default search action
Te-Yu Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Vivek Arya, Hemant Choubey, Sandeep Sharma, Te-Yu Chen, Cheng-Chi Lee:
Image Enhancement and Features Extraction of Electron Microscopic Images Using Sigmoid Function and 2D-DCT. IEEE Access 10: 76742-76751 (2022) - [j12]Shaheena Khatoon, Te-Yu Chen, Cheng-Chi Lee:
An improved user authentication and key agreement scheme for roaming service in ubiquitous network. Ann. des Télécommunications 77(9): 621-640 (2022)
2010 – 2019
- 2018
- [c6]Simon Su, Michael An, Vincent Perry, Jianfeng Jia, Taewoo Kim, Te-Yu Chen, Chen Li:
Visually Analyzing A Billion Tweets: An Application for Collaborative Visual Analytics on Large High-Resolution Display. IEEE BigData 2018: 3597-3606 - 2017
- [j11]Manoj Kumar Chande, Te-Yu Chen, Cheng-Chi Lee:
An improved multi-signature scheme for specified group of verifiers. Int. J. Electron. Secur. Digit. Forensics 9(2): 180-190 (2017) - 2014
- [j10]Chih-Min Lin, Yu-Ling Hou, Te-Yu Chen, Kuo-Hsin Chen:
Breast Nodules Computer-Aided Diagnostic System Design Using Fuzzy Cerebellar Model Neural Networks. IEEE Trans. Fuzzy Syst. 22(3): 693-699 (2014) - 2013
- [j9]Cheng-Chi Lee, Chi-Tung Chen, Ping-Hsien Wu, Te-Yu Chen:
Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices. IET Comput. Digit. Tech. 7(1): 48-56 (2013) - [j8]Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. J. Supercomput. 66(2): 1008-1032 (2013) - 2012
- [j7]Cheng-Chi Lee, Rui-Xiang Chang, Te-Yu Chen, Lung Albert Chen:
An Improved Delegation-Based Authentication Protocol for PCSs. Inf. Technol. Control. 41(3): 258-267 (2012) - 2011
- [j6]Chih-Min Lin, Ang-Bung Ting, Ming-Chia Li, Te-Yu Chen:
Neural-network-based robust adaptive control for a class of nonlinear systems. Neural Comput. Appl. 20(4): 557-563 (2011) - 2010
- [j5]Cheng-Chi Lee, Ting-Yao Cheng, Te-Yu Chen:
Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings. J. Digit. Inf. Manag. 8(5): 298-303 (2010) - [j4]Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen:
DoS-resistant ID-based password authentication scheme using smart cards. J. Syst. Softw. 83(1): 163-172 (2010) - [c5]Te-Yu Chen, Wei-Wei Zhang, Chih-Min Lin, Daniel S. Yeung:
Chaos synchronization of two uncertain chaotic nonlinear gyros using rotary sliding mode control. ICMLC 2010: 2765-2770
2000 – 2009
- 2009
- [j3]Chih-Min Lin, Te-Yu Chen:
Self-Organizing CMAC Control for a Class of MIMO Uncertain Nonlinear Systems. IEEE Trans. Neural Networks 20(9): 1377-1384 (2009) - 2008
- [j2]Chiu-Hsiung Chen, Chih-Min Lin, Te-Yu Chen:
Intelligent adaptive control for MIMO uncertain nonlinear systems. Expert Syst. Appl. 35(3): 865-877 (2008) - 2007
- [j1]Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen:
Further refinement of pairing computation based on Miller's algorithm. Appl. Math. Comput. 189(1): 395-409 (2007) - [c4]Chih-Min Lin, Te-Yu Chen, Chiu-Hsiung Chen, Fu-Shan Ding:
Fuzzy CMAC control for MIMO nonlinear systems. SMC 2007: 3107-3112 - 2006
- [c3]Te-Yu Chen, Chun-Fei Hsu, Tsu-Tian Lee, Fu-Shan Ding, Chih-Hui Chiu:
Intelligent Tracking Control for Duffing Oscillator Using a Self-Organizing Fuzzy Neural Network. FUZZ-IEEE 2006: 528-533 - [i1]Chao-Liang Liu, Gwoboa Horng, Te-Yu Chen:
Further Refinement of Pairing Computation Based on Miller's Algorithm. IACR Cryptol. ePrint Arch. 2006: 106 (2006) - 2005
- [c2]Chih-Min Lin, Te-Yu Chen, Wei-Zhe Fan, Yueh-Feng Lee:
Adaptive fuzzy sliding mode control for a two-link robot. ROBIO 2005: 581-586 - [c1]Chih-Min Lin, Li-Yang Chen, Chiu-Hsiung Chen, Te-Yu Chen:
Hybrid control for MIMO nonlinear system using RCMAC. ROBIO 2005: 587-592
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint