Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2009 | On applying secure multi-party computation: A case report | I.C. Wang; K. Chen; J.H. Chuang; C.H. Lee; T.-s. Hsu; C.J. Liau; P.Y. Wang; D.W. Wang | ||||
1991 | On Finding a Smallest Augmentation to Biconnect a Graph (Extended abstract) | T.-s. Hsu; V. Ramachandran | ||||
2000 | On Four-Connecting a Triconnected Graph | T.-s. Hsu | Journal of Algorithms 35(2), 202-234 | |||
1992 | On Four-Connecting a Triconnected Graph (Extended Abstract) | T.-s. Hsu | ||||
2004 | On the damage and compensation of privacy leakage | D.W. Wang; C.J. Liau; T.-s. Hsu; J.K.-P. Chen | ||||
1996 | Optimal Bi-Level Augmentation for Selectively EnhancingGraph Connectivity with Applications | T.-s. Hsu; M.-Y. Kao | ||||
2003 | Preserving confidentiality when sharing medical database with the Cellsecu system | Y.C. Chiang; T.-s. Hsu; S. Kuo; C.J. Liau; D.W. Wang | International Journal of Medical Informatics 71(1), 17-23 | |||
2006 | Privacy protection in social network data disclosure based on granular computing | D.W. Wang; C.J. Liau; T.-s. Hsu | ||||
2010 | Privacy-preserving collaborative recommender systems | J. Zhan; C.L. Hsieh; I.C. Wang; T.-s. Hsu; C.J. Liau; D.W. Wang | IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews 40(4), 472-476 | |||
2013 | Privacy-preserving social network publication based on positional indiscernibility | T.-s. Hsu; C.J. Liau; D.W. Wang | ||||
2002 | Quantifying privacy leakage through answering database queries | T.-s. Hsu; C.-J. Liau; D.W. Wang; J. K.-P. Chen | ||||
2010 | Quantitative assessment of early intervention strategies: a case study of 2009 H1N1 pandemic in Taiwan | T.C. Chern; M.T. Tsai; H.J. Chang; J.H. Chuang; T.-s. Hsu; H.S. Kuo; C.J. Liau; D.W. Wang | ||||
2005 | Secrecy of two-party secure computation | Y.T. Chiang; D.W. Wang; C.J. Liau; T.-s. Hsu | ||||
1997 | Security Problems for Statistical Databases with General Cell Suppressions | T.-s. Hsu; M.-Y. Kao | ||||
2000 | Simpler and Faster Vertex-Connectivity Augmentation Algorithms (Extended Abstract) | T.-s. Hsu | ||||
2012 | Towards a scripting language for automating secure multiparty computation | K. Chen; T.-s. Hsu; W.K. Huang; C.J. Liau; D.W. Wang | ||||
2009 | Towards empirical aspects of secure scalar product | I-C. Wang; C.-H. Shen; T.-s. Hsu; C.J. Liau; D.W. Wang; J. Zhan | IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews 39(4), 440-447 | |||
2006 | Value versus damage of information release: A data privacy perspective | D.W. Wang; C.J. Liau; T.-s. Hsu; J.K.-P. Chen | International Journal of Approximate Reasoning 43(2), 179-201 |