• 17504 Citations
  • 66 h-Index
1989 …2019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1989 2019

Filter
Conference contribution
2007
2 Citations (Scopus)

Exploring extremism and terrorism on the web: The Dark Web project

Chen, H., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4430 LNCS. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Terrorism
Authorship
Multimedia
Informatics
Crime
2 Citations (Scopus)

Global foot-and-mouth disease surveillance using bioportal

Thurmond, M., Perez, A., Tseng, C., Chen, H. & Zeng, D., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4506 LNCS. p. 169-179 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Foot-and-Mouth Disease
Surveillance
Genomics
Cluster Analysis
Biosurveillance
5 Citations (Scopus)

Graph kernel-based learning for gene function prediction from gene interaction network

Li, X., Zhang, Z., Chen, H. & Li, J., 2007, Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007. p. 368-373 6 p. 4413079

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gene Regulatory Networks
Genes
Learning
p53 Genes
13 Citations (Scopus)

Incorporating geographical contacts into social network analysis for contact tracing in epidemiology: A study on Taiwan SARS data

Chen, Y. D., Tseng, C., King, C. C., Wu, T. S. J. & Chen, H., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4506 LNCS. p. 23-36 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Contact Tracing
Severe Acute Respiratory Syndrome
Epidemiology
Social Network Analysis
Taiwan

Interaction coherence analysis for dark web forums

Fu, T., Abbasi, A. & Chen, H., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 343-350 8 p. 4258721

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vector spaces
Linguistics
Experiments
1 Citation (Scopus)

Medical ontology-enhanced text processing for infectious disease informatics (extended abstract)

Lu, H. M., Zeng, D. & Chen, H., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 373 1 p. 4258732

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Text processing
Ontology
4 Citations (Scopus)

Ontology-based automatic chief complaints classification for syndromic surveillance

Lu, H. M., Zeng, D. & Chen, H., 2007, Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics. Vol. 2. p. 1137-1142 6 p. 4274001

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ontology
Semantics
Experiments
1 Citation (Scopus)

The Arizona IDMatcher: A probabilistic identity matching system

Wang, G. A., Kaza, S., Joshi, S., Chang, K., Atabakhsh, H. & Chen, H., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 229-235 7 p. 4258703

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optimal systems
Law enforcement
Learning algorithms
Learning systems
Experiments
2008
12 Citations (Scopus)

Analysis of cyberactivism: A case study of online free Tibet activities

Fu, T. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 1-6 6 p. 4565020

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Seed
Statistics
Internet

An integrated approach to mapping worldwide bioterrorism research capabilities

Dang, Y., Zhang, Y., Suakkaphong, N., Larson, C. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 212-214 3 p. 4565059

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bioterrorism
Biological weapons
Productivity
Monitoring
3 Citations (Scopus)

Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study

Lu, H. M., Zeng, D. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 76-81 6 p. 4565033

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bioterrorism
Time series
Hidden Markov models
Parameter estimation
Sales
13 Citations (Scopus)

Botnets, and the cybercriminal underground

Mielke, C. J. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 206-211 6 p. 4565058

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Economics
Botnet
22 Citations (Scopus)

Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups

Chen, H., Thoms, S. & Fu, T., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 98-103 6 p. 4565037

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blogs
Communication

Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement

Chen, Y. D., Abbasi, A. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 7-12 6 p. 4565021

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric network analysis
Websites
Internet
Fusion reactions
Visualization
1 Citation (Scopus)

Discovery of improvised explosive device content in the Dark Web

Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 88-93 6 p. 4565035

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
7 Citations (Scopus)

IEDs in the Dark Web: Genre classification of improvised explosive device web pages

Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 94-97 4 p. 4565036

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Websites
Learning algorithms
Support vector machines
Learning systems
1 Citation (Scopus)

Mapping dark web geolocation

Mielke, C. & Chen, H., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5376 LNCS. p. 97-107 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Artificial intelligence
Websites
Servers
Internet
Networking
1 Citation (Scopus)

Nuclear threat detection via the nuclear web and dark web: Framework and preliminary study

Chen, H., 2008, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5376 LNCS. p. 85-96 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nuclear weapons
Nuclear physics
Testbeds
Instrumentation
Accessibility
3 Citations (Scopus)

PRM-based identity matching using social context

Li, J., Wang, G. A. & Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 150-155 6 p. 4565045

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
20 Citations (Scopus)

Sentiment and affect analysis of Dark Web forums: measuring radicalization on the internet

Chen, H., 2008, IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008. p. 104-109 6 p. 4565038

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Communication
Learning systems
2009
19 Citations (Scopus)

Dark web forums portal: Searching and analyzing Jihadist forums

Yulei, Z., Shuo, Z., Li, F., Yan, D., Larson, C. A. & Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 71-76 6 p. 5137274

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
Statistics
Data integration
World Wide Web
Violence
3 Citations (Scopus)

Effect of inventor status on intra-organizational innovation evolution

Kaza, S. & Chen, H., 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755398

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Innovation

Examining agencies' satisfaction with electronic record management systems in e-government: A large-scale survey study

Hsu, F. M., Hu, P. J. H., Chen, H. & Hu, H. F., 2009, Lecture Notes in Business Information Processing. Springer Verlag, Vol. 22 LNBIP. p. 25-36 12 p. (Lecture Notes in Business Information Processing; vol. 22 LNBIP).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Records management
Electronic Government
Electronics
Compliance
Information systems
3 Citations (Scopus)

Gender difference analysis of political web forums: An experiment on an international Islamic women's forum

Yulei, Z., Yan, D. & Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 61-64 4 p. 5137272

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Internet
Experiments
10 Citations (Scopus)

Identification of extremist videos in online video sharing sites

Tianjun, F., Huang, C. N. & Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 179-181 3 p. 5137295

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Syntactics
Support vector machines
Feature extraction
Communication
Experiments
7 Citations (Scopus)

IEDs in the dark web: Lexicon expansion and genre classification

Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 173-175 3 p. 5137293

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Communication
Experiments

Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLNK mobile

Hu, P. J. H., Chen, H. & Hu, H. F., 2009, ACM International Conference Proceeding Series. p. 160-168 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Law enforcement
Crime
Information technology
Testing
26 Citations (Scopus)

Recommendation as link prediction: A graph kernel-based machine learning approach

Li, X. & Chen, H., 2009, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. p. 213-216 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collaborative filtering
Learning systems
Digital libraries
Recommender systems
Heuristic algorithms

The strategic co-alignment for implementing information systems in E-government

Hsu, F. M., Hu, P. J. H., Chen, H. & Yu, C. H., 2009, PACIS 2009 - 13th Pacific Asia Conference on Information Systems: IT Services in a Global Environment.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
Planning
2010
1 Citation (Scopus)

Comparing the virtual linkage intensity and real world proximity of social movements

Zimbra, D. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 144-146 3 p. 5484759

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual reality
20 Citations (Scopus)

Developing a Dark Web collection and infrastructure for computational and social sciences

Zhang, Y., Zeng, S., Huang, C. N., Fan, L., Yu, X., Dang, Y., Larson, C. A., Denning, D., Roberts, N. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 59-64 6 p. 5484774

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Terrorism
Social sciences
Electric network analysis
World Wide Web
Websites

Evaluating the usefulness of sentiment information for focused crawlers

Fu, T., Abbasi, A., Zeng, D. & Chen, H., 2010, Proceedings of 20th Annual Workshop on Information Technologies and Systems. Social Science Research Network

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Testbeds
Websites
Marketing
Industry
7 Citations (Scopus)

Exploiting emotions in social interactions to detect online social communities

Li, X., Chen, H. & Li, S., 2010, PACIS 2010 - 14th Pacific Asia Conference on Information Systems. p. 1426-1437 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Managers
Industry
3 Citations (Scopus)

Exploiting multi-link SCTP for live TV broadcasting service

Liu, H. S., Hsieh, C. C., Chen, H., Hsieh, C. H., Liao, W., Chu, P. C. & Wang, C. H., 2010, IEEE Vehicular Technology Conference. 5493654

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Broadcasting
Telecommunication links
Satellites
WiMAX
Testbed
3 Citations (Scopus)

Global disease surveillance using social media: HIV/AIDS content intervention in web forums

Ku, Y., Chiu, C., Zhang, Y., Fan, L. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 170 1 p. 5484749

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
2011
14 Citations (Scopus)

An SIR model for violent topic diffusion in social media

Woo, J., Son, J. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logistics
5 Citations (Scopus)

Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

Chung, K. C., Chen, H. & Liao, W., 2011, GLOBECOM - IEEE Global Telecommunications Conference. 6133735

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network coding
Wireless ad hoc networks
Throughput
Feedback
Degradation
2 Citations (Scopus)

Dynamic user-level affect analysis in social media: Modeling violence in the dark web

Zeng, S., Lin, M. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
Decision making
Violence
9 Citations (Scopus)

The dark web forum portal: From multi-lingual to video

Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 7-14 8 p. 5984042

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Terrorism
Websites
Systems analysis
3 Citations (Scopus)

The Geopolitical Web: Assessing societal risk in an uncertain world

Chen, H., Larson, C. A., Elhourani, T., Zimbra, D. & Ware, D., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 60-64 5 p. 5984051

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blogs
Monitoring
Risk assessment
Websites
Economics
2 Citations (Scopus)

What are the grand challenges in information systems research? a debate and discussion

Limayem, M., Niederman, F., Slaughter, S. A., Chen, H., Gregor, S. & Winter, S. J., 2011, International Conference on Information Systems 2011, ICIS 2011. Vol. 5. p. 4421-4425 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems
2012
4 Citations (Scopus)

An event-driven SIR model for topic diffusion in web forums

Woo, J. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry

Evaluating an integrated forum portal for terrorist surveillance and analysis

Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Processing
2 Citations (Scopus)

Partially supervised learning for radical opinion identification in hate group web forums

Yang, M. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 96-101 6 p. 6284099

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supervised learning
Labeling
Labels
5 Citations (Scopus)

Scalable sentiment classification across multiple dark web forums

Zimbra, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 78-83 6 p. 6284095

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classifiers
Scalability
40 Citations (Scopus)

Securing cyberspace: Identifying key actors in hacker communities

Benjamin, V. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology

SHB 2012: International workshop on smart health and wellbeing

Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., 2012, ACM International Conference Proceeding Series. p. 2762-2763 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Knowledge management
Information management
Data acquisition
Health
Processing
1 Citation (Scopus)

Understanding avatar sentiments using verbal and non- verbal cues

Zhang, Y., Dang, Y., Brown, S. A. & Chen, H., 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. Vol. 5. p. 4030-4035 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Education
resident
business education
data collection method
know how
1 Citation (Scopus)

Using burst detection techniques to identify suspicious vehicular traffic at border crossings

Kaza, S., Lu, H. M., Zeng, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 212-214 3 p. 6284311

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Law enforcement
Screening
National security
2013
2 Citations (Scopus)

A computational approach to detecting and assessing sustainability-related communities in social media

Jiang, S. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. Vol. 1. p. 48-58 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Sustainability
social media
Sustainable development
sustainability