default search action
Wen-Chen Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Sanjaikanth E. Vadakkethil Somanathan Pillai, Wen-Chen Hu:
Privacy-Preserving Mobile Advertising Using ElGamal Encryption and Private Proximity Testing. ACM Southeast Regional Conference 2024: 176-181 - [c26]Sanjaikanth E. Vadakkethil Somanathan Pillai, Wen-Chen Hu:
Privacy-Preserving Gross Domestic Product (GDP) Calculation Using Paillier Encryption and Differential Privacy. ACM Southeast Regional Conference 2024: 182-187 - [i2]Wen-Chen Hu, Sanjaikanth E. Vadakkethil Somanathan Pillai, Abdelrahman Ahmed ElSaid:
Mobile Health Text Misinformation Identification Using Mobile Data Mining. CoRR abs/2402.19280 (2024) - 2023
- [c25]Sanjaikanth E. Vadakkethil Somanathan Pillai, Wen-Chen Hu:
Misinformation Detection Using an Ensemble Method with Emphasis on Sentiment and Emotional Analyses. SERA 2023: 295-300 - 2022
- [c24]Sanjaikanth E. Vadakkethil Somanathan Pillai, Abdelrahman Ahmed ElSaid, Wen-Chen Hu:
A Self-Reconfigurable System for Mobile Health Text Misinformation Detection. EIT 2022: 242-247
2010 – 2019
- 2019
- [c23]Mohsen Riahi Manesh, Jonathan Kenney, Wen-Chen Hu, Vijaya Kumar Devabhaktuni, Naima Kaabouch:
Detection of GPS Spoofing Attacks on Unmanned Aerial Systems. CCNC 2019: 1-6 - [c22]Youness Arjoune, Wen-Chen Hu, Naima Kaabouch:
Chebyshev Vandermonde-like Measurement Matrix Based Compressive Spectrum Sensing. EIT 2019: 28-33 - 2017
- [j15]Mohsen Riahi Manesh, Naima Kaabouch, Hector Reyes, Wen-Chen Hu:
A Bayesian approach to estimate and model SINR in wireless networks. Int. J. Commun. Syst. 30(9) (2017) - [j14]Hongyu Guo, Amjad Nusayr, Wen-Chen Hu:
Analysis and Resolution of Semantic Ambiguity of Toggle Buttons by Standardizing the Design in Software GUI and Mobile Apps. IJHCR 8(2): 1-18 (2017) - [c21]Wen-Chen Hu, Naima Kaabouch, Sara Faraji Jalal Apostal, Hung-Jen Yang:
Location-aware mining for privacy-preserving location-based advertising. EIT 2017: 569-574 - 2016
- [j13]Hector Reyes, Sriram Subramaniam, Naima Kaabouch, Wen-Chen Hu:
A spectrum sensing technique based on autocorrelation and Euclidean distance and its comparison with energy detection for cognitive radio networks. Comput. Electr. Eng. 52: 319-327 (2016) - [j12]Debabrata Ghosh, Naima Kaabouch, Wen-Chen Hu:
A robust iterative super-resolution mosaicking algorithm using an adaptive and directional Huber-Markov regularization. J. Vis. Commun. Image Represent. 40: 98-110 (2016) - [c20]Wen-Chen Hu, Hung-Jen Yang, Naima Kaabouch:
Secure spatial trajectory prediction based on traffic flows. EIT 2016: 723-727 - [c19]Mohsen Riahi Manesh, Md. Shakib Apu, Naima Kaabouch, Wen-Chen Hu:
Performance evaluation of spectrum sensing techniques for cognitive radio systems. UEMCON 2016: 1-7 - [c18]Mohsen Riahi Manesh, Naima Kaabouch, Hector Reyes, Wen-Chen Hu:
A Bayesian model of the aggregate interference power in cognitive radio networks. UEMCON 2016: 1-7 - [c17]Hector Reyes, Sriram Subramaniam, Naima Kaabouch, Wen-Chen Hu:
A Bayesian inference method for estimating the channel occupancy. UEMCON 2016: 1-6 - [i1]Naima Kaabouch, Wen-Chen Hu, Yi Chen:
Alternative Technique to Asymmetry Analysis-Based Overlapping for Foot Ulcer Examination: Scalable Scanning. CoRR abs/1606.03578 (2016) - 2014
- [j11]Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, S. Hossein Mousavinezhad:
Privacy-Preserving Spatial Trajectory Prediction Based on a Novel Matrix Representation. Int. J. Handheld Comput. Res. 5(1): 56-78 (2014) - [j10]Hector Reyes, Naima Kaabouch, Wen-Chen Hu:
Spectrum Channel Characterization Using Delay and Doppler Spread Parameters. J. Commun. 9(3): 234-240 (2014) - 2013
- [c16]Wen-Chen Hu, Hung-Jen Yang, Naima Kaabouch, Lei Chen:
A novel matrix representation for privacy-preserving spatial trajectory prediction. EIT 2013: 1-7 - [c15]Md. Shafiul Islam, Naima Kaabouch, Wen-Chen Hu:
A survey of medical imaging techniques used for breast cancer detection. EIT 2013: 1-5 - 2012
- [j9]Wen-Chen Hu, Naima Kaabouch, Hung-Jen Yang, S. Hossein Mousavinezhad:
Route Anomaly Detection Using a Linear Route Representation. J. Comput. Networks Commun. 2012: 675605:1-675605:12 (2012) - 2011
- [j8]Naima Kaabouch, Yi Chen, Wen-Chen Hu, Julie W. Anderson, Forrest Ames, Rolf Paulson:
Enhancement of the asymmetry-based overlapping analysis through features extraction. J. Electronic Imaging 20(1): 013012 (2011) - 2010
- [j7]Wen-Chen Hu, Yanjun Zuo, Lei Chen, Hung-Jen Yang:
Contemporary Issues in Handheld Computing Research. Int. J. Handheld Comput. Res. 1(1): 1-23 (2010) - [c14]Yanjun Zuo, Wen-Chen Hu, Timothy O'Keefe:
Securely Querying Sensor Enabled RFID Virtual Databases (SERVDs). ITNG 2010: 619-624
2000 – 2009
- 2009
- [j6]Lei Chen, Wen-Chen Hu, Ming Yang, Lei Zhang:
Security and Privacy Issues in Secure E-Mail Standards and Services. Int. J. Inf. Secur. Priv. 3(3): 1-13 (2009) - [j5]Yanjun Zuo, Wen-Chen Hu:
Trust-Based Information Risk Management in a Supply Chain Network. Int. J. Inf. Syst. Supply Chain Manag. 2(3): 19-34 (2009) - [c13]Yanjun Zuo, Wen-Chen Hu, Timothy O'Keefe:
Trust Computing for Social Networking. ITNG 2009: 1534-1539 - [c12]Wen-Chen Hu, Yanjun Zuo, Naima Kaabouch, Hung-Jen Yang:
Mobile Data Protection Using Handheld Usage Context Matching. Mobile Data Management 2009: 594-599 - 2008
- [j4]Wen-Chen Hu, Chyuan-Huei T. Yang, Jyh-haw Yeh, Weihong Hu:
Mobile and Electronic Commerce Systems and Technologies. J. Electron. Commer. Organ. 6(3): 54-73 (2008) - [c11]Wen-Chen Hu, Yanjun Zuo, Tom Wiggen, V. Krishna:
Handheld data protection using handheld usage pattern identification. EIT 2008: 227-230 - 2006
- [j3]Wen-Chen Hu, Jyh-haw Yeh, Lixin Fu, Hung-Jen Yang:
Handheld Computing and Programming for Mobile Commerce. Int. J. Web Inf. Syst. 2(3/4): 164-175 (2006) - [c10]Lei Chen, Chung-wei Lee, Wen-Chen Hu:
Gene intrusion on a society of Hill-Climbers. ACM Southeast Regional Conference 2006: 34-39 - 2005
- [j2]Jyh-haw Yeh, Wei Zhang, Wen-Chen Hu, Chung-wei Lee:
Design and simulation of a supplemental protocol for BGP. Comput. Networks 49(2): 172-200 (2005) - [j1]Jyh-haw Yeh, Marion Scheepers, Wen-Chen Hu:
Modifying YCN key assignment scheme to resist the attack from Hwang. Inf. Process. Lett. 95(4): 435-440 (2005) - [r2]Chung-wei Lee, Wen-Chen Hu, Jyh-haw Yeh:
Mobile Commerce Technology. Encyclopedia of Information Science and Technology (IV) 2005: 1967-1972 - [r1]Wen-Chen Hu, Hung-Jen Yang, Jyh-haw Yeh, Chung-wei Lee:
World Wide Web Search Technologies. Encyclopedia of Information Science and Technology (V) 2005: 3111-3117 - 2003
- [c9]Jyh-haw Yeh, Chung-wei Lee, Wen-Chen Hu:
Protecting Internet Public Information Integrity During Transmission. International Conference on Internet Computing 2003: 308-314 - [c8]Chung-wei Lee, Wen-Chen Hu, Jyh-haw Yeh:
A System Model for Mobile Commerce. ICDCS Workshops 2003: 634-639 - 2002
- [c7]Jui-Fa Chen, Wei-Chuan Lin, Chi-Ming Chung, Zhi Yu Jian, Wen-Chen Hu:
A Transmission Service with Three-Queue Management for a Distributed Remote Monitoring Environment. ICDCS Workshops 2002: 217-221 - 2001
- [c6]Wen-Chen Hu, Yapin Zhong, Wei-Chuan Lin, Jui-Fa Chen:
An XML World Wide Web Search Engine Using Approximate Structural Matching. ISAS-SCI (1) 2001: 410-415 - 2000
- [c5]Wen-Chen Hu, Kai-Hsiung Chang, Gerhard X. Ritter:
Web document classification using modified decision trees. ACM Southeast Regional Conference 2000: 262-263
1990 – 1999
- 1999
- [c4]Wen-Chen Hu, Mark S. Schmalz, Gerhard X. Ritter:
Image Retrieval Using the Longest Approximate Common Subsequences. ICMCS, Vol. 2 1999: 730-734 - [c3]Wen-Chen Hu, Mark S. Schmalz, Gerhard X. Ritter:
COQUINA: Content-Queryable Image and Signal Archives. ICMCS, Vol. 2 1999: 1009-1010 - 1998
- [c2]Wen-Chen Hu, Gerhard X. Ritter, Mark S. Schmalz:
Approximating the longest approximate common subsequence problem. ACM Southeast Regional Conference 1998: 166-172 - 1997
- [c1]Wen-Chen Hu, Gerhard X. Ritter:
A Line String Image Representation for Image Storage and Retrieval. ICMCS 1997: 434-441
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-06 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint