Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected Filters

Publication Year

  • 2019
  • 2018
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Hsinchun Chen
Review article
5 Scopus citations

Business intelligence and analytics: Research directions

Lim, E. P., Chen, H. & Chen, G., Jan 2013, In : ACM Transactions on Management Information Systems. 3, 4, 17.

Research output: Contribution to journalReview article

69 Scopus citations

Editorial: Design science, grand challenges, and societal impacts

Chen, H., Mar 1 2011, In : ACM Transactions on Management Information Systems. 2, 1, 1.

Research output: Contribution to journalReview article

18 Scopus citations

Global nanotechnology development from 1991 to 2012: Patents, scientific publications, and effect of NSF funding

Chen, H., Roco, M. C., Son, J., Jiang, S., Larson, C. A. & Gao, Q., 2013, In : Journal of Nanoparticle Research. 15, 9, 1951.

Research output: Contribution to journalReview article

50 Scopus citations

Nanotechnology knowledge diffusion: Measuring the impact of the research networking and a strategy for improvement

Liu, X., Jiang, S., Chen, H., Larson, C. A. & Roco, M. C., Sep 2014, In : Journal of Nanoparticle Research. 16, 9, 2613.

Research output: Contribution to journalReview article

8 Scopus citations

Smart and connected health

Leroy, G., Chen, H. & Rindflesch, T. C., Jan 1 2014, In : IEEE Intelligent Systems. 29, 3, p. 2-5 4 p., 6871720.

Research output: Contribution to journalReview article

17 Scopus citations

The state-of-the-art in twitter sentiment analysis: A review and benchmark evaluation

Zimbra, D., Abbasi, A., Zeng, D. & Chen, H., Apr 2018, In : ACM Transactions on Management Information Systems. 9, 2, 5.

Research output: Contribution to journalReview article

22 Scopus citations
Paper

A multi-theoretical framework for hypotheses testing of temporal network patterns

Jiang, S. & Chen, H., Jan 1 2014.

Research output: Contribution to conferencePaper

1 Scopus citations

Healthcare analytics and clinical intelligence: A risk prediction framework for chronic care completed research paper

Lin, Y. K., Chen, H., Brown, R. A., Li, S. H. & Yang, H. J., Jan 1 2014.

Research output: Contribution to conferencePaper

1 Scopus citations
Editorial

Enterprise risk and security management: Data, text and Web mining

Chen, H., Chau, M. & Li, S. H., Mar 2011, In : Decision Support Systems. 50, 4, p. 649-650 2 p.

Research output: Contribution to journalEditorial

8 Scopus citations

Introduction to special issue on terrorism informatics

Chen, H., Zhou, Y., Reid, E. F. & Larson, C. A., Mar 1 2011, In : Information Systems Frontiers. 13, 1, p. 1-3 3 p.

Research output: Contribution to journalEditorial

5 Scopus citations

Preface

Chen, H., Zeng, D., Yan, X. & Xing, C., Jan 1 2019, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11924 LNCS, p. v

Research output: Contribution to journalEditorial

Preface

Chen, H., Fang, Q., Zeng, D. & Wu, J., Jan 1 2018, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10983 LNCS

Research output: Contribution to journalEditorial

SHB chairs' welcome

Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., Dec 7 2012, In : International Conference on Information and Knowledge Management, Proceedings. p. iii

Research output: Contribution to journalEditorial

11 Scopus citations
Conference contribution

A computational approach to detecting and assessing sustainability-related communities in social media

Jiang, S. & Chen, H., Dec 1 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 48-58 11 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A control study on the effects of HRV biofeedback therapy in patients with post-stroke depression

Li, X., Zhang, T., Song, L., Zhang, Y., Xing, C. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An event-driven SIR model for topic diffusion in web forums

Woo, J. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

An SIR model for violent topic diffusion in social media

Woo, J., Son, J. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

Liu, X. & Chen, H., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Scopus citations

Benchmarking vulnerability assessment tools for enhanced cyber-physical system (CPS) Resiliency

McMahon, E., Patton, M., Samtani, S. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 8587353

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Collaborative friendship networks in online healthcare communities: An exponential random graph model analysis

Song, X., Jiang, S., Yan, X. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 75-87 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

Chung, K. C., Chen, H. C. & Liao, W., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6133735. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Dark-net ecosystem cyber-threat intelligence (CTI) Tool

Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 92-97 6 p. 8823501. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Descriptive analytics: Examining expert hackers in web forums

Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Scopus citations

Detecting cyber threats in non-english dark net markets: A cross-lingual transfer learning approach

Ebrahimi, M., Surdeanu, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 8587404. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Developing understanding of hacker language through the use of lexical semantics

Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Diabetes-related topic detection in Chinese health websites using deep learning

Chen, X., Zhang, Y., Xing, C., Liu, X. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

DiabeticLink: A health big data system for patient empowerment and personalized healthcare

Chen, H., Compton, S. & Hsiao, O., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

DiabeticLink: An integrated and intelligent cyber-enabled health social platform for diabetic patients

Chuang, J., Hsiao, O., Wu, P. L., Chen, J., Liu, X., De La Cruz, H., Li, S. H. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 63-74 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Dynamic user-level affect analysis in social media: Modeling violence in the dark web

Zeng, S., Lin, M. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Emoticon analysis for Chinese health and fitness topics

Yu, S., Zhu, H., Jiang, S. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Evaluating an integrated forum portal for terrorist surveillance and analysis

Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Evaluating text visualization: An experiment in authorship analysis

Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Exploring hacker assets in underground forums

Samtani, S., Chinn, R. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 31-36 6 p. 7165935

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations

Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

Benjamin, V., Li, W., Holt, T. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7165944

Research output: Chapter in Book/Report/Conference proceedingConference contribution

56 Scopus citations

HealthQA: A Chinese QA summary system for smart health

Yin, Y., Zhang, Y., Liu, X., Zhang, Y., Xing, C. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 51-62 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs

Du, P. Y., Zhang, N., Ebrahimi, M., Samtani, S., Lazarine, B., Arnold, N., Dunn, R., Suntwal, S., Angeles, G., Schweitzer, R. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 70-75 6 p. 8587327. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Identifying adverse drug events from health social media: A case study on heart disease discussion forums

Liu, X., Liu, J. & Chen, H., Jan 1 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Identifying high-impact opioid products and key sellers in dark net marketplaces: An interpretable text analytics approach

Du, P. Y., Ebrahimi, M., Zhang, N., Chen, H., Brown, R. A. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 8823196. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identifying top sellers in underground economy using deep learning-based sentiment analysis

Li, W. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 64-67 4 p. 6975555. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Scopus citations

Incremental hacker forum exploit collection and classification for proactive cyber threat intelligence: An exploratory study

Williams, R., Samtani, S., Patton, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. 8587336

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Intelligence and security informatics: Pacific Asia Workshop, PAISI 2015 Ho Chi Minh City, Vietnam, May 19, 2015 proceedings

Chau, M., Wang, G. A. & Chen, H., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9074. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9074).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Machine learning for attack vector identification in malicious source code

Benjamin, V. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 21-23 3 p. 6578779. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations