Search Results - "Horng, Shi Jinn"

Refine Results
  1. 1

    Deep Air Quality Forecasting Using Hybrid Deep Learning Framework by Du, Shengdong, Li, Tianrui, Yang, Yan, Horng, Shi-Jinn

    “…Air quality forecasting has been regarded as the key problem of air pollution early warning and control management. In this article, we propose a novel deep…”
    Get full text
    Journal Article
  2. 2

    Dynamic Fusion of Multisource Interval-Valued Data by Fuzzy Granulation by Huang, Yanyong, Li, Tianrui, Luo, Chuan, Fujita, Hamido, Horng, Shi-Jinn

    Published in IEEE transactions on fuzzy systems (01-12-2018)
    “…Information fusion is capable of fusing and transforming multiple data derived from different sources to provide a unified representation for centralized…”
    Get full text
    Journal Article
  3. 3

    An Identity-Based and Revocable Data-Sharing Scheme in VANETs by Horng, Shi-Jinn, Lu, Cheng-Chung, Zhou, Wanlei

    Published in IEEE transactions on vehicular technology (01-12-2020)
    “…Ensuring data confidentiality in a vehicular ad hoc network (VANET) is an increasingly important issue. Message confidentiality, user privacy and access…”
    Get full text
    Journal Article
  4. 4

    A Robust Multilabel Feature Selection Approach Based on Graph Structure Considering Fuzzy Dependency and Feature Interaction by Yin, Tengyu, Chen, Hongmei, Yuan, Zhong, Wan, Jihong, Liu, Keyu, Horng, Shi-Jinn, Li, Tianrui

    Published in IEEE transactions on fuzzy systems (01-12-2023)
    “…The performance of multilabel learning depends heavily on the quality of the input features. A mass of irrelevant and redundant features may seriously affect…”
    Get full text
    Journal Article
  5. 5

    Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs by Shiang-Feng Tzeng, Shi-Jinn Horng, Tianrui Li, Xian Wang, Po-Hsian Huang, Khan, Muhmmad Khurram

    Published in IEEE transactions on vehicular technology (01-04-2017)
    “…Vehicular ad hoc networks (VANETs) can significantly improve traffic safety and efficiency. The basic idea is to allow vehicles to send traffic information to…”
    Get full text
    Journal Article
  6. 6

    Contrast in Haze Removal: Configurable Contrast Enhancement Model Based on Dark Channel Prior by Liu, Ping-Juei, Horng, Shi-Jinn, Lin, Jzau-Sheng, Li, Tianrui

    Published in IEEE transactions on image processing (01-05-2019)
    “…Conventional haze-removal methods are designed to adjust the contrast and saturation, and in so doing enhance the quality of the reconstructed image…”
    Get full text
    Journal Article
  7. 7

    An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization by LIN, Wei-Hung, HOMG, Shi-Jinn, KAO, Tzong-Wann, PINGZHI FAN, LEE, Cheng-Ling, YI PAN

    Published in IEEE transactions on multimedia (01-08-2008)
    “…This paper proposes a blind watermarking algorithm based on the significant difference of wavelet coefficient quantization for copyright protection. Every…”
    Get full text
    Journal Article
  8. 8

    A Hybrid Method for Traffic Flow Forecasting Using Multimodal Deep Learning by Du, Shengdong, Li, Tianrui, Gong, Xun, Horng, Shi-Jinn

    “…Traffic flow forecasting has been regarded as a key problem of intelligent transport systems. In this work, we propose a hybrid multimodal deep learning method…”
    Get full text
    Journal Article
  9. 9

    b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET by Shi-Jinn Horng, Shiang-Feng Tzeng, Yi Pan, Pingzhi Fan, Xian Wang, Tianrui Li, Khan, Muhammad Khurram

    “…The security and privacy preservation issues are prerequisites for vehicular ad hoc networks. Recently, secure and privacy enhancing communication schemes…”
    Get full text
    Journal Article
  10. 10

    Graph Regularized Sparse Non-Negative Matrix Factorization for Clustering by Deng, Ping, Li, Tianrui, Wang, Hongjun, Wang, Dexian, Horng, Shi-Jinn, Liu, Rui

    “…The graph regularized nonnegative matrix factorization (GNMF) algorithms have received a lot of attention in the field of machine learning and data mining, as…”
    Get full text
    Journal Article
  11. 11

    Recognizing Very Small Face Images Using Convolution Neural Networks by Horng, Shi-Jinn, Supardi, Julian, Zhou, Wanlei, Lin, Chin-Teng, Jiang, Bin

    “…Face recognition can be installed in a surveillance system so that it can be used for monitoring, tracking and access control. An excellent, intelligent…”
    Get full text
    Journal Article
  12. 12

    Recognizing Palm Vein in Smartphones Using RGB Images by Horng, Shi-Jinn, Vu, Dinh-Trung, Nguyen, Thi-Van, Zhou, Wanlei, Lin, Chin-Teng

    “…Recently, demand for biometric access controls and online payments in smartphones increased, necessitating further investigation and development in this area…”
    Get full text
    Journal Article
  13. 13

    LAWNet: A Lightweight Attention-Based Deep Learning Model for Wrist Vein Verification in Smartphones Using RGB Images by Nguyen, Thi-Van, Horng, Shi-Jinn, Vu, Dinh-Trung, Chen, Hongmei, Li, Tianrui

    “…The wrist vein is one robust and reliable biometric for research and applications in automatic human verification; however, the existing wrist vein recognition…”
    Get full text
    Journal Article
  14. 14

    A Group Incremental Reduction Algorithm with Varying Data Values by Jing, Yunge, Li, Tianrui, Huang, Junfu, Chen, Hongmei, Horng, ShiJinn

    “…Attribute reduction based on rough set theory has attracted much attention recently. In real‐life applications, many decision tables may vary dynamically with…”
    Get full text
    Journal Article
  15. 15

    Cost Analysis of Movement-Based Location Management in PCS Networks: An Embedded Markov Chain Approach by Xian Wang, Xianfu Lei, Pingzhi Fan, Hu, Rose Qingyang, Shi-Jinn Horng

    Published in IEEE transactions on vehicular technology (01-05-2014)
    “…In this paper, we develop an approach of embedded Markov chain to analyze the signaling cost of a movement-based location management (MBLM) scheme. This…”
    Get full text
    Journal Article
  16. 16

    Clustering-Based Outlier Detection Technique Using PSO-KNN by Sushilata D. Mayanglambam, Rajendra Pamula, Shi-Jinn Horng

    Published in Journal of Applied Science and Engineering (01-01-2023)
    “…In this work, we present an unsupervised machine learning algorithm for outlier detection by integrating Particle Swarm Optimization (PSO) and the K-nearest…”
    Get full text
    Journal Article
  17. 17

    Multivariate time series forecasting via attention-based encoder–decoder framework by Du, Shengdong, Li, Tianrui, Yang, Yan, Horng, Shi-Jinn

    Published in Neurocomputing (Amsterdam) (07-05-2020)
    “…Time series forecasting is an important technique to study the behavior of temporal data and forecast future values, which is widely applied in many fields,…”
    Get full text
    Journal Article
  18. 18

    An efficient flow-shop scheduling algorithm based on a hybrid particle swarm optimization model by Kuo, I-Hong, Horng, Shi-Jinn, Kao, Tzong-Wann, Lin, Tsung-Lieh, Lee, Cheng-Ling, Terano, Takao, Pan, Yi

    Published in Expert systems with applications (01-04-2009)
    “…In this paper, a new hybrid particle swarm optimization model named HPSO that combines random-key (RK) encoding scheme, individual enhancement (IE) scheme, and…”
    Get full text
    Journal Article
  19. 19

    A Novel Anti-Collision Algorithm in RFID Systems for Identifying Passive Tags by Yuan-Hsin Chen, Shi-Jinn Horng, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen, Wei-Chih Chen, Yi Pan, Takao, T.

    “…Radio frequency identification has been developed and used in many applications in the real world. Due to the shared wireless channel between tags and the…”
    Get full text
    Journal Article
  20. 20

    A Decision-Theoretic Rough Set Approach for Dynamic Data Mining by Chen, Hongmei, Li, Tianrui, Luo, Chuan, Horng, Shi-Jinn, Wang, Guoyin

    Published in IEEE transactions on fuzzy systems (01-12-2015)
    “…Uncertainty and fuzziness generally exist in real-life data. Approximations are employed to describe the uncertain information approximately in rough set…”
    Get full text
    Journal Article