Find Research Outputs

Search concepts
Selected Filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2016

Author

  • Hsinchun Chen
2020

A deep learning architecture for psychometric natural language processing

Ahmad, F., Abbasi, A., Li, J., Dobolyi, D. G., Netemeyer, R. G., Clifford, G. D. & Chen, H., Feb 5 2020, In : ACM Transactions on Information Systems. 38, 1, 3365211.

Research output: Contribution to journalArticle

Open Access
2019
1 Scopus citations

Comparing nanotechnology landscapes in the US and China: a patent analysis perspective

Wu, L., Zhu, H., Chen, H. & Roco, M. C., Aug 1 2019, In : Journal of Nanoparticle Research. 21, 8, 180.

Research output: Contribution to journalArticle

Dark-net ecosystem cyber-threat intelligence (CTI) Tool

Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 92-97 6 p. 8823501. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DICE-E: A framework for conducting Darknet identification, collection, evaluation with ethics

Benjamin, V., Valacich, J. S. & Chen, H., Mar 1 2019, In : MIS Quarterly: Management Information Systems. 43, 1, p. 1-22 22 p.

Research output: Contribution to journalArticle

5 Scopus citations

Do electronic health records affect quality of care? Evidence from the HITECH act

Lin, Y. K., Lin, M. & Chen, H., Jan 1 2019, In : Information Systems Research. 30, 1, p. 306-318 13 p.

Research output: Contribution to journalArticle

2 Scopus citations

Emoticon analysis for Chinese social media and e-commerce: The azemo system

Yu, S., Zhu, H., Jiang, S., Zhang, Y., Xing, C. & Chen, H., Mar 2019, In : ACM Transactions on Management Information Systems. 9, 4, 16.

Research output: Contribution to journalArticle

Examining patterns of scientific knowledge diffusion based on knowledge cyber infrastructure: a multi-dimensional network approach

Jiang, S. & Chen, H., Dec 1 2019, In : Scientometrics. 121, 3, p. 1599-1617 19 p.

Research output: Contribution to journalArticle

1 Scopus citations

Identifying high-impact opioid products and key sellers in dark net marketplaces: An interpretable text analytics approach

Du, P. Y., Ebrahimi, M., Zhang, N., Chen, H., Brown, R. A. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 8823196. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Performance modeling of hyperledger sawtooth blockchain

Ampel, B., Patton, M. & Chen, H., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 59-61 3 p. 8823238. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Preface

Chen, H., Zeng, D., Yan, X. & Xing, C., Jan 1 2019, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11924 LNCS, p. v

Research output: Contribution to journalEditorial

2018

A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care

Zhu, H., Chen, H. & Brown, R., Aug 2018, In : Journal of Biomedical Informatics. 84, p. 148-158 11 p.

Research output: Contribution to journalArticle

6 Scopus citations

Benchmarking vulnerability assessment tools for enhanced cyber-physical system (CPS) Resiliency

McMahon, E., Patton, M., Samtani, S. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 8587353

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting cyber threats in non-english dark net markets: A cross-lingual transfer learning approach

Ebrahimi, M., Surdeanu, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 8587404. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system

Dang, Y. M., Zhang, Y. G., Brown, S. A. & Chen, H., Jan 1 2018, (Accepted/In press) In : Information Systems Frontiers.

Research output: Contribution to journalArticle

2 Scopus citations

Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs

Du, P. Y., Zhang, N., Ebrahimi, M., Samtani, S., Lazarine, B., Arnold, N., Dunn, R., Suntwal, S., Angeles, G., Schweitzer, R. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 70-75 6 p. 8587327

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Identifying Supervisory Control and Data Acquisition (SCADA) Devices and their Vulnerabilities on the Internet of Things (IoT): A Text Mining Approach

Samtani, S., Yu, S., Zhu, H., Patton, M., Matherly, J. & Chen, H., Jan 12 2018, (Accepted/In press) In : IEEE Intelligent Systems.

Research output: Contribution to journalArticle

5 Scopus citations

Incremental hacker forum exploit collection and classification for proactive cyber threat intelligence: An exploratory study

Williams, R., Samtani, S., Patton, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. 8587336

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Motion sensor-based assessment on fall risk and Parkinson's disease severity: A deep multi-source multi-task learning (DMML) Approach

Yu, S., Chen, H., Brown, R. & Sherman, S. J., Jul 24 2018, Proceedings - 2018 IEEE International Conference on Healthcare Informatics, ICHI 2018. Institute of Electrical and Electronics Engineers Inc., p. 174-179 6 p. 8419360

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Preface

Chen, H., Fang, Q., Zeng, D. & Wu, J., Jan 1 2018, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10983 LNCS

Research output: Contribution to journalEditorial

The state-of-the-art in twitter sentiment analysis: A review and benchmark evaluation

Zimbra, D., Abbasi, A., Zeng, D. & Chen, H., Apr 2018, In : ACM Transactions on Management Information Systems. 9, 2, 5.

Research output: Contribution to journalReview article

14 Scopus citations

Vulnerability assessment, remediation, and automated reporting: Case studies of higher education institutions

Harrell, C. R., Patton, M., Chen, H. & Samtani, S., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 148-153 6 p. 8587380. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web Media and Stock Markets: A Survey and Future Directions from a Big Data Perspective

Li, Q., Chen, Y., Wang, J., Chen, Y. & Chen, H., Feb 1 2018, In : IEEE Transactions on Knowledge and Data Engineering. 30, 2, p. 381-399 19 p., 8068217.

Research output: Contribution to journalArticle

16 Scopus citations
2016

Anonymous port scanning: Performing network reconnaissance through Tor

Rohrmann, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 217 1 p. 7745475

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

A Tensor-Based Information Framework for Predicting the Stock Market

Li, Q., Chen, Y., Jiang, L. L., Li, P. & Chen, H., Feb 2016, In : ACM Transactions on Information Systems. 34, 2, 11.

Research output: Contribution to journalArticle

21 Scopus citations

AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis

Samtani, S., Chinn, K., Larson, C. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-24 6 p. 7745437

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Chinese underground market jargon analysis based on unsupervised learning

Zhao, K., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 97-102 6 p. 7745450. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Chronic disease related entity extraction in online Chinese question and answer services

Zhang, Y., Zhang, Y., Yin, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 55-67 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Conducting large-scale analyses of underground hacker communities

Benjamin, V., Samtani, S. & Chen, H., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 56-75 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Deep learning based topic identification and categorization: Mining diabetes-related topics on Chinese health websites

Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9642. p. 481-500 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9642).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Diabeticlink: An internationally collaborative cyber-enabled patient empowerment platform

Samtani, G., Maimoon, L., Chuang, J., Nybroe, C., Liu, X., Wiil, U., Li, S. H. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 299-310 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Effects of individuals’ motivations on communications in online health forums

Wu, B., Jiang, S. & Chen, H., 2016, In : Social Behavior and Personality. 44, 2, p. 299-312 14 p.

Research output: Contribution to journalArticle

4 Scopus citations

Epidemic model for information diffusion in web forums: experiments in marketing exchange and political dialog

Woo, J. & Chen, H., Dec 1 2016, In : SpringerPlus. 5, 1, p. 1-19 19 p., 66.

Research output: Contribution to journalArticle

23 Scopus citations

Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities

Benjamin, V., Zhang, B., Nunamaker, J. F. & Chen, H., Apr 2 2016, In : Journal of Management Information Systems. 33, 2, p. 482-510 29 p.

Research output: Contribution to journalArticle

22 Scopus citations

Exploring key hackers and cybersecurity threats in Chinese hacker communities

Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 7745436

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Exploring the online underground marketplaces through topic-based social network and clustering

Huang, S. Y. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 145-150 6 p. 7745458

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Health-related spammer detection on chinese social media

Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 284-295 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System

Li, W., Chen, H. & Nunamaker, J. F., Oct 1 2016, In : Journal of Management Information Systems. 33, 4, p. 1059-1086 28 p.

Research output: Contribution to journalArticle

17 Scopus citations

Identifying devices across the IPv4 address space

Jicha, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 199-201 3 p. 7745469

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying high quality carding services in underground economy using nonparametric supervised topic model

Li, W., Yin, J. & Chen, H., 2016, 2016 International Conference on Information Systems, ICIS 2016. Association for Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying language groups within multilingual cybercriminal forums

Benjamin, V. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 205-207 3 p. 7745471

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

Samtani, S., Yu, S., Zhu, H., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 25-30 6 p. 7745438

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Identifying the socio-spatial dynamics of terrorist attacks in the Middle East

Li, Z., Sun, D., Chen, H. & Huang, S. Y., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7745463

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Identifying top listers in Alphabay using Latent Dirichlet Allocation

Grisham, J., Barreras, C., Afarin, C., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 219 1 p. 7745477

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Intelligence and security informatics: 11th Pacific Asia workshop, PAISI 2016 Auckland, New Zealand, April 19, 2016 proceedings

Chau, M., Alan Wang, G. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9650. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9650).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modeling one-mode projection of bipartite networks by tagging vertex information

Qiao, J., Meng, Y. Y., Chen, H., Huang, H. Q. & Li, G. Y., Sep 1 2016, In : Physica A: Statistical Mechanics and its Applications. 457, p. 270-279 10 p.

Research output: Contribution to journalArticle

6 Scopus citations

NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks

Jiang, S. & Chen, H., Mar 1 2016, In : IEEE Transactions on Knowledge and Data Engineering. 28, 3, p. 729-740 12 p., 7303952.

Research output: Contribution to journalArticle

3 Scopus citations

NATERGM: A model for examining the role of Nodal Attributes in dynamic social media networks

Jiang, S. & Chen, H., Jun 22 2016, 2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1458-1459 2 p. 7498373

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Preface

Zheng, X., Zeng, D., Chen, H. & Leischow, S. J., 2016, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9545, p. VI

Research output: Contribution to journalArticle