Yu-Yuan Chen

According to our database1, Yu-Yuan Chen authored at least 15 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Knowledge Navigated Quantum-inspired Tabu Search Algorithm for Reversible Circuit Synthesis.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

2020
Partner Up: A Deep Learning Method for Predicting the Success of Social Media Influencer Collaboration.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

2019
Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2016
A hardware-based technique for efficient implicit information flow tracking.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016

2015
Vehicle yaw motion control based on front-wheel lateral force tracking.
Proceedings of the American Control Conference, 2015

2014
Vector control of current source inverter-fed axial-flux permanent magnet motors with space vector pulse width modulation.
Proceedings of the 23rd IEEE International Symposium on Industrial Electronics, 2014

2012
Physical attack protection with human-secure virtualization in data centers.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

A software-hardware architecture for self-protecting data.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Rapid single-chip secure processor prototyping on the OpenSPARC FPGA platform.
Proceedings of the 22nd IEEE International Symposium on Rapid System Prototyping, 2011

2010
Processor accelerator for AES.
Proceedings of the IEEE 8th Symposium on Application Specific Processors, 2010

General-purpose FPGA platform for efficient encryption and hashing.
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010

A framework for testing hardware-software security architectures.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Hardware-Assisted Application-Level Access Control.
Proceedings of the Information Security, 12th International Conference, 2009

2002
A secure data hiding scheme for binary images.
IEEE Trans. Commun., 2002

2000
A Secure Data Hiding Scheme for Two-Color Images.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000


  Loading...