Sy-Yen Kuo

Sy-Yen Kuo
National Taiwan University | NTU · Department of Electrical Engineering

Ph.D. Computer Science, UIUC

About

526
Publications
65,739
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,905
Citations

Publications

Publications (526)
Article
Vehicle re-identification (ReID) has attracted considerable attention in computer vision. Although several methods have been proposed to achieve state-of-the-art performance on this topic, re-identifying vehicle in foggy scenes remains a great challenge due to the degradation of visibility. To our knowledge, this problem is still not well-addressed...
Preprint
Images acquired from rainy scenes usually suffer from bad visibility which may damage the performance of computer vision applications. The rainy scenarios can be categorized into two classes: moderate rain and heavy rain scenes. Moderate rain scene mainly consists of rain streaks while heavy rain scene contains both rain streaks and the veiling eff...
Article
Full-text available
Stock selection is the first problem that investors encounter when investing in the stock market and is paramount. The Sharpe ratio is a common assessment strategy. However, the Sharpe ratio considers an uptrend portfolio high risk because it assesses portfolio risk using standard deviations. Hence, we propose a novel investment strategy, namely, t...
Article
A financial plan is crucial due to inflation, retirement, insurance, etc., and many people choose stock trading as one part of their overall investment portfolio. Recently, the COVID-19 pandemic has affected the economy and has had a significant impact on the stock market. The task of optimizing the portfolio to have a stable return and lower its o...
Article
In image processing, smoke may degrade visibility and deteriorate the performance of high-level vision applications. Therefore, single image smoke removal is crucial for computer vision. Currently, existing smoke removal algorithms mainly leverage handcrafted priors. Moreover, these methods usually apply haze removal methods to perform smoke remova...
Article
Full-text available
Stock selection is an important issue in the stock market, and when assessing portfolio performance, return and risk are important conditions. The Sharpe ratio is a well-known assessment strategy that simultaneously considers portfolio return and risk. However, as the Sharpe ratio uses the average line to assess portfolio risk, it can easily assess...
Preprint
Image relighting aims to recalibrate the illumination setting in an image. In this paper, we propose a deep learning-based method called multi-modal bifurcated network (MBNet) for depth guided image relighting. That is, given an image and the corresponding depth maps, a new image with the given illuminant angle and color temperature is generated by...
Article
Full-text available
Secret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are interested in quantum cryptography and quantum secret sharing (QSS) is an important research topic...
Article
Full-text available
Haze removal techniques employed to increase the visibility level of an image play an important role in many vision-based systems. Several traditional dark channel prior-based methods have been proposed to remove haze formation and thereby enhance the robustness of these systems. However, when the captured images contain disproportionate haze distr...
Article
Many studies have been proposed to prove that technical analysis can help investors make trading decisions. The moving average (MA) is a widely used technical indicator that plays an important role in this field since it directly reflects stock fluctuations. However, most studies ignore the parameter settings of the MA, which leads to underestimati...
Chapter
Snow removal usually affects the performance of computer vision. Comparing with other atmospheric phenomenon (e.g., haze and rain), snow is more complicated due to its transparency, various size, and accumulation of veiling effect, which make single image de-snowing more challenging. In this paper, first, we reformulate the snow model. Different fr...
Article
In 5G enhanced mobile broadband (eMBB), applications that require high spectral efficiency and transmission speeds employ adaptive modulation and coding (AMC) technology. Such technology enables various levels of modulation and coding. AMC technologies use channel state information to select the optimal modulation or coding scheme as well as transm...
Article
Association analysis is critical in data analysis performed to find all co-occurrence relationships ( $i.e$ ., frequent itemsets or confident association rules) from the transactional dataset. An association rule can improve the ability of users to discover patterns and develop corresponding strategies. The data analysis process can be summarized...
Article
In this paper, we present a simple, efficient, and highly modularized network architecture for single-image snowremoval. To address the challenging snow-removal problem in terms of network interpretability and computational complexity, we employ a pyramidal hierarchical design with lateral connections across different resolutions. This design enabl...
Article
Full-text available
