About
Dong Chen is a tenure-track Assistant Professor in the Department of Computer Science…
Activity
-
Happy New Year 2025 from my new office in Northwestern University! Wishing everyone all the best this year. Be kind and help make a better research…
Happy New Year 2025 from my new office in Northwestern University! Wishing everyone all the best this year. Be kind and help make a better research…
Liked by DONG CHEN
-
We will be presenting two papers at #NeurIPS2024, on cross-domain retrieval and time-delayed reinforcement learning. If you're interested, connect…
We will be presenting two papers at #NeurIPS2024, on cross-domain retrieval and time-delayed reinforcement learning. If you're interested, connect…
Liked by DONG CHEN
-
Yesterday, I announced at NeurIPS that I'll give $1M to the first open source AI that gets 90% on a new contamination-free version of my favorite…
Yesterday, I announced at NeurIPS that I'll give $1M to the first open source AI that gets 90% on a new contamination-free version of my favorite…
Liked by DONG CHEN
Experience
Education
-
University of Massachusetts, Amherst
-
I design, build, and analyze energy efficient systems for Cyber-Physical Systems with a particular emphasis on security and privacy issues.
-
-
• Energy Data Analysis
Analyze combine domain-specific knowledge of power systems with sophisticated machine learning techniques to reveal new insights into building energy data.
• Occupancy Detection
Analyze the home smart meter data with machine learning techniques to infer the home’s occupancy status-occupied/unoccupied and count the occupants in the building.
• Privacy Preserving
Study on low-cost and non-intrusive methods for ensuring consumer security and privacy in…• Energy Data Analysis
Analyze combine domain-specific knowledge of power systems with sophisticated machine learning techniques to reveal new insights into building energy data.
• Occupancy Detection
Analyze the home smart meter data with machine learning techniques to infer the home’s occupancy status-occupied/unoccupied and count the occupants in the building.
• Privacy Preserving
Study on low-cost and non-intrusive methods for ensuring consumer security and privacy in buildings that include pervasive networked sensing and actuation. -
-
Research on security and privacy issues for Cyber-Physical Systems:
-Cyber-Physcialy System/Internet of Things system structure.
-Security challenges in wireless networks, access control, intrusion detection, authentication, and privacy preserving.
-Lightweight Key Management Scheme for heterogeneous sensors or actuators.
-Trust, Reputation, Fuzzy in local and global scales. -
-
Design and Implementation of Medium Plate Mill 2 Communication System Using ACE and TAO
Publications
-
TrafficSpy: Disaggregating VPN-encrypted IoT Network Traffic for User Privacy Inference.
In Proc. of the 10th IEEE Conference on Communications and Network Security (CNS 2022)
-
PrivacyGuard: Enhancing Smart Home User Privacy.
The 20th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN’21
-
Preventing Occupancy Detection from Smart Meters
IEEE Transactions on Smart Grid
Utilities are rapidly deploying smart meters that measure electricity usage in real-time. Unfortunately, smart meters indirectly leak sensitive information about a home's occupancy, which is easy to detect because it highly correlates with simple statistical metrics, such as power's mean, variance, and range. To prevent occupancy detection, we propose using the thermal energy storage of electric water heaters already present in many homes. In essence, our approach, which we call combined heat…
Utilities are rapidly deploying smart meters that measure electricity usage in real-time. Unfortunately, smart meters indirectly leak sensitive information about a home's occupancy, which is easy to detect because it highly correlates with simple statistical metrics, such as power's mean, variance, and range. To prevent occupancy detection, we propose using the thermal energy storage of electric water heaters already present in many homes. In essence, our approach, which we call combined heat and privacy (CHPr), modulates a water heater's power usage to make it look like someone is always home. We design a CHPr-enabled water heater that regulates its energy usage to thwart a variety of occupancy detection attacks without violating its objective---to provide hot water on demand---and evaluate it in simulation using real data. Our results show that a standard 50-gal CHPr-enabled water heater prevents a wide range of state-of-the-art occupancy detection attacks.
Other authorsSee publication -
Combined Heat and Privacy: Preventing Occupancy Detection from Smart Meters
12th IEEE International Conference on Pervasive Computing and Communications, Percom’14
Electric utilities are rapidly deploying smart meters that record and transmit electricity usage in real-time. As prior research shows, smart meter data indirectly leaks sensitive, and potentially valuable, information about a home’s activities. An important example of the sensitive information smart meters reveal is occupancy—whether or not someone is home and when. As prior work also shows, occupancy is surprisingly easy to detect, since it highly correlates with simple statistical metrics…
Electric utilities are rapidly deploying smart meters that record and transmit electricity usage in real-time. As prior research shows, smart meter data indirectly leaks sensitive, and potentially valuable, information about a home’s activities. An important example of the sensitive information smart meters reveal is occupancy—whether or not someone is home and when. As prior work also shows, occupancy is surprisingly easy to detect, since it highly correlates with simple statistical metrics, such as power’s mean, variance, and range. Unfortunately, prior research that uses chemical energy storage, e.g., batteries, to prevent appliance power signature detection is prohibitively expensive when applied to occupancy detection. To address this problem, we propose preventing occupancy detection using the thermal energy storage of large elastic heating loads already present in many homes, such as electric water and space heaters. In essence,
our approach, which we call Combined Heat and Privacy (CHPr), controls the power usage of these large loads to make it look like someone is always home. We design a CHPr-enabled water
heater that regulates its energy usage to mask occupancy without violating its objective, e.g., to provide hot water on demand, and evaluate it in simulation and using a prototype. Our results
show that a 50-gallon CHPr-enabled water heater decreases the Matthews Correlation Coefficient (a standard measure of a binary classifier’s performance) of a threshold-based occupancy
detection attack in a representative home by 10x (from 0:44 to 0:045), effectively preventing occupancy detection at no extra cost.Other authors -
Non-Intrusive Occupancy Monitoring using Smart Meters.
ACM BuildSys 2013
Detailed information about a home’s occupancy is necessary to implement many advanced energy-efficiency optimizations. How- ever, monitoring occupancy directly is intrusive, typically requir- ing the deployment of multiple environmental sensors, e.g., mo- tion, acoustic, CO2, etc. In this paper, we explore the potential for Non-Intrusive Occupancy Monitoring (NIOM) by using electricity data from smart meters to infer occupancy. We first observe that a home’s pattern of electricity usage…
Detailed information about a home’s occupancy is necessary to implement many advanced energy-efficiency optimizations. How- ever, monitoring occupancy directly is intrusive, typically requir- ing the deployment of multiple environmental sensors, e.g., mo- tion, acoustic, CO2, etc. In this paper, we explore the potential for Non-Intrusive Occupancy Monitoring (NIOM) by using electricity data from smart meters to infer occupancy. We first observe that a home’s pattern of electricity usage generally changes when oc- cupants are present due to their interact with electrical loads. We empirically evaluate these interactions by monitoring ground truth occupancy in two homes, then correlating it with changes in statisti- cal metrics of smart meter data, such as power’s mean and variance, over short intervals. In particular, we use each metric’s maximum value at night as a proxy for its maximum value in an unoccupied home, and then signal occupancy whenever the daytime value ex- ceeds it. Our results highlight NIOM’s potential and its challenges.
Other authors -
Modeling access control for cyber-physical systems using reputation.
Journal of Computers and Electrical Engineering, Vol. 38, No. 5, pp. 1088-1101
The emergence of Cyber-Physical Systems (CPSs) heralds the ubiquitous and autonomous globally interconnected networks of embedded devices with their own means of interaction with the physical environment. The complex interactions with the physical environment significantly increase security risks. Especially, for mission-critical CPSs, sensitive data are closely related to security issues and are accessed only by authorized users. Role based access control is an essential component for…
The emergence of Cyber-Physical Systems (CPSs) heralds the ubiquitous and autonomous globally interconnected networks of embedded devices with their own means of interaction with the physical environment. The complex interactions with the physical environment significantly increase security risks. Especially, for mission-critical CPSs, sensitive data are closely related to security issues and are accessed only by authorized users. Role based access control is an essential component for protecting CPSs from unauthorized access. However, existing mechanisms are inadequate. We argue that role assignment should not depend on the remaining energy of a node but its reputation. This paper proposes a role-based access control model, R2BAC, for CPSs using reputation. The definitions and evaluation metrics of trust and reputation are given in order to evaluate the behavior of the nodes. Then reputation evaluation scheme and role assignment scheme are presented, respectively. In addition, we give the proofs of correctness and complexity analysis for R2BAC. Eventually, a wide set of simulations are provided to evaluate its performance.
Other authors -
AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems.
KSII Transactions on Internet and Information Systems(TIIS), Vol. 6, No. 9, pp.2052-2072
Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access…
Access control is an essential security component in protecting sensitive data and services from unauthorized access to the resources in mission-critical Cyber-Physical Systems (CPSs). CPSs are different from conventional information processing systems in such that they involve interactions between the cyber world and the physical world. Therefore, existing access control models cannot be used directly and even become disabled in an emergency situation. This paper proposes an adaptive Access Control model for Emergences (AC4E) for mission-critical CPSs. The principal aim of AC4E is to control the criticalities in these systems by executing corresponding responsive actions. AC4E not only provides the ability to control access to data and services in normal situations, but also grants the correct set of access privileges, at the correct time, to the correct set of subjects in emergency situations. It can facilitate adaptively responsive actions altering the privileges to specific subjects in a proactive manner without the need for any explicit access requests. A semiformal validation of the AC4E model is presented, with respect to responsiveness, correctness, safety, non-repudiation and concurrency, respectively. Then a case study is given to demonstrate how the AC4E model detects, responds, and controls the emergency events for a typical CPS adaptively in a proactive manner. Eventually, a wide set of simulations and performance comparisons of the proposed AC4E model are presented.
Other authors -
A Survey on Security Issues of M2M Communications in Cyber-Physical Systems.
KSII Transactions on Internet and Information Systems. Vol. 6, No. 1, pp.24-45, 2012
n this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually…
n this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.
Other authors -
Lightweight Key Management Scheme to Enhance the Security of Internet of Things.
International Journal of Wireless and Mobile Computing, Vol.5, No. 2, pp. 191-198
Trillions things of Internet of Things (IOT) or Cyber-Physical Systems (CPS) employ a unique global addressing scheme to interact to each other and corporate with others to provide intelligent services. However, people may resist the IOT as long as there is no public confidence that it will not cause any serious threats to their privacy. An effective secure key management for things authentication is the prerequisite of the security operations. Studying on the characteristics of things in the…
Trillions things of Internet of Things (IOT) or Cyber-Physical Systems (CPS) employ a unique global addressing scheme to interact to each other and corporate with others to provide intelligent services. However, people may resist the IOT as long as there is no public confidence that it will not cause any serious threats to their privacy. An effective secure key management for things authentication is the prerequisite of the security operations. Studying on the characteristics of things in the IOT deeply, this paper proposes a lightweight security key management scheme for Things to Things (T2T) communication in wireless networks of IOT which are usually composed of heterogeneous sensors/actuators or smart sensor-embedded things. Eventually, we evaluate the proposed scheme on storage overhead, communication overhead, computation overhead and resilience against nodes compromise attack, respectively.
Other authors -
TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things.
Journal of Computer Science and Information Systems, Vol. 8, No. 4, pp. 1207-1228
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large…
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is necessary to consider various security challenges that come with IoT/CPS, such as the detection of malicious attacks. Sensors or sensor embedded things may establish direct communication between each other using 6LoWPAN protocol. A trust and reputation model is recognized as an important approach to defend a large distributed sensor networks in IoT/CPS against malicious node attacks, since trust establishment mechanisms can stimulate collaboration among distributed computing and communication entities, facilitate the detection of untrustworthy entities, and assist decision-making process of various protocols. In this paper, based on in-depth understanding of trust establishment process and quantitative comparison among trust establishment methods, we present a trust and reputation model TRM-IoT to enforce the cooperation between things in a network of IoT/CPS based on their behaviors. The accuracy, robustness and lightness of the proposed model is validated through a wide set of simulations.
Other authors -
Study on the Interconnection Architecture and Access Technology for Internet of Things.
In Proc. of the 2011 International Conference on Computer Science and Service System, pp. 1744-1748
Internet of Things (IOT) is a novel paradigm developed on the basis of existing technologies and closely related to RFID, WSN, CPS, Pervasive Computing and M2M (Machine to Machine). IOT has broad prospects in transportation, logistics, healthcare, smart environment, personal living and social domain. This paper researches on the concept, characteristics and supporting technology of IOT, proposes an interconnection architecture of IOT from the view of business process and data flow. Then…
Internet of Things (IOT) is a novel paradigm developed on the basis of existing technologies and closely related to RFID, WSN, CPS, Pervasive Computing and M2M (Machine to Machine). IOT has broad prospects in transportation, logistics, healthcare, smart environment, personal living and social domain. This paper researches on the concept, characteristics and supporting technology of IOT, proposes an interconnection architecture of IOT from the view of business process and data flow. Then agent-based and 6LoWPAN-based access models towards sensors or sensor embedded things in IOT are presented and discussed. Eventually, supporting technologies of IOT are summarized.
Other authors -
A Novel P2P Based Grid Resource Discovery Model.
Journal of Computers, Vol. 6, No. 10, pp. 1390-1397
Resource discovery is a fundamental problem in grid systems. Original approaches to provide grid resource discovery services are either centralized or hierarchical and proved to be inefficient when the scale of grid systems rapidly increases. A P2P network is a distributed system with the attributes of dynamicity and scalability. P2P systems have the same goal as grid systems: to share and exchange various resources. With their development, P2P systems and grid systems can be combined into a…
Resource discovery is a fundamental problem in grid systems. Original approaches to provide grid resource discovery services are either centralized or hierarchical and proved to be inefficient when the scale of grid systems rapidly increases. A P2P network is a distributed system with the attributes of dynamicity and scalability. P2P systems have the same goal as grid systems: to share and exchange various resources. With their development, P2P systems and grid systems can be combined into a new system which has their attributes. In this paper, a novel hierarchical P2P based grid model based on the existing grid resource discovery models is discussed. In our model, Chord and Gnutella are selected as the typical protocols to form the virtual P2P layer. Through the experiment results, we argue that the 3C-2G model performs better than the other models in resource discovery among grids oriented to the same application field.
Other authors -
A Novel Secure Architecture for the Internet of Things.
In Proc. of the Fifth International Conference on Genetic and Evolutionary Computing, pp. 311-314
With the development of the IoT, different wireless communication technologies and edge network infrastructures are continuously integrated. Therefore, the corresponding communication network environment has become more complex and the security issues involved in the IoT are more complex than any existing network infrastructures. The trust relationship between the heterogeneous entities, security communication, security system and other security issues are more complex and difficult to solve…
With the development of the IoT, different wireless communication technologies and edge network infrastructures are continuously integrated. Therefore, the corresponding communication network environment has become more complex and the security issues involved in the IoT are more complex than any existing network infrastructures. The trust relationship between the heterogeneous entities, security communication, security system and other security issues are more complex and difficult to solve. In order to solve this kind of security problems, this paper gives the system structure, analyzes the security challenges and threats, proposes a novel security architecture for the IoT based on the research of these security demands, and eventually gives details of the designed security verification system.
Other authors -
Design and Implementation of a Portable ACE-Based IPC Platform.
In Proc. of 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010), pp. 502-505
ACE is a freely available, open-source object-oriented framework that implements many core design patterns for concurrent communication software. ACE provides reusable C++ wrappers, frameworks and real-time ORB available for most operating systems. In this paper, we introduce the functionality of ACE components, design an effective and portable IPC platform framework based on ACE middleware and implement the IPC platform system in C++. Eventually, we test our IPC platform, compare it with the…
ACE is a freely available, open-source object-oriented framework that implements many core design patterns for concurrent communication software. ACE provides reusable C++ wrappers, frameworks and real-time ORB available for most operating systems. In this paper, we introduce the functionality of ACE components, design an effective and portable IPC platform framework based on ACE middleware and implement the IPC platform system in C++. Eventually, we test our IPC platform, compare it with the non-ACE system and conclude its advantages and drawbacks.
Other authors -
An improvement to the Chord-based P2P routing algorithm.
In Proc. of the 2009 Fifth International Conference on Semantics, Knowledge and Grid (SKG 2009), pp. 266-269
Chord has been widely used as a routing protocol in structured peer-to-peer overlay networks. A fundamental problem of peer-to-peer applications is to efficiently locate the node that stores a particular data item. In fact, performance of structured peer-to-peer overlay networks depends on the routing protocols. The original Chord routing protocol based on DHT uses Finger Table to route. However, in the original model, there is redundancy information in the Finger Table. This paper analyzes the…
Chord has been widely used as a routing protocol in structured peer-to-peer overlay networks. A fundamental problem of peer-to-peer applications is to efficiently locate the node that stores a particular data item. In fact, performance of structured peer-to-peer overlay networks depends on the routing protocols. The original Chord routing protocol based on DHT uses Finger Table to route. However, in the original model, there is redundancy information in the Finger Table. This paper analyzes the routing algorithm of Chord protocol and presents an improvement strategy of original Chord routing algorithm. Results from theoretical analysis and experiments show that the routing performance of structured Chord-based overlay networks is improved.
Other authors
Courses
-
Algorithms
-
-
Applied Mathematical Statistics
-
-
Computer Architecture
-
-
Distributed Operating Systems
-
-
Distributed database system
-
-
Embedded computer systems
-
-
High-Performance Computer Architecture
-
-
Machine Learning
-
-
Networking
-
-
Numerical Analysis
-
-
Parallel Programming
-
-
Probabilites and Random Processes
-
Honors & Awards
-
New Entering PhD Fellowship
University of Massachusetts Amherst
-
Annual National Scholarship
Ministry of Education China
-
CSC International Fellowship
Ministry of Education, China
-
Huawei Scholarship
Huawei
-
Innovative Design Award of National Competition on Internet of Things
Chinese Institute of Electronics
-
New Academic Researcher Award for Doctoral Candidates
Ministry of Education, China
-
Best Academic Paper Award
China Institute of Communications in Liaoning
-
Outstanding Graduate Student Award of Northeastern University 2010
Northeastern University
Organizations
-
IEEE, ACM, CCF, ISOC
-
More activity by DONG
-
🏆 I am deeply honored and humbled to receive the "✨Best Paper Honorable Mention Award✨" at the prestigious ACM Multimedia Conference (ACM MM) 2024…
🏆 I am deeply honored and humbled to receive the "✨Best Paper Honorable Mention Award✨" at the prestigious ACM Multimedia Conference (ACM MM) 2024…
Liked by DONG CHEN
-
IEEE in the Media: https://lnkd.in/ey63YDSG The page highlights IEEE members who are technical experts and can speak to such topics as smart grid…
IEEE in the Media: https://lnkd.in/ey63YDSG The page highlights IEEE members who are technical experts and can speak to such topics as smart grid…
Liked by DONG CHEN
-
🚀 Excited to Share Our Recent Work! 🌟 GraphAgent — An innovative AI agent that efficiently integrates structured and unstructured data! 📚 👉…
🚀 Excited to Share Our Recent Work! 🌟 GraphAgent — An innovative AI agent that efficiently integrates structured and unstructured data! 📚 👉…
Liked by DONG CHEN
-
The Impact of Technology in 2025: For the second year, AI is predicted to be the most important area of tech in the year ahead in the IEEE Impact of…
The Impact of Technology in 2025: For the second year, AI is predicted to be the most important area of tech in the year ahead in the IEEE Impact of…
Liked by DONG CHEN
-
🚀 Lecturer/Senior Lecturer in Software Engineering 📍 Location: Macquarie University, Sydney, Australia 📆 Term: 4 years Join one of Australia’s…
🚀 Lecturer/Senior Lecturer in Software Engineering 📍 Location: Macquarie University, Sydney, Australia 📆 Term: 4 years Join one of Australia’s…
Liked by DONG CHEN
-
Excited to announce the release of the first version of SZ lossy compression, called hipSZ, now compatible with mainstream AI accelerators, including…
Excited to announce the release of the first version of SZ lossy compression, called hipSZ, now compatible with mainstream AI accelerators, including…
Liked by DONG CHEN
-
Congratulations to all of the CS@Mines 2024 Spring graduates! We're so proud of all of your accomplishments, best of luck for all future endeavours!…
Congratulations to all of the CS@Mines 2024 Spring graduates! We're so proud of all of your accomplishments, best of luck for all future endeavours!…
Liked by DONG CHEN
-
Great honored to receive this runner-up award at ACM EWSN'24 alongside my Ph.D. students: wang su, Keyang Yu, and Qi Li from Computer Science at…
Great honored to receive this runner-up award at ACM EWSN'24 alongside my Ph.D. students: wang su, Keyang Yu, and Qi Li from Computer Science at…
Shared by DONG CHEN
-
We are looking for candidates with strong background in machine learning and can apply ML/AI to solve emerging power system problems. The position…
We are looking for candidates with strong background in machine learning and can apply ML/AI to solve emerging power system problems. The position…
Liked by DONG CHEN
-
Thrilled to share that my PhD student, Nan Jiang, is on the academic job market! 👏 Working on SE+AI, Nan has papers in ICSE, FSE, NeurIPS, AAAI, and…
Thrilled to share that my PhD student, Nan Jiang, is on the academic job market! 👏 Working on SE+AI, Nan has papers in ICSE, FSE, NeurIPS, AAAI, and…
Liked by DONG CHEN
-
I am immensely proud to share that my PhD student, qi le, has received the Best Student Paper Award at this year's IEEE BigData…
I am immensely proud to share that my PhD student, qi le, has received the Best Student Paper Award at this year's IEEE BigData…
Liked by DONG CHEN
-
Congratulations to Phuthipong Bovornkeeratiroj (Nikko) on successfully defending his Ph.D thesis titled "Accelerating Sustainability of the Electric…
Congratulations to Phuthipong Bovornkeeratiroj (Nikko) on successfully defending his Ph.D thesis titled "Accelerating Sustainability of the Electric…
Liked by DONG CHEN
-
I'll be at #NeurIPS2024 on Dec. 13-15 (Friday-Sunday) to (co-)present our recent works on #data-related optimization for #ML, hierarchical…
I'll be at #NeurIPS2024 on Dec. 13-15 (Friday-Sunday) to (co-)present our recent works on #data-related optimization for #ML, hierarchical…
Liked by DONG CHEN
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named DONG CHEN in United States
-
Dong Chen
-
Dong Chen
-
Dong Chen
-
DONG CHEN
HRIS Independent Consultant
-
Dong Chen
Professions in Financial Service Industry
169 others named DONG CHEN in United States are on LinkedIn
See others named DONG CHEN