<專利>
王紹睿,陳子旺,吳泓叡,曾子維,「基於聲音及頻率轉換之惡意軟體檢測系統與方法」,中華民國發明專利申請中
王紹睿,文浤任,曾子維,「憑證驗證裝置及方法」,中華民國發明專利I872934號,有效期間2025/02/11-2044/01/31。
林志訓,游家牧,王紹睿,張文軒,左瑞麟,「具差分隱私保護之資料合成系統、方法及其電腦可讀媒介」,中華民國發明專利第I824927號,有效期間2023/12/1-2043/1/16。
王紹睿,「雲端服務的加密系統及加密方法」,中華民國發明專利第I789115號,有效期間2023/1/1-2041/11/11。
左瑞麟,王紹睿,「基於ECQV隱式憑證之代理憑證及憑證更新機制」,中華民國發明專利第I767682號,有效期間2022/6/11-2041/4/29。
王紹睿,江彬榮,詹景傑,「機率式多重軟體加密通訊系統及方法」,中華民國發明專利第I644554號,有效期間2018/12/11-2037/6/6。
王紹睿,「分散式深度學習系統及方法」,中華民國發明專利第I690861號,有效期間2020/4/11-2039/8/20。
王紹睿,張耿豪,江彬榮,蕭崇懃,謝永逸,「交互認證系統及其方法」,中華民國發明專利第I608431號,有效期間2017/12/11-2034/11/05。
王紹睿,張耿豪,謝東明,詹景傑,蕭崇懃,「E-Home之安全認證控管系統與方法」,中華民國發明專利,中華民國發明專利第I520554號,有效期間2016/2/1 – 2031/11/21。
王紹睿,張耿豪,江彬榮,莊秋芸,謝永逸,「安全可信賴的網路實體隔離的系統與方法」,中華民國發明專利第I480761號,有效期間2015/4/11-2032/12/26。
王紹睿,張耿豪,謝東明,詹景傑,蕭崇懃,「基於生物特徵輸入順序的生物辨識系統與方法」,中華民國發明專利第I433522號,有效期間2014/4/1- 2030/1/4。
李駿偉,陳姿樺,謝東明,蔡文慧,王紹睿,「網站及網路物件來源認證的方法」,中華民國發明專利第I478083號,有效期間2015/3/21-2031/10/30。
王紹睿,張耿豪,詹景傑,謝東明,「使用隨身物品的認證系統與方法」,中華民國發明專利第I388185號,有效期間2013/3/1-2029/10/20。
蘇木春,李允中,王紹睿,「網頁包覆程式的維護方法」,中華民國發明專利第I328952號,有效期間2010/8/11-2026/4/13。
<Journal Paper>
P. S. Wang, H.-H. Tsai, "A Fine-grained and Pattern-aware Multi-prototype Network for Few-shot Malware Classification," Journal of Information Security and Applications, Under Review (Revised and Resubmitted).
P. S. Wang, Supaporn Nguanprasert, " Protecting Copyrighted Images against Diffusion Models via Universal Adversarial Perturbations with Hybrid Loss and Momentum," ACM Transactions on Intelligent Systems and Technology, submitted.
D. A. Wako, P. S. Wang, "Backdoor Resistant Federated Few-shot Learning for Malware Classification," IEEE Transactions on Reliability, submitted.
D. A. Wako, P. S. Wang, "A Differentially Private Federated Learning Framework for Multilingual Hate Speech Detection," IEEE Transactions on Computational Social Systems, submitted.
Z.-Y. Liu, Y.-F. Tseng , R. Tso, P. S. Wang, and Q.-W. Su, "Extension of Elliptic Curve Qu-Vanstone Certificates and Their Applications", Journal of Information Security and Applications, vol. 67, Jun. 2022. (SCI, EI, Impact Factor: 3.872)
Y.-C. Chen, X. Xie, P. S. Wang, and R. Tso, "Witness-based searchable encryption with optimal overhead for cloud-edge computing", Future Generation Computer Systems, vol. 100, no. 1, pp. 715-723, Nov. 2019. (SCI, EI, Impact Factor: 4.639)
P. S. Wang, F. Lai, H.-C. Hsiao, and J.-L. Wu, "Insider Collusion Attack on Privacy-preserving Kernel-based Data Mining Systems," IEEE Access, vol. 4, no. 1, 2016. (SCI, EI, Impact Factor: 3.557)
A. Wang, F. Lai, F. S. Hsu, and P. S. Wang, "Mobilizing Sophisticated Donors: What Candidate Facebook Posts Do Attract Intra- and Inter-district Donations?", Issues and Studies (IS), vol. 56, no. 4, Dec. 1, 2020. (SCOPUS)
M. C. Su, S. J. Wang, C. K. Huang, P. C. Wang, F. H. Hsu, S. C. Lin, and Y. Z. Hsieh, "A Signal-Representation-Based Parser to Extract Text-Based Information from the Web," Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 14, no. 5, pp. 531-539, 2010. (EI)
(The below are domestic journal paper)
T.-T. Lin, P. S. Wang, "Automated Attack Graph Construction for Industrial Control Systems Based on Zeek and SAGE," Communications of the CCISA, vol. 31, no. 4, pp. 23-33, 2025.
P. S. Wang, "Introduction to Privacy-preserving Mechanisms for Artificial Intelligent Systems", Instruments Today, no. 215, pp.74-84 , 2018. (domestic journal paper)
P. S. Wang, “Privacy-preserving Data Mining: A New Threat and its Multilevel Commutative Encryption based Solution,” TL Technical Journal, vol. 47, no.4, 2017. (domestic journal paper)
P. J. Chiang, C. C. Hsiao, C. C. Chan, Y. Y. Shieh, C. Y. Chuang, S. J. Wang, G. H. Chang, “Implementation of Multi-Card Service in the Trusted Service Management,” TL Technical Journal, vol. 44, no.5, 2014. (domestic journal paper)
Y. Y. Shieh, C. C. Chan, C. C. Hsiao, D. M. Shieh, S. J. Wang, C. Y. Chuang, G. H. Chang, “Cloud Registration Authority System: A Case Study of Microsoft Hyper-V,” TL Technical Journal, vol. 42, no.2, 2012. (domestic journal paper)
C. Y. Chuang, C. C. Chan, C. C. Hsiao, Y. Y. Shieh, S. J. Wang, D. M. Shieh, G. H. Chang, "The Research of Cross-Browser, Cross-Platform Certificate Registration Websites: A Case Study of Silverlight", TL Technical Journal, vol. 41, no.6, 2011. (domestic journal paper)
D. M. Hsieh, C. W. Lee, T. H. Chen, W. H. Tsai, and S. J. Wang, “Secure Key Recovery System of IC Card,” TL Technical Journal, vol. 39, no.2, 2009. (domestic journal paper)
<Conference Paper>
J.-M. Yao, B.-C. Xie, S.-W. Peng, H.-Y. Chen, H.-R. Zheng, B.-J. Tan, P. S. Wang, and S.-F. Su, “Multi-TW: Benchmarking Multimodal Models on Traditional Chinese Question Answering in Taiwan,” in 2025 International Automatic Control Conference (CACS), Hsinchu, Taiwan, Nov. 5–8, 2025. (EI)
Z.-B. Hsiao and P. S. Wang, "Threat Detection Using Multimodal Fusion and Timestamp Alignment," International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct. 15-17, 2025, Taichung, Taiwan. (SCOPUS)
P. S. Wang, Z. W. Hsiao, H.-H. Tsai, T.-W. Tseng, "Privacy-Preserving Facial Expression Reconstruction and De-identification in Masked Images," IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Kaohsiung, Taiwan, Dec. 10-13, 2024. (EI)
D. A. Wako, P. S. Wang, "Comparative Analysis of DL and Traditional ML Methods for Malware Image Classification", International Conference on Advances in Distributed Computing and Machine Learning (ICADCML), Jan. 9-10, 2025. (SCOPUS)
P. S. Wang, K.-L. Chen, J.-H. Huang, Y.-Y. Liao, "Detection of Malicious Certificates Based on Natural Language Processing and Adversarial Learning," Cryptology and Information Security Conference (CISC), Taipei, Taiwan, Aug. 29-30, 2024.
P. S. Wang and H.-J. Wen, "Efficient and robust detection of malicious TLS certificates in IoT devices," in 6th Blockchain and Internet of Things Conference, ACM, Fukuoka, Japan, Jul. 19-21, 2024.
P. S. Wang, “Hybrid Differentially Private SVM based on Matrix Gaussian Scheme and Homomorphic Encryption”, IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Hualien, Taiwan, pp. 1-2, Nov. 16-19, 2021. (EI) <Best Paper Award>
Z.-Y. Liu, P. S. Wang, S.-C. Hsiao and R. Tso, “Defense against N-pixel Attacks based on Image Reconstruction”, ACM ASIACCS-SBC (8th ACM International Workshop on Security in Blockchain and Cloud Computing held in conjunction with ACM AsiaCCS 2020), Taipei, Taiwan, pp. 3-7, Oct 6, 2020. (EI)
P. S. Wang, P.-Y. Huang, Y.-A. Tsai and R. Tso, “Enhanced Privacy Protection in Machine Learning based on Mondrian Multidimensional Anonymity and Self-Organizing Map”, AsiaJCIS 2020 (the 15th Asia Joint Conference on Information Security), Taipei, Taiwan, pp. 97-100, Aug. 20-21, 2020.
H.-H. Chung, P. S. Wang, T.-W. Ho, H.-C. Hsiao, and F. Lai, "A Secure Authorization System in PHR based on CP-ABE," IEEE International Conference on e-Health and Bioengineering, pp. 1-4, Nov., 2015. (EI)
P. S. Wang, S. Chen, C. Kuo, C. Tu, and F. Lai, "An Intelligent Dietary Planning Mobile System with Privacy-preserving Mechanism", IEEE International Conference on Consumer Electronics (ICCE), pp. 336-337, Jun., 2015. (EI)
K. H. Huang, E. C. Chang, S. J. Wang, "A Patient-Centric Access Control Scheme for Personal Health Records in the Cloud," IEEE International Conference on Networking and Distributed Computing, Dec., 2013. (EI)
Y. Z. Wu, D. M. Hsieh, C. C. Chan, C. C. Hsiao, S. J. Wang, "The Research of the Certification Practice Statements of each CA in Taiwan", The E-Learning and Information Technology Symposium, Mar., 2010.
M. C. Su, J. Lee, and S. J. Wang, "Method for Wrapper Maintenance," Processing of the Second Taiwan Conference on Software Engineering, pp. 293-298, Taipei, Taiwan, Jun. 9-10, 2006.
M. C. Su, S. J. Wang, S. C. Lai, M. Z. Liao, and K. H. Yang, "The Study of Personal Identification based on Finger Vein Patterns," Biomedical Engineering Society Annual Symposium, Taipei, Taiwan, 2006
K. C. Chen, S. J. Wang and C. Y. Cheng, "A Real-Time Symbol Recognizer and its Application to Music-Playing Robot," CACS Automatic Control Conference, Tainan, Taiwan, Nov. 18-19, 2005.