Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
2006 | A GrC-based approach to social network data protection | Wang, D. W.; Liau, C. J.; Hsu, T. -s. | | | | |
2012 | A probabilistic hybrid logic for sanitized information systems | Hsu, T. -s.; Liau, C. J.; Wang, D. W. | | | | |
2009 | An empirical study on privacy and secure multi-party computation using exponentiation | Wang, I. -C.; Shen, C. -H.; Chen, K.; Hsu, T. -s.; Liau, C. -J.; Wang, D. -W. | | | | |
2007 | An epistemic framework for privacy protection in database linking | Wang, D. W.; Liau, C. J.; Hsu, T. -s. | Data and Knowledge Engineering 61 | | | |
2006 | Attribute-oriented granulation for privacy protection | Wang, D. W.; Liau, C. J.; Hsu, T. -s. | | | | |
2010 | Efficient simulation of the spatial transmission dynamics of influenza | Tsai, M. T.; Chern, T. C.; Chuang, J. H.; Hsueh, C. W.; Kuo, H. S.; Liau, C. J.; Riley, S.; Shen, B. J.; Shen, C. H.; Wang, D. W.; Hsu, T. -s. | PLoS ONE 5, e13292 | | | |
2013 | Floating point arithmetic protocols for constructing secure data analysis application | Liu, Y. -C.; Chiang, Y. -T.; Hsu, T. -s.; Liau, C. -J.; Wang, D. -W. | | | | |
2013 | Floating point arithmetic protocols for constructing secure data analysis application | Liu, Y. C.; Chiang, Y. T.; Hsu, T. -s.; Liau, C. J.; Wang, D. W. | | | | |
2007 | Granulation as a privacy protection mechanism | Wang, D. W.; Liau, C. J.; Hsu, T. -s. | Transactions on Rough Sets VII, 256-273 | | | |
2010 | Heterogeneous subset sampling | Tsai, M. T.; Wang, D. W.; Liau, C. J.; Hsu, T. -s. | | | | |
2002 | How much privacy? - A system to safe guard personal privacy while releasing database | Chiang, Y. T.; Chiang, Y. C.; Hsu, T. -s.; Liau, C. -J.; Wang, D. W. | | | | |
2002 | How Much Privacy? -- a System to Safe guard Personal Privacy While Releasing Databases | Chiang, Y. -T.; Chiang, Y. -C.; Hsu, T. -S.; Liau, C. -J.; Wang, D. -W. | | | | |
2006 | Information theoretical analysis of two-party secret computation | Wang, D. W.; Liau, C. J.; Chiang, Y. T.; Hsu, T. -s. | | | | |
2007 | Information-theoretically secure number-product protocol | Shen, C. H.; Zhan, J.; Wang, D. W.; Hsu, T. -s.; Liau, C. J. | | | | |
2012 | Logic, probability, and privacy: A framework for specifying privacy requirements | Hsu, T. -s.; Liau, C. J.; Wang, D. W. | | | | |
2004 | Medical privacy protection based on granular computing | Wang, D. W.; Liau, C. J.; Hsu, T. -s. | Artificial Intelligence in Medicine 32, 137-149 | | | |
2004 | Medical Privacy Protection Based on Granular Computing | Wang, Da-Wei; Liau, C. J.; Hsu, T. -S. | Artificial Intelligence in Medicine 32 | | | |
2009 | On applying secure multi-party computation: A case report | Wang, I. C.; Chen, K.; Chuang, J. H.; Lee, C. H.; Hsu, T. -s.; Liau, C. J.; Wang, P. Y.; Wang, D. W. | | | | |
2004 | On the damage and compensation of privacy leakage | Wang, D. W.; Liau, C. J.; Hsu, T. -s.; Chen, J. K. -P. | | | | |
2003 | Preserving Confidentiality When Sharing Medical Database with the Cellsecu System | Chiang, Y. C.; Hsu, T. -s.; Kuo, S.; Liau, C. J.; Wang, D. W. | International Journal of Medical Informatics 71, 17-23 | | | |