• 17202 Citations
  • 66 h-Index
1989 …2019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1989 2019

Filter
Conference contribution
20 Citations (Scopus)

A comparative study of spatio-temporal hotspot analysis techniques in security informatics

Zeng, D., Chang, W. & Chen, H., 2004, IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC. p. 106-111 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

National security
Crime
Information technology
Support vector machines
Information systems
2 Citations (Scopus)

A computational approach to detecting and assessing sustainability-related communities in social media

Jiang, S. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. Vol. 1. p. 48-58 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Sustainability
social media
Sustainable development
sustainability

A control study on the effects of HRV biofeedback therapy in patients with post-stroke depression

Li, X., Zhang, T., Song, L., Zhang, Y., Xing, C. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biofeedback
Heart Rate Variability
Stroke
Therapy
Resonant Frequency
54 Citations (Scopus)

Affect intensity analysis of dark web forums

Abbasi, A. & Chen, H., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 282-288 7 p. 4258712

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making
Violence
9 Citations (Scopus)

A framework for exploring Gray Web Forums: Analysis of forum-based communities in Taiwan

Wang, J. H., Fu, T., Lin, H. M. & Chen, H., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS. p. 498-503 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Taiwan
Virtual Community
Thread
Metric
Community

A framework for stylometric similarity detection in online settings

Abbasi, A. & Chen, H., 2007, Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. Vol. 2. p. 1442-1451 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
anonymity
Electronic mail
Authentication
Websites
118 Citations (Scopus)

A graph-based recommender system for digital library

Huang, Z., Chung, W., Ong, T. H. & Chen, H., 2002, Proceedings of the ACM International Conference on Digital Libraries. Marchionini, G. & Hersh, W. (eds.). p. 65-73 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital libraries
Recommender systems
Testing
4 Citations (Scopus)

Algorithmic approach to building concept space for a scientific community

Chen, H., 1994, Proceedings of the Hawaii International Conference on System Sciences. Nunamaker, J. F. & Sprague, R. H. J. (eds.). Publ by IEEE, Vol. 4. p. 201-210 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automatic indexing
Data storage equipment
Thesauri
Cluster analysis
Testbeds
5 Citations (Scopus)

A multi-layer Naïve Bayes model for approximate identity matching

Wang, G. A., Chen, H. & Atabakhsh, H., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS. p. 479-484 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Approximate Identity
Bayes
Multilayer
Supervised learning
Learning
1 Citation (Scopus)

A multi-theoretical framework for hypotheses testing of temporal network patterns

Jiang, S. & Chen, H., 2014, 35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014. Association for Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Stars
Testing
12 Citations (Scopus)

Analysis of cyberactivism: A case study of online free Tibet activities

Fu, T. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 1-6 6 p. 4565020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Seed
Statistics
Internet
5 Citations (Scopus)

Analyzing and visualizing gray Web forum structure

Yang, C. C., Ng, T. D., Wang, J. H., Wei, C. P. & Chen, H., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4430 LNCS. p. 21-33 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual Community
Law enforcement
Electric network analysis
Visualization
Communication
37 Citations (Scopus)

Analyzing terrorist networks: A case study of the global salafi jihad network

Qin, J., Xu, J. J., Hu, D., Sageman, M. & Chen, H., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 287-304 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Terrorism
Reinforcement
3 Citations (Scopus)

An event-driven SIR model for topic diffusion in web forums

Woo, J. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

An integrated approach to mapping worldwide bioterrorism research capabilities

Dang, Y., Zhang, Y., Suakkaphong, N., Larson, C. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 212-214 3 p. 4565059

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bioterrorism
Biological weapons
Productivity
Monitoring

Anonymous port scanning: Performing network reconnaissance through Tor

Rohrmann, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 217 1 p. 7745475

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scanning
Retaliation
4 Citations (Scopus)

A novel spatio-temporal data analysis approach based on prospective support vector clustering

Chang, W., Zeng, D. & Chen, H., 2005, 15th Workshop on Information Technology and Systems, WITS 2005. University of Arizona, p. 129-134 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Support vector machines
Data mining
Statistics
Engines
13 Citations (Scopus)

An SIR model for violent topic diffusion in social media

Woo, J., Son, J. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logistics
26 Citations (Scopus)

Applying authorship analysis to Arabic web content

Abbasi, A. & Chen, H., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 183-197 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Communication
Electronic mail
Syntactics
Websites

A probabilistic model for approximate identity matching

Wang, G. A., Chen, H. & Atabakhsh, H., 2006, ACM International Conference Proceeding Series. Vol. 151. p. 462-463 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supervised learning
Unsupervised learning
National security
Labeling
Statistical Models
12 Citations (Scopus)

A review of public health syndromic surveillance systems

Yan, P., Zeng, D. & Chen, H., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS. p. 249-260 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bioterrorism
Public Health Surveillance
Informatics
Public Health
Public health
6 Citations (Scopus)

Assessing medical device vulnerabilities on the Internet of Things

McMahon, E., Williams, R., El, M., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 176-178 3 p. 8004903

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Industry
Servers
Internet
Internet of things
25 Citations (Scopus)

Automatic patent classification using citation network information: An experimental study in nanotechnology

Li, X., Chen, H., Zhang, Z. & Li, J., 2007, Proceedings of the ACM International Conference on Digital Libraries. p. 419-427 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

nanotechnology
Nanotechnology
patent
Digital libraries
Testbeds
3 Citations (Scopus)

A web-based system for infectious disease data integration and sharing: Evaluating outcome, task performance efficiency, user information satisfaction, and usability

Hu, P. J. H., Zeng, D., Chen, H., Larson, C. A. & Tseng, C., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4506 LNCS. p. 134-146 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web-based System
Data Sharing
Information Dissemination
Data integration
Infectious Diseases
62 Citations (Scopus)

AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

Liu, X. & Chen, H., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8040 LNCS. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information Extraction
Mining
Drugs
Marketing
Health

AZpharm metaalert: A meta-learning framework for pharmacovigilance

Liu, X. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Springer Verlag, Vol. 10219 LNCS. p. 147-154 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Meta-learning
Signal detection
Drugs
Signal Detection
Health
12 Citations (Scopus)

AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis

Samtani, S., Chinn, K., Larson, C. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-24 6 p. 7745437

Research output: Chapter in Book/Report/Conference proceedingConference contribution

National security
Malware
Threat
Assets
Learning systems

Benchmarking vulnerability assessment tools for enhanced cyber-physical system (CPS) Resiliency

McMahon, E., Patton, M., Samtani, S. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 8587353

Research output: Chapter in Book/Report/Conference proceedingConference contribution

benchmarking
Benchmarking
vulnerability
Scalability
Search engines
3 Citations (Scopus)

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments

El, M., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 83-88 6 p. 8004879

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benchmarking
Data acquisition
Websites
Experiments
Scalability
5 Citations (Scopus)

BioPortal: A case study in infectious disease informatics

Zeng, D., Chen, H., Tseng, C., Chang, W., Eidson, M., Gotham, I. & Lynch, C., 2005, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. p. 418 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

BioPortal: A scalable information sharing and analysis environment for disease informatics

Zeng, D., Chen, H. & Chang, W., 2005, 15th Workshop on Information Technology and Systems, WITS 2005. University of Arizona, p. 268 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

BioPortal: Sharing and analyzing infectious disease information

Zeng, D., Chen, H., Tseng, C., Larson, C., Chang, W., Eidson, M., Gotham, I., Lynch, C. & Ascher, M., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 612-613 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Infectious Diseases
Sharing
3 Citations (Scopus)

Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study

Lu, H. M., Zeng, D. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 76-81 6 p. 4565033

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bioterrorism
Time series
Hidden Markov models
Parameter estimation
Sales
1 Citation (Scopus)

Border Safe: Cross-jurisdictional information sharing, analysis, and visualization

Kaza, S., Marshall, B., Xu, J., Wang, A. G., Gowda, H., Atabakhsh, H., Petersen, T., Violette, C. & Chen, H., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 669-670 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
13 Citations (Scopus)

Botnets, and the cybercriminal underground

Mielke, C. J. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 206-211 6 p. 4565058

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Economics
Botnet

Building a directory for the underdeveloped web: An experiment on the arabic medical web directory

Chung, W. & Chen, H., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4822 LNCS. p. 468-477 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Directories
Websites
Experiment
Experiments
Browsing
6 Citations (Scopus)

Building knowledge management system for researching terrorist groups on the web

Zhou, Y., Qin, J., Lai, G., Reid, E. & Chen, H., 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. Vol. 5. p. 2524-2536 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Knowledge management
knowledge management
World Wide Web
Data mining
Websites

Building web directories in different languages for decision support: A semi-automatic approach

Chung, W., Lai, G., Bonillas, A., Elhourani, T., Tseng, T. L. B. & Chen, H., 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. Vol. 1. p. 467-475 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making
decision making
language
rating
expert
35 Citations (Scopus)

Business intelligence explorer: A knowledge map framework for discovering business intelligence on the Web

Chung, W., Chen, H. & Nunamaker, J. F., 2003, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003. Institute of Electrical and Electronics Engineers Inc., 1173649

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Competitive intelligence
Display devices
Websites
Visualization
Search engines
18 Citations (Scopus)

Categorization and analysis of text in computer mediated communication archives using visualization

Abbasi, A. & Chen, H., 2007, Proceedings of the ACM International Conference on Digital Libraries. p. 11-18 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer-mediated communication
Ink
visualization
Visualization
Digital libraries
1 Citation (Scopus)

Chinese chief complaint classification for syndromic surveillance

Lu, H. M., King, C. C., Wu, T. S., Shih, F. Y., Hsiao, J. Y., Zeng, D. & Chen, H., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4506 LNCS. p. 11-22 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Surveillance
Taiwan
Mutual Information
Valid
Evaluation
1 Citation (Scopus)

Chinese underground market jargon analysis based on unsupervised learning

Zhao, K., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 97-102 6 p. 7745450

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unsupervised learning
Testbeds
Learning systems
Market analysis
1 Citation (Scopus)

Chronic disease related entity extraction in online Chinese question and answer services

Zhang, Y., Zhang, Y., Yin, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 55-67 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chronic Disease
Health
Equivalence
Feature extraction
Tagging
4 Citations (Scopus)

CMedPort: A cross-regional Chinese medical portal

Zhou, Y., Qin, J., Chen, H., Huang, Z., Zhang, Y., Chung, W. & Wang, G., 2003, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. Institute of Electrical and Electronics Engineers Inc., Vol. 2003-January. p. 379 1 p. 1204895

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Collaborative friendship networks in online healthcare communities: An exponential random graph model analysis

Song, X., Jiang, S., Yan, X. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 75-87 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Graph Model
Model Analysis
Random Graphs
Healthcare
Health
36 Citations (Scopus)

Collaborative information retrieval environment: Integration of information retrieval with group support systems

Romano, N. C., Roussinov, D., Nunamaker, J. F. & Chen, H., 1999, Proceedings of the Hawaii International Conference on System Sciences. IEEE Comp Soc, p. 33 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information retrieval systems
Information retrieval
14 Citations (Scopus)

Collecting and analyzing the presence of terrorists on the Web: A case study of Jihad Websites

Reid, E., Qin, J., Zhou, Y., Lai, G., Sageman, M., Weimann, G. & Chen, H., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 402-411 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Websites
Terrorism
Internet
Costs
11 Citations (Scopus)

Collection of U.S. extremist online forums: A web mining approach

Zhou, Y., Qin, J., Lai, G. & Chen, H., 2007, Proceedings of the Annual Hawaii International Conference on System Sciences. 4076513

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Monitoring
Communication
Chemical analysis

Combining probability model and Web mining model: A framework for proper name transliteration

Zhou, Y., Huang, F. & Chen, H., 2005, 15th Workshop on Information Technology and Systems, WITS 2005. University of Arizona, p. 135-140 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hidden Markov models
Speech analysis
Data mining
Learning systems
Websites
1 Citation (Scopus)

Comparing the virtual linkage intensity and real world proximity of social movements

Zimbra, D. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 144-146 3 p. 5484759

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual reality