Get my own profile
Public access
View all60 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ee-Peng LimSingapore Management UniversityVerified email at smu.edu.sg
- Jiawei HanAbel Bliss Professor of Computer Science, University of IllinoisVerified email at cs.uiuc.edu
- Xifeng YanProfessor, Computer Science, Univ. of California at Santa BarbaraVerified email at cs.ucsb.edu
- Philip S. YuProfessor of Computer Science, University of Illinons at ChicagoVerified email at cs.uic.edu
- Minghui QiuAlibaba GroupVerified email at smu.edu.sg
- Jing JiangSchool of Computing, ANU; School of Computing and Information Systems, SMUVerified email at smu.edu.sg
- David LoProfessor of Computer Science, Singapore Management UniversityVerified email at smu.edu.sg
- Siyuan LiuSmeal College of Business, Pennsylvania State UniversityVerified email at psu.edu
- GOTTIPATI SwapnaAssociate Professor of Information Systems, Singapore Managment UniversityVerified email at smu.edu.sg
- Chen ChenGoogle Inc.Verified email at google.com
- Liu YangGoogle ResearchVerified email at google.com
- Wei GongPhd candidate, Singapore Management UniversityVerified email at smu.edu.sg
- Ke WangProfessor of Computing Science, Simon Fraser UniversityVerified email at cs.sfu.ca
- Su Mon KyweSecurity ArchitectVerified email at sc.com
- Shuhui Wang(王树徽)Professor, Institute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
- Palakorn Achananuparp (Aek)School of Computing and Information Systems, Singapore Management UniversityVerified email at smu.edu.sg
- Tuan-Anh HoangRMIT Vietnam UniversityVerified email at rmit.edu.vn
- Jinbo ZhangPeking UniversityVerified email at pku.edu.cn
- Ramayya KrishnanCarnegie Mellon UniversityVerified email at cmu.edu
- Bolin DingAlibaba GroupVerified email at alibaba-inc.com