Get my own profile
Public access
View all23 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Dr Zheng Baihua (郑白桦)Professor of School of Computing and Information Systems, Singapore Management UniversityVerified email at smu.edu.sg
Jianliang Xu (徐建良)Professor of Computer Science, Hong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
Mao YePh.D. , The Penn State UniversityVerified email at cse.psu.edu
Peifeng YinPinterestVerified email at pinterest.com
Wen-Chih PengNational Chiao Tung UniversityVerified email at cs.nctu.edu.tw
Xingjie LiuData Mining Scientist of Square IncVerified email at cse.psu.edu
Anand SivasubramaniamDistinguished Professor of Computer Science & Engineering, Penn State UniversityVerified email at cse.psu.edu
Ming-Syan ChenNational Taiwan University, TaiwanVerified email at ntu.edu.tw
C Lee GilesPennsylvania State UniversityVerified email at psu.edu
Peng LiuRaymond G. Tronzo, M.D. Professor of Cybersecurity, Penn State UniversityVerified email at ist.psu.edu
Vincent S. TsengDistinguished Professor, Dept. Computer Science , National Chiao Tung University, TaiwanVerified email at cs.nctu.edu.tw
Yuan TianFreshplum IncVerified email at cse.psu.edu
Dongwon LeeAssociate Professor, The Pennsylvania State UniversityVerified email at psu.edu
Chita R. DasPenn State UniversityVerified email at cse.psu.edu
Sunho LimProfessor of Computer Science, Texas Tech UniversityVerified email at ttu.edu
Guohong CaoProfessor, the Pennsylvania State UniversityVerified email at cse.psu.edu
Bo LuoProfessor, The University of KansasVerified email at ku.edu
Isaac CouncillOscar HealthVerified email at hioscar.com
Yi-Cheng ChenNational Central UniversityVerified email at mgt.ncu.edu.tw
Krzysztof JanowiczProfessor for Geoinformatics, University of California, Santa Barbara, USAVerified email at geog.ucsb.edu
Wang-Chien Lee
Verified email at cse.psu.edu - Homepage