Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Organizations
  • Researchers
  • Research Outputs
  • Projects
  • Explore by
    • Organizations
    • Researchers
    • Research Outputs
    • Projects
  • Academic & Publications
  • Sign in
  • 中文
  • English
  1. Scholars Hub of the Academia Sinica
  2. Research Outputs

Browsing by Author Hsu, T. -s.


Jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 29  next >
Issue DateTitleAuthor(s)RelationscopusWOSFulltext/Archive link
2006A GrC-based approach to social network data protectionWang, D. W.; Liau, C. J.; Hsu, T. -s.
2012A probabilistic hybrid logic for sanitized information systemsHsu, T. -s.; Liau, C. J.; Wang, D. W.
2009An empirical study on privacy and secure multi-party computation using exponentiationWang, I. -C.; Shen, C. -H.; Chen, K.; Hsu, T. -s.; Liau, C. -J.; Wang, D. -W.
2007An epistemic framework for privacy protection in database linkingWang, D. W.; Liau, C. J.; Hsu, T. -s.Data and Knowledge Engineering 61
2006Attribute-oriented granulation for privacy protectionWang, D. W.; Liau, C. J.; Hsu, T. -s.
2010Efficient simulation of the spatial transmission dynamics of influenzaTsai, M. T.; Chern, T. C.; Chuang, J. H.; Hsueh, C. W.; Kuo, H. S.; Liau, C. J.; Riley, S.; Shen, B. J.; Shen, C. H.; Wang, D. W.; Hsu, T. -s.PLoS ONE 5, e13292
2013Floating point arithmetic protocols for constructing secure data analysis applicationLiu, Y. -C.; Chiang, Y. -T.; Hsu, T. -s.; Liau, C. -J.; Wang, D. -W.
2013Floating point arithmetic protocols for constructing secure data analysis applicationLiu, Y. C.; Chiang, Y. T.; Hsu, T. -s.; Liau, C. J.; Wang, D. W.
2007Granulation as a privacy protection mechanismWang, D. W.; Liau, C. J.; Hsu, T. -s.Transactions on Rough Sets VII, 256-273
2010Heterogeneous subset samplingTsai, M. T.; Wang, D. W.; Liau, C. J.; Hsu, T. -s.
2002How much privacy? - A system to safe guard personal privacy while releasing databaseChiang, Y. T.; Chiang, Y. C.; Hsu, T. -s.; Liau, C. -J.; Wang, D. W.
2002How Much Privacy? -- a System to Safe guard Personal Privacy While Releasing DatabasesChiang, Y. -T.; Chiang, Y. -C.; Hsu, T. -S.; Liau, C. -J.; Wang, D. -W.
2006Information theoretical analysis of two-party secret computationWang, D. W.; Liau, C. J.; Chiang, Y. T.; Hsu, T. -s.
2007Information-theoretically secure number-product protocolShen, C. H.; Zhan, J.; Wang, D. W.; Hsu, T. -s.; Liau, C. J.
2012Logic, probability, and privacy: A framework for specifying privacy requirementsHsu, T. -s.; Liau, C. J.; Wang, D. W.
2004Medical privacy protection based on granular computingWang, D. W.; Liau, C. J.; Hsu, T. -s.Artificial Intelligence in Medicine 32, 137-149
2004Medical Privacy Protection Based on Granular ComputingWang, Da-Wei; Liau, C. J.; Hsu, T. -S.Artificial Intelligence in Medicine 32
2009On applying secure multi-party computation: A case reportWang, I. C.; Chen, K.; Chuang, J. H.; Lee, C. H.; Hsu, T. -s.; Liau, C. J.; Wang, P. Y.; Wang, D. W.
2004On the damage and compensation of privacy leakageWang, D. W.; Liau, C. J.; Hsu, T. -s.; Chen, J. K. -P.
2003Preserving Confidentiality When Sharing Medical Database with the Cellsecu SystemChiang, Y. C.; Hsu, T. -s.; Kuo, S.; Liau, C. J.; Wang, D. W.International Journal of Medical Informatics 71, 17-23
Showing results 1 to 20 of 29  next >
Explore by
  • Academic & Publications
  • Organizations
  • Researchers
  • Research Outputs
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback