Shyan-Ming Yuan

Shyan-Ming Yuan
National Yang Ming Chiao Tung University

Ph.D. Computer Science, University of Maryland College Park

About

376
Publications
74,800
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,615
Citations
Introduction
Shyan-Ming Yuan currently works at the Department of Computer Science, National Chiao Tung University. Shyan-Ming does research in Computing in Social science, Arts and Humanities, Distributed Computing and Information Systems (Business Informatics). Their current project is 'Distributed Decision Making on Unreliable Networks'.
Additional affiliations
August 1995 - present
National Yang Ming Chiao Tung University
Position
  • Professor (Full)

Publications

Publications (376)
Article
Full-text available
Developing AI algorithms for the game of Go has long been a challenging task. While tools such as AlphaGo have revolutionized gameplay, their focus on maximizing win rates often leads to moves that are incomprehensible to human players, limiting their utility as training aids. This work introduces a novel approach to bridge this gap by leveraging a...
Article
Full-text available
With the fast-fashion trend, an increasing number of discarded clothing items are being eliminated at the stages of both pre-consumer and post-consumer each year. The linear economy produces large volumes of waste, which harm environmental sustainability. This study addresses the pressing need for efficient textile recycling in the circular economy...
Article
Full-text available
In Taiwan, traditional student assessments, covering academic and extracurricular achievements, have shifted from paper to electronic portfolios (e-portfolios). However, limited trust among institutions restricts students from freely sharing and using their educational data. This paper introduces a self-sovereign identity-based infrastructure aimed...
Article
Full-text available
The development of creativity plays a decisive role in the future development of human life as it stimulates divergent thinking and grants the critical ability to innovate and solve problems. Therefore, the question of how to encourage students’ creativity has also attracted the attention of related research in various fields. Our study used the Sc...
Article
Full-text available
The transformative wave of generative AI is reshaping the creative thinking processes of learners, posing a significant challenge to education and industry in cultivating technological literacy and creativity. This study delves into the exploration of how learners can effectively tackle new challenges by deconstructing fragments from a macro perspe...
Article
Full-text available
To effectively solve the increasingly complex problems experienced by human beings, the latest development trend is to apply a large number of different types of sensors to collect data in order to establish effective solutions based on deep learning and artificial intelligence [...]
Article
Full-text available
In Asia, the availability of school counselors is significantly lower than global standards recommend, particularly in elementary education settings. This shortage is exacerbated by rising mental health concerns among young students, particularly those with emotional disorders. Considering the critical gap in the provision of mental health services...
Article
Full-text available
Stock prediction has garnered considerable attention among investors, with a recent focus on the application of machine learning techniques to enhance predictive accuracy. Prior research has established the effectiveness of machine learning in forecasting stock market trends, irrespective of the analytical approach employed, be it technical, fundam...
Article
Full-text available
Patient safety is a paramount concern in the medical field, and advancements in deep learning and Artificial Intelligence (AI) have opened up new possibilities for improving healthcare practices. While AI has shown promise in assisting doctors with early symptom detection from medical images, there is a critical need to prioritize patient safety by...
Article
Full-text available
To improve data transmission efficiency, image compression is a commonly used method with the disadvantage of accompanying image distortion. There are many image restoration (IR) algorithms, and one of the most advanced algorithms is the generative adversarial network (GAN)-based method with a high correlation to the human visual system (HVS). To e...
Article
Full-text available
The growing number of online open-access journals promotes academic exchanges, but the prevalence of predatory journals is undermining the scholarly reporting process. Data collection, feature extraction, and model prediction are common steps in tools designed to distinguish between legitimate and predatory academic journals and publisher websites....
Article
Full-text available
While real-time bidding brings a huge profit for online businesses, it also becomes a potential target for malicious purposes. In real-time bidding, the bid request traffic could be classified into two kinds: intentional and non-intentional. Intentional bid requests come from ordinal web users while non-intentional bid requests come from abnormal w...
Article
Full-text available
In this study, we propose using a thermal imaging camera (TIC) with a deep learning model as an intelligent human detection approach during emergency evacuations in a low-visibility smoky fire scenarios. We use low-wavelength infrared (LWIR) images taken by a TIC qualified with the National Fire Protection Association (NFPA) 1801 standards as input...
Article
Full-text available
The saga pattern manages transactions and maintains data consistency across distributed microservices via utilizing local sequential transactions that update each service and publish messages to trigger the next ones. Failure by one transaction causes the execution of compensating transactions that counteract the preceding one. However, saga lacks...
Article
Full-text available
We study the problem of controllable citation text generation by introducing a new concept to generate citation texts. Citation text generation, as an assistive writing approach, has drawn a number of researchers’ attention. However, current research related to citation text generation rarely addresses how to generate the citation texts that satisf...
Article
Financial institutions are following an open banking (OB) trend for service innovation and integration. OB allows third-party service providers (TSPs) to access user financial data for purposes of finding the best deals and improving user experiences. The trust in third parties required for OB ecosystem success raises questions about digital identi...
Article
It is of great significance for headquarters in warfare to address the weapon-target assignment (WTA) problem with distributed computing nodes to attack targets simultaneously from different weapon units. However, the computing nodes on the battlefield are vulnerable to be attacked and the communication environment is usually unreliable. To solve t...
Article
Full-text available
Authentication is essential for the prevention of various types of attacks in fog/edge computing. Therefore, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing concerns regarding their security. Therefore, a novel mod...
Article
Full-text available
Futures markets offer investors many attractive advantages, including high leverage, high liquidity, fair, and fast returns. Highly leveraged positions and big contract sizes, on the other hand, expose investors to the risk of massive losses from even minor market changes. Among the numerous stock market forecasting tools, deep learning has recentl...
Poster
Full-text available
Dear Colleagues, The emergence and popularization of blockchain technology have greatly changed the operation and management of digital systems. At the same time, digital finance has also received extensive attention from researchers and practitioners. Because digital finance has been widely adopted by enterprises and consumers (e.g., digital payme...
Article
Full-text available
Lung sounds remain vital in clinical diagnosis as they reveal associations with pulmonary pathologies. With COVID-19 spreading across the world, it has become more pressing for medical professionals to better leverage artificial intelligence for faster and more accurate lung auscultation. This research aims to propose a feature engineering process...
Article
Full-text available
This study proposes a Client-Fog-Cloud (CFC) multilayer data processing and aggregation framework that is designed to promote latency-sensitive applications in an IoT context. The framework is designed to address the current IoT-based challenges: wide distribution, massive uploading, low latency, and real-time interaction. The proposed framework co...
Article
Full-text available
Population aging causes the prevalence of hypertension to increase, which increases the incidence of dementia and leads to premature death. The simultaneous development of these two diseases accelerates the progression of dementia, leading to a reduction in the patient’s quality of life. This is difficult for caregivers, as it causes them to should...
Article
Full-text available
Contract production and transaction are very common and important since it can greatly reduce future uncertainty and is well-organized by buyers, sellers, and trusted third parties (TTPs). However, current commodity trading systems (such as spot, futures, and forward contract) are still traditional centralized structures, which means that there may...
Conference Paper
This work proposes a monthly average forecast model for Taiwan stocks index based on linear regression. Through analysis, we try to find the factors that affect the index, then build models to forecast the index in coming months, and also identify a suitable time period for the training datasets. The results of applying the proposed model to conduc...
Preprint
Full-text available
BeIMP integrates related DApps, such as order management, resale, delivery, deposit collateral, financing, and insurance, for comprehensive contract production and can be generalized to different industries. As for real context implementation, BeIMP could facilitate contract farming and provide three-tier risk diversification especially for small a...
Article
Full-text available
Digital advertising on social media officially surpassed traditional advertising and became the largest marketing media in many countries. However, how to maximize the value of the overall marketing budget is one of the most concerning issues of all enterprises. The content of the Facebook photo post needs to be analyzed effectively so that the soc...
Article
Full-text available
Eye movement technology is highly valued for evaluating and improving digital learning content. In this paper, an educational innovation study of eye movement behaviors on digital learning content is presented. We proposed three new eye movement metrics to explain eye movement behaviors. In the proposed method, the digital content, which were slide...
Article
Full-text available
There is currently no cure for Alzheimer’s disease, leaving patients to rely solely on good quality care services to prolong their life. Besides, it has been found that the onset of pneumonia can accelerate the progression of dementia and even lead to death. This has led to an increased caregiving burden and a level of emotional stress among caregi...
Conference Paper
Full-text available
For the sake of enhancing repurchase rate and customer loyalty, plenty of enterprises have issued reward points. However, as there are more enterprises issuing reward points, customers become less and less interested to collect them. Even though there are companies forming a business alliance to make reward points more attractive, it is usually man...
Conference Paper
Software Defect Prediction (SDP) aims to assess software quality by using machine learning techniques. Recently, by proposing the connectivity-based unsupervised learning method, Zhang et al. have been proven that unsupervised classification has great potential to apply to this problem. Inspiring by this idea, in our work we try to replicate the re...
Article
Full-text available
Although blockchain technology was first introduced through Bitcoin, extending its usage to non-financial applications, such as managing academic records, is a new mission for recent research to balance the needs for increasing data privacy and the regular interaction among students and universities. In this paper, a design for a blockchain-based s...
Article
Full-text available
Although blockchain technology was first introduced through Bitcoin, extending its usage to non-financial applications, such as managing academic records, is a new mission for recent research to balance the needs for increasing data privacy and the regular interaction among students and universities. In this paper, a design for a blockchain-based s...
Article
Full-text available
Although the blockchain technology was first introduced through Bitcoin, extending its usage to nonfinancial applications, such as managing electronic medical records, is an attractive mission for recent research to balance the needs for increasing data privacy and the regular interaction among patients and health providers. Various systems that ad...
Article
Full-text available
Seamlessly integrating image compression technique and secret data hiding technique into a single procedure for security and efficient data transmission is a novel research issue in modern, decentralized digital communication environments. The first joint data hiding and compression (JDHC) scheme on block truncation coding (BTC) compression domain...
Article
Full-text available
Security is a crucial factor for the appropriate functioning of fog/edge computing. Secured mutual authentication in networks has become key demand as per the current security standard. Several applications are in its requirements like Wireless Sensor Network (WSN), Distributed Systems, Micro-Cloud, Smart City, Smart Industry 4.0. Problem statement...
Chapter
Futures market has high leverage and the characteristics of over-performing returns. Hence, it always attracts lots of investors. However, three major kinds of institutional traders are more influential than individual investors in Taiwan. In this paper, a monthly predicting model for the weighted price index of the Taiwan Stock Exchange (TAIEX) wa...
Article
Full-text available
There is strong demand for real-time suspicious tracking across multiple cameras in intelligent video surveillance for public areas, such as universities, airports and factories. Most criminal events show that the nature of suspicious behavior are carried out by un-known people who try to hide themselves as much as possible. Previous learning-based...
Article
Smart contract, which could help developer deploy decentralized and secure blockchain application, is one of the most promising technologies for modern Internet of things (IoT) ecosystem today. However, Ethereum smart contract lacks of ability to communicate with outside IoT environment. To enable smart contracts to fetch off-chain data, this paper...
Article
Performance problems in a cloud service are difficult to diagnose because they may be caused by various system components. This study proposes an automatic cloud service testing and bottleneck detection system that is applicable to different types of services. With the proposed test module, the user can customize test scenarios to automatically tes...
Conference Paper
Recent years the prevalence of fraudulent websites has become more severe than before. Fraudulent ecommerce websites that sell counterfeit goods not only cost financial damage to consumers but also have a great impact on Internet industry. Nowadays, there is not an effective way to confront these websites. In this paper, we look forward to achievin...
Article
Full-text available
To appropriately realize the performance of a web service, it is essential to give it a comprehensive testing. Although an elastic test could be guaranteed in traditional cloud testing systems, the geographical test that supports real user behavior simulation remains a problem. In this paper, we propose a testing system based on a crowdsourcing mod...
Conference Paper
The development in social network services changes our traditional social structure. Nowadays, people can easily communicate with their old friends or even make new ones. The "Small World Theory" [5] states that the median path length equal to 6 when posting letters through intermediaries, but researchers have not prove this theory completely until...
Conference Paper
With Moodle a web based interface supporting a wide range of activities including forums, contents, and assignments is provided to assist both the teachers and the students. However, limitations of the file-size acceptable for uploads, weakness in the assessment procedure, complicated task of replacing an existing file, and the lowest visiting rate...
Article
Full-text available
Eye tracking technology provides a faster and more intuitive interface to explore the learner psychology. In this paper, with the aim of assisting researcher to expand the knowledge of video lectures, we present an efficient system named VLEYE based on eye tracking. The system allows gathering the dynamic areas of interest (AOI) and combining them...
Article
Full-text available
Three-operation multiplication (TOM) over binary extension field is frequently encountered in cryptosystems such as elliptic curve cryptography (ECC). Though digit-serial polynomial basis multipliers are usually preferred for realization of TOMdue to their efficient trade-off in implementation complexity, Karatsuba algorithm (KA)-based strategy is...
Article
In recent years, users have been buying computing resources, such as VM instances, from the cloud resource providers. However, every cloud has its pricing models, solutions, and interfaces. Without a united interface, it is hard to manage across different clouds. To make things worse, it is even hard to select proper VM instances among multiple clo...
Article
Full-text available
This study aims to assess which ad element-related eye movement behaviors could predict the traditional advertising effectiveness of high-order for video advertising. The data were obtained from 61 participants, each stimulated by six video ads, via an eye tracking method and questionnaires. A logistic regression was conducted to predict high and l...
Conference Paper
Buying a house is not an easy thing for the most people. If you want to buy a house, you must to consider many factors. Such as the house pattern and location. These factors directly or indirectly affect the value of the house value. The current sale of the house only to provide the price and details of house information. There is no provision of t...
Article
Full-text available
Eye movement can be regarded as a pivotal real-time input medium for human-computer communication, which is especially important for people with physical disability. In order to improve the reliability, mobility, and usability of eye tracking technique in user-computer dialogue, a novel eye control system with integrating both mouse and keyboard fu...