default search action
Szu-Chuang Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j1]Bo-Chen Tai, Yao-Tung Tsou, Szu-Chuang Li, Yennun Huang, Pei-Yuan Tsai, Yu-Cheng Tsai:
User-Driven Synthetic Dataset Generation With Quantifiable Differential Privacy. IEEE Trans. Serv. Comput. 16(5): 3812-3826 (2023) - 2022
- [c12]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Pang-Chieh Wang:
Examining the Utility of Differentially Private Synthetic Data Generated using Variational Autoencoder with TensorFlow Privacy. PRDC 2022: 236-241 - 2021
- [c11]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang:
A VAE Conversion Method for Private Data Linkage. PRDC 2021: 161-164
2010 – 2019
- 2019
- [c10]Szu-Chuang Li, Bo-Chen Tai, Yennun Huang:
Evaluating Variational Autoencoder as a Private Data Release Mechanism for Tabular Data. PRDC 2019: 198-206 - 2018
- [c9]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Neeraj Suri, Pang-Chieh Wang:
Exploring the Relationship Between Dimensionality Reduction and Private Data Release. PRDC 2018: 25-33 - 2017
- [c8]Bo-Chen Tai, Szu-Chuang Li, Yennun Huang:
K-Aggregation: Improving Accuracy for Differential Privacy Synthetic Dataset by Utilizing K-Anonymity Algorithm. AINA 2017: 772-779 - [c7]Kang-Cheng Chen, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yao-Tung Tsou, Yennun Huang, Chia-Ming Lin:
Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release. AINA 2017: 1130-1137 - [c6]Denis N. Butusov, Timur I. Karimov, Dmitry I. Kaplun, Artur I. Karimov, Yennun Huang, Szu-Chuang Li:
The choice between delta and shift operators for low-precision data representation. FRUCT 2017: 46-52 - [c5]Hung-Li Chen, Jia-Yang Chen, Yao-Tung Tsou, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Chia-Ming Lin:
Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy. PRDC 2017: 339-347 - [c4]Szu-Chuang Li, Yennun Huang, Bo-Chen Tai, Chi-Ta Lin:
Using Data Mining Methods to Detect Simulated Intrusions on a Modbus Network. SC² 2017: 143-148 - 2016
- [c3]Chieh-Ming Chang, Szu-Chuang Li, Yennun Huang:
Crowdsensing route reconstruction using portable bluetooth beacon-based two-way network. UbiComp Adjunct 2016: 265-268 - [c2]Yennun Huang, Szu-Chuang Li:
Overview of research center for information technology innovation in Taiwan Academia Sinica. IWBIS 2016: 1-12 - [c1]Chieh-Ming Chang, Szu-Chuang Li, Yennun Huang:
Crowdsensing traces visualization in bluetooth beacon-based sensor network using wearable device. SIGGRAPH Asia Posters 2016: 5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint