default search action
Yu-Cheng Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Tanner Fiez, Houssam Nassif, Yu-Cheng Chen, Sergio Gamez, Lalit Jain:
Best of Three Worlds: Adaptive Experimentation for Digital Marketing in Practice. WWW 2024: 3586-3597 - [i3]Tanner Fiez, Houssam Nassif, Yu-Cheng Chen, Sergio Gamez, Lalit Jain:
Best of Three Worlds: Adaptive Experimentation for Digital Marketing in Practice. CoRR abs/2402.10870 (2024) - [i2]I Lee, Hoang-Giang Cao, Cong-Tinh Dao, Yu-Cheng Chen, I-Chen Wu:
Gradient-based Regularization for Action Smoothness in Robotic Control with Reinforcement Learning. CoRR abs/2407.04315 (2024) - [i1]Chiu-Chou Lin, Yu-Wei Shih, Kuei-Ting Kuo, Yu-Cheng Chen, Chien-Hua Chen, Wei-Chen Chiu, I-Chen Wu:
Identifying and Clustering Counter Relationships of Team Compositions in PvP Games for Efficient Balance Analysis. CoRR abs/2408.17180 (2024) - 2023
- [j19]Yu-Cheng Chen, Jiong Cheng, Wen-Zhao Zhang, Chengjie Zhang:
Detecting coherence with respect to general quantum measurements. Sci. China Inf. Sci. 66(8) (2023) - 2022
- [j18]Yu-Jin Lin, Yu-Cheng Chen, Jun-Yi Zheng, Dan Chu, Dan-Wei Shao, Hong-Tzer Yang:
Blockchain Power Trading and Energy Management Platform. IEEE Access 10: 75932-75948 (2022) - [j17]Yu-Jin Lin, Yu-Cheng Chen, Jun-Yi Zheng, Dan-Wei Shao, Dan Chu, Hong-Tzer Yang:
Blockchain-Based Intelligent Charging Station Management System Platform. IEEE Access 10: 101936-101956 (2022) - [c18]Shuva Paul, Yu-Cheng Chen, Santiago Grijalva, Vincent John Mooney:
A Cryptographic Method for Defense Against MiTM Cyber Attack in the Electricity Grid Supply Chain. ISGT 2022: 1-5 - 2021
- [j16]Yu-Cheng Chen, Vincent John Mooney, Santiago Grijalva:
Grid Cyber-Security Strategy in an Attacker-Defender Model. Cryptogr. 5(2): 12 (2021) - [c17]Sheng-Shih Wang, Wei-Kang Chen, Yu-Cheng Chen, Mu-Cheng Chiang, Li-Ling Huang, Shiann-Tsong Sheu:
A Progressive Single Channel Reservation Scheme for URLLC in Unlicensed Band. VTC Fall 2021: 1-5 - [c16]Cheng-Yu Chen, Pinrong Lin, Yu-Cheng Chen, Po-Hao Chang, Shiann-Shun Jeng:
Optimization of Spectrum Resource Allocation based on Network Slicing. WOCC 2021: 61-65 - 2020
- [j15]Yi-Hsiang Shih, You-Ling Chen, Jui-Hsin Tan, Sheng-Hsiung Chang, Wu-Yih Uen, Shih-Lun Chen, Ming-Yi Lin, Yu-Cheng Chen, Wei-Chen Tu:
Low-Power, Large-Area and High-Performance CdSe Quantum Dots/Reduced Graphene Oxide Photodetectors. IEEE Access 8: 95855-95863 (2020)
2010 – 2019
- 2019
- [c15]Chun-Yu Wang, Shih-Hao Fuh, Ta-Chun Lo, Qi-Jun Cheng, Yu-Cheng Chen, Feng-Min Cho, Jyh-Biau Chang, Ce-Kuen Shieh:
A Data Compacting Technique to reduce the NetFlow size in Botnet Detection with BotCluster. BDCAT 2019: 81-84 - [c14]Yu-Cheng Chen, Vincent John Mooney, Santiago Grijalva:
A Survey of Attack Models for Cyber-Physical Security Assessment in Electricity Grid. VLSI-SoC 2019: 242-243 - 2018
- [j14]Feng-Jui Hsu, Mu-Yen Chen, Yu-Cheng Chen:
The human-like intelligence with bio-inspired computing approach for credit ratings prediction. Neurocomputing 279: 11-18 (2018) - [j13]Feng-Jui Hsu, Yu-Cheng Chen:
Human behavior analysis under financial information science: Evidence from corporate social responsibility. Libr. Hi Tech 36(4): 685-704 (2018) - [j12]Chin-Yu Hsu, Chih-Da Wu, Ya-Ping Hsiao, Yu-Cheng Chen, Mu-Jean Chen, Shih-Chun Candice Lung:
Developing Land-Use Regression Models to Estimate PM2.5-Bound Compound Concentrations. Remote. Sens. 10(12): 1971 (2018) - [c13]Chih-Fan Hsu, Yu-Cheng Chen, Yu-Shuen Wang, Chin-Laung Lei, Kuan-Ta Chen:
Realizing the real-time gaze redirection system with convolutional neural network. MMSys 2018: 509-512 - 2017
- [c12]Yu-Cheng Chen, Tzu-Ping Lin, Wan-Yu Shih:
Modeling the urban thermal environment distributions in Taipei Basin using Local Climate Zone (LCZ). JURSE 2017: 1-4 - 2016
- [j11]Shin-Jie Lee, Li Hsiang Lo, Yu-Cheng Chen, Shi-Min Shen:
Co-changing code volume prediction through association rule mining and linear regression model. Expert Syst. Appl. 45: 185-194 (2016) - [c11]Wan-Lun Tsai, You-Lun Hsu, Chi-Po Lin, Chen-Yu Zhu, Yu-Cheng Chen, Min-Chun Hu:
Immersive virtual reality with multimodal interaction and streaming technology. ICMI 2016: 416 - 2014
- [c10]Shin-Jie Lee, Xavier Lin, Li Hsiang Lo, Yu-Cheng Chen, Jonathan Lee:
Code Smells Detection and Visualization of Software Systems. ICS 2014: 1763-1771 - 2012
- [j10]Yu-Cheng Chen, Fan-Ren Chang:
An LMI-Based Method for Reference Spur Reduction in Charge-Pump Phase-Locked Loops Containing Loop Delay. Circuits Syst. Signal Process. 31(5): 1615-1629 (2012) - [j9]Yin-Tien Wang, Yu-Cheng Chen:
Multiple-Obstacle Avoidance in Role Assignment of Formation Control. Int. J. Robotics Autom. 27(2) (2012) - [c9]Fang-Chu Chen, Rui-Yen Chang, Wan-Yi Lin, Sheng Hui Chen, Yu-Cheng Chen, Chin Nung Li:
Disaster and Emergency Management System. WPMC 2012: 363-368 - 2011
- [c8]Shih-Hsuan Yang, Cyong-Wun Fan, Yu-Cheng Chen:
An improved automatic commercial detection system. VCIP 2011: 1-4 - [c7]Hung-Chen Chen, Chih-Ping Wei, Yu-Cheng Chen, Ci-Wei Lan:
Integrating Heterogeneous Prediction Models in the Cloud. WEB 2011: 311-322 - 2010
- [j8]Hsin-Hsi Lai, Heng-Chang Lin, Yu-Cheng Chen:
A Product Knowledge-Sharing System Focusing on Internet-mediated Mode. J. Convergence Inf. Technol. 5(7): 167-174 (2010) - [j7]Yu-Cheng Chen, Hsin-Hsi Lai, Heng-Chang Lin:
Constructing Product Knowledge-Sharing System for Internet Transaction-Matching Model. J. Convergence Inf. Technol. 5(9): 135-145 (2010) - [j6]Heng-Chang Lin, Yu-Cheng Chen, Hsin-Hsi Lai:
Integrating Product Information Management (PIM) with Internet-Mediated Transactions (IMTs). J. Convergence Inf. Technol. 5(10): 99-108 (2010) - [j5]Rui-Yen Chang, Hsin-Ta Chiao, Chin-Lung Lee, Yu-Cheng Chen:
Applications for IP Video Surveillance over the ITRI MTWAL. J. Networks 5(8): 971-976 (2010) - [c6]Yu-Cheng Chen, Fan-Ren Chang, Yung-Shan Chou:
Loop Filter Design for Third-order Charge-pump PLL using Linearized Discrete-time Model. CCA 2010: 2225-2230
2000 – 2009
- 2009
- [j4]Hsin-Hsi Lai, Chien-Hsu Chen, Yu-Cheng Chen, Jo-Wei Yeh, Cheng Fang Lai:
Product design evaluation model of child car seat using gray relational analysis. Adv. Eng. Informatics 23(2): 165-173 (2009) - [j3]Yu-Cheng Chen, Hsien-Chao Huang, Yueh-Min Huang:
Community-based program recommendation for the next generation electronic program guide. IEEE Trans. Consumer Electron. 55(2): 707-712 (2009) - [c5]Jieh-Shan Yeh, Ying-Lin Lin, Yu-Cheng Chen:
Mining Preferred Traversal Paths with HITS. WISM 2009: 98-107 - 2008
- [c4]Yu-Ren Liao, Yu-Cheng Chen, Kuan-Chung Chen, Wei-Guang Teng:
Supporting Landmark Image Retrieval with Skyline Extraction Techniques. MUE 2008: 138-143 - 2007
- [j2]Jih-Hua Chin, Yu-Cheng Chen:
System gains configuration and coordination of redundant degrees of freedom by genetic algorithms for multi-axis machine system in manufacturing. Comput. Ind. Eng. 52(4): 355-379 (2007) - [j1]Chung-Chian Hsu, Yu-Cheng Chen:
Mining of mixed data with application to catalog marketing. Expert Syst. Appl. 32(1): 12-23 (2007) - [c3]Yu-Cheng Chen, Yin-Tien Wang:
Obstacle avoidance and role assignment algorithms for robot formation control. IROS 2007: 4201-4206 - [c2]Zi-Yuan Chen, Yu-Cheng Chen, Yin-Tien Wang:
Image-based Control of an Autonomous Robot with Omnidirectional Vision. SIES 2007: 142-147 - 2006
- [c1]Yung-Shan Chou, Wei-Lung Mao, Yu-Cheng Chen, Fan-Ren Chang:
A Novel Loop Filter Design for Phase-Locked Loops. SMC 2006: 2932-2938
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint