Calculated based on number of publications stored in Pure and citations from Scopus
1989 …2024

Research activity per year

Search results

  • Conference contribution

    Exploring extremism and terrorism on the web: The Dark Web project

    Hsinchun, C., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Exploring hacker assets in underground forums

    Samtani, S., Chinn, R. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 31-36 6 p. 7165935. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    73 Scopus citations
  • Exploring key hackers and cybersecurity threats in Chinese hacker communities

    Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 7745436. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Exploring the dark side of the Web: Collection and analysis of U.S. extremist online forums

    Zhou, Y., Qin, J., Lai, G., Reid, E. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 621-626 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach

    Otto, K., Ampel, B., Samtani, S., Zhu, H. & Chen, H., 2021, Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Exploring the online underground marketplaces through topic-based social network and clustering

    Huang, S. Y. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 145-150 6 p. 7745458. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

    Benjamin, V., Li, W., Holt, T. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7165944. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    95 Scopus citations
  • Fall detection with orientation calibration using a single motion sensor

    Yu, S. & Chen, H., 2017, Wireless Mobile Communication and Healthcare - 6th International Conference, MobiHealth 2016, Proceedings. Rizzo, G., Perego, P. & Andreoni, G. (eds.). Springer-Verlag, p. 233-240 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 192).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • From digital library to digital government: A case study in crime data mapping and mining

    Chen, H., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, E.-P., Foo, S., Khoo, C., Chen, H., Fox, E., Urs, S. & Costantino, T. (eds.). Springer-Verlag, p. 36-52 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2555).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Gender difference analysis of political web forums: An experiment on an international Islamic women's forum

    Yulei, Z., Yan, D. & Hsinchun, C., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 61-64 4 p. 5137272. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Genescene: Biomedical text and data mining

    Leroy, G., Chen, H., Martinez, J. D., Eggers, S., Falsey, R. R., Kislin, K. L., Huang, Z., Li, J., Xu, J., McDonald, D. M. & Ng, G., 2003, Proceedings - 2003 Joint Conference on Digital Libraries, JCDL 2003. Delcambre, L., Henry, G. & Marshall, C. C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 116-118 3 p. 1204849. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    11 Scopus citations
  • Global disease surveillance using social media: HIV/AIDS content intervention in web forums

    Ku, Y., Chiu, C., Zhang, Y., Fan, L. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 170 1 p. 5484749. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Global foot-and-mouth disease surveillance using bioportal

    Thurmond, M., Perez, A., Tseng, C., Chen, H. & Zeng, D., 2007, Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, Proceedings. Springer-Verlag, p. 169-179 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Graph kernel-based learning for gene function prediction from gene interaction network

    Li, X., Zhang, Z., Chen, H. & Li, J., 2007, Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007. p. 368-373 6 p. 4413079. (Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • HealthQA: A Chinese QA summary system for smart health

    Yin, Y., Zhang, Y., Liu, X., Zhang, Y., Xing, C. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 51-62 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Health-related spammer detection on chinese social media

    Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 284-295 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Identification of extremist videos in online video sharing sites

    Tianjun, F., Huang, C. N. & Hsinchun, C., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 179-181 3 p. 5137295. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web

    Liu, Y., Lin, F. Y., Ahmad-Post, Z., Ebrahimi, M., Zhang, N., Hu, J. L., Xin, J., Li, W. & Chen, H., Nov 9 2020, Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020. Institute of Electrical and Electronics Engineers Inc., 9280540. (Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs

    Du, P. Y., Zhang, N., Ebrahimi, M., Samtani, S., Lazarine, B., Arnold, N., Dunn, R., Suntwal, S., Angeles, G., Schweitzer, R. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 70-75 6 p. 8587327. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    36 Scopus citations
  • Identifying adverse drug events from health social media: A case study on heart disease discussion forums

    Liu, X., Liu, J. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach

    Vahedi, T., Ampel, B., Samtani, S. & Chen, H., 2021, Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Identifying devices across the IPv4 address space

    Jicha, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 199-201 3 p. 7745469. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Identifying high-impact opioid products and key sellers in dark net marketplaces: An interpretable text analytics approach

    Du, P. Y., Ebrahimi, M., Zhang, N., Chen, H., Brown, R. A. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 110-115 6 p. 8823196. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Identifying high quality carding services in underground economy using nonparametric supervised topic model

    Li, W., Yin, J. & Chen, H., 2016, 2016 International Conference on Information Systems, ICIS 2016. Association for Information Systems, (2016 International Conference on Information Systems, ICIS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Identifying language groups within multilingual cybercriminal forums

    Benjamin, V. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 205-207 3 p. 7745471. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence

    Grisham, J., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Zhou, L., Wang, G. A., Xing, C., Luo, B., Zheng, X. & Zhang, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 8004867. (2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    52 Scopus citations
  • Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

    Samtani, S., Yu, S., Zhu, H., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 25-30 6 p. 7745438. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    57 Scopus citations
  • Identifying the socio-spatial dynamics of terrorist attacks in the Middle East

    Li, Z., Sun, D., Chen, H. & Huang, S. Y., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7745463. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Identifying top listers in Alphabay using Latent Dirichlet Allocation

    Grisham, J., Barreras, C., Afarin, C., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 219 1 p. 7745477. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Identifying top sellers in underground economy using deep learning-based sentiment analysis

    Li, W. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 64-67 4 p. 6975555. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Scopus citations
  • Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach

    Williams, R., McMahon, E., Samtani, S., Patton, M. & Chen, H., Aug 8 2017, 2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017. Zhou, L., Wang, G. A., Xing, C., Luo, B., Zheng, X. & Zhang, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 179-181 3 p. 8004904. (2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    97 Scopus citations
  • Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

    Lazarine, B., Samtani, S., Patton, M., Zhu, H., Ullman, S., Ampel, B. & Chen, H., Nov 9 2020, Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020. Institute of Electrical and Electronics Engineers Inc., 9280544. (Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Identity matching based on probabilistic relational models

    Li, J., Wang, G. & Chen, H., 2006, Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. p. 1457-1464 8 p. (Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • IEDs in the dark web: Lexicon expansion and genre classification

    Chen, H., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 173-175 3 p. 5137293. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Incorporating geographical contacts into social network analysis for contact tracing in epidemiology: A study on Taiwan SARS data

    Chen, Y. D., Tseng, C., King, C. C., Wu, T. S. J. & Chen, H., 2007, Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, Proceedings. Springer-Verlag, p. 23-36 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    24 Scopus citations
  • Incremental hacker forum exploit collection and classification for proactive cyber threat intelligence: An exploratory study

    Williams, R., Samtani, S., Patton, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. 8587336. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Inductive query by examples (IQBE): A machine learning approach

    Chen, H. & She, L., 1994, Proceedings of the Hawaii International Conference on System Sciences. Publ by IEEE, p. 428-437 10 p. (Proceedings of the Hawaii International Conference on System Sciences; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • Intelligence and security informatics: 11th Pacific Asia workshop, PAISI 2016 Auckland, New Zealand, April 19, 2016 proceedings

    Chau, M., Alan Wang, G. & Chen, H., 2016, Intelligence and Security Informatics - 11th Pacific Asia Workshop, PAISI 2016, Proceedings. Chau, M., Wang, G. A. & Chen, H. (eds.). Springer-Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Intelligence and security informatics: Pacific Asia Workshop, PAISI 2015 Ho Chi Minh City, Vietnam, May 19, 2015 proceedings

    Chau, M., Wang, G. A. & Chen, H., 2015, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Proceedings. Chau, M., Wang, G. A. & Chen, H. (eds.). Springer-Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Interaction coherence analysis for dark web forums

    Fu, T., Abbasi, A. & Chen, H., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 343-350 8 p. 4258721. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Interactive internet search through automatic clustering: An empirical study

    Roussinov, D., Tolle, K., Ramsey, M. & Chen, H., Aug 1 1999, Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1999. Association for Computing Machinery, Inc, p. 289-290 2 p. (Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1999).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    4 Scopus citations
  • Internet browsing: Visualizing category map by fisheye and fractal views

    Yang, C. C., Chen, H. & Hong, K., 2002, Proceedings - International Conference on Information Technology: Coding and Computing, ITCC 2002. Institute of Electrical and Electronics Engineers Inc., p. 34-39 6 p. 1000356. (Proceedings - International Conference on Information Technology: Coding and Computing, ITCC 2002).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach

    Ampel, B., Samtani, S., Zhu, H., Ullman, S. & Chen, H., Nov 9 2020, Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020. Institute of Electrical and Electronics Engineers Inc., 9280548. (Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLNK mobile

    Hu, P. J. H., Chen, H. & Hu, H. F., 2009, Proceedings of the 11th International Conference on Electronic Commerce, ICEC 2009. p. 160-168 9 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Linking ontological resources using aggregatable substance identifiers to organize extracted relations

    Marshall, B., Su, H., McDonald, D. & Chen, H., 2005, Proceedings of the Pacific Symposium on Biocomputing 2005, PSB 2005. p. 162-173 12 p. (Proceedings of the Pacific Symposium on Biocomputing 2005, PSB 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach

    Lin, F., Liu, Y., Ebrahimi, M., Ahmad-Post, Z., Hu, J. L., Xin, J., Samtani, S., Li, W. & Chen, H., Nov 2020, Proceedings - 20th IEEE International Conference on Data Mining Workshops, ICDMW 2020. Di Fatta, G., Sheng, V., Cuzzocrea, A., Zaniolo, C. & Wu, X. (eds.). IEEE Computer Society, p. 488-495 8 p. 9346504. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Machine learning approach to document retrieval: An overview and an experiment

    Chen, H., 1994, Proceedings of the Hawaii International Conference on System Sciences. Nunamaker, J. F. & Sprague, R. H. J. (eds.). Publ by IEEE, p. 631-640 10 p. (Proceedings of the Hawaii International Conference on System Sciences; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Machine learning for attack vector identification in malicious source code

    Benjamin, V. A. & Chen, H., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 21-23 3 p. 6578779. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Mapping dark web geolocation

    Mielke, C. & Chen, H., 2008, Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings. p. 97-107 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach

    Ampel, B., Vahedi, T., Samtani, S. & Chen, H., 2023, Proceedings - 2023 IEEE International Conference on Intelligence and Security Informatics, ISI 2023. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2023 IEEE International Conference on Intelligence and Security Informatics, ISI 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution