
Research Fellow  Liau, ChurnJung 





Publications 

Journal Articles  
1. 
T.F. Fan, C.J. Liau, and D.R. Liu, "A uniform framework for rough approximations based on generalized quantifiers," Transactions on Rough Sets, volume XIX, pages 116, August 2015. 
2. 
T.F. Fan and C.J. Liau, "Logical characterizations of regular equivalence in weighted social networks," Artificial Intelligence, volume 214, pages 6688, September 2014. 
3. 
T.s. Hsu, C.J. Liau, and D.W. Wang, "A logical framework for privacypreserving social network publication," Journal of Applied Logic, volume 12, number 2, pages 151174, June 2014. 
4. 
T.F. Fan, C.J. Liau, and D.R. Liu, "Variable consistency and variable precision models for dominancebased fuzzy rough set analysis of possibilistic information systems," International Journal of General Systems, volume 42, number 6, pages 659–686, May 2013. 
5. 
H.J. Chu, C.Y. Lin, C.J. Liau, and Y.M. Kuo, "Identifying controlling factors of groundlevel ozone levels over southwestern Taiwan using a decision tree," Atmospheric Environment, volume 60, pages 142152, December 2012. 
6. 
S.M. Chen, M.W. Yang, S.W. Yang, T.W. Sheu, and C.J. Liau, "Multicriteria fuzzy decision making based on intervalvalued intuitionistic fuzzy sets," Expert Systems with Applications, volume 39, number 15, pages 1208512091, November 2012. 
7. 
H.J.Chu, C.J. Liau, C.H. Lin, and B.S. Su, "Integration of fuzzy cluster analysis and kernel density estimation for tracking typhoon trajectories in the Taiwan region," Expert Systems with Applications, volume 39, number 10, pages 94519457, August 2012. 
8. 
T.F. Fan, C.J. Liau, and D.R. Liu, "Dominancebased fuzzy rough set analysis of uncertain and possibilistic data tables," International Journal of Approximate Reasoning, volume 52, pages 12831297, December 2011. 
9. 
T.F. Fan, C.J. Liau, and D.R. Liu, "A relational perspective of attribute reduction in rough setbased data analysis," European Journal of Operational Research, volume 213, pages 270278, 2011. 
10. 
T.F. Fan, C.J. Liau, and D.R. Liu, "A logical formulation of rough set definability," International Journal of Uncertainty, Fuzziness and Knowledgebased Systems, volume 19, number 1, pages 2737, 2011. 
11. 
MengTsung Tsai, TsurngChen Chern, JenHsiang Chuang, ChihWen Hsueh, HsuSung Kuo, ChurnJung Liau, Steven Riley, BingJie Shen, ChihHao Shen, DaWei Wang and Tsansheng Hsu, "Efficient Simulation of the Spatial Transmission Dynamics of Influenza," PLoS ONE, volume DOI: 10.1371, pages journal.pone.0013292, November 2010. 
12. 
M.T. Tsai, T.C. Chern, J.H. Chuang, C.W. Hsueh, H.S. Kuo, C.J. Liau, S. Riley, B.J. Shen, C.H. Shen, D.W. Wang, T.s. Hsu, "Efficient simulation of the spatial transmission dynamics of influenza," PLoS ONE, volume 5, number 11, pages e13292, November 2010. 
13. 
J. Zhan, C.L. Hsieh, I.C. Wang, T.s. Hsu, C.J. Liau and D.W. Wang, "Privacypreserving collaborative recommender systems," IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, pages 472476, 2010. 
14. 
T.F. Fan, C.J. Liau, T.Y. Lin, and K. Lee, "A logical formulation of the granular data model," International Journal of Granular Computing, Rough Sets and Intelligent Systems, volume 1, number 3, pages 289307, November 2009. 
15. 
IC. Wang, C.H. Shen, T.s. Hsu, C.J. Liau, D.W. Wang, and J. Zhan, "Towards empirical aspects of secure scalar product," IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, volume 39, pages 440447, July 2009. 
16. 
D.R. Liu, M.J. Shih, C.J, Liau, and C.H. Lai, "Mining the change of event trends for decision support in environmental scanning," Expert Systems with Applications, volume 36, number 2, pages 972984, March 2009. 
17. 
Y. C. Chang, S. M. Chen, and C. J. Liau, "Multilabel text categorization based on a new linear classifier learning method and a categorysensitive refinement method," Expert Systems with Applications, volume 34, number 3, pages 19481953, April 2008. 
18. 
Y. C. Chang, S. M. Chen, and C. J. Liau, "Fuzzy interpolative reasoning for sparse fuzzy rulebased systems based on the areas of fuzzy sets," IEEE Transactions on Fuzzy Systems, volume 16, number 5, pages 12851301, 2008. 
19. 
T.F. Fan, C.J. Liau, and T.Y. Lin, "A theoretical investigation of regular equivalences for fuzzy graphs," International Journal of Approximate Reasoning, volume 49, pages 678688, 2008. 
20. 
D.W. Wang, C.J. Liau, and T.s. Hsu, "Granulation as a privacy protection mechanism," Transactions on Rough Sets, volume VII, pages 256273, 2007, LNCS 4400 
21. 
D.W. Wang, C.J. Liau, and T.s. Hsu, "An epistemic framework for privacy protection in database linking," Data and Knowledge Engineering, volume 61, pages 176205, 2007. 
22. 
D.W. Wang, C.J. Liau, T.s. Hsu, and J.K.P. Chen, "Value and damage of information: A data security perspective," International Journal of Approximate Reasoning, volume 43, pages 179201, 2006. 
23. 
C.J. Liau, "A modal logic framework for multiagent belief fusion," ACM Transactions on Computational Logic, volume 6, number 1, pages 124174, 2005. 
24. 
C.J. Liau, "Matrix representation of belief states: An algebraic semantics for belief logics," International Journal of Uncertainty, Fuzziness and Knowledgebased Systems, volume 12, number 5, pages 613633, 2004. 
25. 
C.J. Liau, "Belief fusion and revision: An overview based on epistemic logic semantics," Journal of Applied NonClassical Logics, volume 14, number 3, pages 247274, 2004, (Special Issue on Uncertainty, Incompleteness, Imprecision and Conflict in Multiple Data Sources) 
26. 
D.W. Wang, C.J. Liau, and T.s. Hsu, "Medical privacy protection based on granular computing," Artificial Intelligence in Medicine, volume 32, number 2, pages 137149, 2004. 
27. 
C.J. Liau, "Belief, information acquisition, and trust in multi agent systems — A modal logic formulation," Artificial Intelligence, volume 149, number 1, pages 3160, 2003. 
28. 
Y.C. Chiang, T.s. Hsu, S. Kuo, C.J. Liau, and D.W. Wang, "Preserving confidentiality when sharing medical database with the Cellsecu system," International Journal of Medical Informatics, volume 71, pages 1723, 2003. 
29. 
T.F. Fan, C.J. Liau, and Y. Yao, "On modal and fuzzy decision logics based on rough set theory," Fundamenta Informaticae, volume 52, number 4, pages 323344, 2002. 
30. 
C. J. Liau and D.R. Liu, "A Possibilistic decision logic with applications," Fundamenta Informaticae, volume 46, number 3, pages 199217, 2001. 
31. 
C. J. Liau, "A logical analysis of the relationship between commitment and obligation," Journal of Logic, Language, and Information, volume 10, number 2, pages 237261, 2001. 
32. 
C. J. Liau, "An overview of rough set semantics for modal and quantifier logics," International Journal of Uncertainty, Fuzziness and Knowledgebased Systems, volume 8, number 1, pages 93118, 2000. 
33. 
C. J. Liau, "On the possibility theorybased semantics for logics of preference," International Journal of Approximate Reasoning, volume 20, number 2, pages 173190, 1999. 
34. 
C. J. Liau, "Possibilistic residuated implication logics with applications," International Journal of Uncertainty, Fuzziness and Knowledgebased Systems, volume 6, number 4, pages 365385, 1998. 
35. 
C. J. Liau, "Representing defaults in the framework of possibility theory," International Journal of General Systems, volume 25, number 4, pages 373387, 1997. 
36. 
T. F. Fan, I. P. Lin and C. J. Liau, "Nonmonotonic reasoning based on incomplete logic," Journal of Applied NonClassical Logics, volume 7, number 4, pages 375395, 1997. 
37. 
C. J. Liau, "An algebraic formalization of the relationship between evidential structures and data tables," Fundamenta Informaticae, volume 27, number 1, pages 5776, 1996. 
38. 
C. J. Liau and I. P. Lin, "Possibilistic reasoningA minisurvey and uniform semantics," Artificial Intelligence, volume 88, number 12, pages 163193, 1996. 
39. 
C. J. Liau and I. P. Lin, "A theoretical investigation into quantitative modal logic," Fuzzy Sets and Systems, volume 75, pages 355363, 1995. 
40. 
C. J. Liau and I. P. Lin, "Proof methods for reasoning about possibility and necessity," International Journal of Approximate Reasoning, volume 9, number 4, pages 327364, 1993. 
41. 
C. J. Liau and I. P. Lin, "Abstract minimality and circumscription," Artificial Intelligence, volume 54, pages 381396, 1992. 
42. 
C. J. Liau and I. P. Lin, "Fuzzy term rewriting system," Fuzzy Sets and Systems, volume 44, pages 115, 1991. 
43. 
C. J. Liau and I. P. Lin, "Fuzzy logic with equality," International Journal of Pattern Recognition and Artificial Intelligence, volume 2, number 2, pages 351365, 1988. 


Conference Papers  
1. 
T.F. Fan and C.J. Liau, "A logic for reasoning about justified uncertain beliefs," Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI15), pages 29482954, July 2015. 
2. 
Yiting Chiang, Tsansheng Hsu, ChurnJung Liau, YunChing Liu, Chihhao Shen, DaWei Wang and Justin Zhan, "An InformationTheoretic Approach for Secure Protocol Composition," 10th International Conference on Security and Privacy in Communication Networks (SecureComm), European Alliance for Innovation, September 2014. 
3. 
T.s. Hsu, C.J. Liau and D.W. Wang, "Privacypreserving social network publication based on positional indiscernibility," Proceedings of the 7th International Conference on Scalable Uncertainty Management (SUM), Lecture Notes in Artificial Intelligence, 8078, V.S. Subrahmanian and W. Liu and J. Wijsen, editors, SpringerVerlag, pages 311324, Washington DC Area, USA, September 2013. 
4. 
Y.C. Liu, Y.T. Chiang, T.s. Hsu, C.J. Liau, and D.W. Wang, "Floating point arithmetic protocols for constructing secure data analysis application," Proceeedings of the 17th International Conference on KnowledgeBased and Intelligent Information & Engineering Systems (KES), volume 22, Procedia Computer Science, J. Watada, L.C. Jain, R.J. Howlett, N. Mukai and and K. Asakura, editors, Elsevier, pages 152161, September 2013. 
5. 
K. Chen, T.s Hsu, C.J. Liau and D.W. Wang, "A scripting language for automating secure multiparty computation," Proceedings of the 8th Asia Joint Conference on Information Security (AsiaJCIS), IEEE Computer Society Press, pages 127134, Seoul, Korea, July 2013. 
6. 
T.F. Fan and C.J. Liau, "Manyvalued modal logic and regular equivalences in weighted social networks," Proceedings of the 12th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU), Lecture Notes in Artificial Intelligence, 7958, L. van der Gaag, editor, SpringerVerlag, pages 194205, July 2013. 
7. 
YunChing Liu, Yiting Chiang, Tsansheng Hsu, ChurnJung Liau, and DaWei Wang, "Floating Point Arithmetic Protocols for Constructing Secure Data Analysis Application," The 17th International Conference on KnowledgeBased and Intelligent Information & Engineering System (KES), volume 22, Elsevier, January 2013. 
8. 
T.F. Fan, C.J. Liau, and D.R. Liu, "Variable precision fuzzy rough set based on relative cardinality," Federated Conference on Computer Science and Information Systems (FedCSIS 2012), M. Ganzha, L.A. Maciaszek and and M.Paprzycki, editors, pages 4347, September 2012. 
9. 
T.s. Hsu, C.J. Liau and D.W. Wang, "A probabilistic hybrid logic for sanitized information systems," Proceedings of the 6th International Conference on Scalable Uncertainty Management (SUM), Lecture Notes in Computer Science, 7520, E. Hüllermeier, S. Link, T. Fober and and B. Seeger, editors, Springer, pages 500513, September 2012. 
10. 
T.s. Hsu, C.J. Liau and D.W. Wang, "Logic, probability, and privacy: A framework for specifying privacy requirements," Turing100. The Alan Turing Centenary, volume 10, EasyChair Proceedings in Computing (EPiC), A. Voronkov, editor, pages 157167, June 2012. 
11. 
K. Chen, T.s. Hsu, W.K. Huang, C.J. Liau and D.W. Wang, "Towards a scripting language for automating secure multiparty computation," 2012 AsiaPacific Programming Languages and Compilers Workshop (APPLC), June 2012. 
12. 
T.F.Fan, C.J. Liau and D.R. Liu, "Dominancebased rough set approach for possibilistic information systems," 13th Int. Conf. Rough Sets, Fuzzy Sets, Data Mining and Granular Computing (RSFDGrC2011), Lecture Notes in Artificial Intelligence, 6743, S. Kuznetsov, D. Slezak, D. Hepting and and B. Mirkin, editors, Springer, June 2011. 
13. 
T.F. Fan, C.J. Liau, and D.R. Liu, "Constraintbased attribute reduction in rough set analysis," The IEEE International Conference on Systems, Man, and Cybernetics, pages 39713976, October 2010. 
14. 
T.C. Chern, M.T. Tsai, H.J. Chang, J.H. Chuang, T.s. Hsu, H.S. Kuo, C.J. Liau and D.W. Wang, "Quantitative assessment of early intervention strategies: a case study of 2009 H1N1 pandemic in Taiwan," Options for the Control of Influenza VII Conference, September 2010. 
15. 
M.T. Tsai, D.W. Wang, C.J.Liau and T.s. Hsu,, "Heterogeneous subset sampling," The 16th Annual International Computing and Combinatorics Conference (COCOON), Lecture Notes in Computer Science, 5196, pages 500509, July 2010. 
16. 
I.C. Wang, K. Chen, J.H. Chuang, C.H. Lee, T.s. Hsu, C.J. Liau, P.Y. Wang and D.W. Wang, "On applying secure multiparty computation: A case report," Asia Pacific Association for Medical Informatics (APAMI 2009), November 2009. 
17. 
T.F. Fan, C.J. Liau, and D.R.Liu, "Dominancebased rough set analysis of uncertain data table," Proc. of the International Fuzzy Systems Association (IFSA) World Congress and the European Society for Fuzzy Logic and Technology (EUSFLAT) Conference, pages 294299, 2009. 
18. 
I.C. Wang, C.H. Shen, K. Chen, T.s. Hsu, C.J. Liau, and D.W. Wang, "An empirical study on privacy and secure multiparty computation using exponentiation," Proc. of the 12th IEEE International Conference on Computational Science and Engineering (CSE09), pages 182188, 2009. 
19. 
C.H.Shen, J. Zhan, Ts Hsu, C.J. Liau, and D.W. Wang, "Scalarproduct based secure twoparty computation," Proc. of the 4th IEEE International Conference on Granular Computing, pages 556561, August 2008. 
20. 
Ts. Hsu, C.J. Liau, D.W. Wang, "Logical definability in social position analysis," Proc. of the 4th IEEE International Conference on Granular Computing, pages 3538, August 2008. 
21. 
J. Zhan, I.C. Wang, C.L. Hsieh T.s. Hsu, C.J. Liau, and D.W. Wang, "Towards efficient privacypreserving collaborative recommender systems," Proc. of the 4th IEEE International Conference on Granular Computing, pages 778783, August 2008. 
22. 
T.F. Fan, C.J. Liau, and D.R. Liu, "Definability in logic and rough set theory," Proc. of the 18th European Conference on Artificial Intelligence, IOS Press, pages 749750, 2008. 
23. 
T.F. Fan, C.J. Liau, T.Y. Lin, and K. Lee, "A logical formulation of the granular data model," Proc. of the 8th IEEE International Conference on Data Mining (ICDM’08 Workshops), pages 628634, 2008. 
24. 
C.H. Shen, J. Zhan, D.W. Wang, T.s. Hsu, C.J. Liau, "Informationtheoretically secure numberproduct protocol," 2007 International Conference on Machine Learning and Cybernetics, volume 5, pages 30063011, August 2007. 
25. 
T.F. Fan, C.J. Liau, and T.Y. Lin, "Positional analysis in fuzzy social networks," Proc. 2007 IEEE International Conference on Granular Computing, pages 423428, 2007. 
26. 
T.F. Fan, C.J. Liau, D.R. LIu, and G.H. Tzeng, "Granulation based on hybrid information systems," Proceedings of the 2006 IEEE International Conference on Systems, Man, and Cybernetics, pages 47684772, Taipei, Taiwan, October 2006. 
27. 
D.W. Wang, C.J. Liau, and T.s. Hsu, "Attributeoriented granulation for privacy protection," Proc. 2006 IEEE International Conference on Granular Computing, pages 726731, 2006. 
28. 
D.W. Wang, C.J. Liau, Y.T. Chiang, and T.s. Hsu, "Information theoretical analysis of twoparty secret computation," Proc. 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Lecture Notes in Computer Science, 4127, pages 310317, 2006. 
29. 
D.W. Wang, C.J. Liau, and T.s. Hsu, "A GrCbased approach to social network data protection," Proc. 5th International Conference on Rough Sets and Current Trends in Computing, Lecture Notes in Artificial Intelligence, 4259, pages 438447, 2006. 
30. 
D.W. Wang, C.J. Liau, and T.s. Hsu, "Privacy protection in social network data disclosure based on granular computing," Proc. 2006 IEEE International Conference on Fuzzy Systems, pages 54855491, 2006. 
31. 
C.J. Liau and T.Y. Lin, "Reasoning about relational granulation in modal logics," First IEEE International Conference on Granular Computing, pages 534538, July 2005. 
32. 
C.J. Liau and T.F. Fan, "A modal logic for reasoning about possibilistic belief fusion," Proc. of the 19th International Joint Conference on Artificial Intelligence, pages 17561757, July 2005. 
33. 
Y.T. Chiang, D.W. Wang, C.J. Liau, and T.s. Hsu, "Secrecy of twoparty secure computation," Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Lecture Notes in Computer Science, 3654, pages 114123, 2005. 
34. 
C.J. Liau, "Ordered belief fusion in possibilistic logic," Proc. of the 10th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, Lecture Notes in Artificial Intelligence, 3641, pages 632641, 2005. 
35. 
T.F. Fan, D.R. Liu, and C.J. Liau, "Data mining and hypothesis selection," Proc. of the 34th International Conference on Computers and Industrial Engineering, November 2004. 
36. 
C.J. Liau, "Belief reasoning, revision, and fusion by matrix algebra," Proc. of the 4th International Conference on Rough Sets and Current Trends in Computing (RSCTC), Lecture Notes in Artificial Intelligence, 3066, pages 133142, 2004. 
37. 
D.W. Wang, C.J. Liau, T.s. Hsu, and J.K.P. Chen, "On the damage and compensation of privacy leakage," Proc. of the 18th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 311324, 2004. 
38. 
C.J. Liau, "An epistemic logic for arbitration (Poster abstract)," Proc. of the 18th International Joint Conference on Artificial Intelligence, pages 14021403, 2003. 
39. 
Y. Yao, C.J. Liau, and N. Zhong, "Granular computing based on rough sets, quotient space theory, and belief functions," Proc. of The 14th International Symposium on Methodologies for Intelligent Systems (ISMIS), Lecture Notes in Artificial Intelligence, 2871, pages 152159, 2003. 
40. 
C.J. Liau, "Epistemic logics for information fusion," Proc. of the 7th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU), Lecture Notes in Artificial Intelligence, 2711, pages 489501, 2003. 
41. 
T.F. Fan, C.J. Liau, and D.R. Liu, "Logical fuzzy decision trees," Proc. of the IEEE ICDM'03 Workshop on Foundations and New Directions in Data Mining, pages 4955, 2003. 
42. 
C.J. Liau, "A tableau system for information fusion logic," Proc. of the ECSQARU'03 Workshop on Uncertainty, Incompleteness, Imprecision and Conflict in Multiple Data Sources, pages 211, 2003. 
43. 
C.J. Liau, "An overview of hybrid possibilistic reasoning," Proc. of the 9th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing (RSFDGrC), Lecture Notes in Artificial Intelligence, 2639, pages 668675, 2003. 
44. 
T.F. Fan, C.J. Liau, and Y. Yao, "On modal decision logics," Proc. of the Workshop on the Foundation of Data Mining, pages 2126, 2002. 
45. 
Y.T. Chiang, Y.C. Chiang, T.s. Hsu, C.J. Liau, and D.W. Wang, "How much privacy?  A system to safe guard personal privacy while releasing database," Proceedings of the 3rd International Conference on Rough Sets and Current Trends in Computing, Lecture Notes in Artificial Intelligence, 2475, pages 226233, 2002. 
46. 
Y. Yao and C.J. Liau, "Generalized decision logic language for granular computing," the 11th IEEE International Conference on Fuzzy Systems, pages 773778, 2002, IEEE Press 
47. 
G. S. Huang, X. Jia, C.J. Liau, and J.H. You, "Twoliteral logic programs and satisfiability representation of stable models: A comparison," Proceedings of the Fifteenth Canadian Conference on Artificial Intelligence, Lecture Notes in Artificial Intelligence, 2338, pages 119131, 2002. 
48. 
T.s. Hsu, C.J. Liau, D.W. Wang, and J. K.P. Chen, "Quantifying privacy leakage through answering database queries," Proc. of the 5th International Conference on Information Security, Lecture Notes in Computer Science, 2433, pages 162175, 2002. 
49. 
T.S. Hsu, C.J. Liau, and D.W. Wang, "A logical model for privacy protection," Proc. of the 4th International Conference on Information Security, Lecture Notes in Computer Science, 2200, pages 110124, 2001. 
50. 
R. Demolombe and C.J. Liau, "A logic of graded trust and belief fusion," Proc. of the 4th Workshop on Deception, Fraud and Trust in Agent Societies, pages 1325, 2001. 
51. 
T.F. Fan, W.C. Hu, and C.J. Liau, "Decision logics for knowledge representation in data mining," Proc. of the 25th Annual International Computer Software and Applications Conference(Workshop on Data Mining and EOrganizations), pages 626631, 2001. 
52. 
C.J. Liau, "Hybrid logic for possibilistic reasoning," Proc. of the Joint 9th IFSA World Congress and 20th NAFIPS International Conference, pages 15231528, 2001. 
53. 
C.J. Liau and Y.Y. Yao, "Information retrieval by possibilistic reasoning," Proc. of the 12th International Conference on Database and Expert Systems Applications, Lecture Notes in Computer Science, 2113, pages 5261, 2001. 
54. 
C.J. Liau, "Logical systems for reasoning about multiagent belief, information acquisition, and trust," Proc. of the 14th European Conference on Artificial Intelligence, pages 368372, 2000. 
55. 
C.J. Liau, "A conservative approach to distributed belief fusion," Proc. of the Third International Conference on Information Fusion, 2000, MoD41 
56. 
C. J. Liau, "Manyvalued dynamic logics for qualitative decision theory," Proc. of the Seventh International Workshop on Rough Sets, Fuzzy Sets, Data Mining, and GranularSoft Computing, Lecture Notes in Artificial Intelligence, 1711, pages 294303, 1999, An abstract also appears in the 11th International Congress on Logic, Methodology and Philosophy of Science, p. 124 
57. 
C. J. Liau and D.R. Liu, "A logical approach to fuzzy data analysis," Euro. Conf. on Principles and Practice of Knowledge Discovery in Databases, Lecture Notes in Artificial Intelligence, 1704, pages 412417, 1999. 
58. 
C. J. Liau, "On rough quantifiers," Proc. of the 14th European Meetings on Cybernetics and Systems Research, pages 175180, 1998. 
59. 
C. J. Liau, "Modal reasoning and rough set theory," Proc. of the 7th International Conference on Artificial Intelligence: Methodology, Systems, and Applications, Lecture Notes in Artificial Intelligence, 1480, pages 317330, 1998. 
60. 
C. J. Liau, "A logic for reasoning about action, preference, and commitment," Proc. of the 13th European Conference on Artificial Intelligence, pages 552556, 1998. 
61. 
T. Y. Lin and C. J. Liau, "Probabilistic multivalued random variables  belief functions and granular computing," 5th European Congress on Intelligent Techniques and Soft Computing, pages 221225, 1997, (EUFIT ‘97) 
62. 
C. J. Liau, "A semantics for logics of preference based on possibility theory," Proc. of 7th International Fuzzy Systems Association World Congress, pages 243248, 1997. 
63. 
T. Y. Lin and C. J. Liau, "Belief functions based on probabilistic multivalued random variables," Proc. of Joint Conference on Information Science, volume 3, pages 269272, 1997, Rough Set and Computer Science (5th International Workshop on Rough Sets and Soft Computing) 
64. 
C. J. Liau, "On rough terminological logics," 4th International Workshop on Rough Sets, Fuzzy Sets, and Machine Discovery, pages 4754, 1996. 
65. 
C. J. Liau, "Possibilistic residuated implication logics and applications," Proc. of IPMU'96, pages 935940, 1996. 
66. 
C. J. Liau and I. P. Lin, "A logic for conditional possibility," 1st ICSC international Symposium on Fuzzy Logic, pages A8390, 1995. 
67. 
C. J. Liau, "Belief function semantics for comparative confirmation (abstract)," 10th International Congress on Logic, Methodology and Philosophy of Science, pages 277, 1995. 
68. 
C. J. Liau, "On the relationship between evidential structures and data tables," 2nd World Conference on the Fundamentals of AI, pages 205216, 1995. 
69. 
C. J. Liau, "Representibg priorities of defaults in possibility theory," Proc. of FUZZIEEE'94, pages 12801284, 1994. 
70. 
C. J. Liau, "Application schemes of possibility theorybased defaults," Proc. of the 12th European Meetings on Cybernetics and Systems Research, pages 343350, 1994. 
71. 
C. J. Liau and I. P. Lin, "Gentzen sequent calculus for possibilistic reasoning," Knowledge Representation and Reasoning under Uncertainty, Lecture Notes in Artificial Intelligence, 808, M. Masuch and L. Polos, editor, pages 3140, 1994. 
72. 
C. J. Liau and I. P. Lin, "Reasoning about higher order uncertainty in possibilistic logic," Proc. of The 7th International Symposium on Methodologies for Intelligent Systems, Lecture Notes in Artificial Intelligence, 689, pages 316325, 1993. 
73. 
C. J. Liau and I. P. Lin, "Quantitative modal logic and possibilistic reasoning," Proc. of the 10th European Conference on Artificial Intelligence, pages 4347, 1992. 



Book & Book Chapters  
1. 
C.J. Liau,, chapter "Social networks and granular computing," Encyclopedia of Complexity and System Science, R.A. Meyers, editor, pages 83338345, SpringerVerlag, 2009. 
2. 
T.F. Fan, D.R. Liu, and C.J. Liau,, chapter "A bipolar interpretation of fuzzy decision trees," Data Mining: Foundations and Practice, T.Y. Lin, Y. Xie, A. Wasilewska and and C.J. Liau, editors, pages 111126, SpringerVerlag, 2008. 
3. 
T.Y. Lin, Y. Xie, A. Wasilewska, and C.J. Liau, "Data Mining: Foundations and Practice," SpringerVerlag, 2008. 
4. 
T.Y. Lin, S. Ohsuga, C.J. Liau, and X. Hu, "Foundations and Novel Approaches in Data Mining," SpringerVerlag, 2006. 
5. 
T.Y. Lin and C.J. Liau,, chapter "Granular computing and rough sets: An incremental approach," The Data Mining and Knowledge Discovery Handbook, O. Maimon and L. Rokach, editor, pages 535561, SpringerVerlag, 2005. 
6. 
T.F. Fan, D.R. Liu, and C.J. Liau,, chapter "Justification and hypothesis selection in data mining," Foundations of Data Mining and Knowledge Discovery, T.Y. Lin, S. Ohsuga, C.J. Liau, X. Hu and and S. Tsumoto , editors, pages 119130, SpringerVerlag, 2005. 
7. 
T.Y. Lin, S. Ohsuga, C.J. Liau, X. Hu, and S. Tsumoto, "Foundations of Data Mining and Knowledge Discovery," SpringerVerlag, 2005. 
8. 
T.Y. Lin, S. Smale, T. Poggio, and C.J. Liau, "Proc. of the IEEE ICDM'04 Workshop on Foundations of Data Mining," IEEE, 2004. 
9. 
T.Y. Lin, X. Hu, S. Ohsuga, and C.J. Liau, "Proc. of the IEEE ICDM'03 Workshop on Foundations and New Directions in Data Mining," IEEE, 2003. 
10. 
T.Y. Lin and C.J. Liau, "Proc. of the PAKDD'2002 Workshop on the Foundation of Data Mining," Institute of Information & Computing Machinery, Taiwan, 2002, As a special issue of Communication of IICM, Vol. 5, No. 2 


Others  
1. 
YunChing Liu, Yiting Chiang, Tsansheng Hsu, ChurnJung Liau, and DaWei Wang, "Floating Point Arithmetic Protocols for Constructing Secure Data Analysis Application," The 17th International Conference on KnowledgeBased and Intelligent Information \\& Engineering System (KES), volume 22, Elsevier, January 2013. 











