default search action
Chien-Chang Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Bo-Hsin Lin, Chuang-Chieh Lin, Chih-Chieh Hung, Chien-Chang Chen, Yu-Hsin Chen:
On the Identifiability of Artificial Financial Time Series. J. Inf. Sci. Eng. 40(3): 567-579 (2024) - 2023
- [j28]Feng-Shuo Hsu, Zi-Jun Su, Yamin Kao, Sen-Wei Tsai, Ying-Chao Lin, Po-Hsun Tu, Cihun-Siyong Alex Gong, Chien-Chang Chen:
Lightweight Deep Neural Network Embedded with Stochastic Variational Inference Loss Function for Fast Detection of Human Postures. Entropy 25(2): 336 (2023) - [j27]Chien-Chang Chen, Cheng-Shian Lin, Yen-Ting Chen, Wen-Her Chen, Chien-Hua Chen, I-Cheng Chen:
Intelligent Performance Evaluation in Rowing Sport Using a Graph-Matching Network. J. Imaging 9(9): 181 (2023) - [j26]Chien-Chang Chen, Chen Chang, Cheng-Shian Lin, Chien-Hua Chen, I. Cheng Chen:
Video based basketball shooting prediction and pose suggestion system. Multim. Tools Appl. 82(18): 27551-27570 (2023) - [c16]Patcharawit Wilaikaew, Watchara Noisriphan, Chien-Chang Chen, Jirawan Charoensuk, Somchoke Ruengittinun, Chalothon Chootong:
Apply Machine-Learning Model for Clustering Rowing Players. ICNCC 2023: 218-224 - 2022
- [j25]Chien-Chang Chen, Cheng-Shian Lin, Jia-Zhan Chen:
Boolean-Based (k, n, m) Multi-Secret Image Sharing. Axioms 11(5): 197 (2022) - [c15]Nantachaporn Rueangsuwan, Nathapat Jariyapongsgul, Chien-Chang Chen, Cheng-Shian Lin, Somchoke Ruengittinun, Chalothon Chootong:
Automatic Anomaly Mark Detection on Fabric Production Video by Artificial Intelligence Techniques. ICKII 2022: 81-84 - 2021
- [j24]Yen-Ling Tai, Shin-Jhe Huang, Chien-Chang Chen, Henry Horng-Shing Lu:
Computational Complexity Reduction of Neural Networks of Brain Tumor Image Segmentation by Introducing Fermi-Dirac Correction Functions. Entropy 23(2): 223 (2021) - [c14]Lisa Li-Chuan Chen, Shen-Kai Wang, Tse-Yu Lin, Ling-Feng Huang, Men-Tzung Lo, Chien-Chang Chen:
A Novel Telemedicine System to Traditional Tongue Examination for Chinese Medical Applications. ICDH 2021: 309-314 - 2020
- [c13]Zi-Jun Su, Tang-Chen Chang, Yen-Ling Tai, Shu-Jung Chang, Chien-Chang Chen:
Attention U-Net with Dimension-Hybridized Fast Data Density Functional Theory for Automatic Brain Tumor Image Segmentation. BrainLes@MICCAI (2) 2020: 81-92 - [c12]Chia-Ying Wu, Arthur Chun-Chieh Shih, Hsuan-Cheng Huang, Chun-Ping Yu, Chien-Chang Chen:
Refined Prediction of Mouse and Human Actions Based on A Data-Selective Multiple-Stage Approach of 3D Convolutional Neural Networks. TAAI 2020: 242-247
2010 – 2019
- 2019
- [j23]Chien-Chang Chen, Wei-Yu Lu, Chung-Hsuan Chou:
Rotational copy-move forgery detection using SIFT and region growing strategies. Multim. Tools Appl. 78(13): 18293-18308 (2019) - 2018
- [j22]Chien-Chang Chen:
Essential secret image sharing scheme with equal-sized shadows generation. J. Vis. Commun. Image Represent. 52: 143-150 (2018) - [j21]Chien-Chang Chen, Hsin-Cheng Yeh:
Using dynamic pixel value mapping method to construct visible and reversible image watermarking scheme. Multim. Tools Appl. 77(15): 19327-19346 (2018) - [c11]Chih-Chien Wang, Min-Yuh Day, Chien-Chang Chen, Jia-Wei Liou:
Detecting spamming reviews using long short-term memory recurrent neural network framework. ICEEG 2018: 16-20 - 2017
- [j20]Chien-Chang Chen, Jun-Long Chen:
A new Boolean-based multiple secret image sharing scheme to share different sized secret images. J. Inf. Secur. Appl. 33: 45-54 (2017) - [j19]Chien-Chang Chen, Lingying Chen, Yu-Jing Lin:
Block Sampled Matching with Region Growing for Detecting Copy-Move Forgery Duplicated Regions. J. Inf. Hiding Multim. Signal Process. 8(1): 86-96 (2017) - [j18]Hua-Chiang Wen, Wu-Ching Chou, Po-Chen Lin, Yeau-Ren Jeng, Chien-Chang Chen, Hung-Ming Chen, Don Son Jiang, Chun-Hu Cheng:
Using nanoindentation to investigate the temperature cycling of Sn-37Pb solders. Microelectron. Reliab. 78: 111-117 (2017) - [j17]Chien-Chang Chen, Yao-Hong Tsai, Hsin-Cheng Yeh:
Difference-expansion based reversible and visible image watermarking scheme. Multim. Tools Appl. 76(6): 8497-8516 (2017) - [j16]Chien-Chang Chen, Han Wang, Cheng-Shian Lin:
An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection. Multim. Tools Appl. 76(24): 26503-26522 (2017) - [c10]Chih-Chien Wang, Min-Yuh Day, Chien-Chang Chen, Jai-Wei Liou:
Temporal and Sentimental Analysis of A Real Case of Fake Reviews in Taiwan. ASONAM 2017: 729-736 - [c9]Shyh-Jier Huang, Ding-Min Wang, Chien-Chang Chen, Tsong-Shing Lee, Yu-Ren Lin:
Enhancement of magnetron-driven system with simple preheating and power modulation mechanism. GCCE 2017: 1-3 - 2016
- [j15]Chien-Chang Chen, Yao-Hong Tsai:
An Expandable Essential Secret Image Sharing Structure. J. Inf. Hiding Multim. Signal Process. 7(1): 135-144 (2016) - [j14]Chien-Chang Chen, Shih-Chang Chen:
Two-layered structure for optimally essential secret image sharing scheme. J. Vis. Commun. Image Represent. 38: 595-601 (2016) - [j13]Chien-Chang Chen, Wei-Jie Wu, Jun-Long Chen:
Highly efficient and secure multi-secret image sharing scheme. Multim. Tools Appl. 75(12): 7113-7128 (2016) - [c8]Kang-Chun Peng, Chiu-Chin Lin, Zu-Han Lin, Chien-Chang Chen, Che-Chang Hsu:
A low noise X-band frequency synthesizer for 5G applications. ICCE-TW 2016: 1-2 - [c7]Chien-Chang Chen, Wen-Sheng Chen, Yu-Jing Lin, Chih-Chien Wang:
The Current Development of Open Election Data in Taiwan. MISNC 2016: 50 - 2015
- [c6]Cheng-Shian Lin, Chien-Chang Chen, Yi-Cheng Chang:
An Efficiency Enhanced Cluster Expanding Block Algorithm for Copy-Move Forgery Detection. INCoS 2015: 228-231 - 2014
- [j12]Chien-Chang Chen, Wei-Jie Wu:
A secure Boolean-based multi-secret image sharing scheme. J. Syst. Softw. 92: 107-114 (2014) - [j11]Chien-Chang Chen, Cheng-Chi Tai, Shyh-Jier Huang, Yung-Hsiang Chen, Chin-Hung Lin:
Thermotherapy Induction Heating Apparatus With New Magnetic-Wrapped Coil Design. IEEE Trans. Ind. Electron. 61(5): 2592-2600 (2014) - [c5]Chien-Chang Chen, Han-Wei Tsai:
Wavelet-Based Reversible and Visible Image Watermarking Scheme. ICS 2014: 954-963 - 2013
- [j10]Chien-Chang Chen, Chih-Chien Wang:
Internet as Indispensable Everywhere: The Introduction to the Advances in Internet Technologies and Applications Special Issue. J. Comput. 8(7): 1633-1634 (2013) - [j9]Chien-Chang Chen, Zeng-Chuang Jiun, Chien-Hsiang Hsu:
An Adaptive Reversible Image Watermarking Scheme Based on Integer Wavelet Coefficients. J. Comput. 8(7): 1677-1682 (2013) - [j8]Chien-Chang Chen, Chong-An Liu:
Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images. J. Electronic Imaging 22(1): 013008 (2013) - [c4]Yu-Sian Li, Chien-Chang Chen, Ting-An Lin, Cheng-Hsin Hsu, Yichuan Wang, Xin Liu:
An end-to-end testbed for scalable video streaming to mobile devices over HTTP. ICME 2013: 1-6 - 2011
- [j7]Chien-Chang Chen, Yao-Hong Tsai:
Adaptive reversible image watermarking scheme. J. Syst. Softw. 84(3): 428-434 (2011)
2000 – 2009
- 2009
- [j6]Chien-Chang Chen, Chaur-Chin Chen, Yun-Cheng Lin:
Weighted modulated secret image sharing method. J. Electronic Imaging 18(4): 043011 (2009) - 2008
- [j5]Chien-Chang Chen, Yu-Wei Chien:
Sharing Numerous Images Secretly with Reduced Possessing Load. Fundam. Informaticae 86(4): 447-458 (2008) - [j4]Chien-Chang Chen, Wen-Yin Fu:
A Geometry-Based Secret Image Sharing Approach. J. Inf. Sci. Eng. 24(5): 1567-1577 (2008) - [j3]De-Sian Lu, Chien-Chang Chen:
Edge detection improvement by ant colony optimization. Pattern Recognit. Lett. 29(4): 416-425 (2008) - 2007
- [j2]Chien-Chang Chen, Cheng-Shian Lin:
Toward a Robust Image Authentication Method Surviving JPEG Lossy Compression. J. Inf. Sci. Eng. 23(2): 511-524 (2007) - [c3]Chien-Chang Chen, De-Sheng Kao:
DCT-Based Reversible Image Watermarking Approach. IIH-MSP 2007: 489-492 - 2006
- [c2]Chien-Chang Chen, Wai-Kei Mak:
A multi-technology-process reticle floorplanner and wafer dicing planner for multi-project wafers. ASP-DAC 2006: 777-782 - [c1]Chih-Ming Chen, Chien-Chang Chen, Chaur-Chin Chen:
A Comparison of Texture Features Based on SVM and SOM. ICPR (2) 2006: 630-633
1990 – 1999
- 1999
- [j1]Chien-Chang Chen, Chaur-Chin Chen:
Filtering methods for texture discrimination. Pattern Recognit. Lett. 20(8): 783-790 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-15 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint