Chung-Wei Chen

Orcid: 0000-0003-1245-6358

According to our database1, Chung-Wei Chen authored at least 16 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A dual-purpose deep learning model for auscultated lung and tracheal sound analysis based on mixed set training.
Biomed. Signal Process. Control., September, 2023

2021
Improved Breath Phase and Continuous Adventitious Sound Detection in Lung and Tracheal Sound Using Mixed Set Training and Domain Adaptation.
CoRR, 2021

An Update of a Progressively Expanded Database for Automated Lung Sound Analysis.
CoRR, 2021

Benchmarking of eight recurrent neural network variants for breath phase and adventitious sound detection on a self-developed open-access lung sound database-HF_Lung_V1.
CoRR, 2021

2020
Breathing Sound Segmentation and Detection Using Transfer Learning Techniques on an Attention-Based Encoder-Decoder Architecture.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2015
Adaptive ECC Scheme for Hybrid SSD's.
IEEE Trans. Computers, 2015

A Secure Multicast Key Agreement Scheme.
Proceedings of the Information and Communication Technology, 2015

2012
Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability.
IEEE J. Sel. Areas Commun., 2011

2010
A Generalized Temporal and Spatial Role-Based Access Control Model.
J. Networks, 2010

2009
Temporal and Location-Based RBAC Model.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2008
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks.
J. Commun., 2008

Flexible Key Assignment for a Time-Token Constraint in a Hierarchy.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008


  Loading...