Jen-Chun Chang

According to our database1, Jen-Chun Chang authored at least 30 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Smart bird identification system based on a hybrid approach: Petri nets, convolutional neural and deep residual networks.
Multim. Tools Appl., April, 2024

2022
A Highly Secure IoT Firmware Update Mechanism Using Blockchain.
Sensors, 2022

2020
Improving Retrieval Efficiency of Person Re-Identification Based on Resnet50.
Proceedings of the ICFET 2020, 2020

2018
The Log-Rank Conjecture for Read- k XOR Functions.
J. Inf. Sci. Eng., 2018

A New Approximation Algorithm for the d-dimensional Knapsack Problem Based on Hopfield Networks.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

2017
A separable reversible data hiding scheme for encrypted JPEG bitstreams.
Signal Process., 2017

Compression-Efficient Reversible Data Hiding in Zero Quantized Coefficients of JPEG Images.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

2016
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off Between Time and Memory.
J. Inf. Sci. Eng., 2016

A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Reversible SMVQ Image Hiding Using Adaptive Search Order Coding.
Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, 2016

Reversible Data Hiding in Pairwisely Encrypted Images.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2014
On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization Table.
Proceedings of the Intelligent Systems and Applications, 2014

2013
On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

2012
Constructing Constant Composition Codes via Distance-Increasing Mappings.
SIAM J. Discret. Math., 2012

An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper Detection.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
A New Scheme for Data Hiding on Halftone Images.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Efficient decoding algorithm for constant composition codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
A Hybrid RFID Protocol against Tracking Attacks.
IACR Cryptol. ePrint Arch., 2009

Distance-increasing mappings from binary vectors to constant composition vectors.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations.
IEEE Trans. Inf. Theory, 2008

2007
New Constructions of Distance-Increasing Mappings and Permutation Arrays.
J. Inf. Sci. Eng., 2007

Distance preserving mappings from ternary vectors to permutations
CoRR, 2007

2006
Distance-increasing mappings from binary vectors to permutations that increase hamming distances by at least two.
IEEE Trans. Inf. Theory, 2006

New simple constructions of distance-increasing mappings from binary vectors to permutations.
Inf. Process. Lett., 2006

New Algorithms of Distance-Increasing Mappings from Binary Vectors to Permutations by Swaps.
Des. Codes Cryptogr., 2006

2005
Application-Layer conference trees for multimedia multipoint conferences using megaco/H.248.
IEEE Trans. Multim., 2005

Distance-increasing mappings from binary vectors to permutations.
IEEE Trans. Inf. Theory, 2005

2003
Distance-preserving mappings from binary vectors to permutations.
IEEE Trans. Inf. Theory, 2003

An Efficient Algorithm for the Reliability of Consecutive-k-n Networks.
J. Inf. Sci. Eng., 2003

2001
Application-Layer Conference Trees for Multimedia Multipoint Conferences Using Megaco/H.248.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001


  Loading...