-
C.S. Lin, “Using the integration of technical analysis and neural network model to forecast TSEC weighted index,” The Empirical Economics Letters, vol. 18, no. 5, pp. 551-561, 2019. (JEL and EconLit)
-
C. S. Lin and C. Y. Lin,“Constructing a network evaluation framework for improving the financial ecosystem in small-medium size firms,”Technological and Economic Development of Economy, vol. 24, no. 3, pp.893-913, 2018. (SSCI)
-
C.S. Lin and C. Y. Lin, “An empirical study of efficiency evaluation with dynamic strategy trajectory based on DEA algorithm and BCG model: A case study of securities industry,” Journal of Social Sciences, vol. 14, no. 1, pp.91-106, 2018. (EI: INSPEC)
-
C. C. Chen, H. Wang, and C. S. Lin,“An efficiency enhanced cluster expanding block algorithm for copy-move forgery detection,”Multimedia Tools and Applications, vol. 76, no. 24, pp. 26503-26522, 2017. (SCI)
-
C.S. Lin and C. Y. Lin, “An application of AHPTOPSIS model for evaluating the optimal individual of extending loan in SCF ecosystem,” American Journal of Economics, vol. 6, no. 6, pp. 334- 343, 2016.
-
C. S. Lin and J. J. Tsay,“Passive forgery detection using DCT coefficient analysis in JPEG compressed images,”Journal of Electronic Imaging, vol. 25, no. 3, 033010, 2016. (SCI)
-
C. S. Lin and J. J. Tsay,“Passive forgery detection for JPEG compressed image based on block size estimation and consistency analysis,”Applied Mathematics & Information Sciences, vol. 9, no. 2, pp. 1015-1028, 2015. (SCI)【Project Demo】
-
C. S. Lin and J. J. Tsay,“A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis,”Digital Investigation, vol. 11, no. 2, pp. 120-140, 2014. (SCI)【Project Demo】
-
C. C. Chen and C. S. Lin,“A GA-based nearly optimal image authentication approach,”International Journal of Innovative Computing, Information and Control, vol. 3, no. 3, pp. 631-640, 2007. (SCI)
-
C. C. Chen and C. S. Lin,“Toward a robust image authentication method surviving JPEG lossy compression,”Journal of Information Science and Engineering, vol. 23, no. 2, pp. 511-524, 2007. (SCI)
|