default search action
Chien-Yuan Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Chien-Yuan Chen:
An exact quantum logarithmic time algorithm for the 3-junta problem. Quantum Inf. Process. 23(6): 232 (2024) - 2022
- [j23]Chien-Yuan Chen, Chung-Yao Chang, Chih-Cheng Hsueh:
Solving Bernstein and Vazirani's Problem with the 2-bit Permutation Function. Quantum Inf. Process. 21(1): 15 (2022) - 2021
- [j22]Chien-Yuan Chen:
An exact quantum algorithm for testing 3-junta in Boolean functions with one uncomplemented product. Quantum Inf. Process. 20(1): 36 (2021) - 2020
- [j21]Chien-Yuan Chen, Sai-Keung Wong, Wen-Yun Liu:
Generation of small groups with rich behaviors from natural language interface. Comput. Animat. Virtual Worlds 31(4-5) (2020) - [j20]Wen-Yun Liu, Sai-Keung Wong, Chien-Yuan Chen:
A natural language interface with casual users for crowd animation. Comput. Animat. Virtual Worlds 31(4-5) (2020) - [j19]Cheng-Fu Su, Chien-Yuan Chen:
Information hiding method based on quantum image by using Bell states. Quantum Inf. Process. 19(1): 36 (2020) - [j18]Chien-Yuan Chen:
An exact quantum algorithm for testing Boolean functions with one uncomplemented product of two variables. Quantum Inf. Process. 19(7): 213 (2020)
2010 – 2019
- 2018
- [j17]Chien-Yuan Chen:
RNS parity detection for the two-moduli set {2p - j, 2p + j}. Int. J. Comput. Math. Comput. Syst. Theory 3(1): 31-40 (2018) - [c6]Chien-Yuan Chen, Qi-Hua Yang:
Hotspot Analysis of the Spatial and Temporal Distribution of Fires. GISTAM 2018: 15-21 - 2015
- [j16]Yu-Ze Jheng, Chien-Yuan Chen, Chien-Feng Huang:
Reversible Data Hiding Based on Histogram Modification over Ternary Computers. J. Inf. Hiding Multim. Signal Process. 6(5): 938-955 (2015) - 2013
- [j15]Shih-Lun Lin, Chien-Feng Huang, Meng-Huan Liou, Chien-Yuan Chen:
Improving Histogram-based Reversible Information Hiding by an Optimal Weight-based Prediction Scheme. J. Inf. Hiding Multim. Signal Process. 4(1): 19-33 (2013) - [c5]Chien-Yuan Chen, Jui-Tang Chiang:
Spatial and temporal distribution of disaster events in mountainous townships of Taiwan. IGARSS 2013: 3666-3669 - 2011
- [j14]Chien-Yuan Chen, Chih-Cheng Hsueh:
An improved Chen's parity detection technique for the two-moduli set. Int. J. Comput. Math. 88(5): 938-942 (2011) - [j13]Min-Huei Hsu, Yu-Ting Yeh, Chien-Yuan Chen, Chien-Hsiang Liu, Chien-Tsai Liu:
Online detection of potential duplicate medications and changes of physician behavior for outpatients visiting multiple hospitals using national health insurance smart cards in Taiwan. Int. J. Medical Informatics 80(3): 181-189 (2011) - [j12]Jui-Jen Wu, Yen-Hui Chen, Meng-Fan Chang, Po-Wei Chou, Chien-Yuan Chen, Hung-Jen Liao, Ming-Bin Chen, Yuan-Hua Chu, Wen-Chin Wu, Hiroyuki Yamauchi:
A Large Sigma V TH /VDD Tolerant Zigzag 8T SRAM With Area-Efficient Decoupled Differential Sensing and Fast Write-Back Scheme. IEEE J. Solid State Circuits 46(4): 815-827 (2011)
2000 – 2009
- 2009
- [c4]Chien-Yuan Chen, Chih-Cheng Hsueh, Yu-Feng Lin:
A Generalization of de Weger's Method. IAS 2009: 344-347 - [c3]Yu-Cheng Ou, Chih-Wen Hsu, Lung-Jieh Yang, Hsieh-Cheng Han, Yi-Wen Liu, Chien-Yuan Chen:
The micropatterns of glutaraldehyde-crosslinked gelatin as ECM for attachment of tumor cells. NEMS 2009: 314-318 - 2007
- [j11]Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen:
Cryptographic relational algebra for databases using the field authenticator. Comput. Math. Appl. 54(1): 38-44 (2007) - [c2]Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen:
A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967 - 2006
- [j10]Chien-Yuan Chen, Chih-Cheng Hsueh:
Quantum factorization algorithm by NMR ensemble computers. Appl. Math. Comput. 174(2): 1363-1369 (2006) - [j9]Chien-Yuan Chen:
An efficient parity detection technique using the two-moduli set {2h - 1, 2h + 1}. Inf. Sci. 176(22): 3426-3430 (2006) - 2005
- [j8]Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen:
Cryptanalysis of large RSA exponent by using the LLL algorithm. Appl. Math. Comput. 169(1): 516-525 (2005) - [c1]Chien-Yuan Chen, Chih-Cheng Hsueh:
Multiplication Algorithm on Quantum Computation. FCS 2005: 38-45 - 2004
- [j7]Jen-Ho Yang, Chin-Chen Chang, Chien-Yuan Chen:
A high-speed division algorithm in residue number system using parity. Int. J. Comput. Math. 81(6): 775-780 (2004) - [j6]Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen:
Cryptanalysis of short secret exponents modulo RSA primes. Inf. Sci. 160(1-4): 225-233 (2004) - [j5]Cheng-Yuan Ku, Chang-Jinn Tsao, Yi-Hsien Lin, Chien-Yuan Chen:
An escrow electronic cash system with limited traceability. Inf. Sci. 164(1-4): 17-30 (2004)
1990 – 1999
- 1999
- [j4]Chien-Yuan Chen, T.-C. Liu:
A fast modular multiplication method based on the Lempel-Ziv binary tree. Comput. Commun. 22(9): 871-874 (1999) - [j3]Chien-Yuan Chen, Chin-Chen Chang:
A fast modular multiplication algorithm for calculating the product AB modulo N. Inf. Process. Lett. 72(3-4): 77-81 (1999) - 1996
- [j2]Chien-Yuan Chen, Chin-Chen Chang, Wei-Pang Yang:
Cryptanalysis of the Secret Exponent of the RSA Scheme. J. Inf. Sci. Eng. 12(2): 277-290 (1996) - 1995
- [j1]Chin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen:
Remote scheme for password authentication based on theory of quadratic residues. Comput. Commun. 18(12): 936-942 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint