default search action
Jian-Hong Chen
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Jian-Hong Chen, Song-Feng Zhao:
Effect of Orbital Symmetry on Time-Energy Distributions of F- Ions in the Attoclock Scheme. Symmetry 16(8): 1019 (2024) - 2021
- [j12]Jian-Hong Chen, Chaoqun Chen, Qinghua Song, Yi-Fei Zhao, Longxin Deng, Raoqing Xie, Shan Yang:
Spread Mechanism and Control Strategies of Rumor Propagation Model Considering Rumor Refutation and Information Feedback in Emergency Management. Symmetry 13(9): 1694 (2021) - 2020
- [c11]Jian-Hong Chen, Guo-Han Lin, Chitra Meghala Yelamandala, Yu-Cheng Fan:
High-Accuracy Mapping Design Based on Multi-view Images and 3D LiDAR Point Clouds. ICCE 2020: 1-2
2010 – 2019
- 2019
- [j11]Jian-Hong Chen, Yi-Fei Zhao, Shan Yang:
Research on the Classification of Slope Stability State Based on the Method of Vectorization Attribute Circle. IEEE Access 7: 74879-74889 (2019) - 2015
- [j10]Peng-Ting Chen, Jian-Hong Chen:
Implementing cloud-based medical systems in hospitals and strategic implications. Technol. Anal. Strateg. Manag. 27(2): 198-218 (2015) - 2014
- [j9]Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu:
A true Random-Number Encryption Method employing block cipher and PRNG. Comput. Sci. Inf. Syst. 11(3): 905-924 (2014) - [c10]Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Ilsun You, Kangbin Yim, Jian-Hong Chen, William Cheng-Chung Chu:
A random wrapping encryption method. CCNC 2014: 151-156 - 2013
- [c9]Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu, Chao-Tung Yang:
A True Random-Number Encryption Method. IMIS 2013: 654-659 - 2011
- [j8]Yih-Ching Su, Ming-Haw Jing, Yaotsu Chang, Jian-Hong Chen, Zih-Heng Chen:
A fast parallel (23, 12, 7) QR decoder based on syndrome-weight determination. Comput. Electr. Eng. 37(1): 24-29 (2011) - [j7]Yong-Tao Wang, Ke-Fei Chen, Jian-Hong Chen:
Attribute-Based Traitor Tracing. J. Inf. Sci. Eng. 27(1): 181-195 (2011) - [j6]Jian-Hong Chen, Yong-Tao Wang, Ke-Fei Chen:
Attribute-Based Key-Insulated Encryption. J. Inf. Sci. Eng. 27(2): 437-449 (2011) - [j5]Jung-Shian Li, Ching-Fang Yang, Jian-Hong Chen:
Star-block design in two-level survivable optical networks. IEEE/ACM Trans. Netw. 19(2): 526-539 (2011) - 2010
- [j4]Chong-Dao Lee, Yaotsu Chang, Ho-Hsuan Chang, Jian-Hong Chen:
Unusual general error locator polynomial for the (23, 12, 7) golay code. IEEE Commun. Lett. 14(4): 339-341 (2010) - [j3]Ming-Haw Jing, Yaotsu Chang, Chong-Dao Lee, Jian-Hong Chen, Zih-Heng Chen:
A Result on Zetterberg Codes. IEEE Commun. Lett. 14(7): 662-663 (2010) - [j2]Chong-Dao Lee, Yaotsu Chang, Ming-Haw Jing, Jian-Hong Chen:
Decoding Binary Cyclic Codes with Irreducible Generator Polynomials up to Actual Minimum Distance. IEEE Commun. Lett. 14(11): 1050-1052 (2010)
2000 – 2009
- 2009
- [c8]Chuin-Mu Wang, Ming-Ju Wu, Jian-Hong Chen, Cheng-Yi Yu:
Extension Neural Network Approach to Classification of Brain MRI. IIH-MSP 2009: 515-517 - 2008
- [c7]Ming-Haw Jing, Yaotsu Chang, Jian-Hong Chen, Zih-Heng Chen, Jia-Hao Chang:
A new decoder for binary quadratic residue code with irreducible generator polynomial. APCCAS 2008: 1518-1521 - [c6]Ming-Haw Jing, Zih-Heng Chen, Jian-Hong Chen, Cheng-Yi Wu:
Design of simple and high speed VLSI core for the protection of mass storages. APCCAS 2008: 1660-1663 - [c5]Jian-Hong Chen, Jian-Hung Chen:
Multi-objective memetic approach for flexible process sequencing problems. GECCO (Companion) 2008: 2123-2128 - 2007
- [j1]Ming-Haw Jing, Zih-Heng Chen, Jian-Hong Chen, Yan-Haw Chen:
Reconfigurable system for high-speed and diversified AES using FPGA. Microprocess. Microsystems 31(2): 94-102 (2007) - [c4]Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang:
The Secure DAES Design for Embedded System Application. EUC Workshops 2007: 617-626 - 2006
- [c3]Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yan-Haw Chen:
Low Complexity Architecture for Multiplicative Inversion in GF(2m). APCCAS 2006: 1492-1495 - [c2]Zih-Heng Chen, Ming-Haw Jing, Jian-Hong Chen, Yaotsu Chang:
New viewpoint of bit-serial/parallel normal basis multipliers using irreducible all-one polynomial. ISCAS 2006
1990 – 1999
- 1998
- [c1]Jian-Hong Chen, Eng-Fong Huang, Jung-Kuei Chen:
應用於電子商場營業類別查詢之語音辨識系統 (A speech recognition system for electronic shopping mall business category inquiries) [In Chinese]. ROCLING (2) 1998: 163-172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint