Wingyan Chung

Orcid: 0000-0002-5102-5844

According to our database1, Wingyan Chung authored at least 76 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A temporal graph framework for intelligence extraction in social media networks.
Inf. Manag., June, 2023

A Theory-based Deep-Learning Approach to Detecting Disinformation in Financial Social Media.
Inf. Syst. Frontiers, April, 2023

Building Human Digital Twins: Cases for Intelligence and Security Informatics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Understanding Behavioral Drivers in Twitter Social Media Networks.
Proceedings of the 44th International Conference on Information Systems, 2023

2021
A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage.
IEEE/ACM Trans. Netw., 2021

A computational framework for social-media-based business analytics and knowledge creation: empirical studies of CyTraSS.
Enterp. Inf. Syst., 2021

Exploring the Use of Nodal Centrality in Measuring Online Message Diffusion.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Dissecting emotion and user influence in social media communities: An interaction modeling approach.
Inf. Manag., 2020

A Dynamic Classification Approach to Churn Prediction in Banking Industry.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Interaction Models for Detecting Nodal Activities in Temporal Social Media Networks.
ACM Trans. Manag. Inf. Syst., 2019

Efficient parameter selection for support vector machines.
Enterp. Inf. Syst., 2019

SimON-Feedback: An Iterative Algorithm for Performance Tuning in Online Social Simulation.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

CrossSimON: A Novel Probabilistic Approach to Cross-Platform Online Social Network Simulation.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

A Deep Learning Approach to Modeling Temporal Social Networks on Reddit.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Simulating Temporal Dynamics in Cryptocurrency Software Social Networks.
Proceedings of the 25th Americas Conference on Information Systems, 2019

A Theory-Driven Framework for Modeling Temporal Online Social Networks of GitHub.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
A Survey of Mobile Crowdsensing Techniques: A Critical Component for The Internet of Things.
ACM Trans. Cyber Phys. Syst., 2018

A Temporal Recurrent Neural Network Approach to Detecting Market Anomaly Attacks Submission Type: Short Paper.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Extracting Textual Features of Financial Social Media to Detect Cognitive Hacking.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Leveraging Dependency in Scheduling and Preemption for High Throughput in Data-Parallel Clusters.
Proceedings of the IEEE International Conference on Cluster Computing, 2018

2017
Efficient parameter selection for SVM: The case of business intelligence categorization.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Developing curricular modules for cybersecurity informatics: An active learning approach.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

2016
Social-media-based public policy informatics: Sentiment and network analyses of U.S. Immigration and border security.
J. Assoc. Inf. Sci. Technol., 2016

Topic modeling of small sequential documents: Proposed experiments for detecting terror attacks.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Emotion extraction and entrainment in social media: The case of U.S. immigration and border security.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

eMood: Modeling Emotion for Social Media Analytics on Ebola Disease Outbreak.
Proceedings of the International Conference on Information Systems, 2015

2014
Evaluating text visualization for authorship analysis.
Secur. Informatics, 2014

BizPro: Extracting and categorizing business intelligence factors from textual news articles.
Int. J. Inf. Manag., 2014

Intelligence and security informatics: developing curricular modules in context (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

2013
Corrigendum to "Discovering business intelligence from online product reviews: A rule-induction framework" [Expert Systems with Applications 39 (15) (2012) 11870-11879].
Expert Syst. Appl., 2013

Computing in context (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Evaluating text visualization: An experiment in authorship analysis.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

2012
Group-Buying E-Commerce in China.
IT Prof., 2012

Managing web repositories in emerging economies: Case studies of browsing web directories.
Int. J. Inf. Manag., 2012

Discovering business intelligence from online product reviews: A rule-induction framework.
Expert Syst. Appl., 2012

Building a web collection for online surveillance of U.S. domestic terrorism.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Categorizing temporal events: A case study of domestic terrorism.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Risk Assessment Based on News Articles: An Experiment on IT Companies.
Proceedings of the International Conference on Information Systems, 2012

2010
Web Searching and Browsing: A Multilingual Perspective.
Adv. Comput., 2010

Extracting Business Intelligence from Online Product Reviews: An Experiment of Automatic Rule-Induction.
Proceedings of the International Conference on Information Systems, 2010

2009
Enhancing Business Intelligence Quality with Visualization: An Experiment on Stakeholder Network Analysis.
Pac. Asia J. Assoc. Inf. Syst., 2009

Business stakeholder analyzer: An experiment of classifying stakeholders on the Web.
J. Assoc. Inf. Sci. Technol., 2009

Browsing the underdeveloped Web: An experiment on the Arabic Medical Web Directory.
J. Assoc. Inf. Sci. Technol., 2009

Summarizing user-generated reviews in digital libraries: a visual clustering approach.
Proceedings of the 2009 Joint International Conference on Digital Libraries, 2009

LIKES: Educating the Next Generation of Knowledge Society Builders.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Automatic Summarization of Customer Reviews: An Integrated Approach.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Uncovering the dark Web: A case study of Jihad on the Web.
J. Assoc. Inf. Sci. Technol., 2008

Organizing domain-specific information on the Web: An experiment on the Spanish business Web directory.
Int. J. Hum. Comput. Stud., 2008

Visualising e-business stakeholders on the Web: a methodology and experimental results.
Int. J. Electron. Bus., 2008

Web searching in a multilingual world.
Commun. ACM, 2008

2007
An end user evaluation of query formulation and results review tools in three medical meta-search engines.
Int. J. Medical Informatics, 2007

Supporting Web Searching of Business Intelligence with Information Visualization.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

Profiling and Visualizing Cyber-criminal Activities: A General Framework.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Building a Directory for the Underdeveloped Web: An Experiment on the Arabic Medical Web Directory.
Proceedings of the Asian Digital Libraries. Looking Back 10 Years and Forging New Frontiers, 2007

2006
Studying information seeking on the non-English Web: An experiment on a Spanish business Web portal.
Int. J. Hum. Comput. Stud., 2006

Fighting cybercrime: a review and the Taiwan experience.
Decis. Support Syst., 2006

Supporting non-English Web searching: An experiment on the Spanish business and the Arabic medical intelligence portals.
Decis. Support Syst., 2006

2005
A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration.
J. Manag. Inf. Syst., 2005

Evaluating event visualization: a usability study of COPLINK spatio-temporal visualizer.
Int. J. Hum. Comput. Stud., 2005

Supporting Information Seeking in Multinational Organizations: A Knowledge Portal Approach.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Business Stakeholder Analyzer: An Automatic Classification Approach to Facilitating Collaborative Commerce on the Web.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Building Web Directories in Different Languages for Decision Support: A Semi-Automatic Approach.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Searching for Non-English Web Content: An Empirical Study of the Spanish Business Intelligence Portal.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
EBizPort: Collecting and analyzing business intelligence information.
J. Assoc. Inf. Sci. Technol., 2004

A graph model for E-commerce recommender systems.
J. Assoc. Inf. Sci. Technol., 2004

Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort).
J. Assoc. Inf. Sci. Technol., 2004

Crime Data Mining: A General Framework and Some Examples.
Computer, 2004

An evaluation methodology for coordinated event visualization in digital libraries.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2004

Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.
Proceedings of the Intelligence and Security Informatics, 2004

2003
CMedPort: A Cross-Regional Chinese Medical Portal.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003

An International Perspective on Fighting Cybercrime.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Business Intelligence Explorer: A Knowledge Map Framework for Discovering Business Intelligence on the Web.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Crime Data Mining: An Overview and Case Studies.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

2002
Managing international data communications.
Commun. ACM, 2002

A graph-based recommender system for digital library.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002


  Loading...