default search action
Chih-Hung Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j28]Dadan Sumardani, Chih-Hung Lin:
Cognitive processes during virtual reality learning: A study of brain wave. Educ. Inf. Technol. 28(11): 14877-14896 (2023) - 2021
- [j27]Hui-Yu Huang, Chih-Hung Lin:
Video inpainting using object motion rate and color variance in spatiotemporal domain. J. Intell. Fuzzy Syst. 40(3): 5609-5622 (2021) - [c38]Chih-Hung Lin, I-Shiang Tzeng, Ya-Hsuan Lin, Chan-Yen Kuo:
An Association Rule Analysis of Acupressure Effect on Sleep Quality. BIBM 2021: 3827-3831
2010 – 2019
- 2019
- [j26]Yao-Kuang Huang, Yuan-Hsi Tseng, Chih-Hung Lin, Yuan-Hsiung Tsai, Yin-Chen Hsu, Shih-Chung Wang, Chien-Wei Chen:
Evaluation of venous pathology of the lower extremities with triggered angiography non-contrast-enhanced magnetic resonance imaging. BMC Medical Imaging 19(1): 96 (2019) - [c37]Shih-Hsuan Yang, Chih-Hung Lin, Hung-Xin Chen:
Object-Based Rate Adjustment for HEVC Transrating. ICCE-TW 2019: 1-2 - 2018
- [j25]Chih-Hung Lin, Hsing-Kuo Pao, Jian-Wei Liao:
Efficient dynamic malware analysis using virtual time control mechanics. Comput. Secur. 73: 359-373 (2018) - [j24]Tzung-Her Chen, Kai-Siang Lin, Chih-Hung Lin:
On the design of a two-decoding-option image secret sharing scheme. Multim. Tools Appl. 77(7): 7865-7881 (2018) - [j23]Robert Chen-Hao Chang, Hung-Lieh Chen, Chih-Hung Lin, Kuang-Hao Lin:
Design of a Low-Complexity Real-Time Arrhythmia Detection System. J. Signal Process. Syst. 90(1): 145-156 (2018) - 2017
- [c36]Chih-Hung Lin, Shoou-Jinn Chang, Ting-Jen Hsueh:
WO3 nanoparticle with MEMS technology improve the sensing response by HWCVD system. NEMS 2017: 190-193 - 2016
- [j22]Tzung-Her Chen, Yao-Sheng Lee, Chih-Hung Lin:
On the difficulty of aligning VSS random grids. Signal Process. Image Commun. 44: 101-107 (2016) - [c35]Ming-Fan Wei, Robert Chen-Hao Chang, Chia-Yu Wang, Chih-Hung Lin, Hung-Lieh Chen:
Design of a flexible PPG signal processing wireless device. ICCE-TW 2016: 1-2 - [c34]Takeshi Takahashi, Tao Ban, Chin-Wei Tien, Chih-Hung Lin, Daisuke Inoue, Koji Nakao:
The Usability of Metadata for Android Application Analysis. ICONIP (1) 2016: 546-554 - [c33]Hui-Yu Huang, Chih-Hung Lin:
Video Inpainting in Spatial-Temporal Domain Based on Adaptive Background and Color Variance. IEA/AIE 2016: 633-644 - 2015
- [j21]Kai-Hsiang Tsao, Shyong Jian Shyu, Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen:
Visual multiple-secret sharing for flexible general access structure by random grids. Displays 39: 80-92 (2015) - [j20]Yen-Bor Lin, Chung-Ping Young, Chih-Hung Lin:
Non-iterative and spatial domain focus map estimation based on intentional re-blur from a single image (NasBirSi). J. Vis. Commun. Image Represent. 26: 80-93 (2015) - [j19]Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen:
Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J. Vis. Commun. Image Represent. 33: 31-41 (2015) - [c32]Chih-Hung Lin, Chin-Wei Tien, Chih-Wei Chen, Chia-Wei Tien, Hsing-Kuo Pao:
Efficient spear-phishing threat detection using hypervisor monitor. ICCST 2015: 299-303 - [c31]Chun-Ying Huang, Ching-Hsiang Chiu, Chih-Hung Lin, Han-Wei Tzeng:
Code Coverage Measurement for Android Dynamic Analysis Tools. IEEE MS 2015: 209-216 - 2014
- [j18]Hsiao-shen Wang, Yi-Ting Chen, Chih-Hung Lin:
The learning benefits of using eye trackers to enhance the geospatial abilities of elementary school students. Br. J. Educ. Technol. 45(2): 340-355 (2014) - [j17]Kai-Siang Lin, Chih-Hung Lin, Tzung-Her Chen:
Distortionless visual multi-secret sharing based on random grid. Inf. Sci. 288: 330-346 (2014) - [j16]Chih-Hung Lin, Tzung-Her Chen, Yan-Ting Wu, Kai-Hsiang Tsao, Kai-Siang Lin:
Multi-factor cheating prevention in visual secret sharing by hybrid codebooks. J. Vis. Commun. Image Represent. 25(7): 1543-1557 (2014) - [j15]Robert Chen-Hao Chang, Chih-Hung Lin, Ming-Fan Wei, Kuang-Hao Lin, Shiue-Ru Chen:
High-Precision Real-Time Premature Ventricular Contraction (PVC) Detection System Based on Wavelet Transform. J. Signal Process. Syst. 77(3): 289-296 (2014) - [c30]Yen-Chun Hsu, Yu-Sung Wu, Tsung-Han Tsai, Yi Pin Chiu, Chih-Hung Lin, Zhi-Wei Chen:
MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment. SERE (Companion) 2014: 97-106 - [c29]Cheng-Ta Chung, Chia Jui Lin, Chih-Hung Lin, Pu-Jen Cheng:
Person Identification between Different Online Social Networks. WI-IAT (2) 2014: 94-101 - 2013
- [j14]Chih-Hung Lin, Ssu-Kuang Chen, Shan-Mei Chang, Sunny S. J. Lin:
Cross-lagged relationships between problematic Internet use and lifestyle changes. Comput. Hum. Behav. 29(6): 2615-2621 (2013) - [j13]Chih-Hung Lin, Tzung-Her Chen, Chun-Wei Chiu:
Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern. Displays 34(1): 59-68 (2013) - [j12]Chih-Hung Lin, Tzung-Her Chen, Chang-Sian Wu:
A batch image encryption scheme based on chaining random grids. Sci. Iran. 20(3): 670-681 (2013) - [c28]Chih-Hung Lin, Shu-Yuan Lin, Tzung-Her Chen:
Dynamic range optimization by flexible local contrast enhancement using luminance map. ICDIP 2013: 88780O - [c27]Sheng-Shiang Chang, Chih-Hung Lin, Tzung-Her Chen, Kai-Siang Lin:
Robust Watermarking for Multiple Images and Users Based on Visual Cryptography. ICGEC 2013: 175-182 - [c26]Kai-Siang Lin, Tzung-Her Chen, Chih-Hung Lin, Sheng-Shiang Chang:
A Tailor-Made Encryption Scheme for High-Dynamic Range Images. ICGEC 2013: 183-192 - [c25]Chuan-Chun Ku, Chung-Ping Young, Chih-Hung Lin:
Vision Assisted Active Safety System for Vehicles on the Highway. IIH-MSP 2013: 489-492 - [c24]Jing-Ya Yan, Tzung-Her Chen, Chih-Hung Lin:
Encryption in High Dynamic Range Images for RGBE Format. IIH-MSP 2013: 493-496 - 2012
- [j11]Tsai-Chi Kuo, Chia-Wei Hsu, Kuo-Cheng Ku, Ping-Shun Chen, Chih-Hung Lin:
A collaborative model for controlling the green supply network in the motorcycle industry. Adv. Eng. Informatics 26(4): 941-950 (2012) - [j10]Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:
Reversible Data Hiding for High-Quality Images Based on Integer Wavelet Transform. J. Inf. Hiding Multim. Signal Process. 3(2): 142-150 (2012) - [j9]Hwa-Lu Jhi, Jung-Chieh Chen, Chih-Hung Lin, Chin-Tseng Huang:
A Factor-Graph-Based TOA Location Estimator. IEEE Trans. Wirel. Commun. 11(5): 1764-1773 (2012) - [c23]Chih-Hung Lin, Chin-Wei Tien, Hsing-Kuo Pao:
Efficient and effective NIDS for cloud virtualization environment. CloudCom 2012: 249-254 - [c22]Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:
Lossless Data Hiding Based on Smart Boundary Adjustment. IIH-MSP 2012: 55-58 - [c21]Chih-Hung Lin, Ching-Yu Yang, Chia-Wei Chang:
An Efficient Algorithm for Protecting and Authenticating Medical Image. IIH-MSP 2012: 67-70 - [c20]Chih-Hung Lin, Robert Chen-Hao Chang, Tz-Han Pang, Kuang-Hao Lin:
A low-complexity bio-medical signal receiver for wireless body area network. ISOCC 2012: 443-446 - 2011
- [j8]Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:
Reversible Data Hiding By Adaptive IWT-coefficient Adjustment. J. Inf. Hiding Multim. Signal Process. 2(1): 24-32 (2011) - [j7]Chih-Hung Lin, Ching-Yu Yang:
Multipurpose Watermarking Based on Blind Vector Quantization (BVQ). J. Inf. Hiding Multim. Signal Process. 2(3): 236-246 (2011) - [c19]Yenting Lai, Chung-Huang Yang, Chih-Hung Lin, TaeNam Ahn:
Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing. ICHIT (2) 2011: 196-203 - [c18]Hong-Jhe Li, Chia-Wei Tien, Chin-Wei Tien, Chih-Hung Lin, Hahn-Ming Lee, Albert B. Jeng:
AOS: An optimized sandbox method used in behavior-based malware detection. ICMLC 2011: 404-409 - [c17]Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:
