Publication.html
Yi-Hui Chen*, Min-Chun Huang, "Fine-grained Encrypted Image Retrieval in Cloud Environment," Mathematics , Vol. 12, No. 1, 114, pp. 1-19, 28 December 2023; https://doi.org/10.3390/math12010114 (SCI) | |
Yi-Hui Chen, Eric Jui-Lin Lu*, Jin-De Lin, "Enhancing SPARQL Query Performance With Recurrent Neural Networks," IEEE Access, Vol. 11, pp. 92209-92224, Aug. 2023. (SCI) | |
Ho-Chang Kuo, Shih-Hsin Chen, Yi-Hui Chen, Yu-Chi Lin, Chih-Yung Chang, Yun-Cheng Wu, Tzai-Der Wang, Ling-Sai Chang, I-Hsin Tai, Kai-Sheng Hsieh, "Detection of coronary lesions in Kawasaki disease by Scaled-YOLOv4 with HarDNet backbone," Frontiers in Cardiovascular Medicine, vol. 9, no. 1000374, pp. 1-10, Jan. 2023. (SCI) | |
Yi-Hui Chen, Eric Jui-Lin Lu*, Ying-Yen Lin, "Efficient SPARQL Queries Generator for Question Answering Systems," IEEE Access, Vol. 10, pp. 99850-99860, Sep. 2022. (SCI) | |
Yi-Hui Chen, Jia-Ye Lee, Ming-Hsien Chiang and Shih-Hsin Chen, "Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix," Symmetry, 14, 1445. https://doi.org/10.3390/sym14071445, July 2022. (SCI) | |
Pei-Yu Lin, Wen-Shao Lan, Yi-Hui Chen* and Wen-Chuan Wu, "A Confidential QR Code Approach with Higher Information Privacy," Entropy, 24(2): 284. https://doi.org/10.3390/e24020284, Feb. 2022. (SCI) | |
Yi-Hui Chen, Pei-Yu Lin, Hsin-Pei Wu* and Shih-Hsin Chen, "Joint Hamming Coding for High Capacity Lossless Image Encryption and Embedding Scheme ," Applied Sciences, 12(4), 1966; https://doi.org/10.3390/app12041966, Feb. 2022. (SCI) | |
Yi-Hui Chen, Eric Jui-Lin Lu*, Ting-An Ou, "Intelligent SPARQL Query Generation for Natural Language Processing Systems," IEEE Access, Vol. 9, pp. 158638-158650, Dec. 2021. (SCI) | |
Shih-Hsin Chen, Chun-Wei Wang, I-Hsin Tai, Ken-Pen Weng, Yi-Hui Chen*, Kai-Sheng Hsieh (2021). "Modified YOLOv4-DenseNet Algorithm for Detection of Ventricular Septal Defects in Ultrasound Images " International Journal of Interactive Multimedia and Artificial Intelligence, Vol. 6, No. 7, pp. 101-108, Sep. 2021. (SCI, 2019 Impact Factor: 2.561. Rank: 63/136 (0.46) in the subject category of Category COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE. ) | |
Yi-Hui Chen, Eric Jui-Lin Lu* and Ya-Wen Cheng, "Categorization of Multiple Documents Using Fuzzy Overlapping Clustering Based on Formal Concept Analysis," International Journal of Software Engineering and Knowledge Engineering, Vol. 30, No. 05, pp. 631-647, 2020. (SCI) | |
Shih-Hsin Chen, Yeong-Cheng Liou, Yi-Hui Chen* and Kun-Ching Wang, "Order Acceptance and Scheduling Problem with Carbon Emission Reduction and Electricity Tariffs on a Single Machine", Sustainability, Vol. 11, No. 19, pp. 1-16, Sep. 2019. (SCI) | |
Yi-Hui Chen, Eric Jui-Lin Lu* and Ping-Jung Chen, "Fine-grained Image Authorization Mechanism for Image Management Systems," Journal of Internet Technology, Vol. 19, No. 6, pp. 1919-1927, 2018. (SCI) | |
Pei Yu Lin and Yi-Hui Chen*, "High Payload Secret Hiding Technology for QR Codes," EURASIP Journal on Image and Video Processing, Vol. 14, pp. 1-8, Feb. 2017. (SCI) | |
Ying-Hsuan Huang, Ching-Chun Chang and Yi-Hui Chen*, "Hybrid Secret Hiding Schemes Based on Absolute Moment Block Truncation Coding," Multimedia Tools and Applications, Vol. 76, No. 5, pp. 6159–6174, 2017. (SCI) | |
Yi-Hui Chen, Eric Jui-Lin Lu*, Shiuan-Yin Huang, and Yao-Tsan Chang, "RDF-Chord: A hybrid PDMS for P2P systems," Computer Standards Interfaces, Vol. 43, pp.53-67, 2016. (SCI) | |
Ing-Chau Chang, Eric Jui-Lin Lu*, Shiuan-Yin Huang, Yi-Hui Chen, "An RDF-based P2P Overlay Network Supporting Range and Wildcard Queries," Journal of Network and Computer Applications, vol. 46, pp.124-138, 2014. (SCI) | |
Yi-Hui Chen, Eric Jui-Lin Lu and Meng Fang Tsai, "Finding Keywords in Blogs: Efficient Keyword Extraction in Blog Mining via User Behaviors," Expert Systems with Applications, Vol. 41, No. 2, pp. 663-670, 2014. (SCI) | |
Jen-Ho Yang, Ya-Fen Chang, Yi-Hui Chen, "An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment," Information Technology and Control, Vol. 42, No. 4, pp. 315-324, 2013. (SCI) | |
Yin-Jen Chiang, Pei-Yu Lin, Ran-Zan Wang and Yi-Hui Chen, "Blind QR Code Steganographic Approach Based upon Error Correction Capability," KSII Transactions on Internet and Information System, vol. 7, no. 10, pp. 2527-2543, Oct. 2013. (SCI) | |
Pei-Yu Lin, Yi-Hui Chen, Chin-Chen Chang and Jung-San Lee, "Contrast-Adaptive Removable Visible Watermarking (CARVW) Mechanism," Image and Vision Computing, vol. 31, no. 4. pp. 311-321, April 2013. (SCI) | |
Chin-Chen Chang, Yi-Hui Chen* and Hsin-Chi Wang, “Meaningful Secret Sharing Technique with Authentication and Remedy Abilities,” Information Sciences, Vol. 181, No. 14, pp. 3073–3084, 2011. (SCI) | |
Henry Chang, Tyrone Grandison, Pei-Yun Hsueh, Liangzhao Zeng, XinXin Zhu, Yi-Hui Chen, Ci-Wei Lan, Mark JH Hsiao, Hao-ting Pai, "Privacy and Security Protection for Evidence Use on Wellness Cloud," Accepted by IBM Journal, 2011. (SCI) | |
Chin-Chen Chang, Chia-Chen Lin and Yi-Hui Chen, "Hiding Data in Color Palette Images with Hybrid Strategies," Imaging Science Journal, Vol. 57, No. 1, pp. 19-29, Feb. 2009. (SCI, EI). | |
Chia-Chen Lin, Yi-Hui Chen and Chin-Chen Chang, "LSB-based High-Capacity Data Embedding Scheme for Images," International Journal of Innovational Computing and Information Control (IJICIC), Vol. 5, No. 11(B), pp. 4283-4289, Nov. 2009. (SCI) | |
Chin-Chen Chang, Yi-Hui Chen and Chia-Chen Lin, "A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding," Soft Computing, vol. 13, no. 4, pp. 321-331, 2009. (SCI) | |
Chin-Chen Chang, Chia-Chen Lin and Yi-Hui Chen, "Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies," Fundamenta Informaticae, vol. 88, no. 1-2, pp. 23-45, 2008. (SCI) | |
Chin-Chen Chang, Chia-Chen Lin, C. H. Lin and Yi-Hui Chen, "A Novel Secret Image Sharing Scheme in Color Images Using Small Shadow Images," Information Sciences, vol. 178, no. 11, pp. 2433-2447, 2008. (SCI) | |
Chin-Chen Chang, Wen-Chuan Wu, and Yi-Hui Chen, "Joint Coding and Embedding Techniques for Multimedia Images," Information Sciences, vol. 178, no. 18, pp. 3543-3556, 2008. (SCI) | |
Yi-Hui Chen, Chin-Chen Chang and Chia-Chen Lin, "Adaptive Data Embedding Using VQ and Clustering," International Journal of Innovational Computing and Information Control (IJICIC)," vol. 3, no. 6(A), pp. 1471-1485, Dec. 2007. (SCI) | |
Eric Jui-Lin Lu and Yi-Hui Chen, "The Design of A Delegable SCORM Conformant Learning Management System," Journal of Computer Assisted Learning, vol. 22, no. 6, pp. 423-436, Dec. 2006. (SSCI) | |
Eric Jui-Lin Lu and Yi-Hui Chen, "A Flexible Delegation Processor for Web-based Information Systems," Computer Standards and Interfaces, vol. 27, no. 3, pp. 241-256, March 2005. (SCI) |
Yi-Hui Chen, Eric Jui-Lin Lu, Jeng Jie Huang, Chinese Unknown Words Extraction for Incomplete Sentences, International Journal of Network Security, Vol. 24, No. 4, pp.755-764, July 2022. (EI) | |
Cheng-Ying Lin, Li-Chin Huang, Yi-Hui Chen, and Min-Shiang Hwang, "Research on Security and Performance of Blockchain with Innovation Architecture Technology," International Journal of Network Security, Vol. 23, No. 1, pp. 1-8, Jan. 2021. (EI) | |
Yi-Hui Chen, Hung-Wei Yang, Iuon-Chang Lin, and Min-Shiang Hwang, "Research on the Secure Financial Surveillance Blockchain Systems, " International Journal of Network Security, Vol. 22, No. 4, pp. 708-716, July 2020. (EI) | |
Yi-Hui Chen, Eric Jui-Lin Lu*, Chu-Fan Wang, "Light-Weight Selective Image Encryption for Privacy Preservation," Journal of Electronic Science and Technology, Vol. 18, No. 3, pp. 234-240, 2020. (EI) | |
Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai and I-Chun Weng, "Repairable Image Authentication Scheme," International Journal of Network Security, Vol.17, No.4, PP.439-444, July 2015. (EI) | |
Yi-Hui Chen, Panyaporn Prangjarote and Chih-Yang Lin, "Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images," International Journal of Network Security, Vol.16, No.6, PP.536-540, pp. 536-540, Nov. 2014. (EI) | |
Chin-Chen Chang, Yi-Hui Chen and Lin-Yi Chuang,“Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques,”Journal of Information Hiding and Multimedia Signal Processing, Vol. 5, No. 3, pp. 342-356, July 2014. (EI) | |
Chia-Chen Lin, Chin-Chen Chang and Yi-Hui Chen, "A Novel SVD-based Watermarking Scheme for Protecting Rightful Ownership of Digital Images," Journal of Information Hiding and Multimedia Signal Processing, Volume 5, Number 2, pp. 124-143, April 2014. (EI) | |
Chi-Shiang Chan, Yi-Hui Chen, and Yuan-Yu Tsai, "An Improvement of Square Matrix Encoding by Adjusting Digits in Matrix," International Journal of Network Security, Vol.16, No.6, PP.525-529, Nov. 2014. (EI) | |
Yi-Hui Chen and Pei-Yun Lin, "Authentication Mechanism for Secret Sharing Using a Boolean Operation,"Journal of Electronic Science and Technology, Vol. 10, No. 3, pp. 195-198, 2012. (EI) | |
Chia-Chen Lin, Chin-Chen Chang and Yi-Hui Chen, "A Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors," Journal of Electronic Science and Technology, Vol. 10, No. 3, pp.238-249, 2012. (EI) | |
Yi-Hui Chen and Chin-Chen Chang, "Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy," Journal of Digital Information Management, Vol. 10, No. 1, pp.39-49, Feb. 2012.(EI). | |
Yi-Hui Chen*, “An Efficient Authentication Mechanism for (2, 2)-Visual Cryptography Scheme,”Journal of Computers, Vol. 22, No. 4, pp. 3-10, 2012 (EI). | |
Yi-Hui Chen*, Chiao-Chih Huang and Chi-Shiang Chan, “Double-Layer Data Embedding Scheme Based on Three-Pixel Differences,” Journal of Electronic Science and Technology, Vol. 9, No. 4, pp. 297-300, Dec. 2011 (EI). | |
Chin-Chen Chang, Yi-Hui Chen and The Duc Kieu, "A Watermarking Technique Using Synonym Substitution for Integrity Protection of XML Documents," ICIC Express Letters, Vol. 4, No.1, pp. 89-94, Feb. 2010. (EI) | |
Chin-Chen Chang, Chia-Chen Lin and Yi-Hui Chen "A Reversible Data Embedding Scheme Using Differences Between Original and Predicted Pixel Values," IET Information Security, vol. 2, no. 2, pp. 35-46, 2008. (EI) | |
Chin-Chen Chang, H. C. Tsai, and Yi-Hui Chen, "An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards," International Journal of Security and Its Applications, vol. 1, no. 2, pp. 33-40, 2007. (EI) | |
Shih-Yu Chou, Eric Jui-Lin Lu, and Yi-Hui Chen, "X-RDR: A Role-based Delegation Processor for Web-based Information Systems," ACM Operating Systems Review, vol. 39, no. 1, Jan. 2005, pp. 4-21. (EI) | |
Yi-Hui Chen and Eric Jui-Lin Lu, "The Design of a Secure Fine-Grained Official Document Exchange Model for e-Government," Information & Security, vol. 15, no. 1, pp. 55-71, 2004. |
Yi-Hui Chen, Meng-Yu Tsai, Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models, 2024 6th International Conference on Image, Video and Signal Processing (IVSP2024), March 14-16, 2024, Ikuta, Japan, 2024. | |
Yi-Hui Chen, Cheng-I Hsieh, Video Access Control Aligned with Health Education Classification, 2023 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2023), December 7-9, 2023, New Taipei City, Taiwan, 2023. | |
Pei-Yu Lin, Yi-Hui Chen, Wen-Chuan Wu, Yu-Tzu Huang and Ya-Fen Chang, Comments on the graphic binary QR code blending, SITAIBA2021, 2021. | |
Yi-Hui Chen, Pei-Yu Lin, High Capacity in Reversible Data Embedding Scheme for Encrypted Images Using Hamming Coding, ACIS International SNPD 2021 Fall, 2021. | |
Shih-Hsin Chen, Yi-Hui Chen, Jo-Hsin Shih, Wen-Ru Li, Ru-Yi Zhang, Yun-Chiao Chen, Wan-Ru Tsai, Echocardiography Object Detection of Congenital Heart Disease, TSBME 2021, 2021, Taichung, Taiwan. (local conference) | |
Yi-Hui Chen, Eric Jui-Lin Lu*, Sheng-Chia Lin, Ontology-based Dynamic Semantic Annotation for Social Image Retrieval, the 5th International Workshop on Mobile Data Management, Mining, and Computing on Social Networks (MobiSocial 2020), 2020. | |
Pei-Yu Lin and Yi-Hui Chen, "QR Code Steganography with Secret Payload Enhancement", ICME2016 MMC workshop, Seattle, 2016 | |
Yi-Hui Chen, Eric Jui-Lin Lu, and Sheng-Jia Lin, "Exploiting Semantic Connectivity in Redefined Data Representation for Image Retrieval," BigMM2016, Taipei, 2016. | |
Yi-Hui Chen, Ching-Hu Lu and Po-Yu Hsu, "Multilayered Information Encryption Scheme with Fine-grained Authentication," APSIPA ASC 2015, Hong Kong, Dec. 2015. | |
Yi-Hui Chen, Chi-Shiang Chan, Po-Yu Hsu, and Wei-Lin Huang, "Tagged Visual Cryptography with Access Control," IEEE International Workshop on Mobile Multimedia Computing (MMC 2014) in conjunction with the 2014 IEEE International Conference on Multimedia Expo (ICME 2014), Chengdu, China, 2014. | |
Yi-Hui Chen, Eric Jui-Lin Lu and Chu-Fan Wang, "Privacy Image Protection Using Fine-grained Mosaic Technique ,"APSIPA ASC 2013, Kaohsing, Taiwan. | |
Pei-Yu Lin, Yi-Hui Chen, Ming-Chieh Hsu, Fu-Ming Juang, "Secret Sharing Mechanism with Cheater Detection," APSIPA ASC 2013, Kaohsing, Taiwan. | |
Wen-Chuan Wu, Zi-Wei Lin, Yi-Hui Chen, "A Vision-Based Navigation System for Tamsui Historical Buildings," APSIPA ASC 2013, Kaohsing, Taiwan. |
Yi-Hui Chen et al., "Adversarial Deep Fake on Social Multimedia for Real-time Conversation," Submitted to ICHMI, 4 April 2023. (conference) | |
Yi-Hui Chen, Eric Jui-Lin Lu and Jin-De Lin, "Boosting Question Answering Systems with Multi-Label Classification Techniques," Submitted to Soft Computing, 1 March 2023. |