Physical unclonable function (PUF), a hardware-efficient approach, has drawn a lot ofattention in the security research community for exploiting the inevitable manufacturing variabilityof integrated circuits (IC) as the unique fingerprint of each IC. However, analog PUF is notrobust and resistant to environmental conditions. In this paper, we propo...
Article
Full-text available
Images captured in a hazy environment usually suffer from bad visibility and missing information. Over many years, learning-based and handcrafted prior-based dehazing algorithms have been rigorously developed. However, both algorithms exhibit some weaknesses in terms of haze removal performance. Therefore, in this work, we have proposed the patch-m...
Article
Threats to devices that are part of the Internet of Things (IoT) are on the rise. Owing to the overwhelming diversity of IoT hardware and software, as well as its variants, conventional anti-virus techniques based on the Windows paradigm cannot be applied directly to counter threats to the IoT devices. In this article, we propose a framework that c...
Article
Images are often corrupted by natural obscuration (e.g., snow, rain, and haze) during acquisition in bad weather conditions. The removal of snowflakes from only a single image is a challenging task due to situational variety and has been investigated only rarely. In this article, we propose a novel snow removal framework for a single image, which c...
Article
The rapid development of information and communication technologies has revolutionized people’s lives. A large amount of user behavioral data is generated by client software and is valuable for organizations (e.g., Apple, Google, and Samsung) to adjust their commercial strategies or to promote the quality of service. However, data collection raises...
Article
A modern FPGA often contains an ASIC-like clocking architecture which is crucial to achieve better skew and performance. Existing conventional FPGA placement algorithms seldom consider clocking resources, and thus may lead to clock routing failures. To address the special FPGA clocking architecture, this paper presents an effective clock-aware plac...
Article
Full-text available
Recently, the rapid development of Internet of things (IoT) has resulted in the generation of a considerable amount of data, which should be stored. Therefore, it is necessary to develop methods that can easily capture, save, and modify these data. The data generated using IoT contain private information; therefore sufficient security features shou...
Article
Full-text available
Kubernetes, which is the most popular orchestration platform for Docker containers, is used widely for developing microservices and automating Docker instance life cycle administration. Because of advancements in containerization technology, a single server can run multiple services and use hardware resources more efficiently. However, containerize...
Article
Sufficient illumination enables the observer to identify the true colors of an object captured by an imaging sensor, whereas dim illumination restricts proper observation. This paper proposes a single image enhancement algorithm based on human visual system. First, the image is transformed by the proposed Luminance Perception procedure from the spa...
Article
Full-text available
Background Numerous patients suffer from chronic wounds and wound infections nowadays. Until now, the care for wounds after surgery still remain a tedious and challenging work for the medical personnel and patients. As a result, with the help of the hand-held mobile devices, there is high demand for the development of a series of algorithms and rel...
Article
Full-text available
A correction to this article has been published and is linked from the HTML and PDF versions of this paper. The error has not been fixed in the paper.
Conference Paper
Given a design variable and its fanin cone, determining whether one fanin variable has controlling power over other fanin variables can benefit many design steps such as verification, synthesis and test generation. In this work we formulate this path controllability problem and propose several algorithms that not only solve this problem but also re...
Conference Paper
In this paper, we present a new hybrid representation of slicing trees and multi-packing trees, called multi-domain-packing trees (MDP-trees), for macro placement to handle ultra large-scale multi-domain mixed-size designs. A multi-domain design typically consists of a set of mixed-size domains, each with hundreds/thousands of large macros and (ten...
Article
The automated detection of moving objects is an essential task for any intelligent transportation system. To achieve reliable and accurate motion detection in video streams acquired from either jitter or static cameras in real-world scenarios, a novel motion detection approach based on grey relational analysis is proposed in this paper, which integ...
Article
Full-text available
This research proposes the first one-out-of-two quantum oblivious transfer (QOT) scheme that does not have a two-level structure and is not subject to Lo’s no-go theorem. Instead, the proposed scheme is a simple and efficient approach based on nonorthogonal states. The nonorthogonality causes one of a pair of messages to be unable to be measured to...
Article
Stock selection is a paramount importance in stock investment. Selecting stocks generally requires considering return and risk simultaneously. The common assessment strategy is to use the Sharpe ratio. Sharpe ratio uses the standard deviation to determine portfolio risk but a portfolio with an uptrend has high risk, defying the logic of most invest...
Article
Full-text available
The importance of effective surgical wound care cannot never be underestimated. Poorly managing surgical wounds may cause many serious complications. Thus, it raises the necessity to develop a patient-friendly self-care system which can help both patients and medical professionals to ensure the state of the surgical wounds without any special medic...
Article
Full-text available
This paper presents a novel dynamic group multi-party Quantum Key Agreement (DGMQKA) protocol, achieved by a multicast transmission method. The proposed method is able to achieve arbitrary number of groups and members under the same resources. In addition, it can be dynamically adjusted by joining a new member, combining two groups into one group,...
Article
Outdoor images captured during haze weather conditions generally exhibit visibility degradation. The lack of the medium transmission and atmospheric lights from a single haze image leads to an ill-posed problem in atmospheric scattering model. This paper proposes a novel haze-density estimation model with a universal atmospheric-light extractor for...
Article
Metaheuristic algorithms are implemented to solve optimization problems and have recently received significant research attention. Metaheuristic algorithms rely primarily on two properties, exploration, and exploitation. Traditional metaheuristic algorithms use many weights (parameters) to balance these two properties to increase the chance of find...
Conference Paper
Full-text available
Internet of Vehicles (IoV) is an emerging technology for smart city. Connected vehicles can publish event data expressing their driving records so that remote vehicular cloud services can subscribe these event data and correlate them with sensed data collected from environment to provide driving services. The distributed event streams generated fro...
Article
In recent years, since the adoption of the IEEE 802.11p and IEEE 1609 standards, Vehicular Ad hoc Networks (VANETs) have received a significant amount of attention in Ad hoc Network studies. Vehicular safety applications have thus played an important role in VANETs, and many emergency broadcast systems have been proposed. However, some of these bro...
Article
When investing in the stock market, the first problem and one of paramount importance which investors have to face is making the proper stock selection. Selecting the stocks that simultaneously offer high return and low risk is a difficult problem that is worth investigating. However, the traditional risk calculation based on the Modern Portfolio T...
Article
Restoration of visibility in hazy images is the first relevant step of information analysis in many outdoor computer vision applications. To this aim, the restored image must feature clear visibility with sufficient brightness and visible edges, while avoiding the production of noticeable artifacts. In this paper, we propose a haze removal approach...
Chapter
A smart toy is defined as a device consisting of a physical toy component that connects to one or more toy computing services to facilitate gameplay in the cloud through networking and sensory technologies to enhance the functionality of a traditional toy. A smart toy in this context can be effectively considered an Internet of Things (IoT) with Ar...
Article
Feature extraction and visual attention modeling of captured images are often used in outdoor imaging systems; however, corruption of images by rain streaks poses difficulties that restrict the development of these techniques. In this paper, we propose a novel rain streak removal method that is based on an error-optimized sparse representation (EOS...
Article
Many metaheuristic algorithms have been proposed to solve combinatorial and numerical optimization problems. Most optimization problems have high dependency, meaning that variables are strongly dependent on one another. If a method were to attempt to optimize each variable independently, its performance would suffer significantly. When traditional...
Article
Full-text available
Many elderly persons prefer to stay alone in a single-resident house for seeking an independent life and reducing the cost of health care. However, the independent life cannot be maintained if the resident develops dementia. Thus, an early detection of dementia is essential for the elderly to extend their independent lifetime. Early symptoms of dem...
Article
A two-tiered wireless sensor network, where storage nodes take charge of storing sensitive data and processing queries with respect to the sensing nodes and querists, incurs a security breach. This is because the important role of storage nodes may be (1) instructed by attackers to return fake and/or incomplete data in response to querists’ queries...