Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Organizations
  • Researchers
  • Research Outputs
  • Projects
  • Explore by
    • Organizations
    • Researchers
    • Research Outputs
    • Projects
  • Academic & Publications
  • Sign in
  • 中文
  • English
  1. Scholars Hub of the Academia Sinica
  2. Research Outputs

Browsing by Author D.W. Wang


Jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 24  next >
Issue DateTitleAuthor(s)RelationscopusWOSFulltext/Archive link
2006A GrC-based approach to social network data protectionD.W. Wang; C.J. Liau; T.-s. Hsu
2014A logical framework for privacy-preserving social network publicationT.-s. Hsu; C.J. Liau; D.W. WangJournal of Applied Logic 12(2), 151-174
2012A probabilistic hybrid logic for sanitized information systemsT.-s. Hsu; C.J. Liau; D.W. Wang
2007An epistemic framework for privacy protection in database linkingD.W. Wang; C.J. Liau; T.-s. HsuData and Knowledge Engineering 61(1), 176-205
2015An information-theoretic approach for secure protocol compositionY.T. Chiang; T.-s. Hsu; C.J. Liau; Y.C. Liu; C.H. Shen; D.W. Wang; J. Zhan
2006Attribute-oriented granulation for privacy protectionD.W. Wang; C.J. Liau; T.-s. Hsu
2007Granulation as a privacy protection mechanismD.W. Wang; C.J. Liau; T.-s. HsuTransactions on Rough Sets VII, 256-273
2010Heterogeneous subset samplingM.T. Tsai; D.W. Wang; C.J. Liau; T.-s. Hsu
2002How much privacy? - A system to safe guard personal privacy while releasing databaseY.T. Chiang; Y.C. Chiang; T.-s. Hsu; C.-J. Liau; D.W. Wang
2006Information theoretical analysis of two-party secret computationD.W. Wang; C.J. Liau; Y.T. Chiang; T.-s. Hsu
2012Logic, probability, and privacy: A framework for specifying privacy requirementsT.-s. Hsu; C.J. Liau; D.W. Wang
2004Medical privacy protection based on granular computingD.W. Wang; C.J. Liau; T.-s. HsuArtificial Intelligence in Medicine 32(2), 137-149
2009On applying secure multi-party computation: A case reportI.C. Wang; K. Chen; J.H. Chuang; C.H. Lee; T.-s. Hsu; C.J. Liau; P.Y. Wang; D.W. Wang
2004On the damage and compensation of privacy leakageD.W. Wang; C.J. Liau; T.-s. Hsu; J.K.-P. Chen
2003Preserving confidentiality when sharing medical database with the Cellsecu systemY.C. Chiang; T.-s. Hsu; S. Kuo; C.J. Liau; D.W. WangInternational Journal of Medical Informatics 71(1), 17-23
2006Privacy protection in social network data disclosure based on granular computingD.W. Wang; C.J. Liau; T.-s. Hsu
2010Privacy-preserving collaborative recommender systemsJ. Zhan; C.L. Hsieh; I.C. Wang; T.-s. Hsu; C.J. Liau; D.W. WangIEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews 40(4), 472-476
2013Privacy-preserving social network publication based on positional indiscernibilityT.-s. Hsu; C.J. Liau; D.W. Wang
2002Quantifying privacy leakage through answering database queriesT.-s. Hsu; C.-J. Liau; D.W. Wang; J. K.-P. Chen
2010Quantitative assessment of early intervention strategies: a case study of 2009 H1N1 pandemic in TaiwanT.C. Chern; M.T. Tsai; H.J. Chang; J.H. Chuang; T.-s. Hsu; H.S. Kuo; C.J. Liau; D.W. Wang
Showing results 1 to 20 of 24  next >
Explore by
  • Academic & Publications
  • Organizations
  • Researchers
  • Research Outputs
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback