Wen-Chin Chen, Yin-Tzu Huang, and Sheng-De Wang, “Provable Secure Group Key Establishment Scheme for Fog Computing,” IEEE Access, vol. 9, 158682-158694, Nov. 2021
Yi-Hsin Wu, Jui-Yu Huang, Yi-Chun, Yin-Jing Tien, Cheng-Juei Yu, Sheng-De Wang, “ Detecting and Scoring Equipment Faults in Real-time during Semiconductor Test Processes,” IEEE Design and Test, Vol. 38, No. 4, 120-126, Jul. 2021
Jones Sai-Wang Wan, Sheng-De Wang, “ Concept Drift Detection Based on Pre-Clustering and Statistical Testing,” Journal of Internet Technology, Vol. 22, 465-472, 2021
Chi-Wei Lu, Shen-De Wang, and Shao-Yi Chien , “ A Novel Gaming Video Encoding Process Using In-Game Motion Vectors,” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, Vol. 30, No. 7, 2207-2214, Jul. 2020
Yi-Hsin Wu, Yu-Hsin Chang, Yin-Jing Tien, Cheng-Juei Yu, Sheng-De Wang, Cheng-Hung Wu, “ Using Partial Combination Models to Improve Prediction Quality and Transparency in Mixed Datasets,” IEEE Access, Vol. 8, 132106-132120, 2020
Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang, “An Approach to the Design of Specific Hardware Circuits from C Programs,” Journal of Information Science and Engineering, vol. 34,, 337-351, 2018
林顥宗,王勝德,, “"網路入侵偵測的證據萃取與保留的兩階段分析方法,” 前瞻科技與管理, 5卷1期, 107-128, May 2015
江格, 黃昌平, 高培晟, 王勝德, “普遍存在之行動裝置應用程式漏洞,” Communications of CCISA (資訊安全通訊期刊), Vol 24, No. 4, pp. 1-8, Sept. 2014
Chien-Chi Chen and Sheng-De Wang, “An efficient multi-character transition string-matching engine based on the Ahocorasick algorithm,” ACM Transactions on Architecture and Code Optimization (TACO), Volume 10 Issue 4, pp. 25:1--25:22, Dec. 2013
Chien-Chi Chen and Sheng-De Wan, “A Multi-Character Transition String Matching Architecture Based On Aho-Corasick Algorithm,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 12, December 2012, pp. 8367-8386, Dec. 2012
Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu and Sheng-De Wang, “Efficient uplink scheduling policy for variable bit rate traffic in IEEE 802.16 BWA systems,” International Journal of Communication Systems, Volume 25, Issue 6, pages 734–748, Jun. 2012
C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “The enhancement of security in healthcare information systems,” Journal of Medical Systems, 36(3), 1673-88, Jun. 2012
C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “Mobile agent application and integration in electronic anamnesis system,” Journal of Medical Systems, 36(3), 1009–1020, Jun. 2012
C. H. Liu, Y. F. Chung, T. S. Chen, and S. D. Wang, “An ID-based access control in a hierarchical key management for mobile agent,” International Journal of Innovative Computing, Information and Control, Vol.7, No.3, pp. 1443-1456, Mar. 2011
C. H. Liu, Y. F. Chung, T. S. Chen and S. D. Wang, “The Design of ID-Based Access Control System with Time-Sensitive key for Mobile Agent’s Migration,” International Journal of Innovative Computing, Information and Control, Vol.7, No.12,, pp. 7077-7090, 2011
Yi-Chih Liu and Sheng-De Wang, “A virtual teleconferencing system based on face detection and 3D animation in a low-bandwidth environment,” International Journal of Imaging Systems and Technology, Volume 20, Issue 4, pages 323–332, Dec. 2010
Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang, “An in-place search algorithm for the resource constrained scheduling problem during high-level synthesis,” ACM Transactions on Design Automation of Electronic Systems, Vol. 15, No. 4, pp. 1-13, Sept. 2010
Chang-Ching Yang, Chen-Mou Cheng, and Sheng-De Wang, “Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems,” Journal of Information Science and Engineering, Vol. 26 No. 5, pp. 1563-1582, Sept. 2010
Shang-Feng Chiang, Kuo Chiang, and Ruo-Jian Yu, and Sheng-De Wang, “Scalable Index and Data Management for Unstructured Peer-to-Peer Networks,” Handbook of Research on Scalable Computing Technologies, IGI Global, Hershey, Pennsylvania, pp. 123-139, 2010
Kuo-Ping Wu and Sheng-De Wang,, “ "Choosing the kernel parameters for support vector machines by the inter-cluster distance in the feature space,",” Pattern Recognition, Vol. 42 , No. 5,, pp. 710-717, May 2009
Y.-H. Wu, C.-J. Yu, and S.-D. Wang, “Heuristic algorithm for the resource-constrained scheduling problem during high-level synthesis,” IET Computers & Digital Techniques, Volume 3, Issue 1, 43-51, Jan. 2009
Chun-Hung Wu, Kuo Chiang, Ruo-Jian Yu, Sheng-De Wang, “Locality and Resource Aware Peer-to-Peer Overlay Networks,” Journal of the Chinese Institute of Engineers, Vol. 31, No. 7, 1207-1217, Dec. 2008
Yuan-Jin Wen and Sheng-De Wang, “Minimizing Migration on Grid Environments: an Experience on Sun Grid Engine,” Journal of Information Technology and Applications, Vol. 1 No. 4, pp. 297-304., Mar. 2007
Kuang-Han Fei, Sheng-Yan Chuang and Sheng-De Wang, “A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks,” Emerging Directions in Embedded and Ubiquitous Computing, LNCS Volume 4097, pp. 540-549, Aug. 2006
J. Fu Lin and Sheng De Wang, “Fuzzy support vector machines with automatic membership setting,” Support Vector Machines: Theory and Applications Ed. by Lipo Wang, Studies in Fuzziness and Soft Computing, Springer, ISBN: 3540243, pp. 233-254, Aug. 2005
Tai-Ning Yang and Sheng-De Wang,, “Competitive algorithms for the clustering of noisy data,” Fuzzy Sets and Systems, Volume: 141, Issue: 2, pp. 281-299, 2004
Chun-Fu Lin and Sheng-De Wang, “Training algorithms for fuzzy support vector machines with noisy data,” Pattern Recognition Letters, Volume: 25, Issue: 14, pp. 1647-1656, 2004
Chuan-Kai Lin and Sheng-De Wang, “An adaptive H infinity controller design for bank-to-turn missiles using ridge Gaussian neural networks,” IEEE Transactions on Neural Networks, Volume 15, Issue 6, Page(s):1507 - 1, 2004
H. -C. Huang, J. -Y. Chen, S. -D. Wang, and C. -M. Chen, “Adaptive ultrasonic speckle reduction based on the slope-facet model,” Ultrasound in Medicine and Biology, Volume: 29, Issue: 8, pp. 1161-1175, Aug. 2003
C. -F. Lin and S. -D. Wang, “Fuzzy Support Vector Machines,” IEEE Transactions on Neural Networks, Vol. 13, No. 2, pp. 464-471, Mar. 2002
W. -C. Ku and S. -D. Wang, “An Anonymous Endorsement System,” Journal of Information Science and Engineering, Vol.18, No.1, pp.107-114, 2002
Huan-Chao Huang, Chung-Ming Chen, Sheng-De Wang, and Henry Horng-Shing Lu,, “Adaptive symmetric mean filter: a new noise-reduction approach based on the slope facet model,” Applied Optics, vol. 10, pp. 5192-5205, 2001
T. -N. Yang and S. -D. Wang, “A rotation invariant printed Chinese character recognition system,” Pattern Recognition Letters, vol. 22, pp. 85-95, 2001
C. -J. Lee and S. -D. Wang, “Fingerprint feature reduction by Gabor basis function,” Pattern Recognition, vol. 34, no. 11, pp. 2245-2248, 2001
W. -C. Ku and S. -D. Wang, “Cryptanalysis of modified authenticated key agreement protocol,” Electronics Letters, vol. 36, no. 21, pp. 1770-1771, Oct. 2000
T. -N. Yang and S. -D. Wang, “Fuzzy Auto-Associative Neural Networks for Principal Component Extraction of Noisy Data,” IEEE Transactions on Neural Networks, vol. 11, no. 3, pp. 808-810, May 2000
M. -J. Tsai and S. -D. Wang, “Adaptive and Deadlock-Free Routing for Irregular Faulty Patterns in Mesh Multicomputers,” IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 1, pp. 50-63, Jan. 2000
P. -H. Sui and S. -D. Wang, “A fault-tolerant wormhole routing algorithm for mesh networks,” IEE proceedings-Computers and Digital Techniques, vol. 147, no. 1, Jan. 2000
S. -D. Wang and C. -K. Lin, “Adaptive tuning of the fuzzy controller for robots,” Fuzzy Sets and Systems, vol. 110, pp. 351-363, 2000
P. -H. Sui and S. -D. Wang, “A fault-tolerant routing algorithm for wromhole routed meshes,” Parallel Computing, vol. 26, pp. 455-465, 2000
C. -K. Lin, S. -D. Wang, “Fuzzy system identification using an adaptive learning rule with terminal attractors,” Fuzzy Sets And Systems, vol. 101, no. 3, pp. 343-352, Feb. 1999
W. -C. Ku and S. -D. Wang, “A secure and practical electronic voting scheme,” Computer Communications, vol. 22, no. 3, pp. 279-286, Feb. 1999
C. -J. Lee and S. -D. Wang, “Fingerprint feature extraction using Gabor filters,” IEE Electronics Leeters, vol. 35, no. 4, pp. 288-290, Feb. 1999
T. -N. Yang and S. -D. Wang, “Robust algorithms for principle component analysis,” Pattern Recognition Letters, vol. 20, pp. 927-933, 1999
S. -D. Wang and C. -H. Lee, “Fuzzy system modeling using linear distance rules,” Fuzzy Sets and Systems, vol. 108, pp. 179-191, 1999
P. -H. Sui and S. -D. Wang, “Fault-tolerant wormhole routing in two-dimensional mesh networks with convex faults,” Information Sciences, An International Journal, vol. 121, pp. 217-231, 1999
Conference & proceeding papers:
Yen-Cheng Liu, Yu-Ying Yeh, Tzu-Chien Fu, Sheng-De Wang, Wei-Chen Chiu and Yu-Chang Frank Wang, “Detach and Adapt: Learning Cross-Domain Disentangled Deep Representation,” IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, Jun. 2018
Kuan-Ting Chen and Sheng-De Wang, “Distributed Continuous Control with Meta Learning On Robotic Arms,” 2018 IEEE International Conference on Systems, Man, and Cybernetics, Miyazaki, Japan, October, 2018., 2018
Jones Sai-Wang Wan and Sheng-De Wang, “Concept Drift Detection Based on Pre-Clustering and Statistical Testing,” TANET 2017, 台灣網際網路研討會, Hua-Lien, Taiwan, Dec. 2017
Sheng-De Wang and Kuan-Jung Chiang, “BLE Tree Networks for Sensor Devices in Internet of Things,” IEEE DataCom 2017, The 3rd IEEE International Conference on Big Data Intelligence and Computing, Orlando, Florida, USA, Nov. 2017
Jhen-Hao Li and Sheng-De Wang, “PhishBox: An Approach for Phishing Validation and Detection,” IEEE DASC2017, The 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2017), Orlando, Florida, USA, Nov. 2017
Yen-Cheng Liu, Wei-Chen Chiu, Sheng-De Wang, Yu-Chiang Frank Wang, “Domain-Adaptive generative adversarial networks for sketch-to-photo inversion,” MLSP 2017 : IEEE International Workshop on Machine Learning for Signal Processing, Tokyo, Sept. 2017
Che-Hsun Liu, Zhi-Jie Zhang and Sheng-De Wang, “An Android Malware Detection Approach Using Bayesian Inference,” The 6th IEEE International Symposium On Cloud And Service Computing, Fiji, Dec. 2016
Yu-Chen Chang, Sheng-De Wang, “The Concept of Attack Scenarios and its Applications in Android Malware Detection,” The 2nd IEEE International Conference on Data Science and Systems(DSS 2016), Sydney Australia, Dec. 2016
Tahsin Turker Mutlugun and Sheng-De Wang, “OpenCL Computing on FPGA Using Multiported Shared Memory,” The International Conference on Field-programmable Logic and Applications, London, UK, Sept. 2015
Hsin-Yu Chuang and Sheng-De Wang, “Machine learning based hybrid behavior models for Android malware analysis,” The 2015 IEEE International Conference on Software Quality, Reliability and Security, Vancouver, Canada, Aug. 2015
Hsiang-Yu Tseng, Ssu-Ting Liu, and Sheng-De Wang, “An FPGA Memory Hierarchy for High-level Synthesized OpenCL Kernels,” IEEE International Symposium on High Performance and Smart Computing (IEEE HPSC 2015), New York, USA, Aug. 2015
林顥宗、王勝德, “網路入侵偵測的證據萃取與保留的兩階段分析方法(A Two-Phase Analysis Approach to Extracting and Preserving Relevant Evidences from NIDS Alerts),” 中華安全科技與管理學會『雲端科技與安全管理』研討會, 2014., 2014
Ssu-Ting Liu and Sheng-De Wang, “PFBF: Pre-Filtered Bloom Filter,” Proceedings of International Computer Symposium, Tung-Hai University, Taichung, Taiwan, 2014., 2014
Chia-Hao Hsu and Sheng-De Wang, “An Embedded NIDS with Multi-Core Aware Packet Capture,” IEEE 16th International Conference on Computational Science and Engineering (with ICESS 2013), Sydney, Australia, Dec. 2013
Chih-Chun Chiu, Hui-Hao Chou, and Sheng-De Wang, “An Embedded Hardware/Software Platform for Network Firewall and IP Protocol Processing,” Conference on Innovative Electronics Design and Applications, Sun-Moon Lake, Nan-Tou, Taiwan., Dec. 2012
Cheng-Han You and Sheng-De Wang, “A Data Parallel Approach to XML Parsing and Query,” The 2011 International Symposium on Advances of High Performance Computing and Networking (AHPCN-2011), HPCC 2011, Banff, Canada, Sept. 2011
Sheng-De Wang, Chih-Hung Weng,, “Algorithms and Hardware Architectures for Variable Block Size Motion Estimation,” International Conference on Ubiquitous Intelligence and Computing (UIC 2011), Banff, Canada, Sept. 2011
Chia-Hao Hsu and Sheng-De Wang, “Embedded Network Intrusion Detection Systems with a Multi-Core Aware Packet Capture Module,” Workshop of Embedded Multi-core Systems, Interational Conference of Parallel Processing, Taipei, Taiwan, Sept. 2011
曾翔煜, 劉思廷, 王勝德,, “基於簡單電力與磁力分析方法(SPA/EMA)之FPGA安全檢測平台,” CISC2011 第二十一屆資訊安全會議 (Cryptology and Information Security Conference), NFU, Yunlin, Taiwan, May 2011
C. H. Liu, T. Y. Fang, Y. F. Chung, T. S. Chen, S. D. Wang, “A time-restricted key management for mobile agent in distributed networks,” Symposium on Cloud and Service Computing, Taipei, Taiwan, Jan. 2011
Nicolas Moro,Ssu-Ting Liu, Sheng-De Wang, “A novel use of Trusted Platform Modules for simple hierarchical access control in content delivery networks,” 011 Information Technologies Applications and Management Conference, ITAMC2011, Kaohsiung, Taiwan., 2011
Sheng-De Wang, Chun-Wei Chen,Michael Pan, andn Chih-Hao Hsu, “Hardware Accelerated XML Parsers with Well Form Checkers and Abstract Classification Tables,” International Computer Symposium, pp. 467-473, Tainan, Taiwan, Dec. 2010
Chia-Hui Liu, Yu-Fang Chung, Jin-De Jhuo, Tzer-Shyong Chen, Sheng-De Wang, “An ID-based access control with time-bound key management for mobile agent,” The 2010 IAENG International Conference on Computer Science, Hong Kong, Mar. 2010
Shih-Wei Chang, Michael Pan and Sheng-De Wang,, ““A Robust P2P Media Streaming Scheme in Dynamic Environments,",” The 6th Workshop on Grid Technologies and Applications, Taitung, Dec. 2009
Yeong-Sheng Chen, Chih-Chieh Lin, and Sheng-De Wang,, “"A Traffic-Aware Routing Algorithm for IEEE 802.16j Multihop Relay Networks,",” 2009 Fourth International Conference on Communications and Networking in China, Aug. 2009
Yeong-Sheng Chen, Der-Jiunn Deng, Yu-Ming Hsu, and Sheng-De Wang,, “ "An Enhanced Uplink Scheduling Algorithm for Video Traffic Transmission in IEEE 802.16 BWA Systems,",” The 5th International Wireless Communications and Mobile Computing Conference,, Jun. 2009
Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, and Sheng-De Wang,, ““Access Control and Key Management Scheme based on Bilinear Pairing over Elliptic Curves for Mobile Agent,”,” 2009 Third International Conference on Multimedia and Ubiquitous Engineering,, pp. 189-196, Jun. 2009
Cheng-Juei Yu, Yi-Hsin Wu, and Sheng-De Wang,, “Coevolution of Go Players on Distributed Computing Environments,” The 5th Workshop on Grid Technologies and Applications, Tainan, December, 2008, Dec. 2008
Yuan-Chin Wen, Chia-Hung Chen, and Sheng-De Wang,, “Crossing Heterogeneous Grid Systems with a Single Sign-on Scheme based on a P2P Layer,” 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008), Yilan, Taiwan, Dec. 2008
Ching-Hwa Yu, Michael Pan, and Sheng-De Wang,, “Adaptive Neighbor Caching for Fast BSS Transition using IEEE 802.11k Neighbor Report,” The 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA-08), Sydney, Australia, Dec. 2008
Fen-Cheng Yang, Michael Pan, and Sheng-De Wang,, “An Enhanced Medium Access Control Protocol for Multi-Channel Multi-Interface Wireless Mesh Networks,,” 2008 International Computer Symposium, Tamkang University, Taiwan, Nov. 2008
Chia Hsiang Hsu, Cheng-Juei Yu and Sheng-De Wang, “Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning,” The 13th IEEE Pacific Rim International Symposium on Dependable Computing, Melbourne, Australia, Dec. 2007
Yung-Tai Hsu, Yuan-Jin Wen and Sheng-De Wang, “Embedded Hardware/Software Design and Cosimulation using User Mode Linux and SystemC,” International Conference Parallel Processing, EPDC workshops, pp. 17-22, Xi-an, China, Sept. 2007
Shang-Feng Chiang, Chun-Hung Wu, and Sheng-De Wang, “An Active Index Diffusion Scheme for Multilayer Unstructured Peer-to-Peer Networks,” International Conference on Communications, Circuits and Systems, Fukuoka, Japan, Jul. 2007
Hau-Han Wang and Sheng-De Wang, “The Modified Grid Location Service for Mobile Ad-Hoc Networks,” Grid and Pervasive Computing 2007, LNCS 4459, pp. 334–347,, Paris, France, May 2007
Yuan-Jin Wen and Sheng-De Wang, “Minimizing Migration on Grid Environments: an Experience on Sun Grid Engine,” The Third Workshop on Grid Technologies and Applications, pp. 27-33, Hsinchu. Taiwan, Dec. 2006
Zheng-Yi Huang and Sheng-De Wang, “A dependable outbound bandwidth based approach for peer to peer media streaming,” IEEE 12th Pacific Rim International Symposium on Dependable Computing, pp. 221-229, Riverside, California, USA, Dec. 2006
Kuo-Ping Wu and Sheng-De Wang, “Choosing the Parameters of 2-norm Soft Margin Support Vector Machines According to the Cluster Validity,” 2006 IEEE International Conference on Systems, Man, and Cybernetics, Taipei, Taiwan, Oct. 2006
Jian-Feng Huang, Sheng-Yan Chuang, and Sheng-De Wang, “Transmission Range Designation Broadcasting Methods for Wireless Ad Hoc Networks,” The 3rd International Conference on Ubiquitous Intelligence and Computing, 312-321, Wuhan, China, Sept. 2006
Kuo-Ping Wu and Sheng-De Wang, “Choosing the Kernel parameters of Support Vector Machines According to the Inter-cluster Distance,” IEEE World Congress on Computational Intelligence, International Joint Conference on Neural Networks, Vancouva, Canada, Jul. 2006
Zheng-Yi Huang and Sheng-De Wang, “JOS: A Java-based parallel environment for distributed computing systemss,” Proceedings of the Second Workshop on Grid Technologies and Applications, Hualien, Taiwan,, Dec. 2005
Michael Pan, Sheng-Yan Chuang, Sheng-De Wang, “Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks,” 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), 317-324, ChangSha, Hunan, China, Dec. 2005
K. -P Wu and S. -D. Wang, “A weighting initialization strategy for weighted support vector machines,” The third international conference on Advances in Pattern Recognition, UK, Oct. 2005
Y -C. Huang, S. –Y. Chuang and S. –D. Wang, “A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc Networks,” International Conferences on Parallel and Distributed Systems, Workshop on Parallel and Distributed Embedded Systems (PDES'2005), Japan, Jul. 2005
I. -T. Hsu, Z. -Y. Huang, and S. -D. Wang, “Dynamic Scheduling Methods for Computational Grid Environments,” International Conferences on Parallel and Distributed Systems, Japan, Jul. 2005
I-Tar Hsu, Zheng-Yi Huang and Sheng-De Wang, “A Dynamic Scheduling Method for Computational Grid Environment,” Proceedings of the First Workshop on Grid Technologies and Applications (WoGTA' 04, HsinChu, Taiwan, Dec. 2004
Sheng-De Wang, Hsuen-Ling Ko and Yung-Yu Zhuang,, “Japster: An Improved Peer-to-Peer Network Architecture,” Embedded and Ubiquitous Computing: EUC 2004, Lecture Notes In Computer Scienc, Japan, Jul. 2004
Hsiao, R. and Sheng-De Wang, “Jelly: a dynamic hierarchical P2P overlay network with load balance and locality,” Proceedings. 24th International Conference on Distributed Computing Systems Workshops, Page(s):534 - 54, Hachioji, Tokyo, Japan, Mar. 2004
Chun-Fu Lin and Sheng-De Wang, “Training algorithms for fuzzy support vector machines with noisy data,” 2003 IEEE 13th Workshop on Neural Networks for Signal Processing, Page(s):517 - 52, Sept. 2003
S. -D. Wang and; P.M.H. Dai, “Multipath banyan-based multistage networks for ATM switches,” Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT'2003. Proceedings of the Fourth International Con, Page(s): 319 -32, Aug. 2003
K. -S. Hsueh and S. -D. Wang, “A Packet-Based Caching Proxy with Loss Recovery for Video Streaming,” 2002 Pacific Rim International Symposium on Dependable Computing, Tsukuba International Congress Center, Japan, Dec. 2002
C. -J. Lee, S. -D. Wang, and M. -H. Kao, “Direct Core Point Detection in Raw Fingerprint Images,” The 2002 International Conference on Artificial Intelligence (IC-AI'02), Las Vegas, USA, Jun. 2002
T. -N. Yang and S. -D. Wang, “Fuzzy Robust Clustering and C Spherical Shells Algorithm,” National Computer Symposium, Taipei, Dec. 2001
S. -D. Wang and P. -H. Sui, “Fault-Tolerant Routing in Two-Dimensional Mesh Networks with Less-Restricted Fault Patterns,” Pacific Rim Conference on Dependable Computing, Dec. 2001
S. -D. Wang and Y. Lin, “Jato: a compact binary file format for Java class,” Poceedings of Eighth International Conference on Parallel and Distributed Systems (ICPADS 2001), pp. 467 -474, 2001
C. -J. Lee, S. -D. Wang, and K. -B. Wu, “Fingerprint recognition using principal Gabor basis function,” Proceedings Proceedings of 2001 International Symposium on Intelligent Multimedia, Video & Speech Processing (ISIMP2001), pp. 393-396, 2001
C. -J. Lee and S. -D. Wang, “Gabor basis functions for fingerprint image representation and recognition,” The Second International Conference on Parallel and Distributed Computing, Applications, and Techniques (PDCAT2001), pp. 56-63, 2001
C. -J. Lee, S. -D. Wang, and K. -B. Wu, “Fingerprint recognition using the responses of principal Gabor basis functions,” Third International Conference on Information, Communications, and Signal Processing (ICICS2001), 2001
C. -J. Lee and S. -D. Wang, “Fingerprint verification based on local Gabor filters,” The Sixth Conference on Artificial Intelligence and Applications (TAAI2001), 2001
C. -F. Lin and S. -D. Wang, “Fuzzy Least Squares Support Vector Machines,” 9th National Symposium on Fuzzy Theory and Application, Chung-Li, 2001
S. -D. Wang and P. -H. Sui, “Routing in Two-Dimensional Mesh Networks with Arbitrarily Shaped Faults,” Proceedings of The Sixth Workshop on Compiler Techniques for High-Performance Computing, pp. 187-196, National Sun Yat-sen University, Kaohsiung, Taiwan, 2000
T. -N. Yang and S. -D. Wang, “Principal component analysis based on fuzzy objective functions,” Proceedings of 1999 National Computer Symposium, pp. B350-B353, Dec. 1999
W. -C. Ku and S. -D. Wang, “Enhanced mechanisms for protecting the subscriber anonumity in GSM,” Proceedings of the 1999 International Symposium on Communicatioins, pp. 200-204, Nov. 1999
S. -D. Wang and C. -J. Lee, “Fingerprint recognition using directional micropatterm histograms and LVQ Networks,” 1999 International Conference on Information Intelligence and Systems, pp. 300-303, Oct. 1999
C. -J. Lee and S. -D. Wang, “A Gabor Filter-Based Approach to Fingerprint Recognition,” 1999 IEEE Workshop on Signal Processing Systems Design and Implementation, pp. 371-378, Taipei, Taiwan, Oct. 1999
Murphy C. -C. Chen and S. -D. Wang, “EKernel: An Object-Oriented -kernel,” 1999 Workshop in Distributed System Technologies and Applications, pp. 401-408, Tainan, May 1999
P. -H. Sui and S. -D. Wang, “Fault-Tolerant Routing in Two-Dimensional Mesh Networks,” The Fifth Workshop on Compiler Techniques for High-Performance Computing, pp. 47-54, Chiayi, Taiwan, Mar. 1999
Patents:
Chieh-Chi Chen and Sheng-De Wang, “Content Addressable Memory,” US7952902B2, May 2011
Sheng-Hsun Cho and Sheng-De Wang, “Method and System for Packet Classification with Reduced Memory Space and Enhanced Access Speed,” US7953082B2, May 2011
Ching-Fu Kung and Sheng-De Wang, “Computer Network Packet Classification Method and System based on a Nonoverlapping Rule Group Encoding Scheme,” 美國, US7792120B2, Sept. 2010
Chang-Chih Hsieh and Sheng-De Wang, “Two-stage Computer Network packet Classification Method and System,” 美國, US7782868B2, Aug. 2010