Find Research Outputs

Search concepts
Selected Filters

Publication Year

  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Hsinchun Chen
2020

A deep learning architecture for psychometric natural language processing

Ahmad, F., Abbasi, A., Li, J., Dobolyi, D. G., Netemeyer, R. G., Clifford, G. D. & Chen, H., Feb 5 2020, In : ACM Transactions on Information Systems. 38, 1, 3365211.

Research output: Contribution to journalArticle

Open Access
2019
1 Scopus citations

Comparing nanotechnology landscapes in the US and China: a patent analysis perspective

Wu, L., Zhu, H., Chen, H. & Roco, M. C., Aug 1 2019, In : Journal of Nanoparticle Research. 21, 8, 180.

Research output: Contribution to journalArticle

Dark-net ecosystem cyber-threat intelligence (CTI) Tool

Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 92-97 6 p. 8823501. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DICE-E: A framework for conducting Darknet identification, collection, evaluation with ethics

Benjamin, V., Valacich, J. S. & Chen, H., Mar 1 2019, In : MIS Quarterly: Management Information Systems. 43, 1, p. 1-22 22 p.

Research output: Contribution to journalArticle

5 Scopus citations

Do electronic health records affect quality of care? Evidence from the HITECH act

Lin, Y. K., Lin, M. & Chen, H., Jan 1 2019, In : Information Systems Research. 30, 1, p. 306-318 13 p.

Research output: Contribution to journalArticle

2 Scopus citations

Emoticon analysis for Chinese social media and e-commerce: The azemo system

Yu, S., Zhu, H., Jiang, S., Zhang, Y., Xing, C. & Chen, H., Mar 2019, In : ACM Transactions on Management Information Systems. 9, 4, 16.

Research output: Contribution to journalArticle

Examining patterns of scientific knowledge diffusion based on knowledge cyber infrastructure: a multi-dimensional network approach

Jiang, S. & Chen, H., Dec 1 2019, In : Scientometrics. 121, 3, p. 1599-1617 19 p.

Research output: Contribution to journalArticle

1 Scopus citations

Identifying high-impact opioid products and key sellers in dark net marketplaces: An interpretable text analytics approach

Du, P. Y., Ebrahimi, M., Zhang, N., Chen, H., Brown, R. A. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 8823196. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Performance modeling of hyperledger sawtooth blockchain

Ampel, B., Patton, M. & Chen, H., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 59-61 3 p. 8823238. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Preface

Chen, H., Zeng, D., Yan, X. & Xing, C., Jan 1 2019, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11924 LNCS, p. v

Research output: Contribution to journalEditorial

2017

Adverse drug reaction early warning using user search data

Shang, W., Chen, H. & Livoti, C., 2017, In : Online Information Review. 41, 4, p. 524-536 13 p.

Research output: Contribution to journalArticle

Assessing medical device vulnerabilities on the Internet of Things

McMahon, E., Williams, R., El, M., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 176-178 3 p. 8004903

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

AZpharm metaalert: A meta-learning framework for pharmacovigilance

Liu, X. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Springer Verlag, Vol. 10219 LNCS. p. 147-154 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments

El, M., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 83-88 6 p. 8004879

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence

Samtani, S., Chinn, R., Chen, H. & Nunamaker, J. F., Oct 2 2017, In : Journal of Management Information Systems. 34, 4, p. 1023-1053 31 p.

Research output: Contribution to journalArticle

15 Scopus citations

Fall detection with orientation calibration using a single motion sensor

Yu, S. & Chen, H., 2017, Wireless Mobile Communication and Healthcare - 6th International Conference, MobiHealth 2016, Proceedings. Springer Verlag, Vol. 192. p. 233-240 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 192).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Healthcare predictive analytics for risk profiling in chronic care: A Bayesian multitask learning approach

Lin, Y. K., Chen, H., Brown, R. A., Li, S. H. & Yang, H. J., Jun 1 2017, In : MIS Quarterly: Management Information Systems. 41, 2, p. 473-495 23 p.

Research output: Contribution to journalArticle

24 Scopus citations
9 Scopus citations

Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence

Grisham, J., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 8004867

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach

Williams, R., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 179-181 3 p. 8004904

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

International perspective on nanotechnology papers, patents, and NSF awards (2000–2016)

Zhu, H., Jiang, S., Chen, H. & Roco, M. C., Nov 1 2017, In : Journal of Nanoparticle Research. 19, 11, 370.

Research output: Contribution to journalArticle

5 Scopus citations

Investigating the impacts of avatar gender, avatar age, and region theme on avatar physical activity in the virtual world

Zhang, Y. G., Dang, Y. M., Brown, S. A. & Chen, H., Mar 1 2017, In : Computers in Human Behavior. 68, p. 378-387 10 p.

Research output: Contribution to journalArticle

10 Scopus citations

Preface

Chen, H., Karahanna, E. & Zeng, D., Jan 1 2017, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10347 LNCS, p. VI

Research output: Contribution to journalEditorial

Preface

Wang, A., Chau, M. & Chen, H., 2017, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10241 LNCS, p. v

Research output: Contribution to journalEditorial

Silverlink: Developing an international smart and connected home monitoring system for senior care

Maimoon, L., Chuang, J., Zhu, H., Yu, S., Peng, K. S. A., Prayakarao, R., Bai, J., Zeng, D., Li, S. H., Lu, H. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Springer Verlag, Vol. 10219 LNCS. p. 65-77 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
3 Scopus citations
2016

Anonymous port scanning: Performing network reconnaissance through Tor

Rohrmann, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 217 1 p. 7745475

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

A Tensor-Based Information Framework for Predicting the Stock Market

Li, Q., Chen, Y., Jiang, L. L., Li, P. & Chen, H., Feb 2016, In : ACM Transactions on Information Systems. 34, 2, 11.

Research output: Contribution to journalArticle

21 Scopus citations

AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis

Samtani, S., Chinn, K., Larson, C. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-24 6 p. 7745437

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Chinese underground market jargon analysis based on unsupervised learning

Zhao, K., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 97-102 6 p. 7745450. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Chronic disease related entity extraction in online Chinese question and answer services

Zhang, Y., Zhang, Y., Yin, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 55-67 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Conducting large-scale analyses of underground hacker communities

Benjamin, V., Samtani, S. & Chen, H., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 56-75 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Deep learning based topic identification and categorization: Mining diabetes-related topics on Chinese health websites

Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9642. p. 481-500 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9642).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Diabeticlink: An internationally collaborative cyber-enabled patient empowerment platform

Samtani, G., Maimoon, L., Chuang, J., Nybroe, C., Liu, X., Wiil, U., Li, S. H. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 299-310 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Effects of individuals’ motivations on communications in online health forums

Wu, B., Jiang, S. & Chen, H., 2016, In : Social Behavior and Personality. 44, 2, p. 299-312 14 p.

Research output: Contribution to journalArticle

4 Scopus citations

Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog

Woo, J. & Chen, H., Dec 1 2016, In : SpringerPlus. 5, 1, p. 1-19 19 p., 66.

Research output: Contribution to journalArticle

23 Scopus citations

Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities

Benjamin, V., Zhang, B., Nunamaker, J. F. & Chen, H., Apr 2 2016, In : Journal of Management Information Systems. 33, 2, p. 482-510 29 p.

Research output: Contribution to journalArticle

22 Scopus citations

Exploring key hackers and cybersecurity threats in Chinese hacker communities

Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 7745436

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Exploring the online underground marketplaces through topic-based social network and clustering

Huang, S. Y. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 145-150 6 p. 7745458

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Health-related spammer detection on chinese social media

Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 284-295 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System

Li, W., Chen, H. & Nunamaker, J. F., Oct 1 2016, In : Journal of Management Information Systems. 33, 4, p. 1059-1086 28 p.

Research output: Contribution to journalArticle

17 Scopus citations

Identifying devices across the IPv4 address space

Jicha, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 199-201 3 p. 7745469

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying high quality carding services in underground economy using nonparametric supervised topic model

Li, W., Yin, J. & Chen, H., 2016, 2016 International Conference on Information Systems, ICIS 2016. Association for Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying language groups within multilingual cybercriminal forums

Benjamin, V. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 205-207 3 p. 7745471

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

Samtani, S., Yu, S., Zhu, H., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 25-30 6 p. 7745438

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Identifying the socio-spatial dynamics of terrorist attacks in the Middle East

Li, Z., Sun, D., Chen, H. & Huang, S. Y., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7745463

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Identifying top listers in Alphabay using Latent Dirichlet Allocation

Grisham, J., Barreras, C., Afarin, C., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 219 1 p. 7745477

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Intelligence and security informatics: 11th Pacific Asia workshop, PAISI 2016 Auckland, New Zealand, April 19, 2016 proceedings

Chau, M., Alan Wang, G. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9650. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9650).

Research output: Chapter in Book/Report/Conference proceedingConference contribution