Jump to the main content block

 

Journals Papers

  1. Wang, S.L., Chen, Y.M., “An efficient numerical method for exterior and interior inverse problems of Helmholtz equation”, Wave Motion, vol.13, no.4, July 1991, pp.387-99. Netherlands. (EI)
  2. Wang, S.L., “Characterization of Query Responses on Fuzzy Databases Based on Similarity Relations”, Journal of Kaohsiung Polytechnic Institute, Vol. 3, 1996, 157-169.
  3. Wang, S.L., Hwang, T.J., “Handling Missing Attribute Values in Similarity-Based Fuzzy Object-Oriented Database”, Journal of I-Shou University, Vol. 4, 1997, 187-197.
  4. Wang, S.L., Tasi, Y.J., “Interval-Valued Compound Fuzzy Attributes in Fuzzy Queries”, Journal of I-Shou University, Vol. 5, 1998, 241-250.
  5. Wang, S.L., Wu, Y.H., “Incomplete Reasoning of Fuzzy Expert Systems under Fuzzy Petri Nets, Journal of I-Shou University, Vol. 6, 1999, 107-118.
  6. Wang, S.L., Tsai, Y.J., “Null Queries with Compound Fuzzy Attributes”, International Journal of Advanced Computational Intelligence, Vol. 3, No. 6, Dec. 1999, 509-514.
  7. Hong, T.P., Wang, S.L., “Determining Appropriate Membership Functions to Simplify Fuzzy Induction”, International Journal of Intelligent Data Analysis, Vol. 4, No. 1, 2000, 51-66. (EI)
  8. Hong, T.P., Wang, T.T., Wang, S.L., Chien, B.C., "Learning a Coverage Set of Maximally General Fuzzy Rules by Rough Sets", Expert Systems with Applications, 19(2), 2000, 97-103. (SCI, EI)
  9. Hong, T.P., Wang, T.T., and Wang, S.L.,” Knowledge Acquisition from Quantitative Data Using the Rough-Set Theory”, International Journal of Intelligent Data Analysis, Vol. 4, No.2, 2000, 289-304. (EI)
  10. Wang, S.L., Hong, T.P., “Incomplete Input Inference on Fuzzy Production Systems Supported by Petri Nets”, International Journal of Artificial Intelligence Tools, Vol. 9, No. 4, Dec. 2000, 537-549.
  11. Hong, T.P., Wang, C.L., Wang, S.L., "Solving Flexible Flow-shop Problems by Combining LPT and Gupta Scheduling Algorithms”, Hybrid Methods in Engineering, Vol. 3, No. 1, 2001, 75-87.
  12. Wang, S.L., Tsai, Y.J., “Generating Compound Attributes from Fuzzy Data for Null Queries”, Intelligent Automation and Soft Computing, Vol. 7, No. 2, 2001, 1-8. (SCI)
  13. Wang, S.L., Tsai, J.S., Hong, T.P., “Discovering Functional Dependencies from Similarity-based Fuzzy Relational Databases”, International Journal of Intelligent Data Analysis, Vol. 5, No.2, June 2001, 131-149. (EI)
  14. Wang, S.L., Hong, T.P., Lin, W.Y., “Answering Null Queries by Analogical Reasoning on Similarity-based Fuzzy Relational Databases”, International Journal of Advanced Computational Intelligence, Vol. 5, No. 3, June 2001, 163-171.
  15. Hong, T.P., Wang, T.T., and Wang, S.L., “A Fuzzy CDS-based Scheduling Algorithm for More Than Two Machine Centers”, International Journal of Advanced Computational Intelligence, Vol. 5, No. 4, September 2001, 239-245.
  16. Wang, S.L., Chen, Y.C., Hong, T.P., Chien, B.C., “Validation and Data Mining of Inclusion Dependencies in Database Reverse Engineering”, Journal of Information Management (Taiwan), Vol. 3, No. 2, September 2001, 1-18.
  17. Hong, T.P., Wang, T.T., and Wang, S.L., “A Palmer-based Continuous Fuzzy Flexible Flow-shop Scheduling Algorithm”, International Journal of Soft Computing, Vol. 5, No. 6, 2001, 426-433.
  18. Hong, T.P., Tseng. L.H., and Wang, S.L., "Learning rules from incomplete training examples by rough sets," Expert Systems with Applications, 22, 2002, 285-293. (SCI, EI).
  19. Hong, T.P., Kuo, C.S., Chi, S.C., and Wang, S.L., "A Fuzzy AprioriTid Mining Algorithm”, International Mathematical Journal, Vol. 2, No. 11, 2002, 1089-1117.
  20. Chien, B.C., Lee, S.Y., and Wang, S.L., “The Short-term Sale Forecasting based on Grey Theory”, Journal of Information Management (Taiwan), Vol. 5, No. 1, March 2003, 1-18. 2002.
  21. Hong, T.P., Lin, K.Y., and Wang, S.L., "Fuzzy data mining for interesting generalized association rules," Fuzzy Sets and Systems, Vol. 138, No. 2, 2003, 255-269. (SCI, EI)
  22. Hong, T.P., Lin, K.Y., and Wang, S.L., "Mining Fuzzy Generalized Association Rules from Quantitative Data under Fuzzy Taxonomic Structures," International Journal of Fuzzy Systems, Vol. 5, No. 4, 2003, 239-246.
  23. Wang, S.L., Ito, S., and Jafari, A., “Using Unknown for Hiding Sensitive Items in Association Rule Mining”, WSEAS Transactions on Information Science and Applications, Issue 1, Volume 1, 2004, 489-494, ISSN 1790-0832. (EI)
  24. Lo, W.S., Wang, S.L., Hong, T.P., “A Bottom Up Discovery of Generalized Web Browsing Patterns”, WSEAS Transactions on Information Science and Applications, Issue 1, Volume 1, 2004, 341-345, ISSN 1790-0832. (EI)
  25. Lo, W.S., Hong, T.P., Wang, S.L., and Tao, Y.H., “Semantic Web and Multiple-Agents in SCM”, International Journal of Electronic Business Management, Vol. 2, No. 2, 2004, 122-130.
  26. Hong, T.P., Kuo,C.S., and Wang, S.L., "A Fuzzy AprioriTid Mining Algorithm with Reduced Computational Time”, Applied Soft Computing, 5, 2004, 1-10. (SCI)
  27. Hong, T.P., Lin, K.Y., and Wang, S.L., "Mining Fuzzy Sequential Patterns from Transactions", International Journal of Soft Computing, Online: September 17, 2005, http://www.springerlink.com; Paper: Vol. 10, No. 10, August 2006, 925-932. (SCI)
  28. Hong, T.P., Chiang, M.J., and Wang, S. L., "Mining Weighted Linguistic Browsing Patterns from Log Data on Web Servers", GESTS International Transactions on Computer Science and Engineering, Vol. 29, No. 1, pp. 53-64, 2006.
  29. Hong, T.P., Chiang, M.J., and Wang, S.L., "Data Mining with Linguistic Thresholds", accepted to International Journal of Contempary Mathematical Science, 2006.
  30. Hong, T.P., Chiang, M.J., and Wang, S.L., “Fuzzy Weighted Data Mining from Quantitative Transactions with Linguistic Minimum Supports and Confidences,” International Journal of Fuzzy Systems, Vol. 8, No. 4, December 2006, pp. 173-182. (SCI)
  31. Hong, T.P., Wang, T.T., and Wang, S.L., “Mining Fuzzy b-certain and b-possible Rules from Quantative Data Based on the Variable Precision Rough Set Model”, Expert Systems with Applications, Vol. 32, No. 1, January 2007, 223-232. (SCI, EI)
  32. Wang, S.L., Parikh, B., and Jafari, A., “Hiding Informative Association Rule Sets”, Expert Systems with Applications, Volume 33, Issue 2, August 2007, 316-323. (Online: http://dx.doi.org/10.1016/j.eswa.2006.05.022) (SCI, EI)
  33. Wang, S.L., Huang, K.W., Wang, T.C., and Hong, T.P., “Maintenance of Informative Rule Sets for Predictions”, International Journal of Intelligent Data Analysis, Vol. 11, No. 3, June 2007, 279-292. (SCI, EI)
  34. Wang, S.L., Patel, D., Jafari, A., and Hong, T.P., “Hiding Collaborative Recommendation Association Rule”, Applied Intelligence, Volume 27 (1), August 2007, 67-77. (Online: http://www.springerlink.com/content/q75n04361j7u6553/). (SCI, EI)
  35. Hong, T.P., Lin, C.E., Lin, J.H., and Wang, S.L., “Learning Cross-Level and Possible-Level Rules by Rough Sets”, Expert Systems with Applications, Volume 34 (3), 2008, 1698-1706. (SCI, EI)
  36. Wang, S.L., Maskey, R., Jafari, A., and Hong, T.P., “Efficient Sanitization of Informative Association Rules”, Expert Systems with Applications, Volume 35 (1-2), July 2008, 442-450. (Online: http://dx.doi.org/10.1016/j.eswa.2007.07.039) (SCI, EI)
  37. Hong, T.P., Chiang, M.J., and Wang, S.L., “Mining Fuzzy Weighted Browsing Patterns from Time Duration and with Linguistic Thresholds”, American Journal of Applied Sciences, 5 (12), 2008, 1611-1621. (EI)
  38. Hong, T.P., Horng, C.Y., Wu, C.H., and Wang, S.L., “An Improved Data Mining Approach Using Predictive Itemsets”, Expert Systems with Applications, Volume 36 (1), January 2009, 72-80. (doi:10.1016/j.eswa.2007.09.009)(SCI, EI)
  39. Wang, S.L., “Maintenance of Sanitizing Informative Association Rules”, Expert Systems with Applications, Volume 36 (2), part 2, March 2009, 4006-4012. (Online: http://dx.doi.org/10.1016/j.eswa.2008.02.050) (SCI, EI)
  40. Hong, T.P., Liou, Y.L., and Wang, S.L., “Fuzzy Rough Sets with Hierarchical Quantitative Attributes”, Expert Systems with Applications, Volume 36, Number 3P2, April, 2009, 6790-6799. (Online: http://dx.doi.org/10.1016/j.eswa.2008.08.069) (SCI, EI)
  41. Hong, T.P., Wu, Y.Y., and Wang, S.L., “An Effective Mining Approach for Up-to-date Patterns”, Expert Systems with Applications, 2009.  (http://dx.doi.org/10.1016/j.eswa.2009.02.029) (SCI, EI)
  42. Hong, T.P., Tung, Y.F., Wang, S.L., and Wu, Y.L., “An ACS-based Framework for Fuzzy Data Mining”, Expert Systems with Applications, 2009. (doi: 10.1016/j.eswa.2009.04.016) (SCI, EI)
  43. Wang, S.L., Lo, W.S., and Hong, T.P., “Top-Down Discovery of Cross-Level Web Browsing Sequences on Taxonomy”, International Journal of Computer Science and Knowledge Engineering, Volume 4 (2), 2010, 99-105. (EI)
  44. Wang, S.L., Lai, T.Z., Hong, T.P., and Wu, Y.L., “Hiding Collaborative Recommendation Association Rules on Horizontally Partitioned Data”, Intelligent Data Analysis, Vol. 14, No. 1, 2010, 47-67. (SCI, EI)
  45. Wang, S.L., Chen, J.D., Stirpe, P.A., Hong, T.P., “Risk-neutral evaluation of information security investment on data centers”, Journal of Intelligent Information Systems, Volume 36, Issue 3, 2011, page 329. (Online: Nov 10, 2009, doi: 10.1007/s10844-009-0109-4) (SCI, EI)
  46. Hong, T.P., Tung, Y.F., Wang, S.L., and Wu, Y.L., Wu, M.T., “A Multi-level Ant-colony Mining Algorithm for Membership Functions”, Information Sciences, Voume 182, No. 1, January, 2011, 3 - 14. (doi: http://dx.doi.org/10.1016/j.ins.2010.12.019) (SCI, EI)
  47. Hong, T.P., Chiu, C.T., Wang, S.L., and Lin, K.Y., "Mining a complete set of fuzzy multiple-level rules", International Journal of Fuzzy Systems, Vol. 13, No. 2, pp. 111 – 119, 2011. (SCI)
  48. Hong, T.P., Lee C.H., and Wang, S.L.,Effective Utility Mining with the Measure of Average Utility”, Expert Systems with Applications, Volume 38, Issue 7, July 2011, 8259-8265. ( doi:10.1016/j.eswa.2011.01.006 ) (SCI, EI)
  49. Wang, S.L., Tsai, Y.C., Kao, H.Y., and Hong, T.P., “Extending Suppression for Anonymization on Set-Valued Data”, International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 7, No. 12, pp. 6849-6863, December 2011. (SCI, EI)
  50. Ting, I.H., Chang, P.S., Wang, S.L., “Understanding Microblog Users for Social Recommendation Based on Social Networks Analysis”, Journal of Universal Computer Science, Vol. 18, No. 4, pp. 554-576, 2012.
  51. Hong, T.P., Lin, C.W., Yang, K.T., and Wang, S.L., “Using TF-IDF to Hide Sensitive Itemsets”, Applied Intelligence, Volume 38, Issue 4, pp. 502-510, June, 2013. (SCI, EI)
  52. Lin, C.W, Hong, T.P., Chang, C.C., and Wang, S.L., “A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion”, Journal of Information Hiding and Multimedia Signal Processing, Volume 4, Number 4, pp. 201-214, October 2013. (EI)
  53. Wang, S.L., Tsai, Y.C., Kao, H.Y., Ting, I.H., and Hong, T.P.,Shortest Paths Anonymization on Weighted Graphs”, International Journal of Software Engineering and Knowledge Engineering, Volume 23, No. 1, pp. 65-79, February 2013. (SCI, EI)
  54. Wang, S.L., Chen, C.Y., Ting, I.H., and Hong, T.P., “Anonymous Spatial Query on Non-uniform Data”, International Journal of Data Warehousing and Mining, 9(4), 44-61, October – December, 2013. (SCI, EI)
  55. Hong, T.P., Liou, Y.L., Wang, S.L., and Vo, B., “Feature Selection by Clustering Attributes”, Vietnam Journal of Computer Science, Volume 1, No. 1, pp. 47-55, February 2014.
  56. Wang, S.L., Tsai, Z.Z., Ting, I.H., and Hong, T.P., “K-anonymous Path Privacy on Social Graphs”, Journal of Intelligent and Fuzzy Systems, Volume 26, No. 3, pp. 1191–1199, January 2014. (SCI, EI)
  57. Lan, G.C., Hong, T.P., Tseng, V.S., and Wang, S.L., “Applying the Maximum Utility Measure in High Utility Sequential Pattern Mining”, Expert Systems with Applications, Volume 41, Issue 11, 1 September 2014, pp. 5071–5081. (SCI, EI)
  58. Wang, S.L., Tsai, Y.C., Kao, H.Y., and Hong, T.P.,On Anonymizing Transactions with Sensitive Items”, Applied Intelligence, December 2014Volume 41, Issue 4, pp 1043-1058. (SCI, EI)
  59. Lin, C.W, Hong, T.P., Yan, K.T., and Wang, S.L., “The GA-based Algorithms for Optimizing Hiding Sensitive Itemsets through Transaction Deletion”, Applied Intelligence, March 2015, Volume 42, Issue 2, 210-230. (SCI, EI)
  60. Lan, G.C., Hong, T.P., Lin, Y.H., and Wang, S.L., “Fuzzy Utility Mining with Upper-Bound Measure”, Applied Soft Computing Journal, May 2015, Volume 30, 767-777. (SCI, EI) http://dx.doi.org/10.1016/j.asoc.2015.01.055
  61. Tsai, Y.C., Wang, S.L.*, Kao, H.Y., and Hong, T.P., “Edge Types vs Privacy in K-Anonymization of Shortest Paths”, Applied Soft Computing Journal, June 2015, Volume 31, 348-359. (SCI, EI) http://dx.doi.org/10.1016/j.asoc.2015.03.005
  62. Wang, S.L., Chen, J.W., Ting, I.H., and Hong, T.P., (k, p)-Shortest Path Algorithm in the Cloud Maintaining Neighborhood Privacy”, Journal of Web Engineering, Vol. 15, No. 1&2, (2016) 29-44. (SCI, EI)
  63. Wang, S.L., Tsai, Y.C., Hong, T.P., and H.Y. Kao, “K--Anonymization of Multiple Shortest Path”, Soft Computing (2016). (SCI, EI) DOI 10.1007/s00500-016-2032-2
  64. Hong, T.P., Lan, G.C., Wu, P.S., Su, J.H., and Wang, S.L., “Discovery of Temporal Association Rules with Hierarchical Granular Framework”, Applied Computing and Informatics (Feb 2, 2016), doi: http://dx.doi.org/ 10.1016/j.aci.2016.01.003.
  65. Wang, S.L., “A Glance at Privacy Preservation”, Journal of Informatics and Regional Studies, Vol. 8, No. 1, March 31, 2016, 161-181. ISSN 1883-5104.
  66. Lin, C.L.,Yang, L., Fournier-Viger, P., Wu, M.T., Hong, T.P., Wang, S.L., Zhan, J, “Mining High-Utility Itemsets based on Particle Swarm Optimization”, Engineering Applications of Artificial Intelligence, Vol. 55, C, October 2016, 320-330.
  67. Hong, T.P., Peng, Y.C., Lin, W.Y., and Wang, S.L., “Empirical Comparison of Level-wise Hierarchical Multi-population Genetic Algorithm”, Journal of Information and Telecommunication, Vol. 1, No. 1, March 2017, 66-78.
  68. Wang, S.L., Hsiu, M.J., Tsai, Y.C., Ting, I.H., Hong, T.P., “Analysis of Privacy and Utility Tradeoffs in Anonymized Mobile Context Stream”, Intelligent Data Analysis, 21, April 2017, S21–S39. (SCI, EI)
  69. Hong, T.P., Chen, W.C., Lin, W.Y., and Wang, S.L., “Implementation of View Creation and Deletion with Class Integration under Multiple Data Sources”, Int J Comput Softw Eng 2017, 2: 123. December 2017. https://doi.org/10.15344/2456-4451/2017/123
  70. Tsai, Y.C., Wang, S.L., Ting, I.H., Hong, T.P., “Flexible Sensitive K-anonymization on Transactions”, World Wide Web, 2020 (to appear).
Click Num: