default search action
Wei-Jen Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Ridlo Sayyidina Auliya, Yen-Lin Lee, Chia-Ching Chen, Deron Liang, Wei-Jen Wang:
Analysis and prediction of virtual machine boot time on virtualized computing environments. J. Cloud Comput. 13(1): 80 (2024) - [j26]Ida Wahyuni, Chin-Chun Chang, Hua-Sheng Yang, Wei-Jen Wang, Deron Liang:
Multistage Parameter Optimization for Rule Generation for Multistage Manufacturing Processes. IEEE Trans. Ind. Informatics 20(3): 3857-3867 (2024) - [j25]Philip F. E. Adipraja, Chin-Chun Chang, Hua-Sheng Yang, Wei-Jen Wang, Deron Liang:
Detecting Low-Yield Machines in Batch Production Systems Based on Observed Defective Pieces. IEEE Trans. Syst. Man Cybern. Syst. 54(7): 3972-3983 (2024) - [c28]Guan-Yu Wang, Hung-Jui Ko, Chang-Po Chiang, Wei-Jen Wang:
WebShell Detection Based on CodeBERT and Deep Learning Model. CNIOT 2024 - 2023
- [j24]Daniyal Rajput, Wei-Jen Wang, Chun-Chuan Chen:
Evaluation of a decided sample size in machine learning applications. BMC Bioinform. 24(1): 48 (2023) - [j23]Ridlo Sayyidina Auliya, Chia-Ching Chen, Po-Ru Lin, Deron Liang, Wei-Jen Wang:
Optimization of message delivery reliability and throughput in a DDS-based system with per-publisher sending rate adjustment. Telecommun. Syst. 84(2): 235-250 (2023) - [c27]Jia-Jeng Lee, Chun-Chuan Chen, Eric Hsiao-Kuang Wu, Shih-Ching Yeh, Wei-Jen Wang:
Using wearable sensors to study the brain-heart interactions during attentional and resting states. ICCE-Taiwan 2023: 13-14 - 2022
- [j22]Anindita Suryarasmi, Chin-Chun Chang, Rania Akhmalia, Maysa Marshallia, Wei-Jen Wang, Deron Liang:
FN-Net: A lightweight CNN-based architecture for fabric defect detection with adaptive threshold-based class determination. Displays 73: 102241 (2022) - [j21]Yen-Lin Lee, Deron Liang, Wei-Jen Wang:
Optimal Online Liveness Fault Detection for Multilayer Cloud Computing Systems. IEEE Trans. Dependable Secur. Comput. 19(5): 3464-3477 (2022) - [c26]Guan-Yu Wang, Hung-Jui Ko, Min-Yi Tsai, Wei-Jen Wang:
Module Architecture of Docker Image and Container Security. ICS 2022: 661-669 - [c25]Hao-Yu Weng, Min-Yi Tsai, Wei-Jen Wang, Cheng-Ta Huang:
High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic Cube. ICS 2022: 670-678 - 2021
- [j20]Yen-Lin Lee, Shinta Nuraisya Arizky, Yu-Ren Chen, Deron Liang, Wei-Jen Wang:
High-Availability Computing Platform with Sensor Fault Resilience. Sensors 21(2): 542 (2021) - [c24]Ida Wahyuni, Wei-Jen Wang, Deron Liang, Chin-Chun Chang:
Rice Semantic Segmentation Using Unet-VGG16: A Case Study in Yunlin, Taiwan. ISPACS 2021: 1-2 - 2020
- [c23]Yen-Lin Lee, Ratri Abdatush Sholihah, Deron Liang, Wei-Jen Wang:
Resolving automatic high availability operations and users commands to virtual machines on OpenStack. ICS 2020: 159-164
2010 – 2019
- 2019
- [j19]I-Hsi Kao, Wei-Jen Wang, Yi-Horng Lai, Jau-Woei Perng:
Analysis of Permanent Magnet Synchronous Motor Fault Diagnosis Based on Learning. IEEE Trans. Instrum. Meas. 68(2): 310-324 (2019) - [c22]Wei-Jen Wang, Chien-Feng Wu, Zhi-Hao Zhang, Shun-You Lin, Tsung-Ming Hsu:
Optimal Trajectory Planning with Dynamic Constraints for Autonomous Vehicle. SICE 2019: 1462-1467 - 2018
- [j18]Cheng-Ta Huang, Cheng-Hsing Yang, Wei-Jen Wang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Raw reversibility of information hiding on the basis of VQ systems. J. Supercomput. 74(8): 3748-3777 (2018) - [j17]Cheng-Ta Huang, Min-Yi Tsai, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. J. Supercomput. 74(9): 4295-4314 (2018) - 2017
- [j16]Cheng-Ta Huang, Yu Hong Zhang, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
Mutual authentications to parties with QR-code applications in mobile systems. Int. J. Inf. Sec. 16(5): 525-540 (2017) - [j15]Shao-Jui Chen, Chia-Ching Chen, Hsiang-Lun Lu, Wei-Jen Wang:
Efficient resource provisioning for virtual clusters on the cloud. Int. J. Serv. Technol. Manag. 23(1/2): 52-63 (2017) - [c21]Wei-Jen Wang, Tsung-Ming Hsu, Tzu-Sung Wu:
The improved pure pursuit algorithm for autonomous driving advanced system. IWCIA 2017: 33-38 - [c20]Shao-Jui Chen, Hsueh-Wen Liu, Wei-Jen Wang:
A Fault Tolerance Mechanism for Semiconductor Equipment Monitoring. SC² 2017: 171-176 - 2016
- [j14]Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multim. Tools Appl. 75(22): 14895-14916 (2016) - 2015
- [c19]Wei-Jen Wang, Hung-Lin Huang, Shan-Hao Chuang, Shao-Jui Chen, Chia Hung Kao, Deron Liang:
Virtual machines of high availability using hardware-assisted failure detection. ICCST 2015: 1-6 - [c18]Hung-Lin Huang, Min-Huang Ho, Shao-Jui Chen, Yi-Feng Chen, Wei-Jen Wang:
A Dynamic Network Bandwidth Allocation Mechanism under Network QoS Constraints. SmartCity 2015: 963-968 - [c17]Chia-Ching Chen, Shao-Jui Chen, Fan Yin, Wei-Jen Wang:
Efficient Hybriding Auto-scaling for OpenStack Platforms. SmartCity 2015: 1079-1085 - 2014
- [j13]Cheng-Hsien Tang, Meng-Feng Tsai, Shan-Hao Chuang, Jen-Jung Cheng, Wei-Jen Wang:
Shortest-linkage-based parallel hierarchical clustering on main-belt moving objects of the solar system. Future Gener. Comput. Syst. 34: 26-46 (2014) - [j12]Wei-Jen Wang, Cheng-Ta Huang, Cheng-Hsing Yang, Shiuh-Jeng Wang:
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems. Peer-to-Peer Netw. Appl. 7(4): 676-686 (2014) - [c16]Wei-Jen Wang, Shao-Jui Chen, Jui-Hao Yang, Tzu-Ming Chan:
Supporting Load-Balanced Virtual Machine Placement for Cloud Infrastructure as a Service. ICS 2014: 1396-1405 - [c15]Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ. IWDW 2014: 599-612 - 2013
- [j11]Shao-Jui Chen, Jing-Ying Huang, Cheng-Ta Huang, Wei-Jen Wang:
SAMEVED: A System Architecture for Managing and Establishing Virtual Elastic Datacenters. Int. J. Grid High Perform. Comput. 5(2): 27-42 (2013) - [j10]Wei-Jen Wang, Cheng-Ta Huang, Chung-Min Liu, Po-Chyi Su, Shiuh-Jeng Wang:
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping. Inf. Sci. 246: 69-82 (2013) - [j9]Shiau-Rung Tsui, Cheng-Ta Huang, Wei-Jen Wang:
A New Adaptive Steganographic Method Based on Gradient Adjacent Prediction and Side-Match Vector Quantization. J. Inf. Hiding Multim. Signal Process. 4(4): 215-224 (2013) - [j8]Yue-Shan Chang, Wei-Jen Wang, Yung-Shuan Hung:
A near field communication-driven home automation framework. Pers. Ubiquitous Comput. 17(1): 169-185 (2013) - [j7]Wei-Jen Wang:
Conservative snapshot-based actor garbage collection for distributed mobile actor systems. Telecommun. Syst. 52(2): 647-660 (2013) - [j6]Wei-Jen Wang, Yue-Shan Chang, Win-Tsung Lo, Yi-Kang Lee:
Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments. J. Supercomput. 66(2): 783-811 (2013) - [c14]Wei-Jen Wang, Yu Hong Zhang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting. IIH-MSP 2013: 387-390 - 2012
- [j5]Chun-Chuan Chen, Stefan J. Kiebel, James Kilner, Nick S. Ward, Klaas E. Stephan, Wei-Jen Wang, Karl J. Friston:
A dynamic causal model for evoked and induced responses. NeuroImage 59(1): 340-348 (2012) - [j4]Wei-Jen Wang, Yue-Shan Chang, Cheng-Hui Wu, Wei-Xiang Kang:
A self-adaptive computing framework for parallel maximum likelihood evaluation. J. Supercomput. 61(1): 67-83 (2012) - [c13]Min-Yi Tsai, Ping-Fang Chiang, Shao-Jui Chen, Wei-Jen Wang:
A decision generation algorithm based on granular computing. GrC 2012: 475-480 - [c12]Yu-Cheng Tso, Shiuh-Jeng Wang, Cheng-Ta Huang, Wei-Jen Wang:
iPhone social networking for evidence investigations using iTunes forensics. ICUIMC 2012: 62:1-62:7 - [c11]Shiau-Rung Tsui, Wei-Jen Wang, Shi-Shan Chen, Lee Shu-Teng Chen, Chilung Wang:
Parallel Clustering Based on Partitions of Local Minimal-Spanning-Trees. PAAP 2012: 111-118 - [c10]Cheng-Ta Huang, Wei-Jen Wang, Min-Yi Tsai, Chin-Feng Lee:
Employing LSB and VQ for Undetectable Secret Data Hiding. UIC/ATC 2012: 644-649 - [c9]Wei-Jen Wang, I-Fan Hsieh, Chun-Chuan Chen:
Accelerating Computation of DCM for ERP with GPU-Based Parallel Strategy. UIC/ATC 2012: 679-684 - [c8]Chih-Tien Fan, Yue-Shan Chang, Wei-Jen Wang, Shyan-Ming Yuan:
Execution Time Prediction Using Rough Set Theory in Hybrid Cloud. UIC/ATC 2012: 729-734 - 2011
- [j3]Cheng-Hsing Yang, Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf. Sci. 181(11): 2218-2230 (2011) - [j2]Fu-Hau Hsu, Chang-Kuo Tso, Yi-Chun Yeh, Wei-Jen Wang, Li-Han Chen:
BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks. IEEE J. Sel. Areas Commun. 29(7): 1461-1468 (2011) - [j1]Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
VQ Applications in Steganographic Data Hiding Upon Multimedia Images. IEEE Syst. J. 5(4): 528-537 (2011) - [c7]Min-Yi Tsai, Ping-Fang Chiang, Yen-Jan Chang, Wei-Jen Wang:
Heuristic Scheduling Strategies for Linear-Dependent and Independent Jobs on Heterogeneous Grids. FGIT-GDC 2011: 496-505 - [c6]Chih-Tien Fan, Wei-Jen Wang, Yue-Shan Chang:
Agent-Based Service Migration Framework in Hybrid Cloud. HPCC 2011: 887-892 - 2010
- [c5]Wei-Jen Wang, Carlos A. Varela, Fu-Hau Hsu, Cheng-Hsien Tang:
Actor Garbage Collection Using Vertex-Preserving Actor-to-Object Graph Transformations. GPC 2010: 244-255 - [c4]Cheng-Hsien Tang, Min-Feng Wang, Wei-Jen Wang, Meng-Feng Tsai, Yuji Urata, Chow-Choong Ngeow, Induk Lee, Kuiyun Huang, Wen-Ping Chen:
Efficient Astronomical Data Classification on Large-Scale Distributed Systems. GPC 2010: 430-440 - [c3]Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible data hiding using neighboring block in VQ-compressed images. ICUIMC 2010: 47
2000 – 2009
- 2006
- [b1]Wei-Jen Wang:
Distributed garbage collection for large-scale mobile actor systems. Rensselaer Polytechnic Institute, USA, 2006 - [c2]Wei-Jen Wang, Kaoutar El Maghraoui, John Cummings, Jim Napolitano, Boleslaw K. Szymanski, Carlos A. Varela:
A Middleware Framework for Maximum Likelihood Evaluation over Dynamic Grids. e-Science 2006: 105 - [c1]Wei-Jen Wang, Carlos A. Varela:
Distributed Garbage Collection for Mobile Actor Systems: The Pseudo Root Approach. GPC 2006: 360-372
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint