Get my own profile
Public access
View all43 articles
11 articles
available
not available
Based on funding mandates
Co-authors
Dr Zheng Baihua (郑白桦)Professor, School of Computing and Information Systems, Singapore Management UniversityVerified email at smu.edu.sg
Jianliang Xu (徐建良)IEEE Fellow; Chair Professor of Computer Science, Hong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
Mao YePh.D. , The Penn State UniversityVerified email at cse.psu.edu
Peifeng YinPinterestVerified email at pinterest.com
Wen-Chih PengNational Chiao Tung UniversityVerified email at cs.nctu.edu.tw
Xingjie LiuData Mining Scientist of Square IncVerified email at cse.psu.edu
Ming-Syan ChenNational Taiwan University, TaiwanVerified email at ntu.edu.tw
Anand SivasubramaniamDistinguished Professor of Computer Science & Engineering, Penn State UniversityVerified email at cse.psu.edu
Vincent S. Tseng, IEEE FellowChair Professor, Dept. Computer Science, National Yang Ming Chiao Tung University, TaiwanVerified email at cs.nycu.edu.tw
Yuan TianFreshplum IncVerified email at cse.psu.edu
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Qi HeAmazonVerified email at amazon.com
Chita R. DasPenn State UniversityVerified email at cse.psu.edu
Sunho LimAssociate Professor of Computer Science, Texas Tech UniversityVerified email at ttu.edu
Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
Yi-Cheng ChenNational Central UniversityVerified email at mgt.ncu.edu.tw
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Chih-Chieh HungAssociate Professor, National Chung Hsing UniversityVerified email at nchu.edu.tw