Page 68 - profile2014.indd
P. 68

研究員
                                                      呂俊賢 Chun-Shien Lu



                                               Research Fellow
                                               Ph.D., Electrical Engineering, National Cheng-Kung University
                                               Tel: +886-2-2788-3799 ext. 1513             Fax: +886-2-2782-4814
                                               Email: lcs@iis.sinica.edu.tw
                                               http://www.iis.sinica.edu.tw/~lcs



                  ● Research Fellow, Institute of   Research Description
                 Information Science, Academia
                 Sinica, Taiwan, ROC (2013/3–pre-
                 sent)                         My recent research interests mainly focus on algorithm design, theoretic analysis, and applica-
                  ● Associate Research Fellow,   tions of Compressive Sensing (CS). CS is a revolutionary methodology of simultaneously sensing
                 Institute of Information Sci-   and compressing signals, and builds a new sampling theorem beyond the Nyquist rate. We are
                 ence, Academia Sinica, Taiwan   currently interested in fundamental issues of optimal sensing matrix design, fast and accurate
                 (2006/7–2013/3)               sparse signal recovery algorithms, dictionary learning, and theoretical but more practical bounds
                  ● Adjunct Associate Professor, De-  for sparse signal recovery.
                 partment of CSI, National Taipei   For optimal sensing matrix design, conventional approaches are mostly based on reducing mu-
                 University of Technology, Taiwan
                 (2006/9–2008/1)               tual coherence between a pair of sensing matrix and sparsifying basis. This seems to be intui-
                                               tive and reasonable but the resultant optimal sensing matrix does not necessarily lead to good
                  ● Associate Editor, IEEE     sparse signal recovery performance. We will investigate this topic by exploring and comparing
                 Trans. on Image Processing    the existing criteria.
                 (2010/12~2014/12)

                  ● Ta-You Wu Memorial Award,   For sparse signal recovery, many algorithms have been proposed. However, we  nd that the the-
                 National Science Council, Taiwan,   oretic recovery bound and practical performance are still not consistent. In fact, it is very often
                 ROC (2007)                    that the theoretical bounds are too strict to  t practical situations. Our goal is to close the gap

                                               between them.
                                               Our representative results on compressive sensing are summarized as follows:
              (1) We have proposed a sparse Fast Fourier Transform (sFFT) method that is faster than MIT’s methods (also known as state-of-the-art) with bet-
                ter reconstructed results. The advantage also includes the easy selection of parameters and easy implementation for sFFT without needing
                to know sparsity of a signal.
              (2) We have developed a compressed sensing detector design for space shift keying for MIMO systems, a compressed sensing-based clone iden-
                ti cation method for sensor networks, and compressed sensing-based cooperative spectrum sensing for cognitive radio networks.

              (3) We have presented a distributed compressive video sensing (DCVS) method to simultaneously sense and compress videos.


                Publications


              1.  Tsung-Hsun Chien, Wei-Jie, Liang, and Chun-Shien Lu, ``A   Sparse  Representation  for  Image  Similarity  Assessment,’’
                 Practical Subspace Multiple Measurement Vectors Algorithm   IEEE Trans. on Multimedia, Vol. 13, No. 5, pp. 1019-1030,
                 for Cooperative Spectrum Sensing,’’ Proc. IEEE Globecom,   2011.
                 Austin, TX, 2014.
                                                                  7.  Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, ``Tem-
              2.  Yao-Tung Tsou, Chun-Shien Lu, and Sy-Yen Kuo, “MoteSec-  poral  Frequency  of Flickering-Distortion  Optimized  Video
                 Aware: A Practical  Secure Mechanism for  Wireless Sensor   Halftoning for Electronic Paper,’’ IEEE Trans. on Image Pro-
                 Networks,’’  IEEE Trans. on Wireless Communications, vol.   cessing, Vol. 20, No. 9, pp. 2502-2514, 2011.
                 12, no. 6, pp. 2817-2829, 2013.
                                                                  8.  Chia-Mu  Yu,  Yao-Tung  Tsou, Chun-Shien Lu, and Sy-Yen
              3.  Chia-Mu  Yu,  Yao-Tung  Tsou, Chun-Shien Lu, and Sy-Yen   Kuo, “Practical  and Secure Multidimensional  Queries in
                 Kuo, “Localized Algorithms for Detection of Node Replica-  Tiered Sensor Networks,’’ IEEE Trans. on Information Foren-
                 tion Attacks in Mobile Sensor Networks,’’ IEEE Trans. on In-  sics and Security, vol. 6, no. 2, pp. 241-255, 2011.
                 formation Forensics, and Security, Vol. 8, No. 5, pp. 754-768,
                 2013.                                            9.  Chia-Mu  Yu,  Yao-Tung  Tsou, Chun-Shien Lu, and Sy-Yen
                                                                      Kuo, “Constrained Function based Message Authentication
              4.  Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei, ``Im-  for Sensor Networks,’’ IEEE Trans. on Information Forensics
                 age Feature Extraction  in Encrypted  Domain with Privacy-  and Security, vol. 6, no. 2, pp. 407-425, 2011.
                 Preserving SIFT,’’ IEEE Trans. on Image Processing, Vol. 21,
                 No. 11, pp. 4593-4607, 2012.                     10.  Chia-Mu Yu, Chun-Shien Lu, and Sy-Yen Kuo, “Non-Interac-
                                                                      tive Pairwise Key Establishment for Sensor Networks,’’ IEEE
              5.  Chun-Shien Lu and Chao-Yung Hsu, ``Constraint-Optimized   Trans. on Information Forensics and Security, Vol. 5, No. 3,
                 Keypoint Removal/Insertion Attack: Security Threat to Scale-  pp. 556-569, 2010.
                 Space Image Feature Extraction,’’ ACM Multimedia Confer-  11.  Chia-Mu Yu, Chun-Shien  Lu, and  Sy-Yen  Kuo, “A Simple
                 ence (ACM MM), Oct. 30-Nov. 02, Nara, Japan, pp. 629-638,   Non-Interactive Pairwise Key Establishment Scheme in Sen-
                 2012. (full paper, acceptance rate 20.2%)
                                                                                          th
                                                                      sor Networks,’’ Proc. The 6  IEEE Communications Society
              6.  Li-Wei Kang, Chao-Yung Hsu, Hung-Wei Chen, Chun-Shien   Conference  on  Sensor,  Mesh and Ad Hoc Communications
                 Lu, Chih-Yang Lin, and Soo-Chang Pei, ``Feature-based   and Networks (SECON), June 22-26, 2009. (acceptance rate
                                                                      18.5%)




          68    研究人員 Research Faculty
   63   64   65   66   67   68   69   70   71   72   73