default search action
Yi-Chin Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Chun-Yeon Lin, Ting-Kuan Liao, Hsin-Hao Chou, Yi-Chin Wu, Chien-Chang Wang, Shy-Her Nian, Meng-Yen Tsai, Tsai-Wang Hung:
Model Predictive Control of Variable Refrigerant Flow Systems for Room Temperature Control. IEEE Access 12: 123193-123207 (2024) - 2023
- [j8]Chun-Yeon Lin, Megan Teng, Yi-Chin Wu:
Distributed Current Source Method for Modeling of Magnetic and Eddy-Current Fields in Sensing System Design. IEEE Access 11: 2928-2940 (2023) - [j7]Chun-Yeon Lin, Yi-Chin Wu, Zhong-Hsiang Kuo, Hsi-Yen Ma, Megan Teng:
Analytical and Experimental Investigation of Electromagnetic Tracking System for Location and Orientation Estimation. IEEE Access 11: 9931-9941 (2023) - 2022
- [c11]Yi-Chin Wu, His-Yen Ma, Zhong-Hsiang Kuo, Megan Teng, Chun-Yeon Lin:
Electromagnetic Tracking System Design for Location and Orientation Estimation. AIM 2022: 1256-1262 - [c10]Sheng-Pao Shih, Yi-Chin Wu:
Understanding the Usage of Surplus Food App: Based on the SOR Model. AMCIS 2022 - 2020
- [c9]Chun-Yeon Lin, Yi-Chin Wu, Yuan-Liang Chen, Shih-Cheng Huang:
Bio-Magnetic/Eddy-Current Sensor Design for Biological Object Detection. AIM 2020: 18-23
2010 – 2019
- 2019
- [c8]Yi-Chin Wu, Liwei Chan, Wen-Chieh Lin:
Tangible and Visible 3D Object Reconstruction in Augmented Reality. ISMAR 2019: 26-36 - 2018
- [j6]Yiding Ji, Yi-Chin Wu, Stéphane Lafortune:
Enforcement of opacity by public and private insertion functions. Autom. 93: 369-378 (2018) - [j5]Lilian Kawakami Carvalho, Yi-Chin Wu, Raymond H. Kwong, Stéphane Lafortune:
Detection and mitigation of classes of attacks in supervisory control systems. Autom. 97: 121-133 (2018) - [j4]Yi-Chin Wu, Vasumathi Raman, Blake C. Rawlings, Stéphane Lafortune, Sanjit A. Seshia:
Synthesis of Obfuscation Policies to Ensure Privacy and Utility. J. Autom. Reason. 60(1): 107-131 (2018) - [i1]Lilian Kawakami Carvalho, Yi-Chin Wu, Raymond H. Kwong, Stéphane Lafortune:
Detection and Mitigation of Classes of Attacks in Supervisory Control Systems. CoRR abs/1807.04889 (2018) - 2016
- [j3]Yi-Chin Wu, Stéphane Lafortune:
Synthesis of Optimal Insertion Functions for Opacity Enforcement. IEEE Trans. Autom. Control. 61(3): 571-584 (2016) - [c7]Yi-Chin Wu, Gil Lederman, Stéphane Lafortune:
Enhancing opacity of stochastic discrete event systems using insertion functions. ACC 2016: 2053-2060 - [c6]Yi-Chin Wu, Vasumathi Raman, Stéphane Lafortune, Sanjit A. Seshia:
Obfuscator Synthesis for Privacy and Utility. NFM 2016: 133-149 - [c5]Lilian Kawakami Carvalho, Yi-Chin Wu, Raymond H. Kwong, Stéphane Lafortune:
Detection and prevention of actuator enablement attacks in supervisory control systems. WODES 2016: 298-305 - 2015
- [c4]Yi-Chin Wu, Stéphane Lafortune:
Synthesis of opacity-enforcing insertion functions that can be publicly known. CDC 2015: 3506-3513 - 2014
- [j2]Yi-Chin Wu, Stéphane Lafortune:
Synthesis of insertion functions for enforcement of opacity security properties. Autom. 50(5): 1336-1348 (2014) - [c3]Yi-Chin Wu, Karthik Abinav Sankararaman, Stéphane Lafortune:
Ensuring Privacy in Location-Based Services: An Approach Based on Opacity Enforcement. WODES 2014: 33-38 - 2013
- [j1]Yi-Chin Wu, Stéphane Lafortune:
Comparative analysis of related notions of opacity in centralized and coordinated architectures. Discret. Event Dyn. Syst. 23(3): 307-339 (2013) - 2012
- [c2]Yi-Chin Wu, Stéphane Lafortune:
Enforcement of opacity properties using insertion functions. CDC 2012: 6722-6728
2000 – 2009
- 2007
- [c1]Shinn-Rong Lin, Yi-Chin Wu, Chia-Wen Liu, Hsiao-Ting Teng:
Rethinking Online Faculty Instructional Development: A Case Study. ICCE 2007: 189-196
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint