Wen-Chuan Lee

According to our database1, Wen-Chuan Lee authored at least 39 papers between 1999 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

What Do You See?: Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

2019
Programming support for autonomizing software.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

NIC: Detecting Adversarial Samples with Neural Network Invariant Checking.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

White-Box Program Tuning.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2019

ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
MODE: automated neural network model debugging via state differential analysis and input selection.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Trojaning Attack on Neural Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
LAMP: data provenance for graph based machine learning algorithms through derivative computation.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

PAD: programming third-party web advertisement censorship.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

2015
Computational procedure of performance assessment of lifetime index of normal products with fuzzy data under the type II right censored sampling plan.
J. Intell. Fuzzy Syst., 2015

RAIVE: runtime assessment of floating-point instability by vectorization.
Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, 2015

2014
Computational procedure of lifetime performance index of products for the Burr XII distribution with upper record values.
Appl. Math. Comput., 2014

2013
Reply to "open problem of fuzzy confidence interval for fuzzy process capability index".
J. Intell. Fuzzy Syst., 2013

Evaluating the Lifetime Performance Index Based on the Bayesian Estimation for the Rayleigh Lifetime Products with the Upper Record Values.
J. Appl. Math., 2013

2012
Computational Procedure of Performance Assessment of Lifetime Index of Products for the Weibull Distribution with the Progressive First-Failure-Censored Sampling Plan.
J. Appl. Math., 2012

Computational procedure of optimal inventory model involving controllable backorder rate and variable lead time with defective units.
Int. J. Syst. Sci., 2012

2011
Computational procedure of assessing lifetime performance index of Weibull lifetime products with the upper record values.
Math. Comput. Simul., 2011

Assessing the lifetime performance index of Rayleigh products based on the Bayesian estimation under progressive type II right censored samples.
J. Comput. Appl. Math., 2011

Inferences on the lifetime performance index for Weibull distribution based on censored observations using the max <i>p</i>-value method.
Int. J. Syst. Sci., 2011

2010
Automatic generation of software TLM in multiple abstraction layers for efficient HW/SW co-simulation.
Proceedings of the Design, Automation and Test in Europe, 2010

2009
Assessing the lifetime performance index of products from progressively type II right censored data using Burr XII model.
Math. Comput. Simul., 2009

Assessing the lifetime performance index of products with the exponential distribution under progressively type II right censored samples.
J. Comput. Appl. Math., 2009

2007
Computational algorithmic procedure of optimal inventory policy involving a negative exponential crashing cost and variable lead time demand.
Appl. Math. Comput., 2007

Computational comparison of prediction intervals of future observation for two-parameter exponential distribution.
Appl. Math. Comput., 2007

Computational comparison of the prediction intervals of future observation for three-parameter Pareto distribution with known shape parameter.
Appl. Math. Comput., 2007

Computational comparison of prediction future lifetime of electronic components with Pareto distribution based on multiply type II censored samples.
Appl. Math. Comput., 2007

Computational algorithmic procedure for optimal inventory policy involving ordering cost reduction and back-order discounts when lead time demand is controllable.
Appl. Math. Comput., 2007

2006
Computational comparison for ML estimator of quadratic functions of the Bernoulli parameter in IS and FSS methods.
Appl. Math. Comput., 2006

Computational comparison for weighted moments estimators and BLUE of the scale parameter of a Pareto distribution with known shape parameter under type II multiply censored sample.
Appl. Math. Comput., 2006

Computational algorithm of least absolute deviation method for determining number of outliers under normality.
Appl. Math. Comput., 2006

Computational algorithm for inventory model with a service level constraint, lead time demand with the mixture of distributions and controllable negative exponential backorder rate.
Appl. Math. Comput., 2006

2005
Prediction intervals of future observation from one-parameter exponential distribution based on multiply type II censored samples.
Appl. Math. Comput., 2005

Inventory model involving controllable backorder rate and variable lead time demand with the mixtures of distribution.
Appl. Math. Comput., 2005

2000
An Eoq Inventory Model with Time-varying Demand and Weibull Deterioration with Shortages.
Int. J. Syst. Sci., 2000

An Eoq Model for Deteriorating Items with Time-varying Demand and Shortages.
Int. J. Syst. Sci., 2000

1999
A neural networks-based approach for strategic planning.
Inf. Manag., 1999


  Loading...