Chih-Hung Lin

According to our database1, Chih-Hung Lin
  • authored at least 54 papers between 1996 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Design of a Low-Complexity Real-Time Arrhythmia Detection System.
Signal Processing Systems, 2018

On the design of a two-decoding-option image secret sharing scheme.
Multimedia Tools Appl., 2018

Efficient dynamic malware analysis using virtual time control mechanics.
Computers & Security, 2018

2017
WO3 nanoparticle with MEMS technology improve the sensing response by HWCVD system.
Proceedings of the 12th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2017

2016
On the difficulty of aligning VSS random grids.
Sig. Proc.: Image Comm., 2016

Video Inpainting in Spatial-Temporal Domain Based on Adaptive Background and Color Variance.
Proceedings of the Trends in Applied Knowledge-Based Systems and Data Science, 2016

The Usability of Metadata for Android Application Analysis.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

2015
Non-iterative and spatial domain focus map estimation based on intentional re-blur from a single image (NasBirSi).
J. Visual Communication and Image Representation, 2015

Friendly progressive random-grid-based visual secret sharing with adaptive contrast.
J. Visual Communication and Image Representation, 2015

Visual multiple-secret sharing for flexible general access structure by random grids.
Displays, 2015

Code Coverage Measurement for Android Dynamic Analysis Tools.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Efficient spear-phishing threat detection using hypervisor monitor.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
High-Precision Real-Time Premature Ventricular Contraction (PVC) Detection System Based on Wavelet Transform.
Signal Processing Systems, 2014

Multi-factor cheating prevention in visual secret sharing by hybrid codebooks.
J. Visual Communication and Image Representation, 2014

Distortionless visual multi-secret sharing based on random grid.
Inf. Sci., 2014

The learning benefits of using eye trackers to enhance the geospatial abilities of elementary school students.
BJET, 2014

Person Identification between Different Online Social Networks.
Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), Warsaw, Poland, August 11-14, 2014, 2014

MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

2013
Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern.
Displays, 2013

Cross-lagged relationships between problematic Internet use and lifestyle changes.
Computers in Human Behavior, 2013

Encryption in High Dynamic Range Images for RGBE Format.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

Vision Assisted Active Safety System for Vehicles on the Highway.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

A Tailor-Made Encryption Scheme for High-Dynamic Range Images.
Proceedings of the Genetic and Evolutionary Computing, 2013

Robust Watermarking for Multiple Images and Users Based on Visual Cryptography.
Proceedings of the Genetic and Evolutionary Computing, 2013

Dynamic range optimization by flexible local contrast enhancement using luminance map.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

2012
A Factor-Graph-Based TOA Location Estimator.
IEEE Trans. Wireless Communications, 2012

A collaborative model for controlling the green supply network in the motorcycle industry.
Advanced Engineering Informatics, 2012

A low-complexity bio-medical signal receiver for wireless body area network.
Proceedings of the International SoC Design Conference, 2012

Lossless Data Hiding Based on Smart Boundary Adjustment.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

An Efficient Algorithm for Protecting and Authenticating Medical Image.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Efficient and effective NIDS for cloud virtualization environment.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Prediction-Based Lossless Data Hiding by Adaptive Coefficient-Bias Algorithm.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

AOS: An optimized sandbox method used in behavior-based malware detection.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

2010
Iterative QR Decomposition Architecture Using the Modified Gram-Schmidt Algorithm for MIMO Systems.
IEEE Trans. on Circuits and Systems, 2010

Low-power design of variable block-size LDPC decoder using nanometer technology.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Reversible Watermarking by Coefficient Adjustment Method.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A (2, 3) Threshold Secret Sharing Scheme Using Sudoku.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Authentication and Protection for Medical Image.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2009
Holography: A Hardware Virtualization Tool for Malware Analysis.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Iterative QR Decomposition Architecture using the Modified Gram-Schmidt Algorithm.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Multipurpose Watermarking Method Based on Blind Vector Quantization.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Palette Partition Based Data Hiding for Color Images.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Collaborative knowledge semantic graph image search.
Proceedings of the 17th International Conference on World Wide Web, 2008

Towards Adaptive Covert Communication System.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Multipurpose Image Authentication Method based on Vector Quantization.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Multi-Purpose Image Watermarking Method Based on Wavelet Transform.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Using Semantic Graphs for Image Search.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems.
Proceedings of the Detection of Intrusions and Malware, 2008

2007
Image Authentication Scheme for Resisting JPEG, JPEG2000 Compression and Scaling.
IEICE Transactions, 2007

Signal-Statistics-Based Look-Up-Table Spacing for Power Amplifier Linearization.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

2006
Joint Polynomial and Look-Up-Table Predistortion Power Amplifier Linearization.
IEEE Trans. on Circuits and Systems, 2006

A Novel OoS-aware Routing for ad hoc Networks.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

2003
Applying projection and B-spline to image authentication and remedy.
IEEE Trans. Consumer Electronics, 2003

1996
A relaxed primal-dual path-following algorithm for linear programming.
Annals OR, 1996


  Loading...