Get my own profile
Public access
View all44 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Dr Zheng Baihua (郑白桦)Professor, School of Computing and Information Systems, Singapore Management UniversityVerified email at smu.edu.sg
- Jianliang Xu (徐建良)Chair Professor of Computer Science, Hong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
- Mao YePh.D. , The Penn State UniversityVerified email at cse.psu.edu
- Peifeng YinPinterestVerified email at pinterest.com
- Wen-Chih PengNational Chiao Tung UniversityVerified email at cs.nctu.edu.tw
- Xingjie LiuData Mining Scientist of Square IncVerified email at cse.psu.edu
- Ming-Syan ChenNational Taiwan University, TaiwanVerified email at ntu.edu.tw
- Anand SivasubramaniamDistinguished Professor of Computer Science & Engineering, Penn State UniversityVerified email at cse.psu.edu
- Vincent S. Tseng, IEEE FellowChair Professor, Dept. Computer Science, National Yang Ming Chiao Tung University, TaiwanVerified email at cs.nycu.edu.tw
- Yuan TianFreshplum IncVerified email at cse.psu.edu
- C Lee GilesPennsylvania State UniversityVerified email at psu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
- Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
- Qi HeAmazonVerified email at amazon.com
- Chita R. DasPenn State UniversityVerified email at cse.psu.edu
- Sunho LimAssociate Professor of Computer Science, Texas Tech UniversityVerified email at ttu.edu
- Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
- Yi-Cheng ChenNational Central UniversityVerified email at mgt.ncu.edu.tw
- Bo LuoProfessor, The University of KansasVerified email at ku.edu
- Chih-Chieh Hung (Oshin)Associate Professor, National Chung Hsing UniversityVerified email at nchu.edu.tw