default search action
Frank Y. Shih
Person information
- affiliation: New Jersey Institute of Technology, Newark, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j127]Chun-Ming Tsai, Frank Y. Shih:
A Novel Multi-Data-Augmentation and Multi-Deep-Learning Framework for Counting Small Vehicles and Crowds. Int. J. Pattern Recognit. Artif. Intell. 38(2): 2452001:1-2452001:24 (2024) - [j126]Yi-Ta Wu, Frank Y. Shih, Cheng-Long Wang, Kuang-Ting Hsiao, You-Cheng Liu, Fu-Chieh Chang, En-Da Yu:
The Deep Hybrid Neural Network and an Application on Polyp Detection. Int. J. Pattern Recognit. Artif. Intell. 38(4): 2452009:1-2452009:21 (2024) - [j125]Sohrab Namazi Nia, Frank Y. Shih:
Medical X-Ray Image Enhancement Using Global Contrast-Limited Adaptive Histogram Equalization. Int. J. Pattern Recognit. Artif. Intell. 38(12): 2457010:1-2457010:17 (2024) - [i6]Sohrab Namazi Nia, Frank Y. Shih:
Medical X-Ray Image Enhancement Using Global Contrast-Limited Adaptive Histogram Equalization. CoRR abs/2411.01373 (2024) - 2023
- [j124]Yucong Shen, Frank Y. Shih, Hao Chen:
Drug Toxicity Prediction by Machine Learning Approaches. Int. J. Pattern Recognit. Artif. Intell. 37(10): 2351013:1-2351013:14 (2023) - [j123]Al Shahriar Rubel, Frank Y. Shih:
FPA-Net: Frequency-Guided Position-Based Attention Network for Land Cover Image Segmentation. Int. J. Pattern Recognit. Artif. Intell. 37(11): 2354015:1-2354015:20 (2023) - 2022
- [j122]Yanan Yang, Frank Y. Shih, Usman Roshan:
Defense Against Adversarial Attacks Based on Stochastic Descent Sign Activation Networks on Medical Images. Int. J. Pattern Recognit. Artif. Intell. 36(3): 2254005:1-2254005:17 (2022) - [j121]Chun-Ming Tsai, Frank Y. Shih:
An Efficient Detection and Recognition System for Multiple Motorcycle License Plates Based on Decision Tree. Int. J. Pattern Recognit. Artif. Intell. 36(5): 2250022:1-2250022:23 (2022) - [j120]Yanan Yang, Frank Y. Shih, I-Cheng Chang:
Adaptive Image Reconstruction for Defense Against Adversarial Attacks. Int. J. Pattern Recognit. Artif. Intell. 36(12): 2252022:1-2252022:16 (2022) - [j119]Yucong Shen, Frank Y. Shih, Xin Zhong, I-Cheng Chang:
Deep Morphological Neural Networks. Int. J. Pattern Recognit. Artif. Intell. 36(12): 2252023:1-2252023:21 (2022) - [c26]Nishan Khatri, Agnibh Dasgupta, Yucong Shen, Xin Zhong, Frank Y. Shih:
Perspective Transformation Layer. CSCI 2022: 1395-1401 - [c25]Chun-Ming Tsai, Frank Y. Shih, Jun-Wei Hsieh:
Real-Time Vehicle Counting by Deep-Learning Networks. ICMLC 2022: 175-181 - [i5]Nishan Khatri, Agnibh Dasgupta, Yucong Shen, Xin Zhong, Frank Y. Shih:
Perspective Transformation Layer. CoRR abs/2201.05706 (2022) - 2021
- [j118]Xin Zhong, Frank Y. Shih:
Automatic Image Pixel Clustering based on Mussels Wandering Optimization. Int. J. Pattern Recognit. Artif. Intell. 35(2): 2154005:1-2154005:17 (2021) - [j117]Shaobo Liu, Xin Zhong, Frank Y. Shih:
Joint Learning for Pneumonia Classification and Segmentation on Medical Images. Int. J. Pattern Recognit. Artif. Intell. 35(5): 2157003:1-2157003:19 (2021) - [j116]Patrick Wang, Xiaoyi Jiang, Frank Y. Shih, Terence Sim:
35th Anniversary of IJPRAI. Int. J. Pattern Recognit. Artif. Intell. 35(9): 2101002:1-2101002:4 (2021) - [j115]Shaobo Liu, Frank Y. Shih, Xin Zhong:
Classification of Chest X-Ray Images Using Novel Adaptive Morphological Neural Networks. Int. J. Pattern Recognit. Artif. Intell. 35(10): 2157006:1-2157006:14 (2021) - [j114]Sathyanarayanan Somasunder, Frank Y. Shih:
Land Cover Image Segmentation Based on Individual Class Binary Masks. Int. J. Pattern Recognit. Artif. Intell. 35(16): 2154034:1-2154034:14 (2021) - [j113]Xin Zhong, Pei-Chi Huang, Spyridon Mastorakis, Frank Y. Shih:
An Automated and Robust Image Watermarking Scheme Based on Deep Neural Networks. IEEE Trans. Multim. 23: 1951-1961 (2021) - [c24]Firas Gerges, Frank Y. Shih, Danielle Azar:
Automated Diagnosis of Acne and Rosacea using Convolution Neural Networks. AIPR 2021: 607-613 - 2020
- [j112]Ming Fang, Lilian Kuo, Frank Y. Shih, Stephen Taylor:
Sector categorization using gradient boosted trees trained on fundamental firm data. Algorithmic Finance 8(3-4): 91-99 (2020) - [j111]Frank Y. Shih, Himanshu Patel:
Deep Learning Classification on Optical Coherence Tomography Retina Images. Int. J. Pattern Recognit. Artif. Intell. 34(8): 2052002:1-2052002:20 (2020) - [j110]Shaobo Liu, Frank Y. Shih, Gareth Russell, Kimberly Russell, Hai Phan:
Classification of Ecological Data by Deep Learning. Int. J. Pattern Recognit. Artif. Intell. 34(13): 2052010:1-2052010:20 (2020) - [c23]Zhibo Yang, Yanan Yang, Yunzhe Xue, Frank Y. Shih, Justin W. Ady, Usman Roshan:
Accurate and adversarially robust classification of medical images and ECG time-series with gradient-free trained sign activation neural networks. BIBM 2020: 2456-2460 - [c22]Yanan Yang, Fadi G. Farhat, Yunzhe Xue, Frank Y. Shih, Usman Roshan:
Classification of Histopathology Images with Random Depthwise Convolutional Neural Networks. ICBRA 2020: 22-27 - [i4]Xin Zhong, Pei-Chi Huang, Spyridon Mastorakis, Frank Y. Shih:
An Automated and Robust Image Watermarking Scheme Based on Deep Neural Networks. CoRR abs/2007.02460 (2020)
2010 – 2019
- 2019
- [j109]Xin Zhong, Frank Y. Shih:
A High-Capacity Reversible Watermarking Scheme Based on Shape Decomposition for Medical Images. Int. J. Pattern Recognit. Artif. Intell. 33(1): 1950001:1-1950001:14 (2019) - [j108]Xin Zhong, Frank Y. Shih:
An Efficient Saliency Detection Model Based on Wavelet Generalized Lifting. Int. J. Pattern Recognit. Artif. Intell. 33(2): 1954006:1-1954006:18 (2019) - [j107]Jinwei Wang, Ting Li, Frank Y. Shih:
Discrimination of Computer Generated and Photographic Images Based on CQWT Quaternion Markov Features. Int. J. Pattern Recognit. Artif. Intell. 33(2): 1954007:1-1954007:13 (2019) - [j106]Frank Y. Shih, Yucong Shen, Xin Zhong:
Development of Deep Learning Framework for Mathematical Morphology. Int. J. Pattern Recognit. Artif. Intell. 33(6): 1954024:1-1954024:16 (2019) - [j105]Xin Zhong, Frank Y. Shih:
Robust Multibit Image Watermarking Based on Contrast Modulation and Affine Rectification. Int. J. Pattern Recognit. Artif. Intell. 33(14): 1954036:1-1954036:18 (2019) - [c21]Yunzhe Xue, Yanan Yang, Fadi G. Farhat, Frank Y. Shih, Olga Boukrina, A. M. Barrett, Jeffrey R. Binder, William W. Graves, Usman W. Roshan:
Brain Tumor Classification with Tumor Segmentations and a Dual Path Residual Convolutional Neural Network from MRI and Pathology Images. BrainLes@MICCAI (2) 2019: 360-367 - [i3]Xin Zhong, Frank Y. Shih:
A Robust Image Watermarking System Based on Deep Neural Networks. CoRR abs/1908.11331 (2019) - [i2]Yucong Shen, Xin Zhong, Frank Y. Shih:
Deep Morphological Neural Networks. CoRR abs/1909.01532 (2019) - [i1]Xin Zhong, Frank Y. Shih, Xiwang Guo:
Automatic Image Pixel Clustering based on Mussels Wandering Optimiz. CoRR abs/1909.03380 (2019) - 2018
- [j104]Wenyin Zhang, Frank Y. Shih, Shunbo Hu, Muwei Jian:
A Visual Secret Sharing Scheme Based on Improved Local Binary Pattern. Int. J. Pattern Recognit. Artif. Intell. 32(6): 1850017:1-1850017:19 (2018) - [j103]Frank Y. Shih, Xin Zhong, I-Cheng Chang, Shin'ichi Satoh:
An adjustable-purpose image watermarking technique by particle swarm optimization. Multim. Tools Appl. 77(2): 1623-1642 (2018) - [r3]Frank Y. Shih:
Image Segmentation. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j102]Miao Liao, Yu-qian Zhao, Xiyao Liu, Ye-zhan Zeng, Beiji Zou, Xiaofeng Wang, Frank Y. Shih:
Automatic liver segmentation from abdominal CT volumes using graph cuts and border marching. Comput. Methods Programs Biomed. 143: 1-12 (2017) - [j101]Frank Y. Shih, Xin Zhong:
Achieving Image Watermarking Robustness by Geometric Rectification. Int. J. Pattern Recognit. Artif. Intell. 31(4): 1754007:1-1754007:16 (2017) - [j100]Chun-Ming Tsai, Frank Y. Shih:
An Efficient Image Stitching Method for Heterogeneous Car Videos Based on Bounding Boxes of Features. Int. J. Pattern Recognit. Artif. Intell. 31(5): 1755008:1-1755008:17 (2017) - [j99]Frank Y. Shih, Xin Zhong:
Automated Counting and Tracking of Vehicles. Int. J. Pattern Recognit. Artif. Intell. 31(12): 1750038:1-1750038:12 (2017) - 2016
- [j98]Frank Y. Shih, Xin Zhong:
Intelligent Watermarking for High-Capacity Low-Distortion Data Embedding. Int. J. Pattern Recognit. Artif. Intell. 30(5): 1654003:1-1654003:17 (2016) - [j97]Frank Y. Shih, Xin Zhong:
High-capacity multiple regions of interest watermarking for medical images. Inf. Sci. 367-368: 648-659 (2016) - [j96]Xiaofang Wang, Boyang Gao, Simon Masnou, Liming Chen, Isaac Theurkauff, Cécile Cottin-Bizonne, Yuqian Zhao, Frank Y. Shih:
Active colloids segmentation and tracking. Pattern Recognit. 60: 177-188 (2016) - [c20]Chun-Ming Tsai, Jun-Wei Hsieh, Frank Y. Shih:
Motion-based vehicle detection in Hsuehshan Tunnel. ICACI 2016: 385-389 - 2015
- [j95]Frank Y. Shih, Jason K. Jackson:
Copy-Cover Image Forgery Detection in Parallel Processing. Int. J. Pattern Recognit. Artif. Intell. 29(8): 1554004:1-1554004:14 (2015) - 2014
- [j94]Walter S. Wehner Jr., Frank Y. Shih:
A Self-Directed Method for Image Segmentation using a modified Top-Down Region Dividing Approach. Int. J. Pattern Recognit. Artif. Intell. 28(6) (2014) - [j93]John Marin, Frank Y. Shih:
Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification. J. Inf. Hiding Multim. Signal Process. 5(3): 451-460 (2014) - [j92]Yu Qian Zhao, Xiao-Hong Wang, Xiaofang Wang, Frank Y. Shih:
Retinal vessels segmentation based on level set and region growing. Pattern Recognit. 47(7): 2437-2446 (2014) - 2013
- [j91]Gavin Lynch, Frank Y. Shih, Hong-Yuan Mark Liao:
An efficient expanding block algorithm for image copy-move forgery detection. Inf. Sci. 239: 253-265 (2013) - 2012
- [j90]Xiang Hua Li, Yu Qian Zhao, Miao Liao, Frank Y. Shih, Yun Q. Shi:
Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP J. Adv. Signal Process. 2012: 190 (2012) - [j89]Yu Qian Zhao, Xiaofang Wang, Frank Y. Shih, Gang Yu:
A Level-Set Method Based on Global and Local Regions for Image Segmentation. Int. J. Pattern Recognit. Artif. Intell. 26(1) (2012) - [c19]Chandralekha De, Frank Y. Shih:
Improved image inpainting using maximum value edge detector. SSIAI 2012: 77-80 - 2011
- [j88]Shiguo Lian, Frank Y. Shih:
A Special Section of Intelligent Automation and Soft computing - Soft Computing For Copyright Protection. Intell. Autom. Soft Comput. 17(2): 189-190 (2011) - [j87]Venkata Gopal Edupuganti, Frank Y. Shih, I-Cheng Chang:
An Efficient Block-Based Fragile Watermarking System for Tamper Localization and Recovery. Intell. Autom. Soft Comput. 17(2): 257-267 (2011) - [j86]Frank Y. Shih, Alexander Sheppard:
An Improved Feature Vocabulary Based Method for Image Categorization. Int. J. Pattern Recognit. Artif. Intell. 25(3): 415-429 (2011) - [j85]Aleksey Koval, Frank Y. Shih, Boris S. Verkhovsky:
A Pseudo-Random Pixel Rearrangement Algorithm Based on Gaussian Integers for Image Watermarking. J. Inf. Hiding Multim. Signal Process. 2(1) (2011) - [j84]Gang Fu, Frank Y. Shih, Haimin Wang:
A kernel-based parametric method for conditional density estimation. Pattern Recognit. 44(2): 284-294 (2011) - [c18]Venkata Gopal Edupuganti, Frank Y. Shih, Suryaprakash Kompalli:
Categorization of Camera Captured Documents Based on Logo Identification. CAIP (2) 2011: 130-137 - 2010
- [c17]Yu Qian Zhao, Frank Y. Shih, Yun Q. Shi:
Passive Detection of Paint-Doctored JPEG Images. IWDW 2010: 1-11
2000 – 2009
- 2009
- [j83]Frank Y. Shih, Venkata Gopal Edupuganti:
A differential evolution based algorithm for breaking the visual steganalytic system. Soft Comput. 13(4): 345-353 (2009) - [j82]Tomas Bober, Frank Y. Shih:
Image Processing-Based Methodology for Optimizing Automotive Ignition Timing. IEEE Trans. Veh. Technol. 58(1): 85-92 (2009) - [r2]Shouxian Cheng, Frank Y. Shih:
Feature Reduction for Support Vector Machines. Encyclopedia of Data Warehousing and Mining 2009: 870-877 - [r1]Frank Y. Shih:
Image Segmentation. Encyclopedia of Database Systems 2009: 1389-1395 - 2008
- [j81]Frank Y. Shih, Gang Fu:
Decision Combination of Multiple Classifiers. Int. J. Pattern Recognit. Artif. Intell. 22(2): 323-334 (2008) - [j80]Frank Y. Shih, Yan-Yu Fu:
Approximate Image Quality Measure in Low-Dimensional Domain Based on Random Projection. Int. J. Pattern Recognit. Artif. Intell. 22(2): 335-345 (2008) - [j79]Frank Y. Shih, Chao-Fa Chuang, Patrick S. P. Wang:
Performance Comparisons of Facial Expression Recognition in Jaffe Database. Int. J. Pattern Recognit. Artif. Intell. 22(3): 445-459 (2008) - [j78]Frank Y. Shih, Shouxian Cheng, Chao-Fa Chuang, Patrick S. P. Wang:
Extracting Faces and Facial Features from Color Images. Int. J. Pattern Recognit. Artif. Intell. 22(3): 515-534 (2008) - [j77]Frank Y. Shih, Kai Zhang:
A distance-based separator representation for pattern classification. Image Vis. Comput. 26(5): 667-672 (2008) - [j76]Yi-Ta Wu, Frank Y. Shih, Jiazheng Shi, Yih-Tyng Wu:
A top-down region dividing approach for image segmentation. Pattern Recognit. 41(6): 1948-1960 (2008) - [j75]Gang Fu, Frank Y. Shih, Haimin Wang:
Automatic Detection of Magnetic Flux Emergings in the Solar Atmosphere From Full-Disk Magnetogram Sequences. IEEE Trans. Image Process. 17(11): 2174-2185 (2008) - [c16]Frank Y. Shih, Yao-Chung Chang, Min-Chun Peng, Yu-Shan Lin:
Cross layer design for RFID/EPC network. Mobility Conference 2008: 87 - 2007
- [j74]Frank Y. Shih, Kai Zhang:
Locating object contours in complex background using improved snakes. Comput. Vis. Image Underst. 105(2): 93-98 (2007) - [j73]Sheryl Brahnam, Chao-Fa Chuang, Randall S. Sexton, Frank Y. Shih:
Machine assessment of neonatal facial expressions of acute pain. Decis. Support Syst. 43(4): 1242-1254 (2007) - [j72]Wai-Tak Wong, Frank Y. Shih, Te-Feng Su:
Shape-Based Image Retrieval Using Two-Level Similarity Measures. Int. J. Pattern Recognit. Artif. Intell. 21(6): 995-1015 (2007) - [j71]Yu Wang, Marc Q. Ma, Kai Zhang, Frank Y. Shih:
A hierarchical refinement algorithm for fully automatic gridding in spotted DNA microarray image processing. Inf. Sci. 177(4): 1123-1135 (2007) - [j70]Wai-Tak Wong, Frank Y. Shih, Jung Liu:
Shape-based image retrieval using support vector machines, Fourier descriptors and self-organizing maps. Inf. Sci. 177(8): 1878-1891 (2007) - [j69]Frank Y. Shih, Yi-Ta Wu, Chao-Fa Chuang, Jiann-Liang Chen, Hsi-Feng Lu, Yao-Chung Chang:
An Intelligent Sensor Network for Object Detection, Classification and Recognition. J. Inf. Sci. Eng. 23(6): 1955-1969 (2007) - [j68]Shouxian Cheng, Frank Y. Shih:
An improved incremental training algorithm for support vector machines using active query. Pattern Recognit. 40(3): 964-971 (2007) - [j67]Yi-Ta Wu, Frank Y. Shih:
Digital watermarking based on chaotic map and reference register. Pattern Recognit. 40(12): 3753-3763 (2007) - [j66]Gang Fu, Frank Y. Shih, Haimin Wang:
Automatic Detection of Prominence Eruption Using Consecutive Solar Images. IEEE Trans. Circuits Syst. Video Technol. 17(1): 79-85 (2007) - [j65]Marc Q. Ma, Kai Zhang, Hui-Yun Wang, Frank Y. Shih:
ELB-Q: A New Method for Improving the Robustness in DNA Microarray Image Quantification. IEEE Trans. Inf. Technol. Biomed. 11(5): 574-582 (2007) - 2006
- [j64]Sheryl Brahnam, Chao-Fa Chuang, Frank Y. Shih, Melinda R. Slack:
Machine recognition and representation of neonatal facial displays of acute pain. Artif. Intell. Medicine 36(3): 211-222 (2006) - [j63]Wai-Tak Wong, Frank Y. Shih, Te-Feng Su:
Thinning algorithms based on quadtree and octree representations. Inf. Sci. 176(10): 1379-1394 (2006) - [j62]Frank Y. Shih, Tobias Klotz, Werner Brockmann:
A system for rotational velocity computation from image sequences. Image Vis. Comput. 24(4): 357-362 (2006) - [j61]Chao-Fa Chuang, Frank Yeong-Chyang Shih:
Recognizing facial action units using independent component analysis and support vector machine. Pattern Recognit. 39(9): 1795-1798 (2006) - [j60]Yi-Ta Wu, Frank Y. Shih:
Genetic algorithm based methodology for breaking the steganalytic systems. IEEE Trans. Syst. Man Cybern. Part B 36(1): 24-31 (2006) - [j59]Han-Chieh Chao, Lorna Uden, Frank Y. Shih:
Special issue: mobile IP. Wirel. Commun. Mob. Comput. 6: 543-546 (2006) - 2005
- [j58]Frank Y. Shih, Yi-Ta Wu:
Decomposition of binary morphological structuring elements based on genetic algorithms. Comput. Vis. Image Underst. 99(2): 291-302 (2005) - [j57]Frank Y. Shih, Kai Zhang:
Support vector machine networks for multi-class classification. Int. J. Pattern Recognit. Artif. Intell. 19(6): 775-786 (2005) - [j56]Frank Y. Shih, Camel Fu, Kai Zhang:
Multi-view face identification and pose estimation using B-spline interpolation. Inf. Sci. 169(3-4): 189-204 (2005) - [j55]Frank Y. Shih, Vijayalakshmi Gaddipati:
Geometric modeling and representation based on sweep mathematical morphology. Inf. Sci. 171(1-3): 213-231 (2005) - [j54]Frank Yeong-Chyang Shih, Yi-Ta Wu:
Robust watermarking and compression for medical images based on genetic algorithms. Inf. Sci. 175(3): 200-216 (2005) - [j53]Frank Y. Shih, Shouxian Cheng:
Automatic seeded region growing for color image segmentation. Image Vis. Comput. 23(10): 877-886 (2005) - [j52]Frank Y. Shih, Yi-Ta Wu:
Enhancement of image watermark retrieval based on genetic algorithms. J. Vis. Commun. Image Represent. 16(2): 115-133 (2005) - [j51]Frank Yeong-Chyang Shih, Shouxian Cheng:
Improved feature reduction in input and feature spaces. Pattern Recognit. 38(5): 651-659 (2005) - [j50]Frank Yeong-Chyang Shih, Yi-Ta Wu:
Decomposition of arbitrary gray-scale morphological structuring elements. Pattern Recognit. 38(12): 2323-2332 (2005) - [j49]Frank Yeong-Chyang Shih, Chao-Fa Chuang, Vijayalakshmi Gaddipati:
A modified regulated morphological corner detector. Pattern Recognit. Lett. 26(7): 931-937 (2005) - [c15]Frank Y. Shih, Yan-Yu Fu:
Color correction for color distorted images. Circuits, Signals, and Systems 2005: 206-211 - [c14]Sheryl Brahnam, Chao-Fa Chuang, Frank Y. Shih, Melinda R. Slack:
SVM Classification of Neonatal Facial Images of Pain. WILF 2005: 121-128 - 2004
- [j48]Frank Y. Shih, Yi-Ta Wu:
Fast Euclidean distance transformation in two scans using a 3 × 3 neighborhood. Comput. Vis. Image Underst. 93(2): 195-205 (2004) - [j47]Frank Y. Shih, Kai Zhang:
Efficient Contour Detection Based On Improved Snake Model. Int. J. Pattern Recognit. Artif. Intell. 18(2): 197-209 (2004) - [j46]Frank Y. Shih, Kai Zhang:
Inter-Frame Interpolation By Snake Model And Greedy Algorithm. Int. J. Pattern Recognit. Artif. Intell. 18(6): 975-985 (2004) - [j45]Frank Y. Shih, Kai Zhang, Yan-Yu Fu:
A Hybrid Two-Phase Algorithm For Face Recognition. Int. J. Pattern Recognit. Artif. Intell. 18(8): 1423-1435 (2004) - [j44]Frank Y. Shih, Yi-Ta Wu, Brian L. C. Chen:
Forward And Backward Chain-Code Representation For Motion Planning Of Cars. Int. J. Pattern Recognit. Artif. Intell. 18(8): 1437-1451 (2004) - [j43]Frank Y. Shih, Chao-Fa Chuang:
Automatic extraction of head and face boundaries and facial features. Inf. Sci. 158: 117-130 (2004) - [j42]Frank Y. Shih, Shouxian Cheng:
Adaptive mathematical morphology for edge linking. Inf. Sci. 167(1-4): 9-21 (2004) - [j41]Frank Y. Shih, Yi-Ta Wu:
Three-dimensional Euclidean distance transformation and its application to shortest path planning. Pattern Recognit. 37(1): 79-92 (2004) - [j40]Yi-Ta Wu, Frank Yeong-Chyang Shih:
An adjusted-purpose digital watermarking technique. Pattern Recognit. 37(12): 2349-2359 (2004) - [j39]Frank Yeong-Chyang Shih, Yi-Ta Wu:
The efficient algorithms for achieving Euclidean distance transformation. IEEE Trans. Image Process. 13(8): 1078-1091 (2004) - [c13]Ming Qu, Frank Y. Shih, Ju Jing, Haimin Wang:
Solar flare tracking using image processing techniques. ICME 2004: 347-350 - [c12]Frank Y. Shih, Yi-Ta Wu:
A novel fragile watermarking technique. ICME 2004: 875-878 - [c11]Ming Qu, Frank Y. Shih, Ju Jing, Haimin Wang, David Rees:
Automatic Solar Flare Tracking. KES 2004: 419-425 - 2003
- [j38]Frank Y. Shih, Scott Y. T. Wu:
Combinational image watermarking in the spatial and frequency domains. Pattern Recognit. 36(4): 969-975 (2003) - [j37]Frank Y. Shih, Vijayalakshmi Gaddipati:
General sweep mathematical morphology. Pattern Recognit. 36(7): 1489-1500 (2003) - 2001
- [j36]Frank Yeong-Chyang Shih, Artur J. Kowalski:
Computing unique three-dimensional object aspects representation. Inf. Sci. 132(1-4): 13-22 (2001) - [j35]Frank Y. Shih, Wai-Tak Wong:
An adaptive algorithm for conversion from quadtree to chain codes. Pattern Recognit. 34(3): 631-639 (2001) - 2000
- [j34]Eduardo Morales, Frank Y. Shih:
Wavelet coefficients clustering using morphological operations and pruned quadtrees. Pattern Recognit. 33(10): 1611-1620 (2000)
1990 – 1999
- 1999
- [j33]Frank Y. Shih, Wai-Tak Wong:
A one-pass algorithm for local symmetry of contours from chain codes. Pattern Recognit. 32(7): 1203-1210 (1999) - 1998
- [j32]Soo-Chang Pei, Chin-Lun Lai, Frank Y. Shih:
A morphological approach to shortest path planning for rotating objects. Pattern Recognit. 31(8): 1127-1138 (1998) - [j31]Frank Y. Shih, Jenny J. Liu:
Size-invariant four-scan Euclidean distance transformation. Pattern Recognit. 31(11): 1761-1766 (1998) - 1997
- [j30]Soo-Chang Pei, Chin-Lun Lai, Frank Y. Shih:
An Efficient Class of Alternating Sequential Filters in Morphology. CVGIP Graph. Model. Image Process. 59(2): 109-116 (1997) - 1996
- [j29]Jenlong Moh, Frank Yeong-Chyang Shih:
Design of One-Pass Training Algorithms for Variant Morphological Operations. Inf. Sci. 94(1-4): 303-314 (1996) - [j28]Shy-Shyan Chen, Frank Yeong-Chyang Shih:
Skeletonization for fuzzy degraded character images. IEEE Trans. Image Process. 5(10): 1481-1485 (1996) - [j27]Frank Y. Shih, Shy-Shyan Chen:
Adaptive document block segmentation and classification. IEEE Trans. Syst. Man Cybern. Part B 26(5): 797-802 (1996) - [j26]Frank Y. Shih, Christopher C. Pu:
Reply to "Comments on 'Analysis of the properties of soft morphological filtering using threshold decomposition' ". IEEE Trans. Signal Process. 44(9): 2350-2352 (1996) - 1995
- [j25]Christopher C. Pu, Frank Y. Shih:
Threshold Decomposition of Gray-Scale Soft Morphology into Binary Soft Morphology. CVGIP Graph. Model. Image Process. 57(6): 522-526 (1995) - [j24]Frank Y. Shih, Christopher C. Pu:
A skeletonization algorithm by maxima tracking on Euclidean distance transform. Pattern Recognit. 28(3): 331-341 (1995) - [j23]Jenlong Moh, Frank Yeong-Chyang Shih:
A general purpose model for image operations based on multilayer perceptrons. Pattern Recognit. 28(7): 1083-1090 (1995) - [j22]Frank Yeong-Chyang Shih, Chung Ta King, Christopher C. Pu:
Pipeline architectures for recursive morphological operations. IEEE Trans. Image Process. 4(1): 11-18 (1995) - [j21]Frank Yeong-Chyang Shih, Padmaja Puttagunta:
Recursive soft morphological filters. IEEE Trans. Image Process. 5(7): 1027-1032 (1995) - [j20]Frank Y. Shih, Wai-Tak Wong:
A new safe-point thinning algorithm based on the mid-crack code tracing. IEEE Trans. Syst. Man Cybern. 25(2): 370-378 (1995) - [j19]Shy-Shyan Chen, Frank Y. Shih, Peter A. Ng:
Fuzzy typographical analysis for character preclassification. IEEE Trans. Syst. Man Cybern. 25(10): 1408-1413 (1995) - [j18]Frank Y. Shih, Christopher C. Pu:
Analysis of the properties of soft morphological filtering using threshold decomposition. IEEE Trans. Signal Process. 43(2): 539-544 (1995) - 1994
- [j17]Denis Blackmore, Ming C. Leu, Frank Yeong-Chyang Shih:
Analysis and modelling of deformed swept volumes. Comput. Aided Des. 26(4): 315-326 (1994) - [j16]Frank Y. Shih, Wai-Tak Wong:
An Improved Fast Algorithm for the Restoration of Images Based on Chain Codes Description. CVGIP Graph. Model. Image Process. 56(4): 348-351 (1994) - [j15]J. Thomas Eck, Frank Yeong-Chyang Shih:
An Automatic Text-Free Speaker Recognition System Based on an Enhanced Art 2 Neural Architecture. Inf. Sci. 76(3-4): 233-253 (1994) - [j14]Frank Y. Shih, Wai-Tak Wong:
Fully parallel thinning with tolerance to boundary noise. Pattern Recognit. 27(12): 1677-1695 (1994) - [j13]Dennis E. Shasha, Jason Tsong-Li Wang, Kaizhong Zhang, Frank Y. Shih:
Exact and approximate algorithms for unordered tree matching. IEEE Trans. Syst. Man Cybern. 24(4): 668-678 (1994) - 1993
- [j12]Frank Y. Shih, Pingchang Yeh:
Model-based partial shape recognition using contour curvature and affine transformation. Inf. Sci. 67(3): 229-243 (1993) - [j11]Frank Y. Shih, Wai-Tak Wong:
Reconstruction of Binary and Gray-Scale Images from Mid-crack Code Descriptions. J. Vis. Commun. Image Represent. 4(2): 121-129 (1993) - [c10]Frank Y. Shih, Chyuan-Huei T. Yang:
On solving exact Euclidean distance transformation with invariance to object size. CVPR 1993: 607-608 - [c9]Frank Y. Shih, Christopher C. Pu:
Threshold decomposition of soft morphological filters. CVPR 1993: 672-673 - 1992
- [j10]Frank Y. Shih, Hong Wu:
Optimization on euclidean distance transformation using grayscale morphology. J. Vis. Commun. Image Represent. 3(2): 104-114 (1992) - [j9]Frank Y. Shih, Wai-Tak Wong:
A new single-pass algorithm for extracting the mid-crack codes of multiple regions. J. Vis. Commun. Image Represent. 3(3): 217-224 (1992) - [j8]Frank Yeong-Chyang Shih, Jenlong Moh:
Implementing morphological operations using programmable neural networks. Pattern Recognit. 25(1): 89-99 (1992) - [j7]Frank Yeong-Chyang Shih, Jenlong Moh, Fu-Chun Chang:
A new art-based neural architecture for pattern classification and image enhancement without prior knowledge. Pattern Recognit. 25(5): 533-542 (1992) - [j6]Frank Y. Shih, Christopher C. Pu:
Morphological shape description using geometric spectrum on multidimensional binary images. Pattern Recognit. 25(9): 921-927 (1992) - [j5]Frank Yeong-Chyang Shih, Hong Wu:
Decomposition of geometric-shaped structuring elements using morphological transformations on binary images. Pattern Recognit. 25(10): 1097-1106 (1992) - [j4]Frank Yeong-Chyang Shih, Owen Robert Mitchell:
A mathematical morphology approach to Euclidean distance transformation. IEEE Trans. Image Process. 1(2): 197-204 (1992) - [c8]Frank Y. Shih, Wai-Tak Wong:
Restoration of binary and gray-scale images using the contour mid-crack codes description. ICPR (3) 1992: 725-728 - [c7]Dennis E. Shasha, Jason Tsong-Li Wang, Kaizhong Zhang, Frank Yeong-Chyang Shih:
Pattern Matching in Unordered Trees. ICTAI 1992: 352-361 - 1991
- [j3]Frank Y. Shih:
Object representation and recognition using mathematical morphology model. J. Syst. Integr. 1(2): 235-256 (1991) - [j2]Frank Yeong-Chyang Shih, Owen Robert Mitchell:
Decomposition of gray-scale morphological structuring elements. Pattern Recognit. 24(3): 195-203 (1991) - [c6]Frank Y. Shih, Christopher C. Pu:
A maxima-tracking method for skeletonization from Euclidean distance function. ICTAI 1991: 246-253 - 1990
- [c5]Frank Y. Shih, Christopher C. Pu:
Medial axis transformation with single-pixel and connectivity preservation using Euclidean distance computation. ICPR (1) 1990: 723-725 - [c4]Frank Y. Shih, Pingchang Yeh:
Model-Based Partial Shape Recognition Using Contour Curvature and Affine Transformation. ICSI 1990: 294-301 - [c3]Frank Y. Shih, Jenlong Moh, Henry Bourne:
A neural architecture applied to the enhancement of noisy binary images without prior knowledge. TAI 1990: 699-705
1980 – 1989
- 1989
- [j1]Frank Yeong-Chyang Shih, Owen Robert Mitchell:
Threshold Decomposition of Gray-Scale Morphology into Binary Morphology. IEEE Trans. Pattern Anal. Mach. Intell. 11(1): 31-42 (1989) - 1988
- [c2]Frank Y. Shih, Owen Robert Mitchell:
Automated fast recognition and location of arbitrarily shaped objects by image morphology. CVPR 1988: 774-779 - [c1]Frank Y. Shih, Owen Robert Mitchell:
Industrial parts recognition and inspection by image morphology. ICRA 1988: 1764-1766
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint