default search action
Keng-Pei Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Keng-Pei Lin, Tzu-Lin Chang, Shih-Hung Tsai, Chih-Ya Shen:
Gaming Group Formation in Social Networks of Video Game Distribution Platforms. GCCE 2024: 799-800 - [c21]Tzu-Lin Chang, Keng-Pei Lin, Zong-Shun Chen:
Automatic Short-Answer Grading with a Pseudo-Siamese Neural Network. PACIS 2024 - 2023
- [j9]Cheng-Jung Yang, Wei-Kai Huang, Keng-Pei Lin:
Three-Dimensional Printing Quality Inspection Based on Transfer Learning with Convolutional Neural Networks. Sensors 23(1): 491 (2023) - [c20]Keng-Pei Lin, Tzu-Lin Chang, Ting-Ye Chen:
Facial Recognition in Celebrity Fan Art with Multi-Task Learning and Image Data Augmentation. GCCE 2023: 506-507 - 2020
- [j8]Cheng-Jung Yang, Ming-Huang Chen, Keng-Pei Lin, Yu-Jie Cheng, Fu-Chi Cheng:
Importing Automated Management System to Improve the Process Efficiency of Dental Laboratories. Sensors 20(20): 5791 (2020) - [c19]Yi-Wei Chang, Yu-Kai Hsiao, Chien-Chuan Ko, Rong-Show Shen, Wei-Yang Lin, Keng-Pei Lin:
A Grading System of Pot-Phalaenopsis Orchid Using YOLO-V3 Deep Learning Model. NBiS 2020: 498-507
2010 – 2019
- 2019
- [j7]Keng-Pei Lin, William S. Chao:
The Structure-Behavior Coalescence Approach for Systems Modeling. IEEE Access 7: 8609-8620 (2019) - [c18]Keng-Pei Lin, Yi-Wei Chang, Zhi-Hong Wei, Chih-Ya Shen, Ming-Yi Chang:
A Smart Contract-Based Mobile Ticketing System with Multi-Signature and Blockchain. GCCE 2019: 231-232 - [c17]Yu-Chen Yang, Yi-Syuan Ke, Weiwei Wu, Keng-Pei Lin, Yong Jimmy Jin:
Recommendation as a Service in Mergers and Acquisitions Transactions. HCI (24) 2019: 151-159 - [c16]Keng-Pei Lin, Yihuang Kang, William S. Chao:
A Structure-Behavior Coalescence Design Method for Mobile Social Network Systems. MDM 2019: 497-500 - [c15]Yi-Wei Chang, Keng-Pei Lin, Chih-Ya Shen:
Blockchain Technology for e-Marketplace. PerCom Workshops 2019: 429-430 - 2018
- [j6]Keng-Pei Lin, Yi-Wei Chang, Chih-Ya Shen, Mei-Chu Lin:
Leveraging Online Word of Mouth for Personalized App Recommendation. IEEE Trans. Comput. Soc. Syst. 5(4): 1061-1070 (2018) - [c14]Yihuang Kang, Keng-Pei Lin, I-Ling Cheng:
Topic Diffusion Discovery Based on Sparseness-Constrained Non-Negative Matrix Factorization. IRI 2018: 94-101 - [c13]Keng-Pei Lin, Chih-Ya Shen, William Chao:
Enriching UML from Model Multiplicity to Model Singularity with Structure-Behavior Coalescence. SMC 2018: 1970-1975 - [i1]Yihuang Kang, Keng-Pei Lin, I-Ling Cheng:
Topic Diffusion Discovery based on Sparseness-constrained Non-negative Matrix Factorization. CoRR abs/1807.04386 (2018) - 2017
- [c12]Te-Ming Chang, Guo-Hsin Hu, Ming-Fu Hsu, Keng-Pei Lin:
Integration of Social Media News Mining and Text Mining Techniques to Determine a Corporate's Competitive Edge. PACIS 2017: 35 - [c11]Keng-Pei Lin, Chih-Ya Shen, Tzu-Lin Chang, Te-Min Chang:
A Consumer Review-Driven Recommender Service for Web E-Commerce. SOCA 2017: 206-210 - 2016
- [j5]Keng-Pei Lin:
Privacy-preserving kernel k-means clustering outsourcing with random transformation. Knowl. Inf. Syst. 49(3): 885-908 (2016) - [c10]Te-Min Chang, Ming-Fu Hsu, Guo-Hsin Hu, Keng-Pei Lin:
Salient corporate performance forecasting based on financial and textual information. SMC 2016: 959-964 - 2015
- [j4]Keng-Pei Lin, Yi-Wei Chang, Ming-Syan Chen:
Secure support vector machines outsourcing with random linear transformation. Knowl. Inf. Syst. 44(1): 147-176 (2015) - [c9]Te-Min Chang, Chao-Hsien Sung, Guo-Hsin Hu, Ming-Fu Hsu, Keng-Pei Lin:
Identifying Highly Potential Enterprises with Social Computing on Supply Chain Networks. SmartCity 2015: 261-266 - [c8]Keng-Pei Lin, Chia-Yu Lai, Po-Cheng Chen, San-Yih Hwang:
Personalized Hotel Recommendation Using Text Mining and Mobile Browsing Tracking. SMC 2015: 191-196 - 2014
- [c7]Keng-Pei Lin, Yu-Chen Yang:
Efficient Approximation for Large-Scale Kernel Clustering Analysis. PACIS 2014: 366 - 2013
- [j3]Shan-Hung Wu, Keng-Pei Lin, Hao-Heng Chien, Chung-Min Chen, Ming-Syan Chen:
On Generalizable Low False-Positive Learning Using Asymmetric Support Vector Machines. IEEE Trans. Knowl. Data Eng. 25(5): 1083-1096 (2013) - [c6]Keng-Pei Lin:
Privacy-Preserving Kernel k-Means Outsourcing with Randomized Kernels. ICDM Workshops 2013: 860-866 - 2011
- [j2]Keng-Pei Lin, Ming-Syan Chen:
On the Design and Analysis of the Privacy-Preserving SVM Classifier. IEEE Trans. Knowl. Data Eng. 23(11): 1704-1717 (2011) - [c5]Keng-Pei Lin, Ming-Syan Chen:
Towards communication-efficient private location dependent queries. SAC 2011: 433-438 - [c4]Ming-Syan Chen, Keng-Pei Lin:
Efficient Kernel Approximation for Large-Scale Support Vector Machine Classification. SDM 2011: 211-222 - 2010
- [c3]Keng-Pei Lin, Ming-Syan Chen:
Privacy-preserving outsourcing support vector machines with random transformation. KDD 2010: 363-372
2000 – 2009
- 2008
- [c2]Keng-Pei Lin, Ming-Syan Chen:
Releasing the SVM Classifier with Privacy-Preservation. ICDM 2008: 899-904 - [c1]Shan-Hung Wu, Keng-Pei Lin, Chung-Min Chen, Ming-Syan Chen:
Asymmetric support vector machines: low false-positive learning under the user tolerance. KDD 2008: 749-757 - 2007
- [j1]Kun-Ta Chuang, Keng-Pei Lin, Ming-Syan Chen:
Quality-Aware Sampling and Its Applications in Incremental Data Mining. IEEE Trans. Knowl. Data Eng. 19(4): 468-484 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint