Artificial intelligence, Computer vision, Algorithm, Deep learning and Pixel are his primary areas of study. His Artificial intelligence research incorporates themes from Machine learning, Data mining, Secure multi-party computation and Secret sharing. His Computer vision research is multidisciplinary, relying on both Homomorphic secret sharing and Pattern recognition.
The various areas that he examines in his Algorithm study include Scheme and Collision. His study in Pixel is interdisciplinary in nature, drawing from both Time complexity, Hypercube, Distance transform, Binary image and Encryption. Shi-Jinn Horng combines subjects such as Image processing, Biclustering, Correlation clustering, Cluster analysis and Euclidean distance with his study of Parallel algorithm.
Shi-Jinn Horng mainly focuses on Algorithm, Parallel algorithm, Artificial intelligence, Parallel computing and Image processing. His Algorithm research focuses on subjects like Embedding, which are linked to Combinatorics and Hypercube. His Parallel algorithm research incorporates elements of Time complexity, Computational complexity theory, Distance transform, Binary image and Computation.
His work deals with themes such as Machine learning, Computer vision and Pattern recognition, which intersect with Artificial intelligence. His study in the field of Parallel processing is also linked to topics like Bus network. The concepts of his Image processing study are interwoven with issues in Pixel, Histogram and Euclidean distance.
His primary areas of study are Artificial intelligence, Data mining, Deep learning, Algorithm and Rough set. His Artificial intelligence research includes elements of Machine learning, Computer vision and Pattern recognition. His research integrates issues of Algorithm design, Missing data, Imputation and Weighted least squares method in his study of Data mining.
Shi-Jinn Horng focuses mostly in the field of Deep learning, narrowing it down to topics relating to Time series and, in certain cases, Multivariate statistics and Intrusion detection system. Shi-Jinn Horng is involved in the study of Algorithm that focuses on Secret sharing in particular. His Rough set research includes themes of Incremental learning, Variation, Granularity and Reduction.
The scientist’s investigation covers issues in Artificial intelligence, Deep learning, Machine learning, Data mining and Traffic flow. His biological study spans a wide range of topics, including Computer vision and Pattern recognition. His Pattern recognition study combines topics from a wide range of disciplines, such as Measure, Inference, Cluster analysis and Curse of dimensionality.
The study incorporates disciplines such as Time series, Temporal database, Intrusion detection system, Feature learning and Multivariate statistics in addition to Deep learning. His Machine learning research is multidisciplinary, relying on both Entropy, Data set and Decision rule. His Data mining research incorporates themes from Algorithm design and Missing data.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A novel intrusion detection system based on hierarchical clustering and support vector machines
Shi-Jinn Horng;Ming-Yang Su;Yuan-Hsin Chen;Tzong-Wann Kao.
Expert Systems With Applications (2011)
An improved method for forecasting enrollments based on fuzzy time series and particle swarm optimization
I-Hong Kuo;Shi-Jinn Horng;Tzong-Wann Kao;Tsung-Lieh Lin.
Expert Systems With Applications (2009)
An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization
Wei-Hung Lin;Shi-Jinn Horng;Tzong-Wann Kao;Pingzhi Fan.
IEEE Transactions on Multimedia (2008)
Performance evaluation of score level fusion in multimodal biometric systems
Mingxing He;Shi-Jinn Horng;Pingzhi Fan;Ray-Shine Run.
Pattern Recognition (2010)
An efficient job-shop scheduling algorithm based on particle swarm optimization
Tsung-Lieh Lin;Shi-Jinn Horng;Tzong-Wann Kao;Yuan-Hsin Chen.
Expert Systems With Applications (2010)
An improved SVD-based watermarking technique for copyright protection
Ray-Shine Run;Shi-Jinn Horng;Jui-Lin Lai;Tzong-Wang Kao.
Expert Systems With Applications (2012)
A blind watermarking method using maximum wavelet coefficient quantization
Wei-Hung Lin;Yuh-Rau Wang;Shi-Jinn Horng;Tzong-Wann Kao.
Expert Systems With Applications (2009)
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Shi-Jinn Horng;Shiang-Feng Tzeng;Po-Hsian Huang;Xian Wang.
Information Sciences (2015)
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs
Shiang-Feng Tzeng;Shi-Jinn Horng;Tianrui Li;Xian Wang.
IEEE Transactions on Vehicular Technology (2017)
An efficient phishing webpage detector
Mingxing He;Shi-Jinn Horng;Pingzhi Fan;Muhammad Khurram Khan.
Expert Systems With Applications (2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Southwest Jiaotong University
Southwest Jiaotong University
Shenzhen Institutes of Advanced Technology
National University of Kaohsiung
King Saud University
Sul Ross State University
Iwate Prefectural University
Chongqing University of Posts and Telecommunications
City University of Macau
University of Technology Sydney
École Normale Supérieure Paris-Saclay
Kyung Hee University
University of California, San Diego
Mid Sweden University
Aalto University
Lawrence Berkeley National Laboratory
University of Bern
University of Lausanne
University of Colorado Boulder
Chinese Academy of Sciences
Cranfield University
University College London
Duke University
University of Colorado Anschutz Medical Campus
Indiana University
European Organization for Nuclear Research