<Patent>
[1] Zhi-Hsun Lin, Chia-Mu Yu, Peter Shaojui Wang, Wen-Hsuan Chang, Jui-Lin Tso, "Data Synthesis System, Method, and Computer-Readable Medium with Differential Privacy Protection," Taiwan Invention Patent No. I824927, effective from 2023/12/1 to 2043/1/16.
[2] Peter Shaojui Wang, "Encryption System and Method for Cloud Services," Taiwan Invention Patent No. I789115, effective from 2023/1/1 to 2041/11/11.
[3] Jui-Lin Tso, Peter Shaojui Wang, "Proxy Certificate and Certificate Renewal Mechanism Based on ECQV Implicit Certificate," Taiwan Invention Patent No. I767682, effective from 2022/6/11 to 2041/4/29.
[4] Peter Shaojui Wang, Bin-Rong Jiang, Ching-Chieh Chan, "Probabilistic Multi-Software Encryption Communication System and Method," Taiwan Invention Patent No. I644554, effective from 2018/12/11 to 2037/6/6.
[5] Peter Shaojui Wang, "Distributed Deep Learning System and Method," Taiwan Invention Patent No. I690861, effective from 2020/4/11 to 2039/8/20.
[6] Peter Shaojui Wang, Geng-Hao Chang, Bin-Rong Jiang, Chong-Qin Hsiao, Yung-Yi Hsieh, "Interactive Authentication System and Method," Taiwan Invention Patent No. I608431, effective from 2017/12/11 to 2034/11/5.
[7] Peter Shaojui Wang, Geng-Hao Chang, Dong-Ming Hsieh, Ching-Chieh Chan, Chong-Qin Hsiao, "Security Authentication and Control System and Method for E-Home," Taiwan Invention Patent No. I520554, effective from 2016/2/1 to 2031/11/21.
[8] Peter Shaojui Wang, Geng-Hao Chang, Bin-Rong Jiang, Chiu-Yun Chuang, Yung-Yi Hsieh, "Secure and Reliable Network Physical Isolation System and Method," Taiwan Invention Patent No. I480761, effective from 2015/4/11 to 2032/12/26.
[9] Peter Shaojui Wang, Geng-Hao Chang, Dong-Ming Hsieh, Ching-Chieh Chan, Chong-Qin Hsiao, "Biometric Identification System and Method Based on Biometric Feature Input Sequence," Taiwan Invention Patent No. I433522, effective from 2014/4/1 to 2030/1/4.
[10] Chun-Wei Li, Tzu-Hua Chen, Dong-Ming Hsieh, Wen-Hui Tsai, Peter Shaojui Wang, "Method for Website and Network Object Source Authentication," Taiwan Invention Patent No. I478083, effective from 2015/3/21 to 2031/10/30.
[11] Peter Shaojui Wang, Geng-Hao Chang, Ching-Chieh Chan, Dong-Ming Hsieh, Chong-Qin Hsiao, "Authentication System and Method Using Personal Items," Taiwan Invention Patent No. I388185, effective from 2013/3/1 to 2029/10/20.
[12] Mu-Chun Su, Yun-Chung Li, Peter Shaojui Wang, "Maintenance Method for Web Wrapping Program," Taiwan Invention Patent No. I328952, effective from 2010/8/11 to 2026/4/13.
<Journal Paper>
[1] P. S. Wang, H.-H. Tsai, "A Fine-grained and Pattern-aware Multi-prototype Network for Few-shot Malware Classification," Journal of Information Security and Applications, Revise & Resubmit.
[2] P. S. Wang, Supaporn Nguanprasert, " Protecting Copyrighted Images against Diffusion Models via Universal Adversarial Perturbations with Hybrid Loss and Momentum," ACM Transactions on Intelligent Systems and Technology, submitted.
[3] Desalegn Aweke Wako, P. S. Wang, "Backdoor Resistant Federated Few-shot Learning for Malware Classification," IEEE Transactions on Reliability, submitted.
[4] Desalegn Aweke Wako, P. S. Wang, "A Differentially Private Federated Learning Framework for Multilingual Hate Speech Detection," IEEE Transactions on Computational Social Systems, submitted.
[5] Z.-Y. Liu, Y.-F. Tseng , R. Tso, P. S. Wang, and Q.-W. Su, "Extension of Elliptic Curve Qu-Vanstone Certificates and Their Applications", Journal of Information Security and Applications, vol. 67, Jun. 2022. (SCI, EI, Impact Factor: 3.872)
[6] Y.-C. Chen, X. Xie, P. S. Wang, and R. Tso, "Witness-based searchable encryption with optimal overhead for cloud-edge computing", Future Generation Computer Systems, vol. 100, no. 1, pp. 715-723, Nov. 2019. (SCI, EI, Impact Factor: 4.639)
[7] P. S. Wang, F. Lai, H.-C. Hsiao, and J.-L. Wu, "Insider Collusion Attack on Privacy-preserving Kernel-based Data Mining Systems," IEEE Access, vol. 4, no. 1, 2016. (SCI, EI, Impact Factor: 3.557)
[8] A. Wang, F. Lai, F. S. Hsu, and P. S. Wang, "Mobilizing Sophisticated Donors: What Candidate Facebook Posts Do Attract Intra- and Inter-district Donations?", Issues and Studies (IS), vol. 56, no. 4, Dec. 1, 2020. (SCOPUS)
[9] M. C. Su, S. J. Wang, C. K. Huang, P. C. Wang, F. H. Hsu, S. C. Lin, and Y. Z. Hsieh, "A Signal-Representation-Based Parser to Extract Text-Based Information from the Web," Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 14, no. 5, pp. 531-539, 2010. (EI)
(The below are domestic journal paper)
[10] P. S. Wang, "Introduction to Privacy-preserving Mechanisms for Artificial Intelligent Systems", Instruments Today, no. 215, pp.74-84 , 2018. (domestic journal paper)
[11] P. S. Wang, “Privacy-preserving Data Mining: A New Threat and its Multilevel Commutative Encryption based Solution,” TL Technical Journal, vol. 47, no.4, 2017. (domestic journal paper)
[12] P. J. Chiang, C. C. Hsiao, C. C. Chan, Y. Y. Shieh, C. Y. Chuang, S. J. Wang, G. H. Chang, “Implementation of Multi-Card Service in the Trusted Service Management,” TL Technical Journal, vol. 44, no.5, 2014. (domestic journal paper)
[13] Y. Y. Shieh, C. C. Chan, C. C. Hsiao, D. M. Shieh, S. J. Wang, C. Y. Chuang, G. H. Chang, “Cloud Registration Authority System: A Case Study of Microsoft Hyper-V,” TL Technical Journal, vol. 42, no.2, 2012. (domestic journal paper)
[14] C. Y. Chuang, C. C. Chan, C. C. Hsiao, Y. Y. Shieh, S. J. Wang, D. M. Shieh, G. H. Chang, "The Research of Cross-Browser, Cross-Platform Certificate Registration Websites: A Case Study of Silverlight", TL Technical Journal, vol. 41, no.6, 2011. (domestic journal paper)
[15] D. M. Hsieh, C. W. Lee, T. H. Chen, W. H. Tsai, and S. J. Wang, “Secure Key Recovery System of IC Card,” TL Technical Journal, vol. 39, no.2, 2009. (domestic journal paper)
<Conference Paper>
[1] J.-M. Yao, B.-C. Xie, S.-W. Peng, H.-Y. Chen, H.-R. Zheng, B.-J. Tan, P. S. Wang, and S.-F. Su, “Multi-TW: Benchmarking Multimodal Models on Traditional Chinese Question Answering in Taiwan,” in 2025 International Automatic Control Conference (CACS), Hsinchu, Taiwan, Nov. 5–8, 2025. (EI)
[2] Zong-Bin Hsiao and Peter Shaojui Wang, "Threat Detection Using Multimodal Fusion and Timestamp Alignment," International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct. 15-17, 2025, Taichung, Taiwan. (SCOPUS)
[3] P. S. Wang, Z. W. Hsiao, H.-H. Tsai, T.-W. Tseng, "Privacy-Preserving Facial Expression Reconstruction and De-identification in Masked Images," IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Kaohsiung, Taiwan, Dec. 10-13, 2024. (EI)
[4] D. A. Wako, P. S. Wang, "Comparative Analysis of DL and Traditional ML Methods for Malware Image Classification", International Conference on Advances in Distributed Computing and Machine Learning (ICADCML), Jan. 9-10, 2025. (SCOPUS)
[5] P. S. Wang, K.-L. Chen, J.-H. Huang, Y.-Y. Liao, "Detection of Malicious Certificates Based on Natural Language Processing and Adversarial Learning," Cryptology and Information Security Conference (CISC), Taipei, Taiwan, Aug. 29-30, 2024.
[6] P. S. Wang and H.-J. Wen, "Efficient and robust detection of malicious TLS certificates in IoT devices," in 6th Blockchain and Internet of Things Conference, ACM, Fukuoka, Japan, Jul. 19-21, 2024.
[7] P. S. Wang, “Hybrid Differentially Private SVM based on Matrix Gaussian Scheme and Homomorphic Encryption”, IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Hualien, Taiwan, pp. 1-2, Nov. 16-19, 2021. (EI) <Best Paper Award>
[8] Z.-Y. Liu, P. S. Wang, S.-C. Hsiao and R. Tso, “Defense against N-pixel Attacks based on Image Reconstruction”, ACM ASIACCS-SBC (8th ACM International Workshop on Security in Blockchain and Cloud Computing held in conjunction with ACM AsiaCCS 2020), Taipei, Taiwan, pp. 3-7, Oct 6, 2020. (EI)
[9] P. S. Wang, P.-Y. Huang, Y.-A. Tsai and R. Tso, “Enhanced Privacy Protection in Machine Learning based on Mondrian Multidimensional Anonymity and Self-Organizing Map”, AsiaJCIS 2020 (the 15th Asia Joint Conference on Information Security), Taipei, Taiwan, pp. 97-100, Aug. 20-21, 2020.
[10] H.-H. Chung, P. S. Wang, T.-W. Ho, H.-C. Hsiao, and F. Lai, "A Secure Authorization System in PHR based on CP-ABE," IEEE International Conference on e-Health and Bioengineering, pp. 1-4, Nov., 2015. (EI)
[11] P. S. Wang, S. Chen, C. Kuo, C. Tu, and F. Lai, "An Intelligent Dietary Planning Mobile System with Privacy-preserving Mechanism", IEEE International Conference on Consumer Electronics (ICCE), pp. 336-337, Jun., 2015. (EI)
[12] K. H. Huang, E. C. Chang, S. J. Wang, "A Patient-Centric Access Control Scheme for Personal Health Records in the Cloud," IEEE International Conference on Networking and Distributed Computing, Dec., 2013. (EI)
[13] Y. Z. Wu, D. M. Hsieh, C. C. Chan, C. C. Hsiao, S. J. Wang, "The Research of the Certification Practice Statements of each CA in Taiwan", The E-Learning and Information Technology Symposium, Mar., 2010.
[14] M. C. Su, J. Lee, and S. J. Wang, "Method for Wrapper Maintenance," Processing of the Second Taiwan Conference on Software Engineering, pp. 293-298, Taipei, Taiwan, Jun. 9-10, 2006.
[15] M. C. Su, S. J. Wang, S. C. Lai, M. Z. Liao, and K. H. Yang, "The Study of Personal Identification based on Finger Vein Patterns," Biomedical Engineering Society Annual Symposium, Taipei, Taiwan, 2006
[16] K. C. Chen, S. J. Wang and C. Y. Cheng, "A Real-Time Symbol Recognizer and its Application to Music-Playing Robot," CACS Automatic Control Conference, Tainan, Taiwan, Nov. 18-19, 2005.