教師個人簡歷
現職
國立中央大學
工學院機械工程學系
教授
專長
電腦視覺、影像處理、深度學習、機器學習、訊號處理、光學檢測
Computer Vision
Image Processing,
Deep Learning,
Machine Learning
Signal Processing
Automatic Optic Inspection (AOI)
專長簡述
最高學歷
國立中正大學
資訊工程學系
博士
政府GRB研究專長領域
教育部學門領域
高教深耕計畫
-
機械系-林智揚
1130101~1131220
國科會計畫統計
-
AGRI-TECT:通過生物聯網整合農業熱電植物葉片貼片以監控植物病原體抗性並建置智慧農業決策支援系統
1160101~1161231
-
AGRI-TECT:通過生物聯網整合農業熱電植物葉片貼片以監控植物病原體抗性並建置智慧農業決策支援系統
1150101~1151231
-
揭開WiFi的隱形視界--數位孿生WiFi訊號的成像分析與應用
1140801~1150731
-
AGRI-TECT:通過生物聯網整合農業熱電植物葉片貼片以監控植物病原體抗性並建置智慧農業決策支援系統
1140101~1141231
-
兼具安全性與終身式學習之輕量化深度模型之研究
1120201~1130731
[深度學習,輕量化模型,終身式深度學習模型,模型的安全性 , Deep learning,lightweight deep models,lifelong learning,model security] -
AI模型攻防與隱私保護技術
1120201~1140731
[AI模型攻防,深度學習,隱私權保護 , AI model attack and defense,deep learning,privacy protection]
產學合作計畫統計
-
金屬鏽蝕影像分析
1141027~1141130
[鏽蝕檢測,生成式模型 , Corrosion Detection,Generative Models] -
金屬鏽蝕影像分析
1140807~1140930
[鏽蝕檢測,生成式模型 , Corrosion Detection,Generative Models] -
地層自動詮釋等工作項目
1140521~1141203
[震測資料,生成對抗網路,擴散模型 , Seismic data,GAN,Diffusion Model] -
金屬鏽蝕影像分析
1140331~1140731
[鏽蝕檢測,生成式模型 , Corrosion Detection,Generative Models] -
智駕測試場域掃描點雲生成三角網格演算法改良技術研發諮詢
1121016~1121231
[三角網格演算法 , triangular mesh algorithm] -
社工外勤訪視AI風險預警技術研發諮詢
1120831~1121130
[風險預警模型,影像辨識技術 , Risk early warning model,Image recognition technology]
期刊著作
-
Generative AI Shanshui animation enhancement using Perlin noise and diffusion models
Discover Artificial Intelligence, 6, 1, 2026-12-01
[ Generative AI,Perlin noise,Prompt engineering,Shanshui animation synthesis ] -
Evaluation of deep learning models for segmentation of hippocampus volumes from MRI images in Alzheimer’s disease
Scientific Reports, 16, 1, 2026-12-01
[ DeepLab-v3,Hippocampus,Segmentation,U-Net,Volume loss,YOLO-v8 ] -
Enhancing deep learning reliability in MRI images of Alzheimer's disease using pairwise probability differential reliability quantification
Biomedical Signal Processing and Control, 119, 2026-06-15
[ Alzheimer'sdisease,DeepLearning,Model Interpretability,MRIImages,Reliability ] -
ConSeisDiff: A conditional diffusion approach to mitigate synthetic-real disparities in seismic fault detection
Journal of Applied Geophysics, 243, 2025-12-01
[ Deep learning,Diffusion model,Seismic fault detection,Synthetic image ] -
Enhanced detection of mild cognitive impairment in Alzheimer’s disease: a hybrid model integrating dual biomarkers and advanced machine learning
BMC Geriatrics, 25, 1, 2025-12-01
[ Biomarkers,Cerebrospinal Fluid,Fuzzy clustering,Hippocampal volume,Hybrid learning model,Mild Cognitive Impairment ] -
Enhancing the reliability of Alzheimer's disease prediction in MRI images
Computers in Biology and Medicine, 197, 2025-10-01
[ Alzheimer's disease,Classification,Deep learning,MRI image,Reliability ] -
Ensemble network using oblique coronal MRI for Alzheimer's disease diagnosis
NeuroImage, 310, 2025-04-15
[ Alzheimer's disease,Ensemble network,Mild cognitive impairment,MRI,Oblique coronal slices ] -
Hippocampal volume asymmetry in Alzheimer disease: A systematic review and meta-analysis
Medicine (United States), 104, 10, 2025-03-07
[ asymmetry,automatic,manual,segmentation,volume reduction ] -
Edge AI-Based Detection for Defective Coffee Beans Using Deep Learning and Streamlit Framework
IEEE Access, 13, 67977-67992, 2025-01-01
[ Agriculture,coffee image dataset,computer vision,deep learning,edge AI ] -
A Real-Time Deep Learning Approach to Badminton Player Positioning and Movement Tracking
Proceedings - IEEE International Conference on Advanced Video and Signal-Based Surveillance, AVSS, 2025, 2025-01-01 -
Indoor staircase detection for supporting security systems in autonomous smart wheelchairs based on deep analysis of the Co-occurrence Matrix and Binary Classification
Intelligent Systems with Applications, 23, 2024-09-01
[ Binary classification,Gray level co-occurrence matrix,Obstacle detection,Smart wheelchair ] -
Pseudo Skin Image Generator (PSIG-Net): Ambiguity-free sample generation and outlier control for skin lesion classification
Biomedical Signal Processing and Control, 93, 2024-07-01
[ GAN,Melanoma,Pseudo image,Siamese network,Skin lesion classification ] -
PreAugNet: improve data augmentation for industrial defect classification with small-scale training data
Journal of Intelligent Manufacturing, 35, 3, 1233-1246, 2024-03-01
[ CNN,Data augmentation,Decision boundary,PreAugNet,Surface defect classification,Synthetic sample generation ] -
Entropy-Boosted Adversarial Patch for Concealing Pedestrians in YOLO Models
IEEE Access, 12, 32772-32779, 2024-01-01
[ Adversarial attack,deep learning,entropy ] -
Deep Learning Applications in MRI-Based Detection of the Hippocampal Region for Alzheimer's Diagnosis
IEEE Access, 12, 103830-103838, 2024-01-01
[ hippocampal region,Landmark,MRI image,object detection,YOLO ] -
Using Deep Learning-Based Methods for Automated Segmentation of Soft Tissues From Shoulder Ultrasound Images
IEEE Access, 12, 111481-111492, 2024-01-01
[ Artificial intelligence,computer assisted diagnosis,muscle,ultrasonography ] -
WiFi-TCN: Temporal Convolution for Human Interaction Recognition Based on WiFi Signal
IEEE Access, 12, 126970-126982, 2024-01-01
[ channel state information (CSI),data augmentation,Enter attention,human activity recognition,temporal convolution network (TCN),WiFi signal ] -
Effective Adversarial Sample Detection for Securing Automatic Speech Recognition
Proceedings - IEEE International Conference on Advanced Video and Signal-Based Surveillance, AVSS, 2024, 2024-01-01 -
EdANo-Vision: An Edge AI-Powered Anomaly Detector using Flask Web-App Framework
Proceedings - IEEE International Conference on Advanced Video and Signal-Based Surveillance, AVSS, 2024, 2024-01-01 -
Multi-hop Video Super Resolution with Long-Term Consistency (MVSRGAN)
Multimedia Tools and Applications, 83, 2, 4115-4132, 2024-01-01
[ Generative adversarial network,Long-term consistency,Multi-hop,Video super resolution ] -
A deep feature-level fusion model for masked face identity recommendation system
Journal of Ambient Intelligence and Humanized Computing, 14, 12, 16011-16024, 2023-12-01
[ AI-driven technology,COVID-19,Deep learning,Face identity recommendation system,Masked face recognition ] -
Cryptensor: A Resource-Shared Co-Processor to Accelerate Convolutional Neural Network and Polynomial Convolution
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 42, 12, 4735-4748, 2023-12-01
[ Convolutional neural network (CNN),cryptography,field programmable gate array (FPGA),generic-matrix-multiplication (GEMM),polynomial convolution,ResNet-18,systolic tensor array (STA),VGG-16 ] -
Robust Signboard Detection and Recognition in Real Environments
IEEE Transactions on Consumer Electronics, 69, 3, 421-430, 2023-08-01
[ Cyclical generative adversarial networks,one-stage detector,signboard detection ] -
MOVING OBJECT DETECTION FOR COMPLEX SCENES BY MERGING BG MODELING AND DEEP LEARNING METHOD
Journal of Artificial Intelligence and Soft Computing Research, 13, 3, 151-163, 2023-06-01
[ deep learning,Moving object detection,Video surveillance ] -
FDD: a deep learning–based steel defect detectors
International Journal of Advanced Manufacturing Technology, 126, 3-4, 1093-1107, 2023-05-01
[ Deformable convolution,Deformable RoI pooling,Feature pyramid network,Guided anchoring,Region proposal network,Steel defect detection ] -
Specific Expert Learning: Enriching Ensemble Diversity via Knowledge Distillation
IEEE Transactions on Cybernetics, 53, 4, 2494-2505, 2023-04-01
[ Deep learning,ensemble diversity,knowledge distillation (KD) ] -
Invisible Adversarial Attacks on Deep Learning-Based Face Recognition Models
IEEE Access, 11, 51567-51577, 2023-01-01
[ Adversarial attack,deep learning,face recognition ] -
An Improved Speed Estimation Using Deep Homography Transformation Regression Network on Monocular Videos
IEEE Access, 11, 5955-5965, 2023-01-01
[ deep learning,homography transformation,Intelligent transportation system,speed estimation,vehicle detection and recognition,vehicle tracking ] -
Hierarchical Image Transformation and Multi-Level Features for Anomaly Defect Detection
Sensors, 23, 2, 2023-01-01
[ anomaly detection,feature vector,image transformation,metal defect,poison image ] -
Rule-based Explaining Module: Enhancing the Interpretability of Recurrent Relational Network in Sudoku Solving
Machine Graphics and Vision, 32, 3-4, 125-145, 2023-01-01
[ machine learning,recurrent relational network,rule-based explaining module,Sudoku puzzle solving ] -
Enhancing Single Object Tracking With a Hybrid Approach: Temporal Convolutional Networks, Attention Mechanisms, and Spatial-Temporal Memory
IEEE Access, 11, 139211-139222, 2023-01-01
[ attention mechanism,single object tracking,spatial-temporal memory,Temporal convolutional networks ] -
An approach to the diagnosis of lumbar disc herniation using deep learning models
Frontiers in Bioengineering and Biotechnology, 11, 2023-01-01
[ augmentation,automatic detection,low back pain,MRI,YOLO models ] -
Diagnosis of Alzheimer's Disease Using Convolutional Neural Network With Select Slices by Landmark on Hippocampus in MRI Images
IEEE Access, 11, 61688-61697, 2023-01-01
[ axial view,Convolutional neural network,coronal view,multiclass classification,sagittal view ] -
Deep Learning in Left and Right Footprint Image Detection Based on Plantar Pressure
Applied Sciences (Switzerland), 12, 17, 2022-09-01
[ cerebral palsy,complex footprints,foot progression angle,object detection,YOLO ] -
Novel Spatio-Temporal Continuous Sign Language Recognition Using an Attentive Multi-Feature Network
Sensors, 22, 17, 2022-09-01
[ continuous sign language,keypoints,multi-feature,self-attention,spatial,temporal ] -
Enhancing Precision with an Ensemble Generative Adversarial Network for Steel Surface Defect Detectors (EnsGAN‐SDD)
Sensors, 22, 11, 2022-06-01
[ boundary localization,defect detection,generative adversarial network (GAN),recursive FPN ] -
A Deep Learning Method for Foot Progression Angle Detection in Plantar Pressure Images
Sensors, 22, 7, 2022-04-01
[ angle parameter,foot clinic,foot problems,object detection,YOLO ] -
Moving Pedestrian Localization and Detection With Guided Filtering
IEEE Access, 10, 89181-89196, 2022-01-01
[ convolutional neural network (CNN),integrated surveillance system,Moving object analysis,pedestrian localization and detection,YOLO ] -
Estimation of various walking intensities based on wearable plantar pressure sensors using artificial neural networks
Sensors, 21, 19, 2021-10-01
[ Artificial neural network,Automatic classification,Plantar region pressure image,Walking duration,Walking speed ] -
Lumbar Disc Herniation Automatic Detection in Magnetic Resonance Imaging Based on Deep Learning
Frontiers in Bioengineering and Biotechnology, 9, 2021-08-19
[ data augmentation,low back pain,medical image,object detection,YOLO ] -
A review of the challenges in deep learning for skeletal and smooth muscle ultrasound images
Applied Sciences (Switzerland), 11, 9, 2021-05-01
[ Classification method,Muscle disease,Network architecture,Segmentation framework,Ultrasonography ] -
Moving Object Detection through Image Bit-Planes Representation without Thresholding
IEEE Transactions on Intelligent Transportation Systems, 21, 4, 1404-1414, 2020-04-01
[ Bit-planes,hyper bit-plane,spatial improvement,temporal improvement ] -
Sequential Dual Attention Network for Rain Streak Removal in a Single Image
IEEE Transactions on Image Processing, 29, 9250-9265, 2020-01-01
[ deep learning,deraining,dilated convolution,dual attention network,Single image rain streaks removal ] -
Transfer2Depth: Dual Attention Network with Transfer Learning for Monocular Depth Estimation
IEEE Access, 8, 86081-86090, 2020-01-01
[ Computer vision,deep learning,monocular depth estimation,spatial-channel attention module,transfer learning ] -
Dynamic hand gesture recognition using 3DCNN and LSTM with FSM context-aware model
Sensors, 19, 24, 2019-12-02
[ Context-aware,Deep learning,Hand gesture recognition,Multimodal system ] -
A novel non-negative matrix factorization technique for decomposition of Chinese characters with application to secret sharing
Eurasip Journal on Advances in Signal Processing, 2019, 1, 2019-12-01
[ Chinese characters,Matrix decomposition,Non-negative matrix factorization (NMF),Secret sharing ] -
Efficient triple output network for vertebral segmentation and identification
IEEE Access, 7, 117978-117985, 2019-01-01
[ Deep learning,Triple output,Vertebra segmentation ] -
PedJointNet: Joint Head-Shoulder and Full Body Deep Network for Pedestrian Detection
IEEE Access, 7, 47687-47697, 2019-01-01
[ Adaptively adjusted weights,Head-shoulder detection,Pedestrian detection ] -
HEVC intra frame coding based on convolutional neural network
IEEE Access, 6, 50087-50095, 2018-08-24
[ CNN,Convolutional neural network,HEVC,high efficiency video coding,intra frame coding ] -
Rain streak removal based on non-negative matrix factorization
Multimedia Tools and Applications, 77, 15, 20001-20020, 2018-08-01
[ Canny edge detection,Non-negative matrix factorization (NMF),Rain removal ] -
Gender classification based on multi-scale and run-length features
Journal of Electronic Science and Technology, 15, 3, 251-257, 2017-09-01
[ Gender classification,Run-length,Texture feature ] -
Enhanced biometric score fusion scheme based on the adaboost algorithm
Journal of Electronic Science and Technology, 15, 2, 187-193, 2017-06-15
[ AdaBoost,Biometric authentication,Face recognition,Score-level fusion ] -
Guest editorial intelligent video surveillance and related technologies
Journal of Electronic Science and Technology, 15, 2, 113-114, 2017-06-15 -
Three-Pronged Compensation and Hysteresis Thresholding for Moving Object Detection in Real-Time Video Surveillance
IEEE Transactions on Industrial Electronics, 64, 6, 4945-4955, 2017-06-01
[ Background modeling,hysteresis thresholding,mixture of Gaussians,motion compensation,video surveillance ] -
Moving object detection in the encrypted domain
Multimedia Tools and Applications, 76, 7, 9759-9783, 2017-04-01
[ Background modeling,Mixture of Gaussians,Moving object detection,Video encryption ] -
RGB-D abandoned object detection based on GrabCut using kinect
Journal of Internet Technology, 18, 4, 927-933, 2017-01-01
[ 3D processing,Abandoned object detection,GrabCut ] -
Robust techniques for abandoned and removed object detection based on Markov random field
Journal of Visual Communication and Image Representation, 39, 181-195, 2016-08-01
[ Abandoned object detection,Background modelling,GMM,Markov random field ] -
Secure multicasting of images via joint privacy-preserving fingerprinting, decryption, and authentication
Journal of Visual Communication and Image Representation, 38, 858-871, 2016-07-01
[ Authentication,Content integrity,Data encryption,Image authentication,Joint fingerprinting and decryption (JFD),Multimedia distribution,Privacy-preserving fingerprinting,Secret sharing ] -
Predictive Texture Synthesis-Based Intra Coding Scheme for Advanced Video Coding
IEEE Transactions on Multimedia, 17, 9, 1508-1514, 2015-09-01
[ H.264/AVC,high efficient video coding (HEVC),intra coding,video coding,video compression ] -
Robust laser speckle authentication system through data mining techniques
IEEE Transactions on Industrial Informatics, 11, 2, 505-512, 2015-04-27
[ Image processing,Imaging systems,Optical security and encryption,Pattern recognition ] -
Inter-embedding error-resilient mechanism in scalable video coding
Information Sciences, 294, 439-455, 2015-02-10
[ Error-resilient,Reversible data embedding,Scalable video coding ] -
Repairable image authentication scheme
International Journal of Network Security, 17, 4, 439-444, 2015-01-01
[ Image authentication,Located mechanism,Recovery ] -
Self-verifiable secret sharing scheme with locatability for halftone images
International Journal of Network Security, 17, 3, 246-250, 2015-01-01
[ Authentication mechanism,Image secret sharing,Lossless reconstruction ] -
Efficient compression-jointed quality controllable scrambling method for H.264/SVC
International Journal of Network Security, 17, 3, 290-297, 2015-01-01
[ Compression-jointed encryption,Quality control,Scalable video coding (SVC),Video encryption ] -
A new intra prediction with adaptive template matching through finite state machine
Journal of Visual Communication and Image Representation, 29, 33-45, 2015-01-01
[ Codebook,Finite state machine,H.264/AVC,High Efficiency Video Coding,Intra prediction,Motion estimation,Side-match vector quantization,Video coding ] -
Learning-based leaf image recognition frameworks
Studies in Computational Intelligence, 591, 77-91, 2015-01-01
[ Bag-of-words (BoW),Dictionary learning,Leaf image recognition,Plant identification,Sparse representation ] -
Compressing vector quantization index table using side match state codebook
Journal of Information Hiding and Multimedia Signal Processing, 6, 1, 47-58, 2015-01-01
[ Side match,SOC,Vector quantization system ] -
Real-time background modeling based on a multi-level texture description
Information Sciences, 269, 106-127, 2014-06-10
[ Background modeling,Gaussian mixture modeling,Motion detection ] -
Reversible joint fingerprinting and decryption based on side match vector quantization
Signal Processing, 98, 52-61, 2014-05-01
[ Joint fingerprinting and decryption,Multimedia distribution,Side-match vector quantization,Traitor tracing,Vector quantization ] -
An indicator elimination method for Side-match vector quantization
Journal of Information Hiding and Multimedia Signal Processing, 4, 4, 233-249, 2013-08-06
[ Data hiding,Declustering,Indicator elimination,Side-match vec-tor quantization (SMVQ),Vector quantization (VQ) ] -
Significance-Preserving-Guided Content-Aware Image Retargeting
Smart Innovation, Systems and Technologies, 21, 339-348, 2013-06-28 -
Moving Objects Detection Based on Hysteresis Thresholding
Smart Innovation, Systems and Technologies, 21, 289-298, 2013-06-28
[ Background modeling,Hysteresis thre-sholding,Moving objects detection ] -
Left-object detection through background modeling
International Journal of Innovative Computing, Information and Control, 9, 4, 1373-1388, 2013-05-21
[ Background subtraction,Object detection,Video surveillance ] -
Computer aided alignment and quantitative 4D structural plasticity analysis of neurons
Neuroinformatics, 11, 2, 249-257, 2013-04-01
[ Dendrite dynamics,Dynamic analysis,In vivo time-lapse imaging,Neuron morphology,Semi-automatic method,Structural plasticity,Weighted match ] -
Multi-camera invariant appearance modeling for non-rigid object identification in a real-time environment
Journal of Visual Communication and Image Representation, 24, 6, 717-728, 2013-01-01
[ Appearance model,Gaussian mixture model,Hierarchical tree structures,Identification,Invariant features,Multi-camera,Real-time system,Surveillance ] -
Temporal video transcoding based on frame complexity analysis for mobile video communication
IEEE Transactions on Broadcasting, 59, 1, 38-46, 2013-01-01
[ Frame complexity,frame selection,temporal coherence,temporal transcoding,video quality assessment,video transcoding,visual complexity ] -
Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity
Information Sciences, 201, 70-79, 2012-10-15
[ Declustering,Mixed base notation,Reversible data embedding ] -
Low-complexity video coding via power-rate-distortion optimization
Journal of Visual Communication and Image Representation, 23, 3, 569-585, 2012-04-01
[ Hash,Low-complexity video coding,Low-power and power-aware video coding,Motion estimation,Multiview video coding,Power-rate-distortion optimization,Rate-distortion,Wireless multimedia sensor networks ] -
An automatic evaluation system for contrast-detail phantom images in digital radiography
International Journal of Imaging Systems and Technology, 22, 4, 15-26, 2012-01-01
[ bilinear pixel interpolation,contrast-detail phantom,region shifting ] -
Apply the Modulus Function to secret image sharing
International Journal of Innovative Computing, Information and Control, 8, 1 A, 375-385, 2012-01-01
[ (t, n) threshold scheme,Image sharing,Modulus function ] -
Joint fingerprinting and decryption with noise-resistant for vector quantization images
Signal Processing, 92, 9, 2159-2171, 2012-01-01
[ Joint fingerprinting and decryption,Traitor tracing,Vector quantization ] -
Feature-based sparse representation for image similarity assessment
IEEE Transactions on Multimedia, 13, 5, 1019-1030, 2011-10-01
[ Feature detection,image copy detection,image recognition,image retrieval,image similarity assessment,sparse representation ] -
Reversible steganography for BTC-compressed images
Fundamenta Informaticae, 109, 2, 121-134, 2011-09-16
[ block truncation coding (BTC),Reversible data hiding,steganography ] -
Three-dimensional reconstruction of brain-wide wiring networks in drosophila at single-cell resolution
Current Biology, 21, 1, 1-11, 2011-01-11 -
Constructing neuronal structure from 3D confocal microscopic images
Journal of Medical and Biological Engineering, 29, 1, 1-6, 2009-03-01
[ Confocal microscopy,Gradient vector flow (GVF) snake,Green fluorescent protein (GFP),Neuron tracing,Tree structure ] -
Placing chinese phonetic symbols on mobile phones using linear programming
International Journal of Innovative Computing, Information and Control, 4, 8, 2113-2126, 2008-08-01
[ Chinese phonetic symbols,Linear programming,Mobile phone ] -
Lossless data hiding for color images based on block truncation coding
Pattern Recognition, 41, 7, 2347-2357, 2008-07-01
[ Block truncation coding (BTC),Genetic algorithm (GA),Reversible data hiding,Steganography ] -
Three-phase lossless data hiding method for the VQ index table
Fundamenta Informaticae, 82, 1-2, 1-13, 2008-01-28
[ Search-order coding (SOC),Side match vector quantization (SMVQ),Steganography ] -
Reversible steganographic method with high payload for JPEG images
IEICE Transactions on Information and Systems, E91-D, 3, 836-845, 2008-01-01
[ DCT,JPEG,Lossless data hiding,Reversible steganography ] -
Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes
IEEE Transactions on Information Forensics and Security, 2, 3, 341-349, 2007-09-01
[ Declustering,Minimum spanning tree,Reversible data hiding,Short spanning path ] -
Secret image hiding and sharing based on the (t,n)-threshold
Fundamenta Informaticae, 76, 4, 399-411, 2007-05-28
[ (t,n)-threshold secret sharing,Image quantization,Secret image sharing,Steganography ] -
Reversible steganographic method using SMVQ approach based on declustering
Information Sciences, 177, 8, 1796-1805, 2007-04-15
[ Prediction,Reversible data embedding,Steganography ] -
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots
Journal of Network and Computer Applications, 30, 2, 662-676, 2007-04-01
[ Mutual anonymity,Peer-to-peer (P2P) systems,Primitive roots ] -
Reversible data hiding in the VQ-compressed domain
IEICE Transactions on Information and Systems, E90-D, 9, 1422-1429, 2007-01-01
[ Data hiding,Reversible data embedding,Steganography,Vector quantization ] -
Reversible data embedding based on prediction approach for VQ and SMVQ compressed images
Fundamenta Informaticae, 74, 2-3, 189-207, 2006-12-13
[ Prediction,Reversible data embedding,Steganography ] -
Reversible steganography for VQ-compressed images using side matching and relocation
IEEE Transactions on Information Forensics and Security, 1, 4, 493-501, 2006-12-01
[ Reversible data embedding,Side match vector quantization,Steganography ] -
New image steganographic methods using run-length approach
Information Sciences, 176, 22, 3393-3408, 2006-11-22
[ Data hiding,Run-length encoding,Steganography ] -
Perfect hashing schemes for mining traversal patterns
Fundamenta Informaticae, 70, 3, 185-202, 2006-03-07
[ Data mining,Perfect hashing,Performance analysis,Traversal patterns ] -
A new density-based scheme for clustering based on genetic algorithm
Fundamenta Informaticae, 68, 4, 315-331, 2005-12-01
[ Clustering algorithms,DBSCAN,Genetic algorithms ] -
Perfect hashing schemes for mining association rules
Computer Journal, 48, 2, 168-179, 2005-04-08 -
An efficient graph-based method for parallel mining problems
Journal of Information and Knowledge Management, 3, 2, 143-154, 2004-12-01
[ Graph theory,Maximal cliques,Parallel mining ] -
A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules
Lecture Notes in Computer Science, 3309, 230-240, 2004-01-01
研討會著作
-
Exploring Seismic Attributes for Facies Layer Analysis with Deep Learning
629-630, 2025-01-01
[ facies analysis,fault detection,Seismic attributes,seismic interpretation ] -
Enhancing Coffee Bean Detection Using Tone Mapping and Instance Segmentation
631-632, 2025-01-01
[ bean segmentation,deep learning,smart agriculture,Tone mapping ] -
DoubleU-Net Based Two-Shot Inference for Robust Hippocampus Segmentation in MRI Images
665-666, 2025-01-01
[ Alzheimer's Disease,Deep Learning,DeepLabv3,Segmentation,U-Net,YOLOv8 ] -
Overlapped Coffee Beans Detection and Localization Using a Low-Cost 3D Monocular Point Cloud Clustering Method
2382-2387, 2025-01-01
-
Plant Species-Specific Anomaly Detection Based on Electrophysiological Signals
1694-1699, 2025-01-01
[ anomaly detection,autoencoder,bioelectrical,plant monitoring,signal processing ] -
Forecasting Stock Prices with Sequential Deep Learning: A Long Short-Term Memory Approach
177-183, 2025-01-01
[ deep learning,forecasting,long short-term memory,sequential,stock prices ] -
Zero-Shot Representation Learning for Alzheimer’s Disease MRI via Frozen CLIP
184-189, 2025-01-01
[ Alzheimer’s disease,brain MRI,feature representation,frozen CLIP,zero-shot learning ] -
A Dual-Stream Network with Gated Fusion for Enhanced Alzheimer’s Disease Classification Using MRI and Region-Specific Segmentation Maps
245-250, 2025-01-01
[ Alzheimer's disease,brain segmentation,convolutional neural networks,feature fusion,medical image analysis ] -
Non-Contact Cooling Fan Defect Detection via Wi-Fi Sensing and Deep Learning
196-201, 2025-01-01
[ Channel State Information (CSI),deep learning,predictive maintenance,rotating machinery,Wi-Fi sensing ] -
Robust Defense Against Adversarial Attacks with Defensive Preprocessing and Adversarial Training
2025-01-01
[ Adversarial attacks,adversarial training,deep learning,defensive preprocessing,image classification ] -
The Intelligent Systems of Skin Thickness in Measured by Optical Coherence Tomography
2025-01-01
[ Optical Coherence Tomography,Plantar Surface,Skin Thickness,Walking Exercise ] -
Artificial Intelligence Based Segmentation for Skin-Layer Visualization from Optical Coherence Tomography Images
2025-01-01
[ Deep Learning,Epidermis,Prediction,Stratum Corneum,U-Net ] -
Real-time Identification of Badminton Hitting Actions Using Video and Human Key Point Heat Maps
2025-01-01
[ 3D-CNN,badminton,Heat map,Human key points,Video classification ] -
Educational Training on Business Management Using Web-Based Applications with Cryptocurrency Integration
157-162, 2024-01-01
[ application,business,cryptocurrency,educational,web ] -
ECG Anomaly Detection with LSTM-Autoencoder for Heartbeat Analysis
2024-01-01
[ autoencoder model,deep learning,electrocardiogram signal,long short-Term memory,time-series anomaly detection ] -
Utilizing Brain Region Volume Estimations to Enhance Interpretability of Decision Trees for Alzheimer's Disease Classification
311-312, 2024-01-01
[ Alzheimer's disease,brain volume region,decision tree,self-explanatory ] -
Segmenting Alzheimer's Disease MRI Slices for Hippocampal Volume Calculation
307-308, 2024-01-01
[ Brain,Neuroanatomy,Volume,YOLO ] -
Integrating Stable diffusion for Improved Alzheimer's Disease Classification: Insights from MRI Images and YOLOv8
303-304, 2024-01-01
[ Alzheimer's disease,deep learning,Generative model,MRI image,stable diffusion ] -
A Real-Time Application for Rail Surface Defect Inspection Utilizing Rectangular-Shaped Labels
214-219, 2023-01-01
[ Rail Surface Defect Inspection,Rectangular-shaped Labels,You Only Look Once (YOLO) ] -
Pseudo-LiDAR Meets Agriculture: Leveraging 3D Monocular Point Cloud Processing for Coffee Beans
84-89, 2023-01-01
[ camera calibration,coffee bean,depth map,Pseudo-LiDAR ] -
USK-FEMO: A Face Emotion Dataset using Deep Learning for Effective Learning
199-203, 2023-01-01
[ Deep Learning,Emotion Classification,Emotion Dataset,Mobile-Net architecture ] -
Early Alzheimer's Disease Detection Through YOLO-Based Detection of Hippocampus Region in MRI Images
32-35, 2023-01-01
[ Alzheimer's disease detection,automatic labeling,hippocampus region,Magnetic Resonance Imaging,YOLO ] -
Shoulder and Knee Abnormality Examination Based on Artificial Landmark Estimation
36-39, 2023-01-01
[ Anthropometric Detection,Computer Vision,Deep learning,Human Pose Estimation ] -
Implementing Multi-Level Features in a Student-Teacher Network for Anomaly Detection
839-840, 2023-01-01
[ anomaly detection,feature vector,student-teacher ] -
Automatic Detection of Lumbar Disc Herniation Using YOLOv7
443-444, 2023-01-01
[ Automatic Detection,Deep Learning,Low Back Pain,MRI ] -
Deep Learning Approach to Predict Alzheimer's Disease through Magnetic Resonance Images
845-846, 2023-01-01
[ Classification,Convolutional Neural Network,MRI,VGG-19 ] -
Automated Slice Selection and Labeling of Hippocampus Regions for Alzheimer's Disease
841-842, 2023-01-01
-
A Comparative Analysis of the Yolo Models for Intelligent Lobster Surveillance Camera
2131-2136, 2023-01-01
-
USK-COFFEE Dataset: A Multi-Class Green Arabica Coffee Bean Dataset for Deep Learning
469-473, 2022-01-01
[ coffee beans,Convolutional Neural Network (CNN),deep learning,sorting coffee ] -
A Unified Video Summarization for Video Anomalies Through Deep Learning
2022-01-01
[ 3D-CNN,anomaly,blob analysis,deep learning,summarization ] -
Multivariate time series analysis on variables that influence pandemic expansion
2022-01-01
[ correlation,covid-19,multivariate time-series,pandemic analysis,statistical measure ] -
Observation of Attention Mechanism Baseline for PCB Surface Inspection System
2022-01-01
[ attention network,deep learning,defect detection,PCB ] -
Lightning YOLOv4 for a Surface Defect Detection System for Sawn Lumber
184-189, 2022-01-01
[ CSPDarknet53,PANet,SAM,Surface defect inspection system,YOLOv4 ] -
Reinforced Cascading Convolutional Neural Networks and Vision Transformer for Lung Disease Diagnosis
201-202, 2022-01-01
-
Evaluation of Additional Augmented Images for Steel Surface Defect Detection
199-200, 2022-01-01
-
To Dev or to Doc?: Predicting College IT Students' Prominent Functions in Software Teams Using LMS Activities and Academic Profiles
105-110, 2022-01-01
[ Education Technology,IT College Students,Machine Learning,Multivariate Time-series,Software Roles ] -
Exploring the Use of Different Feature Levels of CNN for Anomaly Detection
146-150, 2022-01-01
[ computer vision,dimensionality reduction,high-dimensional features,industrial anomaly detection,PCA ] -
A beneficial dual transformation approach for deep learning networks used in steel surface defect detection
619-622, 2021-08-24
[ Bilinear interpolation,Defect Detection system,High-resolution network,RGB to HSV ] -
Plant Disease Detection Mobile Application Development using Deep Learning
34-38, 2021-07-13
[ deep learning,mobile application,object detection,plant disease ] -
Enhancing Siamese Visual Tracking with Background Relations
340-344, 2021-01-01
[ Background features,Siamese network,Visual object tracking ] -
A Door Detection System for Convenience Stores in Taiwan
24-29, 2021-01-01
[ Computer Vision,Deep Learning,Door Detection ] -
Lightweight Pedestrian Detection through Guided Filtering and Deep Learning
629-630, 2021-01-01
[ Convolutional Neural Network (CNN),Integrated Surveillance System,Moving Object Analysis,Pedestrian Localization and Detection,YOLOv3 ] -
Embedded-based Tomato Septoria Leaf Detection with Intel Movidius Neural Compute Stick
907-908, 2021-01-01
[ CNN,Deep learning,Intel Movidius Neural Computing Stick (NCS),Raspberry pi,Septoria ] -
Evaluation of Face Recognition with Wearing Mask or Not
2021-01-01
-
Detectors++: The Robust Baseline for a Defect Detection System
2021-01-01
-
Evaluation of Data Augmentation on Surface Defect Detection
2021-01-01
-
Limited-Anchor Deep Neural Network for Moving Object Detection
2020-09-28
-
Mask Classification and Head Temperature Detection Combined with Deep Learning Networks
74-78, 2020-09-28
[ deep learning,neural network,object detection,RetinaNet ] -
High efficient single-stage steel surface defect detection
2019-09-01
-
Rat Grooming Detection Using Random Forest Classifier
2019-05-01
-
Deep Learning based Moving Object Detection for Video Surveillance
2019-05-01
-
Two staged machine learning network for spine segmentation and recognition
194-197, 2019-01-04
[ Spine segmentation,Two staged network,Y-shape model ] -
Secret Sharing Application for Two-dimensional QR Barcode
2018-08-27
-
An UNet-Based Head Shoulder Segmentation Network
2018-08-27
-
Offline automatic actor tracking in a movie
1-5, 2018-07-03
[ face detection,face recognition,Object tracking,scene change detection ] -
Depth-based feature extraction-guided automatic identification tracking of steel products for smart manufacturing in steel 4.0
145-146, 2018-06-22
[ depth image,identification tracking,Industry 4.0,smart manufacturing,steel 4.0,steel industry ] -
Secret sharing based on part-based factorization for Chinese characters
209-210, 2017-07-25
-
A DPM based object detector using HOG-LBP features
315-316, 2017-07-25
-
Moving object detection based on image bit-planes and co-occurrence matrix in video surveillance
1-2, 2017-07-25
-
Fast vision-based surface inspection of defects for steel billets
2017-01-03
[ Automated optical inspection,Billet images,Defect detection,Defect inspection,Steel products ] -
Automatic Brain Extraction for T1-Weighted Magnetic Resonance Images Using Region Growing
250-253, 2016-12-16
[ Brain extraction,Magnetic resonance image,Region growing ] -
Vision-based fall detection through shape features
237-240, 2016-08-16
[ Fall detection,Motion features,Motion history image ] -
New face detection method based on multi-scale histograms
229-232, 2016-08-16
[ Face detection,Multi-scale descriptor,Texture feature ] -
Image bit-planes representation for moving object detection in real-time video surveillance
2016-07-25
[ hysteresis thresholding,image bit-plane,motion compensation,video surveillance ] -
3D feature extraction of vertebrae for secure transpedicular drill guide
2016-07-25
-
Human action recognition based on non-negative matrix factorization
1091-1093, 2016-02-19
[ Action recognition,motion history image,non-negative matrix factorization ] -
Joint SVD and QR codes for image authentication
1137-1140, 2016-02-19
-
Human detection using non-negative matrix factorization
370-371, 2015-08-20
[ Biomedical imaging,Computer vision,Conferences,Feature extraction,Pattern recognition,Testing,Training ] -
Single image rain removal based on part-based model
462-463, 2015-08-20
[ Biomedical imaging,Dictionaries,Frequency conversion,Image edge detection,Image quality,Image reconstruction,Rain ] -
Grabcut-based abandoned object detection
2014-11-14
-
Comparative study of leaf image recognition with a novel learning-based approach
389-393, 2014-10-07
[ bag-of-words,classification,dictionary learning,leaf recognition,plant identification ] -
An adaptive-window-based image dehazing method
2014-02-12
-
Fast image matching using multi-level texture descriptor
2014-02-12
-
Real-time vehicle color identification for surveillance videos
59-64, 2014-01-01
[ support vector machine,tree structure,vehicle color classification ] -
An improved method for image thresholding based on the valley-emphasis method
2013-12-01
-
Abandoned object detection in complicated environments
2013-12-01
-
Non-liner learning for mixture of Gaussians
2013-12-01
-
Self-authentication mechanism with recovery ability for digital images
299-304, 2013-10-15
[ Image authentication,Recovery,Watermarking ] -
Identification and tracking of players in sport videos
113-116, 2013-09-16
[ identification,recognition,sport video,tracking,video analysis ] -
Cross-camera complementary vehicle matching via feature expandsion for video forensics
211-212, 2013-09-11
-
High efficient joint fingerprinting and decryption for multimedia distribution
2013-01-01
[ Cjoint fingerprinting and decryption,Multimedia distribution,Traitor tracing ] -
Privacy-preserving multimedia cloud computing via compressive sensing and sparse representation
246-249, 2012-12-01
[ cloud computing,compressive sensing,multimedia security,privacy-preserving,sparse coding,transcoding ] -
Image copy detection via dictionary learning and sparse coding
242-245, 2012-12-01
[ compressive sensing,copy detection,dictionary learning,image authentication,image hashing,sparse coding ] -
Efficient image/video dehazing through haze density analysis based on pixel-based dark channel prior
238-241, 2012-12-01
[ dark channel prior,dehazing,deweathering,haze density analysis,image/video enhancement,image/video restoration ] -
Background subtraction by modeling pixel and neighborhood information
2012-12-01
-
Joint fingerprinting and decryption for VQ images through bipartite matching
27-30, 2012-12-01
[ Joint fingerprinting and decryption,Traitor tracing,Vector quantization ] -
Message from UISTA-12 workshop chairs
2012-11-28
-
Multimedia privacy protection system for mobil environments
133-136, 2011-12-19
[ face recognition,mobile phones,privacy-preserving ] -
Robust background modeling based on multiscale color description
748-751, 2011-12-01
-
Secure transcoding for compressive multimedia sensing
917-920, 2011-12-01
[ compressive sensing (CS),multimedia compression and communication,Secure transcoding,sparse representation ] -
Intelligent projector system based on computer vision
176-179, 2011-11-09
[ Component,Computer vision,Face detection,Smart projector ] -
Chaos-based image integrity authentication code
13-16, 2010-12-28
[ Chaos,Image authentication code,Image integrity,Watermarking ] -
Adaptive space-time beamforming technique for passive radar system with ultra low signal to interference ratio
2010-12-06
-
Real-time robust background modeling based on joint color and texture descriptions
622-625, 2010-12-01
[ Background modeling,Gaussian mixture modeling,Motion detection ] -
Noise-resistant joint fingerprinting and decryption based on vector quantization
463-468, 2010-12-01
[ Joint fingerprinting and decryption,Traitor tracing,Vector quantization ] -
An abandoned objects management system based on the gaussian mixture model
169-175, 2008-11-17
專書
-
Communications in Computer and Information Science
104-113, 2026-01-01
[ adversarial attacks,adversarial examples,deep learning,imperceptible transformations,vector quantization ] -
Applied Human Factors and Ergonomics International
187-195, 2022-01-01
[ Diabetes,Diabetic foot ulcers,Effective young’s modulus,Stiffness ] -
Lecture Notes in Networks and Systems
15-29, 2022-01-01
[ Deep learning,Face mask detection,Face mask recognition ] -
Lecture Notes in Electrical Engineering
267-272, 2022-01-01
[ Data augmentation,Deep learning,Few-shot learning,Object detection ] -
Lecture Notes in Electrical Engineering
715-720, 2022-01-01
[ Classification,Deep learning,Few-shot learning,Fruit ripeness ] -
Lecture Notes in Networks and Systems
270-277, 2021-01-01
[ Diabetic foot ulcers,InceptionV3,MobileNets,Resnet50 ] -
Advances in Intelligent Systems and Computing
56-62, 2020-01-01
[ Deep learning,Skeletal muscle fatigue,Ultrasound images ] -
Advances in Intelligent Systems and Computing
502-507, 2020-01-01
[ Convolutional LSTM,Deep learning,Multi-view depth estimation,Recurrent neural network ] -
Advances in Intelligent Systems and Computing
202-212, 2020-01-01
[ Defect detection,Fully convolutional networks,ResNet,SSD ] -
Advances in Intelligent Systems and Computing
3-13, 2020-01-01
[ Acceleration,Convolutional neural network,Propulsion strategy,Spectrogram ] -
Advances in Intelligent Systems and Computing
141-149, 2019-01-01
[ Defect detection,Fully convolutional networks,Wavelet transform ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3-13, 2019-01-01
[ Assistive technology,Content-aware,Direction,Distance,Mask-RCNN,Speed,Visually impaired ] -
Lecture Notes in Networks and Systems
269-276, 2018-01-01
[ 3D processing,Abandoned object detection,GrabCut ] -
Biometrics: Concepts, Methodologies, Tools, and Applications
501-528, 2016-08-30
-
Frontiers in Artificial Intelligence and Applications
1239-1247, 2015-01-01
[ defect detection,discrete wavelet transform,feature fusion,high dynamic range,region of interest,steel billet ] -
Frontiers in Artificial Intelligence and Applications
1137-1146, 2015-01-01
[ Canny edge detection,connected component based rain removal,non-negative matrix factorization (NMF),rain removal ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
553-562, 2008-12-01
[ Appearance model,GMM,Invariants,Multiple-view,Re-identification,Tracking ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
467-481, 2008-12-01
[ Clustering,Data hiding,Genetic algorithm,Steganography ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
289-298, 2007-12-01
[ Density-based clustering,Genetic algorithms,Vector quantization ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
1058-1064, 2005-01-01
[ Clustering,Data hiding,Multi-way search,Steganography ] -
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
429-438, 2001-01-01
[ CAI,Data Mining,Fuzzy set theory,Machine learning ]
校內獲獎
- 114 新聘卓越人才獎勵
- 113 新聘卓越人才獎勵
- 應用於穩定性招牌之偵測與辨識之影像處理方法 [中華民國]
- 具有干擾之擷取影像之保護方法 [中華民國]
國立中央大學