Mu-En Wu
Orcid: 0000-0002-4839-3849
According to our database1,
Mu-En Wu
authored at least 91 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Circuits Syst. Video Technol., February, 2024
On the design of searching algorithm for parameter plateau in quantitative trading strategies using particle swarm optimization.
Knowl. Based Syst., 2024
Expert Syst. Appl., 2024
2023
An evaluation of deep learning models for chargeback Fraud detection in online games.
Clust. Comput., April, 2023
Mining skyline frequent-utility patterns from big data environment based on MapReduce framework.
Intell. Data Anal., 2023
The effective skyline quantify-utility patterns mining algorithm with pruning strategies.
Comput. Sci. Inf. Syst., 2023
Enhancing Abnormal-Behavior-Based Stock Trend Prediction Algorithm with Cost-Sensitive Learning Using Genetic Algorithms.
Proceedings of the Intelligent Information and Database Systems - 15th Asian Conference, 2023
Proceedings of the Intelligent Information and Database Systems - 15th Asian Conference, 2023
2022
Entropy, November, 2022
Effective Fuzzy System for Qualifying the Characteristics of Stocks by Random Trading.
IEEE Trans. Fuzzy Syst., 2022
Predict the trend of economic indicators in time series based on recurrent neural network combined with leading indicators.
J. Intell. Fuzzy Syst., 2022
Appl. Soft Comput., 2022
2021
Knowl. Based Syst., 2021
Enterp. Inf. Syst., 2021
Appl. Intell., 2021
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2021
A Transparently-Secure and Robust Stock Data Supply Framework for Financial-Technology Applications.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021
Forecasting Stock Trend Based on the Constructed Anomaly-Patterns Based Decision Tree.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021
2020
J. Intell. Fuzzy Syst., 2020
J. Intell. Fuzzy Syst., 2020
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
Threshold-Adjusted ORB Strategies with Genetic Algorithm and Protective Closing Strategy on Taiwan Futures Market.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the Intelligent Information and Database Systems - 12th Asian Conference, 2020
2019
Empirical Evaluations on Momentum Effects of Taiwan Index Futures via Stop-Loss and Stop-Profit Mechanisms.
Int. J. Inf. Technol. Decis. Mak., 2019
Future Gener. Comput. Syst., 2019
Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets.
IEEE Access, 2019
An Effective Approach for Obtaining a Group Trading Strategy Portfolio Using Grouping Genetic Algorithm.
IEEE Access, 2019
An Evolutionary-based Algorithm for Multi-Period Grouping Stock Portfolio Optimization.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the Genetic and Evolutionary Computing, 2019
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019
A Divide-and-Conquer-based Approach for Diverse Group Stock Portfolio Optimization Using Island-based Genetic Algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the Intelligent Information and Database Systems - 11th Asian Conference, 2019
2018
J. Supercomput., 2018
IEEE Access, 2018
A Sophisticated Optimization Algorithm for Obtaining a Group Trading Strategy Portfolio and Its Stop-Loss and Take-Profit Points.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Forged Seal Imprint Identification Based on Regression Analysis on Imprint Borders and Metrics Comparisons.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
A Framework of Option Buy-Side Strategy with Simple Index Futures Trading Based on Kelly Criterion.
Proceedings of the 5th International Conference on Behavioral, 2018
Proceedings of the Intelligent Information and Database Systems - 10th Asian Conference, 2018
2017
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud.
J. Signal Process. Syst., 2017
Using trading mechanisms to investigate large futures data and their implications to market trends.
Soft Comput., 2017
J. Inf. Hiding Multim. Signal Process., 2017
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017
Proceedings of the 4th Multidisciplinary International Social Networks Conference, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
2016
Proceedings of the Genetic and Evolutionary Computing, 2016
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016
2015
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. Univers. Comput. Sci., 2015
An atomic routing game for multi-class communication networks with quality of service requirements.
Proceedings of the 24th Wireless and Optical Communication Conference, 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the Genetic and Evolutionary Computing, 2015
Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015
Proceedings of the ASE BigData & SocialInformatics 2015, 2015
2014
Inf. Sci., 2014
Future Gener. Comput. Syst., 2014
Future Gener. Comput. Syst., 2014
A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 IEEE International Conference on Granular Computing, 2014
2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
2012
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks.
ACM Trans. Sens. Networks, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Computing and Combinatorics - 18th Annual International Conference, 2012
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2005
IACR Cryptol. ePrint Arch., 2005