Follow
Gwo-Jong Yu
Gwo-Jong Yu
Aletheia University
Verified email at mail.au.edu.tw
Title
Cited by
Cited by
Year
A new LDA-based face recognition system which can solve the small sample size problem
LF Chen, HYM Liao, MT Ko, JC Lin, GJ Yu
Pattern recognition 33 (10), 1713-1726, 2000
18492000
Fast face detection via morphology-based pre-processing
CC Han, HYM Liao, GJ Yu, LH Chen
Pattern Recognition 33 (10), 1701-1712, 2000
2502000
A mobile butterfly-watching learning system for supporting independent learning
YS Chen, TC Kao, GJ Yu, JP Sheu
The 2nd IEEE International Workshop on Wireless and Mobile Technologies in …, 2004
2452004
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
MY Su, GJ Yu, CY Lin
Computers & security 28 (5), 301-309, 2009
1232009
Mean-quantization-based fragile watermarking for image authentication
GJ Yu, CS Lu, HYM Liao
Optical Engineering 40 (7), 1396-1408, 2001
1162001
A hierarchical MDS-based localization algorithm for wireless sensor networks
GJ Yu, SC Wang
22nd International Conference on Advanced Information Networking and …, 2008
512008
Multirate data collection using mobile sink in wireless sensor networks
CY Chang, SY Chen, IH Chang, GJ Yu, DS Roy
IEEE Sensors Journal 20 (14), 8173-8185, 2020
342020
Energy hole healing protocol for surveillance sensor networks
HY Shiue, GJ Yu, JP Sheu
Workshop on WASN 2005, 2005
322005
A message-based cocktail watermarking system
GJ Yu, CS Lu, HYM Liao
Pattern Recognition 36 (4), 957-968, 2003
252003
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system
GJ Yu, CY Chang, KP Shih, SC Lee
Journal of Network and Computer Applications 30 (2), 728-749, 2007
242007
TCWTP: Time-constrained weighted targets patrolling mechanism in wireless mobile sensor networks
CY Chang, G Chen, GJ Yu, TL Wang, TC Wang
IEEE Transactions on Systems, Man, and Cybernetics: Systems 45 (6), 901-914, 2014
232014
Path construction and visit scheduling for targets by using data mules
CY Chang, GJ Yu, TL Wang, CY Lin
IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (10), 1289-1300, 2014
212014
A framework of mobile context management for supporting context-aware environments in mobile ad hoc networks
TS Chen, GJ Yu, HJ Chen
Proceedings of the 2007 international conference on Wireless communications …, 2007
182007
An efficient cluster-based multi-channel management protocol for wireless ad hoc networks
GJ Yu, CY Chang
Computer Communications 30 (8), 1742-1753, 2007
172007
Face recognition using a face-only database: A new approach
HYM Liaot, CC Hant, GJ Yut, HR Tyan, MC Chen, LH Chen
Computer Vision—ACCV'98: Third Asian Conference on Computer Vision Hong …, 1997
171997
An energy‐efficient hole‐healing mechanism for wireless sensor networks with obstacles
CY Chang, CY Lin, GJ Yu, CH Kuo
Wireless Communications and Mobile Computing 13 (4), 377-392, 2013
162013
Adaptive storage policy switching for wireless sensor networks
GJ Yu
Wireless Personal Communications 48, 327-346, 2009
142009
Power control and channel assignment mechanisms for cluster-based multichannel vehicular Ad-Hoc networks
CH Wang, GJ Yu
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
132013
A novel downlink interference management mechanism for two-tier OFDMA femtocell networks
GJ Yu, HNB Khac
Journal of Advances in Computer Networks 4 (2), 80-85, 2016
122016
Hierarchical CSI-fingerprints classification for passive multi-person localization
R Ma, GJ Yu, G Chen, S Zhao, B Yang
2017 International Conference on Networking and Network Applications (NaNA …, 2017
112017
The system can't perform the operation now. Try again later.
Articles 1–20