default search action
Yen-Ping Chu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j24]Chien-Te Wu, Shun-Chung Liu, Chao-Fang Chu, Yen-Ping Chu, Shyr-Shen Yu:
A Study of Open Data for Tourism Service. Int. J. Electron. Bus. Manag. 12(3) (2014) - [j23]Meng-Hsiun Tsai, Shu-Wei Guo, Yung-Kuan Chan, Jiunn-Lin Wu, Ching-Lin Wang, Yen-Ping Chu, Wen-Yu Cheng:
Automatic band Segmentation and Detection of 1D-gel Images with Different Exposures. Int. J. Pattern Recognit. Artif. Intell. 28(1) (2014) - 2010
- [j22]Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu, Shyh-Chang Tsaur:
Resampling Halftone Images Using Interpolation and Error-Diffusion. Comput. J. 53(6): 802-813 (2010) - [j21]Yu-An Ho, Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
A least-significant-bit substitution data hiding scheme by using modulus function and optimal permutation refining. Int. J. Multim. Intell. Secur. 1(2): 139-152 (2010)
2000 – 2009
- 2009
- [j20]Yu-An Ho, Yung-Kuan Chan, Hsien-Chu Wu, Yen-Ping Chu:
High-capacity reversible data hiding in binary images using pattern substitution. Comput. Stand. Interfaces 31(4): 787-794 (2009) - [j19]Ruey-Ming Chao, Hsien-Chung Wu, Chih-Chiang Lee, Yen-Ping Chu:
A Novel Image Data Hiding Scheme with Diamond Encoding. EURASIP J. Inf. Secur. 2009 (2009) - [j18]Chun-Ta Li, Yen-Ping Chu:
Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks. Int. J. Netw. Secur. 8(2): 166-168 (2009) - [j17]Yung-Kuan Chan, Wen-Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
A HDWT-based reversible data hiding method. J. Syst. Softw. 82(3): 411-421 (2009) - [j16]Hsien-Chu Wu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, Hung-Ruei Chen:
A high capacity reversible data hiding scheme with edge prediction and difference expansion. J. Syst. Softw. 82(12): 1966-1973 (2009) - 2008
- [j15]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12): 2803-2814 (2008) - [j14]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Comput. Commun. 31(18): 4255-4258 (2008) - [j13]Yi-Hung Huang, Kuan-Cheng Lin, Chao-Yu Kuo, Chin-Hsing Chen, Yen-Ping Chu:
Enhancement of fairness in a DiffServ network using a novel queuing algorithm. Comput. Stand. Interfaces 30(1-2): 52-61 (2008) - [j12]Hui-Chieh Lu, Yen-Ping Chu, Ruey-Kai Sheu, Win-Tsung Lo:
A generic application sharing architecture based on message-oriented middleware platform. Comput. Stand. Interfaces 30(3): 191-199 (2008) - [j11]Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu:
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Comput. Syst. Sci. Eng. 23(3) (2008) - [j10]Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu:
Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognit. 41(6): 2097-2106 (2008) - [j9]Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu:
Visual secret sharing for multiple secrets. Pattern Recognit. 41(12): 3572-3581 (2008) - [j8]Shys-Fan Yang-Mao, Yung-Kuan Chan, Yen-Ping Chu:
Edge Enhancement Nucleus and Cytoplast Contour Detector of Cervical Smear Images. IEEE Trans. Syst. Man Cybern. Part B 38(2): 353-366 (2008) - [c10]Ruey-Ming Chao, Yu-An Ho, Yen-Ping Chu:
Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion. APSCC 2008: 1483-1488 - [c9]Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
Halftone image resampling by interpolation and error-diffusion. ICUIMC 2008: 409-413 - [c8]Jung-Wen Lo, Min-Shiang Hwang, Yen-Ping Chu:
An Exchangeable E-Cash Scheme by E-Mint. ISDA (3) 2008: 246-251 - [c7]Lin-Yu Tseng, Yung-Kuan Chan, Yu-An Ho, Yen-Ping Chu:
Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process. ISDA (3) 2008: 320-325 - [c6]Shys-Fan Yang-Mao, Yung-fu Chen, Yung-Kuan Chan, Meng-Hsiun Tsai, Yen-Ping Chu:
Gradient Direction Edge Enhancement Based Nucleus and Cytoplasm Contour Detector of Cervical Smear Images. ICMB 2008: 290-297 - 2007
- [j7]Kuan-Cheng Lin, Yi-Hung Huang, Chang-Shian Tsai, Chin-Hsing Chen, Yen-Ping Chu:
Improving Fairness in DiffServ Networks Using Adaptive Aggregate Markers. IEICE Trans. Inf. Syst. 90-D(6): 990-993 (2007) - [j6]Yung-fu Chen, Yung-Kuan Chan, Ching-Chun Huang, Meng-Hsiun Tsai, Yen-Ping Chu:
A multiple-level visual secret-sharing scheme without image size expansion. Inf. Sci. 177(21): 4696-4710 (2007) - [c5]Jen-Bang Feng, Iuon-Chang Lin, Yen-Ping Chu:
An Edge Enhanced Technique for Digital Halftoning Using Error Diffusion. IIH-MSP 2007: 81-86 - 2006
- [j5]Wen-Ling Chan, Jan-Gowth Chang, Yung-fu Chen, Yung-Kuan Chan, Yen-Ping Chu:
Identification of mouse mslp2 gene from EST databases by repeated searching, comparison, and assembling. Comput. Biol. Medicine 36(1): 101-108 (2006) - [j4]Min-Shiang Hwang, Jung-Wen Lo, Shu-Yin Hsiao, Yen-Ping Chu:
Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows. IEICE Trans. Inf. Syst. 89-D(4): 1575-1577 (2006) - [j3]Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, Yen-Ping Chu:
Reversible Watermarking: Current Status and Key Issues. Int. J. Netw. Secur. 2(3): 161-170 (2006) - [j2]Yung-Kuan Chan, Duan-Li Liau, Yung-fu Chen, Hsien-Chu Wu, Yen-Ping Chu:
A minute lossy method for 2D-gel images compression. Int. J. Imaging Syst. Technol. 16(1): 1-8 (2006) - [c4]Lun-Chi Chen, Ruey-Kai Sheu, Hui-Chieh Lu, Win-Tsung Lo, Yen-Ping Chu:
Object Finding System Based on RFID Technology. APWeb Workshops 2006: 383-396 - [c3]Hui-Chieh Lu, Yen-Ping Chu, Ruey-Kai Sheu, Win-Tsung Lo:
A Generic Application Sharing Architecture Based on Message-Oriented Middleware Platform. CSCWD 2006: 33-37 - [c2]Yung-Kuan Chan, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu:
Robust Image Hiding Method. JCIS 2006 - 2005
- [j1]Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu:
A new multi-secret images sharing scheme using Largrange's interpolation. J. Syst. Softw. 76(3): 327-339 (2005) - [r1]Yung-Kuan Chan, Yu-An Ho, Hsien-Chu Wu, Yen-Ping Chu:
A Duplicate Chinese Document Image Retrieval System. Encyclopedia of Information Science and Technology (I) 2005: 1-6 - 2004
- [c1]Wen-Ling Chan, Yen-Ping Chu, Yung-fu Chen, Chwei-Shyong Tsai, Jan-Gowth Chang:
Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling. METMBS 2004: 271-275
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint