default search action
Yu-Jia Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Chien-Wei Fu, Meng-Lin Ku, Yu-Jia Chen, Tony Q. S. Quek:
UAV Trajectory, User Association, and Power Control for Multi-UAV-Enabled Energy-Harvesting Communications: Offline Design and Online Reinforcement Learning. IEEE Internet Things J. 11(6): 9781-9800 (2024) - [c30]Sai Qian Zhang, Jieyu Lin, Qi Zhang, Yu-Jia Chen:
Learning Client Selection Strategy for Federated Learning across Heterogeneous Mobile Devices. ISQED 2024: 1-7 - 2023
- [c29]Ying-Chi Tsou, Rui-Hsing Chou, Yu-Jia Chen:
A High-security Internet of Drones Design by Integrating Physical-layer Key Generation and Blockchain. ICCE-Taiwan 2023: 351-352 - [c28]Hai-Yan Huang, Yu-Jia Chen:
Fusion of Received Signal Strength and Channel State Information for Wireless Human Sensing. ICCE-Taiwan 2023: 617-618 - 2022
- [j18]Yu-Jia Chen, Wei Chen, Meng-Lin Ku:
Trajectory Design and Link Selection in UAV-Assisted Hybrid Satellite-Terrestrial Network. IEEE Commun. Lett. 26(7): 1643-1647 (2022) - [j17]Yu-Jia Chen, Da-Yu Huang:
Joint Trajectory Design and BS Association for Cellular-Connected UAV: An Imitation-Augmented Deep Reinforcement Learning Approach. IEEE Internet Things J. 9(4): 2843-2858 (2022) - [j16]Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang:
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 127-151 (2022) - [j15]Yu-Jia Chen, Xiao-Chun Chen, Miao Pan:
Defense Against Machine Learning Based Attacks in Multi-UAV Networks: A Network Coding Based Approach. IEEE Trans. Netw. Sci. Eng. 9(4): 2562-2578 (2022) - [j14]Li-Chun Wang, Haris Gacanin, Dusit Niyato, Yu-Jia Chen, Chun-Hung Liu, Alagan Anpalagan:
Artificial Intelligence for Autonomous Vehicular Communication Networks [From the Guest Editors]. IEEE Veh. Technol. Mag. 17(2): 83-84 (2022) - [c27]Wei Chen, Deng-Kai Chang, Yu-Jia Chen:
Trajectory Control in Self-sustainable UAV-aided mmWave Networks: A Constrained Multi-agent Reinforcement Learning Approach. ICC Workshops 2022: 1017-1022 - [c26]Da-Yu Huang, Yu-Jia Chen:
Deep Learning for Base Station Association in Cellular-connected Unmanned Aerial Vehicle Systems. ICCE-TW 2022: 31-32 - [i5]Chien-Wei Fu, Meng-Lin Ku, Yu-Jia Chen, Tony Q. S. Quek:
UAV Trajectory, User Association and Power Control for Multi-UAV Enabled Energy Harvesting Communications: Offline Design and Online Reinforcement Learning. CoRR abs/2207.10371 (2022) - 2021
- [j13]Yi-Shan Lee, Naseem, Ping-Li Wu, Yu-Jia Chen, Jin-Wei Shi:
Neat Temporal Performance of InGaAs/InAlAs Single Photon Avalanche Diode With Stepwise Electric Field in Multiplication Layers. IEEE Access 9: 32979-32985 (2021) - [j12]Yu-Jia Chen, Kai-Min Liao, Yung-Fang Chen:
End-to-End Delay Analysis in Aerial-Terrestrial Heterogeneous Networks. IEEE Trans. Veh. Technol. 70(2): 1793-1806 (2021) - [j11]Yu-Jia Chen, Kai-Min Liao, Meng-Lin Ku, Fung Po Tso, Guan-Yi Chen:
Multi-Agent Reinforcement Learning Based 3D Trajectory Design in Aerial-Terrestrial Wireless Caching Networks. IEEE Trans. Veh. Technol. 70(8): 8201-8215 (2021) - [i4]Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang:
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4. IACR Cryptol. ePrint Arch. 2021: 995 (2021) - 2020
- [j10]Yu-Jia Chen, Da-Yu Huang:
Trajectory Optimization for Cellular-Enabled UAV With Connectivity Outage Constraint. IEEE Access 8: 29205-29218 (2020) - [j9]Yu-Jia Chen, Li-Chun Wang, Shu Wang:
Stochastic Blockchain for IoT Data Integrity. IEEE Trans. Netw. Sci. Eng. 7(1): 373-384 (2020) - [j8]Yu-Jia Chen, Deng-Kai Chang, Cheng Zhang:
Autonomous Tracking Using a Swarm of UAVs: A Constrained Multi-Agent Reinforcement Learning Approach. IEEE Trans. Veh. Technol. 69(11): 13702-13717 (2020) - [c25]Wei Chen, Deng-Kai Chang, Yu-Jia Chen:
Combating the Impact of Jittering in UAV-based Sensing Systems Using Deep Denoising Network. VTC Fall 2020: 1-3 - [c24]Kai-Min Liao, Guan-Yi Chen, Yu-Jia Chen, Yung-Fang Chen:
End-to-End Delay Analysis in mmWave UAV-Assisted Wireless Caching Networks. WCNC Workshops 2020: 1-6
2010 – 2019
- 2019
- [j7]Yu-Jia Chen, Li-Chun Wang:
Privacy Protection for Internet of Drones: A Network Coding Approach. IEEE Internet Things J. 6(2): 1719-1730 (2019) - [j6]Osamah Ibrahiem Abdullaziz, Li-Chun Wang, Yu-Jia Chen:
HiAuth: Hidden Authentication for Protecting Software Defined Networks. IEEE Trans. Netw. Serv. Manag. 16(2): 618-631 (2019) - [j5]Yu-Jia Chen, Li-Chun Wang:
An Overflow Problem in Network Coding for Secure Cloud Storage. IEEE Trans. Parallel Distributed Syst. 30(4): 789-799 (2019) - [c23]Kai-Min Liao, Guan-Yi Chen, Yu-Jia Chen:
Artificial Intelligence based Edge Caching in Vehicular Mobile Networks: Architecture, Opportunities, and Research Issues. APNOMS 2019: 1-6 - [c22]Yu-Jia Chen, Kai-Min Liao, Meng-Lin Ku, Fung Po Tso:
Mobility-Aware Probabilistic Caching in UAV-Assisted Wireless D2D Networks. GLOBECOM 2019: 1-6 - [c21]Gareth J. Nunns, Yu-Jia Chen, Deng-Kai Chang, Kai-Min Liao, Fung Po Tso, Lin Cui:
Autonomous Flying WiFi Access Point. ISCC 2019: 278-283 - [c20]Xiao-Chun Chen, Yu-Jia Chen:
A Machine Learning Based Attack in UAV Communication Networks. VTC Fall 2019: 1-2 - 2018
- [j4]Yu-Jia Chen, Li-Chun Wang, Meng-Chieh Chen, Pin-Man Huang, Pei-Jung Chung:
SDN-Enabled Traffic-Aware Load Balancing for M2M Networks. IEEE Internet Things J. 5(3): 1797-1806 (2018) - [j3]Yu-Jia Chen, Li-Chun Wang, Kuochen Wang, Wan-Ling Ho:
Topology-Aware Network Coding for Wireless Multicast. IEEE Syst. J. 12(4): 3683-3692 (2018) - [c19]Yu-Jia Chen, Wei-Yuan Cheng, Li-Chun Wang:
Learning-assisted beam search for indoor mmWave networks. WCNC Workshops 2018: 320-325 - 2017
- [j2]Yu-Jia Chen, Li-Chun Wang, Feng-Yi Lin, Bao-Shuh Paul Lin:
Deterministic Quality of Service Guarantee for Dynamic Service Chaining in Software Defined Networking. IEEE Trans. Netw. Serv. Manag. 14(4): 991-1002 (2017) - [c18]Yu-Jia Chen, Tong Hsu, Li-Chun Wang:
Improving Handover Performance in 5G mm-Wave HetNets. GLOBECOM 2017: 1-6 - [c17]Yu-Jia Chen, Li-Yu Cheng, Li-Chun Wang:
Prioritized resource reservation for reducing random access delay in 5G URLLC. PIMRC 2017: 1-5 - [c16]Yu-Jia Chen, Zi-Qi Wang, Li-Chun Wang:
Impact of aggregation factor on delay performance in group-based machine type communications. PIMRC 2017: 1-6 - [c15]Chun-Rong Lin, Yu-Jia Chen, Li-Chun Wang:
Handoff Delay Analysis in SDN-Enabled Mobile Networks: A Network Calculus Approach. VTC Fall 2017: 1-5 - [i3]Yu-Jia Chen, Li-Chun Wang:
Privacy Protection for Mobile Cloud Data: A Network Coding Approach. CoRR abs/1701.07075 (2017) - [i2]Yu-Jia Chen, Li-Chun Wang:
An Overflow Problem in Network Coding for Secure Cloud Storage. CoRR abs/1702.05346 (2017) - 2016
- [j1]Yu-Jia Chen, Li-Chun Wang, Chen-Hung Liao:
Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems. IEEE Trans. Parallel Distributed Syst. 27(8): 2261-2273 (2016) - [c14]Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. CANS 2016: 637-647 - [c13]Osamah Ibrahiem Abdullaziz, Yu-Jia Chen, Li-Chun Wang:
Lightweight Authentication Mechanism for Software Defined Network Using Information Hiding. GLOBECOM 2016: 1-6 - [c12]Yu-Jia Chen, Yi-Hsin Shen, Li-Chun Wang:
Achieving energy saving with QoS guarantee for WLAN using SDN. ICC 2016: 1-7 - [i1]Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. IACR Cryptol. ePrint Arch. 2016: 909 (2016) - 2015
- [c11]Calvin Hue, Yu-Jia Chen, Li-Chun Wang:
Traffic-aware networking for video streaming service using SDN. IPCCC 2015: 1-5 - 2014
- [c10]Yu-Jia Chen, Yi-Hsin Shen, Li-Chun Wang:
Traffic-Aware Load Balancing for M2M Networks Using SDN. CloudCom 2014: 668-671 - [c9]Yu-Jia Chen, Wan-Ling Ho, Li-Chun Wang, Kuo-Chen Wang:
A Cloud-Assisted Network Coded Packet Retransmission Approach for Wireless Multicasting. CloudCom 2014: 676-679 - [c8]Yu-Jia Chen, James E. Corter:
Learning or Framing?: Effects of Outcome Feedback on Repeated Decisions from Description. CogSci 2014 - [c7]Yu-Jia Chen, Feng-Yi Lin, Li-Chun Wang, Bao-Shuh Paul Lin:
A dynamic security traversal mechanism for providing deterministic delay guarantee in SDN. WoWMoM 2014: 1-6 - 2013
- [c6]Yu-Jia Chen, Chen-Hung Liao, Li-Chun Wang:
An eavesdropping prevention problem when repairing network coded data from remote distributed storage. GLOBECOM 2013: 2711-2716 - [c5]Yu-Jia Chen, Chia-Yu Lin, Li-Chun Wang:
A personal emergency communication service for smartphones using FM transmitters. PIMRC 2013: 3450-3455 - [c4]Yu-Jia Chen, Chia-Yu Lin, Li-Chun Wang:
A Privacy-Preserved Joint Group Time Scheduling Mechanism for Mobile Social Applications. TrustCom/ISPA/IUCC 2013: 150-155 - [c3]Yu-Jia Chen, Chia-Yu Lin, Li-Chun Wang:
Sensors-assisted rescue service architecture in mobile cloud computing. WCNC 2013: 4457-4462 - 2012
- [c2]Chia-Yu Lin, Yu-Jia Chen, Li-Chun Wang, Yu-Chee Tseng:
A Proximity Sensor Based No-Touch Mechanism for Mobile Applications on Smart Phones. VTC Fall 2012: 1-5 - 2011
- [c1]Yu-Jia Chen, Li-Chun Wang:
A Security Framework of Group Location-Based Mobile Applications in Cloud Computing. ICPP Workshops 2011: 184-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-06 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint