Follow
Gwo-Jong Yu
Gwo-Jong Yu
Aletheia University
Verified email at mail.au.edu.tw
Title
Cited by
Cited by
Year
A new LDA-based face recognition system which can solve the small sample size problem
LF Chen, HYM Liao, MT Ko, JC Lin, GJ Yu
Pattern recognition 33 (10), 1713-1726, 2000
18622000
Fast face detection via morphology-based pre-processing
CC Han, HYM Liao, GJ Yu, LH Chen
Pattern Recognition 33 (10), 1701-1712, 2000
2542000
A mobile butterfly-watching learning system for supporting independent learning
YS Chen, TC Kao, GJ Yu, JP Sheu
The 2nd IEEE International Workshop on Wireless and Mobile Technologies in …, 2004
2512004
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
MY Su, GJ Yu, CY Lin
Computers & security 28 (5), 301-309, 2009
1242009
Mean-quantization-based fragile watermarking for image authentication
GJ Yu, CS Lu, HYM Liao
Optical Engineering 40 (7), 1396-1408, 2001
1152001
A hierarchical MDS-based localization algorithm for wireless sensor networks
GJ Yu, SC Wang
22nd International Conference on Advanced Information Networking and …, 2008
532008
Multirate data collection using mobile sink in wireless sensor networks
CY Chang, SY Chen, IH Chang, GJ Yu, DS Roy
IEEE Sensors Journal 20 (14), 8173-8185, 2020
352020
Energy hole healing protocol for surveillance sensor networks
HY Shiue, GJ Yu, JP Sheu
Workshop on WASN, 2005
312005
A message-based cocktail watermarking system
GJ Yu, CS Lu, HYM Liao
Pattern Recognition 36 (4), 957-968, 2003
292003
TCWTP: Time-constrained weighted targets patrolling mechanism in wireless mobile sensor networks
CY Chang, G Chen, GJ Yu, TL Wang, TC Wang
IEEE Transactions on Systems, Man, and Cybernetics: Systems 45 (6), 901-914, 2014
242014
Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system
GJ Yu, CY Chang, KP Shih, SC Lee
Journal of Network and Computer Applications 30 (2), 728-749, 2007
242007
Path construction and visit scheduling for targets by using data mules
CY Chang, GJ Yu, TL Wang, CY Lin
IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (10), 1289-1300, 2014
222014
A framework of mobile context management for supporting context-aware environments in mobile ad hoc networks
TS Chen, GJ Yu, HJ Chen
Proceedings of the 2007 international conference on Wireless communications …, 2007
192007
An efficient cluster-based multi-channel management protocol for wireless ad hoc networks
GJ Yu, CY Chang
Computer Communications 30 (8), 1742-1753, 2007
182007
Face recognition using a face-only database: A new approach
HYM Liaot, CC Hant, GJ Yut, HR Tyan, MC Chen, LH Chen
Computer Vision—ACCV'98: Third Asian Conference on Computer Vision Hong …, 1997
181997
An energy‐efficient hole‐healing mechanism for wireless sensor networks with obstacles
CY Chang, CY Lin, GJ Yu, CH Kuo
Wireless Communications and Mobile Computing 13 (4), 377-392, 2013
162013
A k-means based small cell deployment algorithm for wireless access networks
GJ Yu, KY Yeh
2016 International Conference on Networking and Network Applications (NaNA …, 2016
132016
A novel downlink interference management mechanism for two-tier OFDMA femtocell networks
GJ Yu, HNB Khac
Journal of Advances in Computer Networks 4 (2), 80-85, 2016
132016
Power control and channel assignment mechanisms for cluster-based multichannel vehicular Ad-Hoc networks
CH Wang, GJ Yu
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
132013
Adaptive storage policy switching for wireless sensor networks
GJ Yu
Wireless Personal Communications 48, 327-346, 2009
132009
The system can't perform the operation now. Try again later.
Articles 1–20