學術研究

(一)校外:
  • 【2022】李金鳳,指導專題學生 (2022):「數位學伴教材審核暨學伴互動情緒分析系統」,獲頒「台灣網路智能研討會NCWIA 2022論文佳作獎」,第十二屆網路與智能應用研討會(NCWIA 2022)The Twelfth National Conference on Web Intelligent and Applications,2022/07/22-23 雲林科技大學。
  • 【2020】李金鳳,指導專題學生 (2020):「數位學伴貼近你的心」,獲頒「2020年民生電子研討會優良論文獎」,民生電子研討會,2020/12/11/ 樹德科技大學。
  • 【2020】指導學生 國立清華大學彭泰、國立清華大學潘鳳婷、國立清華大學江成強、彰化師範大學黃建樺、朝陽科大資管系粘佑任參加「教育數據應用黑客松(2020 EDUATHON)」比賽獲佳作主辦單位:經濟部工業局,執行單位:財團法⼈資訊⼯業策進會 數位教育研究所
  • 【2020】指導碩士研究生國立中興大學趙子權參加在2020年11月26-28日在日本仙台東北大學舉辦的ICKEA 2020 獲得最佳論文獎(BEST PRESENTERS:Six Best Presentations have been selected, and the winners will enjoy free access to ICKEA 2021.),論文題目“"Title An Improved lossless information Hiding in SMVQ Compressed Images," 6th International Conference on Frontiers of Educational Technologies,” ICFET 2020 and its Workshop 2020 5th International Conference on KnowledgeEngineering and Applications, ICKEA 2020 in Tokyo, Japan on June 5-8, 2020.
  • 【2018】與中興大學Shen, Jau-Ji教授共同指導碩士研究生高毓娸(Kao, Yu-Chi)參加在2018年11月26-28日在日本仙台東北大學舉辦的IIHMSP2018 獲得最佳論文獎,論文題目「“High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method,”」收錄於 Smart Innovation, Systems and Technologies book series (SIST), volume 109, pp 280-288, 2018. (words: 2887) [EI-indexed, SCOPUS; ((亦收錄在 International Conference on Intelligent Information Hiding and Multimedia Signal Processing--IIH-MSP 2018: Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, November, 26–28, pp 280-288, 2018, Sendai, Japan) [editors: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, and Lakhmi C. Jain (Eds.)] [施普林格出版社(Springer)][ISBN 978-3-030-03744-4] (BEST PAPER AWARD)
  • 【2017】資訊學院資管系李金鳳指導專題學生黃宇愛、鄭芷媛、黃仕茹、林郁瑋、游曼均、蘇郡平、鄭皓馨 獲得「2017全國大專院校Healthy x Happy創新提案構想書競賽」佳作,2017/11/17。
  • 【2016】李金鳳,指導專題學生 陳鉞勳、林東朋、康民和、陳惠勝、黃聖儒、辛宜儒 (2016):「互動式虛擬實境遊戲開發與moLo Sport 娛樂健身車於物聯網環境之應用系統 」,獲頒「2016年民生電子研討會優良論文獎」,民生電子研討會,2016/11/19/ 東華大學。
  • 【2015】李金鳳,指導專題學生陳昭如,賴郁樺,邱怡瑄,劉依庭,賴其慧,郭佳馨,洪佳吟,以「夢想騎機」,參加「2015第20屆年全國大專校院資訊應用服務創新競賽」 <資訊技術應用組四(IPA4)>第一名,頒獎字號:104CSIM獎字第0064,Oct. 30, 2015。
  • 【2015】李金鳳,指導專題學生陳昭如,賴郁樺,邱怡瑄,劉依庭,賴其慧,郭佳馨,洪佳吟以「玩轉Arduino自走車與moLo Sport互動式娛樂健身車於物聯網環境之應用系統」,獲頒「2015年民生電子研討會最佳論文獎」,(104)建資管獎字字第1041100011號,Nov. 28, 2015。
  • 【2015】資訊學院資管系李金鳳指導專題學生以「老吾老銀色騎機」,參加2015行動終端創新應用APP競賽獲得特優獎(第一名 ),Nov. 27, 2015。
  • 【2015】資訊學院資管系李金鳳指導專題學生以「老吾老銀色騎機」,參加2015行動終端創新應用APP競賽獲得創新獎,Nov. 27, 2015。
  • 【2015】資訊學院資管系李金鳳指導專題學生以「老頑童(腦玩通)銀色騎跡」,參加「2015第六屆資旺盃Android程式設計競賽」第一名,主辦單位:友旺科技股份有限公司與淡江大學資工系,Dec 17, 2015。
  • 【2014】指導研究生高承佑參加2014年5月30日在政治大學舉辦的第二十四屆全國資訊安全會議(CISC 2014) 獲得論文佳作獎,論文題目「植基於預測誤差直方位移修正技術之可逆式資訊隱藏法 (A Reversible Data Hiding Using Prediction-error based on Histogram Shifting Modification Technique)」。
  • 【2013】展覽會名稱:2013年「第41屆日內瓦國際發明展」。作者:謝欽旭、李金鳳。「(中)具車道偏移偵測與前車安全距離預警系統」。獲得獎項: 金牌獎(Gold Medal),地點:日內瓦Palexpo April 10 ~ 14, 2013。
  • 【2013】中華民國資訊安全學會「賴溪松教授論文獎」碩士組佳作,指導碩士研究生陳凱琴,論文題目「High Payload Reversible Data Hiding with Reduplicated Exploiting Modification Direction using Image Interpolation and Edge Detection」(102資安獎字第006號)
  • 【2013】指導碩士研究生高承佑參加在2013年4月26日在樹德科技大學舉辦的第三屆網路智能與應用研討會(NCWIA 2013) 獲得最佳論文獎,論文題目「運用拉格朗日插值法進行影像復原」。
  • 【2012】擔任「漫步雲端彩雲飛社群」指導老師,參加101學年度第1學期「學生學習社群」期末成果發表會競賽獲得競賽類第一名,朝陽教獎字第1020004號。
  • 【2012】展覽會名稱:2012年(第五屆)中東科威特國際發明展(2012 IIFME)。作者:謝欽旭、施宏旗、陳俊谷、洪冠明、沈世宏、李金鳳。作品名稱:「具車道偏移偵測與前車安全距離預警系統」,獲得獎項: 金牌獎(Gold Medal),地點:中東科威特Nov. 22, 2012。
  • 【2012】展覽會名稱: 2012年(第27屆)美國匹茲堡國際發明展與新產品展(INPEX 2012)。作者:陳璽煌、李金鳳。作品名稱:「(中)隨教隨選--視訊隨選解題系統」(英) Select what you want: Teaching video on demand system,獲得獎項: 傑出銀牌獎, 地點:美國賓州匹茲堡市June 13-15,2012。
  • 【2011】指導碩士研究生劉家銘/王興田 學參加在2011年05月在朝陽科技大學舉辦的第二十二屆國際資訊管理學術研討會(ICIM 2011) 獲得最佳論文獎,論文題目「植基於利用方向修正法之可調式高藏量資訊隱藏法 (Adaptive Data Hiding Based on Exploiting Modification Direction with High Embedding Capacity)」。
  • 【2010】朝陽科技大學資管系羅有隆、劉熒潔、李金鳳、陳伶秀合著 榮獲98學年度第二學期「中區技職校院區域教學資源中心優良課程」獲選名單(本次共有28門課程通過遴選),雲科大中教字第0992300284號。
  • 【2008】指導碩士研究生王翊嘉同學參加在2008年11月在台灣高雄舉辦的「The Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08)」榮獲"Content-based Image Retrieval Based on Vector Quantization and Affine Invariant Region”最佳論文獎。
  • 【2007】擔任第十屆電子商務學術研討會評審工作,獲得「第十屆電子商務學術研討會評審貢獻獎」,Oct. 10, 2007。
  • 【2006】指導碩士研究生蔡佳興同學參加在2006年6月在香港舉辦的「The 2006 IAENG International Workshop on Data Mining and Application」榮獲“Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML Databases”最佳論文獎。
  • 【2002】指導研究生蔡孟哲同學碩士論文「設計有效整併分類料及快速智慧查詢機制以提昇資料倉儲運作效率」,獲得「中華民國資訊學會2002碩士論文佳作指導獎」,台(91)資字第000012號,Nov. 2002。
  • 【1999】行政院國家科學委員會88學年度甲種研究獎勵。
  • 【1998】行政院國家科學委員會87學年度甲種研究獎勵。
(二)朝陽科技大學:

A. 研究獎勵(更新到2013年,自2014年不再頒發獎勵改以績效評鑑方式)

  • 【2013】榮獲朝陽科技大學102年度「論文類獎佳作獎」,朝陽研獎字第01030000100號,Jan. 16, 2013。
  • 【2012】榮獲朝陽科技大學101年度「論文類獎佳作獎」,朝陽研獎字第01010000012號,Jan. 19, 2012。
  • 【2011】榮獲朝陽科技大學100年度「論文類獎佳作獎」,朝陽研獎字第01000000002號,Jan. 19, 2011。
  • 【2010】榮獲朝陽科技大學99年度「論文類獎佳作獎」,朝陽研獎字第0990000001號,Jan. 18,2010。
  • 【2008】榮獲朝陽科技大學97年度「論文類獎佳作獎」,朝陽研獎字第0970000001號,Jan. 21, 2008。
  • 【2007】指導研究生參加「The 2006 IAENG International Workshop on Data Mining andApplication」榮獲最佳論文獎,嘉獎乙次,朝人字第0960005114號,2007。
  • 【2006】榮獲朝陽科技大學94學年度「資訊學院教師績效特優獎」。
  • 【2005】榮獲朝陽科技大學94學年度推動學術研究及建教合作績優獎,(94)朝陽獎字第0950001號,2005。
  • 【2005】執行93學年度教育部亞太地區地育聯盟暨經貿發展國際學術交流計畫及亞太區域經營管理暨產業發展國際研討會表現良好,嘉獎乙次,朝人字第0940001047號,2005。
  • 【2004】榮獲朝陽科技大學93學年度推動學術研究及建教合作獎狀,(94)朝陽研字第0940000001號,June 27, 2004。
  • 【2004】榮獲朝陽科技大學92學年度推動學術研究及建教合作績優獎,(93)朝陽獎字第0930019號,2004。
  • 【2003】榮獲朝陽科技大學91學年度推動學術研究及建教合作績優獎,(92)朝陽獎字第920021號,2003。
  • 【2002】指導研究生蔡孟哲同學碩士論文「設計有效整併分類料及快速智慧查詢機制以提昇資料倉儲運作效率」,獲得「中華民國資訊學會2002碩士論文佳作指導獎」,嘉獎乙次,朝人字第0920060200號,Feb. 2002。
  • 【2002】榮獲朝陽科技大學91學年度論文類獎佳作獎,將勵金壹萬元(補助編號91-A018),(91)朝陽獎評字第055號,Oct.30, 2002。
  • 【2002】榮獲朝陽科技大學90學年度推動學術研究及建教合作績優獎,(91)朝陽獎字第910032號,2002。
  • 【2001】榮獲朝陽科技大學89學年度推動學術研究及建教合作績優獎,(90)朝陽獎字第900026號,2001。
  • 【1999】榮獲朝陽科技大學88學年度推動學術研究及建教合作績優獎,(88)朝陽獎字第880118號,1999。
  • 【1999】榮獲88學年行政院國家科學委員會甲種研究獎勵,(88)獎字第880118號,1999。
  • 【1998】榮獲87學年行政院國家科學委員會甲種研究獎勵,(87)獎字第870112號,1998。
  • 【1998】榮獲朝陽科技大學87學年度推動學術研究及建教合作績優獎,(87)朝陽獎字第870030號,1998。

B. 教學獎勵

  • 【2019】榮獲朝陽科技大學108學年度第1學期「教師課程改善歷程」傑出獎
  • 【2017】資訊學院資管系李金鳳指導專題學生黃宇愛、鄭芷媛、黃仕茹、林郁瑋、游曼均、蘇郡平、鄭皓馨、(2017):「 樂齡悅活物聯網應用 」專題,參加朝陽資訊學院106年學生專題競賽,榮獲M514場次第1名,2017/12/05。
  • 【2017】資訊學院資管系李金鳳指導專題學生黃宇愛、鄭芷媛、黃仕茹、林郁瑋、游曼均、蘇郡平、鄭皓馨 獲得「2017全國大專院校Healthy x Happy創新提案構想書競賽」佳作,2017/11/17。
  • 【2017】榮獲105學年度朝陽科技大學院級優良導師,朝陽學字第1060000143號,2017/09/20。
  • 【2016】資訊學院資管系李金鳳指導專題學生 陳鉞勳、林東朋、康民和、陳惠勝、黃聖儒、辛宜儒 (2016):「互動式虛擬實境遊戲開發與moLo Sport 娛樂健身車於物聯網環境之應用系統 」,獲頒「2016年民生電子研討會優良論文獎」,民生電子研討會,2016/11/19/ 東華大學。
  • 【2016】資訊學院資管系李金鳳指導專題學生陳鉞勳、林東朋、康民和、陳惠勝、黃聖儒、辛宜儒 (2016):「來淨海去碳遊 」專題,參加資訊學院105年學生專題競賽,榮獲M516場次第2名。
  • 【2015】指導研究生曾郁茹以英文發表獲IET研討會第一名。
  • 【2015】指導研究生曾郁茹以英文發表獲AIT2016研討會第一名。
  • 【2015】指導研究生曾郁茹以英文發表獲朝陽科技大學資訊學院第一名。
  • 【2015】資訊學院資管系李金鳳指導專題學生10114148 陳昭如 、10114031 賴郁樺 、10114028 邱怡瑄、 10114058 劉依庭、10114037 郭佳馨 、10114064 賴其慧 、10114022 洪佳吟,以「夢想騎機」,參加2015 第20屆全國大專校院資訊應用服務創新競賽<資訊技術應用組四>第一名,Oct. 30, 2015。
  • 【2015】資訊學院資管系李金鳳指導專題學生10114148 陳昭如、10114031 賴郁樺、10114028 邱怡瑄、10114058 劉依庭、10114037 郭佳馨、10114064 賴其慧、10114022 洪佳吟,以「老吾老銀色騎機」,參加2015行動終端創新應用APP競賽雙喜臨門(第一名+創新獎),Nov. 27, 2015。
  • 【2015】資訊學院資管系李金鳳指導專題學生10114148 陳昭如、10114031 賴郁樺、10114028 邱怡瑄、10114058 劉依庭、10114037 郭佳馨、10114064 賴其慧、10114022 洪佳吟,以「老頑童(腦玩通)夢想騎跡」,參加2015第六屆資旺盃 Android 程式設計競賽(第一名),Dec. 17, 2015。
  • 【2015】資訊學院資管系李金鳳指導專題學生10114148 陳昭如、10114031 賴郁樺、10114028 邱怡瑄、10114058 劉依庭、10114037 郭佳馨、10114064 賴其慧、10114022 洪佳吟,以「「夢想騎機」--玩轉arduino與物聯網於健身娛樂之應用系統」專題,參加資訊學院104年學生專題競賽,榮獲M514場次第2名,朝陽資獎字第106000002號。
  • 【2015】資訊學院資管系李金鳳指導專題學生10114148 陳昭如、10114031 賴郁樺、10114028 邱怡瑄、10114058 劉依庭、10114037 郭佳馨、10114064 賴其慧、10114022 洪佳吟 以「論文”玩轉Arduino自走車與moLo Sport互動式娛樂健身車於物聯網環境之應用系統」,”榮獲2015年民生電子研討會最佳論文獎。
  • 【2013】資訊學院資管系李金鳳指導專題學生以「小型專案進度監控系統」專題,參加資訊學院102年學生專題競賽,榮獲M515場次佳作,朝陽資獎字第1020000010號。
  • 【2012】資訊學院資管系李金鳳教師與力鯨科技股份有限公司陳志成總經理指導專題學生以「智慧行動出缺勤管理系統」專題,參加資訊學院101年學生專題競賽,榮獲甲場次第3名,朝陽資獎字第101000003號。
  • 【2011】資訊學院資管系李金鳳與陳榮昌教師指導專題學生以「食在人為紅不讓線上訂餐/位系統」專題,參加資訊學院100年學生專題競賽,榮獲甲場次佳作,朝陽資獎字第100015號。
  • 【2010】朝陽科技大學資管系羅有隆、劉熒潔、李金鳳、陳伶秀合著 榮獲98學年度第二學期「中區技職校院區域教學資源中心優良課程」獲選名單(本次共有28門課程通過遴選),雲科大中教字第0992300284號。
  • 【2010】98學年度第2學期開設3門具服務學習內涵課程,特贈感謝狀,朝陽學(感)字第0990000140號,2010/10/25。
  • 【2009】97學年度獎助教師編製教材及教學參考資料,朝陽教獎字第0980007號,2009。
  • 【2009】Certificate of Excellence, This is to certify that Dr. Chin-Feng Lee has advised his graduate student to win the third place of English thesis presentation contest held by College of Informatics Chaoyang University of Technology, Apr. 25, 2009.
  • 【2008】Certificate of Excellence, This is to certify that Dr. Chin-Feng Lee has advised his graduate student to win the second place of English thesis presentation contest held by College of Informatics Chaoyang University of Technology, Apr. 26, 2008.
  • 【2008】朝陽科技大學教學卓越計畫「優質教學部落格選拔」佳作獎,朝陽教(教)字第0970191號,2008。
  • 【2007】朝陽科技大學96學年度資訊學院教學優良教師獎,2007。
  • 【2006】95學年度獎助教師編製教材及參考資料(統計學),2006。
  • 【2005】94學年度獎助教師製作教材及參考資料(資料庫管理系統),2005。
  • 【2005】朝陽科技大學94年度,指導陳勇志等五員執行資管系畢業專題題目「學生編輯部辦公室管理系統-以朝陽商管評論為例」,獲朝陽科技大學管理學院頒發「撰寫朝陽商管評論資訊系統獎」,May2005。
  • 【2003】朝陽科技大學92學年度教學優良教師獎,2003。
  • 【2002】朝陽科技大學91學年度第二學期網路輔助教學(分散式資料庫管理系統),2002。
  • 【2001】朝陽科技大學90學年度第二學期網路輔助教學(資料探勘),2001。
  • 【2001】朝陽科技大學90學年度獎助教師製作教材及參考資料(結構化程式設計),2001。

C. 服務獎勵

  • 【2009】98學年度惠贈圖書資料共計80件,充實圖書館館藏,朝陽圖獎字第0990000003號。
  • 【2008】朝陽科技大學十週年服務奉獻獎狀,(97) 朝人字第097035號,March 04, 2008。
  • 【2005】辦理九十三學年度全國資訊學門資訊學科能力測驗(TGRE)表現優良,嘉獎2次,朝人字第0940001047號,Feb. 23, 2005。
  • 【2004】辦理九十二學年度全國資訊學門資訊學科能力測驗(TGRE)表現優良,嘉獎2次,朝人字第 0930204400號,April 19, 2004。
  • 【2004】辦理2003年中華民國風險管理學會年會暨學術研討會表現優良,嘉獎乙次,朝人字第 0930058400號,Feb. 10, 2004。
  • 【2000】協助朝陽科技大學九二一地震災後復建工作,列入教師個人申請升等服務部份紀錄,(89) 朝人字第0233號,March 08, 2000。
  • 【1999】參加辦理「八十八年度技職博覽會」,配合宣傳朝陽科技大學,使活動圓滿完成,嘉獎乙次,(88)朝人字第1401號,並列入教師個人申請升等服務部份紀錄,Dec 1999。

類別 國家 專利名稱 專利號碼 專利發明人 專利權人 專利期間 計畫編號
新型 台灣 行動服務廣播系統 新型第M561967號 陳金鈴、江茂綸、李金鳳、吳彥青 朝陽科技大學 2018年6月11日至2026年7月13日 NSC 95 - 2221 - E - 324 - 022

A. 科技部 /國科會計畫

  • 【2022-2024】基於深度學習技術之影像篡改偵測定位與復原的浮水印影像認證研究(Research on Watermark Image Authentication Based on Deep Learning Technology for Image Tampering Detection, Localization and Recovery) 111/08/01-112/07/31 (MOST 111-2221-E-324 -0019-MY2-),計畫主持人,第1年850,000/ 第2年845,000元,總經費共NT 1,695,000 (2022/08/01~2024/07/31)。
  • 【2020-2021】基於動態視窗的像素值排序技術之高嵌入能力可逆信息隱寫術(High embedding-capacity reversible information steganography based on pixel value ordering technology using dynamic windowing),109學年度科技部,109/08/01-111/01/31 (展延半年,MOST 109-2221-E-324-022-),計畫主持人,經費NT 1,034,000。
  • 【2019-2020】基於像素值排序技術之高資訊負載量可逆式資訊隱寫技術研究(Research on Reversible Information Steganography Based on Overlapping Pixel Value Ordering Predictors),108學年度科技部,108/08/01-109/07/31 (MOST 108-2221-E-324-014-),計畫主持人,經費NT 872,000。
  • 【2017-2019】多重掩護影像之高資訊負載量可逆式隱寫偽裝機制研究 (Study of High Payload Reversible Data Hiding for Multi-Steganographic Images) 106-107學年度科技部,106/08/01-108/07/31 (MOST 106-2221-E-324 -006 -MY2-),計畫主持人,第1年790,000/ 第2年815,000元,總經費共NT 1,510,000 (2017/08/01~2019/07/31)。
  • 【2016-2017】一般化多重粒度的像素排序與預測誤差擴張法之高藏量可逆式資訊隱藏機制 (High-Capacity Generalized Pixel Value Ordering and Prediction Error Expansion Reversible Data Hiding with Multi-Granularity) 105學年度科技部,105/08/01-106/07/31 (MOST105-2221-E-324-014-),計畫主持人,經費NT 607,000 (2016/08/01~2017/07/31)。
  • 【2015-2016】基於開採修改方向法暨多維度直方圖位移修改法之高資訊負載量暨無損失真之隱寫偽裝術 (High Payload Lossless Steganography with Reversible Exploiting Modification Direction and Multi-dimensional Histogram-Shifting-Modification Methods) 104學年度科技部,104/08/01-105/07/31 (MOST104-2221-E-324 -013 -),計畫主持人,經費NT 586,000 (2015/08/01~2016/07/31)。
  • 【2014-2015】可逆式隱寫偽裝機制之數位影像反鑑識研究 (The Study of Anti-Forensics with Reversible Steganographic Data Embedding in Digital Images) 103學年度科技部,103/08/01-104/07/31 (MOST103-2221-E-324 -015 -),計畫主持人,經費NT 696,000 (2014/08/01~2015/07/31)。
  • 【2014-2017】三年期整合型計畫之子計畫四協同主持人。【註:總計畫名稱:「建構智慧安全之銀髮健康照顧服務系統-以朝陽科大銀髮園為例」】103-105學年度科技部,103/08/01-106/07/31 (2014/08/01~2017/07/31) (MOST 103-26432-E -324-001 –MY3) 建構智慧安全之銀髮健康照顧服務系統-以朝陽科大銀髮園為例 (提升私校研發能量專案計畫MOST103-2632-E-324-001-MY3),科技部,子計畫四協同主持人,金額: 14,295,000(科技部補助11,436,000,學校自籌款2,859,000)。
  • 【2014-2015】16位元深度DICOM醫療影像之可逆式資訊隱藏技術研究 ,103學年度科技部,103/08/01-104/07/31 (MOST103-2221-E-324-014-)共同主持人2014/08/01~2015/07/31。
  • 【2012-2014】以線性與非線性像素特徵導引可逆式資訊隱藏之偽裝安全機制研究 (The Study of Reversible Information Hiding for Steganographic Security on the Basis of Predictions in the Pixel Characterics of Linear and Non-linear) (1/2)及(2/2),101-102學年度國科會,101.08~103.07 (2012/08/01~2014/07/31) (NSC101-2221-E-324-006-MY2) ,計畫主持人,經費NT 637,000 (2012/08/01~2014/07/31)及經費NT  637,000 (2012/08/01~2014/07/31),101及102學年度核定金額合計總經費NT 1,274,000。
  • 【2012-2013】可回復影像完整性保障技術之研究(Research on reversible image integrity protection techniques),2012.08.01 至 2013.07.31(2012/08/01~2013/07/31) ,計畫主持人:靜宜資管胡育誠教授,計畫共同主持人:靜宜資工羅峻旗助理教授及朝陽科技大學資管李金鳳教授,(NSC 101-2221-E-126 -014 )及101學年度核定金額:NT  566,000。
  • 【2010-2013】子計畫五-以雲端運算發展智慧健康照護服務模式(三年期整合型計畫)。計畫主持人:朝陽資管王淑卿教授,計畫協同主持人:朝陽資通系江茂綸、朝陽資管系李金鳳 (國科會99年度補助私立大學校院發展研發特色專案)經費NT人事費140,000+雜支費100,000+第一年設備費153,000=393,000;人事費140,000+雜支費140,000+第二年設備費135,000=415,000;人事費140,000+雜支費150,000+第三年設備費120,000=410,000【註:總計畫-以綠能無線感測網路為基礎之智慧型健康監測與照護系統研究。三年計畫經費共 393,000+415,000+410,000 = 1218, 000NT;執行起迄: 20100801~20130731;核定總金額: 8,870,000 元 ; 99年度核定金額: 2,70,000 元】
  • 【2010-2012】適應性多餘空間漸減之可逆式資訊隱藏安全機制研究-提升資訊藏量與色度逼真度(1/2)及(2/2) (Extra-space-free Adaptive Reversible Information Hiding in Data-safe, Higher Embedding Capacity-and-Fidelity),99-100學年度國科會,99.08~101.07 (2010/08/01~2012/07/31) (NSC 99-2221-E-324 -040 -MY2) ,計畫主持人,經費NT 625,000 (2010/08/01~2011/07/31)及經費NT 602,000 (2011/08/01~2012/07/31),99-100學年度合計總經費NT 1,227,000。 【註:學校的編號是99D077】
  • 【2010-2012】影像解馬賽克與索引類型彩色影像縮放之研究(1/2)及(2/2)( Researches on Image Demosaicking and Image Zooming for Indexed Color Iimages),99-100學年度國科會,99.08~101.07 (2010/08/01~2012/07/31) (99-2221-E-126-004-MY2) ,計畫主持人:靜宜資管胡育誠教授,計畫共同主持人:靜宜資工羅峻旗助理教授及朝陽科技大學資管李金鳳副教授,經費NT 615,000 (2010/08/01~2011/07/31)及經費NT 580,000 (2011/08/01~2012/07/31),99-100學年度合計總經費NT  1,195,000。
  • 【2009-2010】高偽裝影像品質與高機密訊息藏量之可逆式與不可逆式資訊隱藏技術研究(The Study of Revisable and Irreversible Data Hiding Mechanisms with High Steganographic Image Quality and High Embedding Capacity) 98學年度國科會,98.08~99.07(2009/08/01 ~ 2010/07/31) (NSC 98 - 2221 - E - 324 - 020 -),計畫主持人,98學年度經費NT650000。校內編號:98D060
  • 【2009-2010】可調適性影像縮放與解馬賽克之研究,98.08~99.07 (2009/08/01 ~ 2010/07/31)(NSC 98-2221-E-126-008-),計畫主持人:靜宜資管胡育誠教授,計畫共同主持人:靜宜資工羅峻旗助理教授及朝陽科技大學資管李金鳳副教授,經費NT650000。
  • 【2006-2007】利用資料探勘技術加速行動計算環境下使用者服務需求的智慧型預取機制(Exploiting Data Mining to Design an Intelligent Prefetching Mechanism for Enhancing Mobile Users Service Requests in Mobile Computing Environment),95學年度國科會95.08~96.07(2006.08.01~2007.07.31)(NSC 95 - 2221 - E - 324 - 022 -),計畫主持人,經費NT 433,000。
  • 【2005-2006】設計一個有效率的漸進式空間關聯探勘方法以挖掘改變顯著的空間語義規則(Discovery of Significant Rule Changes based on an Efficiently Incremental Spatial Association Mining),94學年度國科會94.08~95.07 (2005.08.01 至 2006.07.31) (NSC 94 - 2213- E - 324 - 006) ,計畫主持人,經費NT 406000。
  • 【2004-2005】適用於大型資料庫之探勘關聯法則效率改善之研究(Research for Improving the Efficiency of Association Mining on Large Databases),93學年度國科會93.08~94.07 (2004.08.01 至 2005.07.31) (NSC 93 - 2213 - E - 324- 015) ,計畫主持人,經費NT 352400。
  • 【2004-2005】原生XML資料庫關聯規則探勘方法與壓縮技術之研究(2/2) (Design Association Rules Mining Method and Compression Technique for Native XML Databases(2/2)),93學年度國科會93.08~94.07 (2004.08.01 至 2005.07.31) (NSC 93 - 2213 - E -3 24 - 006),計畫主持人,經費NT 388400。
  • 【2003-2004】原生XML資料庫關聯規則探勘方法與壓縮技術之研究(1/2) (Design Association Rules Mining Method and Compression Technique for Native XML Databases(1/2)),92學年度國科會92.08~93.07 (2003.08.01 至 2004.07.31) (NSC 92-2213-E-324-028),計畫主持人,經費NT 496,000。
  • 【2002-2003】適於大型空間資料庫知識挖掘的有效漸進式方法之設計(A Design of Progressive Refinement Approach for Mining of Spatial Data),91學年度國科會91.08~92.07 (2002.08.01 至 2003.07.31) (NSC91-2213-E-324-006),計畫主持人,經費NT422,400。
  • 【2001-2002】加速資料倉儲中綜整查詢效率的智慧型實體化視域預取機制之設計(A Design of Intelligent Materialized Views Prefetching Mechanism for Enhancing Summary Queries on Data Warehouses),90學年度國科會90.08~91.07 (2001.08.01 至 2002.07.31) (NSC90-2213-E-324-006),計畫主持人,經費NT 449,700。
  • 【2000-2001】以廣義化之資料探勘方法設計物件導向資料庫壓縮之研究(Object-oriented Database Compression with Data Mining Methods of Generalization), 89學年度國科會89.08~90.07 (2000.08.01 至 2001.07.31) (NSC 89-2213-E-324-034),計畫主持人,經費NT281,900。
  • 【2000-2001】多處理器資料庫系統中利用CR-Property處理多重查詢排程之研究(A C-R Property Approach for Multiple-query Scheduling in Multi-processor Database Systems),89學年度國科會89.08~90.07 (2000.08.01 至 2001.07.31) (NSC89-2218-E-324-004),計畫主持人:朝陽科技大學資管羅有隆副教授,共同主持人:朝陽科技大學資管李金鳳副教授,經費NT 311,600。
  • 【1998-1999】適於複雜空間圖像的相似性擷取之索引設計 (A Design of Iconic Indexing Scheme for Similarity Retrieval of Complex Spatial Objects), 88學年度國科會88.08~89.07 (1998.08.01 至 1999.07.31) (NSC 88-2218-E-324-006),計畫主持人,經費NT 130,300。

B. 教育部計畫

  • 【2018-2022】107-111年度教育部數位學伴計畫主持人。
  • 【2022】111學年教育部教學實踐研究計畫「有朋自遠方來不亦樂乎---以推動數位學習EMI課程之服務學習為例」之共同計畫主持人。
  • 【2021】110學年教育部教學實踐研究計畫「學而時習之不亦說乎---以推動「數位學習」課程之服務學習為例」之共同計畫主持人。

C. 朝陽科大校內外建教/產學計畫

  • 【2020】「可視化平台建置」,民國109年6月01日~民國110年02月28日,經費NT 200,000。計畫主持人:李金鳳,共同主持人:江茂綸,執行單位:朝陽科技大學,補助或委託機構:工研院。
  • 【2018】108年度「鄉政營造展示網頁建置」,民國108年11月01日~民國108年12月31日,經費NT 98,000。【註】計畫主持人:江茂綸,共同主持人:李金鳳,執行單位:朝陽科技大學,補助或委託機構:嘉義縣水上鄉公所。
  • 【2022】教育部「111年 數位學伴計畫」,自民國111年01月01日起至民國111年12月31日,計畫主持人, 經費NT 2,429,444元
  • 【2021】教育部「110年 數位學伴計畫」,自民國110年01月01日起至民國110年12月31日,協同計畫主持人, 經費NT 2,000,000。
  • 【2020】教育部「109年 數位學伴計畫」,自民國109年01月01日起至民國109年12月31日,協同計畫主持人, 經費NT 2,000,000。
  • 【2019】教育部「108年 數位學伴計畫」,自民國108年01月01日起至民國108年12月31日,協同計畫主持人, 經費NT 2,000,000。
  • 【2018】教育部「107年 數位學伴計畫」,自民國107年01月01日起至民國107年12月31日,協同計畫主持人, 經費NT 2,000,000。
  • 【2015-2016】朝陽科技大學校級重點發展計畫總計畫「發展銀髮樂活(A Development of LOHAS for Seniors)」自民國104年08月01日起至民國105年7月31日止經費NT $5,991,614 (子計畫二「建構銀髮族生活照顧通報系統」 的協同計畫主持人,子計畫經費NT 2,011,538)
  • 【2015】「朝陽銀髮園服務模式發展計畫」105年1月1日起至民國 106 年1 月31日止,承辦單位:朝陽科技大學,執行單位:管理學院,擔任職務:協同主持人計畫代號:6653。
  • 【2014】「視覺創藝產學合作計畫」,民國103年02月17日~民國103年05月19日,經費NT 50,000。【註】計畫主持人:李金鳳,承辦單位:朝陽科技大學,執行單位:資訊管理系,補助或委託單位:季萌小舖。May 2014。
  • 【2011】「S1-1落實教學品保」計畫,100學年度第2學期辦理「精進教學品保與課程改善歷程」,參與100-2學期「精進教學品保與課程改善歷程」課程,民國100年4月01日~民國100年11月15日,經費NT 15000。【註】計畫主持人:李金鳳。March 2012。承辦單位:朝陽科技大學,執行單位:資訊管理系,補助或委託單位:朝陽科技大學
  • 【2011】100年度「食在人為紅不讓線上訂餐系統建置」,民國100年01月15日~民國100年07月15日,經費NT 100,000。【註】計畫主持人:李金鳳,共同主持人:陳榮昌,執行單位:資訊管理系,補助或委託機構:高雄軟體科技園區台灣優奎士有限公司。
  • 【2009】97年度「臺北縣政府人民申請案件暨研考資訊管理系統規劃及監督審驗」,民國97年10月01日~民國98年02月15日,經費NT 5,550,000。【註】計畫主持人:梁錫卿,專案成員:王淑卿、羅有隆、李金鳳,執行單位:資訊管理系,補助或委託機構:臺北縣政府。
  • 【2008】97年度朝陽科技大學專題研究計畫「整合影像處理與資料探勘技術應用於行動購物之研究」,計畫主持人,民國97年5月01日~民國97年10月15日,經費NT 60000,核銷代號為4903C,補助或委託機構:朝陽科技大學。
  • 【2008】97年度朝陽科技大學中長程校務發展計畫之行動方案「打造優異教學課程及環境之資訊隱藏研究與應用」,共同主持人,計畫執行期:自民國 97 年 3 月 1 日起至民國 97 年 11 月 30 日止,經費NT 1000000。【註】計畫主持人:唐元亮,此計畫之共同主持人:曾顯文、洪國龍、呂慈純、薛夙珍、李金鳳,執行單位:資訊管理系,補助或委託機構:朝陽科技大學。
  • 【2007】96年度朝陽科技大學教學卓越計畫「P1-2創新教學行動研究社群」,計畫主持人,民國96年12月01日~民國97年4月30日,經費NT 50000。【註】此計畫之共同主持人:唐元亮、曾顯文、洪國龍、呂慈純、薛夙珍,執行單位:資訊管理系,補助或委託機構:朝陽科技大學。
  • 【2007】96學年度朝陽科技大學中長程校務發展計畫之行動方案「精進教學品質發展策略:擴展主動積極的卓越教學」,民國96年8月01日~民國97年7月31日,執行單位:資訊科技研究所,計畫主持人,經費NT 428,000,補助或委託機構:朝陽科技大學。
  • 【2006】95學年度朝陽科技大學教學卓越計畫─「T1-1教師教學專業社群工作坊」,96年1月11日~民國96年4月30日,計畫主持人 (共同主持人:李麗華、李富民),經費NT 50000,補助或委託機構:朝陽科技大學。
  • 【2004】亞太地區多國教育聯盟暨經濟產業發展國際研討會計畫(The Project of Asia-Pacific Multinational Education Alliance and International Conference on Economics and Business Development),協同主持人,協助計畫整體之推動事宜。93年度教育部補助技專校院辦理國際合作與交流計畫,計畫期程93年 4 月 1 日 至 93 年 12 月 15 日,經費NT 1,347,200。【註】此為跨校整合型計畫,計畫總主持人:陳建勝。國內共同參與機構:朝陽科技大學、高雄第一科技大學、台中技術學院。國外交流機構:澳洲邦德大學、澳洲坎培拉大學、越南國立河內大學、馬來西亞南方學院、馬來西亞韓江學院、韓國國立順天大學,補助或委託機構:教育部。
  • 【2003】王志實業股份有限公司--進銷存管理系統(OZE Invoicing System), 92學年度建教合作計畫民國 92 年 05 月 09 日起至民國 93 年 05月 31日止 (UT92_DPTC5_0_004),計畫主持人,經費NT110000,補助或委託機構:王志實業股份有限公司
  • 【2002】透過智慧型代理人以資料探勘技術整合分散式資料庫綱要之研究,朝陽科技大學2002.01.01 至 2002.11.30 (CYUT91-M-007) ,計畫主持人,經費NT88,000,補助或委託機構:朝陽科技大學。

  • 【1998】網路書店資訊管理系統 (1998/11/01-1999/06/30 李彥輝等五員)
  • 【1997】管理資訊系統應用於產品生命週期評估之研究 (1999/7/01-2000/2/28林志豪等五員)

http://www.journal-database.com/journal/journal-of-the-chinese-institute-of-engineers.html

working: 思婷, 郁樺, 妮妮、 曾群丰、石家碩、底亞峰connection science submission July25, 2020.(IF=1.042)

張真誠老師的著作等身 https://www.iecs.fcu.edu.tw/en/teacher/alan3c/

(一) 國際期刊論文

  • Chin-Feng Lee1, * Kuo-Chung Chan “Improve Image Quality of Dual-image Reversible Data Hiding Based on Translocation and Switching Strategy,” Computer Systems Science and Engineering, Vol.44, No.2, pp. 1551-1566, 2023, DOI:10.32604/csse.2023.026294. (SCIE, SCOPUS, IF=1.49 (2021), JCR=1165/1753=66.45% ) ISSN (print): 0267-6192
  • Chin-Feng Lee*, Hua-Zhe Wu, (2021) “High-capacity and high-quality reversible data hiding method using recurrent round-trip embedding strategy in quotient image,” Applied Sciences-Basel (Appl. Sci.), vol. 11, Issue 21, pp.10157 Oct. 29, 2021 (SCIE, SCOPUS, IF=2.679(2021), JCR=766/1676=45.7% )(ISSN: 20763417) Appl. Sci. 2021, 11(21), 10157; https://doi.org/10.3390/app112110157 Received: 6 September 2021 / Revised: 27 October 2021 / Accepted: 27 October 2021 / Published: 29 October 2021
  • Chin-Feng Lee*, Chi-Yao Weng, Chih-Hung Wang, Goutam Chakraborty, Kouichi Sakurai, and Kuo-Yu Tsai (2021) "Research on Multimedia Application on Information Hiding Forensics and Cybersecurity," International Journal of Network Security (IJNS) Vol. 23, No. 6, 2021, pp. 1093-1107. [Ei Compendex] ISSN 1816-353X (Print) / ISSN 1816-3548 (Online)
  • Chin-Feng Lee, Chin-Chen Chang*, Zhi-Hui Wang & Ya-Feng Di (2021): "A High Robust and Blind Image Watermarking Using Arnold Transform Mapping in the DCT Domain of YCbCr Color Space," Journal of Network Intelligence (JNI), vol. 6, no. 3, pp.624-636, August 2021. [JNI is indexed by EI, Scopus and DBLP] ISSN: 2414-8105 (Online)
  • Chin-Feng Lee, Jau-Ji Shen*, Somya Agrawal*, and Yen-Hsi Li (2021): "High-Capacity Embedding Method Based on Double-Layer Octagon-Shaped Shell Matrix," Symmetry 2021, 13(4), 583, 1 April 2021; doi:10.3390/sym13040583. (SCIE, EI, SCOPUS; IF=2.313(2019); Publisher:Multidisciplinary Digital Publishing Institute (MDPI); Country:Switzerland, ISSN:2073-8994; JCR= Q2 (Multidisciplinary Sciences)
  • Chin-Feng Lee, Jau-Ji Shen*, Yi-Jhen Wu, & Somya Agrawal*. (2020). PVO-Based Reversible Data Hiding Exploiting Two-Layer Embedding for Enhancing Image Fidelity. Symmetry, 12(7), pp.1164, 2020. ; https://doi.org/10.3390/sym12071164 Received: 15 June 2020 / Revised: 3 July 2020 / Accepted: 6 July 2020 / Published: 13 July 2020 (SCIE)
  • Jau-Ji Shen, Chin-Feng Lee*, Fang-Wei Hsu, and Somya Agrawal (2020):"A Self-Embedding Fragile Image Authentication Based on Singular Value Decomposition, " Multimedia Tools and Applications, 79, pp. 25969–25988(SEPT. 2020) (SCIE, EI, SCOPUS; IF= 2.313(2019); JCR=698/1676=41.65% (ISSN 13807501, 15737721) Published: 08 July 2020 https://doi.org/10.1007/s11042-020-09254-1
  • Chin-Feng Lee*, Chin-Chen Chang, Guan-Long Li (2020): "A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images," KSII Transactions on Internet and Information Systems, vol. 14, no. 6, pp. 2554-2575, June 30, 2020. DOI: 10.3837/tiis.2020.06.013. (SCIE, SCOPUS, IF= 0.858 (2021), SJR =199/298=66.77% [Q3 ]
  • Hsing-Yu Hou*, Yu-Lung Lo, Chin-Feng Lee* (2020): "Predicting Network Behavior Model of e-learning Partner Program in PLS-SEM," Special Issue "Emerging Artificial Intelligence (AI) Technologies for Learning", Applied Sciences (Appl. Sci.) 10(13), 4656, 6 July 2020; https://doi.org/10.3390/app10134656 (SCIE, SCOPUS, IF=2.67(2021), JCR=766/1676=45.7% )(ISSN: 20763417)
  • Hsing-Yu Hou*, Somya Agrawal, and Chin-Feng Lee (2020): “Computational Thinking Training with Technology for Non-Information Undergraduate,” Thinking Skills and Creativity. 38:100720. (SSCI, SCOPUS, IF 2.068 ) ISSN: 1871-1871; Pub Date : 2020-12-01, Netherlands DOI: 10.1016/j.tsc.2020.100720
  • Lee, Chin-Feng and Ying-Xiang Wang (2020) “Secure Image Hiding Scheme Based on Magic Signet,” Journal of Electronic Science and Technology (JEST), Vol.18, No. 1, pp. 93- 101, March 2020. DOI: 10.11989JEST.1674-862X.80206200, ISSN: 1674-862X. (Ei INSPEC , Scopus) SJR =1554/1676=92.72% [Q4 ])
  • Lee, Chin-Feng, Jau-Ji Shen, Somya Agrawal*, Ying-Xiang Wang and Yen-Hsi Lee (2020): " Data Hiding Method Based on 3D Magic Cube," IEEE ACCESS, Vol.8, pp. 39445- 39453, Feb. 25, 2020. DOI: 10.1109/ACCESS.2020.2975385. (SCI, EI, Scopus) Impact factor:3.745 (2019) (Print ISSN: 2169-3536; Online ISSN: 2169-3536). (SJR Rank=385/1676=22.97% [Q1 ])
  • Qiu, Guohua, Lee, Chin-Feng, Chang, Chin-Chen* (2020): “Turtle-shell Data Embedding Method with High Image Fidelity,” International Journal of Embedded Systems, accepted on Feb. 06, 2020. (EI Compendex, Scopus, Emerging Sources Citation Index)
  • Qiu, Guohua, Lee, Chin-Feng, Chang, Chin-Chen* (2020): “Greedy Algorithm for Image Quality Optimization Based on Turtle-Shell Steganography,” International Journal of Computational Science and Engineering, Vol. 23, No. 1, pp. 50-62, August 15, 2020. (EI Compendex, Scopus, Emerging Sources Citation Index)
  • Chin-Feng Lee, Jau-Ji Shen, Somya Agrawal*, Yu-Ju Tseng, and Yu-Chi Kao (2020): "A generalized pixel value ordering data hiding with adaptive embedding capability," Journal of Supercomputing, 76, 2683–2714 (April 2020). https://doi.org/10.1007/s11227-019-03052-9 . SCI, SCIE, EI, Scopus ; Impact factor: 2.157 SJR Rank=742/1676=44.27% [Q2]), ISSN: 15730484, 09208542
  • Jian-Jun Li, Chin-Feng Lee, Chin-Chen Chang*, Jiang-Yi Lin, and Yun-He Wu (2019): "Reversible Data Hiding Scheme Based on Quad-tree and Pixel Value Ordering" IEEE ACCESS, Vol. 7 , pp. 142947- 142962, Oct. 11, 2019. DOI: 10.1109/ACCESS.2019.2941500. (SCI, EI, Scopus) Impact factor:3.745 (2019) (Print ISSN: 2169-3536; Online ISSN: 2169-3536). (SJR Rank=385/1676=22.97% [Q1])
  • Chin-Ling Chen, Yue-Xun Chen, Chin-Feng Lee, Yong-Yuan Deng, CHI-HUA CHEN* (2019): "An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems" IEEE ACCESS, Vol. 7 , pp. 148472- 148484, Oct. 24, 2019. DOI: 10.1109/ACCESS.2019.2946969. (SCI, EI, Scopus) IF=3.745 (2019) (Print ISSN: 2169-3536; Online ISSN: 2169-3536). (SJR Rank=385/1676=22.97% [Q1])
  • Chin-Ling Chen, Dong-Peng Lin, Hsing-Chung Chen*, Yong-Yuan Deng*, and Chin-Feng Lee* (2019): “Design of a Logistics System with Privacy and Lightweight Verification,” Energies 2019, 12(16), 3061; DOI: https://doi.org/10.3390/en12163061, [SCIE, EI, Scopus; Impact factor: 2.707(2018), Q3, Energy & Fuels, Rank=56/103]. Energies 2019, Volume 12, Issue 16; DOI: 10.3390/en12163061, Published: 8 August 2019
  • Lee, Chin-Feng, Weng, Chi-Yao*, and Kao, Cheng-Yu (2019): “Reversible Data Hiding using Lagrange Interpolation for Prediction-error Expansion Embedding, Soft Computing, Vol. 23, Issue 19, pp. 9719–9731, October 2019, (No.SOCO-D-17-00899), ISSN: 1432-7643 (Print) 1433-7479 (Online)( SCI, EI, Scopus; IF= 2.988 (2019); SJR Rank=431/1676=25.71%[Q2]) https://doi.org/10.1007/s00500-018-3537-7
  • Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen, and Somya Agrawal* (2019):"Self-Embedding Authentication Watermarking with Effective Tampered," Sensors, Vol. 19, No. 10, pp. 2267-2284, DOI: 10.3390/s19102267[SCIE, EI, Scopus (Q2); SJR=0.592; SJR Rank=747/1511=49.43% , IF= 2.745; ISSN: 14243210, 14248220.
  • Chin-Feng Lee, Jau-Ji Shen, Yu-Chi Kao, and Somya Agrawal (2019): "Overlapping pixel value ordering predictor for high-capacity reversible data hiding," (RTIP-D-18-00418R1) Journal of Real-Time Image Processing, Vol. 16, No. 4, pp. 835–855, August 2019. https://dl.acm.org/doi/abs/10.1007/s11554-019-00872-z ( SCIE, EI, Scopus (Q2); SJR=0.366; SJR Rank=711/1511= 47.05%; IF= 1.574) ISSN: 18618200, 18618219.
  • Lee, Chin-Feng, Jau-Ji Shen*, Kun-Liang Hou, Fang-Wei Hsu (2019): “A High-performance Computing Method for Photographic Mosaics upon the Hadoop Framework,” Journal of Internet Technology (JIT), Vol. 20, No.5, pp. 1343-1358, Sept. 2019. SCIE, Scopus (Q3); SJR = 0.235; SJR Rank=998/1511=66.04%; IF= 1.04; ISSN 1607-9264.
  • Lee, Chin-Feng, *Chang, Chin-Chen, Xie, Xiaozhu, Mao, Ke, and Shi, Run-Hua (2018) “An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes,” Displays, Vol. 53, pp. 30-39, July 2018. SCI, SCOPUS(Q2), SJR Rank=943/5561=16.96%; Impact factor =1.42).
  • *Lee, Chin-Feng, Yi-Jia Wang, S. C. Chu, and J. F. Roddick (2018): “An Adaptive Content-Based Image Retrieval Method Exploiting an Affine Invariant Region Based on a VQ-applied Quadtree Robust to Geometric Distortions,” Journal of Network Intelligence (JNI), vol.3, no.3, pp. 214-234, August 2018. [JNI is indexed by EI, Scopus and DBLP] ISSN: 2414-8105 (Online)
  • *Lee, Chin-Feng, Ya- Chen Li, Shu-Chuan Chu, and John F. Roddick (2018): “Data Hiding Scheme Based on a Flower-Shaped Reference Matrix,” Journal of Network Intelligence (JNI), Vol. 3, No. 2, pp. 138-151, May 2018. [JNI is indexed by EI, Scopus and DBLP] ISSN: 2414-8105 (Online)
  • Li, Jian-Jun, Wu, Yun-He, Lee, Chin-Feng, and *Chang, Chin-Chen (2018) “Generalized PVO-K Embedding Technique for Reversible Data Hiding,” International Journal of Network Security, Vol.20, No.1, PP.65-77, Jan. 2018 (DOI: 10.6633/IJNS.201801.20(1).08). (EI)(第3作者) (words: 9711) (IF=1.68)
  • Chan, Yung-Kuan, Hsieh, Ming-Yuan*, Lee, Chin-Feng, Huang, Chih-Cheng, and Ho, Li-Chih (2017): "Inquiring the most critical teacher’s technology education competences and in the highest efficient technology education learning organization," Eurasia Journal of Mathematics, Science & Technology Education, Vol.13, No.6, pp. 2645–2664, June 2017. SSCI, SCOPUS, Google Scholar (第3作者), IF= 0.9032(2018), SJR Rank= 76/224 Subject Categories: EDUCATION & EDUCATIONAL RESEARCH
  • Lee, Chin-Feng, *Weng, Chi-Yao, and Chen, Kai-Chin (2017): “An Efficient Reversible Data Hiding with Reduplicated Exploiting Modification Direction using Image Interpolation and Edge Detection,” MULTIMEDIA TOOLS AND APPLICATIONS, Volume 76, Issue 7, pp 9993–10016, April 2017. (SCI) Impact Factor1.331, ISSN: 1380-7501 (Print) 1573-7721 (Online) (words: 9394) First Online: May 19, 2016. DOI: 10.1007/s11042-016-3591-z
  • Lee, Chin-Feng, *Weng, Chi-Yao, and Li, Kuan-Ting (2017) “VQ-based Image Embedding Scheme Using Adaptive Codeword Grouping Strategy” JOURNAL OF INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, Vol. 8, No. 1, pp. 54-67, January 2017 (Sept 10, 2016) (在2018年以前為EI期刊) . (words: 6104)
  • Mao, Ke, *Lee, Chin-Feng, Chang, Chin-Chen, Shi, Run-Hua (2017): "Study of Difference-Expansion Embedding Schemes," Journal of Electronic Science and Technology (JEST),VOL. 15, NO. 3, pp. 211-216, 2017/9. (words: 3561). (indexed by Ei INSPEC,scopus)
  • Lee, Chin-Feng, *Weng, Chi-Yao, Sharma, A.(2016), “Steganographic access control in data hiding using run-length encoding and modulo-operations,” Security and Communication Networks, 9 (2), pp. 139-148. SCOPUS ( John Wiley and Sons Inc.) .
  • Di, Ya-Feng, Lee, Chin-Feng, Wang, Zhi-Hui, *Chang, Chin-Chen, Li, Jianjun (2016), “A Robust and Removable Watermarking Scheme Using Singular Value Decomposition,” KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS (KSII T Internet Info), Vol. 10, No. 12, pp. 5831-5848, Dec. 2016 December 31, 2016. (indexed in SCIE (Thomson Reuters) and SCOPUS (Elsevier) (words: 9711) [Impact Factor: IF] by Thomson Reuters' Journal Citation Reports (JCR) as of June 2017: 0.452) ( DOI: 10.3837/tiis.2016.12.008) (eISSN: 1976-7277)
  • Lee, Chin-Feng, *Chang, Chin-Chen, Pai, Pei-Yan, and Liu, Chia-Ming (2015) "Adjustment Hiding Method Based on Exploiting Modification Direction,” International Journal of Network Security. Vol. 17, No. 5, September 2015, pp. 607-618. ISSN 1816-353X (Print)ISSN 1816-3548(Online) (EI期刊) (IF=1.68) http://dblp.uni-trier.de/db/journals/ijnsec/ijnsec17.html#LeeCPL15
  • Lee, Chin-Feng, *Chang, Chin-Chen, Pai, Pei-Yan, and Liu, Chia-Ming(2015), “An Adjustable and Reversible Data Hiding Method Based on Multiple-base Notational System without Location Map,” Journal of Information Hiding and Multimedia Signal Processing, Volume 6, Number 1, January 2015(ISSN 2073-4212)
  • *Lee, Chin-Feng and Yu-Lin Huang (2013), “Reversible data hiding scheme based on dual stegano-images using orientation combinations,” Telecommunication Systems, April 2013, Volume 52, Issue 4, pp 2237–2247 (SCIE期刊,IF=1.527)DOI: 10.1007/s11235-011-9529-x (SCOPUS)
  • Chang, Ya-Ting, Huang, Cheng-Ta, Lee, Chin-Feng, and Wang, Shiuh-Jeng* (2013): “Image Interpolating based Data Hiding in Conjunction with Pixel-shifting of Histogram,” Journal of Supercomputing, Vol.66, Issue 2, pp.1093–1110, Published online: 1 November 2013.( Publisher: Springer US) Print ISSN:0920-8542, Online ISSN:1573-0484 Digital Object Identifier: 10.1007/s11227-013-1016-6 (http://link.springer.com/article/10.1007%2Fs11227-013-1016-6 ) (SCI/EI) Year:2012, Impact Factor [Impact Factor: 0.917] ,Total Articles: 224, Total Cites: 580.
  • Lee, Chin-Feng* and Shih, Ming-Chi (2013): “A Lossless Data Hiding Scheme Based on VQ Index Coding,” Journal of Electronic Science and Technology (JEST), VOL. 11, NO. 1, pp.27-32, MARCH 2013. (EI; Scopus, Google Scholar, INSPEC,etc) (words: 27013) ISSN: 1674-862X
  • Wang, Zhi-Hui, Lee, Chin-Feng*, and Chang, Ching-Yun (2013): “Histogram-Shifting-Imitated Reversible Data Hiding,” Journal of Systems and Software, Vol. 86, Issue 2, Pages 315-323, February 2013. (SCI, EI) (words: 5209) Digital Object Identifier: 10.1016/j.jss.2011.02.029 (ISSN: 0164-1212) [Impact Factor: 1.135(2013); 5-Year Impact Factor: 1.322 (2013)] (COMPUTER SCIENCE, SOFTWARE ENGINEERING)(36/86 = 41.86%); (COMPUTER SCIENCE, THEORY & METHODS)(34/84 = 40.48%)
  • Lee, Chin-Feng* and Chen, Hsing-Lin (2012): “Adjustable Prediction-based Reversible Data Hiding,” Digital Signal Processing, Vol. 22, No. 6, pp. 941-953, June 2012. (SCI, EI) [Impact Factor: 1.918] (words: 7031) http://dx.doi.org/10.1016/j.dsp.2012.05.015 ISSN: 1051-2004 [Impact factor: 1.918 (2012); 5-Year Impact Factor:1.871 (2012)] Subject Categories: ENGINEERING, ELECTRICAL & ELECTRONIC
  • Lee, Chin-Feng*, Li, Kuan-Ting and Dushyant Goyal (2012): “High Capacity Lossless VQ Hiding with Grouping Strategy,” Recent Progress in Data Engineering and Internet Technology, Lecture Notes in Electrical Engineering, 2012, Volume 157, pp. 203-209, DOI: 10.1007/978-3-642-28798-5_28. SpringerLink Publication Date: April 1, 2012, ISBN-10: 3642287972, ISBN-13: 978-3642287978. (http://www.springerlink.com/content/m631253470724764/)
  • Lee, Chin-Feng, Chien, Hung-Yu*, and Laih, Chi-Sung (2012); “Server-less RFID Authentication and Search Protocol with Enhanced Security,” International Journal of Communication Systems (INT J COMMUN SYST), Vol.25, No.3, March2012, pp.376-385 (SCI) (words: 6498) Digital Object Identifier: 10.1002/dac.1246 http://onlinelibrary.wiley.com/doi/10.1002/dac.1246/epdf ISSN: 1074-5351 (printed) ; SSN:1099-1131 (electronic) [Impact factor:] 1.106 (2013), 0.712 (2012), 0.406 (2011). 0.317(2009).
  • Lee, Chin-Feng, Chien, Hung-Yu*, Lai, Chi-Sungh and Chen, Chi-Sheng (2012): “On the Security of Several Gen2-based Protocols without Modifying the Standards," Journal of the Chinese Institute of Engineers. Vol.35, Issue 4, 2012, pages 391-399, 21 Mar 2012. (SCI, EI) (words: 4668) Digital Object Identifier:10.1080/02533839.2012.655898 ISSN: 0253-3839 [Impact factor: 0.241 (2014); 5-Year Impact Factor: 0.251(2012) ] [Ranking: 81 /90] Subject Categories: ENGINEERING, MULTIDISCIPLINARY
  • Lee, Chin-Feng* and Huang, Yu-Lin (2012) “An Efficient Image Interpolation Increasing Payload in Reversible Data Hiding,” Expert Systems With Applications, Vol. 39, Issue 8, Pages 6712–6719, 15 June 2012. (words: 4809) (SCI, EI) [IF= 1.854; 5-Year IF: 2.339 (2012)]ISSN: 0957-4174 http://www.sciencedirect.com/science/article/pii/S0957417411016903 Subject Categories: ENGINEERING, ELECTRICAL & ELECTRONIC; Total Journals in Category : 243; Journal Rankin Category: 56
  • Lee, Chin-Feng*, Chang, Chin-Chen, and Wu, Chun-Yu (2011): “A High Payload Multiple Embedding Scheme Based Reversible Data Hiding,” Journal of Computers, Vol. 22, No. 3, pp. 78-94, Oct. 2011. (EI Compendex) (words: 4965) ISSN: 1991-1599.
  • Lee, Chin-Feng* and Chen, Hsing-Lin (2011) “Reversible Data Hiding Based on Histogram Modification of Prediction-Error,” The Imaging Science Journal. Vol.59, No. 5, pp. 278-292, Oct. 2011.(SCI, EI) ISSN: 1368-2199(Print) ; ISSN: 1743-131X (Online); H Index: 10[Impact factor: 0.22 Ranking=10/11=0.9091] (words: 6819 ) http://dx.doi.org/10.1179/1743131X10Y.0000000018 Subject Categories : Atomic and Molecular Physics, and Optics; Computer Vision and Pattern Recognition
  • Lee, Chin-Feng*, Huang, Ying-Hsuan, Chang, Chin-Chen and Liu, Tien-Chung (2011): “A Prediction-Based Adaptive Reversible Data Embedding Scheme,” Journal of Software, Vol 6, No 9, pp.1813-1820, Sept. 2011. Digital Object Identifier: 10.4304/jsw.6.9.1813-1820 (EI Compendex) (JSW, ISSN 1796-217X) doi: 10.4304/jsw.6.9.1813-1820
  • Chang, Chin-Chen, Chen, Kuo-Nan, Lee, Chin-Feng* and Liu, Li-Jen (2011): “A Secure Fragile Watermarking Scheme Based on Chaos-and-Hamming Code,” Journal of Systems and Software, DOI: 10.1016/j.jss.2011.02.029. Vol. 84, Iss.9, pp. 1462-1470, Sept. 2011. (SCI, EI) Digital Object Identifier: 10.1016/j.jss.2011.02.029 (ISSN: 0164-1212) [Impact Factor: 1.241(2009); 5-Year Impact Factor: 1.312 (2009)] (COMPUTER SCIENCE, SOFTWARE ENGINEERING)(36/86 = 41.86%); (COMPUTER SCIENCE, THEORY & METHODS)(34/84 = 40.48%)(words: 4635)
  • Sun, Hung-Min, Weng, Chi-Yao, Lee, Chin-Feng*, Yang, Cheng-Hsing (2011) “Anti-forensics with Steganographic Data Embedding in Digital Images,” IEEE Journal on Selected Areas in Communications, Vol. 29, Iss. 7, pp. 1392 - 1403, August 2011. (SCI; EI) [IF= 4.249 (2009)] (words: 6466) Digital Object Identifier: 10.1109/JSAC.2011.110806 (ISSN: 0733-8716) Subject: Communication, Networking & Broadcasting
  • Lee, Chin-Feng* and Huang, Yu-Lin (2011): “Reversible Data Hiding Scheme Based on Dual Stegano-Images Using Orientation Combinations,” Telecommunication Systems Journal (Special issue on Wireless Multimedia Networks and Security Services), pp. 1-11. 14th July 2011. (SCI, EI) (words: 6482) Digital Object Identifier: 10.1007/s11235-011-9529-x Key: citeulike:9574264 ISSN: 1018-4864 (print) 1572-9451 (electronic) [Impact factor: 0.670; 5-Year Impact Factor: 0.597] [Ranking: 46 /80] Subject Categories: TELECOMMUNICATIONS
  • Lee, Chin-Feng* Chi-Yao Weng, and Aneesh Sharma (2011), “Steganographic Access Control in Data Hiding Using Run-length Encoding and Modulo-operations,” Security and Communication Networks, Vol. 6, No. 3, pp. 277-284, 16th June 2011. (SCI, EI) [IF= 0.356 (2011)] (words: 5719) Digital Object Identifier:10.1002/sec.333 (online ISSN: 1939-0122; print ISSN: 1939-0114 ) (Ranking: 113/126) Subject Category: Computer Science Information Systems
  • Lee, Chin-Feng*, Chen, Kuo-Nan, Chang, Chin-Chen and Tsai, Meng-Cheng (2011): “A Hierarchical Fragile Watermarking with VQ Index Recovery,” Journal of Multimedia, Vol 6, No 3, pp. 277-284, June 2011. Digital Object Identifier: 10.4304/jmm.6.3.277-284 (EI Compendex) (JMM, ISSN 1796-2048)
  • Chien, Hung-Yu*, Yang, Chia-Chuan, Wu, Tzong-Chen and Lee, Chin-Feng (2011): “Two RFID-based Solutions to Enhance Inpatient Medication Safety,” Journal of Medical Systems (J MED SYST). Volume 35, Number 3, pp.369-375, June 2011. (DOI: 10.1007/s10916-009-9373-7 (SCI) (words: 4166) avaible online-http://www.springerlink.com/content/x2n7x062637g6k74/) ISSN: 0148-5598(Print) 1573-689X (Online) [Impact Factor: 0.674 (2008)] Subject Categories: HEALTH CARE SCIENCES & SERVICES
  • Lee, Chin-Feng, Chien, Hung-Yu*, Laih, Chi-Sung (2011) “Secure Tripartite STS key Agreement Protocol in Random Oracle Model”, Journal of Information Management(資訊管理學報, CSIM)(國科會TSSCI收錄優良期刊), Vo. 18, No. 2, pp. 215-235, April 2011. (words:6234 /in English) (ISSN:1608-5752)
  • Lee, Chin-Feng*, Chen, Hsing-Lin and Yang, Tsung-Chia (2011): “Semi-blind Watermarking Scheme Exploiting Self-reference Image,” Journal of Internet Technology (JIT) (Special Issue on "Coding, Cryptography, and Multimedia Security in Computer Systems over Cyber-space Communications"), Vol. 12, No.2, pp.313-326, March 2011. (SCI-E, EI, Taiwan Science Citation Index (TSCI), DBLP,Genamics JournalSeek, INSPEC (IET)) (words: 5856) ISSN: 1607-9264 [Impact Factor: 0.2334(2009)]
  • Lee, Chin-Feng* and Chen, Hsing-Lin (2011), “Lossless Text Steganography in Compression Coding,” Handbook in Data Hiding (Book Chapter), published by Springer-Verlag. (words: 9280)
  • Lee, Chin-Feng*, Chang, Chin-Chen, Pai, Pei-Yan, and Huang, Wen-Hung (2010): “An Effective Demosaicing Algorithm for CFA Image,” International Journal of Innovative Computing, Information and Control (IJICIC), Vol.6, No.12, pp. 5485-5499, Dec. 2010. (SCI-E, EI) (words: 4246) ISSN: 1349-4198 [Impact Factor: 2.932(2009); 5-Year Impact Factor: 2.735(2009)] [Ranking: 59/103] Subject Categories: Computational Theory and Mathematics; Information Systems; Software; Theoretical Computer Science)
  • Lee, Chin-Feng*, Chen, Hsing-Lin and Tso, Hao-Kuan (2010): “Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Difference Expansion,” Journal of Systems and Software, Volume 83, Issue 10, pp. 1864-1872, Oct. 2010. (SCI, EI) (words: 6140) ISSN: 0164-1212 [Impact Factor: 1.241(2009); 5-Year Impact Factor: 1.312(2009)] (COMPUTER SCIENCE, SOFTWARE ENGINEERING)(36/86 = 41.86%); (COMPUTER SCIENCE, THEORY & METHODS)(34/84 = 40.48%)
  • Lee, Chin-Feng* and Chang, Wan-Ting (2010): “Recovery of Color Images by Composed Associative Mining and Edge Detection,” Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 4, pp. 310-324, October 2010. (words: 5608) ISSN: 2073-4212 (Print); ISSN: 2073-4239 (Online)
  • Chien, Hung-Yu*, Lee, Chin-Feng, Liu, Shih-Bin, and Wu, Tzong-Chen (2010): “Enhancing Convenience and Situation-Aware Intelligence of Smart Home Services Using Passive RFID and Intelligent Controls,” International Journal of Internet Protocol Technology, Vol. 5, No. 3, pp. 166-173, Sept. 2010. DOI: 10.1504/IJIPT.2010.035387. (EI). (words: 4514) http://www.informatik.uni-trier.de/~ley/db/journals/ijipt/index.html ISSN (Online): 1743-8217 - ISSN (Print): 1743-8209
  • Lee, Chin-Feng*, Chen, Hsing-Lin and Lai, Shu-Hua (2010): “An Adaptive Data Hiding Scheme with High Embedding Capacity and Visual Image Quality Based on SMVQ Prediction through Classification Codebooks,” Journal of Image and Vision Computing, Volume 28, Issue 8, pp. 1293-1302, August 2010. (SCI, EI) (words: 7413) (ISSN: 0262-8856) Imprint: ELSEVIER [Impact Factor: 1.578 (2010), 5-Year Impact Factor: 2.489 (2010)] Subject Categories: Computer Vision and Pattern Recognition ; Electrical and Electronic Engineering ; Signal Processing
  • Lee, Chin-Feng* and Chen, Hsing-Lin (2010): “A Novel Data Hiding Scheme Based on Modulus Function,” Journal of Systems and Software, Volume 83, Issue 5, Pages 832-843, May 2010. (SCI, EI) (words: 7981) ISSN: 0164-1212 [Impact Factor: 1.241(2009); 5-Year Impact Factor: 1.312 (2009)] (COMPUTER SCIENCE, SOFTWARE ENGINEERING)(36/86 = 41.86%); (COMPUTER SCIENCE, THEORY & METHODS)(34/84 = 40.48%)
  • Lee, Chin-Feng *, Chen, Kuo-Nan, Chang, Chin-Chen and Tsai, Meng-Cheng (2010): “A Block Feature Correlation based Image Watermarking for Tamper Detection using Linear Equation,” Journal of Information Assurance and Security (JIAS), Vol. 5, Issue 2, pp. 187-195, April 2010. (ISSN 1554-1010) published 6 issues/year (words: 5485)
  • Lee, Chin-Feng*, Chen, Kuo-Nan and Chang, Chin-Chen, (2009): “A New Data Hiding Strategy with Restricted Region Protection,” The Imaging Science Journal (IMAGING SCI J), Vol. 57, No. 5, pp. 235-249, Oct. 2009. (SCI, EI) (words: 7096) ISSN: 1368-2199 [Impact factor: 0.22 Ranking=10/11=0.9091] Subject Categories: : Atomic and Molecular Physics, and Optics; Computer Vision and Pattern Recognition
  • Chang, Chin-Chen, Lee, Chin-Feng* and Chuang, Lin-Yi, (2009): “Embedding Secret Binary Message Using Locally Adaptive Data Compression Coding,” the International Journal of Computer Sciences and Engineering Systems (IJCSES), Vol. 3, No. 1, pp. 55-61, April 2009. ISSN: 0973-4406
  • Lee, Chin-Feng* and Chen, Chao-Jen (2009): “The Connective Coding Shifting Hidden Technology of Non-distorted Type Based on the Block Interpolation Prediction(Registration ID:C040)” Journal of China Management Information (in Chinese version), Vol. 12, No. 15, pp.28-30, 2009 (Serial No.165). This paper also has been presented at the 1st Conference of IIMA Asian Chapter in Beijing, China, pp.19-22, June 2009. (words: 4606) ISSN: 1673-0194
  • Lee, Chin-Feng*, Chang, Chin-Chen and Wang, Kuo-Hua, (2008): “An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy,” Journal of Image and Vision Computing (IMAGE VISION COMPUT), Vol. 26, Issue 12, pp.1670-1676, Dec. 2008. (SCI, EI) (words: 4651) ISSN: 0262-8856 Imprint: ELSEVIER [Impact Factor: 1.496 (2008) , 5-Year Impact Factor: 2.489(2008)] Subject Categories: Computer Vision and Pattern Recognition ; Electrical and Electronic Engineering ; Signal Processing
  • Lee, Chin-Feng* and Tsai, Chia-Hsing, (2007): “Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML Databases, (best paper award winner in conference paper version)” Journal of Recent Advances in Engineering and Computer Science 2007, International Association of Engineers, pp. 198-205, May 2007. (ISBN: 978-988-98671-1-9) (words: 6124)
  • Lee, Chin-Feng* and Shen, Tsung-Hsien, (2007): “An Efficient XML Database Mining without Candidate Generation: A Frequent Pattern SPLIT Approach,” Ubiquitous Computing and Communication Journal (UBICC), Vol. 2, No. 2, pp.1-12, 15th March 2007. (ISBN: 978-988-98671-1-9) (words: 758)
  • Lee, Chin-Feng*, Chang Chien, S. W., Wang, W. T. and Shen, J. J., (2006): “A Data Mining Approach to Database Compression,” Information Systems Frontiers (INFORM SYST FRONT), Vol. 8, Issue 3, pp. 147-161, Sept. 2006. (SCI; EI) (words: 5879) ISSN: 1387-3326 [IF= 3.232[Q1] (2019)] Subject Categories: COMPUTER SCIENCE, INFORMATION SYSTEMS (COMPUTER SCIENCE, INFORMATION SYSTEMS)(74/99 = 74.75%); (COMPUTER SCIENCE, THEORY & METHODS)(61/84 = 72.62%)
  • Lee, Chin-Feng*, and Chen, Mei-Hsiu, (2006): “Adaptive Two-Phase Spatial Association Rules Mining Method,” Journal of Computer Science and Technology (JCST) (ISBN: 1666-6038), Vol. 6, No. 1, pp. 36-45, April 2006. (words: 6935)
  • Lee, Chin-Feng*, and Tsai, Main-Che, (2005): “A Categorizing Mechanism Using Signature File to Construct Multidimensional Data into a Concept Hierarchy Tree for Enhancing Data Warehouse Access,” Journal of the Chinese Institute of Engineers (JCIE) (J CHIN INST ENG), Vol. 28., No.3, pp. 557-561, May 2005. (SCI; EI) (words: 2689) ISSN: 0253-3839 [Impact factor: 0.219; 5-Year Impact Factor: 0.253] [Ranking: 44/79] Subject Categories: ENGINEERING, MULTIDISCIPLINARY
  • Chang Chien, S. Wesley, Lee, Chin-Feng* and Hsu, Yu-Jung, (2004): “On-Line Personalized Sales Promotion in Electronic Commerce,” Vol. 27, No.1, Expert Systems with Applications (ESWA) (EXPERT SYST APPL), pp. 35-52, August 2004. (SCI; EI) (words: 16879) ISSN: 0957-4174 [Impact factor: 2.908; 5-Year Impact factor:3.162] [Ranking:34/103] Subject Categories: COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
  • Chan, Yung-Kuan, Wang, Her-Fa, and Lee, Chin-Feng*, (2004): “A Refined VQ-Based Image Compression Method,” Fundamenta Informaticae (FUNDAM INFORM), Vol. 61, No. 3-4, pp. 213-221, May-June 2004. (SCI; EI) (words: 3698) ISSN: 0169-2968 (Print) 1875-8681 (Online) [Impact factor : 0.615; 5-Year Impact factor:0.747][Ranking:35/94] Subject Categories: COMPUTER SCIENCE, SOFTWARE ENGINEERING
  • Lee, Chin-Feng*, and Jan, C. L., (2003): “Using KIRT to Improve the Efficiency of FAQ Recommendation System,” Journal of HEFEI University of Technology, Vol. 26, pp. 838-843, Oct. 2003.
  • Lee, Chin-Feng*, and Chang, C. C., (2000): “Breadth-First Search Oriented Symbolic Picture Representation for Spatial Match Retrieval,” Journal of Systems and Software, Vol. 52, No. 1, pp. 11-23, Oct. 2000. (SCI; EI) ISSN: 0164-1212 [Impact Factor: 1.34; 5-Year Impact Factor: 1.29] [Ranking:67/93] Subject Categories: COMPUTER SCIENCE, SOFTWARE ENGINEERING
  • Chang, C. C.* and Lee, Chin-Feng, (1998): “A Two-Level Signature File Based on a Block-Oriented Data Model for Spatial Match Retrieval,” Journal of the Chinese Institute of Engineers, Vol. 21, No. 4, July 1998. (SCI; EI) ISSN: 0253-3839 [Impact factor: 0.219; 5-Year Impact Factor: 0.253] [Ranking: 44/79] Subject Categories: ENGINEERING, MULTIDISCIPLINARY
  • Chang, C. C.* and Lee, Chin-Feng, (1998): “A Bin-tree Oriented Iconic Indexing Schemes for Retrieving Symbolic Pictures,” Data & Knowledge Engineering (DATA KNOWL ENG), Vol. 26, No.2, pp121-133, June 1998. (SCI; EI) ISSN: 0169-023X [Impact factor: 1.745; 5-Year Impact Factor: 2.036] [Ranking: 27/103] Subject Categories: COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
  • Chang, C. C.* and Lee, Chin-Feng, (1998): “A Spatial Match Retrieval Mechanism for Symbolic Pictures,” Journal of Systems and Software (J SYST SOFTWARE), Vol. 44, No. 1, pp. 73-83, Dec. 1998. (SCI; EI) ISSN: 0164-1212 [Impact Factor: 1.34; 5-Year Impact Factor: 1.29] [Ranking:67/93] Subject Categories: COMPUTER SCIENCE, SOFTWARE ENGINEERING
  • Chang, C. C.* and Lee, Chin-Feng, (1997): “Spatial Match Retrieval Based on Direction Signatures Using Multiple Key Hashing Scheme,” International Journal of Intelligent Systems (INT J INTELL SYST), Vol.2, No. 10, pp. 777-788, Oct. 1997. (SCI; EI) ISSN: 1541-1672 [Impact factor: 3.144; 5-Year Impact Factor: 3.594] [Ranking: 38/103] Subject Categories: COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
  • Chang, C. C.* and Lee, Chin-Feng, (1996): “A Greedy Relaxed Generalized Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems,” Journal of the Chinese Institute of Engineers (J CHIN INST ENG), Vol. 19, No. 2, pp. 155-169, 1996. (SCI; EI) ISSN: 0253-3839 [Impact factor: 0.219; 5-Year Impact Factor: 0.253] [Ranking: 44/79] Subject Categories: ENGINEERING, MULTIDISCIPLINARY
  • Chang, C. C.* and Lee, Chin-Feng, (1995): “Relative Coordinates Oriented Symbolic String for Spatial Relationship Retrieval,” Pattern Recognition (PATTERN RECOGN), Vol. 28, No. 4, pp. 563-570, 1995. (SCI; EI) ISSN: 0031-3203 [Impact factor : 2.544; 5-Year Impact Factor: 3.453] [Ranking: 226/246] Subject Categories: ENGINEERING, ELECTRICAL & ELECTRONIC

(二) 書章 Book Series

  • Lee, CF., Shen, JJ., Lin, ZY. (2022). Bin Reservation Based on IVPO Reversible Data Hiding Using Smoothness Mode Selection Strategy. Smart Innovation, Systems and Technologies, vol 278, pp. 285-295, 2022. DOI: 10.1007/978-981-19-1053-1_26 Published:14 July 2022; Publisher Name: Springer, Singapore; ISSN:21903018/ISBN:978-981191052-4 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2021, in conjunction with the 14th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2021Kaohsiung29 October 2021 到 31 October 2021代碼 280379
  • Lee, CF., Shen, JJ., Wu, CY. (2022). Hiding Scheme based on Improved Reduced Difference Expansion in Multi-block Shape. In: Pan, JS., Meng, Z., Li, J., Virvou, M. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 278, pp. 297-310, 2022. DOI: 10.1007/978-981-19-1053-1_27 Published:14 July 2022; Publisher Name: Springer, Singapore; ISSN:21903018/ISBN:978-981191052-4 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2021, in conjunction with the 14th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2021Kaohsiung29 October 2021 到 31 October 2021代碼 280379
  • Chin-Feng Lee, Jau-Ji Shen, Yun-Chin Tsai (2022). Improved Dynamic Embedding Scheme with Adaptive Pixel Replacement. In: Pan, JS., Meng, Z., Li, J., Virvou, M. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 278 , pp. 311-322, 2022. DOI: 10.1007/978-981-19-1053-1_28 Published:14 July 2022; Publisher Name: Springer, Singapore; ISSN:21903018/ISBN:978-981191052-4 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2021, in conjunction with the 14th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2021Kaohsiung29 October 2021 到 31 October 2021代碼 280379
  • Chin-Feng Lee, Jau-Ji Shen, Yu-Yun Ye (2022). Dual-Image Reversible Information Hiding Scheme Using Staggered Turtle Shells . In: Pan, JS., Meng, Z., Li, J., Virvou, M. (eds) Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies, vol 278, pp. 323-333, 2022. DOI: 10.1007/978-981-19-1053-1_29 Published:14 July 2022; Publisher Name: Springer, Singapore; ISSN:21903018/ISBN:978-981191052-4 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2021, in conjunction with the 14th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2021Kaohsiung29 October 2021 到 31 October 2021代碼 280379
  • Chiang, Mao-Lun, Lee, Chin-Feng*, Lin, Ting-You, and Agrawal, Somya (2020): "A Survey of Bus Arrival Time Prediction Methods," Advances in Intelligent Systems and Computing, (AISC) vol. 1145, Chapter 17, pp. 197-206, 28 April 2020. [EI-indexed, SCOPUS] Editors: Lakhmi C. Jain, Sheng-Lung Peng, Shiuh-Jeng Wang. DOI: https://doi.org/10.1007/978-3-030-46828-6_17; Publisher Name: Springer Nature Switzerland AG, Cham; Print ISBN:978-3-030-46827-9; Online ISBN: 978-3-030-46828-6也收錄在2019 Proceedings of the 3rd International Conference on Security with Intelligent Computing and Big-data Services (SICBS), 4–6 December 2019, New Taipei City, Taiwan
  • Hou, Hsing-Yu, *Agrawal, Somya, Lo, Yu-Lung, and Lee, Chin-Feng (2020): "Applying Talent Quality-management System (TTQS) and Information Visualization to e-learning Partner Project," Advances in Intelligent Systems and Computing (AISC) vol. 1145, Chapter 18, pp. 207-217, 28 April 2020. [EI-indexed, SCOPUS] Editors: Lakhmi C. Jain, Sheng-Lung Peng, Shiuh-Jeng Wang. First Online: 28 April 2020; DOI: https://doi.org/10.1007/978-3-030-46828-6_18; Publisher Name: Springer Nature Switzerland AG, Cham; Print ISBN:978-3-030-46827-9; Online ISBN: 978-3-030-46828-6也收錄在2019 Proceedings of the 3rd International Conference on Security with Intelligent Computing and Big-data Services (SICBS), 4–6 December 2019, New Taipei City, Taiwan
  • Chin-Feng Lee, Chin-Chen Chang, Chia-Shuo Shih, and Somya Agrawal* (2020): "A Survey of Data Hiding based on Vector Quantization," Advances in Intelligent Information Hiding and Multimedia Signal Processing; 2020 Smart Innovation, Systems and Technologies book series (SIST 2020), Vol. 156, pp. 65-72, 2020. [EI-indexed, SCOPUS]; (words: 2936 ). Print ISBN: 978-981-13-9713-4; Online ISBN: 978-981-13-9714- Springer, Singapore. (亦收錄在15th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2019, held in conjunction with the 12th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2019; Jilin; China; 18-20 July 2019 ) https://doi.org/10.1007/978-981-13-9714-1_7
  • Chin-Ling Chen, Dong-Peng Lin, Chin-Feng Lee*, Yong-Yuan Deng, and Somya Agrawal (2020): "A Survey of Authentication Protocols in Logistics System," 2020 Smart Innovation, Systems and Technologies book series (SIST 2020 ), Vol. 156, pp. 73-78, 2020. [EI-indexed, SCOPUS]; Print ISBN: 978-981-13-9713-4; Online ISBN: 978-981-13-9714- Springer, Singapore. (亦收錄在15th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2019, held in conjunction with the 12th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2019; Jilin; China; 18-20 July 2019 ) https://doi.org/10.1007/978-981-13-9714-1_8
  • Shen, Jau-Ji, * Lee, Chin-Feng, Li, Yen-Hsi and *Agrawal, Somya (2019): “Image Steganographic Scheme Based on Double-layer Magic Matrix,” 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST 2019), October 23 - 25, 2019, Morioka, Japan, pp 462-467. (words: 3555) [IEEE Xplore Digital Library] [ ISBN 978-1-7281-3821-3] DOI: 10.1109/ICAwST.2019.8923506
  • Lee, Chin-Feng, *Shen, Jau-Ji, Wu, Yi-Jhen and *Somya Agrawal (2019): “Reversible Data Hiding Scheme Based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity,” 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST 2019), October 23 - 25, 2019, Morioka, Japan, pp 447-452. (words: 3273) [IEEE Xplore Digital Library] [ ISBN 978-1-7281-3821-3] DOI: 10.1109/ICAwST.2019.8923138
  • Lee, Chin-Feng, *Shen, Jau-Ji and Kao, Yu-Chi (2019):“High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method,” Smart Innovation, Systems and Technologies book series (SIST 2019), volume 109, pp 280-288, 2019. (words: 2887) [EI-indexed, SCOPUS; (亦收錄在 International Conference on Intelligent Information Hiding and Multimedia Signal Processing--IIH-MSP 2018: Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, November, 26–28, pp 280-288, 2018, Sendai, Japan) [editors: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, and Lakhmi C. Jain (Eds.)] [施普林格出版社(Springer)2019 Springer Nature Switzerland AG][ ISBN 978-3-030-03744-4 ISBN 978-3-030-03745-1 (eBook)] (BEST PAPER AWARD) https://www.springer.com/gp/book/9783030037444
  • Lee, Chin-Feng, *Shen, Jau-Ji and Ou-Yang, Ting-Yi (2019):“A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing,” 2019 Smart Innovation, Systems and Technologies book series (SIST 2019), volume 109, pp. 272-279, 2019. (words: 2686) [ ISBN 978-3-030-03744-4 ISBN 978-3-030-03745-1 (eBook)] https://www.springer.com/gp/book/9783030037444 [EI-indexed, SCOPUS; (亦收錄在 International Conference on Intelligent Information Hiding and Multimedia Signal Processing--IIH-MSP 2018: Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp. 272-279, November, 26–28, 2018, Sendai, Japan, Part I, pp 272-279. ) [editors: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, and Lakhmi C. Jain (Eds.)] [施普林格出版社(Springer)2019 Springer Nature Switzerland AG]
  • Lee, Chin-Feng, *Shen, Jau-Ji and Hsu, Fang-Wei (2019):“A Survey of Semi-Fragile Watermarking Authentication,” 2019 Smart Innovation, Systems and Technologies book series (SIST 2019), volume 109, pp. 264-271, 2019. [ ISBN 978-3-030-03744-4 ISBN 978-3-030-03745-1 (eBook)] (words: 2661) [EI-indexed, SCOPUS; (亦收錄在 Proceedings of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2018), November, 26–28, 2018, Sendai, Japan, Part I, pp 264-271. ) [editors: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, and Lakhmi C. Jain (Eds.)] [施普林格出版社(Springer)2019 Springer Nature Switzerland AG. ] https://www.springer.com/gp/book/9783030037444
  • Chin-Feng Lee, *Chin-Chen Chang, Guan-Long Li, and Somya Agrawal (2019): "A Survey of Data Hiding Schemes Based on AMBTC," The 11th International Conference on Digital Image Processing (ICDIP 2019) held in Sun Yat-Sen University, Guangzhou, China during May 10-13, 2019. (2019年第十一届数字图像处理国际会议(ICDIP2019) 2019年5月10-13日, 广州中山大学) Eleventh International Conference on Digital Image Processing (ICDIP 2019), ICDIP 2019 Proceedings, SPIE Digital Library, (ISBN: 9781510630758 Published by. SPIE. P.O. Box 10, Bellingham, Washington 98227-0010 USA), (Ei Compendex | Scopus); doi: 10.1117/12.2539702.
  • Lee, Chin-Feng, *Shen, Jau-Ji and Chen, Zhao-Ru (2018): “A Survey of Watermarking-Based Authentication for Digital Image,” Proceedings of the 3rd International Conference on Computer and Communication Systems (ICCCS2018), pp. 207-211, April 27–30, 2018, Nagoya Institute of Technology, Nagoya, Japan ) [ISBN: 978-1-5386-6349-3] (words: 3378) (INDEX: IEEE Xplore, Ei Compendex, and Scopus (http://www.icccs.org/)
  • Lee, Chin-Feng, *Shen, Jau-Ji and Lai, Yu-Hua (2018): “Data Hiding Using Multi-Pixel Difference Expansion,” Proceedings of the 3rd International Conference on Computer and Communication Systems (ICCCS2018), pp. 51-60, April 27–30, 2018, Nagoya Institute of Technology, Nagoya, Japan ) [ISBN: 978-1-5386-6349-3] (words: 2826) (INDEX: IEEE Xplore, Ei Compendex, and Scopus (http://www.icccs.org/)
  • Chen, Chin-Ling, Chen,Yue-Xun, *Lee, Chin-Feng, and Deng,Yong-Yuan (2018): “A survey of authentication protocols in VANET,” Lecture Notes on Data Engineering and Communications Technologies 25 -- "Advances on Broadband and Wireless Computing, Communication and Applications", Publisher: Springer International Publishing(亦收錄在 Proceedings of The 13th International Conference on Broad-Band Wireless Computing, Communication and Applications(BWCCA-2018), October 27-29, 2018, Tunghai University, Taichung, Taiwan. (words: 2518) [The books of this series are indexed ISI Proceedings, MetaPress, Springerlink, DBLP] Springer International Publishing Switzerland [Editors: Leonard Barolli, Fang-Yie Leu, Tomoya Enokido, Hsing-Chung Chen] Print ISBN: 978-3-030-02612-7; Electronic ISBN: 978-3-030-02613-4; DOI:10.1007/978-3-030-02613-4, Edition Number: 1
  • Hu, Yu-Chen, Lee, Chin-Feng, and Liu, Yi-Hung (2018): “Reversible Image Steganography for Color Image Quanzitation Based on Lossless Index Coding,” Advances in Intelligent Systems and Computing (AISC 2018), Vol. 733, pp. 185–195, 2018. ISSN 2194-5357 ISSN 2194-5365 (electronic) by Springer Verlag ; S.-L. Peng et al. (Eds.): SICBS 2017, AISC 733, pp. 185–195, 2018.
  • Lee, Chin-Feng, *Shen, Jau-Ji and Chen, Zhao-Ru (2018):“Steganographic Image Hiding Schemes Based on Edge Detection,” 2018 Smart Innovation, Systems and Technologies, Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 81, pp. 12-20, 2018. (words: 3736) [EI-indexed, SCOPUS; (亦收錄在 Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2017), August, 12–15, 2017, Matsue, Shimane, Japan, Part I, pp. 12-20. ) [editors: Jeng-Shyang Pan, Pei-Wei Tsai, Junzo Watada, and Lakhmi C. Jain (Eds.)][施普林格出版社(Springer)][ ISBN 978-3-319-63856-0] http://www.springer.com/gp/book/9783319638553
  • Lee, Chin-Feng, *Shen, Jau-Ji and Lai, Yu-Hua (2018):“A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification,” 2018 Smart Innovation, Systems and Technologies, Advances in Intelligent Information Hiding and Multimedia Signal Processing, (SIST 2018, volume 81), pp. 3-11, 2018. (words: 2887) [EI-indexed, SCOPUS; (亦收錄在 Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2017), August, 12–15, 2017, Matsue, Shimane, Japan, Part I, pp. 3-11. ) [editors: Jeng-Shyang Pan, Pei-Wei Tsai, Junzo Watada, and Lakhmi C. Jain (Eds.)][施普林格出版社(Springer)][ ISBN 978-3-319-63856-0] http://www.springer.com/gp/book/9783319638553
  • *Lee, Chin-Feng, Chang, Chin-Chen, Zeng, Q.-F. (2018), “VQ Compression Enhancer with Huffman Coding,” 2018 Advances in Intelligent Systems and Computing (AISC 2018), vol. 579, pp. 101-108, 2018. (亦收錄在Proceedings of International Conference on Genetic and Evolutionary Computing (ICGEC 2017): Genetic and Evolutionary Computing, pp 101-108. 2017) [ Eds. Jerry Chun-Wei Lin, Jeng-Shyang Pan, Shu-Chuan Chu, Chien-Ming Chen] ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
  • *Lee, Chin-Feng, Ying-Xiang Wang, and Shih, An-Tong (2018): “Image Steganographic Method Based on Pencil-Shaped Pattern,” 2018Lecture Notes in Electrical Engineering(LNEE), vol. 425, pp.639-644 (亦收錄在 Proceedings of International Conference on Mobile and Wireless Technology (ICMWT 2017: Mobile and Wireless Technologies 2017), pp 639-644, June 18-21, 2017. Venue: Malysia. Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 425) ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, SCOPUS, MetaPress, Springerlink **
  • Weng, Chi-Yao, Huang, Yen-Chia, *Lee, Chin-Feng, and Lin, Dong-Peng (2018): "Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing,” 2018Advances in Intelligent Systems and Computing (AISC), vol. 579, pp. 109-117, 2018. (亦收錄在Proceedings of International Conference on Genetic and Evolutionary Computing (ICGEC 2017): Genetic and Evolutionary Computing, pp. 109-117. 2017) [ Eds. Jerry Chun-Wei Lin, Jeng-Shyang Pan, Shu-Chuan Chu, Chien-Ming Chen] ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
  • *Lee, Chin-Feng and Wang, Ying-Xiang (2018):“An Image Hiding Scheme Based on Magic Square,” (January 2018) Proceedings --IEEE 8th International Conference on Awareness Science and Technology (iCAST 2017), Nov. 8-10, 2017, Taichung, Taiwan. pp. 301-305, 2017. ISBN 978-1-5386-2964-2, 以及ISSN 2325-5994] (words: 2663) (INDEX: IEEE Xplore, and Scopus)
  • *Lee, Chin-Feng, Shen, Jau-Ji and Lin, Kuan-Ting (2017):“The Study of Steganographic Algorithms Based on Pixel Value Difference,” 2017Smart Innovation, Systems and Technologies -- Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 63, pp. 99-106, 2016. (words: 2619) [EI-indexed; (亦收錄在Proceedings of The Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2016 partI), Kaohsiung, Taiwan, November 21-23, 2016.) [editors: Pan, Jeng-Shyang, Tsai, Pei-Wei, Huang, Hsiang-Cheh][施普林格出版社(Springer)][ ISBN 978-3-319-50209-0]
  • Di, Ya-Feng, Wang, Zhi-Hui, Lee, Chin-Feng, and *Chang, Chin-Chen (2017): “The Reduction of VQ Index Table Size by Matching Side Pixels,” 2017Smart Innovation, Systems and Technologies -- Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 64, pp. 203-210, 2016. (words: 2708) [EI-indexed; (亦收錄在Proceedings of The Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2016 part 2), Kaohsiung, Taiwan, November 21-23, 2016.) [editors: Pan, Jeng-Shyang, Tsai, Pei-Wei, Huang, Hsiang-Cheh][施普林格出版社(Springer)][ ISBN 978-3-319-50212-0]
  • *Lee, Chin-Feng, Chen, Jui-Yu , and Chen, Si-Ting (2015), “A high capacity reversible multiple-image hiding scheme, Frontiers in Artificial Intelligence and Applications vol. 274, pp. 875-884 , January 2015. DOI: 10.3233/978-1-61499-484-8-875( ISSN 09226389, 15356698) (SCOPUS book series]
  • *Lee, Chin-Feng and Hsing-Ling Chen (2103): “Lossless Text Steganography in Compression Coding,” Book Chapter.: Recent Advances in Information Hiding and Applications, Volume 40 of the series Intelligent Systems Reference Library pp 155-179 , Publisher Springer Berlin Heidelberg, DOI: 10.1007/978-3-642-28580-6_8 (SCOPUS) Print ISBN: 978-3-642-28579-0, Online ISBN: 978-3-642-28580-6

(三) 國際研討會論文

  • Hsing-Yu Hou, Chin-Feng Lee*, Chih-Teng Chen, Pei-Jung Wu (2021): "E-learning behavior analytics in the curriculum of big data visualization application," 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021), Nov. 18-20, 2021, National Chung Hsing University, Taichung. [Ei Compendex, Scopus, will be published by Springer in the series “Smart Innovation, Systems and Technologies”. ]
  • Chin-Feng Lee* and Ting-Chia Chang(2021): "Fabric Defect Detection by Applying Structural Similarity Index to the Combination of Variation-al Autoencode and Generative Adversarial Network," 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications (SITAIBA 2021), Nov. 18-20, 2021, National Chung Hsing University, Taichung. [Ei Compendex, Scopus, will be published by Springer in the series “Smart Innovation, Systems and Technologies”. ]
  • Chin-Feng Lee, * Jau-Ji Shen, and Zong-Ye Lin (2021): "Bin Reservation Based on IVPO Reversible Data Hiding Using Smoothness Mode Selection Strategy," The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. And 14th International Conference on Frontiers of Information Technology, Applications and Tools. [IIH-MSP 2021 & FITAT 2021 ] October,29-31, 2021 Kaohsiung, Taiwan. [Ei Compendex, Scopus, will be published by Springer in the series “Smart Innovation, Systems and Technologies”. ] ID: 0474
  • Chin-Feng Lee, * Jau-Ji Shen, and Chin-Yung Wu (2021): "Hiding Scheme Based on Improved Reduced Difference Expansion in Multi-Block Shape," The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. And 14th International Conference on Frontiers of Information Technology, Applications and Tools. [IIH-MSP 2021 & FITAT 2021 ] October,29-31, 2021, Kaohsiung, Taiwan. [Ei Compendex, Scopus, will be published by Springer in the series “Smart Innovation, Systems and Technologies”. ] ID: 0480
  • Chin-Feng Lee, * Jau-Ji Shen, and Yun-Chin Tsai (2021): " Improved Dynamic Embedding Scheme with Adaptive Pixel Replacement," The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. And 14th International Conference on Frontiers of Information Technology, Applications and Tools. [IIH-MSP 2021 & FITAT 2021 ] October,29-31, 2021, Kaohsiung, Taiwan. [Ei Compendex, Scopus, will be published by Springer in the series “Smart Innovation, Systems and Technologies”. ] ID: 0483
  • Chin-Feng Lee, * Jau-Ji Shen, and Yu-Yun Ye (2021): " Dual Image Reversible Information Hiding Scheme Using Staggered Turtle Shells," The 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. And 14th International Conference on Frontiers of Information Technology, Applications and Tools. [IIH-MSP 2021 & FITAT 2021 ] October,29-31, 2021, Kaohsiung, Taiwan. [Ei Compendex, Scopus, will be published by Springer in the series “Smart Innovation, Systems and Technologies”. ] ID: 0487
  • Jau-Ji Shen, Chin-Feng Lee*, Chin-Ting Yeh and Somya Agrawal(2020): "An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network, " 6th International Conference on Frontiers of Educational Technologies, ICFET 2020 and its Workshop 2020 5th International Conference on Knowledge Engineering and Applications, ICKEA 2020 in Tokyo, Japan on June 5-8, 2020. ACM library (ISBN: 978-1-4503-7533-7), [Ei Compendex, Scopus, IET] NY , United States https://doi.org/10.1145/3404709.3404763 ; http://www.icfet.org/assets/img/history/icfet2020-scopus.png
  • Chin-Feng Lee, Jau-Ji Shen*, Zih-Cyuan Chao, Somya Agrawal*(2020): "An Improved lossless information Hiding in SMVQ Compressed Images," 6th International Conference on Frontiers of Educational Technologies, ICFET 2020 and its Workshop 2020 5th International Conference on Knowledge Engineering and Applications, ICKEA 2020 in Tokyo, Japan on June 5-8, 2020. ACM library (ISBN: 978-1-4503-7533-7), [Ei Compendex, Scopus, IET] NY , United States https://doi.org/10.1145/3404709.3404764; http://www.icfet.org/assets/img/history/icfet2020-scopus.png
  • Jau-Ji Shen, Chin-Feng Lee*, Yu-Chuan Chen and Somya Agrawal*(2020): “Unsupervised Defect Detection based on Boundary Equilibrium Generative Aadversarial Network,” 6th International Conference on Frontiers of Educational Technologies, ICFET 2020 and its Workshop 2020 5th International Conference on Knowledge Engineering and Applications, ICKEA 2020 in Tokyo, Japan on June 5-8, 2020. ACM library (ISBN: 978-1-4503-7533-7), [Ei Compendex, Scopus, IET] NY , United States https://doi.org/10.1145/3404709.3404765; http://www.icfet.org/assets/img/history/icfet2020-scopus.png
  • Chiang, Mao-Lun, *Lee, Chin-Feng, Lin, Ting-You, and Agrawal, Somya (2019): "A Survey of Bus Arrival Time Prediction Methods," 論文已獲國際知名出版社 Springer 授權, 將收錄在 Springer “先進智慧系統與計算” (Advances in Intelligent Systems and Computing,簡稱 AISC, 期刊索引: ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springer link)系列中以專書出版。 (AISC) Springer --Security with Intelligent Computing and Big-Data Services 2019(Editors: Jain, Lakhmi C., Peng, Sheng-Lung, Wang, Shiuh-Jeng (Eds.) ISBN 978-3-030-46828-6, Springer nature) also published in the Proceedings of the 3rd International Conference on Security with Intelligent Computing and Big-data Services (SICBS), 4–6 December 2019, New Taipei City, Taiwan
  • Hou, Hsing-Yu, *Agrawal, Somya, Lo, Yu-Lung, and Lee, Chin-Feng (2019): "Applying Talent Quality-management System (TTQS) and Information Visualization to e-learning Partner Project," The 2019 3rd International Conference on Security with Intelligent Computing and Big-data Services (SICBS'19). Dec. 4-6, 2019, Chihlee University of Technology, New Taipei City, TAIWAN
  • Lee, Chin-Feng, *Shen, Jau-Ji, Wu, Yi-Jhen and *Agrawal, Somya (2019): “Reversible Data Hiding Scheme based on Difference Expansion Using Shiftable Block Strategy for Enhancing Image Fidelity,” The 10th International Conference on Awareness Science and Technology (iCAST 2019), October 23 - 25, 2019, Morioka, Japan, pp. 447-452. (words: 3273) [IEEE Xplore Digital Library]
  • Shen, Jau-Ji, *Lee, Chin-Feng, Li, Yen-Hsi and *Agrawal, Somya (2019): “Image Steganographic Scheme Based on Double-layer Magic Matrix,” The 10th International Conference on Awareness Science and Technology (iCAST 2019), October 23 - 25, 2019, Morioka, Japan, pp. 462-467. (words: 3555) [IEEE Xplore Digital Library]
  • Chin-Feng Lee, Chin-Chen Chang, Chia-Shuo Shih, and Somya Agrawal (2019): "A Survey of Data Hiding based on Vector Quantization," The 15th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2019), the 12th International Conference on Frontiers of Information Technology, Applications and Tools (FITAT 2019) (IIHMSP/FITAT-2019) held on July 18-20, 2019 in Jilin City, Jilin Province, China.
  • Chin-Ling Chen, Dong-Peng Lin, Chin-Feng Lee, Yong-Yuan Deng, and Somya Agrawal (2019): "A Survey of Authentication Protocols in Logistics System," The 15th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2019), the 12th International Conference on Frontiers of Information Technology, Applications and Tools (FITAT 2019) (IIHMSP/FITAT-2019) held on July 18-20, 2019 in Jilin City, Jilin Province, China.
  • Chin-Feng Lee, Chin-Chen Chang, Guan-Long Li, and Somya Agrawal (2019): "A Survey of Data Hiding Schemes Based on AMBTC," The 11th International Conference on Digital Image Processing (ICDIP 2019) held in Sun Yat-Sen University, Guangzhou, China during May 10-13, 2019. (2019年第十一届数字图像处理国际会议(ICDIP2019)2019年5月10-13日,广州中山大学) Proc. SPIE 11179, Eleventh International Conference on Digital Image Processing (ICDIP 2019), 111793X (14 August 2019); doi: 10.1117/12.2539702
  • Lee, Chin-Feng, *Shen, Jau-Ji and Hsu, Fang-Wei (2018):“A Survey of Semi-Fragile Watermarking Authentication,” Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp 264-271, 2018. (words: 2661) [EI-indexed, SCOPUS; (亦收錄在 Proceedings of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2018), November, 26–28, 2018, Sendai, Japan, Part I, pp 264-271. ) [editors: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, and Lakhmi C. Jain (Eds.)] [施普林格出版社(Springer)][ISBN 978-3-030-03744-4] https://www.springer.com/gp/book/9783030037444
  • Lee, Chin-Feng, *Shen, Jau-Ji and Ou-Yang, Ting-Yi (2018):“A High Payload Edge Detection-Based Image Steganography Robust to RS-Attack by Using LSB Substitution and Pixel Value Differencing,” Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp 272-279, 2018. (words: 2686) [EI-indexed, SCOPUS; (亦收錄在 Proceedings of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2018), November, 26–28, 2018, Sendai, Japan, Part I, pp 272-279. ) [editors: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, and Lakhmi C. Jain (Eds.)] [施普林格出版社(Springer)][ISBN 978-3-030-03744-4] https://www.springer.com/gp/book/9783030037444
  • Lee, Chin-Feng, *Shen, Jau-Ji and Kao, Yu-Chi (2018):“High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method,” Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp 280-288, 2018. (words: 2887) [EI-indexed, SCOPUS;(亦收錄在 Proceedings of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2018), November, 26–28, 2018, Sendai, Japan, Part I, pp 280-288. ) [editors: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, and Lakhmi C. Jain (Eds.)] [施普林格出版社(Springer)][ISBN 978-3-030-03744-4] https://www.springer.com/gp/book/9783030037444 【榮獲最佳論文獎; Best Paper Award】
  • Chen, Chin-Ling, Chen,Yue-Xun, *Lee, Chin-Feng, and Deng,Yong-Yuan (2018): “A survey of authentication protocols in VANET, Lecture Notes on Data Engineering and Communication Technologies series published by Springer (亦收錄在 Proceedings of The 13th International Conference on Broad-Band Wireless Computing, Communication and Applications(BWCCA-2018), October 27-29, 2018, Tunghai University, Taichung, Taiwan. (words: 2518) [The books of this series are indexed ISI Proceedings, MetaPress, Springerlink, DBLP]
  • Lee, Chin-Feng, *Shen, Jau-Ji and Lai, Yu-Hua (2018): “Reversible Data Hiding based on Improved Reduced Difference Expansion and Multi-layer Recursive Embedding,” Proceedings of The 6th IIAE International Conference on Intelligent Systems and Image Processing 2018 (ICISIP 2018), Kunibiki Messe, Matsue, Shimane, Japan, September 10-14, 2018. (words: 3291)
  • Lee, Chin-Feng, *Shen, Jau-Ji and Chen, Zhao-Ru (2018): “A Survey of Watermarking-Based Authentication for Digital Image,” Proceedings of the 3rd International Conference on Computer and Communication Systems (ICCCS2018), pp. 207-211, April 27–30, 2018, Nagoya Institute of Technology, Nagoya, Japan ) [ISBN: 978-1-5386-6349-3] (words: 3378) (INDEX: IEEE Xplore, Ei Compendex, and Scopus (http://www.icccs.org/)
  • Lee, Chin-Feng, *Shen, Jau-Ji and Lai, Yu-Hua (2018): “Data Hiding Using Multi-Pixel Difference Expansion,” Proceedings of the 3rd International Conference on Computer and Communication Systems (ICCCS2018), pp. 51-60, April 27–30, 2018, Nagoya Institute of Technology, Nagoya, Japan ) [ISBN: 978-1-5386-6349-3] (words: 2826) (INDEX: IEEE Xplore, Ei Compendex, and Scopus (http://www.icccs.org/)
  • *Lee, Chin-Feng and Wang, Ying-Xiang (2018):“An Image Hiding Scheme Based on Magic Square,” (January 2018) Proceedings --IEEE 8th International Conference on Awareness Science and Technology (iCAST 2017), Nov. 8-10, 2017, Taichung, Taiwan. pp. 301-305, 2017. ISBN 978-1-5386-2964-2, 以及ISSN 2325-5994] (words: 2663) (INDEX: IEEE Xplore, and Scopus)
  • *Lee, Chin-Feng, Chang, Chin-Chen and Zeng, Qun-Feng (2017):"VQ Compression Enhancer with Huffman Coding," Advances in Intelligent Systems and Computing, pp.101-108, November 6-8, 2017 ISBN 978-981-10-6486-9 ISBN 978-981-10-6487-6 (eBook) (亦收錄在 Proceeding of The 11th International Conference on Genetic and Evolutionary Computing (ICGEC2017), pp.101-108, November 6-8, 2017, Kaohsiung, Taiwan. ISSN 2194-5357; ISSN 2194-5365 (electronic) (words: 2859) (INDEX: Ei Compendex, and Scopus )
  • Weng, Chi-Yao, Huang, Yen-Chia, *Lee, Chin-Feng, and Lin, Dong-Peng, (2017):"Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing," Advances in Intelligent Systems and Computing, pp. 109-117, November 6-8, 2017 ISBN 978-981-10-6486-9 ISBN 978-981-10-6487-6 (eBook) (亦收錄在 Proceeding of The 11th International Conference on Genetic and Evolutionary Computing (ICGEC2017), pp. 109-117, November 6-8, 2017, Kaohsiung, Taiwan. ISSN 2194-5357; ISSN 2194-5365 (electronic) (words: 3714) [EI-indexed, SCOPUS];
  • Lee, Chin-Feng, *Shen, Jau-Ji and Lai, Yu-Hua (2017):“A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification,” Smart Innovation, Systems and Technologies, Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 81, pp. 03-11, 2017. SBN (eBook)978-3-319-63856-0. (亦收錄在 Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2017), August, 12–15, 2017, Matsue, Shimane, Japan, Part I, pp. 3-11. ISSN 2190-3018; ISSN 2190-3026 (electronic) ) [editors: Jeng-Shyang Pan, Pei-Wei Tsai, Junzo Watada, and Lakhmi C. Jain (Eds.)][施普林格出版社(Springer)][ISBN 978-3-319-63856-0] http://www.springer.com/gp/book/9783319638553(words: 2887) [EI-indexed, SCOPUS];
  • Lee, Chin-Feng, *Shen, Jau-Ji and Chen, Zhao-Ru (2017):“Steganographic Image Hiding Schemes Based on Edge Detection,” Smart Innovation, Systems and Technologies, Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 81, pp. 12-20, 2017. ISBN (eBook)978-3-319-63856-0. (亦收錄在 Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2017), August, 12–15, 2017, Matsue, Shimane, Japan, Part I, pp. 12-20. ISSN 2190-3018; ISSN 2190-3026 (electronic) ) [editors: Jeng-Shyang Pan, Pei-Wei Tsai, Junzo Watada, and Lakhmi C. Jain (Eds.)][施普林格出版社(Springer)][ISBN 978-3-319-63856-0] http://www.springer.com/gp/book/9783319638553(words: 2856) [EI-indexed, SCOPUS];
  • *Lee, Chin-Feng, Ying-Xiang Wang, and Shih, An-Tong (2017): “Image Steganographic Method Based on Pencil-Shaped Pattern,” Lecture Notes in Electrical Engineering (LNEE) - Mobile and Wireless Technology, volume 425, pp. 653-658, 2017. ISBN 978-981-10-5280-4 ISBN 978-981-10-5281-1 (eBook), 2018** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, SCOPUS, MetaPress, Springerlink ** (亦收錄在 Proceedings of International Conference on Mobile and Wireless Technology (ICMWT 2017), pp 639-644, Malaysia, June 18-21, 2017. ISSN 1876-1100 , ISSN 1876-1119 (electronic)
  • *Lee, Chin-Feng and Shih, An-Tong (2017): “A Steganographic Image Method Based on Least-significant-bit Substitution and Pixel Value Differencing,” International Conference on Innovation and Management (IAM2017 Winter), Feb. 7-10, 2017. Venue: Tokyo, Japan.
  • Lee, Chin-Feng, *Shen, Jau-Ji and Lin, Kuan-Ting (2016):“The Study of Steganographic Algorithms Based on Pixel Value Difference,” Smart Innovation, Systems and Technologies -- Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 1, pp. 99-106, 2016. (亦收錄在Proceedings of The Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2016), Kaohsiung, Taiwan, November 21-23, 2016.) [editors: Pan, Jeng-Shyang, Tsai, Pei-Wei, Huang, Hsiang-Cheh][ 施普林格出版社(Springer)][ ISBN 978-3-319-50209-0] (words: 2619) [EI-indexed, SCOPUS]
  • Ya-Feng Di, Zhi-Hui Wang, *Lee, Chin-Feng, and Chin-Chen Chang (2016): “The Reduction of VQ Index Table Size by Matching Side Pixels,” Smart Innovation, Systems and Technologies -- Advances in Intelligent Information Hiding and Multimedia Signal Processing, Vol. 2, pp. 203-210, 2016.; (亦收錄在Proceedings of The Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2016), Kaohsiung, Taiwan, November 21-23, 2016.) [editors: Pan, Jeng-Shyang, Tsai, Pei-Wei, Huang, Hsiang-Cheh][ 施普林格出版社(Springer)][ ISBN 978-3-319-50212-0] (words: 2708) [EI-indexed, SCOPUS]
  • *Lee, Chin-Feng and Tseng, Yu-Ju (2016): “A Pixel Value Ordering Predictor for High-Capacity Reversible Data Hiding,” Proceedings of 2016 International Conference on Networks and Network Applications (NANA-2016), Hakodate Kokusai Hotel, Hakodate City, Hokkaido, Japan, July 23-25, 2016. [SCOPUS, EI-indexed; published by IEEE Computer Society Press]. (words: 4375) Pages: 319 - 324, DOI: 10.1109/NaNA.2016.93
  • Shen, Jau-Ji, *Lee, Chin-Feng and Hou, Kun Liang (2016): “Improved Productivity of Mosaic Image by K-medoids and Feature Selecting Mechanism on a Hadoop-based Framework,” Proceedings of 2016 International Conference on Networks and Network Applications (NANA-2016), Hakodate Kokusai Hotel, Hakodate City, Hokkaido, Japan, July 23-25, 2016. [SCOPUS, EI-indexed; published by IEEE Computer Society Press]. (words: 3869) Pages: 288 - 293, DOI: 10.1109/NaNA.2016.43
  • *Lee, Chin-Feng, Chang, Chin-Chen, Li, Jian-Jun, and Wu, Yun-He (2016): “A Survey of Reversible Data Hiding Schemes Based on Pixel Value Ordering,” Proceedings of The 15th Annual International Conference “NICOGRAPH International 2016", Organized by the Society for Art and Science and Hangzhou Dianzi University, Hangzhou, China during 6-8 July 2016. [SCOPUS EI-indexed; published by IEEE Computer Society Press]. (words: 4275) Pages: 68 - 74, DOI: 10.1109/NicoInt.2016.13
  • *Lee, Chin-Feng, Chen, Si-Ting, and Shen, Jau-Ji, (2015):“Reversible Dual-image Data Embedding on Pixel Differences Using Histogram Modification Shifting and Cross Magic Matrix,” Proceedings of The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2015), Adelaide, Australia, September 23-25, pp. 113-116, 2015. (words: 2737) [SCOPUS in 2016]
  • *Lee, Chin-Feng and Tseng, Yu-Ju (2015): “An Improvement to Image Interpolating Based Data Embedding Using Reversible Pixel Shifting Modification and Direction Modification Operation,” Proceedings of The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2015), Adelaide, Australia, September 23-25, pp. 117-120, 2015. (words: 2887) [SCOPUS in 2016]
  • Shen, Jau-Ji, *Lee, Chin-Feng, and Chen, Si-Ting (2015): “A High Payload Reversible Data Hiding Scheme Using Dual Images,” The 5th International Conference on Engineering and AppliedSciences (ICEAS 2015), 2015/07/20-07/22, Hokkaido, Japan (words: 3598)
  • *Lee, Chin-Feng, Chen, Si-Ting, Chen, Jui-Yu, and Hou, Kun Liang (2014): “A Reversible Data Hiding on Dual Steganographic Images Based on Quinary Coordinate Conversion and Histogram Modification of Difference,” The 6th FTRA International Conference on Computer Science and its Applications (CSA-14), Hyatt Regency Guam Hotel, Guam, USA, Dec. 17 - 19, 2014, Springer-LNEE (indexed by SCOPUS and EI). (words: 3248)
  • *Lee, Chin-Feng, Chen, Jui-Yu, and Chen, Si-Ting (2014): “A High Capacity Reversible Multiple-Image Hiding Scheme”, Proceedings of International Computer Symposium (ICS), Tunghai University, Taichung, Taiwan. December 12-14, 2014. (words: 4020)
  • *Chen, Yi-Ting, Liao, Bin-Yih, Lee, Chin-Feng, Tsay, Wu-Der, Lai, Mei-Chiao (2013): “An Adjustable Frequency Bat Algorithm based on Flight Direction to Improve Solution Accuracy for Optimization Problems,” Proceedings of The Second International Conference on Robot, Vision and Signal Processing (RVSP-2013-0143), Kitakyushu, Japan, December 10-12, 2013.[ published by IEEE Computer Society Press]
  • *Lee, Chin-Feng, Huang, Yung-Fa, and Chen, Jui-Yu (2013): “Reversible Data Hiding on Dual Steganographic Images Exploiting Matrix and Histogram Modification,” Proceedings of 2013 International Joint Conference on Awareness Science and Technology & Ubi-Media Computing (iCAST 2013 & UMEDIA 2013), Aizuwakamatsu, Japan Nov. 2-4, 2013. [ published by IEEE Computer Society Press] (words: 4816)
  • *Lee, Chin-Feng, Chin-Chen Chang, and Gao, Cheng-You (2013): “A Two-staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation,” Proceedings of The Nineth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP-2013), Beijing, China, October 16th-18th, 2013. [published by IEEE Computer Society Press] (words: 2779)
  • Chang, Ya-Ting, Chung, Min-Ju, Lee, Chin-Feng, and * Wang, Shiuh-Jeng (2013): "Memory Forensics for Key Evidence Investigations in Case Illustrations," Proceedings of the 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), Seoul, Korea on July 25 through 26, 2013. [EI-indexed; published by IEEE Computer Society Press] Digital Object Identifier: 10.1109/ASIAJCIS.2013.22 , Page(s): 96 – 101.
  • Lee, Chin-Feng* and Chen, Kai-Chin (2012): “Efficient Reversible Steganographic Embedding by the Integration of Reduplicated EMD and Image Interpolation,” Proceedings of The 2012 International Conference on Information Security and Intelligent Control (ISIC’12), Taiwan, Aug. 14-16, 2012. [EI-indexed; published by IEEE Computer Society Press] (words: 2970) Digital Object Identifier: 10.1109/ISIC.2012.6449736 Publication Year: 2012 , Page(s): 182 - 185
  • Lee, Chin-Feng* and Shih, Ming-Chi (2012): “An Efficient Lossless Data Hiding Scheme on VQ Index Coding,” Proceedings of The 7th Asia Joint Conference on Information Security (AsiaJCIS 2012), Tokyo, Japan, Aug. 08-09, 2012. [EI-indexed; published by IEEE Computer Society Press] (words: 2666) [included in the IEEE digital library: IEEE Xplore]
  • Huang,Cheng-Ta, Wang, Wei-Jen*, Tsai, Min-Yi and Lee, Chin-Feng, (2012): “Employing LSB and VQ for Undetectable Secret Data Hiding",” Proceedings of The 2012 International Workshop on Ubiquitous Information Processing and Management (UIPM 2012) In conjunction with The 9th International Conference on Ubiquitous Intelligence and Computing (UIC-2012), Fukuoka, Japan, September 04-07, 2012 (UIC-UIPM 2012) https://sites.google.com/site/uicuipm2012/ [EI-indexed; published by IEEE Computer Society Press] (words: 4169) Digital Object Identifier: 10.1109/UIC-ATC.2012.62 Publication Year: 2012 , Page(s): 644 - 649
  • Weng, Chi-Yao*, Fan, Chun-I, Lee, Chin-Feng, and Wang, Shiu-Jeng (2012): “Predictive Pixel Differencing Expansion in Data Reversibility Scheme,” Proceedings of The 6th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2012), Kuala Lumpur, Malaysia, Feb. 20-22, 2012 (ACM ICUIMC is indexed by SCOPUS since December, 2012). Subjects: Computers & Communication. (words: 3808)
  • Lee, Chin-Feng* and Chen, Kai-Chin, (2011): “Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method,” Proceedings of The Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP-2011), pp. 256-259, Dalian, China, October 14th-16th, 2011. (ISBN 978-0-7695-4517-2) [EI-indexed; published by IEEE Computer Society Press] (words: 2660)
  • Lee, Chin-Feng* and Shih, Ming-Chi, (2011): “Reversible Data Hiding Based on VQ Compression Code,” Proceedings of Fifth International Conference on Genetic and Evolutionary Computing (sponsored by IEEE society), pp. 208-211, Kinmen, Taiwan/ Xiamen, China, Aug. 29 – Sept. 1, 2011. (ISBN 978-1-4577-0817-6) [EI-indexed; published by IEEE Computer Society Press] (words: 3066)
  • Lee, Chin-Feng*, Li, Kuan-Ting , Goyal, Dushyant (2011): “High Capacity Reversible Data Hiding with Grouping of VQ Codebook,” Proceedings of 2011 International Conference on Data Engineering and Internet Technology (DEIT 2011) 15-17 March 2011, Bali Dynasty Resort, Bali, Indonesia Conference Record # 17831, IEEE Catalog Number: CFP1113L-CDR, (ISBN: 978-1-4244-8581-9) [included in the IEEE Xplore and indexed in both Ei Compendex and ISTP] (words: 5028)
  • Lee, Chin-Feng*, Chang, Chin-Chen, and Tsou, Pei-Ling (2010): “Data Hiding Scheme with High Embedding Capacity and Good Visual Quality Based on Edge Detection,” Proceedings of the Fourth International Conference on Genetic and Evolutionary Computing (ICGEC-2010), pp. 654 – 657, December 13-15, 2010, Shenzhen, China. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-0-7695-4281-2) (words: 2609) Identifier: 10.1109/ICGEC.2010.167 Digital Object Identifier: 10.1109/ICGEC.2010.167 Publication Year: 2010 , Page(s): 654 - 657
  • Lee, Chin-Feng, Huang, Shin-Rue, Chien, Hung-Yu*, Lee, Narn-Yih (2010): “Two-Party and Three-Party Remote User Authentication Schemes Using Biometric Data Only For Emergency,” Proceedings of the Second International Symposium on Aware Computing (ISAC2010), pp. 51 – 55, National Cheng Kung University, Tainan, Taiwan, Nov. 1-4, 2010. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-1-4244-8313-6) (words: 2631) Digital Object Identifier: 10.1109/ISAC.2010.5670450
  • Lee, Chin-Feng* and Tsai, Huei-Ju (2010): “A Reversible Data Hiding Scheme for Digital Images Using LAU-Side Match Prediction,” Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2010), Darmstadt, Germany, October 15-17, 2010. [EI-indexed; published by IEEE Computer Society Press] (ISBN-13:978-0-7695-4222-5) (words: 3178) Digital Object Identifier: 10.1109/IIHMSP.2010.16 Digital Object Identifier: 10.1109/IIHMSP.2010.16 Publication Year: 2010 , Page(s): 34 - 38
  • Lee, Chin-Feng* and Li, Kuan-Ting (2010): “VQ-based Image Embedding Scheme using Adaptive Codeword Grouping Strategy, ” Proceedings of the 5th International Conference on Future Information Technology (FutureTech 2010), pp. 1-6, May 21-23 (Fri.-Sun.), 2010, Busan, Korea [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-1-4244-6950-5) (words: 3871) Digital Object Identifier : 10.1109/FUTURETECH.2010.5482766
  • Lee, Chin-Feng, Chen, Yu-Chang, Chien, Hung-Yu*, Laih, Chi-Sung (2010): “Anonymous RFID Yoking Protocol Using Error Correction Codes”, The 2010 Workshop on RFID Security (RFIDsec'10 Asia), Singapore, February 22-23, 2010. (words: 2256)
  • Lee, Chin-Feng*, Chang, Chin-Chen, and Wu, Chun-Yu (2010): “A Reversible and Multiple-layer Embedding Strategy with High Capacity,” Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2010), SKKU, Suwon, Korea, January 14-15, 2010. [recorded in ACM digital library] (ISBN: 978-1-60558-893-3) (words: 2820)
  • Lee, Chin-Feng*, Chang, Chin-Chen, and Wu, Chun-Yu (2009): “Steganographic Scheme Using Heuristic Codeword Assignment and Cascade‐Shifting on VQ Image," Proceedings of the Second IEEE International Conference on Ubi-media Computing 2009 (Ubi-Media 2009), Dec. 3-5, 2009, Tamkang University, Taiwan. (words: 4307)
  • Chang, Chin-Chen, Lee, Chin-Feng*, Chen, Kuo-Nan, and Liu, Tien-Chung, (2009): “A High Quality Steganographic Scheme for ROI Images,” Proceedings of 2009 International Conference on Information and Multimedia Technology (ICIMT 2009), Dec. 18-19, 2009, Jeju Island, South Korea. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-0-7695-3922-5) (words: 3646) Digital Object Identifier: 10.1109/ICIMT.2009.116
  • Lee, Chin-Feng, Weng, Chi-Yao*, and Sharma, Aneesh, (2009):“A Secret Embedded Scheme with Capacity-raising Using Coding and Logical Exclusive-OR Operations,” Proceedings of the Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2009) in conjunction with 2nd International Conference on com[puter Science and its Applications (CSA 2009), Vol.1, pp. 379-384, held at Haevichi Hotel & Resort, Dec. 10 - 12, 2009, Jeju island, Korea. [EI-indexed; published by IEEE Computer Society Press] (ISBN 13: 978-1-4244-4946-0 ) (words: 2738) Digital Object Identifier : 10.1109/CSA.2009.5404246
  • Lee, Chin-Feng* and Chen, Hsing-Ling, (2009): “Data Concealment Scheme for HTML Documents Based on Color Code,” Proceedings of The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp.632-635, Sept. 2009. Kyoto, Japan. [recorded in IEEE digital library, Indexed by EI, ISTP, and INSPEC.] (ISBN: 978-0-7695-3762-7) (words: 2710) Digital Object Identifier: 10.1109/IIH-MSP.2009.19
  • Lee, Chin-Feng*, Shen, Jau-Ji and Chuang, Mei-Chun, (2009): “An Embedding Technique Based upon Block Prediction and Code Cascading Shift,” Proceedings of The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 361-364, Sept. 2009. Kyoto, Japan. [recorded in IEEE digital library, Indexed by EI, ISTP, and INSPEC.] (ISBN: 978-0-7695-3762-7) (words: 2449) Digital Object Identifier: 10.1109/IIH-MSP.2009.20
  • Chen, Kuo-Nan, Lee, Chin-Feng*, Chang, Chin-Chen and Lin, Huang-Ching, (2009):"Embedding Secret Messages Using Modified Huffman Coding," Proceedings of The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2009), pp. 278-281, Sept. 2009, Kyoto, Japan. [recorded in IEEE digital library, Indexed by EI, ISTP, and INSPEC.] (ISBN: 978-0-7695-3762-7) (words:4698) Digital Object Identifier: 10.1109/IIH-MSP.2009.53
  • Lee, Chin-Feng*, Chen, Kuo-Nan, Chang, Chin-Chen, and Tsai, Meng-Cheng, (2009): “A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation,” Proceedings of the Fifth International Conference on Information Assurance and Security (IAS 2009), Xi'an, China, August 18-20, 2009. [EI-indexed; published by IEEE Computer Society Press] (ISBN:978-0-7695-3744-3) (words:3013) Digital Object Identifier: 10.1109/IAS.2009.147
  • Lee, Chin-Feng*, Chang, Chin-Chen, and Liu, Tien-Chung, (2009): “A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement,” Proceedings of the Ninth International Conference on Hybrid Intelligent Systems (HIS 2009), pp.13-16, Shenyang, China, August 12-14, 2009. [EI-indexed; published by IEEE Computer Society Press] (ISBN-13:978-0-7695-3745-0) (words:2621) Digital Object Identifier: 10.1109/HIS.2009.10
  • Chang, Chin-Chen, Chen, Kuo-Nan, Lee, Chin-Feng*, and Wang, Zhi-Hui, (2009): “Hiding Information in Region-based Wet Images,” Proceedings of the Second International Symposium on Electronic Commerce and Security (ISECS 2009 & WISA 2009), Vol. 1, pp.189-194, Nanchang, China, May 2009. [EI-indexed; published by IEEE Computer Society Press] (ISBN:978-0-7695-3643-9) (words:4581) Digital Object Identifier: 10.1109/ISECS.2009.149
  • Lee, Chin-Feng*, Wang, Kuo-Hui, Chang, Chin-Chen, and Huang, Yu-Lin, (2009): “A Reversible Data Hiding Scheme Based on Dual Steganographic Images,” Proceedings of the Third International Conference on Ubiquitous Information Management and Communication (ICUIMC 2009), pp.228-237, SKKU, Suwon, Korea, January 15- 16, 2009. [recorded in ACM digital library; ACM 2009] (ISBN: 978-1-60558-405-8) (words: 3842)
  • Chen, Kuo-Nan, Lee, Chin-Feng*, Chang, Chin-Chen, (2009): “Embedding secret messages based on chaotic map and Huffman coding,” Proceedings of the Third International Conference on Ubiquitous Information Management and Communication (ICUIMC 2009), pp.336-341, SKKU, Suwon, Korea, January 15- 16, 2009. [recorded in ACM digital library; ACM 2009] (ISBN: 978-1-60558-405-8) (words: 3958)
  • Chang, Chin-Chen, Lee, Chin-Feng* and Wang, Yi-Ren, (2008): "An Improved EMD Embedding Scheme Based on Secret Image Difference," Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), pp. 129-135, Dec.17-20, 2008. Shanghai, China. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-0-7695-3492-3) (words: 3758) Digital Object Identifier: 10.1109/EUC.2008.38
  • Lee, Chin-Feng*, Chuang, Lin-Yi and Chang, Chin-Chen, (2008): "Hiding Information Employing Reduplicating Embedding," Proceedings of 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008), pp.825-828, December 9-12, 2008, Yilan, Taiwan. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-0-7695-3473-2) (words: 2890) Digital Object Identifier: 10.1109/APSCC.2008.50
  • Lee, Chin-Feng*, Shen, Jau-Ji and Chao, Hung-Lin, (2008): “Complete Double Layered Embedding Scheme for Information Hiding,” Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08), Vol. 3, pp. 525-528, Kaohsiung City, Taiwan, November 26-28, 2008. [EI-indexed; published by IEEE Computer Society Press] (ISBN 978-0-0-7695-3382-7) (words: 2068) Digital Object Identifier: 10.1109/ISDA.2008.105
  • Lee, Chin-Feng* and Yang, Tsung-Chia (2008): “A Blind Associative Watermarking Technique Using Self-embedding,” The Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08), Vol. 3, pp. 409-413, Kaohsiung City, Taiwan, November 26-28, 2008. [EI-indexed; published by IEEE Computer Society Press] (ISBN 978-0-0-7695-3382-7) (words: 2468) Digital Object Identifier: 10.1109/ISDA.2008.104
  • Lee, Chin-Feng*, Wang, Shu-Ching and Yi-Jia Wang, (2008): "Content-based Image Retrieval Based on Vector Quantization and Affine Invariant Region,” Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08), Vol. 1, pp. 287-290, Kaohsiung City, Taiwan, November 26-28, 2008. [EI-indexed; published by IEEE Computer Society Press] [This paper wins the Best Paper Award of the Eighth International Conference on Intelligent Systems Design and Applications (ISDA08).] (ISBN 978-0-0-7695-3382-7) (words: 1952) Digital Object Identifier: 10.1109/ISDA.2008.96
  • Tang, Yuan-Liang, Lee, Chin-Feng* and Lee, Huai-En, (2008): “Efficient Image Recovery Based on Self-embedding,” The Eighth International Conference on Intelligent Systems Design and Applications (ISDA'08), Vol. 3, pp. 398-402, Kaohsiung City, Taiwan, November 26-28, 2008. [EI-indexed; published by IEEE Computer Society Press] (ISBN 978-0-0-7695-3382-7) (words: 2717) Digital Object Identifier: 10.1109/ISDA.2008.142
  • Lee, Chin-Feng* and Lee, Huai-En, (2008): “A Blind Associative Watermark Detection Scheme Using Self-embedding Technique,” Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1122-1125, Harbin, China, August 15 - 17, 2008. [recorded in IEEE digital library, Indexed by EI, ISTP, and INSPEC.] (ISBN:978-0-7695-3278-3) (words: 2543) Digital Object Identifier: 10.1109/IIH-MSP.2008.199
  • Lee, Chin-Feng*, Pai, Pei-Yan, Huang, Wen-Hung, and Chang, Chin-Chen, (2008): “An Effective Demosaicking and Zooming Algorithm for CFA Images,” Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp.1150-1153, Harbin, China, August 15 - 17, 2008. [recorded in IEEE digital library, Indexed by EI, ISTP, and INSPEC.] (ISBN:978-0-7695-3278-3) (words: 2052) Digital Object Identifier: 10.1109/IIH-MSP.2008.201
  • Lee, Chin-Feng* and Chen, Hsing-Ling (2008): “Reversible Data Embedding Using the Sliding Window,” Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1118-1121, Harbin, China, August 15 - 17, 2008. [recorded in IEEE digital library, Indexed by EI, ISTP, and INSPEC.] (ISBN:978-0-7695-3278-3) (words: 2295) Digital Object Identifier: 10.1109/IIH-MSP.2008.266
  • Lee, Chin-Feng*, Chang, Chin-Chen, and Wang, Kuo-Hua, (2008): “Hiding Data in VQ-compressed Images Using Pairwise Nearest Codewords Based on Minimum Spanning Tree,” Proceedings of the Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1293-1296, Harbin, China, August 15 - 17, 2008. [recorded in IEEE digital library, Indexed by EI, ISTP, and INSPEC.] (ISBN:978-0-7695-3278-3) (words: 2890) Digital Object Identifier: 10.1109/IIH-MSP.2008.200
  • Lee, Chin-Feng*, Wang, Yi-Ren and Chang, Chin-Chen, (2008): “An Adaptive EMD Embedding Method by Condensing Secret Messages Based on Consecutive Ones Transformation and Token Substitution,” Proceedings of the Second International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2008), pp. 390-395, SKKU, Suwon, Korea, Jan. 31 -Feb. 1, 2008. [recorded in ACM digital library] (words: 3037)
  • Lee, Chin-Feng* and Chen, Hsing-Lin, (2007): “High-Capacity Data Hiding Using Virtual Window Partition,” Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), Vol. 1, pp. 315-318, Kaohsiung, Taiwan, November 26-28. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-0-7695-2994-1) Digital Object Identifier: 10.1109/IIHMSP.2007.4457553(words: 2571)
  • Chang, Chin-Chen, Lee, Chin-Feng* and Chuang, Lin-Yi, (2007): “Using Dynamic Programming Strategy to Find an Optimal Solution to Exploiting Modification Direction Embedding Method,” Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), Vol. 1, pp. 489-492, Kaohsiung, Taiwan, November 26-28, 2007. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-0-7695-2994-1) (words: 2748) Digital Object Identifier: 10.1109/IIH-MSP.2007.318
  • Lee, Chin-Feng*, Wang, Yi-Ren and Chang, Chin-Chen, (2007): “A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction,” Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2007), Vol. 1, pp. 497-500, Kaohsiung, Taiwan, November 26-28, 2007. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 978-0-7695-2994-1) (words: 2230) Digital Object Identifier: 10.1109/IIH-MSP.2007.62
  • Lee, Chin-Feng* and Chen, Kuan-Hua, (2007): “A Recommendation Method for Distributing Elementary Students by Data Mining and Neural Networking,” Proceedings of the 2007 International Conference on Business and Information (BAI 2007), InterContinental Tokyo Bay Hotel, Japan, July 10-13, 2007. (ISSN:1729-9322) (words: 3512)
  • Lee, Chin-Feng* and Chang, Wan-Ting, (2007): “Color Image Reconstruction of Missing Blocks Based on Robust Association Rules,” Proceedings of the 2007 International Conference on Business and Information (BAI 2007), InterContinental Tokyo Bay Hotel, Japan, July 10-13, 2007. ( ISSN:1729-9322) (words: 2484)
  • Lee, Chin-Feng* and Lan, Ying-Chang, (2006): “Exploiting Data Mining Techniques to Generate Prefetching Mechanism and Broadcasting Strategies in Mobile Computing Environment,” Proceedings of the 2006 International Conference on Business and Information (BAI 2006), Volume 3, Pan Pacific Hotel, Singapore, July 12-14, 2006. (ISSN 1729-9322) (words: 4125)
  • Lee, Chin-Feng* and Tsai, Chia-Hsing (2006): “Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML Databases,” Proceedings of the International MultiConference of Engineers and Computer Scientists 2006 (IAENG 2006), Hong Kong, 20-22 June, 2006. [This paper wins the Best Paper Award of the 2006 IAENG International Workshop on Data Mining and Applications.] (ISBN 978-988-98671-1-9) (words: 6124)
  • Lee, Chin-Feng* and Lan, Ying-Chang, (2005): “Using Hyper-connectivity Method for Mining Location-Service in Mobile Computing Environments,” Proceedings of the 3rd International Workshop on Supply Chain Management and Information Systems (SCMIS 2005), at the Electra Palace Hotel, Thessaloniki, Greece July 6th - 8th, 2005. (ISBN 9060-87869-0-8) (words: 4152)
  • Lee, Chin-Feng* and Shen, Tsung-Hsien, (2005): “An FP-split Method for Fast Association Rules Mining,” Proceedings of the 3rd International Conference on Information Technology: Research and Education (ITRE 2005), pp. 459-463, June 27-30, 2005, Hsinchu, Taiwan. [EI-indexed; published by IEEE Computer Society Press] (ISBN: 0-7803-8932-8) (words: 4120) Digital Object Identifier: 10.1109/ITRE.2005.1503165
  • Lee, Chin-Feng* and Tang, Chi-Ming, (2005): “Dynamically Compressing XML Tags and Data Characters via Incremental Updating Mining,” Proceedings of the International Association for Computer Information Systems Pacific 2005 Conference, May 19-21, 2005, Taipei, Taiwan. (words: 4374)
  • Lee, Chin-Feng* and Wu, Shu-Chen, (2005): “Discovery of Significant Rule Changes in Semantic Association Mining for Recurrent Spatial Objects,” Proceedings of the International Association for Computer Information Systems Pacific 2005 Conference, May 19-21, 2005, Taipei, Taiwan. (words: 3852)
  • Lee, Chin-Feng* and Tang, Chi-Ming, (2004): “A Compression Approach with Dynamic Maintenance on Native XML Database via Incremental Updating Techniques,” Proceedings of the 14th International Conference on Pacific Rim Management, Association for Chinese Management Educators (ACME), July 29-31, 2004, Chicago, USA. (words: 8442)
  • Lee, Chin-Feng* and Chen, Mei-Hsiu, (2003): “An Adaptive Two-Phase Spatial Association Rules ofr RSI Data Mining," Proceedings of the Third International Conference on Electronic Business (ICEB 2003), Dec. 9 -13, 2003, at the Marriott Hotel, Singapore.
  • Lee, Chin-Feng* and Jan, C.L., (2003): “Using KIRT to improve the efficiency of FAQ recommendation system,” Proceedings of the 9th Cross-Strait Conference on Information Management Development Strategy, (安徽合肥工業大學,中華民國資管學會合辦), September 12-16, 2003, pp. 838-843.
  • Lee, Chin-Feng*, Changchien, S. W. and Hsu, Y. J.,(2002): “An On-Line Personalized Promotion Decision Support System for Electronic Commerce,” Proceedings of the Second International Conference on Electronic Business (ICEB 2002), Taipei, Taiwan, December 10-13, 2002.
  • Lee, Chin-Feng* and Tsai, Main-Che, (2001): “A Design of Intelligent Pre-fetching Materialized Views Mechanism for Enhancing Summary Queries on Data Warehouse,” Proceedings of the First International Conference on Electronic, Business (ICEB 2001), Hong Kong, December 19-21, 2001, pp.409-411.
  • Lee, Chin-Feng* and Chang, C. C., (1999): “A New Iconic Indexing Scheme for Similarity Retrieval of Complex Spatial Objects”, World Multiconference on Systemics, Cybernetics and Informatics, Proceedings Volume 6 -- Image, Acoustic, Speech and Signal Processing, Orlando, Florida, USA, July 31-August 4, 1999, pp. 109-114. (NSC88-2218-E-324-006).
  • Chang, C. C. and Lee, Chin-Feng*, (1997): “An Efficient Indexing Scheme for Temporal Joins in Relational Environment”, Proceedings of the International Symposium on Digital Media Information Base (DMIB’97), Nara, Japan, Nov. 26-28, 1997.
  • Chang, C. C. and Lee, Chin-Feng*, (1997): “A Data Filter Mechanism for Orthogonal Range Searching on Multiattribute Files,” Proceedings of IPSJ International Symposium on Information Systems and Technologies for Network Society, Fukuoka, Japan, Sept. 1997. (Also, in Information Systems and Technologies for Network Society, pp. 261-264).
  • Chang, C. C. and Lee, Chin-Feng*, (1997): “Retrieving Chinese Characters Using DAYI Chinese Input Method,” Proceedings of the Seventeenth International Conference on Computer Processing of Oriental Languages, Hong Kong, Vol. 2, April 1997, pp. 387-391.
  • Lee, Chin-Feng* and Chang, C. C., (1996): “Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme,” Proceedings of International Symposium on Cooperative Database Systems for Advanced Applications (CODAS’96), Vol 2, Heian Shrine, Kyoto, Japan, Dec. 1996, pp. 396-399; also published on Cooperative Database Systems for Advanced Applications—Advanced Database Research and Development Series, Vol. 7, World Scientific, 1996, pp. 396-399.

(四) 國內期刊與雜誌文章

  • 李金鳳、*沈肇基、吳宜蓁(2019):「運用可位移嵌入策略以提高圖像品質之可逆式資訊隱藏技術(Reversible Data Hiding Scheme Using Shiftable Block Strategy for Enhancing Image Fidelity),中央警察大學『資訊、科技與社會』學報(Journal of Information, Technology and Society; JITAS)
  • 李金鳳*、陳昭如、賴郁樺、邱怡瑄、劉依庭、郭佳馨、賴其慧、洪佳吟 (2016):「玩轉Arduino自走車與moLo Sport互動式娛樂健身車於物聯網環境之應用系統」,建國科大社會人文期刊(特稿),第35卷,第1期, pp. 61-78, 2016年01月。獲頒「2015年民生電子研討會最佳論文獎」,(104)建資管獎字字第1041100011號。
  • 沈肇基、李金鳳*、侯昆良(2015) :「基於HADOOP架構運用影像分群方法改善影像拼貼之效率」, International Journal of Advanced Information Technologies (IJAIT) , 第10卷,第1期, pp. 13-38, Dec. 2015. (ISSN: 1996-2568) (words: 8577)
  • 李金鳳*、陳思婷(2015):「雙偽裝影像的可逆式資訊隱藏技行之探究」, Communications of the CCISA (資訊安全通訊)--Data Hiding Technology and its Application, 第21卷,第3 期, pp. 13-38, July 2015. (ISSN: 1729-6056) (words: 12568)
  • 李金鳳*、吳淑楨(Su-Chen Wu) 、陳星琳(2009):An Efficient Incremental Spatial Association Mining to Explore Significant Rule Changes for Altered Spatial Databases(一個有效的漸進式空間關聯探勘方法在異動型空間資料庫中探究顯著空間關聯規則之變化), Journal of Taiwan Intelligent Technologies and Applied Statistics(智慧科技與應用統計學報), 第7 卷,第1期,1-22頁, June 2009. (ISSN: 1812-433x) (words: 15303/ in English)
  • 李金鳳*、陳星琳、趙宏林(2009):「HTML文件植基於色彩控制之資訊隱藏技術」, Communications of the CCISA-Data Hiding Technology(資訊安全通訊), 第15卷,第3期, pp. 88-102, July 2009. (ISSN: 1729-6056) (words: 9475)
  • 李金鳳*、陳星琳、趙宏林(2009):「雙偽裝影像之可逆式資訊隱藏技術」,98年度資通安全專論(ICS InfoNet) , 編號T98004, 財團法人國家實驗研究院科技政策研究與資訊中心(http://ics.stpi.org.tw/ ), August 2009. (words: 11366)
  • 李金鳳*、陳星琳(2008):「可逆式資訊隱藏技術」,97年度資通安全專論(ICS InfoNet) , 編號T97005, 財團法人國家實驗研究院科技政策研究與資訊中心http://ics.stpi.org.tw/, Oct. 2008. (words: 12692)
  • 李金鳳*、張琬婷 (2008):“結合關聯探勘與邊緣偵測之區塊為基的彩色影像修復法”, 朝陽學報(Journal of Chaoyang University of Technology),第13期(Vol. 13), pp. 545-564, July 2008. (ISSN:1026-244X) (words: 7759)
  • 李金鳳*、李懷恩(2008):“一個錯誤恢復編碼技術植基於自我隱藏與分類式編碼簿之邊緣吻合向量量化於JPEG影像傳輸”,資訊科技國際期刊(International Journal of Advanced Information Technologies ; IJAIT), 第2卷(Vol. 2), 第1期(No.1), pp. 62-75, June 2008. (創刊號ISSN: 1996-2568) (words: 8624)
  • 李金鳳*、唐啟明(2008):“利用關聯探勘技術壓縮原生型XML資料庫”(Compressing the Native XML Database via Association Mining),電子商務研究學報, 第6卷(vol. 6), 第1期 (No.1), pp. 83-104, March 2008 (Spring 2008). (春季號ISSN:1726-2364) (words: 11943)
  • 李金鳳* (2001): “何謂資料探勘”,資訊與教育, 84期, pp.10-19, August 2001.
  • 李金鳳*、蔡孟哲 (2001):“利用決策樹分類法建置資料倉儲中檢核與整合大量企業資料之機制”, 朝陽學報(Journal of Chaoyang University of Technology),第6期(Vol. 6), pp. 147-166, July 2001.

(五) 國內研討會論文

  • 李金鳳、張振鋒、陳志豪、家玉(2022):「學伴情緒分析資訊系統」2022 DLT數位生活科技研討會, 國立高雄科技大學智慧生活資通創新與服務中心與國立高雄大學資訊工程系訂於2022年5月13日(五)至5月14日。
  • 李金鳳、江柏諭、陳宜瑄、李庭妤、王昱麒、楊硯筑、蕭詩穎 (2021):「結合Zenbo機器人之eTutor數位學伴資訊系統』2021第廿二屆民生電子研討會(WCE2021;)(E01優秀海報發表獎) 昆山科大,台南,台灣,2021年12月03、04日。【優秀海報發表獎】
  • 李金鳳, 張廷嘉 (2021):「織物表面缺陷檢測方法的研究」, 第二十五屆行動計算研討會(The 25th Mobile Computing Workshop, MC2021),國立臺中科技大學, 2021年8月23-24日(二)
  • 李金鳳,沈肇基,蔡昀瑾 (2021):「基於插值法之資料隱藏技術」,第三十一屆全國資訊安全會議 (Cryptology and Information Security Conference; ICSC 2021),國立師範大學,2021/08/05-06
  • 李金鳳、江柏諭、彭泰、潘鳳婷、江成強、黃建樺、粘佑任、李秉翰、李庭妤、王昱麒、楊硯筑、陳宜瑄、蕭詩穎 (2020): 「數位學伴貼近你的心」,2020第21屆民生電子研討會【最佳論文獎】會議論文集,pp. 459-463。樹德科大,高雄,台灣,2020.12.11。
  • 李金鳳、蔡皓吉、寧嘉裕、葉育勝、林秀蓉、吳可萱(2020): 「醫事管理系統--以台中一家醫療產業資訊化公司為例」,2020第21屆民生電子研討會議論文集,pp. 464-473。樹德科大,高雄,台灣,2020.12.11。
  • 李金鳳*、 陳炫霖、郭丞皓、陳冠杰、李家伃、李後翰、陳冠樺 (2019):「機器人餐廳服務生」,NCS 2019 全國計算機會議National Computer Symposium(以下簡稱NCS 2019)於2019年11月14-15日在國立金門大學舉辦. (words: 5743)
  • 李金鳳*、黃宇愛、鄭芷媛、黃仕茹、林郁瑋、游曼均、蘇郡平、鄭皓馨等七人 (2018):「樂齡健身娛樂物聯網應用 」,【第八屆網路智能與應用研討會(National Conference on Web Intelligence and Applications; NCWIA 2018)論文集,國立雲林科技大學,雲林,June 28-29, 2018. (words: 5743)
  • 李金鳳*、林郁瑋、游曼均、蘇郡平、黃宇愛、鄭芷媛、黃仕茹、鄭皓馨等七人 (2017):「Arduino LEGO 與RPG Maker在老人健康促進的應用系統分析與設計 」,2017 International Conference on Advanced Information Technologies (AIT 2017/WIC- Forum 2017) [2017第十一屆資訊科技國際研討會暨第七屆台灣網路智能學會學術論壇 (The 11th International Conference on Advanced Information Technologies & The 7th Forum on Taiwan Association for Web Intelligence Consortium)] 論文集,朝陽科技大學,台中,April 22, 2017. (words: 15875)
  • 李金鳳*、 陳鉞勳、林東朋、康民和、陳惠勝、黃聖儒、辛宜儒 (2016):「互動式虛擬實境遊戲開發與moLo Sport 娛樂健身車於物聯網環境之應用系統,獲頒「2016年民生電子研討會優良論文獎」,民生電子研討會,2016/11/19, 東華大學。
  • 李金鳳*、石安通(2016) “像素差值擴張法之不可逆資訊隱藏技術探究,” 第六屆網路智能與應用研討會論文集(2016 The Sixth National Conference On Web Intelligence And Applications),高雄應用科技大學,July 15, 2016. (words: 4894)
  • 毛可、李金鳳*、張真誠、石润华 (Ke Mao, Chin-Feng Lee*, Chin-Cheng Chang, Run-Hua Shi) (2016) “基於差異擴張法的可逆資訊隱藏演算法研究,”第二十六屆資訊安全會議(CISC 2016) Cryptology and Information Security Conference 2016」論文集,亞洲大學,台中,May 26-27, 2016. (words: 8457)
  • 李金鳳*、曾郁茹 (2016) “A study of PVO-based reversible data hiding methods,” 2016 International Conference on Advanced Information Technologies (AIT 2016/WIC2016) [2016第十屆資訊科技國際研討會暨第六屆台灣網路智能學會學術論壇 (The 10th International Conference on Advanced Information Technologies & The 6th Forum on Taiwan Association for Web Intelligence Consortium)] 論文集,朝陽科技大學,台中,April 23, 2016. (words: 15875)
  • 李金鳳*、陳昭如、賴郁樺、邱怡瑄、劉依庭、郭佳馨、賴其慧、洪佳吟 (2015):「玩轉Arduino自走車與moLo Sport互動式娛樂健身車於物聯網環境之應用系統」2015民生電子研討會(WCE2015),建國科大,2015年11月28日。獲頒「2015年民生電子研討會最佳論文獎」,(104)建資管獎字字第1041100011號。
  • 李金鳳*、陳冠華、賴亭妤、林岡蓁、吳文心、林怡岑、曾益倫、游燿瑞 (2015): “網站內容管理系統之分析與設計”(the development of a content management system(CMS)-based web site using Unified Modeling Language(UML)), 2015 International Conference on Advanced Information Technologies (AIT 2015) [2015年第九屆資訊科技國際研討會(AIT 2015)] 論文集,朝陽科技大學,台中, April 24-25, 2015.
  • 李金鳳*、賴佳欣 (2015): “運用拉格朗日與方向修正模函數之可逆式資訊隱藏法”, 2015 International Conference on Advanced Information Technologies (AIT 2015) [2015年第九屆資訊科技國際研討會(AIT 2015)] 論文集,朝陽科技大學,台中,April 24-25, 2015.
  • 沈肇基、李金鳳*、候昆良 (2015): “基於HADOOP架構運用VQ影像分類改善影像拼貼之效率”, 2015 International Conference on Advanced Information Technologies (AIT 2015) [2015年第九屆資訊科技國際研討會(AIT 2015)] 論文集,朝陽科技大學,台中,April 24-25, 2015.
  • 李金鳳*、曾郁茹 (2015):“植基於像素排序法與預測誤差方位配置法之有效的可逆式資訊隱藏” (Efficient Reversible Data Hiding based on Pixel Value Ordering and Exploiting Prediction-error Modification Direction),第二十五屆全國資訊安全會議(CISC 2015) Cryptology and Information Security Conference 2015,高雄第一科技大學,高雄, May 28-29, 2015.
  • 沈肇基、李金鳳*、陳思婷 (2015):“基於預測誤差離散程度的可逆式資訊隱藏技術”,第二十五屆全國資訊安全會議(CISC 2015) Cryptology and Information Security Conference 2015,高雄第一科技大學,高雄,May 28-29, 2015.
  • 李金鳳*、高承佑 (2014):“植基於預測誤差直方位移修正技術之可逆式資訊隱藏法”(A Reversible Data Hiding Using Prediction-error based on Histogram Shifting Modification Technique),第二十四屆全國資訊安全會議(CISC 2014) Cryptology and Information Security Conference 2014,政治大學,台北, May 30-31, 2014. [最佳論文獎]
  • 李金鳳*、陳芮宇 (2014): “四象限魔術矩陣之雙偽裝影像之可逆式資訊隱藏法”, 2014 International Conference on Advanced Information Technologies (AIT 2014) [2014年第八屆資訊科技國際研討會(AIT 2014)] 論文集, 朝陽科技大學, April 18-19, 2014.
  • 李金鳳*、高承佑 (2013):“基於預測誤差直方位移修正法之可逆式資訊隱藏探究(Survey of Reversible Information Hiding Exploiting Histogram Shifting Modification of Prediction-Error)” 全國計算機會議2013 (National Computer Symposium ; NCS 2013), 亞洲大學,台中,Dec. 13-14, 2013. (words: 8004)
  • 李金鳳*, 陳芮宇 (2013): "植基於多重偽裝影像機制之資訊隱藏技術探究",第二十三屆全國資訊安全會議 (Cryptology and Information Security Conference ; CISC 2013),南台科技大學,中華民國102年5月23日(星期四)至5月24日(星期五)。(words:13744)
  • 李金鳳*、高承佑 (2013):“運用拉格朗日插值法進行影像復原”,第三屆網路智能與應用研討會論文集 (NCWIA2013), 樹德科技大學,高雄, April 26, 2013。(words: 3913) [最佳論文獎]
  • 李金鳳*、陳志成、劉怡君、蘇伯嘉、陳姿妙、曾郁茹 (2013):“整合智慧型手機出缺勤管理系統”,第三屆網路智能與應用研討會論文集 (NCWIA2013), 樹德科技大學,高雄, April 26, 2013。(words: 4582)
  • 李金鳳*、陳志成、侯昆良、陳思婷、侯建宏、林維展、彭競磊、李柱強(2012):“雲端ABC智慧耕讀系統之分析與設計-以UML為塑模工具”,2012年民生電子學術研討會論文集,2012年11月16日(星期五)地點:主辦單位: 中華民國民生電子學會及國立虎尾科技大學。 (words: 15423)
  • 李金鳳*、陳志成、楊志傑、石雨凡、鄭亦琁 (2012):“雲端辦公室智慧型情境文件管理系統之分析與設計-以UML為塑模工具”,2012年第十五屆資訊管理學術暨警政資訊實務研討會論文集,中央警察大學資訊,桃園,101年11月15日(星期四),2012。(words: 14624)
  • 李金鳳*、劉怡君、蘇伯嘉、陳姿妙、曾郁茹(2012):“整合智慧型手機於出差勤動態管理系統之分析與設計 -以UML為塑模工具”,2012資訊科技國際研討會暨第二屆網路智能與應用研討會論文集(AIT/ NCWIA2012), 朝陽科技大學,台中, April 27-28, 2012。(words: 13253)
  • 李金鳳*、陳凱琴 (2012):“植基於EMD資訊隱藏之探究”, 2012資訊科技國際研討會暨第二屆網路智能與應用研討會論文集(AIT/ NCWIA2012), 朝陽科技大學,台中, April 27-28, 2012。(words: 15142)
  • 李金鳳*、施銘棋 (2012):“植基於VQ壓縮資訊隱藏技術之探究”, 2012資訊科技國際研討會暨第二屆網路智能與應用研討會論文集(AIT/ NCWIA2012), 朝陽科技大學,台中,April 27-28, 2012。(words:13845)
  • 李金鳳、黃正達* (2011)” “向量編碼的資訊藏密法之研究”,2011數位生活科技研討會 (2011 Symposium on Digital Life Technologies), July 7-8, 2011, 國立成功大學數位生活科技研發中心主辦,會議地點:國立雲林科技大學.
  • 李金鳳*、蔡蕙如(2011): “高藏量之邊緣吻合預測之可逆式資訊隱藏法”, 第二十二屆國際資訊管理學術研討會(ICIM 2011), 朝陽科技大學, May 21, 2011。(ISBN: 978-986-7034-44-3) (words: 8035)
  • 李金鳳*、劉家銘、王興田、張真誠(2011): “植基於利用方向修正法之可調式高藏量資訊隱藏法 (Adaptive Data Hiding Based on Exploiting Modification Direction with High Embedding Capacity), 第二十二屆國際資訊管理學術研討會(ICIM 2011), 朝陽科技大學, May 21, 2011。(ISBN: 978-986-7034-44-3) (words: 7698)[最佳論文獎]
  • 李金鳳*、鄭治堅、林致錕、林敬硯、楊依依、李瑜瑄、董世煌(2011): “數位典藏創意應用系統之設計” 中華民國第一屆網路智能與應用研討會(NCWIA2011) 論文集, 國立高雄大學, April 29, 2011. (ISBN: 978-986-87216—0-9) (words: 5433)
  • 李金鳳*、陳凱琴 (2011):“植基於直方圖位移技術的可逆式資訊隱藏法之探究”, 2011 International Conference on Advanced Information Technologies (AIT 2011) [2011年資訊科技國際研討會(AIT 2011)] 論文集, 朝陽科技大學, April 22-23, 2011. (ISBN: 978-986-7043—42-9) (words: 10908)
  • 李金鳳*、陳昭仁 (2010):“以模糊層級分析法於學生核心能力養成目標對於企業招聘人才需求之重要性評比之排名分析”, 2010 年資訊科技國際研討會 (AIT 2010), 朝陽科技大學, April 23-24, 2010。(ISSN: 978-986-7043—30-6) (words: 10794)
  • 李金鳳*、陳星琳、林宗家(2009):“半盲目型浮水印植基自我參照影像” , 全國計算機會議 (2009 National Computer Symposium, NCS 2009) Workshop on Cryptogrpahy and Information Security, page CI1A01,台北大學,Nov. 27-28, 2009. <入圍最佳論文獎>(words: 3296)
  • 李金鳳*、翁麒耀、Aneesh (2009): “Increasing Payload in Reversible Data Hiding Scheme for Image Steganography”, 全國計算機會議 (2009 National Computer Symposium, NCS 2009) Workshop on Cryptogrpahy and Information Security,page CI-0402, 台北大學, Nov. 27-28, 2009. (words: 4135)
  • 李金鳳*、楊宗家(2009) :“半盲目型關聯式浮水印技術” , The 14th Conference on Artificial Intelligence and Applications(TAAI 2009) [第十四屆人工智慧與應用研討會(TAAI 2009)], 朝陽科技大學資管系, Oct. 30-31, 2009. (words: 7930) (ISBN: 9789867043269)
  • 李金鳳*、陳曉婷(2009):“整合AHP與Fuzzy方法於可調式多屬性之排名分析-應用於民眾選擇健康檢查醫療院所之研究”, 2009年台灣智慧科技與應用統計研討會, 中國文化大學(曉峰紀念館國際會議廳), 2009年07月22日。(words: 9732)
  • 李金鳳*、陳昭仁、李冠霆(2009):“結合區塊預測及編碼連索位移之資訊隱藏技術”, 2009資訊管理技術與實務應用發展暨資訊人才培育研討會, 聖約翰科技大學資訊管理系, 2009年6月3日。(ISBN: 978-986-6765-09-4) (words: 6408)
  • 李金鳳*、黃郁霖(2009):“植基於差值擴張的高品質可逆式資訊隱藏技術”, 2009 International Conference on Advanced Information Technologies(AIT 2009) [2009年資訊科技國際研討會(AIT 2009)] , 朝陽科技大學, April 25-26, 2009。 (ISBN:978-986-7043-13-9) (words: 4973)
  • 李金鳳*、沈肇基、莊梅君(2008):“運用EMD嵌入VQ索引值中之資訊隱藏技術”, 電腦圖學研討會(Computer Graphics Workshop, CGW2008), 嘉義大學蘭潭校區, July 24-25, 2008。(words: 5266)
  • 李金鳳*、賴淑華(2008):“運用EDP預測及平滑區塊回收概念強化SMVQ資訊隱藏技術”, 第十九屆國際資訊管理學術研討會(ICIM 2008), 暨南國際大學, May 16-17, 2008。 (ISBN 978-986-83273-3-7) (words: 6939)
  • 李金鳳*、趙宏林 (2008) : “改善DLE之高藏量資料隱藏法”, 2008 International Conference on Advanced Information Technologies(AIT 2008) [2008 年資訊科技國際研討會(AIT 2008)], 朝陽科技大學, April 25-26,2008。 (ISBN:978-986-7043-05-4) (words: 4570)
  • 李金鳳*、陳曉婷(2008) : “整合AHP與Fuzzy方法於可調式多屬性之排名分析-應用於患者選擇轉診醫院之研究”, 2008 International Conference on Advanced Information Technologies(AIT 2008) [2008 年資訊科技國際研討會(AIT 2008)], 朝陽科技大學, April 25-26, 2008。 (ISBN:978-986-7043-05-4) (words: 7081)
  • 李金鳳*、唐啟明(2007) : “利用關聯探勘技術壓縮原生型XML資料庫” , 第十屆電子商務學術研討會, 台北大學商學院, Oct. 10, 2007. (words: 11943)
  • 李金鳳*、賴淑華(2007) : “A Data Hiding Scheme Based on Image Block Classification and SMVQ Prediction”,2007資訊科技管理與資訊人才培育研討會,聖約翰科技大學, June 6, 2007。(ISBN: 978-986-81668-9-9) (words: 7096)
  • 李金鳳*、王翊嘉(2007) :Content-based Image Retrieval Based on Vector Quantization and 4-ary Tree”, 2007資訊科技管理與資訊人才培育研討會, 聖約翰科技大學, June 6, 2007。(ISBN: 978-986-81668-9-9) (words: 5686)
  • 李金鳳*、楊宗家(2007): “不需原始影像之強韌關聯式浮水印偵測技術”, 2007 Internatiional Conference on Advanced Information Technologies(AIT 2007) [2007 年資訊科技國際研討會(AIT2007)], 朝陽科技大學, April 28, 2007。(ISSN-13: 978-986-7043—03-0) (words: 6259)
  • 李金鳳*、李懷恩(2007) : “一個錯誤還原編碼技術植基於自我隱藏與分類式編碼簿之邊緣吻合向量量化於JPEG 影像傳輸”, 2007 International Conference on Advanced Information Technologies(AIT 2008) [2007 年資訊科技國際研討會(AIT2007)], 朝陽科技大學, April 28, 2007。(ISSN-13: 978-986-7043—03-0)<本文擴增修稿後再審刊登於資訊科技國際期刊(International Journal of Advanced Information Technologies ; IJAIT)> (words: 8896)
  • 李金鳳*、陳冠華(2006): “利用資料探勘與類神經網路技術於國小學童轉學生班級轉入推薦”, 第十七屆國際資訊管理學術研討會(ICIM2006),,義守大學, May 27, 2006。(ISBN:957-29172-1-8)
  • 李金鳳*、蔡佳興(2005): “An Efficient Incremental FP-split Approach for Compressing Native XML Databases”, 第十六屆國際資訊管理學術研討會(ICIM2005), 輔大資管, May 28, 2005。(ISBN:978-986-75876-1-8)
  • 李金鳳*、江慧敏、朱孝國(2005): “應用類神經網路與資料探勘於大學入學科系之推薦研究”,2005電子商務與數位生活(ECDL2005)研討會, 實踐大學, Mar. 25-26, 2005。
  • 李金鳳*、沈宗憲(2004): “一個快速探勘關聯規則的高頻型態分割法於原生型XML資料庫”, 2004年產業電子化運籌管理學術暨實務研討會, 2004, 國立高雄第一科技大學, June 4。
  • 李金鳳*、吳淑禎(2004): “挖掘適於重複空間物件的空間語義關聯規則” ,第五屆電子化企業經營管理理論暨實務研討會, 大葉大學, May 22, 2004。
  • 李金鳳*、沈宗憲(2004): “一個有效率的關聯規則探勘方法應用於原生型XML資料庫”, 第五屆電子化企業經營管理理論暨實務研討會, 大葉大學, May 22, 2004。
  • 李金鳳*、唐啟明(2004): “在原生型XML資料庫上利用資料探勘技術進行資料壓縮”, 第五屆電子化企業經營管理理論暨實務研討會, 大葉大學, May 22, 2004.
  • 李金鳳*、詹啟琳(2003): “以群聚矩陣法萃取原生型XML資料庫中決策知識之研究”, 第五屆管理學域學術研討會, 朝陽科技大學, May 4, 2003。
  • 李金鳳*、詹啟琳、廖虹雲(2003): 以群聚關聯方法改善漸進式關聯規則效率之研究, 第四屆產業資訊管理學術暨新興科技實務研討會, 輔大, Nov. 29, 2003。
  • 李金鳳*、詹啟琳(2003): “以群聚關聯矩陣改善關聯法則效率之研究”, 第九屆資訊管理暨實務研討會, 大葉大學, Dec. 13, 2003。
  • 李金鳳*、江慧敏(2003): “利用資料探勘之關聯規則與類神經網路技術對大學推薦甄選考試進行預測推論”, 第九屆資訊管理暨實務研討會, 大葉大學, Dec. 13, 2003。
  • 李金鳳*、陳美秀(2003): “一個有效的空間關聯規則探勘方法於遙測圖” , 第十四屆國際資訊管理學術研討會, pp.1144-1151, 嘉義中正大學, July 12, 2003。
  • 詹啟林, 吳志宏, 黃如慧, 李金鳳, 李麗華, 張簡尚偉, 黃明祥* (2003): "以節省廣告代理商托播成本為基礎進行高效度網路廣告推薦之研究", 笫四屆網際網路應用與發展學術研討會,台南遠東技術學院, pp. 229-234, May 9, 2003。
  • 李金鳳*、陳美秀(2002): “利用類別繼承樹與模糊理論挖掘空間語義關聯規則”,2002年資訊管理國際研討會論文, pp. 81-92,育達商業技術學院, June 28, 2002。
  • 李金鳳*、張簡尚偉、王威澤(2001): “以廣義化關聯資料探勘方法設計物件導向資料庫壓縮技術之研究”, 2001全國計算機會議—資料庫與軟體工程, pp. G151-G162, Dec.20-21, 2001。
  • 李金鳳*、蔡孟哲(2001): “統計資料庫資料分類與資料整併機制之探討” ,九十年統計學術研討會, page 6(摘要)(全文登錄在光碟), 中國統計學社、行政院主計處、中央研究院統計科學研究所、國立政治大學統計系, Dec. 8, 2001。
  • 李金鳳*、蘇威霖(2001): “利用類神經網路整合異質型資料庫暨以代理人為基礎實作於電子商務環境”, 第七屆資訊管理研究暨實務研討會, page 25, 景文技術學院資管系, Dec. 15, 2001 (摘要)(全文登錄在光碟)。

(六) 編書著書

  • 曾國坤*、李金鳳、潘正祥、廖斌毅(Nov 2010)編著「物聯網與RFID技術實驗系統 (Internet Of Things and RFID Technology Training System)」, ,ISBN: 0-7695-2994-1,出版者:台灣優奎士有限公司( Ubiquitous International, USA),2010年十一月初版 (瞻科技經典系列叢書). Avaible online: http://www.tw-ubiquitous.com/prod_list.asp?prod_sub_id=12&prod_id=21。
  • 廖國良*、林家禎、許永和、李金鳳、潘正祥、廖斌毅(July 2010)編著,潘正祥總編輯,廖斌毅總策劃: 「RFID無線射頻辦識實驗系統(Radio Frequency Identification Training System)」,ISBN:978-986-85543-3-7, 出版者:台灣優奎士有限公司(Ubiquitous International, USA), 2010年七月初版 (瞻科技經典系列叢書). Avaible online: http://www.tw-ubiquitous.com/prod_list.asp?prod_sub_id=11&prod_id=15
  • 博士論文 June 1998(指導教授: 張真誠教授) 「適於空間吻合查詢的資料索引與檔案組織之設計(Some Indexing Design and File Organizations for Spatial Match Retrieval)」
  • 碩士論文 June 1994(指導教授: 張真誠教授) 「貪婪鬆弛廣義磁磚安排法對於多鍵語赫序檔案之配置研究(A Greedy Relaxed Generatlised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems)」

(七) 技術報告(Technical Report)

  • Lee, Chin-Feng, Changchien, S. Wesley and Wang, Wei-Tse, “Association Rules Mining for Native XML Databases”, Department of Information Management, CYUT, Technical Report, CYUT-IM-TR-2003-011.
  • Lee, Chin-Feng, Hsu, Yu-Jung, “An On-Line Personalized Promotion Decision Support System for Electronic Commerce”, Department of Information Management, CYUT, Technical Report, CYUT-IM-TR-2002-014, Sep. 6, 2002.
  • Lee, Chin-Feng, Tsai, Main-Che, Lee, Mei-Hsun, “A Categorizing Mechanism Using Signature File to Construct Multidimensional Data into a Concept Hierarchy Tree for Enhancing Data Warehouse Access”, Department of Information Management, CYUT, Technical Report, CYUT-IM-TR-2002-015, Sep. 6, 2002.
  • Lee, Chin-Feng, and Tsai, Main-Che, “A Design of Intelligent Pre-fetching Materialized Views Mechanism for Enhancing Summary Queries on Data Warehouses”, Department of Information Management, CYUT, Technical Report, CYUT-IM-TR-2001-001.
  • Lee, Chin-Feng, and Tsai, Main-Che, “對具有大量分類特性之資料建立適於導入決策樹之索引架構研究”, Department of Information Management, CYUT, Technical Report, CYUT-IM-TR-2000-023.
  • Lee, Chin-Feng, and Chang, Chin-Chen, “A Design of Iconic Indexing Scheme for Similarity Retrieval of Complex Spatial Objects”, Department of Information Management, CYUT, Technical Report, CYUT-IM-TR-2000-003.
  • Lee, Chin-Feng, and Hsien, Shen,-Tsung, “An FP-split Method for Fast Association Rules Mining”, Department of Information Management, CYUT, Technical Report, CYUT-IM-TR-2005-001.
  • Lee, Chin-Feng, and Wu, Shu-Chen, “Discovery of Significant Rule Changes in Semantic Association Mining for Recurrent Spatial Objects”, Department of Information Management, CYUT, Technical Report, CYUT-IM-TR-2005-002.