• 17202 Citations
  • 66 h-Index
1989 …2019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1989 2019

Filter
Conference contribution
2019

Dark-net ecosystem cyber-threat intelligence (CTI) Tool

Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 92-97 6 p. 8823501. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Costs
Threat
Ecosystem
Industry

Identifying high-impact opioid products and key sellers in dark net marketplaces: An interpretable text analytics approach

Du, P. Y., Ebrahimi, M., Zhang, N., Chen, H., Brown, R. A. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 8823196. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Law enforcement
Public health
Learning systems
Internet
Costs

Performance modeling of hyperledger sawtooth blockchain

Ampel, B., Patton, M. & Chen, H., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 59-61 3 p. 8823238. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benchmarking
Modeling
2018

Benchmarking vulnerability assessment tools for enhanced cyber-physical system (CPS) Resiliency

McMahon, E., Patton, M., Samtani, S. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 8587353

Research output: Chapter in Book/Report/Conference proceedingConference contribution

benchmarking
Benchmarking
vulnerability
Scalability
Search engines
1 Citation (Scopus)

Detecting cyber threats in non-english dark net markets: A cross-lingual transfer learning approach

Ebrahimi, M., Surdeanu, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 8587404

Research output: Chapter in Book/Report/Conference proceedingConference contribution

hacker
threat
market
learning
community
1 Citation (Scopus)

Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs

Du, P. Y., Zhang, N., Ebrahimi, M., Samtani, S., Lazarine, B., Arnold, N., Dunn, R., Suntwal, S., Angeles, G., Schweitzer, R. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 70-75 6 p. 8587327

Research output: Chapter in Book/Report/Conference proceedingConference contribution

hacker
Internet
community
Costs
intelligence
1 Citation (Scopus)

Incremental hacker forum exploit collection and classification for proactive cyber threat intelligence: An exploratory study

Williams, R., Samtani, S., Patton, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. 8587336

Research output: Chapter in Book/Report/Conference proceedingConference contribution

hacker
intelligence
threat
Recurrent neural networks
Metadata

Motion sensor-based assessment on fall risk and Parkinson's disease severity: A deep multi-source multi-task learning (DMML) Approach

Yu, S., Chen, H., Brown, R. & Sherman, S. J., Jul 24 2018, Proceedings - 2018 IEEE International Conference on Healthcare Informatics, ICHI 2018. Institute of Electrical and Electronics Engineers Inc., p. 174-179 6 p. 8419360

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Parkinson Disease
Learning
Sensors
Independent Living
Benchmarking

Vulnerability assessment, remediation, and automated reporting: Case studies of higher education institutions

Harrell, C. R., Patton, M., Chen, H. & Samtani, S., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 148-153 6 p. 8587380

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Remediation
vulnerability
Education
education
Virtual reality
2017
6 Citations (Scopus)

Assessing medical device vulnerabilities on the Internet of Things

McMahon, E., Williams, R., El, M., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 176-178 3 p. 8004903

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Industry
Servers
Internet
Internet of things

AZpharm metaalert: A meta-learning framework for pharmacovigilance

Liu, X. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Springer Verlag, Vol. 10219 LNCS. p. 147-154 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Meta-learning
Signal detection
Drugs
Signal Detection
Health
3 Citations (Scopus)

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments

El, M., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 83-88 6 p. 8004879

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benchmarking
Data acquisition
Websites
Experiments
Scalability
2 Citations (Scopus)

Fall detection with orientation calibration using a single motion sensor

Yu, S. & Chen, H., 2017, Wireless Mobile Communication and Healthcare - 6th International Conference, MobiHealth 2016, Proceedings. Springer Verlag, Vol. 192. p. 233-240 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 192).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Calibration
Sensors
Learning systems
Students
Costs
4 Citations (Scopus)

Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence

Grisham, J., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 8004867

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recurrent neural networks
Electric network analysis
Network architecture
Application programs
Malware
15 Citations (Scopus)

Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach

Williams, R., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 179-181 3 p. 8004904

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Internet of things
Vulnerability
Internet
Industry
1 Citation (Scopus)

Silverlink: Developing an international smart and connected home monitoring system for senior care

Maimoon, L., Chuang, J., Zhu, H., Yu, S., Peng, K. S. A., Prayakarao, R., Bai, J., Zeng, D., Li, S. H., Lu, H. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Springer Verlag, Vol. 10219 LNCS. p. 65-77 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring System
Health
Monitoring
Aging of materials
Anomaly Detection
2016

Anonymous port scanning: Performing network reconnaissance through Tor

Rohrmann, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 217 1 p. 7745475

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scanning
Retaliation
12 Citations (Scopus)

AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis

Samtani, S., Chinn, K., Larson, C. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-24 6 p. 7745437

Research output: Chapter in Book/Report/Conference proceedingConference contribution

National security
Malware
Threat
Assets
Learning systems
1 Citation (Scopus)

Chinese underground market jargon analysis based on unsupervised learning

Zhao, K., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 97-102 6 p. 7745450

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unsupervised learning
Testbeds
Learning systems
Market analysis
1 Citation (Scopus)

Chronic disease related entity extraction in online Chinese question and answer services

Zhang, Y., Zhang, Y., Yin, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 55-67 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chronic Disease
Health
Equivalence
Feature extraction
Tagging
4 Citations (Scopus)

Deep learning based topic identification and categorization: Mining diabetes-related topics on Chinese health websites

Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9642. p. 481-500 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9642).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Diabetes
Categorization
Medical problems
Websites
Mining
1 Citation (Scopus)

Diabeticlink: An internationally collaborative cyber-enabled patient empowerment platform

Samtani, G., Maimoon, L., Chuang, J., Nybroe, C., Liu, X., Wiil, U., Li, S. H. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 299-310 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medical problems
Self-management
Health
Diabetes
Diabetes Mellitus
8 Citations (Scopus)

Exploring key hackers and cybersecurity threats in Chinese hacker communities

Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 7745436

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threat
Topic model
Fraud
Language
Communication channels
3 Citations (Scopus)

Exploring the online underground marketplaces through topic-based social network and clustering

Huang, S. Y. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 145-150 6 p. 7745458

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Internet
Industry
Experiments
Social networks

Health-related spammer detection on chinese social media

Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 284-295 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Health
Belief Networks
Bayesian networks
Baseline
1 Citation (Scopus)

Identifying devices across the IPv4 address space

Jicha, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 199-201 3 p. 7745469

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Scanning
World Wide Web
1 Citation (Scopus)

Identifying high quality carding services in underground economy using nonparametric supervised topic model

Li, W., Yin, J. & Chen, H., 2016, 2016 International Conference on Information Systems, ICIS 2016. Association for Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Testbeds
1 Citation (Scopus)

Identifying language groups within multilingual cybercriminal forums

Benjamin, V. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 205-207 3 p. 7745471

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supply chains
Neural networks
Language
Language model
Russia
8 Citations (Scopus)

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

Samtani, S., Yu, S., Zhu, H., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 25-30 6 p. 7745438

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SCADA systems
Data acquisition
Critical infrastructures
Internet
Sewage
3 Citations (Scopus)

Identifying the socio-spatial dynamics of terrorist attacks in the Middle East

Li, Z., Sun, D., Chen, H. & Huang, S. Y., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7745463

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Terrorism
Information science
Backpropagation
Statistical methods
2 Citations (Scopus)

Identifying top listers in Alphabay using Latent Dirichlet Allocation

Grisham, J., Barreras, C., Afarin, C., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 219 1 p. 7745477

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sales
Dirichlet

Intelligence and security informatics: 11th Pacific Asia workshop, PAISI 2016 Auckland, New Zealand, April 19, 2016 proceedings

Chau, M., Alan Wang, G. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9650. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9650).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligence

NATERGM: A model for examining the role of Nodal Attributes in dynamic social media networks

Jiang, S. & Chen, H., Jun 22 2016, 2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1458-1459 2 p. 7498373

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Social media
Graph model
Random graphs
Testing
12 Citations (Scopus)

SCADA honeypots: An in-depth analysis of Conpot

Jicha, A., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 196-198 3 p. 7745468

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data acquisition
2 Citations (Scopus)

Sentiment analysis on chinese health forums: A preliminary study of different language models

Zhang, Y., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 68-81 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sentiment Analysis
Language Model
Health
Hybrid Approach
Multiple Models
2 Citations (Scopus)

Shodan visualized

Ercolani, V. J., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 193-195 3 p. 7745467

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Modularity
Centrality
Layout
Node
3 Citations (Scopus)

Silverlink: Smart home health monitoring for senior care

Chuang, J., Maimoon, L., Yu, S., Zhu, H., Nybroe, C., Hsiao, O., Li, S. H., Lu, H. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 3-14 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart Home
Health Monitoring
Health
Monitoring
China
1 Citation (Scopus)

Targeting key data breach services in underground supply chain

Li, W., Yin, J. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 322-324 3 p. 7745501

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supply chains
Experiments
Supply chain
Targeting
Breach
5 Citations (Scopus)

Using social network analysis to identify key hackers for keylogging tools in hacker forums

Samtani, S. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 319-321 3 p. 7745500

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Costs
Social network analysis
Attack
2015
7 Citations (Scopus)

Developing understanding of hacker language through the use of lexical semantics

Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943

Research output: Chapter in Book/Report/Conference proceedingConference contribution

hacker
Recurrent neural networks
Semantics
semantics
neural network
23 Citations (Scopus)

Exploring hacker assets in underground forums

Samtani, S., Chinn, R. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-36 6 p. 7165935

Research output: Chapter in Book/Report/Conference proceedingConference contribution

hacker
assets
Industry
Education
community
41 Citations (Scopus)

Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

Benjamin, V., Li, W., Holt, T. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7165944

Research output: Chapter in Book/Report/Conference proceedingConference contribution

hacker
Information retrieval
Learning systems
vulnerability
threat

Intelligence and security informatics: Pacific Asia Workshop, PAISI 2015 Ho Chi Minh City, Vietnam, May 19, 2015 proceedings

Chau, M., Wang, G. A. & Chen, H., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9074. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9074).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Tensor-based learning for predicting stock movements

Li, Q., Jiang, L., Li, P. & Chen, H., Jun 1 2015, Proceedings of the National Conference on Artificial Intelligence. AI Access Foundation, Vol. 3. p. 1784-1790 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tensors
Experiments
Financial markets
2014

A control study on the effects of HRV biofeedback therapy in patients with post-stroke depression

Li, X., Zhang, T., Song, L., Zhang, Y., Xing, C. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biofeedback
Heart Rate Variability
Stroke
Therapy
Resonant Frequency
1 Citation (Scopus)

A multi-theoretical framework for hypotheses testing of temporal network patterns

Jiang, S. & Chen, H., 2014, 35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014. Association for Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Stars
Testing
4 Citations (Scopus)

Collaborative friendship networks in online healthcare communities: An exponential random graph model analysis

Song, X., Jiang, S., Yan, X. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 75-87 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Graph Model
Model Analysis
Random Graphs
Healthcare
Health
25 Citations (Scopus)

Descriptive analytics: Examining expert hackers in web forums

Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Diabetes-related topic detection in Chinese health websites using deep learning

Chen, X., Zhang, Y., Xing, C., Liu, X. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Diabetes
Medical problems
Websites
Health
Testbed
3 Citations (Scopus)

DiabeticLink: An integrated and intelligent cyber-enabled health social platform for diabetic patients

Chuang, J., Hsiao, O., Wu, P. L., Chen, J., Liu, X., De La Cruz, H., Li, S. H. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 63-74 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Self-management
Health
Diabetes
Taiwan
Medical problems