Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Organizations
  • Researchers
  • Research Outputs
  • Projects
  • Explore by
    • Organizations
    • Researchers
    • Research Outputs
    • Projects
  • Academic & Publications
  • Sign in
  • 中文
  • English
  1. Scholars Hub of the Academia Sinica
  2. Research Outputs

Browsing by Author Wang, D. W.


Jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 35  next >
Issue DateTitleAuthor(s)RelationscopusWOSFulltext/Archive link
2006A GrC-based approach to social network data protectionWang, D. W.; Liau, C. J.; Hsu, T. -s.
2001A logical model for privacy protectionHsu, T. S.; Liau, C. J.; Wang, D. W.
2012A probabilistic hybrid logic for sanitized information systemsHsu, T. -s.; Liau, C. J.; Wang, D. W.
2013A scripting language for automating secure multiparty computationChen, K.; Hsu, T. -s; Liau, C. J.; Wang, D. W.
1987A Study on Two Geometric Location ProblemsWang, D. W.; Kuo, Y. S.TR-87-010
2007An epistemic framework for privacy protection in database linkingWang, D. W.; Liau, C. J.; Hsu, T. -s.Data and Knowledge Engineering 61
2000Applications of Optical Tweezers and an Integrated Force Measurement Module for Biomedical ResearchTsai, J. W.; Liao, B. Y.; Huang, J. C; Hwang, W. L.; Wang, D. W.; Ciou, A. E.; Lin, C. H.
1995ASIS - Academia Sinica Multimedia Interactive SystemChang, C. H.; Chen, M. C.; Ho, J. M.; Ko, M. T.; Tsai, K. H.; Wang, C. F.; Wang, D. W.
2006Attribute-oriented granulation for privacy protectionWang, D. W.; Liau, C. J.; Hsu, T. -s.
2010Efficient simulation of the spatial transmission dynamics of influenzaTsai, M. T.; Chern, T. C.; Chuang, J. H.; Hsueh, C. W.; Kuo, H. S.; Liau, C. J.; Riley, S.; Shen, B. J.; Shen, C. H.; Wang, D. W.; Hsu, T. -s.PLoS ONE 5, e13292
2013Floating point arithmetic protocols for constructing secure data analysis applicationLiu, Y. C.; Chiang, Y. T.; Hsu, T. -s.; Liau, C. J.; Wang, D. W.
2007Granulation as a privacy protection mechanismWang, D. W.; Liau, C. J.; Hsu, T. -s.Transactions on Rough Sets VII, 256-273
2010Heterogeneous subset samplingTsai, M. T.; Wang, D. W.; Liau, C. J.; Hsu, T. -s.
2002How much privacy? - A system to safe guard personal privacy while releasing databaseChiang, Y. T.; Chiang, Y. C.; Hsu, T. -s.; Liau, C. -J.; Wang, D. W.
2006Information theoretical analysis of two-party secret computationWang, D. W.; Liau, C. J.; Chiang, Y. T.; Hsu, T. -s.
2007Information-theoretically secure number-product protocolShen, C. H.; Zhan, J.; Wang, D. W.; Hsu, T. -s.; Liau, C. J.
2012Logic, probability, and privacy: A framework for specifying privacy requirementsHsu, T. -s.; Liau, C. J.; Wang, D. W.
2004Medical privacy protection based on granular computingWang, D. W.; Liau, C. J.; Hsu, T. -s.Artificial Intelligence in Medicine 32, 137-149
2009On applying secure multi-party computation: A case reportWang, I. C.; Chen, K.; Chuang, J. H.; Lee, C. H.; Hsu, T. -s.; Liau, C. J.; Wang, P. Y.; Wang, D. W.
2004On the damage and compensation of privacy leakageWang, D. W.; Liau, C. J.; Hsu, T. -s.; Chen, J. K. -P.
Showing results 1 to 20 of 35  next >
Explore by
  • Academic & Publications
  • Organizations
  • Researchers
  • Research Outputs
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback