Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected Filters

Publication Year

  • 2019
  • 2018
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Hsinchun Chen
2014

Identifying top sellers in underground economy using deep learning-based sentiment analysis

Li, W. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 64-67 4 p. 6975555. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations

Nanotechnology knowledge diffusion: Measuring the impact of the research networking and a strategy for improvement

Liu, X., Jiang, S., Chen, H., Larson, C. A. & Roco, M. C., Sep 2014, In : Journal of Nanoparticle Research. 16, 9, 2613.

Research output: Contribution to journalReview article

8 Scopus citations

Smart and connected health

Leroy, G., Chen, H. & Rindflesch, T. C., Jan 1 2014, In : IEEE Intelligent Systems. 29, 3, p. 2-5 4 p., 6871720.

Research output: Contribution to journalReview article

17 Scopus citations

Text mining self-disclosing health information for public health service

Ku, Y., Chiu, C., Zhang, Y., Chen, H. & Su, H., Jan 1 2014, In : Journal of the Association for Information Science and Technology. 65, 5, p. 928-947 20 p.

Research output: Contribution to journalArticle

8 Scopus citations

The information content of mandatory risk factor disclosures in corporate filings

Campbell, J. L., Chen, H., Dhaliwal, D. S., Lu, H. M. & Steele, L. B., Mar 2014, In : Review of Accounting Studies. 19, 1, p. 396-455 60 p.

Research output: Contribution to journalArticle

135 Scopus citations

Time-to-event modeling for predicting hacker IRC community participant trajectory

Benjamin, V. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 6975550. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Time-to-event predictive modeling for chronic conditions using electronic health records

Lin, Y. K., Chen, H., Brown, R. A., Li, S. H. & Yang, H. J., Jan 1 2014, In : IEEE Intelligent Systems. 29, 3, p. 14-20 7 p., 6813395.

Research output: Contribution to journalArticle

7 Scopus citations

Uninvited connections: A study of vulnerable devices on the internet of things (IoT)

Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 232-235 4 p. 6975580. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

60 Scopus citations
2013

A computational approach to detecting and assessing sustainability-related communities in social media

Jiang, S. & Chen, H., Dec 1 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 48-58 11 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Analyzing sentiments in Web 2.0 social media data in Chinese: Experiments on business and marketing related Chinese Web forums

Fan, L., Zhang, Y., Dang, Y. & Chen, H., Sep 1 2013, In : Information Technology and Management. 14, 3, p. 231-242 12 p.

Research output: Contribution to journalArticle

8 Scopus citations

AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

Liu, X. & Chen, H., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Scopus citations

Business intelligence and analytics: Research directions

Lim, E. P., Chen, H. & Chen, G., Jan 2013, In : ACM Transactions on Management Information Systems. 3, 4, 17.

Research output: Contribution to journalReview article

67 Scopus citations

DiabeticLink: A health big data system for patient empowerment and personalized healthcare

Chen, H., Compton, S. & Hsiao, O., Aug 12 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Evaluating text visualization: An experiment in authorship analysis

Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Global nanotechnology development from 1991 to 2012: Patents, scientific publications, and effect of NSF funding

Chen, H., Roco, M. C., Son, J., Jiang, S., Larson, C. A. & Gao, Q., 2013, In : Journal of Nanoparticle Research. 15, 9, 1951.

Research output: Contribution to journalReview article

50 Scopus citations

Machine learning for attack vector identification in malicious source code

Benjamin, V. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 21-23 3 p. 6578779. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

MedTime: A temporal information extraction system for clinical narratives

Lin, Y. K., Chen, H. & Brown, R. A., Dec 2013, In : Journal of Biomedical Informatics. 46, SUPPL., p. S20-S28

Research output: Contribution to journalArticle

23 Scopus citations

Nanotechnology public funding and impact analysis: A tale of two decades (1991-2010)

Chen, H., Roco, M. C. & Son, J., 2013, In : IEEE Nanotechnology Magazine. 7, 1, p. 9-14 6 p., 6450164.

Research output: Contribution to journalArticle

10 Scopus citations

Recommendation as link prediction in bipartite graphs: A graph kernel-based machine learning approach

Li, X. & Chen, H., Jan 1 2013, In : Decision Support Systems. 54, 2, p. 880-890 11 p.

Research output: Contribution to journalArticle

124 Scopus citations

Research note: Examining gender emotional differences in Web forum communication

Zhang, Y., Dang, Y. & Chen, H., Jun 1 2013, In : Decision Support Systems. 55, 3, p. 851-860 10 p.

Research output: Contribution to journalArticle

20 Scopus citations

Revealing the Hidden World of the Dark Web: Social Media Forums and Videos11

Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., Aug 27 2013, Intelligent Systems for Security Informatics. Elsevier Inc., p. 1-28 28 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Scopus citations

Statistical modeling of nanotechnology knowledge diffusion networks

Jiang, S., Gao, Q. & Chen, H., Dec 1 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 3552-3571 20 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2012

An event-driven SIR model for topic diffusion in web forums

Woo, J. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Artificial immune system for illicit content identification in social media

Yang, M., Kiang, M., Chen, H. & Li, Y., Feb 1 2012, In : Journal of the American Society for Information Science and Technology. 63, 2, p. 256-269 14 p.

Research output: Contribution to journalArticle

7 Scopus citations

Business intelligence and analytics: From big data to big impact

Chen, H., Chiang, R. H. L. & Storey, V. C., 2012, In : MIS Quarterly: Management Information Systems. 36, 4, p. 1165-1188 24 p.

Research output: Contribution to journalArticle

2459 Scopus citations

Credit rating change modeling using news and financial ratios

Lu, H. M., Tsai, F. T., Chen, H., Hung, M. W. & Li, S. H., Oct 1 2012, In : ACM Transactions on Management Information Systems. 3, 3, 14.

Research output: Contribution to journalArticle

9 Scopus citations

Evaluating an integrated forum portal for terrorist surveillance and analysis

Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Evaluating sentiment in financial news articles

Schumaker, R. P., Zhang, Y., Huang, C. N. & Chen, H., Jun 2012, In : Decision Support Systems. 53, 3, p. 458-464 7 p.

Research output: Contribution to journalArticle

151 Scopus citations

Partially supervised learning for radical opinion identification in hate group web forums

Yang, M. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 96-101 6 p. 6284099. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Scalable sentiment classification across multiple dark web forums

Zimbra, D. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 78-83 6 p. 6284095. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Securing cyberspace: Identifying key actors in hacker communities

Benjamin, V. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

Sentimental spidering: Leveraging opinion information in focused crawlers

Fu, T., Abbasi, A., Zeng, D. & Chen, H., Nov 1 2012, In : ACM Transactions on Information Systems. 30, 4, 24.

Research output: Contribution to journalArticle

26 Scopus citations

SHB 2012: International workshop on smart health and wellbeing

Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., Dec 19 2012, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management. p. 2762-2763 2 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

SHB chairs' welcome

Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., Dec 7 2012, In : International Conference on Information and Knowledge Management, Proceedings. p. iii

Research output: Contribution to journalEditorial

Theory-informed design and evaluation of an advanced search and knowledge mapping system in nanotechnology

Dang, Y., Zhang, Y., Chen, H., Brown, S. A., Hu, P. J. H. & Nunamaker, J. F., Apr 1 2012, In : Journal of Management Information Systems. 28, 4, p. 99-128 30 p.

Research output: Contribution to journalArticle

16 Scopus citations

Understanding avatar sentiments using verbal and non- verbal cues

Zhang, Y., Dang, Y., Brown, S. A. & Chen, H., Dec 1 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 4030-4035 6 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Using burst detection techniques to identify suspicious vehicular traffic at border crossings

Kaza, S., Lu, H. M., Zeng, D. & Chen, H., Oct 17 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 212-214 3 p. 6284311. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2011

A hierarchical Naïve Bayes model for approximate identity matching

Wang, G. A., Atabakhsh, H. & Chen, H., Jun 1 2011, In : Decision Support Systems. 51, 3, p. 413-423 11 p.

Research output: Contribution to journalArticle

14 Scopus citations

A multi-region empirical study on the internet presence of global extremist organizations

Qin, J., Zhou, Y. & Chen, H., Mar 1 2011, In : Information Systems Frontiers. 13, 1, p. 75-88 14 p.

Research output: Contribution to journalArticle

18 Scopus citations
5 Scopus citations

An SIR model for violent topic diffusion in social media

Woo, J., Son, J. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

Chung, K. C., Chen, H. C. & Liao, W., Dec 1 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6133735. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations
16 Scopus citations

Disease named entity recognition using semisupervised learning and conditional random fields

Suakkaphong, N., Zhang, Z. & Chen, H., Apr 1 2011, In : Journal of the American Society for Information Science and Technology. 62, 4, p. 727-737 11 p.

Research output: Contribution to journalArticle

11 Scopus citations

Dynamic user-level affect analysis in social media: Modeling violence in the dark web

Zeng, S., Lin, M. & Chen, H., Sep 22 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Editorial: Design science, grand challenges, and societal impacts

Chen, H., Mar 1 2011, In : ACM Transactions on Management Information Systems. 2, 1, 1.

Research output: Contribution to journalReview article

18 Scopus citations