I am at NCS Group, working on Big Data analytics for customers. In my free time, I volunteer professional services to events, conferences, and journals (related to data mining/analytics, security and health informatics). Was also part of teams which won some analytics competitions.
- email me at c...@ncs.com.sg if you are a Singaporean data scientist looking out for job opportunities; or to exchange knowledge on analytics, events, and competitions
- connect with me at LinkedIn or Google Scholar if we know each other professionally
Previously, I was at SAS Institute Pte Ltd, working on SAS® Analytics (mostly in security intelligence). My specialization was Big Data analytics in public security (attack and disaster preparation/recovery/response; cyber security; internal security; and predictive policing) and fraud (government, banking, and insurance).
Before SAS, my role was a data scientist at the Data Analytics Department (DAD) (formerly known as Data Mining Department), under Institute for Infocomm Research (I2R), Agency for Science, Technology and Research (A*STAR), Singapore. My analytics experience acquired there includes web monitoring of companies and technologies, assistive technology for people with dementia, and mobile phone activity recognition. I also worked on real-world, energy-related, analytics projects to improve parts of the smart grid and other Big Data applications. Together with my collaborators, we had published a few technical papers on various industry applications of data mining/analytics, such as fraud detection and activity recognition; and my favorite analytics tools at that time included R, WEKA, and MySQL.
Associate Editor, IEEE Transactions on Big Data (IEEE TBD)
Program Committee Member, Australasian Data Mining (AusDM 2015) Conference, International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2015), Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2015)
Associate Editor, Big Data Journal
Editorial Board Member, International Journal of Cyber Warfare and Terrorism (IJCWT)
Program Committee Member, Australasian Data Mining (AusDM 2014) Conference, IEEE International Conference on Big Data (IEEE BigData 2014), Joint Intelligence and Security Informatics Conference (JISIC 2014), IEEE/WIC/ACM International Conference on Web Intelligence (WI 2014), International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2014), Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2014), International Workshop of Big Data in Bioinformatics and Healthcare Informatics (BBH 2014)
Sponsorship Co-Chair, International Conference on Smart Home and Health Telematics (ICOST 2013)
Program Committee Co-Chair, Data Mining Applications in Industry and Government (DMApps 2013) Workshop
Program Committee Member, IEEE International Conference on Technologies for Homeland Security (HST 2013), IEEE/WIC/ACM International Conference on Web Intelligence (WI 2013), IEEE International Conference on Big Data (IEEE BigData 2013), IEEE Intelligence and Security Informatics (ISI 2013) Conference, European Intelligence and Security Informatics Conference (EISIC 2013), Australasian Data Mining (AusDM 2013) Conference, International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2013), International Workshop on Smart Environments and Ambient Intelligence (SENAmI 2013)
Conort, X., Chua, H., Cao, H., Phua, C. and Yap, G. (2014). Big Data Analytics for Flight Arrival Time Prediction. Proc. of 2014 INFORMS Conference on Business Analytics and Operations Research. [prezi][Kaggle][GE Reports][MIT Technology Review][GigaOM][KDNuggets][Txchnologist][The Straits Times][AsiaOne][A*STAR Honours & Accolades 2013] - Gxav & * team is the champion (out of more than 170 teams) in GE Flight Quest Phase 1 Competition.
Phua, C., Ji, J., Chng, K. and Lee, Y. (2013). Four Steps to Visual Analytics for Cyber Security. Proc. of VAST13. [paper][prezi][presentation][video] - SAS Institute team has an honorable mention for intriguing visualization in VAST Challenge 2013 Mini-Challenge 3 on Cyber Security.
Phua, C., Cheu, E., Yap, G., Sim, K. and Nguyen, M. (2012). Feature Engineering for Click Fraud Detection. Proc. of ACML12 Workshop on Fraud Detection in Mobile Advertising. [paper][poster][prezi][feature list][click fraud data][A*STAR news][The Straits Times] - starrystarrynight team is the champion (out of 95 teams) in Fraud Detection in Mobile Advertising (FDMA) Competition.
Cao, H., Tiong, W., Phua, C., Kng, V. and Alba, M. (2012). Liveliness: Helping Cities Identify Ambience In Any Location. [presentation] - Liveliness team is one of the winning teams (out of 30 teams) in Urban Prototyping (UP) Singapore Weekend Competition.
Oentaryo, R., Lim, E., Zhu, F., Lo, D., Finegold, M., Phua, C., Cheu, E., Yap, G., Sim, K., Nguyen, M., Perera, K., Neupane, B., Faisal, M., Aung, Z., Woon, W., Chen, W., Patel, D. and Berrar, D. (2014). Detecting Fraudulent Patterns in Online Advertising: A Data Mining Approach. Journal of Machine Learning Research, 15(Jan): pp. 99-140. [pdf][bib]
Aloulou, H., Mokhtari, M., Tiberghien, T., Biswas, J., Phua, C., Lin, K. and Yap, P. (2013). Deployment of Assistive Living Technology in a Nursing Home Environment: Methods and Lessons Learned. BMC Medical Informatics and Decision Making, 13: 42. [pdf]
Phua, C., Smith-Miles, K., Lee, V. and Gayler, R. (2012). Resilient Identity Crime Detection. IEEE Transactions on Knowledge and Data Engineering, 24(3): pp. 533-546. [pdf][bib][Papers which have plagiarized Resilient Identity Crime Detection]
Please see Complete List of Publications by Projects.
Official Disclaimer: This is a personal page published by the author, Phua Chun Wei Clifton. The ideas and information expressed on it have not been approved or authorised by his employer or its partner organisations either explicitly or implicitly. In no event shall his employer or its partner organisations be liable for any damages whatsoever resulting from any action arising in connection with the use of this information or its publication, including any action for infringement of copyright or defamation.