Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected Filters

Publication Year

  • 2019
  • 2018
  • 2017
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Hsinchun Chen

A computational approach to detecting and assessing sustainability-related communities in social media

Jiang, S. & Chen, H., Dec 1 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 48-58 11 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A control study on the effects of HRV biofeedback therapy in patients with post-stroke depression

Li, X., Zhang, T., Song, L., Zhang, Y., Xing, C. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Adverse drug reaction early warning using user search data

Shang, W., Chen, H. & Livoti, C., 2017, In : Online Information Review. 41, 4, p. 524-536 13 p.

Research output: Contribution to journalArticle

A hierarchical Naïve Bayes model for approximate identity matching

Wang, G. A., Atabakhsh, H. & Chen, H., Jun 1 2011, In : Decision Support Systems. 51, 3, p. 413-423 11 p.

Research output: Contribution to journalArticle

14 Scopus citations

A multi-region empirical study on the internet presence of global extremist organizations

Qin, J., Zhou, Y. & Chen, H., Mar 1 2011, In : Information Systems Frontiers. 13, 1, p. 75-88 14 p.

Research output: Contribution to journalArticle

17 Scopus citations

A multi-theoretical framework for hypotheses testing of temporal network patterns

Jiang, S. & Chen, H., Jan 1 2014.

Research output: Contribution to conferencePaper

1 Scopus citations

Analyzing firm-specific social media and market: A stakeholder-based event analysis framework

Jiang, S., Chen, H., Nunamaker, J. F. & Zimbra, D., 2014, In : Decision Support Systems. 67, p. 30-39 10 p.

Research output: Contribution to journalArticle

16 Scopus citations
5 Scopus citations

Analyzing market performance via social media: A case study of a banking industry crisis

Jiang, C. Q., Liang, K., Chen, H. & Ding, Y., Jan 1 2014, In : Science China Information Sciences. 57, 5, p. 1-18 18 p.

Research output: Contribution to journalArticle

11 Scopus citations

Analyzing sentiments in Web 2.0 social media data in Chinese: Experiments on business and marketing related Chinese Web forums

Fan, L., Zhang, Y., Dang, Y. & Chen, H., Sep 1 2013, In : Information Technology and Management. 14, 3, p. 231-242 12 p.

Research output: Contribution to journalArticle

8 Scopus citations

An event-driven SIR model for topic diffusion in web forums

Woo, J. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

An integrated framework for analyzing multilingual content in Web 2.0 social media

Dang, Y., Zhang, Y., Hu, P. J. H., Brown, S. A., Ku, Y., Wang, J. H. & Chen, H., May 2014, In : Decision Support Systems. 61, 1, p. 126-135 10 p.

Research output: Contribution to journalArticle

14 Scopus citations

An SIR model for violent topic diffusion in social media

Woo, J., Son, J. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations
32 Scopus citations

Artificial immune system for illicit content identification in social media

Yang, M., Kiang, M., Chen, H. & Li, Y., Feb 1 2012, In : Journal of the American Society for Information Science and Technology. 63, 2, p. 256-269 14 p.

Research output: Contribution to journalArticle

7 Scopus citations

A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care

Zhu, H., Chen, H. & Brown, R., Aug 2018, In : Journal of Biomedical Informatics. 84, p. 148-158 11 p.

Research output: Contribution to journalArticle

7 Scopus citations

Assessing medical device vulnerabilities on the Internet of Things

McMahon, E., Williams, R., El, M., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 176-178 3 p. 8004903

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

Liu, X. & Chen, H., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Scopus citations

AZpharm metaalert: A meta-learning framework for pharmacovigilance

Liu, X. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Springer Verlag, Vol. 10219 LNCS. p. 147-154 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benchmarking vulnerability assessment tools for enhanced cyber-physical system (CPS) Resiliency

McMahon, E., Patton, M., Samtani, S. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 8587353

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments

El, M., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Institute of Electrical and Electronics Engineers Inc., p. 83-88 6 p. 8004879

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
7 Scopus citations

Business intelligence and analytics: From big data to big impact

Chen, H., Chiang, R. H. L. & Storey, V. C., 2012, In : MIS Quarterly: Management Information Systems. 36, 4, p. 1165-1188 24 p.

Research output: Contribution to journalArticle

2398 Scopus citations

Business intelligence and analytics: Research directions

Lim, E. P., Chen, H. & Chen, G., Jan 2013, In : ACM Transactions on Management Information Systems. 3, 4, 17.

Research output: Contribution to journalReview article

66 Scopus citations

Collaborative friendship networks in online healthcare communities: An exponential random graph model analysis

Song, X., Jiang, S., Yan, X. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 75-87 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Comparing nanotechnology landscapes in the US and China: a patent analysis perspective

Wu, L., Zhu, H., Chen, H. & Roco, M. C., Aug 1 2019, In : Journal of Nanoparticle Research. 21, 8, 180.

Research output: Contribution to journalArticle

Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

Chung, K. C., Chen, H. C. & Liao, W., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6133735. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Credit rating change modeling using news and financial ratios

Lu, H. M., Tsai, F. T., Chen, H., Hung, M. W. & Li, S. H., Oct 1 2012, In : ACM Transactions on Management Information Systems. 3, 3, 14.

Research output: Contribution to journalArticle

9 Scopus citations

Dark-net ecosystem cyber-threat intelligence (CTI) Tool

Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 92-97 6 p. 8823501. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Descriptive analytics: Examining expert hackers in web forums

Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Scopus citations

Detecting cyber threats in non-english dark net markets: A cross-lingual transfer learning approach

Ebrahimi, M., Surdeanu, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 8587404. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
16 Scopus citations

Developing understanding of hacker language through the use of lexical semantics

Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Diabetes-related topic detection in Chinese health websites using deep learning

Chen, X., Zhang, Y., Xing, C., Liu, X. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

DiabeticLink: A health big data system for patient empowerment and personalized healthcare

Chen, H., Compton, S. & Hsiao, O., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

DiabeticLink: An integrated and intelligent cyber-enabled health social platform for diabetic patients

Chuang, J., Hsiao, O., Wu, P. L., Chen, J., Liu, X., De La Cruz, H., Li, S. H. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 63-74 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

DICE-E: A framework for conducting Darknet identification, collection, evaluation with ethics

Benjamin, V., Valacich, J. S. & Chen, H., Mar 1 2019, In : MIS Quarterly: Management Information Systems. 43, 1, p. 1-22 22 p.

Research output: Contribution to journalArticle

6 Scopus citations

Disease named entity recognition using semisupervised learning and conditional random fields

Suakkaphong, N., Zhang, Z. & Chen, H., Apr 1 2011, In : Journal of the American Society for Information Science and Technology. 62, 4, p. 727-737 11 p.

Research output: Contribution to journalArticle

10 Scopus citations

Do electronic health records affect quality of care? Evidence from the HITECH act

Lin, Y. K., Lin, M. & Chen, H., Jan 1 2019, In : Information Systems Research. 30, 1, p. 306-318 13 p.

Research output: Contribution to journalArticle

2 Scopus citations

Dynamic user-level affect analysis in social media: Modeling violence in the dark web

Zeng, S., Lin, M. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Editorial: Design science, grand challenges, and societal impacts

Chen, H., Mar 1 2011, In : ACM Transactions on Management Information Systems. 2, 1, 1.

Research output: Contribution to journalReview article

18 Scopus citations

Effects of heart rate variability biofeedback therapy on patients with poststroke depression: A case study

Li, X., Zhang, T., Song, L. P., Zhang, Y., Zhang, G. G., Xing, C. X. & Chen, H., Sep 1 2015, In : Chinese Medical Journal. 128, 18, p. 2542-2545 4 p.

Research output: Contribution to journalArticle

6 Scopus citations

Emoticon analysis for Chinese health and fitness topics

Yu, S., Zhu, H., Jiang, S. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Emoticon analysis for Chinese social media and e-commerce: The azemo system

Yu, S., Zhu, H., Jiang, S., Zhang, Y., Xing, C. & Chen, H., Mar 2019, In : ACM Transactions on Management Information Systems. 9, 4, 16.

Research output: Contribution to journalArticle

1 Scopus citations

Enhancing predictive analytics for anti-phishing by exploiting website genre information

Abbasi, A., Zahedi, F. M., Zeng, D., Chen, Y., Chen, H. & Nunamaker, J. F., Jan 1 2015, In : Journal of Management Information Systems. 31, 4, p. 109-157 49 p.

Research output: Contribution to journalArticle

32 Scopus citations

Enterprise risk and security management: Data, text and Web mining

Chen, H., Chau, M. & Li, S. H., Mar 1 2011, In : Decision Support Systems. 50, 4, p. 649-650 2 p.

Research output: Contribution to journalEditorial

8 Scopus citations

Evaluating an integrated forum portal for terrorist surveillance and analysis

Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Evaluating sentiment in financial news articles

Schumaker, R. P., Zhang, Y., Huang, C. N. & Chen, H., Jun 2012, In : Decision Support Systems. 53, 3, p. 458-464 7 p.

Research output: Contribution to journalArticle

149 Scopus citations

Evaluating text visualization: An experiment in authorship analysis

Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Examining patterns of scientific knowledge diffusion based on knowledge cyber infrastructure: a multi-dimensional network approach

Jiang, S. & Chen, H., Dec 1 2019, In : Scientometrics. 121, 3, p. 1599-1617 19 p.

Research output: Contribution to journalArticle

1 Scopus citations