Hung-Yu Lin

According to our database1, Hung-Yu Lin authored at least 20 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A ROS-based Agricultural AI-Driven AGV (A3GV) with Collaboration and Guiding from Drones in the Outdoor Farming Fields.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Decentralized H<sub>∞</sub> Observer-Based Attack-Tolerant Formation Tracking Network Control of Large-Scale LEO Satellites via HJIE-Reinforced Deep Learning Approach.
IEEE Access, 2023

2022
Minimizing Age-of-Information of NVRAM-based Intermittent Systems.
Proceedings of the 11th IEEE Non-Volatile Memory Systems and Applications Symposium, 2022

2019
A 37 to 40 GHz Transceiver for Fifth Generation Communication Systems.
Proceedings of the 9th IEEE International Conference on Consumer Electronics, 2019

2018
Fusion of Infrared Thermal Image and Visible Image for 3D Thermal Model Reconstruction Using Smartphone Sensors.
Sensors, 2018

A 39 GHz Power Amplifier Design with 19.6 dBm Linear Power for Fifth Generation Communications.
Proceedings of the IEEE 7th Global Conference on Consumer Electronics, 2018

2014
Analysis of the psychological traits, Facebook usage, and Facebook addiction model of Taiwanese university students.
Telematics Informatics, 2014

A Web API Aggregation Service for Mobile Mashup Applications.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2012
An 8 × 8 20 Gbps Reconfigurable Load Balanced TDM Switch IC for High-Speed Networking.
J. Signal Process. Syst., 2012

2007
A Scalable Load Balanced Birkhoff-von Neumann Symmetric TDM Switch IC for High-Speed Networking Applications.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

1999
Authentication protocols with nonrepudiation services in personal communication systems.
IEEE Commun. Lett., 1999

1995
Fair Reconstruction of a Secret.
Inf. Process. Lett., 1995

Authentication Protocols for Personal Communication Systems.
Proceedings of the ACM SIGCOMM 1995 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Cambridge, MA, USA, August 28, 1995

1993
Key management for decentralized computer network services.
IEEE Trans. Commun., 1993

1992
A software authentication system for information integrity.
Comput. Secur., 1992

An l-Span Generalized Secret Sharing Scheme.
Proceedings of the Advances in Cryptology, 1992

A Software Authentication System for the Prevention of Computer Viruses.
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992

1991
A Generalized Secret Sharing Scheme With Cheater Detection.
Proceedings of the Advances in Cryptology, 1991

On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets.
Proceedings of the Advances in Cryptology, 1991

1990
A cryptographic key generation scheme for multilevel data security.
Comput. Secur., 1990


  Loading...