default search action
Wen-Shyong Hsieh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c21]Lung-Jen Wang, Wen-Shyong Hsieh:
Toward an Improvement of UAV-Aerial Image Using Non-linear Image Enhancement. AINA Workshops 2018: 623-626 - 2017
- [c20]Alan Dahgwo Yein, Chih-Hsueh Lin, Wen-Shyong Hsieh:
A secure mutual trust scheme for wireless sensor networks. ISIE 2017: 1369-1375 - 2016
- [c19]Chih-Hsueh Lin, Wen-Shyong Hsieh, Fu Mo, Ming-Hao Chang:
A PTC Scheme for Internet of Things: Private-Trust-Confidentiality. AINA Workshops 2016: 969-974 - 2015
- [j27]Chun-Hung Chen, Yuan-Liang Tang, Wen-Shyong Hsieh:
Image Authentication and Recovery through Optimal Selection of Block Types. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(5): 1126-1129 (2015) - [j26]Cheng-Yeh Chen, Alan Dahgwo Yein, Te-Cheng Hsu, John Y. Chiang, Wen-Shyong Hsieh:
Secure Access Control Method for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 261906:1-261906:6 (2015) - [j25]Yu-Hsiu Huang, Kai-Hsun Fan, Wen-Shyong Hsieh:
Message Authentication Scheme for Vehicular Ad-Hoc Wireless Networks without RSU. J. Inf. Hiding Multim. Signal Process. 6(1): 113-122 (2015) - [c18]Chun-Hung Chen, Yuan-Liang Tang, Wen-Shyong Hsieh:
A robust watermarking technique based on the polarity relationship between blocks. ICNSC 2015: 340-343 - 2014
- [c17]Chun-Hung Chen, Yuan-Liang Tang, Wen-Shyong Hsieh:
An Image Authentication and Recovery Method Using Optimal Selection of Block Types. ISM 2014: 151-154 - 2013
- [j24]Chun-Hung Chen, Yuan-Liang Tang, Wen-Shyong Hsieh:
Print-and-Scan Resilient Watermarking through Polarizing DCT Coefficients. IEICE Trans. Inf. Syst. 96-D(10): 2208-2214 (2013) - [j23]Wei-Shuo Li, Chun-Wei Tsai, Min Chen, Wen-Shyong Hsieh, Chu-Sing Yang:
Threshold behavior of multi-path random key pre-distribution for sparse wireless sensor networks. Math. Comput. Model. 57(11-12): 2776-2787 (2013) - [j22]Hsin-Te Wu, Wen-Shyong Hsieh:
RSU-based message authentication for vehicular ad-hoc networks. Multim. Tools Appl. 66(2): 215-227 (2013) - 2012
- [j21]Hsin-Te Wu, Wen-Shyong Hsieh:
Location-based vehicular moving predictions for wireless communication. Int. J. Ad Hoc Ubiquitous Comput. 10(4): 197-206 (2012) - [j20]Tung-Shih Su, Mei-Wen Huang, Wei-Shuo Li, Wen-Shyong Hsieh:
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j19]Mei-Wen Huang, Hsu-Jung Liu, Min-Rui Lin, Wen-Shyong Hsieh:
A Novel Mobile Sink Nodes Protocol for Grid Sensor Networks. J. Networks 7(9): 1415-1422 (2012) - [c16]Jen-Chi Huang, Wen-Shyong Hsieh:
An Automatic Image Inpainting Method for Rigid Moving Object. ACIIDS (2) 2012: 140-147 - [c15]Wei-Shuo Li, Chun-Wei Tsai, Jong-Hyouk Lee, Wen-Shyong Hsieh:
A Sparse Clustering Model of Wireless Communication Networks. IMIS 2012: 518-523 - 2011
- [j18]Te-Cheng Hsu, Wen-Shyong Hsieh, John Y. Chiang, Tung-Shih Su:
New watermark-removal method based on Eigen-image energy. IET Inf. Secur. 5(1): 43-50 (2011) - [c14]Chun-Wei Tsai, Wei-Shuo Li, Min Chen, Wen-Shyong Hsieh, Chu-Sing Yang:
Analysis of Multi-path Random Key Pre-distribution for Wireless Sensor Networks. IMIS 2011: 497-502 - 2010
- [j17]Tung-Shih Su, Wei-Lun Jeng, Jeng-Yi Huang, Wen-Shyong Hsieh:
HSG-ad hoc network: A novel hierarchical star graph ad hoc network with self-organization and routing discovery free. Int. J. Commun. Syst. 23(4): 507-527 (2010)
2000 – 2009
- 2009
- [j16]Wei-Shuo Li, Tung-Shih Su, Wen-Shyong Hsieh:
Multi-neighbor random key pre-distribution: a probabilistic analysis. IEEE Commun. Lett. 13(5): 306-308 (2009) - [c13]Hsu-Jung Liu, Mei-Wen Huang, Wen-Shyong Hsieh, Chenhuan Jack Jan:
Priority-Based Hybrid Protocol in Wireless Sensor Networks. HPCC 2009: 214-221 - 2008
- [c12]Mei-Wen Huang, Hsu-Jung Liu, Wen-Shyong Hsieh:
A Hybrid protocol for Cluster-based wireless sensor networks. ACSAC 2008: 1-5 - [c11]Te-Cheng Hsu, Wen-Shyong Hsieh, Tung-Shih Su:
A New Watermark Attacking Method Based on Eigen-Image Energy. IIH-MSP 2008: 29-32 - 2007
- [j15]Chih-Hung Lin, Wen-Shyong Hsieh:
Image Authentication Scheme for Resisting JPEG, JPEG2000 Compression and Scaling. IEICE Trans. Inf. Syst. 90-D(1): 126-136 (2007) - 2006
- [c10]Yu-Kuo Tseng, You-Yi Lu, Jen-Yi Huang, Wen-Shyong Hsieh, Bao Rong Chang, Yu-Chang Chen, Shi-Huang Chen:
ID-Based PPM for IP Traceback. ICICIC (2) 2006: 262-265 - [c9]Tung-Shih Su, Wei-Lun Jeng, Jeng-Yi Huang, Wen-Shyong Hsieh:
A Novel Hierarchical Ad Hoc Networks. ICNS 2006: 19 - [c8]Tung-Shih Su, Chih-Hung Lin, Wen-Shyong Hsieh:
A Novel OoS-aware Routing for ad hoc Networks. JCIS 2006 - 2005
- [j14]Din-Yuen Chan, Chih-Hsueh Lin, Wen-Shyong Hsieh:
Image Segmentation with Fast Wavelet-Based Color Segmenting and Directional Region Growing. IEICE Trans. Inf. Syst. 88-D(10): 2249-2259 (2005) - [c7]Wei-Lun Jeng, Tung-Shih Su, Wen-Shyong Hsieh:
Using Code Division Technique to Improve the Performance of Ad Hoc Wireless Network. ACIS-ICIS 2005: 634-639 - [c6]Wei-Soul Li, Wen-Shyong Hsieh, Ming-Hong Sun:
Index LOCO-I: A Hybrid Method of Data Hiding and Image Compression. KES (3) 2005: 463-468 - [c5]Jen-Yi Huang, Yu-Kuo Tseng, Mao Sheng Lin, Wen-Shyong Hsieh:
Error Rate-Based Dynamic Weighted Fair Queuing In Wireless Networks. LCN 2005: 546-553 - 2004
- [j13]Yu-Kuo Tseng, Hsi-Han Chen, Wen-Shyong Hsieh:
Probabilistic packet marking with non-preemptive compensation. IEEE Commun. Lett. 8(6): 359-361 (2004) - [j12]Jen-Yi Huang, Hsi-Han Chen, Lung-Jen Wang, Chung-Hsien Lin, Wen-Shyong Hsieh:
Partition Timing Routing Protocol in Wireless Ad Hoc Networks. IEICE Trans. Inf. Syst. 87-D(6): 1433-1437 (2004) - [j11]Yu-Kuo Tseng, Lung-Jen Wang, His-Han Chen, Wen-Shyong Hsieh:
IP Traceback in Incomplete PPM. IEICE Trans. Inf. Syst. 87-D(9): 2262-2266 (2004) - [j10]Lung-Jen Wang, Wen-Shyong Hsieh, Trieu-Kien Truong:
A fast computation of 2-D cubic-spline interpolation. IEEE Signal Process. Lett. 11(9): 768-771 (2004) - [j9]Jen-Chi Huang, Wen-Shyong Hsieh:
Automatic feature-based global motion estimation in video sequences. IEEE Trans. Consumer Electron. 50(3): 911-915 (2004) - 2003
- [j8]Chih-Hung Lin, Wen-Shyong Hsieh:
Applying projection and B-spline to image authentication and remedy. IEEE Trans. Consumer Electron. 49(4): 1234-1239 (2003) - 2002
- [c4]Wen-Shyong Hsieh, Chuan-Fu Wu, Jen-Yi Huang, Jyh-Long Lin, Buh-Yun Sher:
An Efficient Method to Improve the Quality of Watermarked Cover Image. ICDCS Workshops 2002: 267-271 - 2001
- [j7]Lung-Jen Wang, Wen-Shyong Hsieh, Trieu-Kien Truong, Irving S. Reed, T. C. Cheng:
A fast efficient computation of cubic-spline interpolation in image codec. IEEE Trans. Signal Process. 49(6): 1189-1197 (2001) - 2000
- [j6]Chuan-Fu Wu, Wen-Shyong Hsieh:
Image refining technique using digital watermarking. IEEE Trans. Consumer Electron. 46(1): 1-5 (2000) - [j5]Chuan-Fu Wu, Wen-Shyong Hsieh:
Digital watermarking using zerotree of DCT. IEEE Trans. Consumer Electron. 46(1): 87-94 (2000) - [j4]Trieu-Kien Truong, Lung-Jen Wang, Irving S. Reed, Wen-Shyong Hsieh:
Image data compression using cubic convolution spline interpolation. IEEE Trans. Image Process. 9(11): 1988-1995 (2000)
1990 – 1999
- 1999
- [j3]Yu-Chang Chen, Shi-Chou Hsu, Tan-Lin Hsu, Wen-Shyong Hsieh:
The strategies of traffic control for multimedia data transmission with QoS guarantees over CATV network. IEEE Trans. Consumer Electron. 45(1): 107-117 (1999) - [c3]Wen-Shyong Hsieh, Lung-Jen Wang:
A Fast Algorithm of Cubic Convolution Spline Interpolation for Image Compression. IMSA 1999: 1-5 - 1998
- [c2]Yu-Chang Chen, Chien-Chih Chang, Wen-Shyong Hsieh, Chu-Sing Yang:
Address Resolution Model and Traffic Control for Multimedia Data Transmission with QoS Guarantees between ATM and Ethernet. EUROMICRO 1998: 20520-20527 - [c1]Buh-Yun Sher, Shin-Chung Shao, Wen-Shyong Hsieh:
Mining Regression Rules and Regression Trees. PAKDD 1998: 271-282 - 1997
- [j2]Sing-Liang Chen, E-ren Chuang, Wen-Shyong Hsieh:
VISUAL: An object oriented language for image understanding. J. Syst. Archit. 43(1-5): 327-335 (1997) - 1992
- [j1]Chu-Sing Yang, S. Y. Wu, Wen-Shyong Hsieh, K. C. Huang:
A reconfigurable boolean n-cube architecture under faults. Microprocess. Microprogramming 35(1-5): 673-679 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint