Mu-En Wu

Orcid: 0000-0002-4839-3849

According to our database1, Mu-En Wu authored at least 89 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MSF-Net: Multi-Scale Feedback Reconstruction for Guided Depth Map Super-Resolution.
IEEE Trans. Circuits Syst. Video Technol., February, 2024

2023
An evaluation of deep learning models for chargeback Fraud detection in online games.
Clust. Comput., April, 2023

Mining skyline frequent-utility patterns from big data environment based on MapReduce framework.
Intell. Data Anal., 2023

The effective skyline quantify-utility patterns mining algorithm with pruning strategies.
Comput. Sci. Inf. Syst., 2023

Enhancing Abnormal-Behavior-Based Stock Trend Prediction Algorithm with Cost-Sensitive Learning Using Genetic Algorithms.
Proceedings of the Intelligent Information and Database Systems - 15th Asian Conference, 2023

Fuzzy-Based Factor Evaluation System for Momentum Overweight Trading Strategy.
Proceedings of the Intelligent Information and Database Systems - 15th Asian Conference, 2023

2022
Point Cloud Geometry Compression Based on Multi-Layer Residual Structure.
Entropy, November, 2022

Top-k dominating queries on incomplete large dataset.
J. Supercomput., 2022

Effective Fuzzy System for Qualifying the Characteristics of Stocks by Random Trading.
IEEE Trans. Fuzzy Syst., 2022

Predict the trend of economic indicators in time series based on recurrent neural network combined with leading indicators.
J. Intell. Fuzzy Syst., 2022

Informative index for investment based on Kelly criterion.
Enterp. Inf. Syst., 2022

Embedded draw-down constraint reward function for deep reinforcement learning.
Appl. Soft Comput., 2022

2021
Evolutionary ORB-based model with protective closing strategies.
Knowl. Based Syst., 2021

An IoT-Based Hedge System for Solar Power Generation.
IEEE Internet Things J., 2021

A secure authenticated and key exchange scheme for fog computing.
Enterp. Inf. Syst., 2021

Portfolio management system in equity market neutral using reinforcement learning.
Appl. Intell., 2021

Forecasting System for Solar-Power Generation.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2021

A Transparently-Secure and Robust Stock Data Supply Framework for Financial-Technology Applications.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021

Forecasting Stock Trend Based on the Constructed Anomaly-Patterns Based Decision Tree.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021

2020
Embedded draw-down constraint using ensemble learning for stock trading.
J. Intell. Fuzzy Syst., 2020

A framework of deep reinforcement learning for stock evaluation functions.
J. Intell. Fuzzy Syst., 2020

Analysis of Kelly betting on finite repeated games.
Appl. Math. Comput., 2020

Portfolio Management System with Reinforcement Learning.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

Threshold-Adjusted ORB Strategies with Genetic Algorithm and Protective Closing Strategy on Taiwan Futures Market.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

On the Design of Profitable Index Based on the Mechanism of Random Tradings.
Proceedings of the Intelligent Information and Database Systems - 12th Asian Conference, 2020

2019
Empirical Evaluations on Momentum Effects of Taiwan Index Futures via Stop-Loss and Stop-Profit Mechanisms.
Int. J. Inf. Technol. Decis. Mak., 2019

Seal imprint verification via feature analysis and classifications.
Future Gener. Comput. Syst., 2019

Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets.
IEEE Access, 2019

An Effective Approach for Obtaining a Group Trading Strategy Portfolio Using Grouping Genetic Algorithm.
IEEE Access, 2019

An Evolutionary-based Algorithm for Multi-Period Grouping Stock Portfolio Optimization.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks.
Proceedings of the Genetic and Evolutionary Computing, 2019

A Multiobjective-Based Group Trading Strategy Portfolio Optimization Technique.
Proceedings of the Genetic and Evolutionary Computing, 2019

Modified ORB Strategies with Threshold Adjusting on Taiwan Futures Market.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019

A Divide-and-Conquer-based Approach for Diverse Group Stock Portfolio Optimization Using Island-based Genetic Algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

A Framework of Applying Kelly Stationary Index to Stock Trading in Taiwan Market.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

On the Analysis of Kelly Criterion and Its Application.
Proceedings of the Intelligent Information and Database Systems - 11th Asian Conference, 2019

2018
A shareable keyword search over encrypted data in cloud computing.
J. Supercomput., 2018

A Novel Approach of Option Portfolio Construction Using the Kelly Criterion.
IEEE Access, 2018

A Sophisticated Optimization Algorithm for Obtaining a Group Trading Strategy Portfolio and Its Stop-Loss and Take-Profit Points.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Oblivious Transfer Protocols Based on Commutative Encryption.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Forged Seal Imprint Identification Based on Regression Analysis on Imprint Borders and Metrics Comparisons.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Applied attention-based LSTM neural networks in stock prediction.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Framework of Option Buy-Side Strategy with Simple Index Futures Trading Based on Kelly Criterion.
Proceedings of the 5th International Conference on Behavioral, 2018

A Novel Approach for Option Trading Based on Kelly Criterion.
Proceedings of the Intelligent Information and Database Systems - 10th Asian Conference, 2018

2017
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud.
J. Signal Process. Syst., 2017

Using trading mechanisms to investigate large futures data and their implications to market trends.
Soft Comput., 2017

Online Learning Problems against Dynamic Strategies in Gradually Evolving Worlds.
J. Inf. Hiding Multim. Signal Process., 2017

Comments on a privacy preserving public auditing mechanism for shared cloud data.
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017

A GGA-based Algorithm for Group Trading Strategy Portfolio Optimization.
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017

Password-Based Authenticated Key Exchange from Lattices for Client/Server Model.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Decentralized E-Voting Systems Based on the Blockchain Technology.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
On the Study of Trading Strategies Within Limited Arbitrage Based on SVM.
Proceedings of the Genetic and Evolutionary Computing, 2016

Numerical Evaluation of Two Management Schemes for Sharing Limited Bandwidth.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2015
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. Univers. Comput. Sci., 2015

An atomic routing game for multi-class communication networks with quality of service requirements.
Proceedings of the 24th Wireless and Optical Communication Conference, 2015

An Empirical Comparison between Kelly Criterion and Vince's Optimal F.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Empirical Evaluations on Momentum Effects of Taiwan Index Futures Market.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Resisting Dynamic Strategies in Gradually Evolving Worlds.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A KL Divergence Function for Randomized Secret Shares.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

An Adaptive Kelly Betting Strategy for Finite Repeated Games.
Proceedings of the Genetic and Evolutionary Computing, 2015

Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015

Perspectives of Bandwidth Sharing Schemes in Communication Systems with Blocking.
Proceedings of the ASE BigData & SocialInformatics 2015, 2015

2014
A communication-efficient private matching scheme in Client-Server model.
Inf. Sci., 2014

On the improvement of Fermat factorization using a continued fraction technique.
Future Gener. Comput. Syst., 2014

CRFID: An RFID system with a cloud database as a back-end server.
Future Gener. Comput. Syst., 2014

A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2014

Security Analysis and Improvement of Femtocell Access Control.
Proceedings of the Network and System Security - 8th International Conference, 2014

An Improved Visual Cryptography with Cheating Prevention.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A Methodology for Hook-Based Kernel Level Rootkits.
Proceedings of the Information Security Practice and Experience, 2014

Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

On the design of trading schemes of equity funds based on random traders.
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014

2013
Rating Equity Funds against Return of Random Traders.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks.
ACM Trans. Sens. Networks, 2012

On the Improvement of Fermat Factorization.
Proceedings of the Network and System Security - 6th International Conference, 2012

Cryptanalysis of Exhaustive Search on Attacking RSA.
Proceedings of the Network and System Security - 6th International Conference, 2012

Making Profit in a Prediction Market.
Proceedings of the Computing and Combinatorics - 18th Annual International Conference, 2012

2009
Trading decryption for speeding encryption in Rebalanced-RSA.
J. Syst. Softw., 2009

Short-Exponent RSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Simple Backdoors on RSA Modulus by Using RSA Vulnerability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A Note on Factoring alpha-LSBS Moduli.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A Pair-wise Key Establishment for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
IACR Cryptol. ePrint Arch., 2008

On the Improvement of the BDF Attack on LSBS-RSA.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Dual RSA and Its Security Analysis.
IEEE Trans. Inf. Theory, 2007

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2005
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent.
IACR Cryptol. ePrint Arch., 2005


  Loading...