default search action
Mu-En Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Min-Kuan Chen, Dong-Yuh Yang, Ming-Hua Hsieh, Mu-En Wu:
An intelligent option trading system based on heatmap analysis via PON/POD yields. Expert Syst. Appl. 257: 124948 (2024) - [j37]Jimmy Ming-Tai Wu, Wen-Yu Lin, Ko-Wei Huang, Mu-En Wu:
On the design of searching algorithm for parameter plateau in quantitative trading strategies using particle swarm optimization. Knowl. Based Syst. 293: 111630 (2024) - [j36]Jin Wang, Chenyang Li, Yunhui Shi, Dan Wang, Mu-En Wu, Nam Ling, Baocai Yin:
MSF-Net: Multi-Scale Feedback Reconstruction for Guided Depth Map Super-Resolution. IEEE Trans. Circuits Syst. Video Technol. 34(2): 709-723 (2024) - 2023
- [j35]Yu-Chih Wei, You-Xin Lai, Mu-En Wu:
An evaluation of deep learning models for chargeback Fraud detection in online games. Clust. Comput. 26(2): 927-943 (2023) - [j34]Jimmy Ming-Tai Wu, Ranran Li, Pi-Chung Hsu, Mu-En Wu:
The effective skyline quantify-utility patterns mining algorithm with pruning strategies. Comput. Sci. Inf. Syst. 20(3): 1085-1108 (2023) - [j33]Jimmy Ming-Tai Wu, Ranran Li, Mu-En Wu, Jerry Chun-Wei Lin:
Mining skyline frequent-utility patterns from big data environment based on MapReduce framework. Intell. Data Anal. 27(5): 1359-1377 (2023) - [c52]Chi-Fang Chao, Mu-En Wu, Ming-Hua Hsieh:
Fuzzy-Based Factor Evaluation System for Momentum Overweight Trading Strategy. ACIIDS (1) 2023: 175-185 - [c51]Chun-Hao Chen, Szu-Chi Wang, Mu-En Wu, Kawuu W. Lin:
Enhancing Abnormal-Behavior-Based Stock Trend Prediction Algorithm with Cost-Sensitive Learning Using Genetic Algorithms. ACIIDS (1) 2023: 186-196 - 2022
- [j32]Jimmy Ming-Tai Wu, Sheng-Hao Lin, Jia-Hao Syu, Mu-En Wu:
Embedded draw-down constraint reward function for deep reinforcement learning. Appl. Soft Comput. 125: 109150 (2022) - [j31]Mu-En Wu, Jia-Hao Syu, Gautam Srivastava, Jerry Chun-Wei Lin:
Informative index for investment based on Kelly criterion. Enterp. Inf. Syst. 16(8-9) (2022) - [j30]Jiawen Yu, Jin Wang, Longhua Sun, Mu-En Wu, Qing Zhu:
Point Cloud Geometry Compression Based on Multi-Layer Residual Structure. Entropy 24(11): 1677 (2022) - [j29]Jimmy Ming-Tai Wu, Meng-Hsiun Tsai, Chao-Chieh Cheng, Mu-En Wu:
Predict the trend of economic indicators in time series based on recurrent neural network combined with leading indicators. J. Intell. Fuzzy Syst. 43(2): 2179-2189 (2022) - [j28]Mu-En Wu, Jia-Hao Syu, Jerry Chun-Wei Lin, Jan-Ming Ho:
Effective Fuzzy System for Qualifying the Characteristics of Stocks by Random Trading. IEEE Trans. Fuzzy Syst. 30(8): 3152-3165 (2022) - [j27]Jimmy Ming-Tai Wu, Min Wei, Mu-En Wu, Shahab Tayeb:
Top-k dominating queries on incomplete large dataset. J. Supercomput. 78(3): 3976-3997 (2022) - 2021
- [j26]Mu-En Wu, Jia-Hao Syu, Jerry Chun-Wei Lin, Jan-Ming Ho:
Portfolio management system in equity market neutral using reinforcement learning. Appl. Intell. 51(11): 8119-8131 (2021) - [j25]Chien-Ming Chen, Yanyu Huang, King-Hang Wang, Saru Kumari, Mu-En Wu:
A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 15(9): 1200-1215 (2021) - [j24]Jia-Hao Syu, Mu-En Wu, Gautam Srivastava, Chi-Fang Chao, Jerry Chun-Wei Lin:
An IoT-Based Hedge System for Solar Power Generation. IEEE Internet Things J. 8(13): 10347-10355 (2021) - [j23]Mu-En Wu, Jia-Hao Syu, Jerry Chun-Wei Lin, Jan-Ming Ho:
Evolutionary ORB-based model with protective closing strategies. Knowl. Based Syst. 216: 106769 (2021) - [c50]Jia-Hao Syu, Chi-Fang Chao, Mu-En Wu:
Forecasting System for Solar-Power Generation. ACIIDS (Companion) 2021: 65-72 - [c49]Chun-Hao Chen, Yin-Ting Lin, Shih-Ting Hung, Mu-En Wu:
Forecasting Stock Trend Based on the Constructed Anomaly-Patterns Based Decision Tree. ACIIDS 2021: 606-615 - [c48]Lin-Yi Jiang, Cheng-Ju Kuo, Yu-Hsin Wang, Mu-En Wu, Wei-Tsung Su, Ding-Chau Wang, Tang-Hsuan O, Chi-Luen Fu, Chao-Chun Chen:
A Transparently-Secure and Robust Stock Data Supply Framework for Financial-Technology Applications. ACIIDS 2021: 616-629 - 2020
- [j22]Mu-En Wu, Hui-Huang Tsai, Wei-Ho Chung, Chien-Ming Chen:
Analysis of Kelly betting on finite repeated games. Appl. Math. Comput. 373: 125028 (2020) - [j21]Tai-Li Luo, Mu-En Wu, Chien-Ming Chen:
A framework of deep reinforcement learning for stock evaluation functions. J. Intell. Fuzzy Syst. 38(5): 5639-5649 (2020) - [j20]Mu-En Wu, Sheng-Hao Lin, Jia-Ching Wang:
Embedded draw-down constraint using ensemble learning for stock trading. J. Intell. Fuzzy Syst. 38(5): 5651-5659 (2020) - [c47]Jia-Hao Syu, Mu-En Wu, Shin-Huah Lee, Jan-Ming Ho:
On the Design of Profitable Index Based on the Mechanism of Random Tradings. ACIIDS (Companion) 2020: 3-12 - [c46]Jia-Hao Syu, Mu-En Wu, Chun-Hao Chen, Jan-Ming Ho:
Threshold-Adjusted ORB Strategies with Genetic Algorithm and Protective Closing Strategy on Taiwan Futures Market. ICASSP 2020: 1778-1782 - [c45]Jia-Hao Syu, Mu-En Wu, Jan-Ming Ho:
Portfolio Management System with Reinforcement Learning. SMC 2020: 4146-4151
2010 – 2019
- 2019
- [j19]Chun-Hao Chen, Yu-Hsuan Chen, Jerry Chun-Wei Lin, Mu-En Wu:
An Effective Approach for Obtaining a Group Trading Strategy Portfolio Using Grouping Genetic Algorithm. IEEE Access 7: 7313-7325 (2019) - [j18]Yi-Cheng Tsai, Mu-En Wu, Jia-Hao Syu, Chin-Laung Lei, Chung-Shu Wu, Jan-Ming Ho, Chuan-Ju Wang:
Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets. IEEE Access 7: 32061-32071 (2019) - [j17]Wei-Ho Chung, Mu-En Wu, Yeong-Luh Ueng, Yu-Hsuan Su:
Seal imprint verification via feature analysis and classifications. Future Gener. Comput. Syst. 101: 458-466 (2019) - [j16]Mu-En Wu, Wei-Ho Chung:
Empirical Evaluations on Momentum Effects of Taiwan Index Futures via Stop-Loss and Stop-Profit Mechanisms. Int. J. Inf. Technol. Decis. Mak. 18(2): 629-648 (2019) - [c44]Mu-En Wu, Wei-Ho Chung, Chia-Jung Lee:
On the Analysis of Kelly Criterion and Its Application. ACIIDS (2) 2019: 165-172 - [c43]Jia-Hao Syu, Mu-En Wu, Jan-Ming Ho:
A Framework of Applying Kelly Stationary Index to Stock Trading in Taiwan Market. IEEE BigData 2019: 5569-5572 - [c42]Chun-Hao Chen, Wan-Yi Shen, Mu-En Wu, Tzung-Pei Hong:
A Divide-and-Conquer-based Approach for Diverse Group Stock Portfolio Optimization Using Island-based Genetic Algorithms. CEC 2019: 1473-1471 - [c41]Jia-Hao Syu, Mu-En Wu, Shin-Huah Lee, Jan-Ming Ho:
Modified ORB Strategies with Threshold Adjusting on Taiwan Futures Market. CIFEr 2019: 1-7 - [c40]Chun-Hao Chen, Munkhjargal Gankhuyag, Tzung-Pei Hong, Mu-En Wu, Jimmy Ming-Tai Wu:
A Multiobjective-Based Group Trading Strategy Portfolio Optimization Technique. ICGEC 2019: 87-93 - [c39]Lei Yang, Tsu-Yang Wu, Zhiyuan Lee, Chien-Ming Chen, King-Hang Wang, Jeng-Shyang Pan, Shu-Chuan Chu, Mu-En Wu:
Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks. ICGEC 2019: 462-467 - [c38]Chun-Hao Chen, Chia-Yuan Cheng, Tzung-Pei Hong, Mu-En Wu, Kawuu W. Lin, Jerry Chun-Wei Lin:
An Evolutionary-based Algorithm for Multi-Period Grouping Stock Portfolio Optimization. SMC 2019: 2530-2534 - 2018
- [j15]Mu-En Wu, Wei-Ho Chung:
A Novel Approach of Option Portfolio Construction Using the Kelly Criterion. IEEE Access 6: 53044-53052 (2018) - [j14]Li Xu, Chi-Yao Weng, Lun-Pin Yuan, Mu-En Wu, Raylin Tso, Hung-Min Sun:
A shareable keyword search over encrypted data in cloud computing. J. Supercomput. 74(3): 1001-1023 (2018) - [c37]Mu-En Wu, Wei-Ho Chung:
A Novel Approach for Option Trading Based on Kelly Criterion. ACIIDS (1) 2018: 519-527 - [c36]Mu-En Wu, Pang-Jen Hung:
A Framework of Option Buy-Side Strategy with Simple Index Futures Trading Based on Kelly Criterion. BESC 2018: 210-212 - [c35]Li-Chen Cheng, Yu-Hsiang Huang, Mu-En Wu:
Applied attention-based LSTM neural networks in stock prediction. IEEE BigData 2018: 4716-4718 - [c34]Wei-Ho Chung, Mu-En Wu, Yeong-Luh Ueng, Yi-Hsuan Su:
Forged Seal Imprint Identification Based on Regression Analysis on Imprint Borders and Metrics Comparisons. DSC 2018: 1-5 - [c33]Jen-Chieh Hsu, Raylin Tso, Yu-Chi Chen, Mu-En Wu:
Oblivious Transfer Protocols Based on Commutative Encryption. NTMS 2018: 1-5 - [c32]Chun-Hao Chen, Yu-Hsuan Chen, Mu-En Wu, Tzung-Pei Hong:
A Sophisticated Optimization Algorithm for Obtaining a Group Trading Strategy Portfolio and Its Stop-Loss and Take-Profit Points. SMC 2018: 3417-3420 - 2017
- [j13]Chia-Jung Lee, Chao-Kai Chiang, Mu-En Wu:
Online Learning Problems against Dynamic Strategies in Gradually Evolving Worlds. J. Inf. Hiding Multim. Signal Process. 8(4): 869-879 (2017) - [j12]Mu-En Wu, Chia-Hung Wang, Wei-Ho Chung:
Using trading mechanisms to investigate large futures data and their implications to market trends. Soft Comput. 21(11): 2821-2834 (2017) - [j11]Raylin Tso, Abdulhameed Alelaiwi, Sk. Md. Mizanur Rahman, Mu-En Wu, M. Shamim Hossain:
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud. J. Signal Process. Syst. 89(1): 51-59 (2017) - [c31]Jen-Ho Hsiao, Raylin Tso, Chien-Ming Chen, Mu-En Wu:
Decentralized E-Voting Systems Based on the Blockchain Technology. CSA/CUTE 2017: 305-309 - [c30]Kun-Tai Chan, Raylin Tso, Chien-Ming Chen, Mu-En Wu:
Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts. CSA/CUTE 2017: 310-314 - [c29]Yi-Siou Jheng, Raylin Tso, Chien-Ming Chen, Mu-En Wu:
Password-Based Authenticated Key Exchange from Lattices for Client/Server Model. CSA/CUTE 2017: 315-319 - [c28]Chun-Hao Chen, Yu-Hsuan Chen, Mu-En Wu:
A GGA-based Algorithm for Group Trading Strategy Portfolio Optimization. MISNC 2017: 40:1-40:5 - [c27]Tsu-Yang Wu, Yueshan Lin, King-Hang Wang, Chien-Ming Chen, Jeng-Shyang Pan, Mu-En Wu:
Comments on a privacy preserving public auditing mechanism for shared cloud data. MISNC 2017: 48:1-48:6 - 2016
- [c26]Chia-Hung Wang, Mu-En Wu:
Numerical Evaluation of Two Management Schemes for Sharing Limited Bandwidth. CMCSN 2016: 182-185 - [c25]Hui-Huang Tsai, Mu-En Wu, Wei-Ho Chung, Cheng-Yu Lu:
On the Study of Trading Strategies Within Limited Arbitrage Based on SVM. ICGEC 2016: 120-126 - 2015
- [j10]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks. J. Univers. Comput. Sci. 21(3): 406-418 (2015) - [c24]Chia-Hung Wang, Mu-En Wu, Wei-Ho Chung:
Perspectives of Bandwidth Sharing Schemes in Communication Systems with Blocking. ASE BD&SI 2015: 29:1-29:6 - [c23]Mu-En Wu, Hui-Huang Tsai, Raylin Tso, Chi-Yao Weng:
An Adaptive Kelly Betting Strategy for Finite Repeated Games. ICGEC (2) 2015: 39-46 - [c22]Jeng-Shyang Pan, Raylin Tso, Mu-En Wu, Chien-Ming Chen:
Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments. ICGEC (2) 2015: 59-69 - [c21]Chia-Hung Wang, Mu-En Wu, Chien-Ming Chen:
Inspection Risk and Delay for Screening Cargo Containers at Security Checkpoints. IIH-MSP 2015: 211-214 - [c20]Jeng-Shyang Pan, Chi-Yao Weng, Mu-En Wu, Chuan-Yih Chen, Chien-Ming Chen, Chwei-Shyong Tsai:
A KL Divergence Function for Randomized Secret Shares. IIH-MSP 2015: 231-234 - [c19]Chia-Hung Wang, Mu-En Wu, Wei-Ho Chung:
Empirical Evaluations on Momentum Effects of Taiwan Index Futures Market. RVSP 2015: 82-85 - [c18]Wei Ren, Yi Ren, Mu-En Wu, Chia-Jung Lee:
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring. RVSP 2015: 130-133 - [c17]Chia-Jung Lee, Chao-Kai Chiang, Mu-En Wu:
Resisting Dynamic Strategies in Gradually Evolving Worlds. RVSP 2015: 191-194 - [c16]Mu-En Wu, Chia-Hung Wang, Wei-Ho Chung, Raylin Tso, I-Hsuan Yang:
An Empirical Comparison between Kelly Criterion and Vince's Optimal F. SmartCity 2015: 806-810 - [c15]Chia-Hung Wang, Wei-Ho Chung, Chia-Jung Lee, Mu-En Wu:
An atomic routing game for multi-class communication networks with quality of service requirements. WOCC 2015: 206-210 - 2014
- [j9]Shuai-Min Chen, Mu-En Wu, Hung-Min Sun, King-Hang Wang:
CRFID: An RFID system with a cloud database as a back-end server. Future Gener. Comput. Syst. 30: 155-161 (2014) - [j8]Mu-En Wu, Raylin Tso, Hung-Min Sun:
On the improvement of Fermat factorization using a continued fraction technique. Future Gener. Comput. Syst. 30: 162-168 (2014) - [j7]Mu-En Wu, Shih-Ying Chang, Chi-Jen Lu, Hung-Min Sun:
A communication-efficient private matching scheme in Client-Server model. Inf. Sci. 275: 348-359 (2014) - [c14]Ta-Wei Hung, Mu-En Wu, Chuan-Ju Wang, William W. Y. Hsu, Jan-Ming Ho:
On the design of trading schemes of equity funds based on random traders. GrC 2014: 106-111 - [c13]Chien-Ming Chen, Jeng-Shyang Pan, Raylin Tso, Szu-Wei Huang, Mu-En Wu:
Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID. IIH-MSP 2014: 634-637 - [c12]Chien-Ming Chen, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun:
A Methodology for Hook-Based Kernel Level Rootkits. ISPEC 2014: 119-128 - [c11]Yu-Chi Chen, Kunhan Lu, Raylin Tso, Mu-En Wu:
An Improved Visual Cryptography with Cheating Prevention. IWDW 2014: 444-454 - [c10]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu:
Security Analysis and Improvement of Femtocell Access Control. NSS 2014: 223-232 - [c9]Raylin Tso, Chien-Ming Chen, Xinying Zheng, Mu-En Wu:
A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions. RFIDSec Asia 2014: 17-28 - 2013
- [c8]Ta-Wei Hung, Mu-En Wu, Hsueh-I Lu, Jan-Ming Ho:
Rating Equity Funds against Return of Random Traders. SocialCom 2013: 756-761 - 2012
- [j6]Shih-Ying Chang, Yue-Hsun Lin, Hung-Min Sun, Mu-En Wu:
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks. ACM Trans. Sens. Networks 8(2): 13:1-13:13 (2012) - [c7]Jen-Hou Chou, Chi-Jen Lu, Mu-En Wu:
Making Profit in a Prediction Market. COCOON 2012: 556-567 - [c6]Mu-En Wu, Raylin Tso, Hung-Min Sun:
Cryptanalysis of Exhaustive Search on Attacking RSA. NSS 2012: 373-379 - [c5]Mu-En Wu, Raylin Tso, Hung-Min Sun:
On the Improvement of Fermat Factorization. NSS 2012: 380-391
2000 – 2009
- 2009
- [j5]Hung-Min Sun, Cheng-Ta Yang, Mu-En Wu:
Short-Exponent RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(3): 912-918 (2009) - [j4]Hung-Min Sun, Mu-En Wu, Cheng-Ta Yang:
A Note on Factoring alpha-LSBS Moduli. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 2137-2138 (2009) - [j3]Hung-Min Sun, Mu-En Wu, Cheng-Ta Yang:
Simple Backdoors on RSA Modulus by Using RSA Vulnerability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(9): 2326-2332 (2009) - [j2]Hung-Min Sun, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, Vincent S. Tseng:
Trading decryption for speeding encryption in Rebalanced-RSA. J. Syst. Softw. 82(9): 1503-1512 (2009) - [c4]Hung-Min Sun, Cheng-Ta Yang, Yue-Hsun Lin, Mu-En Wu:
A Pair-wise Key Establishment for Wireless Sensor Networks. IIH-MSP 2009: 1152-1155 - 2008
- [c3]Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA. ACISP 2008: 84-97 - [c2]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. CANS 2008: 49-63 - [i2]Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. IACR Cryptol. ePrint Arch. 2008: 296 (2008) - 2007
- [j1]Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, M. Jason Hinek:
Dual RSA and Its Security Analysis. IEEE Trans. Inf. Theory 53(8): 2922-2933 (2007) - [c1]Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen:
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. ACNS 2007: 116-128 - 2005
- [i1]Hung-Min Sun, Mu-En Wu:
An Approach Towards Rebalanced RSA-CRT with Short Public Exponent. IACR Cryptol. ePrint Arch. 2005: 53 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint