default search action
Yuh-Jye Lee
Person information
- affiliation: National Taiwan University of Science and Technology, Department of Computer Science and Information Engineering
- affiliation: National Taiwan University, Intel-NTU Connected Context Computing Center
- affiliation: University of Wisconsin - Madison, Department of Computer Sciences
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c33]Sin Cheng Ciou, Pin-Jui Chen, Elvin Y. Tseng, Yuh-Jye Lee:
Federated Learning for Sparse Principal Component Analysis. IEEE Big Data 2023: 1081-1086 - [i2]Sin Cheng Ciou, Pin-Jui Chen, Elvin Y. Tseng, Yuh-Jye Lee:
Federated Learning for Sparse Principal Component Analysis. CoRR abs/2311.08677 (2023)
2010 – 2019
- 2019
- [j17]Hsing-Kuo Pao, Fong-Fuei Lee, Yuh-Jye Lee:
Dealing with Interleaved Event Inputs for Intrusion Detection. J. Inf. Sci. Eng. 35(1): 223-242 (2019) - [c32]Hsiang-Hsuan Chen, Yuh-Jye Lee:
Distributed Consensus Reduced Support Vector Machine. IEEE BigData 2019: 5718-5727 - [c31]Adrian Chriswanto, Hsing-Kuo Pao, Yuh-Jye Lee:
A Unified Approach on Active Learning Dual Supervision. IJCNN 2019: 1-8 - [c30]Yan-Ru Jhuo, Chi-Yu Chen, Yu-Hsuan Yang, Hsing-Chuan Hsieh, Yuh-Jye Lee:
Continuous Monitoring of the Ambient Factors via ε-Smooth Support Vector Regression. UCAmI 2019: 63 - 2018
- [j16]Weizhe Gu, Wei-Po Chen, Chun-Hsu Ko, Yuh-Jye Lee, Jein-Shan Chen:
Two smooth support vector machines for \(\varepsilon \) -insensitive regression. Comput. Optim. Appl. 70(1): 171-199 (2018) - 2017
- [j15]Alvin Chiang, Esther David, Yuh-Jye Lee, Guy Leshem, Yi-Ren Yeh:
A study on anomaly detection ensembles. J. Appl. Log. 21: 1-13 (2017) - [j14]Shan-Hung Wu, Man-Ju Chou, Chun-Hsiung Tseng, Yuh-Jye Lee, Kuan-Ta Chen:
Detecting In Situ Identity Fraud on Social Network Services: A Case Study With Facebook. IEEE Syst. J. 11(4): 2432-2443 (2017) - [c29]Er-Chen Huang, Hsing-Kuo Pao, Yuh-Jye Lee:
Big active learning. IEEE BigData 2017: 94-101 - 2016
- [c28]Yuh-Jye Lee, Hsing-Kuo Pao, Shueh-Han Shih, Jing-Yao Lin, Xin-Rong Chen:
Compressed learning for time series classification. IEEE BigData 2016: 923-930 - [c27]Menachem Domb, Guy Leshem, Elisheva Bonchek-Dokow, Esther David, Yuh-Jye Lee:
Sparse sampling for sensing temporal data - building an optimized envelope. TAAI 2016: 241-247 - [c26]Jain-Shing Wu, Yuh-Jye Lee, Te-En Wei, Chih-Hung Hsieh, Chia-Min Lai:
ChainSpot: Mining Service Logs for Cyber Security Threat Detection. Trustcom/BigDataSE/ISPA 2016: 1867-1874 - 2015
- [j13]Jain-Shing Wu, Chih-Ta Lin, Yuh-Jye Lee, Song-Kong Chong:
Keystroke and Mouse Movement Profiling for Data Loss Prevention. J. Inf. Sci. Eng. 31(1): 23-42 (2015) - [c25]Wei-Chih Lai, Po-Han Huang, Yuh-Jye Lee, Alvin Chiang:
A Distributed Ensemble Scheme for nonlinear Support Vector Machine. ISSNIP 2015: 1-6 - 2014
- [c24]Xing-Yu Chen, Hsing-Kuo Pao, Yuh-Jye Lee:
Efficient traffic speed forecasting based on massive heterogenous historical data. IEEE BigData 2014: 10-17 - [c23]Yang-Chi Shen, Alvin Chiang, Yi-Ren Yeh, Yuh-Jye Lee:
Continuous Monitoring and Distributed Anomaly Detection for Ambient Factors. iThings/GreenCom/CPSCom 2014: 31-38 - [c22]Kuan-Wen Chen, Hsin-Mu Tsai, Chih-Hung Hsieh, Shou-De Lin, Chieh-Chih Wang, Shao-Wen Yang, Shao-Yi Chien, Chia-Han Lee, Yu-Chi Su, Chun-Ting Chou, Yuh-Jye Lee, Hsing-Kuo Pao, Ruey-Shan Guo, Chung-Jen Chen, Ming-Hsuan Yang, Bing-Yu Chen, Yi-Ping Hung:
Connected vehicle safety science, system, and framework. WF-IoT 2014: 235-240 - [c21]Shan-Hung Wu, Man-Ju Chou, Chun-Hsiung Tseng, Yuh-Jye Lee, Kuan-Ta Chen:
Detecting in-situ identity fraud on social network services: a case study on facebook. WWW (Companion Volume) 2014: 401-402 - 2013
- [j12]Yuh-Jye Lee, Yi-Ren Yeh, Yu-Chiang Frank Wang:
Anomaly Detection via Online Oversampling Principal Component Analysis. IEEE Trans. Knowl. Data Eng. 25(7): 1460-1470 (2013) - [c20]Lin Xu, Yi-Ren Yeh, Yuh-Jye Lee, Jing Li:
A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection. ANT/SEIT 2013: 1174-1181 - [c19]Min-Sheng Lin, Chien-Yi Chiu, Yuh-Jye Lee, Hsing-Kuo Pao:
Malicious URL filtering - A big data application. IEEE BigData 2013: 589-596 - [c18]Ming-Hen Tsai, Yi-Ren Yeh, Yuh-Jye Lee, Yu-Chiang Frank Wang:
Solving Nonlinear SVM in Linear Time? A Nyström Approximated SVM with Applications to Image Classification. MVA 2013: 5-8 - [c17]Jain-Shing Wu, Yuh-Jye Lee, Song-Kong Chong, Chih-Ta Lin, Jung-Lun Hsu:
Key Stroke Profiling for Data Loss Prevention. TAAI 2013: 7-12 - [c16]Hsiao-Hui Chen, Ping-Feng Wang, Ching-Tien Sung, Yi-Ren Yeh, Yuh-Jye Lee:
Energy Disaggregation via Clustered Regression Models: A Case Study in the Convenience Store. TAAI 2013: 37-42 - [c15]Chien-Yi Chiu, Chi-Tien Yeh, Yuh-Jye Lee:
Frequent Pattern Based User Behavior Anomaly Detection for Cloud System. TAAI 2013: 61-66 - [i1]Shan-Hung Wu, Man-Ju Chou, Ming-Hung Wang, Chun-Hsiung Tseng, Yuh-Jye Lee, Kuan-Ta Chen:
Is Somebody Watching Your Facebook Newsfeed? CoRR abs/1308.5168 (2013) - 2012
- [j11]Chien-Chung Chang, Hsing-Kuo Pao, Yuh-Jye Lee:
An RSVM based two-teachers-one-student semi-supervised learning algorithm. Neural Networks 25: 57-69 (2012) - [c14]Ding-Jie Huang, Kai-Ting Yang, Chien-Chun Ni, Wei-Chung Teng, Tien-Ruey Hsiang, Yuh-Jye Lee:
Clock Skew Based Client Device Identification in Cloud Environments. AINA 2012: 526-533 - [c13]Hsing-Kuo Pao, Yan-Lin Chou, Yuh-Jye Lee:
Malicious URL Detection Based on Kolmogorov Complexity Estimation. Web Intelligence 2012: 380-387 - 2011
- [j10]Chih-Cheng Chang, Li-Jen Chien, Yuh-Jye Lee:
A novel framework for multi-class classification via ternary smooth support vector machine. Pattern Recognit. 44(6): 1235-1244 (2011) - [c12]Yu-Wei Chao, Yi-Ren Yeh, Yu-Wen Chen, Yuh-Jye Lee, Yu-Chiang Frank Wang:
Locality-constrained group sparse representation for robust face recognition. ICIP 2011: 761-764 - [c11]Yi-Cheng Tseng, Yuh-Jye Lee:
Rank-r Updating Techniques for Fast Exact Cross-Validation. ICDM (Poster and Industry Proceedings) 2011: 54-67 - 2010
