A new LDA-based face recognition system which can solve the small sample size problem LF Chen, HYM Liao, MT Ko, JC Lin, GJ Yu Pattern recognition 33 (10), 1713-1726, 2000 | 1862 | 2000 |
Fast face detection via morphology-based pre-processing CC Han, HYM Liao, GJ Yu, LH Chen Pattern Recognition 33 (10), 1701-1712, 2000 | 254 | 2000 |
A mobile butterfly-watching learning system for supporting independent learning YS Chen, TC Kao, GJ Yu, JP Sheu The 2nd IEEE International Workshop on Wireless and Mobile Technologies in …, 2004 | 251 | 2004 |
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach MY Su, GJ Yu, CY Lin Computers & security 28 (5), 301-309, 2009 | 124 | 2009 |
Mean-quantization-based fragile watermarking for image authentication GJ Yu, CS Lu, HYM Liao Optical Engineering 40 (7), 1396-1408, 2001 | 115 | 2001 |
A hierarchical MDS-based localization algorithm for wireless sensor networks GJ Yu, SC Wang 22nd International Conference on Advanced Information Networking and …, 2008 | 53 | 2008 |
Multirate data collection using mobile sink in wireless sensor networks CY Chang, SY Chen, IH Chang, GJ Yu, DS Roy IEEE Sensors Journal 20 (14), 8173-8185, 2020 | 35 | 2020 |
Energy hole healing protocol for surveillance sensor networks HY Shiue, GJ Yu, JP Sheu Workshop on WASN, 2005 | 31 | 2005 |
A message-based cocktail watermarking system GJ Yu, CS Lu, HYM Liao Pattern Recognition 36 (4), 957-968, 2003 | 29 | 2003 |
TCWTP: Time-constrained weighted targets patrolling mechanism in wireless mobile sensor networks CY Chang, G Chen, GJ Yu, TL Wang, TC Wang IEEE Transactions on Systems, Man, and Cybernetics: Systems 45 (6), 901-914, 2014 | 24 | 2014 |
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system GJ Yu, CY Chang, KP Shih, SC Lee Journal of Network and Computer Applications 30 (2), 728-749, 2007 | 24 | 2007 |
Path construction and visit scheduling for targets by using data mules CY Chang, GJ Yu, TL Wang, CY Lin IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (10), 1289-1300, 2014 | 22 | 2014 |
A framework of mobile context management for supporting context-aware environments in mobile ad hoc networks TS Chen, GJ Yu, HJ Chen Proceedings of the 2007 international conference on Wireless communications …, 2007 | 19 | 2007 |
An efficient cluster-based multi-channel management protocol for wireless ad hoc networks GJ Yu, CY Chang Computer Communications 30 (8), 1742-1753, 2007 | 18 | 2007 |
Face recognition using a face-only database: A new approach HYM Liaot, CC Hant, GJ Yut, HR Tyan, MC Chen, LH Chen Computer Vision—ACCV'98: Third Asian Conference on Computer Vision Hong …, 1997 | 18 | 1997 |
An energy‐efficient hole‐healing mechanism for wireless sensor networks with obstacles CY Chang, CY Lin, GJ Yu, CH Kuo Wireless Communications and Mobile Computing 13 (4), 377-392, 2013 | 16 | 2013 |
A k-means based small cell deployment algorithm for wireless access networks GJ Yu, KY Yeh 2016 International Conference on Networking and Network Applications (NaNA …, 2016 | 13 | 2016 |
A novel downlink interference management mechanism for two-tier OFDMA femtocell networks GJ Yu, HNB Khac Journal of Advances in Computer Networks 4 (2), 80-85, 2016 | 13 | 2016 |
Power control and channel assignment mechanisms for cluster-based multichannel vehicular Ad-Hoc networks CH Wang, GJ Yu 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 13 | 2013 |
Adaptive storage policy switching for wireless sensor networks GJ Yu Wireless Personal Communications 48, 327-346, 2009 | 13 | 2009 |