• 18422 Citations
  • 66 h-Index
1989 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
Conference contribution

Mapping dark web geolocation

Mielke, C. & Chen, H., Dec 1 2008, Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings. p. 97-107 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Medical ontology-enhanced text processing for infectious disease informatics (extended abstract)

Lu, H. M., Zeng, D. & Chen, H., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. 1 p. 4258732. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

MindMine comment analysis tool for collaborative attitude solicitation, analysis, sense-making and visualization

Romano, N. C., Bauer, C., Chen, H. & Nunamaker, J. F., Jan 1 2000, Proceedings of the Hawaii International Conference on System Sciences. 1 p. (Proceedings of the Hawaii International Conference on System Sciences).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Motion sensor-based assessment on fall risk and Parkinson's disease severity: A deep multi-source multi-task learning (DMML) Approach

Yu, S., Chen, H., Brown, R. & Sherman, S. J., Jul 24 2018, Proceedings - 2018 IEEE International Conference on Healthcare Informatics, ICHI 2018. Institute of Electrical and Electronics Engineers Inc., p. 174-179 6 p. 8419360

Research output: Chapter in Book/Report/Conference proceedingConference contribution

NanoPort: An example for building knowledge portals for scientific domains

Qin, J., Huang, Z., Zhou, Y., Chau, M., Tseng, C., Yip, A., Ng, T. G., Guo, F., Chen, Z. K. & Chen, H., 2003, Proceedings of the ACM/IEEE Joint Conference on Digital Libraries. Institute of Electrical and Electronics Engineers Inc., Vol. 2003-January. p. 387 1 p. 1204903

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

NATERGM: A model for examining the role of Nodal Attributes in dynamic social media networks

Jiang, S. & Chen, H., Jun 22 2016, 2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1458-1459 2 p. 7498373

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Nuclear threat detection via the nuclear web and dark web: Framework and preliminary study

Chen, H., Dec 1 2008, Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings. p. 85-96 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Online query refinement on information retrieval systems: A process model of searcher/system interactions

Chen, H. & Dhar, V., Dec 1 1989, Proceedings of the 13th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1990. Association for Computing Machinery, Inc, p. 115-133 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

On the topology of the dark web of terrorist groups

Xu, J., Chen, H., Zhou, Y. & Qin, J., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 367-376 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Ontology-based automatic chief complaints classification for syndromic surveillance

Lu, H. M., Zeng, D. & Chen, H., Jan 1 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics. Institute of Electrical and Electronics Engineers Inc., p. 1137-1142 6 p. 4274001. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Optimal search-based gene selection for cancer prognosis

Li, J. J., Su, H. & Chen, H., Dec 1 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. p. 2672-2679 8 p. (Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale; vol. 6).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Partially supervised learning for radical opinion identification in hate group web forums

Yang, M. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 96-101 6 p. 6284099. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Performance modeling of hyperledger sawtooth blockchain

Ampel, B., Patton, M. & Chen, H., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 59-61 3 p. 8823238. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Personalized spiders for web search and analysis

Chau, M., Zeng, D. & Chen, H., Dec 1 2001, Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries. p. 79-87 9 p. (Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

35 Scopus citations

Personalized spiders for web search and analysis

Chau, M., Zeng, D. & Chen, H., Jan 1 2001, Proceedings of the 1st ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2001. Association for Computing Machinery, p. 79-87 9 p. (Proceedings of the ACM International Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Prospective spatio-temporal data analysis for security informatics

Chang, W., Zeng, D. & Chen, H., Dec 1 2005, ITSC`05: 2005 IEEE Intelligent Conference on Transportation Systems, Proceedings. p. 1120-1124 5 p. 1520208. (IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Recommendation as link prediction: A graph kernel-based machine learning approach

Li, X. & Chen, H., Jan 1 2009, JCDL'09 - Proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries. Institute of Electrical and Electronics Engineers Inc., p. 213-216 4 p. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Scopus citations

SCADA honeypots: An in-depth analysis of Conpot

Jicha, A., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 196-198 3 p. 7745468

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Scalable sentiment classification across multiple dark web forums

Zimbra, D. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 78-83 6 p. 6284095. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Securing cyberspace: Identifying key actors in hacker communities

Benjamin, V. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

Sentiment analysis on chinese health forums: A preliminary study of different language models

Zhang, Y., Zhang, Y., Xu, J., Xing, C. & Chen, H., Jan 1 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 68-81 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

SHB 2012: International workshop on smart health and wellbeing

Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., Dec 19 2012, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management. p. 2762-2763 2 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shodan visualized

Ercolani, V. J., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 193-195 3 p. 7745467

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Silverlink: Smart home health monitoring for senior care

Chuang, J., Maimoon, L., Yu, S., Zhu, H., Nybroe, C., Hsiao, O., Li, S. H., Lu, H. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 3-14 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Silverlink: Developing an international smart and connected home monitoring system for senior care

Maimoon, L., Chuang, J., Zhu, H., Yu, S., Peng, K. S. A., Prayakarao, R., Bai, J., Zeng, D., Li, S. H., Lu, H. & Chen, H., Jan 1 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Liang, Y., Xing, C. & Zhang, Y. (eds.). Springer-Verlag, p. 65-77 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Spatial-temporal cross-correlation analysis: A new measure and a case study in infectious disease informatics

Ma, J., Zeng, D. & Chen, H., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 542-547 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Statistical modeling of nanotechnology knowledge diffusion networks

Jiang, S., Gao, Q. & Chen, H., Dec 1 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 3552-3571 20 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Studying the structure of terrorist networks: A web structural mining approach

Qin, J., Zhou, Y., Xu, J. J. & Chen, H., Dec 1 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. p. 523-530 8 p. (Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Suspect vehicle identification for border safety with modified mutual information

Kaza, S., Wang, Y. & Chen, H., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 308-318 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Targeting key data breach services in underground supply chain

Li, W., Yin, J. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 322-324 3 p. 7745501

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Target vehicle identification for border safety using mutual information

Kaza, S., Wang, T., Gowda, H. & Chen, H., Dec 1 2005, ITSC`05: 2005 IEEE Intelligent Conference on Transportation Systems, Proceedings. p. 1141-1146 6 p. 1520212. (IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Tensor-based learning for predicting stock movements

Li, Q., Jiang, L., Li, P. & Chen, H., Jun 1 2015, Proceedings of the National Conference on Artificial Intelligence. AI Access Foundation, Vol. 3. p. 1784-1790 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Textual analysis of stock market prediction using financial news articles

Schumaker, R. P. & Chen, H., Dec 1 2006, Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. p. 1422-1430 9 p. (Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations

The Arizona IDMatcher: A probabilistic identity matching system

Wang, G. A., Kaza, S., Joshi, S., Chang, K., Atabakhsh, H. & Chen, H., Jan 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. IEEE Computer Society, p. 229-235 7 p. 4258703. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

The dark web forum portal: From multi-lingual to video

Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 7-14 8 p. 5984042. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

The Geopolitical Web: Assessing societal risk in an uncertain world

Chen, H., Larson, C. A., Elhourani, T., Zimbra, D. & Ware, D., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 60-64 5 p. 5984051. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Time-to-event modeling for predicting hacker IRC community participant trajectory

Benjamin, V. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 6975550. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Understanding avatar sentiments using verbal and non- verbal cues

Zhang, Y., Dang, Y., Brown, S. A. & Chen, H., Dec 1 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 4030-4035 6 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Uninvited connections: A study of vulnerable devices on the internet of things (IoT)

Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 232-235 4 p. 6975580. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

57 Scopus citations

Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity

Qin, J., Zhou, Y., Reid, E., Lai, G. & Chen, H., Jul 14 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. p. 4-15 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Using burst detection techniques to identify suspicious vehicular traffic at border crossings

Kaza, S., Lu, H. M., Zeng, D. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 212-214 3 p. 6284311. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Using importance flooding to identify interesting networks of criminal activity

Marshall, B. & Chen, H., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 14-25 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Using social contextual information to match criminal identities

Wang, G. A., Xu, J. J. & Chen, H., Oct 17 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS'06. p. 81b 1579451. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Using social network analysis to identify key hackers for keylogging tools in hacker forums

Samtani, S. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 319-321 3 p. 7745500

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Visualization in law enforcement

Chen, H., Atabakhsh, H., Tseng, C., Marshall, B., Kaza, S., Eggers, S., Gowda, H., Shah, A., Petersen, T. & Violette, C., Dec 1 2005, CHI'05 Extended Abstracts on Human Factors in Computing Systems, CHI EA'05. p. 1268-1271 4 p. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Visualizing authorship for identification

Abbasi, A. & Chen, H., Jan 1 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 60-71 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Visualizing internet search results with adaptive self-organizing maps

Roussinov, D., Tolle, K., Ramsey, M., McQuaid, M. & Chen, H., Aug 1 1999, Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1999. Association for Computing Machinery, Inc, 1 p. (Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1999).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Vulnerability assessment, remediation, and automated reporting: Case studies of higher education institutions

Harrell, C. R., Patton, M., Chen, H. & Samtani, S., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 148-153 6 p. 8587380. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

What are the grand challenges in information systems research? a debate and discussion

Limayem, M., Niederman, F., Slaughter, S. A., Chen, H., Gregor, S. & Winter, S. J., Dec 1 2011, International Conference on Information Systems 2011, ICIS 2011. p. 4421-4425 5 p. (International Conference on Information Systems 2011, ICIS 2011; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations