PUBLICATIONS

Journal Articles and Book Chapters

1 / 3D Baseball Pitcher Pose Reconstruction Using Joint-wise Volumetric Triangulation and Baseball Customized Filter System

Yun-Wei Chiu, Kuei-Ting Huang, Yuh-Renn Wu, Jyh-How Huang, Wei-Li Hsu, Pei-Yuan Wu, IEEE Access, 12, 117110-117125, Aug. 2024

[PDF]

2 / Federated Learning for distribution skewed data using sample weights

Hung Nguyen, Pei-Yuan Wu, J. Morris Chang, IEEE Transactions on Artificial Intelligence, vol. 5, no. 6, 2615-2626, Jun. 2024

[PDF]

3 / Multi-source wafer map retrieval based on contrastive learning for root cause analysis in semiconductor manufacturing

Wei-Jyun Hong, Chia-Yu Shen, Pei-Yuan Wu, Journal of Intelligent Manufacturing, Nov. 2023

[PDF]

4 / SecureTVM: A TVM-Based Compiler Framework for Selective Privacy-Preserving Neural Inference

PO-HSUAN HUANG et al., ACM Transactions on Design Automation of Electronic Systems, Jan. 2023

[PDF]

5 / Viewing Bias Matters in 360° Videos Visual Saliency Prediction

Peng-Wen Chen et al., IEEE Access, Apr. 2023

[PDF]

6 / Protecting Sensitive Attributes by Adversarial Training through Class-Overlapping Techniques

Tsung-Hsien Lin, Ying-Shuo Lee, Fu-Chieh Chang, J. Morris Chang, Pei-Yuan Wu, IEEE Transactions on Information Forensics and Security, Jan. 2023

[PDF]

7 / Fusion-Based Smartphone Positioning Using Unsupervised Calibration of Crowdsourced Wi-Fi FTM

Hao-Wei Chan, Pei-Yuan Wu, Alexander I-Chi Lai, Ruey-Beei Wu, IEEE Access, Sept. 2022

[PDF]

8 / Optimization and Evaluation of Multi-Detector Deep Neural Network for High Accuracy Wi-Fi Fingerprint Positioning

Chung-Yuan Chen, Alexander I-Chi Lai, Pei-Yuan Wu, Ruey-Beei Wu, IEEE Internet of Things, Jan. 2022

[PDF]

9 / Physical Tampering Detection Using Single COTS Wi-Fi Endpoint

Poh Yuen Chan, Alexander I-Chi Lai, Pei-Yuan Wu, Ruey-Beei Wu, Sensors, Aug. 2021

[PDF]

10 / AutoGAN-Based Dimension Reduction for Privacy Preservation

Hung Nguyen, Di Zhuang, Pei-Yuan Wu, Morris Chang, Neurocomputing, Apr. 2020

[PDF]

11 / Compressive Privacy Generative Adversarial Network

B. Tseng and P. Wu, IEEE Transactions on Information Forensics and Security, Jan. 2020

[PDF]

12 / Collaborative PCA/DCA Learning Methods for Compressive Privacy

S. Y. Kung, Thee Chanyaswad, J. Morris Chang, and P. Y. Wu, ACM Transactions on Embedded Computing Systems, Jul. 2017

[PDF]

13 / Cost-Effective Kernel Ridge Regression Implementation for Keystroke-Based Active Authentication System

P. Y. Wu, C. C. Fang, J. M. Chang, and S. Y. Kung, IEEE Transactions on Cybernetics, Aug. 2016

[PDF]

14 / Capturing Cognitive Fingerprints from Keystroke Dynamics

J. M. Chang, C. C. Fang, K. H. Ho, N. Kelly, P. Y. Wu, Y. Ding, C. Chu, S. Gilbert, A. E. Kamal, S. Y. Kung, IT Professional, Jul. 2013

[PDF]