Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
1991 | Finding a Smallest Augmentation to Biconnect a Graph | T.-s. Hsu; V. Ramachandran | SIAM Journal on Computing 22(5), 889-912 | | | |
2007 | Granulation as a privacy protection mechanism | D.W. Wang; C.J. Liau; T.-s. Hsu | Transactions on Rough Sets VII, 256-273 | | | |
2010 | Heterogeneous subset sampling | M.T. Tsai; D.W. Wang; C.J. Liau; T.-s. Hsu | | | | |
2002 | How much privacy? - A system to safe guard personal privacy while releasing database | Y.T. Chiang; Y.C. Chiang; T.-s. Hsu; C.-J. Liau; D.W. Wang | | | | |
2006 | Information theoretical analysis of two-party secret computation | D.W. Wang; C.J. Liau; Y.T. Chiang; T.-s. Hsu | | | | |
2012 | Logic, probability, and privacy: A framework for specifying privacy requirements | T.-s. Hsu; C.J. Liau; D.W. Wang | | | | |
2004 | Medical privacy protection based on granular computing | D.W. Wang; C.J. Liau; T.-s. Hsu | Artificial Intelligence in Medicine 32(2), 137-149 | | | |
2009 | On applying secure multi-party computation: A case report | I.C. Wang; K. Chen; J.H. Chuang; C.H. Lee; T.-s. Hsu; C.J. Liau; P.Y. Wang; D.W. Wang | | | | |
1991 | On Finding a Smallest Augmentation to Biconnect a Graph (Extended abstract) | T.-s. Hsu; V. Ramachandran | | | | |
2000 | On Four-Connecting a Triconnected Graph | T.-s. Hsu | Journal of Algorithms 35(2), 202-234 | | | |
1992 | On Four-Connecting a Triconnected Graph (Extended Abstract) | T.-s. Hsu | | | | |
2004 | On the damage and compensation of privacy leakage | D.W. Wang; C.J. Liau; T.-s. Hsu; J.K.-P. Chen | | | | |
1996 | Optimal Bi-Level Augmentation for Selectively EnhancingGraph Connectivity with Applications | T.-s. Hsu; M.-Y. Kao | | | | |
2003 | Preserving confidentiality when sharing medical database with the Cellsecu system | Y.C. Chiang; T.-s. Hsu; S. Kuo; C.J. Liau; D.W. Wang | International Journal of Medical Informatics 71(1), 17-23 | | | |
2006 | Privacy protection in social network data disclosure based on granular computing | D.W. Wang; C.J. Liau; T.-s. Hsu | | | | |
2010 | Privacy-preserving collaborative recommender systems | J. Zhan; C.L. Hsieh; I.C. Wang; T.-s. Hsu; C.J. Liau; D.W. Wang | IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews 40(4), 472-476 | | | |
2013 | Privacy-preserving social network publication based on positional indiscernibility | T.-s. Hsu; C.J. Liau; D.W. Wang | | | | |
2002 | Quantifying privacy leakage through answering database queries | T.-s. Hsu; C.-J. Liau; D.W. Wang; J. K.-P. Chen | | | | |
2010 | Quantitative assessment of early intervention strategies: a case study of 2009 H1N1 pandemic in Taiwan | T.C. Chern; M.T. Tsai; H.J. Chang; J.H. Chuang; T.-s. Hsu; H.S. Kuo; C.J. Liau; D.W. Wang | | | | |
2005 | Secrecy of two-party secure computation | Y.T. Chiang; D.W. Wang; C.J. Liau; T.-s. Hsu | | | | |