Research Output per year
Research Output 1989 2019
- 1 - 50 out of 212 results
- Type (ascending)
A comparative study of spatio-temporal hotspot analysis techniques in security informatics
Zeng, D., Chang, W. & Chen, H., 2004, IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC. p. 106-111 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A computational approach to detecting and assessing sustainability-related communities in social media
Jiang, S. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. Vol. 1. p. 48-58 11 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A control study on the effects of HRV biofeedback therapy in patients with post-stroke depression
Li, X., Zhang, T., Song, L., Zhang, Y., Xing, C. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Affect intensity analysis of dark web forums
Abbasi, A. & Chen, H., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 282-288 7 p. 4258712Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A framework for exploring Gray Web Forums: Analysis of forum-based communities in Taiwan
Wang, J. H., Fu, T., Lin, H. M. & Chen, H., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS. p. 498-503 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A framework for stylometric similarity detection in online settings
Abbasi, A. & Chen, H., 2007, Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. Vol. 2. p. 1442-1451 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A graph-based recommender system for digital library
Huang, Z., Chung, W., Ong, T. H. & Chen, H., 2002, Proceedings of the ACM International Conference on Digital Libraries. Marchionini, G. & Hersh, W. (eds.). p. 65-73 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Algorithmic approach to building concept space for a scientific community
Chen, H., 1994, Proceedings of the Hawaii International Conference on System Sciences. Nunamaker, J. F. & Sprague, R. H. J. (eds.). Publ by IEEE, Vol. 4. p. 201-210 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A multi-layer Naïve Bayes model for approximate identity matching
Wang, G. A., Chen, H. & Atabakhsh, H., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS. p. 479-484 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A multi-theoretical framework for hypotheses testing of temporal network patterns
Jiang, S. & Chen, H., 2014, 35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014. Association for Information SystemsResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution
Analysis of cyberactivism: A case study of online free Tibet activities
Fu, T. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 1-6 6 p. 4565020Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Analyzing and visualizing gray Web forum structure
Yang, C. C., Ng, T. D., Wang, J. H., Wei, C. P. & Chen, H., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4430 LNCS. p. 21-33 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Analyzing terrorist networks: A case study of the global salafi jihad network
Qin, J., Xu, J. J., Hu, D., Sageman, M. & Chen, H., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 287-304 18 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
An event-driven SIR model for topic diffusion in web forums
Woo, J. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
An integrated approach to mapping worldwide bioterrorism research capabilities
Dang, Y., Zhang, Y., Suakkaphong, N., Larson, C. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 212-214 3 p. 4565059Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Anonymous port scanning: Performing network reconnaissance through Tor
Rohrmann, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 217 1 p. 7745475Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A novel spatio-temporal data analysis approach based on prospective support vector clustering
Chang, W., Zeng, D. & Chen, H., 2005, 15th Workshop on Information Technology and Systems, WITS 2005. University of Arizona, p. 129-134 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
An SIR model for violent topic diffusion in social media
Woo, J., Son, J. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Applying authorship analysis to Arabic web content
Abbasi, A. & Chen, H., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 183-197 15 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A probabilistic model for approximate identity matching
Wang, G. A., Chen, H. & Atabakhsh, H., 2006, ACM International Conference Proceeding Series. Vol. 151. p. 462-463 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A review of public health syndromic surveillance systems
Yan, P., Zeng, D. & Chen, H., 2006, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3975 LNCS. p. 249-260 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Assessing medical device vulnerabilities on the Internet of Things
McMahon, E., Williams, R., El, M., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 176-178 3 p. 8004903Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Automatic patent classification using citation network information: An experimental study in nanotechnology
Li, X., Chen, H., Zhang, Z. & Li, J., 2007, Proceedings of the ACM International Conference on Digital Libraries. p. 419-427 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
A web-based system for infectious disease data integration and sharing: Evaluating outcome, task performance efficiency, user information satisfaction, and usability
Hu, P. J. H., Zeng, D., Chen, H., Larson, C. A. & Tseng, C., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4506 LNCS. p. 134-146 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums
Liu, X. & Chen, H., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8040 LNCS. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
AZpharm metaalert: A meta-learning framework for pharmacovigilance
Liu, X. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Springer Verlag, Vol. 10219 LNCS. p. 147-154 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis
Samtani, S., Chinn, K., Larson, C. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-24 6 p. 7745437Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Benchmarking vulnerability assessment tools for enhanced cyber-physical system (CPS) Resiliency
McMahon, E., Patton, M., Samtani, S. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 8587353Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments
El, M., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 83-88 6 p. 8004879Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
BioPortal: A case study in infectious disease informatics
Zeng, D., Chen, H., Tseng, C., Chang, W., Eidson, M., Gotham, I. & Lynch, C., 2005, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. p. 418 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
BioPortal: A scalable information sharing and analysis environment for disease informatics
Zeng, D., Chen, H. & Chang, W., 2005, 15th Workshop on Information Technology and Systems, WITS 2005. University of Arizona, p. 268 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
BioPortal: Sharing and analyzing infectious disease information
Zeng, D., Chen, H., Tseng, C., Larson, C., Chang, W., Eidson, M., Gotham, I., Lynch, C. & Ascher, M., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 612-613 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study
Lu, H. M., Zeng, D. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 76-81 6 p. 4565033Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Border Safe: Cross-jurisdictional information sharing, analysis, and visualization
Kaza, S., Marshall, B., Xu, J., Wang, A. G., Gowda, H., Atabakhsh, H., Petersen, T., Violette, C. & Chen, H., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 669-670 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Botnets, and the cybercriminal underground
Mielke, C. J. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 206-211 6 p. 4565058Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Building a directory for the underdeveloped web: An experiment on the arabic medical web directory
Chung, W. & Chen, H., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4822 LNCS. p. 468-477 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4822 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Building knowledge management system for researching terrorist groups on the web
Zhou, Y., Qin, J., Lai, G., Reid, E. & Chen, H., 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. Vol. 5. p. 2524-2536 13 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Building web directories in different languages for decision support: A semi-automatic approach
Chung, W., Lai, G., Bonillas, A., Elhourani, T., Tseng, T. L. B. & Chen, H., 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. Vol. 1. p. 467-475 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Business intelligence explorer: A knowledge map framework for discovering business intelligence on the Web
Chung, W., Chen, H. & Nunamaker, J. F., 2003, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003. Institute of Electrical and Electronics Engineers Inc., 1173649Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Categorization and analysis of text in computer mediated communication archives using visualization
Abbasi, A. & Chen, H., 2007, Proceedings of the ACM International Conference on Digital Libraries. p. 11-18 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Chinese chief complaint classification for syndromic surveillance
Lu, H. M., King, C. C., Wu, T. S., Shih, F. Y., Hsiao, J. Y., Zeng, D. & Chen, H., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4506 LNCS. p. 11-22 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Chinese underground market jargon analysis based on unsupervised learning
Zhao, K., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 97-102 6 p. 7745450Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Chronic disease related entity extraction in online Chinese question and answer services
Zhang, Y., Zhang, Y., Yin, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 55-67 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
CMedPort: A cross-regional Chinese medical portal
Zhou, Y., Qin, J., Chen, H., Huang, Z., Zhang, Y., Chung, W. & Wang, G., 2003, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. Institute of Electrical and Electronics Engineers Inc., Vol. 2003-January. p. 379 1 p. 1204895Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Collaborative friendship networks in online healthcare communities: An exponential random graph model analysis
Song, X., Jiang, S., Yan, X. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 75-87 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Collaborative information retrieval environment: Integration of information retrieval with group support systems
Romano, N. C., Roussinov, D., Nunamaker, J. F. & Chen, H., 1999, Proceedings of the Hawaii International Conference on System Sciences. IEEE Comp Soc, p. 33 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Collecting and analyzing the presence of terrorists on the Web: A case study of Jihad Websites
Reid, E., Qin, J., Zhou, Y., Lai, G., Sageman, M., Weimann, G. & Chen, H., 2005, Lecture Notes in Computer Science. Kantor, P., Muresan, G., Roberts, F., Zeng, D. D., Wang, F-Y., Chen, H. & Merkle, R. C. (eds.). Vol. 3495. p. 402-411 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Collection of U.S. extremist online forums: A web mining approach
Zhou, Y., Qin, J., Lai, G. & Chen, H., 2007, Proceedings of the Annual Hawaii International Conference on System Sciences. 4076513Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Combining probability model and Web mining model: A framework for proper name transliteration
Zhou, Y., Huang, F. & Chen, H., 2005, 15th Workshop on Information Technology and Systems, WITS 2005. University of Arizona, p. 135-140 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Comparing the virtual linkage intensity and real world proximity of social movements
Zimbra, D. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 144-146 3 p. 5484759Research output: Chapter in Book/Report/Conference proceeding › Conference contribution