- [j9]Pei-Chun Chen, Kuang-Yao Lee, Tsung-Ju Lee, Yuh-Jye Lee, Su-Yun Huang:
Multiclass support vector classification via coding and regression. Neurocomputing 73(7-9): 1501-1512 (2010) - [j8]Li-Jen Chien, Chien-Chung Chang, Yuh-Jye Lee:
Variant Methods of Reduced Set Selection for Reduced Support Vector Machines. J. Inf. Sci. Eng. 26(1): 183-196 (2010) - [c10]Li-Jen Chien, Yuh-Jye Lee, Zhi-Peng Kao, Chih-Cheng Chang:
Robust 1-Norm Soft Margin Smooth Support Vector Machine. IDEAL 2010: 145-152 - [c9]Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen-Yang Luo, Hsiu-Chuan Huang:
Semi-supervised Learning for False Alarm Reduction. ICDM 2010: 595-605
2000 – 2009
- 2009
- [j7]Chun-Nan Hsu, Han-Shen Huang, Yu-Ming Chang, Yuh-Jye Lee:
Periodic step-size adaptation in second-order gradient descent for single-pass on-line structured learning. Mach. Learn. 77(2-3): 195-224 (2009) - [j6]Yi-Ren Yeh, Su-Yun Huang, Yuh-Jye Lee:
Nonlinear Dimension Reduction with Kernel Sliced Inverse Regression. IEEE Trans. Knowl. Data Eng. 21(11): 1590-1603 (2009) - [c8]Chun-Nan Hsu, Yu-Ming Chang, Han-Shen Huang, Yuh-Jye Lee:
Periodic Step Size Adaptation for Single Pass On-line Learning. NIPS 2009: 763-771 - 2007
- [j5]Chien-Ming Huang, Yuh-Jye Lee, Dennis K. J. Lin, Su-Yun Huang:
Model selection for support vector machines via uniform design. Comput. Stat. Data Anal. 52(1): 335-346 (2007) - [j4]Yuh-Jye Lee, Su-Yun Huang:
Reduced Support Vector Machines: A Statistical Theory. IEEE Trans. Neural Networks 18(1): 1-13 (2007) - [c7]Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee:
A three-tier IDS via data mining approach. MineNet 2007: 1-6 - 2006
- [c6]Yuh-Jye Lee, Yi-Ren Yeh:
Ranking the Rules and Instances of Decision Trees. ICDM (Posters) 2006: 67-78 - 2005
- [j3]Yuh-Jye Lee, Wen-Feng Hsieh, Chien-Ming Huang:
epsilon-SSVR: A Smooth Support Vector Machine for epsilon-Insensitive Regression. IEEE Trans. Knowl. Data Eng. 17(5): 678-685 (2005) - [c5]Hsing-Kuo Pao, Shou-Chih Chang, Yuh-Jye Lee:
Model Trees for Classification of Hybrid Data Types. IDEAL 2005: 32-39 - 2004
- [c4]Lih-Ren Jen, Yuh-Jye Lee:
Clustering Model Selection for Reduced Support Vector Machines. IDEAL 2004: 714-719 - [c3]Chien-Chung Chang, Yuh-Jye Lee:
Generating the Reduced Set by Systematic Sampling. IDEAL 2004: 720-725 - 2003
- [j2]Yuh-Jye Lee, Olvi L. Mangasarian, William H. Wolberg:
Survival-Time Classification of Breast Cancer Patients. Comput. Optim. Appl. 25(1-3): 151-166 (2003) - 2001
- [j1]Yuh-Jye Lee, O. L. Mangasarian:
SSVM: A Smooth Support Vector Machine for Classification. Comput. Optim. Appl. 20(1): 5-22 (2001) - [c2]Yuh-Jye Lee, Olvi L. Mangasarian:
RSVM: Reduced Support Vector Machines. SDM 2001: 1-17
1990 – 1999
- 1999
- [c1]Yuh-Jye Lee, Olvi L. Mangasarian, William H. Wolberg:
Breast cancer survival and chemotherapy: A support vector machine analysis. Discrete Mathematical Problems with Medical Applications 1999: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint