<專利>  

[1] 林志訓,游家牧,王紹睿,張文軒,左瑞麟,「具差分隱私保護之資料合成系統、方法及其電腦可讀媒介」,中華民國發明專利第I824927號,有效期間2023/12/1-2043/1/16

[2] 王紹睿,「雲端服務的加密系統及加密方法」,中華民國發明專利第I789115號,有效期間2023/1/1-2041/11/11。

[3] 左瑞麟,王紹睿,「基於ECQV隱式憑證之代理憑證及憑證更新機制」,中華民國發明專利第I767682號,有效期間2022/6/11-2041/4/29。

[4] 王紹睿,江彬榮,詹景傑,「機率式多重軟體加密通訊系統及方法」,中華民國發明專利第I644554號,有效期間2018/12/11-2037/6/6。

[5] 王紹睿,「分散式深度學習系統及方法」,中華民國發明專利第I690861號,有效期間2020/4/11-2039/8/20。

[6] 王紹睿,張耿豪,江彬榮,蕭崇懃,謝永逸,「交互認證系統及其方法」,中華民國發明專利第I608431號,有效期間2017/12/11-2034/11/05。

[7] 王紹睿,張耿豪,謝東明,詹景傑,蕭崇懃,「E-Home之安全認證控管系統與方法」,中華民國發明專利,中華民國發明專利第I520554號,有效期間2016/2/1 – 2031/11/21。

[8] 王紹睿,張耿豪,江彬榮,莊秋芸,謝永逸,「安全可信賴的網路實體隔離的系統與方法」,中華民國發明專利第I480761號,有效期間2015/4/11-2032/12/26。

[9] 王紹睿,張耿豪,謝東明,詹景傑,蕭崇懃,「基於生物特徵輸入順序的生物辨識系統與方法」,中華民國發明專利第I433522號,有效期間2014/4/1- 2030/1/4。

[10] 李駿偉,陳姿樺,謝東明,蔡文慧,王紹睿,「網站及網路物件來源認證的方法」,中華民國發明專利第I478083號,有效期間2015/3/21-2031/10/30。

[11] 王紹睿,張耿豪,詹景傑,謝東明,「使用隨身物品的認證系統與方法」,中華民國發明專利第I388185號,有效期間2013/3/1-2029/10/20。

[12] 蘇木春,李允中,王紹睿,「網頁包覆程式的維護方法」,中華民國發明專利第I328952號,有效期間2010/8/11-2026/4/13。


<Journal Paper>

[1] P. S. Wang, Enwei Shih , "A Privacy-preserving Dual-mode Aggregation for Machine Learning based on Differential Privacy and Multi-key Homomorphic Proxy Re-Encryption," IEEE Transactions on Knowledge and Data Engineering (TKDE), submitted.

[2] Z.-Y. Liu, Y.-F. Tseng , R. Tso, P. S. Wang, and Q.-W. Su, "Extension of Elliptic Curve Qu-Vanstone Certificates and Their Applications", Journal of Information Security and Applications, vol. 67, Jun. 2022. (SCI, EI, Impact Factor: 3.872)

[3] Y.-C. Chen, X. Xie, P. S. Wang, and R. Tso, "Witness-based searchable encryption with optimal overhead for cloud-edge computing", Future Generation Computer Systems, vol. 100, no. 1, pp. 715-723, Nov. 2019. (SCI, EI, Impact Factor: 4.639)

[4] P. S. Wang, F. Lai, H.-C. Hsiao, and J.-L. Wu, "Insider Collusion Attack on Privacy-preserving Kernel-based Data Mining Systems," IEEE Access, vol. 4, no. 1, 2016. (SCI, EI, Impact Factor: 3.557)

[5] A. Wang, F. Lai, F. S. Hsu, and P. S. Wang, "Mobilizing Sophisticated Donors: What Candidate Facebook Posts Do Attract Intra- and Inter-district Donations?", Issues and Studies (IS), vol. 56, no. 4, Dec. 1, 2020.  (SCOPUS)

[6] M. C. Su, S. J. Wang, C. K. Huang, P. C. Wang, F. H. Hsu, S. C. Lin, and Y. Z. Hsieh, "A Signal-Representation-Based Parser to Extract Text-Based Information from the Web," Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 14, no. 5, pp. 531-539, 2010. (EI)

(The below are domestic journal paper)

[7] P. S. Wang, "Introduction to Privacy-preserving Mechanisms for Artificial Intelligent Systems", Instruments Today, no. 215, pp.74-84 , 2018. (domestic journal paper)

[8] P. S. Wang, “Privacy-preserving Data Mining: A New Threat and its Multilevel Commutative Encryption based Solution,” TL Technical Journal, vol. 47, no.4, 2017. (domestic journal paper)

[9] P. J. Chiang, C. C. Hsiao, C. C. Chan, Y. Y. Shieh, C. Y. Chuang, S. J. Wang, G. H. Chang, “Implementation of Multi-Card Service in the Trusted Service Management,” TL Technical Journal, vol. 44, no.5, 2014. (domestic journal paper)

[10] Y. Y. Shieh, C. C. Chan, C. C. Hsiao, D. M. Shieh, S. J. Wang, C. Y. Chuang, G. H. Chang, “Cloud Registration Authority System: A Case Study of Microsoft Hyper-V,” TL Technical Journal, vol. 42, no.2, 2012. (domestic journal paper)

[11] C. Y. Chuang, C. C. Chan, C. C. Hsiao, Y. Y. Shieh, S. J. Wang, D. M. Shieh, G. H. Chang, "The Research of Cross-Browser, Cross-Platform Certificate Registration Websites: A Case Study of Silverlight", TL Technical Journal, vol. 41, no.6, 2011. (domestic journal paper)

[12] D. M. Hsieh, C. W. Lee, T. H. Chen, W. H. Tsai, and S. J. Wang, “Secure Key Recovery System of IC Card,” TL Technical Journal, vol. 39, no.2, 2009. (domestic journal paper) 


<Conference Paper>

[1] P. S. Wang, “Hybrid Differentially Private SVM based on Matrix Gaussian Scheme and Homomorphic Encryption”, IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Hualien, Taiwan, pp. 1-2, Nov. 16-19, 2021. (EI)  <Best Paper Award>

[2] Z.-Y. Liu, P. S. Wang, S.-C. Hsiao and R. Tso, “Defense against N-pixel Attacks based on Image Reconstruction”, ACM ASIACCS-SBC (8th ACM International Workshop on Security in Blockchain and Cloud Computing held in conjunction with ACM AsiaCCS 2020), Taipei, Taiwan, pp. 3-7, Oct 6, 2020. (EI)

[3] P. S. Wang, P.-Y. Huang, Y.-A. Tsai and R. Tso, “Enhanced Privacy Protection in Machine Learning based on Mondrian Multidimensional Anonymity and Self-Organizing Map”, AsiaJCIS 2020 (the 15th Asia Joint Conference on Information Security), Taipei, Taiwan, pp. 97-100, Aug. 20-21, 2020.

[4] H.-H. Chung, P. S. Wang, T.-W. Ho, H.-C. Hsiao, and F. Lai, "A Secure Authorization System in PHR based on CP-ABE," IEEE International Conference on e-Health and Bioengineering, pp. 1-4, Nov., 2015. (EI)

[5] P. S. Wang, S. Chen, C. Kuo, C. Tu, and F. Lai, "An Intelligent Dietary Planning Mobile System with Privacy-preserving Mechanism", IEEE International Conference on Consumer Electronics (ICCE), pp. 336-337, Jun., 2015. (EI)

[6] K. H. Huang, E. C. Chang, S. J. Wang, "A Patient-Centric Access Control Scheme for Personal Health Records in the Cloud," IEEE International Conference on Networking and Distributed Computing, Dec., 2013. (EI)

[7] Y. Z. Wu, D. M. Hsieh, C. C. Chan, C. C. Hsiao, S. J. Wang, "The Research of the Certification Practice Statements of each CA in Taiwan", The E-Learning and Information Technology Symposium, Mar., 2010. 

[8] M. C. Su, J. Lee, and S. J. Wang, "Method for Wrapper Maintenance," Processing of the Second Taiwan Conference on Software Engineering, pp. 293-298, Taipei, Taiwan, Jun. 9-10, 2006.

[9] M. C. Su, S. J. Wang, S. C. Lai, M. Z. Liao, and K. H. Yang, "The Study of Personal Identification based on Finger Vein Patterns," Biomedical Engineering Society Annual Symposium, Taipei, Taiwan, 2006

[10] K. C. Chen, S. J. Wang and C. Y. Cheng, "A Real-Time Symbol Recognizer and its Application to Music-Playing Robot," CACS Automatic Control Conference, Tainan, Taiwan, Nov. 18-19, 2005.