<Patent>
Peter Shaojui Wang, Hung-Jen Wen, Tzu-Wei Tseng, "Certificate Verification Device and Method," Taiwan Invention Patent No. I872934, effective from 2025/2/11 to 2044/1/31.
Zhi-Hsun Lin, Chia-Mu Yu, Peter Shaojui Wang, Wen-Hsuan Chang, Jui-Lin Tso, "Data Synthesis System, Method, and Computer-Readable Medium with Differential Privacy Protection," Taiwan Invention Patent No. I824927, effective from 2023/12/1 to 2043/1/16.
Peter Shaojui Wang, "Encryption System and Method for Cloud Services," Taiwan Invention Patent No. I789115, effective from 2023/1/1 to 2041/11/11.
Jui-Lin Tso, Peter Shaojui Wang, "Proxy Certificate and Certificate Renewal Mechanism Based on ECQV Implicit Certificate," Taiwan Invention Patent No. I767682, effective from 2022/6/11 to 2041/4/29.
Peter Shaojui Wang, Bin-Rong Jiang, Ching-Chieh Chan, "Probabilistic Multi-Software Encryption Communication System and Method," Taiwan Invention Patent No. I644554, effective from 2018/12/11 to 2037/6/6.
Peter Shaojui Wang, "Distributed Deep Learning System and Method," Taiwan Invention Patent No. I690861, effective from 2020/4/11 to 2039/8/20.
Peter Shaojui Wang, Geng-Hao Chang, Bin-Rong Jiang, Chong-Qin Hsiao, Yung-Yi Hsieh, "Interactive Authentication System and Method," Taiwan Invention Patent No. I608431, effective from 2017/12/11 to 2034/11/5.
Peter Shaojui Wang, Geng-Hao Chang, Dong-Ming Hsieh, Ching-Chieh Chan, Chong-Qin Hsiao, "Security Authentication and Control System and Method for E-Home," Taiwan Invention Patent No. I520554, effective from 2016/2/1 to 2031/11/21.
Peter Shaojui Wang, Geng-Hao Chang, Bin-Rong Jiang, Chiu-Yun Chuang, Yung-Yi Hsieh, "Secure and Reliable Network Physical Isolation System and Method," Taiwan Invention Patent No. I480761, effective from 2015/4/11 to 2032/12/26.
Peter Shaojui Wang, Geng-Hao Chang, Dong-Ming Hsieh, Ching-Chieh Chan, Chong-Qin Hsiao, "Biometric Identification System and Method Based on Biometric Feature Input Sequence," Taiwan Invention Patent No. I433522, effective from 2014/4/1 to 2030/1/4.
Chun-Wei Li, Tzu-Hua Chen, Dong-Ming Hsieh, Wen-Hui Tsai, Peter Shaojui Wang, "Method for Website and Network Object Source Authentication," Taiwan Invention Patent No. I478083, effective from 2015/3/21 to 2031/10/30.
Peter Shaojui Wang, Geng-Hao Chang, Ching-Chieh Chan, Dong-Ming Hsieh, Chong-Qin Hsiao, "Authentication System and Method Using Personal Items," Taiwan Invention Patent No. I388185, effective from 2013/3/1 to 2029/10/20.
Mu-Chun Su, Yun-Chung Li, Peter Shaojui Wang, "Maintenance Method for Web Wrapping Program," Taiwan Invention Patent No. I328952, effective from 2010/8/11 to 2026/4/13.
<Journal Paper>
P. S. Wang, H.-H. Tsai, "A Fine-grained and Pattern-aware Multi-prototype Network for Few-shot Malware Classification," Journal of Information Security and Applications, Under Review (Revised and Resubmitted).
P. S. Wang, Supaporn Nguanprasert, " Protecting Copyrighted Images against Diffusion Models via Universal Adversarial Perturbations with Hybrid Loss and Momentum," ACM Transactions on Intelligent Systems and Technology, submitted.
D. A. Wako, P. S. Wang, "Backdoor Resistant Federated Few-shot Learning for Malware Classification," IEEE Transactions on Reliability, submitted.
D. A. Wako, P. S. Wang, "A Differentially Private Federated Learning Framework for Multilingual Hate Speech Detection," IEEE Transactions on Computational Social Systems, submitted.
Z.-Y. Liu, Y.-F. Tseng , R. Tso, P. S. Wang, and Q.-W. Su, "Extension of Elliptic Curve Qu-Vanstone Certificates and Their Applications", Journal of Information Security and Applications, vol. 67, Jun. 2022. (SCI, EI, Impact Factor: 3.872)
Y.-C. Chen, X. Xie, P. S. Wang, and R. Tso, "Witness-based searchable encryption with optimal overhead for cloud-edge computing", Future Generation Computer Systems, vol. 100, no. 1, pp. 715-723, Nov. 2019. (SCI, EI, Impact Factor: 4.639)
P. S. Wang, F. Lai, H.-C. Hsiao, and J.-L. Wu, "Insider Collusion Attack on Privacy-preserving Kernel-based Data Mining Systems," IEEE Access, vol. 4, no. 1, 2016. (SCI, EI, Impact Factor: 3.557)
A. Wang, F. Lai, F. S. Hsu, and P. S. Wang, "Mobilizing Sophisticated Donors: What Candidate Facebook Posts Do Attract Intra- and Inter-district Donations?", Issues and Studies (IS), vol. 56, no. 4, Dec. 1, 2020. (SCOPUS)
M. C. Su, S. J. Wang, C. K. Huang, P. C. Wang, F. H. Hsu, S. C. Lin, and Y. Z. Hsieh, "A Signal-Representation-Based Parser to Extract Text-Based Information from the Web," Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 14, no. 5, pp. 531-539, 2010. (EI)
(The below are domestic journal paper)
T.-T. Lin, P. S. Wang, "Automated Attack Graph Construction for Industrial Control Systems Based on Zeek and SAGE," Communications of the CCISA, vol. 31, no. 4, pp. 23-33, 2025.
P. S. Wang, "Introduction to Privacy-preserving Mechanisms for Artificial Intelligent Systems", Instruments Today, no. 215, pp.74-84 , 2018. (domestic journal paper)
P. S. Wang, “Privacy-preserving Data Mining: A New Threat and its Multilevel Commutative Encryption based Solution,” TL Technical Journal, vol. 47, no.4, 2017. (domestic journal paper)
P. J. Chiang, C. C. Hsiao, C. C. Chan, Y. Y. Shieh, C. Y. Chuang, S. J. Wang, G. H. Chang, “Implementation of Multi-Card Service in the Trusted Service Management,” TL Technical Journal, vol. 44, no.5, 2014. (domestic journal paper)
Y. Y. Shieh, C. C. Chan, C. C. Hsiao, D. M. Shieh, S. J. Wang, C. Y. Chuang, G. H. Chang, “Cloud Registration Authority System: A Case Study of Microsoft Hyper-V,” TL Technical Journal, vol. 42, no.2, 2012. (domestic journal paper)
C. Y. Chuang, C. C. Chan, C. C. Hsiao, Y. Y. Shieh, S. J. Wang, D. M. Shieh, G. H. Chang, "The Research of Cross-Browser, Cross-Platform Certificate Registration Websites: A Case Study of Silverlight", TL Technical Journal, vol. 41, no.6, 2011. (domestic journal paper)
D. M. Hsieh, C. W. Lee, T. H. Chen, W. H. Tsai, and S. J. Wang, “Secure Key Recovery System of IC Card,” TL Technical Journal, vol. 39, no.2, 2009. (domestic journal paper)
<Conference Paper>
J.-M. Yao, B.-C. Xie, S.-W. Peng, H.-Y. Chen, H.-R. Zheng, B.-J. Tan, P. S. Wang, and S.-F. Su, “Multi-TW: Benchmarking Multimodal Models on Traditional Chinese Question Answering in Taiwan,” in 2025 International Automatic Control Conference (CACS), Hsinchu, Taiwan, Nov. 5–8, 2025. (EI)
Z.-B. Hsiao and P. S. Wang, "Threat Detection Using Multimodal Fusion and Timestamp Alignment," International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct. 15-17, 2025, Taichung, Taiwan. (SCOPUS)
P. S. Wang, Z. W. Hsiao, H.-H. Tsai, T.-W. Tseng, "Privacy-Preserving Facial Expression Reconstruction and De-identification in Masked Images," IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Kaohsiung, Taiwan, Dec. 10-13, 2024. (EI)
D. A. Wako, P. S. Wang, "Comparative Analysis of DL and Traditional ML Methods for Malware Image Classification", International Conference on Advances in Distributed Computing and Machine Learning (ICADCML), Jan. 9-10, 2025. (SCOPUS)
P. S. Wang, K.-L. Chen, J.-H. Huang, Y.-Y. Liao, "Detection of Malicious Certificates Based on Natural Language Processing and Adversarial Learning," Cryptology and Information Security Conference (CISC), Taipei, Taiwan, Aug. 29-30, 2024.
P. S. Wang and H.-J. Wen, "Efficient and robust detection of malicious TLS certificates in IoT devices," in 6th Blockchain and Internet of Things Conference, ACM, Fukuoka, Japan, Jul. 19-21, 2024.
P. S. Wang, “Hybrid Differentially Private SVM based on Matrix Gaussian Scheme and Homomorphic Encryption”, IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Hualien, Taiwan, pp. 1-2, Nov. 16-19, 2021. (EI) <Best Paper Award>
Z.-Y. Liu, P. S. Wang, S.-C. Hsiao and R. Tso, “Defense against N-pixel Attacks based on Image Reconstruction”, ACM ASIACCS-SBC (8th ACM International Workshop on Security in Blockchain and Cloud Computing held in conjunction with ACM AsiaCCS 2020), Taipei, Taiwan, pp. 3-7, Oct 6, 2020. (EI)
P. S. Wang, P.-Y. Huang, Y.-A. Tsai and R. Tso, “Enhanced Privacy Protection in Machine Learning based on Mondrian Multidimensional Anonymity and Self-Organizing Map”, AsiaJCIS 2020 (the 15th Asia Joint Conference on Information Security), Taipei, Taiwan, pp. 97-100, Aug. 20-21, 2020.
H.-H. Chung, P. S. Wang, T.-W. Ho, H.-C. Hsiao, and F. Lai, "A Secure Authorization System in PHR based on CP-ABE," IEEE International Conference on e-Health and Bioengineering, pp. 1-4, Nov., 2015. (EI)
P. S. Wang, S. Chen, C. Kuo, C. Tu, and F. Lai, "An Intelligent Dietary Planning Mobile System with Privacy-preserving Mechanism", IEEE International Conference on Consumer Electronics (ICCE), pp. 336-337, Jun., 2015. (EI)
K. H. Huang, E. C. Chang, S. J. Wang, "A Patient-Centric Access Control Scheme for Personal Health Records in the Cloud," IEEE International Conference on Networking and Distributed Computing, Dec., 2013. (EI)
Y. Z. Wu, D. M. Hsieh, C. C. Chan, C. C. Hsiao, S. J. Wang, "The Research of the Certification Practice Statements of each CA in Taiwan", The E-Learning and Information Technology Symposium, Mar., 2010.
M. C. Su, J. Lee, and S. J. Wang, "Method for Wrapper Maintenance," Processing of the Second Taiwan Conference on Software Engineering, pp. 293-298, Taipei, Taiwan, Jun. 9-10, 2006.
M. C. Su, S. J. Wang, S. C. Lai, M. Z. Liao, and K. H. Yang, "The Study of Personal Identification based on Finger Vein Patterns," Biomedical Engineering Society Annual Symposium, Taipei, Taiwan, 2006
K. C. Chen, S. J. Wang and C. Y. Cheng, "A Real-Time Symbol Recognizer and its Application to Music-Playing Robot," CACS Automatic Control Conference, Tainan, Taiwan, Nov. 18-19, 2005.