Based on Features of Chinese Text. IIH-MSP 2011: 161-164 - [c6]Yi-Hui Chen, Chi-Wei Lan, Zhi-Hui Wang:
A Two-Layer Steganography Scheme Using Sudoku for Digital Images. UIC 2011: 529-535
2000 – 2009
- 2009
- [j8]Chin-Chen Chang, Yi-Hui Chen, Chia-Chen Lin:
A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput. 13(4): 321-331 (2009) - [c5]Tien-Tsai Huang, Su-Yi Huang, Yi-Hui Chen:
Applying Fuzzy Model on the Evaluation of Library Service Quality. HIS (1) 2009: 73-77 - 2008
- [j7]Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen:
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies. Fundam. Informaticae 88(1-2): 23-45 (2008) - [j6]Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen:
Reversible data-embedding scheme using differences between original and predicted pixel values. IET Inf. Secur. 2(2): 35-46 (2008) - [j5]Chin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen:
A novel secret image sharing scheme in color images using small shadow images. Inf. Sci. 178(11): 2433-2447 (2008) - [j4]Chin-Chen Chang, Wen-Chuan Wu, Yi-Hui Chen:
Joint coding and embedding techniques for multimedia images. Inf. Sci. 178(18): 3543-3556 (2008) - [c4]Hsi-Chun Wang, Wen-Hsin Liu, Chia-Long Chang, Yi-Hui Chen:
Design of Halftone-Based AR Markers under Infrared Detection. CSSE (6) 2008: 97-100 - 2007
- [c3]Chin-Chen Chang, Yi-Hui Chen, Yung-Chen Chou:
Reversible Data Embedding Technique for Palette Images Using De-clustering. MCAM 2007: 130-139 - [c2]Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen:
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. MUE 2007: 1210-1215 - 2006
- [j3]Eric Jui-Lin Lu, Yi-Hui Chen:
Design of a delegable SCORM conformant learning management system. J. Comput. Assist. Learn. 22(6): 423-436 (2006) - [c1]Chin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li:
Improved SMVQ Scheme with Edge-Directed Prediction. IIH-MSP 2006: 541-544 - 2005
- [j2]Eric Jui-Lin Lu, Yi-Hui Chen:
A flexible delegation processor for web-based information systems. Comput. Stand. Interfaces 27(3): 241-256 (2005) - [j1]Shihyu Chou, Eric Jui-Lin Lu, Yi-Hui Chen:
X-RDR: a role-based delegation processor for web-based information systems. ACM SIGOPS Oper. Syst. Rev. 39(1): 4-21 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 00:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint