Get my own profile
Public access
View all43 articles
12 articles
available
not available
Based on funding mandates
Co-authors
Dr Zheng Baihua (郑白桦)Professor, School of Computing and Information Systems, Singapore Management UniversityVerified email at smu.edu.sg
Jianliang Xu (徐建良)IEEE Fellow; Chair Professor of Computer Science, Hong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
Mao YePh.D. , The Penn State UniversityVerified email at cse.psu.edu
Peifeng YinPinterestVerified email at pinterest.comWen-Chih PengNational Chiao Tung UniversityVerified email at cs.nctu.edu.tw
Ming-Syan ChenNational Taiwan University, TaiwanVerified email at ntu.edu.tw
Xingjie LiuData Mining Scientist of Square IncVerified email at cse.psu.edu
Anand SivasubramaniamCharles Godfrey Binder Professor, Penn State UniversityVerified email at cse.psu.edu
Vincent S. Tseng, IEEE FellowChair Professor, Dept. Computer Science, National Yang Ming Chiao Tung University, TaiwanVerified email at cs.nycu.edu.tw
Yuan TianFreshplum IncVerified email at cse.psu.edu
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Yi-Cheng ChenNational Central UniversityVerified email at mgt.ncu.edu.twQi HeMicrosoftVerified email at microsoft.com
Dongwon LeeProfessor, The Pennsylvania State UniversityVerified email at psu.edu
Chita R. DasPenn State UniversityVerified email at cse.psu.edu
Sunho LimAssociate Professor of Computer Science, Texas Tech UniversityVerified email at ttu.edu
Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.eduBo LuoProfessor, The University of KansasVerified email at ku.edu
Chih-Chieh HungAssociate Professor, National Chung Hsing UniversityVerified email at nchu.edu.tw