default search action
Chia-Cheng Yen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c10]Yi-Yu Chen, Hui-Nien Hung, Shun-Ren Yang, Chia-Cheng Yen, Phone Lin
:
On Poisoning Attacks and Defenses for LSTM Time Series Prediction Models: Speed Prediction as an Example. IWCMC 2024: 610-615 - 2022
- [b1]Chia-Cheng Yen:
SecureTLC: Secure and Two-level Traffic Signal Control for Intelligent Transportation System. University of California, Davis, USA, 2022 - [j4]Chia-Cheng Yen
, Dipak Ghosal
, H. Michael Zhang
, Chen-Nee Chuah
:
Security Vulnerabilities and Protection Algorithms for Backpressure-Based Traffic Signal Control at an Isolated Intersection. IEEE Trans. Intell. Transp. Syst. 23(7): 6406-6417 (2022) - [c9]Chia-Cheng Yen, Hang Gao, H. Michael Zhang:
Deep Reinforcement Learning Based Platooning Control for Travel Delay and Fuel Optimization. ITSC 2022: 737-742 - [c8]Chia-Cheng Yen, Wenting Sun, Hakimeh Purmehdi, Won Park, Kunal Rajan Deshmukh, Nishank Thakrar, Omar Nassef, Adam Jacobs:
Graph Neural Network based Root Cause Analysis Using Multivariate Time-series KPIs for Wireless Networks. NOMS 2022: 1-7 - 2021
- [j3]Ming-Chin Chuang
, Chia-Cheng Yen:
Geometric Authentication Mechanism for Enhancing Security in IoT Environment. Symmetry 13(8): 1369 (2021) - [c7]Pin-Chieh Fu, Chia-Cheng Yen, Nien-Chen Yang, Jia-Shung Wang:
Two-phase Scheme for Trimming QTMT CU Partition using Multi-branch Convolutional Neural Networks. AICAS 2021: 1-6 - 2020
- [j2]Yu-Tai Lin
, Chia-Cheng Yen
, Jia-Shung Wang
:
Video Popularity Prediction: An Autoencoder Approach With Clustering. IEEE Access 8: 129285-129299 (2020) - [c6]Chia-Cheng Yen, Dipak Ghosal, H. Michael Zhang, Chen-Nee Chuah:
A Deep On-Policy Learning Agent for Traffic Signal Control of Multiple Intersections. ITSC 2020: 1-6
2010 – 2019
- 2018
- [c5]Yi-Ting Chen, Chia-Cheng Yen, Yu-Tai Lin
, Jia-Shung Wang:
Cooperative Caching Plan of Popular Videos for Mobile Users by Grouping Preferences. DASC/PiCom/DataCom/CyberSciTech 2018: 762-769 - [c4]Chia-Cheng Yen, Dipak Ghosal, H. Michael Zhang, Chen-Nee Chuah, Hao Chen
:
Falsified Data Attack on Backpressure-based Traffic Signal Control Algorithms. VNC 2018: 1-8 - 2016
- [c3]Chu-Ming Wang, Chia-Cheng Yen, Wen-Yen Yang, Jia-Shung Wang:
Tree-Structured Linear Approximation for Data Compression over WSNs. DCOSS 2016: 43-51 - 2015
- [j1]Tai-Yu Chiu, Ting-Chieh Hsu, Chia-Cheng Yen, Jia-Shung Wang:
Interpolation based consensus clustering for gene expression time series. BMC Bioinform. 16: 117:1-117:17 (2015) - [c2]Chia-Cheng Yen, Jia-Shung Wang:
Distributed delivery of popular videos over Ultra-dense networks. ISCC 2015: 116-121 - 2013
- [c1]Hsien-Tzu Chiu, Chia-Cheng Yen, Jia-Shung Wang:
A Framework of Temporal Data Retrieval for Unreliable WSNs Using Distributed Fountain Codes. MSN 2013: 389-394
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint