Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
2008 | Scalar-product based secure two-party computation | Shen, C. H.; Zhan, J.; Hsu, T-s; Liau, C. J.; Wang, D. W. | | | | |
2005 | Secrecy of two-party secure computation | Chiang, Y. T.; Wang, D. W.; Liau, C. J.; Hsu, T. -s. | | | | |
2012 | Towards a scripting language for automating secure multiparty computation | Chen, K.; Hsu, T. -s.; Huang, W. K.; Liau, C. J.; Wang, D. W. | | | | |
2008 | Towards efficient privacy-preserving collaborative recommender systems | Zhan, J.; Wang, I. C.; Liau, C. J.; Wang, D. W. | | | | |
2009 | Towards empirical aspects of secure scalar product | Wang, I-C.; Shen, C. -H.; Hsu, T. -s.; Liau, C. J.; Wang, D. W.; Zhan, J. | IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews 39, 440-447 | | | |
2002 | Two-literal logic programs and satisfiability representation of stable models: A comparison | Huang, G. S.; Jia, X.; Liau, C. J.; You, J. H. | | | | |
2006 | Value and damage of information: A data security perspective | Wang, D. W.; Liau, C. J.; Hsu, T. -s.; Chen, J. K. -P. | International Journal of Approximate Reasoning 43 | | | |
- | Variable consistency and variable precision models for dominance-based fuzzy rough set analysis of possibilistic information systems | Fan, T. F.; Liau, C. J.; Liu, D. R. | International Journal of General Systems | | | |
2012 | Variable precision fuzzy rough set based on relative cardinality | Fan, T. F.; Liau, C. J.; Liu, D. R. | | | | |