NUKIM

English

王學亮 教授兼校長

Leon

基本資料

專長

  • 資料探勘與隱私
  • 社會網路
  • 資料庫管理
  • 資訊安全投資模式

學歷

  • 美國紐約州立大學應用數學博士
  • 美國紐約州立大學應用數學碩士
  • 國立交通大學應用數學碩士
  • 國立交通大學應用數學學士

經歷

  • 國立高雄大學資訊管理學系教授兼系主任
  • 國立高雄大學資訊管理學系副教授兼系主任
  • 美國紐約理工學院電腦科學系副教授
  • 義守大學資訊管理學系副教授兼系主任/電算中心主任/圖書館館長
  • 美國紐海芬大學數學系助理教授
  • 國立交通大學應用數學系講師

論文發表

期刊論文

作者 年份 題目 期刊名稱
Hong, T.P., Liou, Y.L., Wang, S.L., and Vo, B 2014 Feature Selection by Clustering Attributes Vietnam Journal of Computer Science, Volume 1, No. 1, pp. 47-55, February 2014.
Wang, S.L., Tsai, Z.Z., Ting, I.H., and Hong, T.P. 2014 K-anonymous Path Privacy on Social Graphs Journal of Intelligent and Fuzzy Systems, Volume 26, pp. 1191–1199, 2014. (SCI, EI)
Lan, G.C., Hong, T.P., Tseng, V.S., and Wang, S.L. 2014 Applying the Maximum Utility Measure in High Utility Sequential Pattern Mining Expert Systems with Applications, Volume 41, Issue 11, 1 September 2014, Pages 5071–5081. (SCI, EI)
Wang, S.L., Tsai, Y.C., Kao, H.U., and Hong, T.P. 2014 K-anonymous Path Privacy on Social Graphs Journal of Intelligent and Fuzzy Systems, Volume 26, pp. 1191–1199, 2014. (SCI, EI)
Wang, S.L., Tsai, Y.C., Kao, H.U., and Hong, T.P. 2014 On Anonymizing Transactions with Sensitive Items Applied Intelligence, 2014. (SCI, EI)
Hong, T.P., Lin, C.W., Yang, K.T., and Wang, S.L. 2013 Using TF-IDF to Hide Sensitive Itemsets Applied Intelligence, Volume 38, Issue 4, pp. 502-510, June, 2013. (SCI, EI)
Lin, C.W, Hong, T.P., Chang, C.C., and Wang, S.L. 2013 A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion Journal of Information Hiding and Multimedia Signal Processing, Volume 4, Number 4, pp. 201-214, October 2013. (EI)
Wang, S.L., Tsai, Y.C., Kao, H.U., Ting, I.H., and Hong, T.P. 2013 Shortest Paths Anonymization on Weighted Graphs International Journal of Software Engineering and Knowledge Engineering, Volume 23, No. 1, pp. 65-79, 2013. (SCI, EI)
Wang, S.L., Chen, C.Y., Ting, I.H., and Hong, T.P. 2013 Anonymous Spatial Query on Non-uniform Data International Journal of Data Warehousing and Mining, 9(4), 44-61, October – December, 2013. (SCI, EI)
Hong, T.P., Lin, C.W., Yang, K.T., and Wang, S.L. 2013 Using TF-IDF to Hide Sensitive Itemsets Applied Intelligence, Volume 38, Issue 4, pp. 502-510, June, 2013. (SCI, EI)
Lin, C.W, Hong, T.P., Chang, C.C., and Wang, S.L. 2013 A Greedy-based Approach for Hiding Sensitive Itemsets by Transaction Insertion Journal of Intelligent and Fuzzy Systems, 2013. (SCI, EI)
Hong, T.P., Liou, Y.L., Wang, S.L., and Vo, B 2013 Feature Selection by Clustering Attributes Vietnam Journal of Computer Science, November 2013.
Ting, I.H., Chang, P.S., Wang, S.L. 2012 Understanding Microblog Users for Social Recommendation Based on Social Networks Analysis Vol. 18, No. 4, pp. 554 – 576, 2012, Journal of Universal Computer Science
Wang, S.L., Tsai, Y.C., Kao, H.U., and Hong, T.P. 2011 Extending Suppression for Anonymization on Set-Valued Data International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 7, No. 12, pp. 6849 – 6863, December 2011. (SCI, EI)
Hong, T.P., Lee C.H., and Wang, S.L. 2011 Effective Utility Mining with the Measure of Average Utility Expert Systems with Applications, Volume 38, Issue 7, July 2011, 8259-8265. ( doi:10.1016/j.eswa.2011.01.006 ) (SCI, EI)
Hong, T.P., Chiu, C.T., Wang, S.L., and Lin, K.Y. 2011 Mining a complete set of fuzzy multiple-level rules International Journal of Fuzzy Systems, Vol. 13, No. 2, pp. 111 – 119, 2011. (SCI)
Hong, T.P., Tung, Y.F., Wang, S.L., and Wu, Y.L., Wu, M.T., 2010 A Multi-level Ant-colony Mining Algorithm for Membership Functions Information Sciences, Voume 182, No. 1, January, 2011, 3 – 14. (doi: http://dx.doi.org/10.1016/j.ins.2010.12.019) (SCI, EI)
Wang, S.L., Lai, T.Z., Hong, T.P., and Wu, Y.L. 2011 Hiding Collaborative Recommendation Association Rules on Horizontally Partitioned Data Intelligent Data Analysis, Vol. 14, No. 1, 2010, 47-67. (SCI, EI)
Wang, S.L., Lo, W.S., and Hong, T.P. 2010 Top-Down Discovery of Cross-Level Web Browsing Sequences on Taxonomy International Journal of Computer Science and Knowledge Engineering, Volume 4 (2), 2010, 99-105. (EI)
Wang, S.L., Chen, J.D., Stirpe, P.A., Hong, T.P. 2009 Risk-neutral evaluation of information security investment on data centers Journal of Intelligent Information Systems, Volume 36, Issue 3, 2011, page 329. (Online: Nov 10, 2009, doi: 10.1007/s10844-009-0109-4) (SCI, EI)
Hong, T.P., Lee C.H., and Wang, S.L. 2011 Effective Utility Mining with the Measure of Average Utility Expert Systems with Applications, Volume 38, Issue 7, July 2011, 8259-8265. ( doi:10.1016/j.eswa.2011.01.006 ) (SCI, EI)
Hong, T.P., Liou, Y.L., and Wang, S.L. 2009 Fuzzy Rough Sets with Hierarchical Quantitative Attributes Expert Systems with Applications, Volume 36, Number 3P2, April, 2009, 6790-6799. (Online: http://dx.doi.org/10.1016/j.eswa.2008.08.069) (SCI, EI)
Hong, T.P., Wu, Y.Y., and Wang, S.L. 2009 An Effective Mining Approach for Up-to-date Patterns Expert Systems with Applications, 2009. (http://dx.doi.org/10.1016/j.eswa.2009.02.029) (SCI, EI)
Hong, T.P., Tung, Y.F., Wang, S.L., and Wu, Y.L. 2009 An ACS-based Framework for Fuzzy Data Mining Expert Systems with Applications, 2009. (doi: 10.1016/j.eswa.2009.04.016) (SCI, EI)
Wang, S.L. 2009 Maintenance of Sanitizing Informative Association Rules Expert Systems with Applications, Volume 36 (2), part 2, March 2009, 4006-4012. (Online: http://dx.doi.org/10.1016/j.eswa.2008.02.050) (SCI, EI)
Hong, T.P., Horng, C.Y., Wu, C.H., and Wang, S.L. 2009 An Improved Data Mining Approach Using Predictive Itemsets Expert Systems with Applications, Volume 36 (1), January 2009, 72-80. (doi:10.1016/j.eswa.2007.09.009)(SCI, EI)
Hong, T.P., Chiang, M.J., and Wang, S.L. 2008 Mining Fuzzy Weighted Browsing Patterns from Time Duration and with Linguistic Thresholds American Journal of Applied Sciences, 5 (12), 2008, 1611-1621. (EI)
Wang, S.L., Maskey, R., Jafari, A., and Hong, T.P. 2008 Efficient Sanitization of Informative Association Rules Expert Systems with Applications, Volume 35 (1-2), July 2008, 442-450. (Online: http://dx.doi.org/10.1016/j.eswa.2007.07.039) (SCI, EI)
Hong, T.P., Lin, C.E., Lin, J.H., and Wang, S.L. 2008 Learning Cross-Level and Possible-Level Rules by Rough Sets Expert Systems with Applications, Volume 34 (3), 2008, 1698-1706. (SCI, EI)


研討會論文

作者 年份 題目 期刊名稱 研討會地點
Ting, I.H., Wang, S.L., Chi, H.M., and Wu, J.S. 2013 Content Matters: A study of hate groups detection based on social networks analysis and web mining International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 25-28, 2013. Niagra Falls, Canada.
Wang, S.L., Shih, C.C., Ting, I.H., and Hong, T.P. 2013 Edge Selection for Degree Anonymization on K Shortest Paths 3rd International Workshop on Intelligent Data Analysis and Management, (joint with 8th International Conference on Knowledge Management in Organization), September 9–13, 2013. Kaohsiung, Taiwan.
Wang, S.L., Chen, J.W., Ting, I.H., and Hong, T.P 2013 K-Neighborhood Shortest Path Privacy in the Cloud 3rd International Workshop on Intelligent Data Analysis and Management, (joint with 8th International Conference on Knowledge Management in Organization), September 9–13, 2013. Kaohsiung, Taiwan.
Tang, Y.L., Ting, I.H., and Wang, S.L.. 2013 Reinforcement Learning Technique 3rd International Workshop on Intelligent Data Analysis and Management, (joint with 8th International Conference on Knowledge Management in Organization), September 9–13, 2013. Kaohsiung, Taiwan.
Ting, I.H., Chi, H.M., Wu, J.S., and Wang, S.L 2013 An Approach for Hate Groups Detection in Facebook 3rd International Workshop on Intelligent Data Analysis and Management, (joint with 8th International Conference on Knowledge Management in Organization), September 9–13, 2013. Kaohsiung, Taiwan.
Wang, S.L., Shih, C.C., Ting, I.H., and Hong, T.P. 2013 Degree Anonymization for K-Shortest-Path Privacy 2013 IEEE International Conference on Systems, Man and Cybernetics, October 13-16, 2013. Manchester, UK.
Lan, G.C., Hong, T.P., H.Y. Lee, and Wang, S.L. 2013 Enhancing Efficiency in Mining Weighted Frequent Itemsets 2013 IEEE International Conference on Systems, Man and Cybernetics, October 13-16, 2013. Manchester, UK.
Wang, S.L., Shih, C.C., Ting, I.H., and Hong, T.P. 2013 Sensitive and Neighborhood Privacy on Shortest Paths in the Cloud 15th International Conference on Information Integration and Web-based Applications & Services, pp. 555-559, December 2013. Vienna, Austria.
Wang, S.L., Chen, C.Y., Ting, I.H., and Hong, T.P. 2012 Anonymous Spatial Query on Non-uniform Data 14th International Conference on Information Integration and Web-based Applications & Services, pp. 126 – 131 Bali, Indonesia.
Wang, S.L., Chen, C.Y., Ting, I.H., and Hong, T.P. 2012 Multi-layer Partition for Query Location Anonymization 2012 IEEE International Conference on Systems, Man and Cybernetics Seoul, Korea.
Tsai, Y.C., Wang, S.L., Kao, H.Y., Hong, T.P. 2012 Confining Edge Types in K-anonymization of Shortest Paths Third International Conference on Innovations in Bio-inspired Computing and Applications (IBICA-2012) Kaohsiung, Taiwan.
Hong, T.P., Lin, C.W., Lin, T.C., and Wang, S.L. 2012 Incremental Multiple Fuzzy Frequent Pattern Tree IEEE International Conference on Fuzzy Systems, June 2012 Brisbane, Australia.
Wang, S.L., Chen, C.Y., Ting, I.H., Hong, T.P. 2012 非均勻分布地圖之查詢地點隱匿之研究 International Conference on Information Management, May 19, 2012. Kaohsiung, Taiwan.
Lu, S.S., Ting, I.H., Wang, S.L. 2012 社會搜尋:應用社會網絡分析方法於網頁搜尋技術之研究 International Conference on Information Management, May 19, 2012. Kaohsiung, Taiwan.
Hong, T.P., Lin, C.W., Lin, T.C., and Wang, S.L. 2012 Incremental Multiple Fuzzy Frequent Pattern Tree IEEE International Conference on Fuzzy Systems, pp. 2051 – 2055, June 2012. Brisbane, Australia.
Tsai, Y.C., Wang, S.L., Kao, H.Y., Hong, T.P. 2012 Confining Edge Types in K-anonymization of Shortest Paths Third International Conference on Innovations in Bio-inspired Computing and Applications (IBICA-2012), September 2012. Kaohsiung, Taiwan.
Wang, S.L., Chen, C.Y., Ting, I.H., and Hong, T.P. 2012 Multi-layer Partition for Query Location Anonymization 2012 IEEE International Conference on Systems, Man and Cybernetics. Seoul, Korea.
Wang, S.L., Chen, C.Y., Ting, I.H., and Hong, T.P. 2012 Anonymous Spatial Query on Non-uniform Data 14th International Conference on Information Integration and Web-based Applications & Services, pp. 126 – 131. Bali, Indonesia.
Lin, C.W., Hong, T.P., Chang, C.C., and Wang, S.L. 2012 A GA-based Approach for Hiding Sensitive Itemsets by Transaction Insertion International Conference on Theoretical and Mathematical Foundations of Computer Science, Vol. 38, pp. 3-9, 2012.
Lin, C.W., Hong, T.P., Lee, H.Y., Wang, S.L. 2011 Maintenance of Pre-large FUSP Trees in Dynamic Databases Second International Conference on Innovations in Bio-inspired Computing and Applications (IBICA-2011), December 2011 Shenzhen, China.
Wang, S.L., Tsai, Z.Z., Hong, T.P., Ting, I.H., Tsai, Y.C. 2011 Anonymizing Multiple K-anonymous Shortest Paths For Social Graphs Second International Conference on Innovations in Bio-inspired Computing and Applications (IBICA-2011), December 2011 Shenzhen, China.
Wang, S.L., Tsai, Y.C., Kuo, H.Y., Hong, T.P. 2011 K-anonymity on Sensitive Transaction Items 2011 IEEE International Conference on Granular Computing, November 2011 Kaohsiung, Taiwan.
Hong, T.P., Lin, C.W., Chang, C.C., and Wang, S.L. 2011 Hiding the Sensitvie Itemsets by Inserting Dummy Transactions 2011 IEEE International Conference on Granular Computing, November 2011 Kaohsiung, Taiwan.
Hong, T.P., Lin, C.W., Yang, K.T., and Wang, S.L. 2011 A Lattice-based Data Sanitization Approach 2011 IEEE International Conference on Systems, Man and Cybernetics, October 2011 Ankorage, USA.
Jang, P.S., Ting, I.H., Wang, S.L 2011 Towards Social Recommendation System based on the Data from Microblogs International Conference on Advances in Social Networks Analysis and Mining (ASONAM), July, 2011 Kaohsiung, Taiwan.
Hong, T.P., Lin, C.W., Yang, K.T., and Wang, S.L. 2011 A Heuristic Data-Sanitization Approach Based on TF-IDF IEA/AIE 2011, June, 2011. (Lecture Notes in Computer Science, Vol. 6703, pp. 156-164, 2011, EI). Syracuse, USA.
Wang, S.L., Tsai, Z.Z., Hong, T.P., Ting, I.H. 2011 Anonymizing Shortest Paths on Social Network Graphs The Third Asian Conference on Intelligent Information and Database Systems (ACIIDS). April, 2011. Daegu, Korea.
Wang, S.L., Tsai, Y.C., Kao, H.Y., Hong, T.P. 2010 Anonymizing Set-valued Social Data The 2010 International Symposium on Social Computing and Networking (SocialNet’10) Hangzhou, China.
Wang, S.L., Hong, T.P., Tsai, Y.C., Kao, H.Y. 2010 Multi-table Association Rules Hiding The Tenth International Conference on Intelligent Systems Design and Applications (ISDA) Cairo, Egypt.
Hong, T.P., Lin, C.W., Yang, K.T., and Wang, S.L. 2011 A Lattice-based Data Sanitization Approach 2011 IEEE International Conference on Systems, Man and Cybernetics, October 2011 Ankorage, USA.
Hong, T.P., Yang, K.T., Lin, C.W., and Wang, S.L. 2010 Evolutionary Privacy-Preserving Data Mining World Automation Congress. Kobe, Japan.
Wang, S.L., Hong, T.P., Tsai, Y.C., Kao, H.Y. 2010 Hiding Sensitive Association Rules on Stars 2010 IEEE International Conference on Granular Computing. San Jose, USA.
Hong, T.P., Lee, C.H., and Wang, S.L. 2009 An Incremental Mining Algorithm for High Average-Utility Itemsets 10th International Symposium on Pervasive Systems, Algorithms, and Networks Kaohsiung, Taiwan
Hong, T.P., Lee, C.H., and Wang, S.L 2009 Mining High Average-Utility Itemsets 2009 IEEE International Conference on Systems, Man and Cybernetics San Antonio, USA.
Wang, S.L., Chen, J.D., Hong, T.P., Stirpe, P.A. 2009 Probabilistic Analysis of Information Center Insecurity Opportunities and Challenges for Next- Generation Applied Intelligence, Springer Verlag, pp. 175 – 180
Wang, S.L., Lai, T.Z., Hong, T.P., Wu, Y.L. 2009 Hiding Predictive Association Rules on Horizontally Distributed Data Proceedings of International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems Tainan, Taiwan.
Hong, T.P., Tung, Y.F., Wang, S.L., and Wu, Y.Y. 2009 A Multi-level Ant-based Algorithm for Fuzzy Data Mining 28th North American Fuzzy Information Processing Society Annual Conference Cincinnati, USA.
Wang, S.L., Lai, T.Z., Hong, T.P., Wu, Y.L. 2008 Efficient Hiding of Collaborative Recommendation Association Rules with Updates Proceedings of International Conference on Machine Learning and Applications San Diego, USA.
Hong, T.P., Tung, Y.F., Wang, S.L., Wu, M.T., and Wu, Y.L. 2008 Extracting Membership Functions in Fuzzy Data Mining by Ant Colony Systems. Proceedings of International Conference on Machine Learning and Cybernetics. Kunming, China.
Wang, S.L., Chen, J.D., and Hong, T.P. 2008 Probabilistic Modeling and Analysis of Information Center Security Proceedings of International Conference on Information Management Taiwan.
Wang, S.L., Stirpe, P.A., and Hong, T.P. 2008 Modeling Optimal Security Investment of Information Centers. The PAKDD 2008 Workshop on Data Mining for Decision Making and Risk Management. Osaka, Japan


專書論文

作者 年份 題目 期刊名稱
Wang, S.L., Shen, J.W., Hong, T.P. 2010 Dynamic Discovery of Fuzzy Functional Dependencies Using Partitions. In Wang, S.L. and Hong, T.P., (Ed.) Intelligent Soft Computation and Evolving Data Mining: Integrating Advanced Technology.
Wang, S.L., Shen, J.W. & Hong, T.P. 2008 Incremental Discovery of Fuzzy Functional Dependencies. In Galindo, J. (Ed.) Handbook of Research on Fuzzy Information Processing in Databases. Vol. II, pp. 615-633


研究計畫

主持人 年份 結束年份 題目 角色 類型 委託單位
王學亮 2010 國科會計畫-集合值資料庫上非一般化方式之隱匿方法之研究 主持人 國科會計畫 國科會
王學亮 2009 國科會計畫-多關聯表格關聯規則隱藏與K-隱匿之研究 主持人 國科會計畫 國科會
王學亮 2007 NYIT/ISRC, USA, “Efficient Sanitization of Informative Association Rules”. 主持人 國科會計畫 國科會