Crea il mio profilo
Accesso pubblico
Visualizza tutto42 articoli
12 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Dr Zheng Baihua (郑白桦)Professor, School of Computing and Information Systems, Singapore Management UniversityEmail verificata su smu.edu.sg
- Jianliang Xu (徐建良)Chair Professor of Computer Science, Hong Kong Baptist UniversityEmail verificata su comp.hkbu.edu.hk
- Mao YePh.D. , The Penn State UniversityEmail verificata su cse.psu.edu
- Peifeng YinPinterestEmail verificata su pinterest.com
- Wen-Chih PengNational Chiao Tung UniversityEmail verificata su cs.nctu.edu.tw
- Xingjie LiuData Mining Scientist of Square IncEmail verificata su cse.psu.edu
- Ming-Syan ChenNational Taiwan University, TaiwanEmail verificata su ntu.edu.tw
- Anand SivasubramaniamDistinguished Professor of Computer Science & Engineering, Penn State UniversityEmail verificata su cse.psu.edu
- Vincent S. Tseng, IEEE FellowChair Professor, Dept. Computer Science, National Yang Ming Chiao Tung University, TaiwanEmail verificata su cs.nctu.edu.tw
- C Lee GilesPennsylvania State UniversityEmail verificata su psu.edu
- Yuan TianFreshplum IncEmail verificata su cse.psu.edu
- Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityEmail verificata su ist.psu.edu
- Chita R. DasPenn State UniversityEmail verificata su cse.psu.edu
- Sunho LimProfessor of Computer Science, Texas Tech UniversityEmail verificata su ttu.edu
- Guohong CaoProfessor, the Pennsylvania State UniversityEmail verificata su cse.psu.edu
- Dongwon LeeProfessor, The Pennsylvania State UniversityEmail verificata su psu.edu
- Qi HeNextdoorEmail verificata su nextdoor.com
- Yi-Cheng ChenNational Central UniversityEmail verificata su mgt.ncu.edu.tw
- Bo LuoProfessor, The University of KansasEmail verificata su ku.edu
- Chih-Chieh Hung (Oshin)Associate Professor, National Chung Hsing UniversityEmail verificata su nchu.edu.tw