Skip to main content

and
  1. No Access

    Article

    5G Metaverse in Education

    The development of 5G private networks harbors immense potential for technological innovation, significantly enhancing digital connectivity and performance. This advancement has unlocked opportunities for pion...

    Jen-En Huang, Li-Wei Chang, Hui-Hsin Chin in Mobile Networks and Applications (2024)

  2. No Access

    Article

    Joint deployment and sleep scheduling of the Internet of things

    The Internet of things (IoT) provides an infrastructure to constructing smart cities. Through the installed IoT sensors in the city, a large amount of information of the city is detected and collected in a clo...

    Chun-Cheng Lin, Yi-Chun Peng, Li-Wei Chang, Zheng-Yu Chen in Wireless Networks (2022)

  3. No Access

    Chapter

    A Data Hiding Technology by Applying Interpolation in Extended Local Binary Pattern

    This paper proposes a data hiding technology by applying interpolation in Extended Local Binary Pattern (ELBP). The proposed method uses interpolation to predict pixels in blocks so as to reduce image distorti...

    Chi-Shiang Chan, Li-Wei Chang, Yuan-Yu Tsai in Software Engineering, Artificial Intellige… (2022)

  4. No Access

    Article

    Fault Tolerant Controlled Quantum Dialogue with Logical Brown States Against Collective Noise

    In view of the fact that the effects of channel noise are inevitable but easily ignored, we come up with two controlled quantum dialogue(CQD) protocols based on logical Brown states, which are against collecti...

    Li-wei Chang, Yu-qing Zhang, **ao-xiong Tian in International Journal of Theoretical Physi… (2020)

  5. No Access

    Article

    Fault Tolerant Multi-Party Authenticated Quantum Conference Against Collective Noise

    With the advent of new science and technology, teleconference, which allows multiple participants to communicate directly without being constrained by time and distance, is becoming extremely popular. We put f...

    Li-Wei Chang, Yu-Qing Zhang, **ao-**ong Tian in International Journal of Theoretical Physi… (2020)

  6. No Access

    Chapter and Conference Paper

    Multi-layer Quantum Secret Sharing Based on GHZ States

    A multi-layer quantum secret sharing protocol based on GHZ states is put forward. In this protocol, Alice wishes to share a secret, carried by the quantum state, with multiple agent nodes in the network. To be...

    Li-wei Chang, Yu-qing Zhang, **ao-xiong Tian in Artificial Intelligence and Security (2020)

  7. Article

    Open Access

    Sequence and entropy-based control of complex coacervates

    Biomacromolecules rely on the precise placement of monomers to encode information for structure, function, and physiology. Efforts to emulate this complexity via the synthetic control of chemical sequence in p...

    Li-Wei Chang, Tyler K. Lytle, Mithun Radhakrishna in Nature Communications (2017)

  8. No Access

    Article

    On Different-Dimensional Deployment Problems of Hybrid VANET-Sensor Networks with QoS Considerations

    To enhance vehicular ad hoc networks (VANETs) with the ability to detect road conditions, hybrid VANET-sensor networks (HVSNs) additionally deploy a large number of wireless sensors on road sides, so as to pro...

    Chun-Cheng Lin, Peng-Chung Chen, Li-Wei Chang in Mobile Networks and Applications (2017)

  9. Article

    Erratum to: On Different-Dimensional Deployment Problems of Hybrid VANET-Sensor Networks with QoS Considerations

    Chun-Cheng Lin, Peng-Chung Chen, Li-Wei Chang in Mobile Networks and Applications (2016)

  10. No Access

    Article

    Multiparty-controlled Joint Remote Preparation of an Arbitrary Four-qubit Cluster-type State via Two Different Entangled Quantum Channels

    To satisfy the requirements of quantum network communication, we attempt to investigate how to elaborate multiparty-controlled joint remote state preparation(MCJRSP), especially many-to-many MCJRSP. The key to...

    Li-Wei Chang, Shi-Hui Zheng, Li-Ze Gu in International Journal of Theoretical Physi… (2015)

  11. No Access

    Article

    A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields

    Multi-sender authentication codes are always viewed as an extension of the traditional point-to-point message authentication. Multi-sender authentication codes allow a group of senders to construct an authenti...

    Li-Wei Chang, Shi-Hui Zheng, You Gao in Applicable Algebra in Engineering, Communi… (2014)

  12. Article

    Open Access

    An integrated approach to characterize transcription factor and microRNA regulatory networks involved in Schwann cell response to peripheral nerve injury

    The regenerative response of Schwann cells after peripheral nerve injury is a critical process directly related to the pathophysiology of a number of neurodegenerative diseases. This SC injury response is depe...

    Li-Wei Chang, Andreu Viader, Nobish Varghese, Jacqueline E Payton in BMC Genomics (2013)

  13. Article

    Open Access

    Whole-genome analysis informs breast cancer response to aromatase inhibition

    To correlate the variable clinical features of oestrogen-receptor-positive breast cancer with somatic alterations, we studied pretreatment tumour biopsies accrued from patients in two studies of neoadjuvant ar...

    Matthew J. Ellis, Li Ding, Dong Shen, **gqin Luo, Vera J. Suman, John W. Wallis in Nature (2012)

  14. Article

    Open Access

    Computational identification of the normal and perturbed genetic networks involved in myeloid differentiation and acute promyelocytic leukemia

    Acute myeloid leukemia (AML) comprises a group of diseases characterized by the abnormal development of malignant myeloid cells. Recent studies have demonstrated an important role for aberrant transcriptional ...

    Li Wei Chang, Jacqueline E Payton, Wenlin Yuan, Timothy J Ley in Genome Biology (2008)