• 18422 Citations
  • 66 h-Index
1989 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2014

HealthQA: A Chinese QA summary system for smart health

Yin, Y., Zhang, Y., Liu, X., Zhang, Y., Xing, C. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 51-62 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Identifying adverse drug events from health social media: A case study on heart disease discussion forums

Liu, X., Liu, J. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Identifying top sellers in underground economy using deep learning-based sentiment analysis

Li, W. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 64-67 4 p. 6975555. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations

Time-to-event modeling for predicting hacker IRC community participant trajectory

Benjamin, V. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 6975550. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Uninvited connections: A study of vulnerable devices on the internet of things (IoT)

Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 232-235 4 p. 6975580. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

57 Scopus citations
2013

A computational approach to detecting and assessing sustainability-related communities in social media

Jiang, S. & Chen, H., Dec 1 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 48-58 11 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

Liu, X. & Chen, H., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Scopus citations

DiabeticLink: A health big data system for patient empowerment and personalized healthcare

Chen, H., Compton, S. & Hsiao, O., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Evaluating text visualization: An experiment in authorship analysis

Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Machine learning for attack vector identification in malicious source code

Benjamin, V. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 21-23 3 p. 6578779. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Statistical modeling of nanotechnology knowledge diffusion networks

Jiang, S., Gao, Q. & Chen, H., Dec 1 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 3552-3571 20 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2012

An event-driven SIR model for topic diffusion in web forums

Woo, J. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Evaluating an integrated forum portal for terrorist surveillance and analysis

Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Partially supervised learning for radical opinion identification in hate group web forums

Yang, M. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 96-101 6 p. 6284099. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Scalable sentiment classification across multiple dark web forums

Zimbra, D. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 78-83 6 p. 6284095. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Securing cyberspace: Identifying key actors in hacker communities

Benjamin, V. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

SHB 2012: International workshop on smart health and wellbeing

Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., Dec 19 2012, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management. p. 2762-2763 2 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Understanding avatar sentiments using verbal and non- verbal cues

Zhang, Y., Dang, Y., Brown, S. A. & Chen, H., Dec 1 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 4030-4035 6 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Using burst detection techniques to identify suspicious vehicular traffic at border crossings

Kaza, S., Lu, H. M., Zeng, D. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 212-214 3 p. 6284311. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2011

An SIR model for violent topic diffusion in social media

Woo, J., Son, J. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

Chung, K. C., Chen, H. C. & Liao, W., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6133735. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Dynamic user-level affect analysis in social media: Modeling violence in the dark web

Zeng, S., Lin, M. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

The dark web forum portal: From multi-lingual to video

Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 7-14 8 p. 5984042. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

The Geopolitical Web: Assessing societal risk in an uncertain world

Chen, H., Larson, C. A., Elhourani, T., Zimbra, D. & Ware, D., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 60-64 5 p. 5984051. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

What are the grand challenges in information systems research? a debate and discussion

Limayem, M., Niederman, F., Slaughter, S. A., Chen, H., Gregor, S. & Winter, S. J., Dec 1 2011, International Conference on Information Systems 2011, ICIS 2011. p. 4421-4425 5 p. (International Conference on Information Systems 2011, ICIS 2011; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2010

Comparing the virtual linkage intensity and real world proximity of social movements

Zimbra, D. & Chen, H., Jul 26 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 144-146 3 p. 5484759. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Developing a Dark Web collection and infrastructure for computational and social sciences

Zhang, Y., Zeng, S., Huang, C. N., Fan, L., Yu, X., Dang, Y., Larson, C. A., Denning, D., Roberts, N. & Chen, H., Jul 26 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 59-64 6 p. 5484774. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Exploiting multi-link SCTP for live TV broadcasting service

Liu, H. S., Hsieh, C. C., Chen, H. C., Hsieh, C. H., Liao, W., Chu, P. C. & Wang, C. H., Jul 30 2010, 2010 IEEE 71st Vehicular Technology. 5493654. (IEEE Vehicular Technology Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Global disease surveillance using social media: HIV/AIDS content intervention in web forums

Ku, Y., Chiu, C., Zhang, Y., Fan, L. & Chen, H., Jul 26 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. 1 p. 5484749. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2009

Dark web forums portal: Searching and analyzing Jihadist forums

Yulei, Z., Shuo, Z., Li, F., Yan, D., Larson, C. A. & Hsinchun, C., Oct 22 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 71-76 6 p. 5137274. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations

Effect of inventor status on intra-organizational innovation evolution

Kaza, S. & Chen, H., Apr 3 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755398. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Examining agencies' satisfaction with electronic record management systems in e-government: A large-scale survey study

Hsu, F. M., Hu, P. J. H., Chen, H. & Hu, H. F., Jan 1 2009, Designing E-Business Systems: Markets, Services, and Networks - 7th Workshop on E-Business, WEB 2008, Revised Selected Papers. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Business Information Processing; vol. 22 LNBIP).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gender difference analysis of political web forums: An experiment on an international Islamic women's forum

Yulei, Z., Yan, D. & Hsinchun, C., Oct 22 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 61-64 4 p. 5137272. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Identification of extremist videos in online video sharing sites

Tianjun, F., Huang, C. N. & Hsinchun, C., Oct 22 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 179-181 3 p. 5137295. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

IEDs in the dark web: Lexicon expansion and genre classification

Chen, H., Oct 22 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 173-175 3 p. 5137293. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLNK mobile

Hu, P. J. H., Chen, H. & Hu, H. F., Nov 30 2009, Proceedings of the 11th International Conference on Electronic Commerce, ICEC 2009. p. 160-168 9 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommendation as link prediction: A graph kernel-based machine learning approach

Li, X. & Chen, H., Jan 1 2009, JCDL'09 - Proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries. Institute of Electrical and Electronics Engineers Inc., p. 213-216 4 p. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations
2008

Mapping dark web geolocation

Mielke, C. & Chen, H., Dec 1 2008, Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings. p. 97-107 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Nuclear threat detection via the nuclear web and dark web: Framework and preliminary study

Chen, H., Dec 1 2008, Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings. p. 85-96 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2007

Affect intensity analysis of dark web forums

Abbasi, A. & Chen, H., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 282-288 7 p. 4258712. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

57 Scopus citations

A framework for stylometric similarity detection in online settings

Abbasi, A. & Chen, H., Dec 1 2007, Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights. p. 1442-1451 10 p. (Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Analyzing and visualizing gray Web forum structure

Yang, C. C., Ng, T. D., Wang, J. H., Wei, C. P. & Chen, H., Jan 1 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. Springer-Verlag, p. 21-33 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Automatic patent classification using citation network information: An experimental study in nanotechnology

Li, X., Chen, H., Zhang, Z. & Li, J., Nov 29 2007, Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, JCDL 2007: Building and Sustaining the Digital Environment. p. 419-427 9 p. (Proceedings of the ACM International Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations

A web-based system for infectious disease data integration and sharing: Evaluating outcome, task performance efficiency, user information satisfaction, and usability

Hu, P. J. H., Zeng, D., Chen, H., Larson, C. A. & Tseng, C., Dec 24 2007, Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, Proceedings. p. 134-146 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Building a directory for the underdeveloped web: An experiment on the arabic medical web directory

Chung, W. & Chen, H., Dec 1 2007, Asian Digital Libraries: Looking Back 10 Years and Forging New Frontiers - 10th International Conference on Asian Digital Libraries, ICADL 2007, Proceedings. p. 468-477 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4822 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Categorization and analysis of text in computer mediated communication archives using visualization

Abbasi, A. & Chen, H., Nov 29 2007, Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, JCDL 2007: Building and Sustaining the Digital Environment. p. 11-18 8 p. (Proceedings of the ACM International Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Chinese chief complaint classification for syndromic surveillance

Lu, H. M., King, C. C., Wu, T. S., Shih, F. Y., Hsiao, J. Y., Zeng, D. & Chen, H., Jan 1 2007, Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, Proceedings. Springer-Verlag, p. 11-22 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Collection of U.S. extremist online forums: A web mining approach

Zhou, Y., Qin, J., Lai, G. & Chen, H., Dec 1 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076513. (Proceedings of the Annual Hawaii International Conference on System Sciences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Dynamic social network analysis of a dark network: Identifying significant facilitators

Kaza, S., Hu, D. & Chen, H., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 40-46 7 p. 4258671. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Exploring extremism and terrorism on the web: The Dark Web project

Hsinchun, C., Dec 1 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations