• 17202 Citations
  • 66 h-Index
1989 …2019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1989 2019

Filter
Conference contribution
2014
1 Citation (Scopus)

Emoticon analysis for Chinese health and fitness topics

Yu, S., Zhu, H., Jiang, S. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fitness
Health
Social Media
Facial Expression
Semantics
1 Citation (Scopus)

Healthcare analytics and clinical intelligence: A risk prediction framework for chronic care completed research paper

Lin, Y. K., Chen, H., Brown, R. A., Li, S. H. & Yang, H. J., 2014, 24th Workshop on Information Technology and Systems. University of Auckland Business School

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Decision making
Medical problems
Information systems
Experiments
5 Citations (Scopus)

HealthQA: A Chinese QA summary system for smart health

Yin, Y., Zhang, Y., Liu, X., Zhang, Y., Xing, C. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 51-62 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medical problems
Search engines
Websites
Question Answering System
Information Quality
16 Citations (Scopus)

Identifying adverse drug events from health social media: A case study on heart disease discussion forums

Liu, X., Liu, J. & Chen, H., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 8549 LNCS. p. 25-36 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Drugs
Health
Drug interactions
Heart
20 Citations (Scopus)

Identifying top sellers in underground economy using deep learning-based sentiment analysis

Li, W. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 64-67 4 p. 6975555

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Crime
Computer crime
Feedback
Ecosystems
Sales
9 Citations (Scopus)

Time-to-event modeling for predicting hacker IRC community participant trajectory

Benjamin, V. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 6975550

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trajectories
Internet
Communication
47 Citations (Scopus)

Uninvited connections: A study of vulnerable devices on the internet of things (IoT)

Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 232-235 4 p. 6975580

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Internet of things
2013
2 Citations (Scopus)

A computational approach to detecting and assessing sustainability-related communities in social media

Jiang, S. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. Vol. 1. p. 48-58 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Sustainability
social media
Sustainable development
sustainability
62 Citations (Scopus)

AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

Liu, X. & Chen, H., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8040 LNCS. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information Extraction
Mining
Drugs
Marketing
Health
8 Citations (Scopus)

DiabeticLink: A health big data system for patient empowerment and personalized healthcare

Chen, H., Compton, S. & Hsiao, O., 2013, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8040 LNCS. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Healthcare
Health
Web Mining
Chronic Disease
Data Assimilation
3 Citations (Scopus)

Evaluating text visualization: An experiment in authorship analysis

Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Experiments
Terrorism
Testbeds
Learning systems
11 Citations (Scopus)

Machine learning for attack vector identification in malicious source code

Benjamin, V. A. & Chen, H., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 21-23 3 p. 6578779

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Identification (control systems)
Information technology
Malware
Feature extraction
4 Citations (Scopus)

Statistical modeling of nanotechnology knowledge diffusion networks

Jiang, S., Gao, Q. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. Vol. 4. p. 3552-3571 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nanotechnology
Statistical Modeling
nanotechnology
funding
knowledge
2012
3 Citations (Scopus)

An event-driven SIR model for topic diffusion in web forums

Woo, J. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

Evaluating an integrated forum portal for terrorist surveillance and analysis

Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Processing
2 Citations (Scopus)

Partially supervised learning for radical opinion identification in hate group web forums

Yang, M. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 96-101 6 p. 6284099

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supervised learning
Labeling
Labels
5 Citations (Scopus)

Scalable sentiment classification across multiple dark web forums

Zimbra, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 78-83 6 p. 6284095

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classifiers
Scalability
37 Citations (Scopus)

Securing cyberspace: Identifying key actors in hacker communities

Benjamin, V. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology

SHB 2012: International workshop on smart health and wellbeing

Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., 2012, ACM International Conference Proceeding Series. p. 2762-2763 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Knowledge management
Information management
Data acquisition
Health
Processing
1 Citation (Scopus)

Understanding avatar sentiments using verbal and non- verbal cues

Zhang, Y., Dang, Y., Brown, S. A. & Chen, H., 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. Vol. 5. p. 4030-4035 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Education
resident
business education
data collection method
know how
1 Citation (Scopus)

Using burst detection techniques to identify suspicious vehicular traffic at border crossings

Kaza, S., Lu, H. M., Zeng, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 212-214 3 p. 6284311

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Law enforcement
Screening
National security
2011
13 Citations (Scopus)

An SIR model for violent topic diffusion in social media

Woo, J., Son, J. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logistics
5 Citations (Scopus)

Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

Chung, K. C., Chen, H. & Liao, W., 2011, GLOBECOM - IEEE Global Telecommunications Conference. 6133735

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network coding
Wireless ad hoc networks
Throughput
Feedback
Degradation
2 Citations (Scopus)

Dynamic user-level affect analysis in social media: Modeling violence in the dark web

Zeng, S., Lin, M. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
Decision making
Violence
8 Citations (Scopus)

The dark web forum portal: From multi-lingual to video

Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 7-14 8 p. 5984042

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Terrorism
Websites
Systems analysis
3 Citations (Scopus)

The Geopolitical Web: Assessing societal risk in an uncertain world

Chen, H., Larson, C. A., Elhourani, T., Zimbra, D. & Ware, D., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 60-64 5 p. 5984051

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blogs
Monitoring
Risk assessment
Websites
Economics
2 Citations (Scopus)

What are the grand challenges in information systems research? a debate and discussion

Limayem, M., Niederman, F., Slaughter, S. A., Chen, H., Gregor, S. & Winter, S. J., 2011, International Conference on Information Systems 2011, ICIS 2011. Vol. 5. p. 4421-4425 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
2010
1 Citation (Scopus)

Comparing the virtual linkage intensity and real world proximity of social movements

Zimbra, D. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 144-146 3 p. 5484759

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual reality
20 Citations (Scopus)

Developing a Dark Web collection and infrastructure for computational and social sciences

Zhang, Y., Zeng, S., Huang, C. N., Fan, L., Yu, X., Dang, Y., Larson, C. A., Denning, D., Roberts, N. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 59-64 6 p. 5484774

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Terrorism
Social sciences
Electric network analysis
World Wide Web
Websites

Evaluating the usefulness of sentiment information for focused crawlers

Fu, T., Abbasi, A., Zeng, D. & Chen, H., 2010, Proceedings of 20th Annual Workshop on Information Technologies and Systems. Social Science Research Network

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Websites
Marketing
Industry
7 Citations (Scopus)

Exploiting emotions in social interactions to detect online social communities

Li, X., Chen, H. & Li, S., 2010, PACIS 2010 - 14th Pacific Asia Conference on Information Systems. p. 1426-1437 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Managers
Industry
3 Citations (Scopus)

Exploiting multi-link SCTP for live TV broadcasting service

Liu, H. S., Hsieh, C. C., Chen, H., Hsieh, C. H., Liao, W., Chu, P. C. & Wang, C. H., 2010, IEEE Vehicular Technology Conference. 5493654

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcasting
Telecommunication links
Satellites
WiMAX
Testbed
3 Citations (Scopus)

Global disease surveillance using social media: HIV/AIDS content intervention in web forums

Ku, Y., Chiu, C., Zhang, Y., Fan, L. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 170 1 p. 5484749

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
2009
19 Citations (Scopus)

Dark web forums portal: Searching and analyzing Jihadist forums

Yulei, Z., Shuo, Z., Li, F., Yan, D., Larson, C. A. & Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 71-76 6 p. 5137274

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Statistics
Data integration
World Wide Web
Violence
3 Citations (Scopus)

Effect of inventor status on intra-organizational innovation evolution

Kaza, S. & Chen, H., 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Innovation

Examining agencies' satisfaction with electronic record management systems in e-government: A large-scale survey study

Hsu, F. M., Hu, P. J. H., Chen, H. & Hu, H. F., 2009, Lecture Notes in Business Information Processing. Springer Verlag, Vol. 22 LNBIP. p. 25-36 12 p. (Lecture Notes in Business Information Processing; vol. 22 LNBIP).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Records management
Electronic Government
Electronics
Compliance
Information systems
3 Citations (Scopus)

Gender difference analysis of political web forums: An experiment on an international Islamic women's forum

Yulei, Z., Yan, D. & Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 61-64 4 p. 5137272

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Internet
Experiments
10 Citations (Scopus)

Identification of extremist videos in online video sharing sites

Tianjun, F., Huang, C. N. & Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 179-181 3 p. 5137295

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Syntactics
Support vector machines
Feature extraction
Communication
Experiments
7 Citations (Scopus)

IEDs in the dark web: Lexicon expansion and genre classification

Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 173-175 3 p. 5137293

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Communication
Experiments

Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLNK mobile

Hu, P. J. H., Chen, H. & Hu, H. F., 2009, ACM International Conference Proceeding Series. p. 160-168 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Law enforcement
Crime
Information technology
Testing
24 Citations (Scopus)

Recommendation as link prediction: A graph kernel-based machine learning approach

Li, X. & Chen, H., 2009, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. p. 213-216 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collaborative filtering
Learning systems
Digital libraries
Recommender systems
Heuristic algorithms

The strategic co-alignment for implementing information systems in E-government

Hsu, F. M., Hu, P. J. H., Chen, H. & Yu, C. H., 2009, PACIS 2009 - 13th Pacific Asia Conference on Information Systems: IT Services in a Global Environment.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
Planning
2008
12 Citations (Scopus)

Analysis of cyberactivism: A case study of online free Tibet activities

Fu, T. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 1-6 6 p. 4565020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Seed
Statistics
Internet

An integrated approach to mapping worldwide bioterrorism research capabilities

Dang, Y., Zhang, Y., Suakkaphong, N., Larson, C. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 212-214 3 p. 4565059

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bioterrorism
Biological weapons
Productivity
Monitoring
3 Citations (Scopus)

Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study

Lu, H. M., Zeng, D. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 76-81 6 p. 4565033

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bioterrorism
Time series
Hidden Markov models
Parameter estimation
Sales
13 Citations (Scopus)

Botnets, and the cybercriminal underground

Mielke, C. J. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 206-211 6 p. 4565058

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Economics
Botnet
21 Citations (Scopus)

Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups

Chen, H., Thoms, S. & Fu, T., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 98-103 6 p. 4565037

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blogs
Communication

Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement

Chen, Y. D., Abbasi, A. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 7-12 6 p. 4565021

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Websites
Internet
Fusion reactions
Visualization
1 Citation (Scopus)

Discovery of improvised explosive device content in the Dark Web

Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 88-93 6 p. 4565035

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
7 Citations (Scopus)

IEDs in the Dark Web: Genre classification of improvised explosive device web pages

Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 94-97 4 p. 4565036

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Websites
Learning algorithms
Support vector machines
Learning systems