default search action
Win-Bin Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Yueqian Wang, Yi Bu, Win-Bin Huang:
Query-focused summarisation in research articles based on semantic function of sentences. J. Inf. Sci. 49(1): 32-42 (2023) - [j15]Junjie Huang, Win-Bin Huang, Yi Bu, Qi Cao, Huawei Shen, Xueqi Cheng:
What makes a successful rebuttal in computer science conferences?: A perspective on social interaction. J. Informetrics 17(3): 101427 (2023) - [c15]Fan Meng, Yuyong Li, Hanqing Yu, Xiaofei Zhou, Win-Bin Huang:
Industry credit spread forecasting based on time series data and industry relationships. ICDM (Workshops) 2023: 1400-1406 - [i2]Junjie Huang, Win-Bin Huang, Yi Bu, Qi Cao, Huawei Shen, Xueqi Cheng:
What makes a successful rebuttal in computer science conferences? : A perspective on social interaction. CoRR abs/2307.03371 (2023) - 2022
- [j14]Wenyi Shang, Win-Bin Huang:
Rediscussing the Political Struggle in the Light of Reform in Late 11th Century China under the View of Digital Humanities. Digit. Humanit. Q. 16(2) (2022) - [c14]Fan Meng, Kaile Zhou, Yi Bu, Win-Bin Huang, Pengyi Zhang, Fei Long, Yan Li:
Keywords Extraction and Thesaurus Construction for Domain News. ITQM 2022: 837-844 - 2021
- [j13]Yi Bu, Mengyang Li, Weiye Gu, Win-Bin Huang:
Topic diversity: A discipline scheme-free diversity measurement for journals. J. Assoc. Inf. Sci. Technol. 72(5): 523-539 (2021) - [c13]Jiaqi Gao, Qianhui Liu, Win-Bin Huang:
Learning Path Generator Based on Knowledge Graph. IC4E 2021: 27-33 - 2020
- [j12]Win-Bin Huang, Junting Liu, Haodong Bai, Pengyi Zhang:
Value assessment of companies by using an enterprise value assessment system based on their public transfer specification. Inf. Process. Manag. 57(5): 102254 (2020) - [j11]Yi Bu, Binglu Wang, Zaida Chinchilla-Rodríguez, Cassidy R. Sugimoto, Yong Huang, Win-Bin Huang:
Considering author sequence in all-author co-citation analysis. Inf. Process. Manag. 57(6): 102300 (2020)
2010 – 2019
- 2019
- [i1]Haodong Bai, Frank Z. Xing, Erik Cambria, Win-Bin Huang:
Business Taxonomy Construction Using Concept-Level Hierarchical Clustering. CoRR abs/1906.09694 (2019) - 2018
- [j10]Binglu Wang, Yi Bu, Win-Bin Huang:
Document- and Keyword-based Author Co-citation Analysis. Data Inf. Manag. 2(2): 70-82 (2018) - [j9]Yi Bu, Binglu Wang, Win-Bin Huang, Shangkun Che, Yong Huang:
Using the appearance of citations in full text on author co-citation analysis. Scientometrics 116(1): 275-289 (2018) - 2017
- [j8]Yi Bu, Shaokang Ni, Win-Bin Huang:
Combining multiple scholarly relationships with author cocitation analysis: A preliminary exploration on improving knowledge domain mappings. J. Informetrics 11(3): 810-822 (2017) - [c12]Yi Bu, Binglu Wang, Win-Bin Huang, Shangkun Che:
MFTACA: An Author Co-citation Analysis Method Combined with Metadata in Full Text. ISSI 2017: 916-927 - [c11]ChengYue Gong, Win-Bin Huang:
Deep Dynamic Poisson Factorization Model. NIPS 2017: 1666-1674 - 2016
- [j7]Yi Bu, Tianyi Liu, Win-Bin Huang:
MACA: a modified author co-citation analysis method combined with general descriptive metadata of citations. Scientometrics 108(1): 143-166 (2016) - [c10]Frank Z. Xing, Erik Cambria, Win-Bin Huang, Yang Xu:
Weakly supervised semantic segmentation with superpixel embedding. ICIP 2016: 1269-1273 - 2015
- [j6]Win-Bin Huang, Mong-Fong Horng:
Speed up Video Coders with Only Examining the Predicted Modes in a Coding Block. J. Inf. Hiding Multim. Signal Process. 6(2): 398-408 (2015) - [c9]Win-Bin Huang, Wei-Tsung Su:
Identity-based access control for digital content based on ciphertext-policy attribute-based encryption. ICOIN 2015: 87-91 - [c8]Win-Bin Huang, Wei-Tsung Su, Chiang-Sheng Liang:
A threshold-based key generation approach for ciphertext-policy attribute-based encryption. ICUFN 2015: 908-913 - 2013
- [j5]Jeng-Wei Lee, I-Hsun Chuang, Win-Bin Huang, Yau-Hwang Kuo:
An opportunistic resource allocation approach for mixed QoS and non-QoS connections in OFDMA wireless networks. Comput. Networks 57(13): 2615-2627 (2013) - [c7]Win-Bin Huang, Junjie Shang, Jiang Chen, Yanyi Huang, Ge Li, Haixia Zhang:
Design and Development of an Innovation Product Engineering Process Curriculum at Peking University. EMC/HumanCom 2013: 213-220 - 2012
- [j4]Jen-Sheng Tsai, Win-Bin Huang, Yau-Hwang Kuo, Mong-Fong Horng:
Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions. Signal Process. 92(6): 1431-1445 (2012) - [c6]Jen-Sheng Tsai, Jen-Ting Hsiao, Win-Bin Huang, Yau-Hwang Kuo:
Geodesic-based robust blind watermarking method for three-dimensional mesh animation by using mesh segmentation and vertex trajectory. ICASSP 2012: 1757-1760 - 2011
- [j3]Jen-Sheng Tsai, Win-Bin Huang, Yau-Hwang Kuo:
On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking. IEEE Trans. Image Process. 20(3): 735-743 (2011) - 2010
- [c5]Jen-Sheng Tsai, Ming-Chou Liao, Win-Bin Huang, Yau-Hwang Kuo:
Geodesic distance-based pose-invariant blind watermarking algorithm for three-dimensional triangular mesh model. ICIP 2010: 209-212
2000 – 2009
- 2008
- [j2]Win-Bin Huang, Alvin Wen-Yu Su, Yau-Hwang Kuo:
Neural network based method for image halftoning and inverse halftoning. Expert Syst. Appl. 34(4): 2491-2501 (2008) - [c4]Jen-Sheng Tsai, Win-Bin Huang, Po-Hung Li, Chao-Lieh Chen, Yau-Hwang Kuo:
Robust Digital Image Watermarking Based on Principal Component Analysis and Discrete Wavelet Transform. PCM 2008: 506-514 - 2007
- [c3]Jen-Sheng Tsai, Win-Bin Huang, Chao-Lieh Chen, Yau-Hwang Kuo:
A Feature-Based Digital Image Watermarking for Copyright Protection and Content Authentication. ICIP (5) 2007: 469-472 - 2006
- [j1]Win-Bin Huang, Alvin Wen-Yu Su, Yau-Hwang Kuo:
VLSI Implementation of a Modified Efficient SPIHT Encoder. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(12): 3613-3622 (2006) - [c2]Win-Bin Huang, Yi-Li Lin, Hung-Wei Cheng, Alvin W. Y. Su, Yau-Hwang Kuo:
Two-Stage Mode Selection of H.264/AVC Video Encoding with Rate Distortion Optimization. ICASSP (2) 2006: 893-896 - 2004
- [c1]Win-Bin Huang, Wei-Chen Chang, Yen-Wei Lu, Alvin Wen-Yu Su, Yau-Hwang Kuo:
Halftone/contone conversion using neural networks. ICIP 2004: 3547-3550
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint