default search action
G. Alan Wang
Person information
- affiliation: Virginia Tech, Department of Business Information Technology, USA
- affiliation (PhD 2006): University of Arizona, Tucson, AZ, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2006
- [b1]Gang Alan Wang:
Entity Matching for Intelligent Information Integration. University of Arizona, Tucson, USA, 2006
Journal Articles
- 2024
- [j29]Texian Zhang, G. Alan Wang, Zhen He, Amitava Mukherjee:
Service failure monitoring via multivariate multiple linear regression profile schemes with dimensionality reduction. Decis. Support Syst. 178: 114122 (2024) - [j28]Yuzhuo Li, Min Zhang, G. Alan Wang, Ning Zhang:
The effect of different types of comparative reviews on product sales. Decis. Support Syst. 184: 114287 (2024) - [j27]Long Xia, Wenqi Shen, Weiguo Fan, G. Alan Wang:
Knowledge-Aware Learning Framework Based on Schema Theory to Complement Large Learning Models. J. Manag. Inf. Syst. 41(2): 453-486 (2024) - 2023
- [j26]Qianzhou Du, Christopher S. Kwaramba, Chenwei Li, G. Alan Wang, Quinton Nottingham:
A contest between users and marketers? The economic value of social media content for adverse events. Inf. Process. Manag. 60(6): 103496 (2023) - 2022
- [j25]Suya Hu, Di Xu, Alan Gang Wang:
Idea response and adoption in open innovation communities: the signalling role of linguistic style. Int. J. Netw. Virtual Organisations 26(3): 212-230 (2022) - [j24]Tabitha L. James, Zhilei Qiao, Wenqi Shen, G. Alan Wang, Weiguo Fan:
Competing for Temporary Advantage in a Hypercompetitive Mobile App Market. MIS Q. 47(3): 1177-1212 (2022) - 2021
- [j23]Mukun Cao, G. Alan Wang, Melody Y. Kiang:
Modeling and prediction of human negotiation behavior in human-computer negotiation. Electron. Commer. Res. Appl. 50: 101099 (2021) - [j22]Qianzhou Du, Jing Li, Yanqing Du, G. Alan Wang, Weiguo Fan:
Predicting crowdfunding project success based on backers' language preferences. J. Assoc. Inf. Sci. Technol. 72(12): 1558-1574 (2021) - 2020
- [j21]Xiaomo Liu, G. Alan Wang, Weiguo Fan, Zhongju Zhang:
Finding Useful Solutions in Online Knowledge Communities: A Theory-Driven Design and Multilevel Analysis. Inf. Syst. Res. 31(3): 731-752 (2020) - [j20]Hong Hong, Qiang Ye, Qianzhou Du, G. Alan Wang, Weiguo Fan:
Crowd characteristics and crowd wisdom: Evidence from an online investment community. J. Assoc. Inf. Sci. Technol. 71(4): 423-435 (2020) - 2018
- [j19]Richard Gruss, Alan S. Abrahams, Weiguo Fan, G. Alan Wang:
By the numbers: The magic of numerical intelligence in text analytic systems. Decis. Support Syst. 113: 86-98 (2018) - [j18]Min Zhang, Chengshang Ren, G. Alan Wang, Zhen He:
The impact of channel integration on consumer responses in omni-channel retailing: The mediating effect of consumer empowerment. Electron. Commer. Res. Appl. 28: 181-193 (2018) - [j17]Mi Zhou, Baozhou Lu, Weiguo Fan, G. Alan Wang:
Project description and crowdfunding success: an exploratory study. Inf. Syst. Frontiers 20(2): 259-274 (2018) - [j16]Shihao Zhou, Zhilei Qiao, Qianzhou Du, G. Alan Wang, Weiguo Fan, Xiangbin Yan:
Measuring Customer Agility from Online Reviews Using Big Data Text Analytics. J. Manag. Inf. Syst. 35(2): 510-539 (2018) - 2017
- [j15]Hong Hong, Di Xu, G. Alan Wang, Weiguo Fan:
Understanding the determinants of online review helpfulness: A meta-analytic investigation. Decis. Support Syst. 102: 1-11 (2017) - 2015
- [j14]G. Alan Wang, Xiaomo Liu, Jianling Wang, Min Zhang, Weiguo Fan:
Examining micro-level knowledge sharing discussions in online communities. Inf. Syst. Frontiers 17(6): 1227-1238 (2015) - [j13]Mi (Jamie) Zhou, Lijun (Gillian) Lei, Jianling Wang, Weiguo (Patrick) Fan, Alan Gang Wang:
Social Media Adoption and Corporate Disclosure. J. Inf. Syst. 29(2): 23-50 (2015) - [j12]Jiexun Li, G. Alan Wang:
A framework of identity resolution: evaluating identity attributes and matching algorithms. Secur. Informatics 4(1): 6 (2015) - [j11]G. Alan Wang, Harry Jiannan Wang, Jiexun Li, Alan S. Abrahams, Weiguo Fan:
An Analytical Framework for Understanding Knowledge-Sharing Processes in Online Q&A Communities. ACM Trans. Manag. Inf. Syst. 5(4): 18:1-18:31 (2015) - 2014
- [j10]Xiaomo Liu, G. Alan Wang, Aditya Johri, Mi Zhou, Weiguo Fan:
Harnessing global expertise: A comparative study of expertise profiling methods for online communities. Inf. Syst. Frontiers 16(4): 715-727 (2014) - 2013
- [j9]G. Alan Wang, Jian Jiao, Alan S. Abrahams, Weiguo Fan, Zhongju Zhang:
ExpertRank: A topic-aware expert finding algorithm for online knowledge communities. Decis. Support Syst. 54(3): 1442-1451 (2013) - [j8]Alan S. Abrahams, Jian Jiao, Weiguo Fan, G. Alan Wang, Zhongju Zhang:
What's buzzing in the blizzard of buzz? Automotive component isolation in social media postings. Decis. Support Syst. 55(4): 871-882 (2013) - [j7]Shu-Guang He, Zhen He, Gang Alan Wang:
Online monitoring and fault identification of mean shifts in bivariate processes using decision tree learning techniques. J. Intell. Manuf. 24(1): 25-34 (2013) - 2012
- [j6]Krishna P. C. Madhavan, Mihaela Vorvoreanu, Niklas Elmqvist, Aditya Johri, Naren Ramakrishnan, G. Alan Wang, Ann F. McKenna:
Portfolio Mining. Computer 45(10): 95-99 (2012) - [j5]Alan S. Abrahams, Jian Jiao, G. Alan Wang, Weiguo Fan:
Vehicle defect discovery from social media. Decis. Support Syst. 54(1): 87-97 (2012) - 2011
- [j4]G. Alan Wang, Homa Atabakhsh, Hsinchun Chen:
A hierarchical Naïve Bayes model for approximate identity matching. Decis. Support Syst. 51(3): 413-423 (2011) - [j3]Shu-Guang He, G. Alan Wang, Deborah F. Cook:
Multivariate measurement system analysis in multisite testing: An online technique using principal component analysis. Expert Syst. Appl. 38(12): 14602-14608 (2011) - [j2]Jiexun Li, G. Alan Wang, Hsinchun Chen:
Identity matching using personal and social identity features. Inf. Syst. Frontiers 13(1): 101-113 (2011) - 2007
- [j1]Jennifer Jie Xu, G. Alan Wang, Jiexun Li, Michael Chau:
Complex Problem Solving: Identity Matching Based on Social Contextual Information. J. Assoc. Inf. Syst. 8(10): 31 (2007)
Conference and Workshop Papers
- 2018
- [c27]Yu Wang, G. Alan Wang, Weiguo Fan, Jiexun Li:
A Deep Learning Based Pipeline for Image Grading of Diabetic Retinopathy. ICSH 2018: 240-248 - 2017
- [c26]Qianzhou Du, Hong Hong, Gang Alan Wang, Pingyuan Wang, Weiguo Fan:
CrowdIQ: A New Opinion Aggregation Model. HICSS 2017: 1-8 - [c25]Zhilei Qiao, Xuan Zhang, Mi Zhou, Gang Alan Wang, Weiguo Fan:
A Domain Oriented LDA Model for Mining Product Defects from Online Customer Reviews. HICSS 2017: 1-10 - [c24]Ziqian Song, Gang Alan Wang, Weiguo Fan:
Firm Actions Toward Data Breach Incidents and Firm Equity Value: An Empirical Study. HICSS 2017: 1-10 - [c23]Zachary Davis, Qianzhou Du, G. Alan Wang, Christopher W. Zobel, Lara Khansa:
Online Health Communities the Impact of Social Support on the Health State of People with Chronic Illness. ICSH 2017: 184-188 - [c22]Long Xia, G. Alan Wang, Weiguo Fan:
A Deep Learning Based Named Entity Recognition Approach for Adverse Drug Events Identification and Extraction in Health Social Media. ICSH 2017: 237-248 - [c21]Hong Hong, Di Xu, Dapeng Xu, G. Alan Wang, Weiguo Fan:
A Meta-Analysis on the Determinants of Online Review Helpfulness. WHICEB 2017: 34 - 2015
- [c20]Qianzhou Du, Weiguo Fan, Zhilei Qiao, Alan Gang Wang, Xuan Zhang, Mi Zhou:
Money Talks: A Predictive Model on Crowdfunding Success Using Project Description. AMCIS 2015 - [c19]Qianzhou Du, Weiguo Fan, Zhilei Qiao, Alan Gang Wang, Xuan Zhang, Mi Zhou:
Do Facebook Activities Increase Sales? AMCIS 2015 - [c18]Xuan Zhang, Shuo Niu, Da Zhang, G. Alan Wang, Weiguo Fan:
Predicting Vehicle Recalls with User-Generated Contents: A Text Mining Approach. PAISI 2015: 41-50 - 2014
- [c17]G. Alan Wang, Harry Jiannan Wang, Jiexun Li, Weiguo Fan:
Mining Knowledge Sharing Processes in Online Discussion Forums. HICSS 2014: 3898-3907 - 2011
- [c16]Aditya Johri, G. Alan Wang, Xiaomo Liu, Krishna P. C. Madhavan:
Utilizing topic modeling techniques to identify the emergence and growth of research topics in engineering education. FIE 2011: 2 - [c15]Jiexun Li, G. Alan Wang:
Criminal identity resolution using social behavior and relationship attributes. ISI 2011: 173-175 - 2009
- [c14]G. Alan Wang, Jian Jiao, Weiguo Fan:
Searching for Authoritative Documents in Knowledge-Base Communities. ICIS 2009: 109 - 2008
- [c13]Jiexun Li, G. Alan Wang, Hsinchun Chen:
PRM-based identity matching using social context. ISI 2008: 150-155 - 2007
- [c12]G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Chunju Tseng, Homa Atabakhsh, Hsinchun Chen:
The Arizona IDMatcher: developing an identity matching tool for law enforcement. DG.O 2007: 304-305 - [c11]G. Alan Wang, Siddharth Kaza, Shailesh Joshi, Kris Chang, Homa Atabakhsh, Hsinchun Chen:
The Arizona IDMatcher: A Probabilistic Identity Matching System. ISI 2007: 229-235 - [c10]Wingyan Chung, G. Alan Wang:
Profiling and Visualizing Cyber-criminal Activities: A General Framework. ISI 2007: 376 - 2006
- [c9]Hsinchun Chen, Homa Atabakhsh, Alan Gang Wang, Siddharth Kaza, Chunju Tseng, Yuan Wang, Shailesh Joshi, Tim Petersen, Chuck Violette:
COPLINK center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. DG.O 2006: 49-50 - [c8]G. Alan Wang, Hsinchun Chen, Homa Atabakhsh:
A probabilistic model for approximate identity matching. DG.O 2006: 462-463 - [c7]G. Alan Wang, Jennifer Jie Xu, Hsinchun Chen:
Using Social Contextual Information to Match Criminal Identities. HICSS 2006 - [c6]G. Alan Wang, Hsinchun Chen, Homa Atabakhsh:
A Multi-layer Naïve Bayes Model for Approximate Identity Matching. ISI 2006: 479-484 - 2005
- [c5]G. Alan Wang:
A Multi-Layer Graphical Model for Approximate Identity Matching. AMCIS 2005: 347 - [c4]Hsinchun Chen, Homa Atabakhsh, Jennifer Jie Xu, Alan Gang Wang, Byron Marshall, Siddharth Kaza, Chunju Tseng, Shauna Eggers, Hemanth Gowda, Tim Petersen, Chuck Violette:
Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research. DG.O 2005: 112-113 - [c3]Hsinchun Chen, Homa Atabakhsh, Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, G. Alan Wang, Tim Petersen, Chuck Violette:
BorderSafe: cross-jurisdictional information sharing, analysis, and visualization. DG.O 2005: 241-242 - [c2]Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen:
Discovering Identity Problems: A Case Study. ISI 2005: 368-373 - [c1]Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen:
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization. ISI 2005: 669-670
Editorship
- 2017
- [e9]G. Alan Wang, Michael Chau, Hsinchun Chen:
Intelligence and Security Informatics - 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings. Lecture Notes in Computer Science 10241, 2017, ISBN 978-3-319-57462-2 [contents] - 2016
- [e8]Michael Chau, G. Alan Wang, Hsinchun Chen:
Intelligence and Security Informatics - 11th Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedings. Lecture Notes in Computer Science 9650, Springer 2016, ISBN 978-3-319-31862-2 [contents] - 2015
- [e7]Michael Chau, G. Alan Wang, Hsinchun Chen:
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings. Lecture Notes in Computer Science 9074, Springer 2015, ISBN 978-3-319-18454-8 [contents] - 2014
- [e6]Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang:
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014. Proceedings. Lecture Notes in Computer Science 8440, Springer 2014, ISBN 978-3-319-06676-9 [contents] - 2013
- [e5]G. Alan Wang, Xiaolong Zheng, Michael Chau, Hsinchun Chen:
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings. Lecture Notes in Computer Science 8039, Springer 2013, ISBN 978-3-642-39692-2 [contents] - 2012
- [e4]Daniel Zeng, Lina Zhou, Bojan Cukic, G. Alan Wang, Christopher C. Yang:
2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, USA, June 11-14, 2012. IEEE 2012, ISBN 978-1-4673-2105-1 [contents] - [e3]Michael Chau, G. Alan Wang, Wei Thoo Yue, Hsinchun Chen:
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings. Lecture Notes in Computer Science 7299, Springer 2012, ISBN 978-3-642-30427-9 [contents] - 2011
- [e2]Michael Chau, G. Alan Wang, Xiaolong Zheng, Hsinchun Chen, Daniel Zeng, Wenji Mao:
Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings. Lecture Notes in Computer Science 6749, Springer 2011, ISBN 978-3-642-22038-8 [contents] - 2010
- [e1]Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini R. Urs, Srinath Srinivasa, G. Alan Wang:
Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings. Lecture Notes in Computer Science 6122, Springer 2010, ISBN 978-3-642-13600-9 [contents]
Coauthor Index
aka: Weiguo (Patrick) Fan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint