Jason Lin

Orcid: 0000-0001-8013-9923

According to our database1, Jason Lin authored at least 43 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel data hiding scheme based on multidimensional reference tensors.
Multim. Tools Appl., March, 2024

Efficient fault-tolerant quantum dialogue protocols based on dictionary encoding without decoy photons.
Quantum Inf. Process., January, 2024

Target-Aware Yield Prediction (TAYP) Model Used to Improve Agriculture Crop Productivity.
IEEE Trans. Geosci. Remote. Sens., 2024

WebQuest: A Benchmark for Multimodal QA on Web Page Sequences.
CoRR, 2024

Mask Focal Modulation Network for Gastric Intestinal Metaplasia Segmentation.
Proceedings of the International Joint Conference on Neural Networks, 2024

ScreenAI: A Vision-Language Model for UI and Infographics Understanding.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

A Heuristic Algorithm for Mathematical Markup Encoding Based on the Relative Positions of Characters.
Proceedings of the ACM Symposium on Document Engineering 2024, 2024

2023
Cryptanalysis and improvement of a controlled quantum secure direct communication with authentication protocol based on five-particle cluster state.
Quantum Inf. Process., May, 2023

Explore, Establish, Exploit: Red Teaming Language Models from Scratch.
CoRR, 2023

Zorro: the masked multimodal transformer.
CoRR, 2023

A Certificate Management Mechanism Using Distributed Ledger.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

Ranking of Mathematical Equations within a Scientific Document.
Proceedings of the Sixth IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2023

2022
A Large Payload Data Hiding Scheme Using Scalable Secret Reference Matrix.
Symmetry, 2022

Authenticated Semi-Quantum Key Distribution Protocol Based on W States.
Sensors, 2022

Multiparty mediated quantum secret sharing protocol.
Quantum Inf. Process., 2022

Susceptibility & defense of satellite image-trained convolutional networks to backdoor attacks.
Inf. Sci., 2022

Cryptanalysis of a Semi-Quantum Bi-Signature Scheme Based on W States.
Entropy, 2022

Behavior Profiling of Role-Playing Game Players Based on Heuristic Event Log Mining.
Proceedings of the New Trends in Computer Technologies and Applications, 2022

2021
Cryptanalysis and improvement in semi-quantum private comparison based on Bell states.
Quantum Inf. Process., 2021

Multiparty Mediated Semi-Quantum Secret Sharing Protocol.
CoRR, 2021

A Color Image Authentication Scheme With Grayscale Invariance.
IEEE Access, 2021

2019
CRED: a rapid peak caller for Chem-seq data.
J. Open Source Softw., 2019

Comparative Analysis of Blockchain-based Smart Contracts for Solar Electricity Exchanges.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

Extraction of Math Expressions from PDF Documents Based on Unsupervised Modeling of Fonts.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

Prediction of Mathematical Expression Declarations based on Spatial, Semantic, and Syntactic Analysis.
Proceedings of the ACM Symposium on Document Engineering 2019, 2019

Semi-Automatic LaTeX-Based Labeling of Mathematical Objects in PDF Documents: MOP Data Set.
Proceedings of the ACM Symposium on Document Engineering 2019, 2019

2018
Interactive Classification for Deep Learning Interpretation.
CoRR, 2018

QuQn map: Qualitative-Quantitative mapping of scientific papers.
Proceedings of the ACM Symposium on Document Engineering 2018, 2018

Prediction of Mathematical Expression Constraints (ME-Con).
Proceedings of the ACM Symposium on Document Engineering 2018, 2018

2017
Syntactic role identification of mathematical expressions.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

2015
3DNN: 3D Nearest Neighbor.
Int. J. Comput. Vis., 2015

Quantifying Tactical Risk: A Framework for Statistical Classification Using MECH.
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015

Risk Management in Asymmetric Conflict: Using Predictive Route Reconnaissance to Assess and Mitigate Threats.
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015

Admission control in YARN clusters based on dynamic resource reservation.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Enfold: clothing for people with cerebral palsy.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

2014
Quantum private comparison of equality protocol without a third party.
Quantum Inf. Process., 2014

HaSTE: Hadoop YARN Scheduling Based on Task-Dependency and Resource-Demand.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Bell state entanglement swappings over collective noises and their applications on quantum cryptography.
Quantum Inf. Process., 2013

New circular quantum secret sharing for remote agents.
Quantum Inf. Process., 2013

2012
New quantum private comparison protocol using EPR pairs.
Quantum Inf. Process., 2012

Data-Driven Scene Understanding from 3D Models.
Proceedings of the British Machine Vision Conference, 2012

2011
Intercept-resend attacks on Semiquantum secret sharing and the Improvements
CoRR, 2011

2009
A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009


  Loading...