default search action
Eric Jui-Lin Lu
- > Home > Persons > Eric Jui-Lin Lu
Publications
- 2023
- [j28]Yi-Hui Chen, Eric Jui-Lin Lu, Jin-De Lin:
Enhancing SPARQL Query Performance With Recurrent Neural Networks. IEEE Access 11: 92209-92224 (2023) - 2022
- [j27]Yi-Hui Chen, Eric Jui-Lin Lu, Ying-Yen Lin:
Efficient SPARQL Queries Generator for Question Answering Systems. IEEE Access 10: 99850-99860 (2022) - 2021
- [j25]Yi-Hui Chen, Eric Jui-Lin Lu, Ting-An Ou:
Intelligent SPARQL Query Generation for Natural Language Processing Systems. IEEE Access 9: 158638-158650 (2021) - 2020
- [j24]Yi-Hui Chen, Eric Jui-Lin Lu, Ya-Wen Cheng:
Categorization of Multiple Documents Using Fuzzy Overlapping Clustering Based on Formal Concept Analysis. Int. J. Softw. Eng. Knowl. Eng. 30(5): 631-647 (2020) - [c13]Yi-Hui Chen, Eric Jui-Lin Lu, Sheng-Chia Lin:
Ontology-based Dynamic Semantic Annotation for Social Image Retrieval. MDM 2020: 337-341 - 2016
- [j22]Yi-Hui Chen, Eric Jui-Lin Lu, Yao-Tsan Chang, Shiuan-Yin Huang:
RDF-Chord: A hybrid PDMS for P2P systems. Comput. Stand. Interfaces 43: 53-67 (2016) - [c12]Yi-Hui Chen, Eric Jui-Lin Lu, Sheng-Jia Lin:
Exploiting Semantic Connectivity in Redefined Data Representation for Image Retrieval. BigMM 2016: 322-325 - 2014
- [j21]Yi-Hui Chen, Eric Jui-Lin Lu, Meng-Fang Tsai:
Finding keywords in blogs: Efficient keyword extraction in blog mining via user behaviors. Expert Syst. Appl. 41(2): 663-670 (2014) - [j20]Ing-Chau Chang, Eric Jui-Lin Lu, Shiuan-Yin Huang, Yi-Hui Chen:
An RDF-based P2P overlay network supporting range and wildcard queries. J. Netw. Comput. Appl. 46: 124-138 (2014) - [c11]Yi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu, Tsung Hau Lin:
Classify Blog Articles Using Queried Keywords. ICS 2014: 1062-1068 - [c10]Yi-Hui Chen, Eric Jui-Lin Lu, Hsueh-Chun Chien:
Automatically Categorizing Blog Articles Using Ontology Tree Built by DBpedia. ICS 2014: 1229-1238 - 2013
- [c9]Yi-Hui Chen, Eric Jui-Lin Lu, Chu-Fan Wang:
Privacy image protection using fine-grained mosaic technique. APSIPA 2013: 1-4 - [c8]Yi-Hui Chen, Eric Jui-Lin Lu, Tsai-Ying Wu:
A Blog Clustering Approach Based on Queried Keywords. ISBAST 2013: 1-9 - [c7]Pei-Yu Lin, Yi-Hui Chen, Eric Jui-Lin Lu, Ping-Jung Chen:
Secret Hiding Mechanism Using QR Barcode. SITIS 2013: 22-25 - 2012
- [c6]Chou Chen Yang, Shin-Hao Lo, Eric Jui-Lin Lu:
A Universal Lightweight Authentication Scheme Based on Delegation Mechanism in Heterogeneous Networks. UIC/ATC 2012: 963-966 - 2006
- [j16]Eric Jui-Lin Lu, Cheng-Jian Huang:
A Time-stamping Proxy Signature Scheme Using Time-stamping Service. Int. J. Netw. Secur. 2(1): 43-51 (2006) - [j15]Eric Jui-Lin Lu, Yi-Hui Chen:
Design of a delegable SCORM conformant learning management system. J. Comput. Assist. Learn. 22(6): 423-436 (2006) - 2005
- [j13]Eric Jui-Lin Lu, Min-Shiang Hwang, Cheng-Jian Huang:
A new proxy signature scheme with revocation. Appl. Math. Comput. 161(3): 799-806 (2005) - [j12]Eric Jui-Lin Lu, Yi-Hui Chen:
A flexible delegation processor for web-based information systems. Comput. Stand. Interfaces 27(3): 241-256 (2005) - [j11]Shihyu Chou, Eric Jui-Lin Lu, Yi-Hui Chen:
X-RDR: a role-based delegation processor for web-based information systems. ACM SIGOPS Oper. Syst. Rev. 39(1): 4-21 (2005) - 2003
- [j5]Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin:
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Trans. Knowl. Data Eng. 15(6): 1552-1560 (2003) - 2002
- [j4]Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin:
Adding timestamps to the secure electronic auction protocol. Data Knowl. Eng. 40(2): 155-162 (2002) - 2001
- [j2]Eric Jui-Lin Lu, Ru-Hui Tsai, Shihyu Chou:
An empirical study of XML/EDI. J. Syst. Softw. 58(3): 271-279 (2001) - 2000
- [j1]Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu:
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Informatica 11(2): 137-144 (2000)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-04 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint