default search action
Wen-Chuan Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c14]Yi-Shan Lin, Wen-Chuan Lee, Z. Berkay Celik:
What Do You See?: Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors. KDD 2021: 1027-1035 - [c13]Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang:
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. SP 2021: 813-832 - 2020
- [i1]Yi-Shan Lin, Wen-Chuan Lee, Z. Berkay Celik:
What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors. CoRR abs/2009.10639 (2020)
2010 – 2019
- 2019
- [c12]Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang:
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. CCS 2019: 1265-1282 - [c11]Wen-Chuan Lee, Yingqi Liu, Peng Liu, Shiqing Ma, Hongjun Choi, Xiangyu Zhang, Rajiv Gupta:
White-Box Program Tuning. CGO 2019: 122-135 - [c10]Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang:
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. NDSS 2019 - [c9]Wen-Chuan Lee, Peng Liu, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Programming support for autonomizing software. PLDI 2019: 702-716 - 2018
- [c8]Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. CCS 2018: 801-816 - [c7]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c6]Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:
Trojaning Attack on Neural Networks. NDSS 2018 - [c5]Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama:
MODE: automated neural network model debugging via state differential analysis and input selection. ESEC/SIGSOFT FSE 2018: 175-186 - 2017
- [c4]Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, I Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng, Xiangyu Zhang, Patrick Eugster:
PAD: programming third-party web advertisement censorship. ASE 2017: 240-251 - [c3]Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang:
LAMP: data provenance for graph based machine learning algorithms through derivative computation. ESEC/SIGSOFT FSE 2017: 786-797 - 2015
- [j25]Wen-Chuan Lee, Ching-Wen Hong, Jong-Wuu Wu:
Computational procedure of performance assessment of lifetime index of normal products with fuzzy data under the type II right censored sampling plan. J. Intell. Fuzzy Syst. 28(4): 1755-1773 (2015) - [c2]Wen-Chuan Lee, Tao Bao, Yunhui Zheng, Xiangyu Zhang, Keval Vora, Rajiv Gupta:
RAIVE: runtime assessment of floating-point instability by vectorization. OOPSLA 2015: 623-638 - 2014
- [j24]Jong-Wuu Wu, Ching-Wen Hong, Wen-Chuan Lee:
Computational procedure of lifetime performance index of products for the Burr XII distribution with upper record values. Appl. Math. Comput. 227: 701-716 (2014) - 2013
- [j23]Wen-Chuan Lee, Jong-Wuu Wu, Ching-Wen Hong, Shie-Fan Hong:
Evaluating the Lifetime Performance Index Based on the Bayesian Estimation for the Rayleigh Lifetime Products with the Upper Record Values. J. Appl. Math. 2013: 547209:1-547209:13 (2013) - [j22]Wen-Chuan Lee, Jong-Wuu Wu:
Reply to "open problem of fuzzy confidence interval for fuzzy process capability index". J. Intell. Fuzzy Syst. 24(1): 1-3 (2013) - 2012
- [j21]Wen-Chuan Lee, Jong-Wuu Wu, Hsin-Hui Tsou, Chia-Ling Lei:
Computational procedure of optimal inventory model involving controllable backorder rate and variable lead time with defective units. Int. J. Syst. Sci. 43(10): 1927-1942 (2012) - [j20]Ching-Wen Hong, Wen-Chuan Lee, Jong-Wuu Wu:
Computational Procedure of Performance Assessment of Lifetime Index of Products for the Weibull Distribution with the Progressive First-Failure-Censored Sampling Plan. J. Appl. Math. 2012: 717184:1-717184:13 (2012) - 2011
- [j19]Wen-Chuan Lee:
Inferences on the lifetime performance index for Weibull distribution based on censored observations using the max p-value method. Int. J. Syst. Sci. 42(6): 931-937 (2011) - [j18]Wen-Chuan Lee, Jong-Wuu Wu, Mei-Ling Hong, Liang-Sian Lin, Ruei-Ling Chan:
Assessing the lifetime performance index of Rayleigh products based on the Bayesian estimation under progressive type II right censored samples. J. Comput. Appl. Math. 235(6): 1676-1688 (2011) - [j17]Hsiu-Mei Lee, Wen-Chuan Lee, Chia-Ling Lei, Jong-Wuu Wu:
Computational procedure of assessing lifetime performance index of Weibull lifetime products with the upper record values. Math. Comput. Simul. 81(6): 1177-1189 (2011) - 2010
- [c1]Meng-Huan Wu, Wen-Chuan Lee, Chen-Yu Chuang, Ren-Song Tsay:
Automatic generation of software TLM in multiple abstraction layers for efficient HW/SW co-simulation. DATE 2010: 1177-1182
2000 – 2009
- 2009
- [j16]Wen-Chuan Lee, Jong-Wuu Wu, Ching-Wen Hong:
Assessing the lifetime performance index of products with the exponential distribution under progressively type II right censored samples. J. Comput. Appl. Math. 231(2): 648-656 (2009) - [j15]Wen-Chuan Lee, Jong-Wuu Wu, Ching-Wen Hong:
Assessing the lifetime performance index of products from progressively type II right censored data using Burr XII model. Math. Comput. Simul. 79(7): 2167-2179 (2009) - 2007
- [j14]Jong-Wuu Wu, Wen-Chuan Lee, Sheau-Chiann Chen:
Computational comparison of prediction future lifetime of electronic components with Pareto distribution based on multiply type II censored samples. Appl. Math. Comput. 184(2): 374-406 (2007) - [j13]Jong-Wuu Wu, Wen-Chuan Lee, Hui-Yin Tsai:
Computational algorithmic procedure of optimal inventory policy involving a negative exponential crashing cost and variable lead time demand. Appl. Math. Comput. 184(2): 798-808 (2007) - [j12]Jong-Wuu Wu, Wen-Chuan Lee, Sheau-Chiann Chen:
Computational comparison of prediction intervals of future observation for two-parameter exponential distribution. Appl. Math. Comput. 184(2): 1084-1117 (2007) - [j11]Wen-Chuan Lee, Jong-Wuu Wu, Chia-Ling Lei:
Computational algorithmic procedure for optimal inventory policy involving ordering cost reduction and back-order discounts when lead time demand is controllable. Appl. Math. Comput. 189(1): 186-200 (2007) - [j10]Jong-Wuu Wu, Wen-Chuan Lee, Sheau-Chiann Chen:
Computational comparison of the prediction intervals of future observation for three-parameter Pareto distribution with known shape parameter. Appl. Math. Comput. 190(1): 150-178 (2007) - 2006
- [j9]Jong-Wuu Wu, Wen-Chuan Lee:
Computational algorithm of least absolute deviation method for determining number of outliers under normality. Appl. Math. Comput. 175(1): 609-617 (2006) - [j8]Wen-Chuan Lee, Jong-Wuu Wu, Jye-Wei Hsu:
Computational algorithm for inventory model with a service level constraint, lead time demand with the mixture of distributions and controllable negative exponential backorder rate. Appl. Math. Comput. 175(2): 1125-1138 (2006) - [j7]Jong-Wuu Wu, Wen-Chuan Lee, Chi-Chin Yang:
Computational comparison for ML estimator of quadratic functions of the Bernoulli parameter in IS and FSS methods. Appl. Math. Comput. 176(1): 317-323 (2006) - [j6]Jong-Wuu Wu, Wen-Chuan Lee, Sheau-Chiann Chen:
Computational comparison for weighted moments estimators and BLUE of the scale parameter of a Pareto distribution with known shape parameter under type II multiply censored sample. Appl. Math. Comput. 181(2): 1462-1470 (2006) - 2005
- [j5]Wen-Chuan Lee:
Inventory model involving controllable backorder rate and variable lead time demand with the mixtures of distribution. Appl. Math. Comput. 160(3): 701-717 (2005) - [j4]Jong-Wuu Wu, Wen-Chuan Lee, Sheau-Chiann Chen:
Prediction intervals of future observation from one-parameter exponential distribution based on multiply type II censored samples. Appl. Math. Comput. 167(2): 741-806 (2005) - 2000
- [j3]Chinho Lin, Bertram Tan, Wen-Chuan Lee:
An Eoq Model for Deteriorating Items with Time-varying Demand and Shortages. Int. J. Syst. Sci. 31(3): 391-400 (2000) - [j2]Jong-Wuu Wu, Chinho Lin, Bertram Tan, Wen-Chuan Lee:
An Eoq Inventory Model with Time-varying Demand and Weibull Deterioration with Shortages. Int. J. Syst. Sci. 31(6): 677-683 (2000)
1990 – 1999
- 1999
- [j1]T. William Chien, Chinho Lin, Bertram Tan, Wen-Chuan Lee:
A neural networks-based approach for strategic planning. Inf. Manag. 35(6): 357-364 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint