Hsin-Lung Wu

Orcid: 0000-0002-1129-3668

According to our database1, Hsin-Lung Wu authored at least 31 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Block-Wise Separable Convolutions: An Alternative Way to Factorize Standard Convolutions.
IEEE Access, 2024

2023
New Coarse-to-Fine Approaches for Age Estimation Based on Separable Convolutions.
IEEE Access, 2023

2022
Grayscale-Invariant Reversible Data Hiding Based on Multiple Histograms Modification.
IEEE Trans. Circuits Syst. Video Technol., 2022

Efficient Provably Algorithms for Boundary Bin-Pair Selection Problem.
J. Inf. Sci. Eng., 2022

2021
On the Communication Complexity of AND Functions.
IEEE Trans. Inf. Theory, 2021

Exploring More Capacity for Grayscale-Invariance Reversible Data Hiding.
IEEE Access, 2021

2018
The Log-Rank Conjecture for Read- k XOR Functions.
J. Inf. Sci. Eng., 2018

A New Approximation Algorithm for the d-dimensional Knapsack Problem Based on Hopfield Networks.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

2017
A separable reversible data hiding scheme for encrypted JPEG bitstreams.
Signal Process., 2017

Compression-Efficient Reversible Data Hiding in Zero Quantized Coefficients of JPEG Images.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

2016
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off Between Time and Memory.
J. Inf. Sci. Eng., 2016

A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Reversible Data Hiding in Pairwisely Encrypted Images.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2014
On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization Table.
Proceedings of the Intelligent Systems and Applications, 2014

2013
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

2012
Constructing Constant Composition Codes via Distance-Increasing Mappings.
SIAM J. Discret. Math., 2012

An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper Detection.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
Decoding permutation arrays with ternary vectors.
Des. Codes Cryptogr., 2011

Complexity of Hard-Core Set Proofs.
Comput. Complex., 2011

A New Scheme for Data Hiding on Halftone Images.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
On the Hardness against Constant-Depth Linear-Size Circuits.
Discret. Math. Algorithms Appl., 2010

Efficient decoding algorithm for constant composition codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
A Hybrid RFID Protocol against Tracking Attacks.
IACR Cryptol. ePrint Arch., 2009

Distance-increasing mappings from binary vectors to constant composition vectors.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
On the Complexity of Hardness Amplification.
IEEE Trans. Inf. Theory, 2008

Simple Distance-Preserving Mappings From Ternary Vectors to Permutations.
IEEE Trans. Inf. Theory, 2008

2007
Improved hardness amplification in NP.
Theor. Comput. Sci., 2007

On the Complexity of Hard-Core Set Constructions.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Impossibility Results on Weakly Black-Box Hardness Amplification.
Proceedings of the Fundamentals of Computation Theory, 16th International Symposium, 2007

2006
On the Construction of Permutation Arrays via Mappings from Binary Vectors to Permutations.
Des. Codes Cryptogr., 2006

2005
On the Jensen-Shannon Divergence and Variational Distance.
IEEE Trans. Inf. Theory, 2005


  Loading...