公開日期 | 題名 | 作者 | 關聯 | scopus | WOS | 全文 |
2012 | Logic, probability, and privacy: A framework for specifying privacy requirements | Hsu, T. -s.; Liau, C. J.; Wang, D. W. | | | | |
2004 | Medical privacy protection based on granular computing | Wang, D. W.; Liau, C. J.; Hsu, T. -s. | Artificial Intelligence in Medicine 32, 137-149 | | | |
2009 | On applying secure multi-party computation: A case report | Wang, I. C.; Chen, K.; Chuang, J. H.; Lee, C. H.; Hsu, T. -s.; Liau, C. J.; Wang, P. Y.; Wang, D. W. | | | | |
2004 | On the damage and compensation of privacy leakage | Wang, D. W.; Liau, C. J.; Hsu, T. -s.; Chen, J. K. -P. | | | | |
1996 | Point Location Problem and its Application to Synchronous Ethernet | Tsai, Kuo-Hui; Wang, D. W.; Ko, Ming-Tat; Chang, C. H. | | | | |
2003 | Preserving Confidentiality When Sharing Medical Database with the Cellsecu System | Chiang, Y. C.; Hsu, T. -s.; Kuo, S.; Liau, C. J.; Wang, D. W. | International Journal of Medical Informatics 71, 17-23 | | | |
2006 | Privacy protection in social network data disclosure based on granular computing | Wang, D. W.; Liau, C. J.; Hsu, T. -s. | | | | |
2010 | Privacy-preserving collaborative recommender systems | Zhan, J.; Hsieh, C. L.; Wang, I. C.; Hsu, T. -s.; Liau, C. J.; Wang, D. W. | IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews , 472--476 | | | |
2013 | Privacy-preserving social network publication based on positional indiscernibility | Hsu, T. -s.; Liau, C. J.; Wang, D. W. | | | | |
2010 | Quantitative assessment of early intervention strategies: a case study of 2009 H1N1 pandemic in Taiwan | Chern, T. C.; Tsai, M. T.; Chang, H. J.; Chuang, J. H.; Hsu, T. -s.; Kuo, H. S.; Liau, C. J.; Wang, D. W. | | | | |
2008 | Scalar-product based secure two-party computation | Shen, C. H.; Zhan, J.; Hsu, T-s; Liau, C. J.; Wang, D. W. | | | | |
2005 | Secrecy of two-party secure computation | Chiang, Y. T.; Wang, D. W.; Liau, C. J.; Hsu, T. -s. | | | | |
1996 | Steiner Problem on Directed Acyclic Graphs | Hsu, T. S.; Tsai, K. H.; Wang, D. W.; Lee, D. T. | | | | |
2009 | Supporting Patients\' Privacy Preferences Using Aspects | Chen, K.; Wang, D. W. | Japan Journal of Medical Informatics 29, 117-128 | | | |
2012 | Towards a scripting language for automating secure multiparty computation | Chen, K.; Hsu, T. -s.; Huang, W. K.; Liau, C. J.; Wang, D. W. | | | | |
2008 | Towards efficient privacy-preserving collaborative recommender systems | Zhan, J.; Wang, I. C.; Liau, C. J.; Wang, D. W. | | | | |
2009 | Towards empirical aspects of secure scalar product | Wang, I-C.; Shen, C. -H.; Hsu, T. -s.; Liau, C. J.; Wang, D. W.; Zhan, J. | IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews 39, 440-447 | | | |
1996 | User-Oriented breasts cancer prevention and treatment decision support WWW homepahe(abstract﹞ | Chang, P.; Liu, C. H.; Liou, D. M.; Chuang, J. H.; Wang, D. W.; Kuo, H. S. | | | | |
2006 | Value and damage of information: A data security perspective | Wang, D. W.; Liau, C. J.; Hsu, T. -s.; Chen, J. K. -P. | International Journal of Approximate Reasoning 43 | | | |