Search Results - "Chin-Shiuh Shieh"

Refine Results
  1. 1

    Using deep learning models to analyze the cerebral edema complication caused by radiotherapy in patients with intracranial tumor by Chao, Pei-Ju, Chang, Liyun, Kang, Chen-Lin, Lin, Chin-Hsueh, Shieh, Chin-Shiuh, Wu, Jia-Ming, Tseng, Chin-Dar, Tsai, I-Hsing, Hsu, Hsuan-Chih, Huang, Yu-Jie, Lee, Tsair-Fwu

    Published in Scientific reports (28-01-2022)
    “…Using deep learning models to analyze patients with intracranial tumors, to study the image segmentation and standard results by clinical depiction…”
    Get full text
    Journal Article
  2. 2

    Detection of Unknown DDoS Attack Using Convolutional Neural Networks Featuring Geometrical Metric by Shieh, Chin-Shiuh, Nguyen, Thanh-Tuan, Horng, Mong-Fong

    Published in Mathematics (Basel) (01-05-2023)
    “…DDoS attacks remain a persistent cybersecurity threat, blocking services to legitimate users and causing significant damage to reputation, finances, and…”
    Get full text
    Journal Article
  3. 3

    A Parallel Compact Gannet Optimization Algorithm for Solving Engineering Optimization Problems by Pan, Jeng-Shyang, Sun, Bing, Chu, Shu-Chuan, Zhu, Minghui, Shieh, Chin-Shiuh

    Published in Mathematics (Basel) (01-01-2023)
    “…The Gannet Optimization Algorithm (GOA) has good performance, but there is still room for improvement in memory consumption and convergence. In this paper, an…”
    Get full text
    Journal Article
  4. 4

    Surrogate-Assisted Hybrid Meta-Heuristic Algorithm with an Add-Point Strategy for a Wireless Sensor Network by Pan, Jeng-Shyang, Zhang, Li-Gang, Chu, Shu-Chuan, Shieh, Chin-Shiuh, Watada, Junzo

    Published in Entropy (Basel, Switzerland) (09-02-2023)
    “…Meta-heuristic algorithms are widely used in complex problems that cannot be solved by traditional computing methods due to their powerful optimization…”
    Get full text
    Journal Article
  5. 5

    Genetic watermarking based on transform-domain techniques by Shieh, Chin-Shiuh, Huang, Hsiang-Cheh, Wang, Feng-Hsing, Pan, Jeng-Shyang

    Published in Pattern recognition (01-03-2004)
    “…An innovative watermarking scheme based on genetic algorithms (GA) in the transform domain is proposed. It is robust against watermarking attacks, which are…”
    Get full text
    Journal Article
  6. 6

    Open-Set Recognition in Unknown DDoS Attacks Detection With Reciprocal Points Learning by Shieh, Chin-Shiuh, Ho, Fu-An, Horng, Mong-Fong, Nguyen, Thanh-Tuan, Chakrabarti, Prasun

    Published in IEEE access (2024)
    “…The internet, a cornerstone of modern life, has profound implications across personal, business, and society. However, its widespread use has posed challenges,…”
    Get full text
    Journal Article
  7. 7

    A D2D Group Communication Scheme Using Bidirectional and InCremental A-Star Search to Configure Paths by Lai, Wei Kuang, Shieh, Chin-Shiuh, Yang, Chao-Ping

    Published in Mathematics (Basel) (01-09-2022)
    “…The Device-to-Device (D2D) communication introduced in 3GPP’s Release 12 is a promising option for the accommodation of increasing traffic demand and the…”
    Get full text
    Journal Article
  8. 8

    Detection of Unknown DDoS Attack Using Reconstruct Error and One-Class SVM Featuring Stochastic Gradient Descent by Shieh, Chin-Shiuh, Nguyen, Thanh-Tuan, Chen, Chun-Yueh, Horng, Mong-Fong

    Published in Mathematics (Basel) (01-01-2023)
    “…The network system has become an indispensable component of modern infrastructure. DDoS attacks and their variants remain a potential and persistent…”
    Get full text
    Journal Article
  9. 9

    Task Scheduling With Multicore Edge Computing in Dense Small Cell Networks by Lai, Wei Kuang, Shieh, Chin-Shiuh, Chen, Yen-Ping

    Published in IEEE access (2021)
    “…As a reaction and complement to cloud computing, edge computing is a computing paradigm designed for low-latency computing. Edge servers, deployed at the…”
    Get full text
    Journal Article
  10. 10

    Modified Coral Reef Optimization Methods for Job Shop Scheduling Problems by Shieh, Chin-Shiuh, Nguyen, Thanh-Tuan, Lin, Wan-Wei, Nguyen, Dinh-Cuong, Horng, Mong-Fong

    Published in Applied sciences (01-10-2022)
    “…The job shop scheduling problem (JSSP) is a fundamental operational research topic with numerous applications in the real world. Since the JSSP is an NP-hard…”
    Get full text
    Journal Article
  11. 11

    Unlicensed Spectrum Allocation for LTE and Wi-Fi Coexistence with HAP by Lai, Wei Kuang, Shieh, Chin-Shiuh, Lin, Yuh-Chung, Tsai, Chun-Yi, Yan, Yu-Dai

    Published in Symmetry (Basel) (01-08-2022)
    “…In order to accommodate the ever-increasing traffic demands, numerous approaches have been developed to improve spectrum utilization. Among others, the…”
    Get full text
    Journal Article
  12. 12

    Detection of Adversarial DDoS Attacks Using Generative Adversarial Networks with Dual Discriminators by Shieh, Chin-Shiuh, Nguyen, Thanh-Tuan, Lin, Wan-Wei, Huang, Yong-Lin, Horng, Mong-Fong, Lee, Tsair-Fwu, Miu, Denis

    Published in Symmetry (Basel) (01-01-2022)
    “…DDoS (Distributed Denial of Service) has emerged as a serious and challenging threat to computer networks and information systems’ security and integrity…”
    Get full text
    Journal Article
  13. 13

    Plan Quality and Secondary Cancer Risk Assessment in Patients with Benign Intracranial Lesions after Radiosurgery using the CyberKnife M6 Robotic Radiosurgery System by Lan, Jen-Hong, Shieh, Chin-Shiuh, Liu, Chao-Hong, Cho, I-Chun, Tsai, I-Hsing, Chen, Long-Chun, Chao, Pei-Ju, Lee, Hsiao-Fei, Huang, Yu-Jie, Lee, Tsair-Fwu

    Published in Scientific reports (09-07-2019)
    “…This study was performed to examine the quality of planning and treatment modality using a CyberKnife (CK) robotic radiosurgery system with multileaf…”
    Get full text
    Journal Article
  14. 14

    A Clustering-Based Energy Saving Scheme for Dense Small Cell Networks by Lai, Wei Kuang, Shieh, Chin-Shiuh, Ho, Chih-Sheng, Chen, You-Ren

    Published in IEEE access (2019)
    “…The network traffic of mobile wireless communication grows exponentially in recent years. In order to serve intense traffic areas, such as train stations,…”
    Get full text
    Journal Article
  15. 15

    Periodic Behavioral Routine Discovery Based on Implicit Spatial Correlations for Smart Home by Lo, Chun-Chih, Hsu, Kuo-Hsuan, Chen, Shen-Chien, Shieh, Chin-Shiuh, Horng, Mong-Fong

    Published in Mathematics (Basel) (01-01-2023)
    “…As the degree of elders’ social activity and self-care ability depreciates, the potential risk for elderly people who live independently increases. The…”
    Get full text
    Journal Article
  16. 16

    Handover Management for D2D Communication in 5G Networks by Lai, Wei Kuang, Shieh, Chin-Shiuh, Chou, Fu-Sheng, Hsu, Chia-Yu, Shen, Meng-Han

    Published in Applied sciences (01-06-2020)
    “…This study addresses the handover management issue for Device-to-Device communication in fifth-generation (5G) networks. The Third Generation Partnership…”
    Get full text
    Journal Article
  17. 17

    Improving handover performance by switching between unicast and multicast addressing by WEI KUANG LAI, SHIEH, Chin-Shiuh, CHOU, Kai-Pei

    “…Efficient handover schemes are essential to the success of mobile networking. However, there are time-consuming procedures involved in the process, such as…”
    Get full text
    Journal Article
  18. 18

    Evaluating the Risk Factors of Post Inflammatory Hyperpigmentation Complications with Nd-YAG Laser Toning Using LASSO-Based Algorithm by Liu, Chao-Hong, Shieh, Chin-Shiuh, Huang, Tai-Lin, Lin, Chih-Hsueh, Chao, Pei-Ju, Huang, Yu-Jie, Lee, Hsiao-Fei, Yeh, Shyh-An, Tseng, Chin-Dar, Wu, Jia-Ming, Leung, Stephen Wan, Lee, Tsair-Fwu

    Published in Applied sciences (01-03-2020)
    “…The neodymium-doped yttrium aluminum garnet (Nd-YAG) laser is used for removal of pigmented skin patches and rejuvenation of skin. However, complications such…”
    Get full text
    Journal Article
  19. 19
  20. 20

    Improving Handover Performance by Switching Between Unicast and Anycast Addressing by Lai, Wei Kuang, Shieh, Chin-Shiuh, Chu, Kuang-Ning

    Published in IEEE transactions on vehicular technology (01-05-2009)
    “…With increased popularity and pervasiveness, mobile networking has become a definite trend for future networks. Users strongly demand that the connectivity of…”
    Get full text
    Journal Article