Yu-Chih Wei

Orcid: 0000-0001-9467-3879

According to our database1, Yu-Chih Wei authored at least 26 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An evaluation of deep learning models for chargeback Fraud detection in online games.
Clust. Comput., April, 2023

Machine learning for trust, security, and privacy in computing and communications.
EURASIP J. Wirel. Commun. Netw., 2023

Zero Trust Framework In Financial Sector: The Handling Of Machine Learning Based Trust Management.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

2022
Using machine learning to detect PII from attributes and supporting activities of information assets.
J. Supercomput., 2022

An adaptive high-voltage direct current detection algorithm using cognitive wavelet transform.
Inf. Process. Manag., 2022

A pre-signed response method based on online certificate status protocol request prediction.
Enterp. Inf. Syst., 2022

Enhancing Chinese Medical Named Entity Recognition with Auto-Mined Lexicon.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

High Myopia Detection Method On Fundus Images Based On Curriculum Learning.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

An Efficient Small for Gestational Age Prognosis System Using Stacked Generalization Scheme (SGS).
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
A discharge detection method in high-voltage direct current system using wavelet transform with adaptive wavelet level decision.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Medical named entity recognition of Chinese electronic medical records based on stacked Bidirectional Long Short-Term Memory.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
pISRA: privacy considered information security risk assessment model.
J. Supercomput., 2020

Detecting Online Game Malicious Chargeback by using k-NN.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Machine Learning Method Based on Stream Homomorphic Encryption Computing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

Wedding Dress Question-Answering System.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

2018
Performance evaluation of the recommendation mechanism of information security risk identification.
Neurocomputing, 2018

2014
Adaptive decision making for improving trust establishment in VANET.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
A beacon-based trust management system for enhancing user centric location privacy in VANETs.
J. Commun. Networks, 2013

A risk recommendation approach for information security risk assessment.
Proceedings of the 15th Asia-Pacific Network Operations and Management Symposium, 2013

2012
SafeAnon: a safe location privacy scheme for vehicular networks.
Telecommun. Syst., 2012

Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Evaluation of collusion resistance on trust management systems for VANETs.
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

2011
Beacon-based trust management for location privacy enhancement VANETs.
Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011

2010
Safe Distance Based Location Privacy in Vehicular Networks.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

2009
RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009


  Loading...