Prediction-Based Lossless Data Hiding by Adaptive Coefficient-Bias Algorithm. IIH-MSP 2011: 65-68 - 2010
- [j6]Ching-Yu Yang, Wu-Chih Hu, Chih-Hung Lin:
Reversible Data Hiding by Coefficient-bias Algorithm. J. Inf. Hiding Multim. Signal Process. 1(2): 91-100 (2010) - [j5]Robert Chen-Hao Chang, Chih-Hung Lin, Kuang-Hao Lin, Alex Chien-Lin Huang, Feng-Chi Chen:
Iterative QR Decomposition Architecture Using the Modified Gram-Schmidt Algorithm for MIMO Systems. IEEE Trans. Circuits Syst. I Regul. Pap. 57-I(5): 1095-1102 (2010) - [c16]Chih-Hung Lin, Ching-Yu Yang, Chia-Wei Chang:
Authentication and Protection for Medical Image. ICCCI (2) 2010: 278-287 - [c15]Ching-Yu Yang, Chih-Hung Lin, Wu-Chih Hu:
Reversible Watermarking by Coefficient Adjustment Method. IIH-MSP 2010: 39-42 - [c14]Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li:
A (2, 3) Threshold Secret Sharing Scheme Using Sudoku. IIH-MSP 2010: 43-46 - [c13]Chih-Hung Lin, Alex Chien-Lin Huang, Robert Chen-Hao Chang, Kuang-Hao Lin:
Low-power design of variable block-size LDPC decoder using nanometer technology. ISCAS 2010: 1759-1762
2000 – 2009
- 2009
- [c12]Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, Chien-Ting Huang:
Palette Partition Based Data Hiding for Color Images. IIH-MSP 2009: 620-623 - [c11]Chih-Hung Lin, Yu-Chiang Li, Ming-Ni Wu, Shun-Sheng Yang, Kuan-Ju Chen:
Multipurpose Watermarking Method Based on Blind Vector Quantization. IIH-MSP 2009: 636-639 - [c10]Kuang-Hao Lin, Chih-Hung Lin, Robert Chen-Hao Chang, Alex Chien-Lin Huang, Feng-Chi Chen:
Iterative QR Decomposition Architecture using the Modified Gram-Schmidt Algorithm. ISCAS 2009: 1409-1412 - [c9]Shih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo:
Holography: A Hardware Virtualization Tool for Malware Analysis. PRDC 2009: 263-268 - 2008
- [c8]Leo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson:
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. DIMVA 2008: 267-278 - [c7]Jyh-Ren Shieh, Yang-Ting Yeh, Chih-Hung Lin, Ching-Yung Lin, Ja-Ling Wu:
Using Semantic Graphs for Image Search. ICME 2008: 105-108 - [c6]Chih-Hung Lin, Sheng-Lung Chien, Hsiao-Fen Chien:
Multi-Purpose Image Watermarking Method Based on Wavelet Transform. IIH-MSP 2008: 1182-1185 - [c5]Chih-Hung Lin, Hsiao-Fen Chien, Sheng-Lung Chien:
Multipurpose Image Authentication Method based on Vector Quantization. IIH-MSP 2008: 1186-1189 - [c4]Fedor V. Yarochkin, Shih-Yao Dai, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo:
Towards Adaptive Covert Communication System. PRDC 2008: 153-159 - [c3]Jyh-Ren Shieh, Yang-Ting Yeh, Chih-Hung Lin, Ching-Yung Lin, Ja-Ling Wu:
Collaborative knowledge semantic graph image search. WWW 2008: 1055-1056 - 2007
- [j4]Chih-Hung Lin, Wen-Shyong Hsieh:
Image Authentication Scheme for Resisting JPEG, JPEG2000 Compression and Scaling. IEICE Trans. Inf. Syst. 90-D(1): 126-136 (2007) - [c2]Chih-Hung Lin, Jiunn-Tsair Chen:
Signal-Statistics-Based Look-Up-Table Spacing for Power Amplifier Linearization. VTC Spring 2007: 1906-1910 - 2006
- [j3]Hsin-Hung Chen, Chih-Hung Lin, Po-Chiun Huang, Jiunn-Tsair Chen:
Joint Polynomial and Look-Up-Table Predistortion Power Amplifier Linearization. IEEE Trans. Circuits Syst. II Express Briefs 53-II(8): 612-616 (2006) - [c1]Tung-Shih Su, Chih-Hung Lin, Wen-Shyong Hsieh:
A Novel OoS-aware Routing for ad hoc Networks. JCIS 2006 - 2003
- [j2]Chih-Hung Lin, Wen-Shyong Hsieh:
Applying projection and B-spline to image authentication and remedy. IEEE Trans. Consumer Electron. 49(4): 1234-1239 (2003)
1990 – 1999
- 1996
- [j1]Tsung-Min Hwang, Chih-Hung Lin, Wen-Wei Lin, Shu-Cherng Fang:
A relaxed primal-dual path-following algorithm for linear programming. Ann. Oper. Res. 62(1): 173-196 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint