Calculated based on number of publications stored in Pure and citations from Scopus
1989 …2024

Research activity per year

Search results

  • Conference contribution

    Motion sensor-based assessment on fall risk and Parkinson's disease severity: A deep multi-source multi-task learning (DMML) Approach

    Yu, S., Chen, H., Brown, R. & Sherman, S., Jul 24 2018, Proceedings - 2018 IEEE International Conference on Healthcare Informatics, ICHI 2018. Institute of Electrical and Electronics Engineers Inc., p. 174-179 6 p. 8419360. (Proceedings - 2018 IEEE International Conference on Healthcare Informatics, ICHI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Multi-view Representation Learning from Malware to Defend Against Adversarial Variants

    Hu, J. L., Ebrahimi, M., Li, W., Li, X. & Chen, H., 2022, Proceedings - 22nd IEEE International Conference on Data Mining Workshops, ICDMW 2022. Candan, K. S., Dinh, T. N., Thai, M. T. & Washio, T. (eds.). IEEE Computer Society, p. 451-458 8 p. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 2022-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • NanoPort: An example for building knowledge portals for scientific domains

    Qin, J., Huang, Z., Zhou, Y., Chau, M., Tseng, C., Yip, A., Ng, T. G., Guo, F., Chen, Z. K. & Chen, H., 2003, Proceedings - 2003 Joint Conference on Digital Libraries, JCDL 2003. Delcambre, L., Henry, G. & Marshall, C. C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 387 1 p. 1204903. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • NATERGM: A model for examining the role of Nodal Attributes in dynamic social media networks

    Jiang, S. & Chen, H., Jun 22 2016, 2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1458-1459 2 p. 7498373. (2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Nuclear threat detection via the nuclear web and dark web: Framework and preliminary study

    Chen, H., 2008, Intelligence and Security Informatics - First European Conference, EuroISI 2008, Proceedings. p. 85-96 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5376 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Online query refinement on information retrieval systems: A process model of searcher/system interactions

    Chen, H. & Dhar, V., Dec 1 1989, Proceedings of the 13th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1990. Vidick, J.-L. (ed.). Association for Computing Machinery, Inc, p. 115-133 19 p. (Proceedings of the 13th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1990).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    18 Scopus citations
  • On the topology of the dark web of terrorist groups

    Xu, J., Chen, H., Zhou, Y. & Qin, J., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 367-376 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Ontology-based automatic chief complaints classification for syndromic surveillance

    Lu, H. M., Zeng, D. & Chen, H., 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics. Institute of Electrical and Electronics Engineers Inc., p. 1137-1142 6 p. 4274001. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Optimal search-based gene selection for cancer prognosis

    Li, J. J., Su, H. & Chen, H., 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. p. 2672-2679 8 p. (Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Partially supervised learning for radical opinion identification in hate group web forums

    Yang, M. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 96-101 6 p. 6284099. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Performance modeling of hyperledger sawtooth blockchain

    Ampel, B., Patton, M. & Chen, H., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 59-61 3 p. 8823238. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    67 Scopus citations
  • Personalized spiders for web search and analysis

    Chau, M., Zeng, D. & Chen, H., 2001, Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries. p. 79-87 9 p. (Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Scopus citations
  • Personalized spiders for web search and analysis

    Chau, M., Zeng, D. & Chen, H., 2001, Proceedings of the 1st ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2001. Association for Computing Machinery, p. 79-87 9 p. (Proceedings of the ACM International Conference on Digital Libraries).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Prospective spatio-temporal data analysis for security informatics

    Chang, W., Zeng, D. & Chen, H., 2005, ITSC`05: 2005 IEEE Intelligent Conference on Transportation Systems, Proceedings. p. 1120-1124 5 p. 1520208. (IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Recommendation as link prediction: A graph kernel-based machine learning approach

    Li, X. & Chen, H., Jan 1 2009, JCDL'09 - Proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries. Institute of Electrical and Electronics Engineers Inc., p. 213-216 4 p. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Scopus citations
  • SCADA honeypots: An in-depth analysis of Conpot

    Jicha, A., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 196-198 3 p. 7745468. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Scopus citations
  • Scalable sentiment classification across multiple dark web forums

    Zimbra, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 78-83 6 p. 6284095. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Securing cyberspace: Identifying key actors in hacker communities

    Benjamin, V. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Scopus citations
  • Sentiment analysis on chinese health forums: A preliminary study of different language models

    Zhang, Y., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 68-81 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • SHB 2012: International workshop on smart health and wellbeing

    Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., 2012, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management. p. 2762-2763 2 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Shodan visualized

    Ercolani, V. J., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 193-195 3 p. 7745467. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Silverlink: Smart home health monitoring for senior care

    Chuang, J., Maimoon, L., Yu, S., Zhu, H., Nybroe, C., Hsiao, O., Li, S. H., Lu, H. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Silverlink: Developing an international smart and connected home monitoring system for senior care

    Maimoon, L., Chuang, J., Zhu, H., Yu, S., Peng, K. S. A., Prayakarao, R., Bai, J., Zeng, D., Li, S. H., Lu, H. & Chen, H., 2017, Smart Health - International Conference, ICSH 2016, Revised Selected Papers. Liang, Y., Xing, C. & Zhang, Y. (eds.). Springer-Verlag, p. 65-77 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10219 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

    Hu, J. L., Ebrahimi, M. & Chen, H., 2021, Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

    Ullman, S., Samtani, S., Lazarine, B., Zhu, H., Ampel, B., Patton, M. & Chen, H., Nov 9 2020, Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020. Institute of Electrical and Electronics Engineers Inc., 9280545. (Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Spatial-temporal cross-correlation analysis: A new measure and a case study in infectious disease informatics

    Ma, J., Zeng, D. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 542-547 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Statistical modeling of nanotechnology knowledge diffusion networks

    Jiang, S., Gao, Q. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 3552-3571 20 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Studying the structure of terrorist networks: A web structural mining approach

    Qin, J., Zhou, Y., Xu, J. J. & Chen, H., 2005, Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale. p. 523-530 8 p. (Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Suspect vehicle identification for border safety with modified mutual information

    Kaza, S., Wang, Y. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 308-318 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Targeting key data breach services in underground supply chain

    Li, W., Yin, J. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 322-324 3 p. 7745501. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Target vehicle identification for border safety using mutual information

    Kaza, S., Wang, T., Gowda, H. & Chen, H., 2005, ITSC`05: 2005 IEEE Intelligent Conference on Transportation Systems, Proceedings. p. 1141-1146 6 p. 1520212. (IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Tensor-based learning for predicting stock movements

    Li, Q., Jiang, L. L., Li, P. & Chen, H., Jun 1 2015, Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI 2015 and the 27th Innovative Applications of Artificial Intelligence Conference, IAAI 2015. AI Access Foundation, p. 1784-1790 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Textual analysis of stock market prediction using financial news articles

    Schumaker, R. P. & Chen, H., 2006, Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. p. 1422-1430 9 p. (Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • The 3rd Workshop on Artificial Intelligence-enabled Cybersecurity Analytics

    Samtani, S., Yang, S. & Chen, H., Aug 6 2023, KDD 2023 - Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 5880-5881 2 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The Arizona IDMatcher: A probabilistic identity matching system

    Wang, G. A., Kaza, S., Joshi, S., Chang, K., Atabakhsh, H. & Chen, H., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. IEEE Computer Society, p. 229-235 7 p. 4258703. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • The dark web forum portal: From multi-lingual to video

    Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 7-14 8 p. 5984042. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    14 Scopus citations
  • The Geopolitical Web: Assessing societal risk in an uncertain world

    Chen, H., Larson, C. A., Elhourani, T., Zimbra, D. & Ware, D., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 60-64 5 p. 5984051. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • The mindMine comment analysis tool for collaborative attitude solicitation, analysis, sense-making and visualization

    Romano, N. C., Bauer, C., Packard, H., Chen, H. & Nunamaker, J. F., 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, HICSS 2000. IEEE Computer Society, (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2000-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Time-to-event modeling for predicting hacker IRC community participant trajectory

    Benjamin, V. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 6975550. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Understanding avatar sentiments using verbal and non- verbal cues

    Zhang, Y., Dang, Y., Brown, S. A. & Chen, H., 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 4030-4035 6 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Uninvited connections: A study of vulnerable devices on the internet of things (IoT)

    Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 232-235 4 p. 6975580. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    104 Scopus citations
  • Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity

    Qin, J., Zhou, Y., Reid, E., Lai, G. & Chen, H., 2006, Intelligence and Security Informatics - International Workshop, WISI 2006, Proceedings. p. 4-15 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Using burst detection techniques to identify suspicious vehicular traffic at border crossings

    Kaza, S., Lu, H. M., Zeng, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 212-214 3 p. 6284311. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Using content-based and link-based analysis in building vertical search engines

    Chau, M. & Chen, H., 2005, Digital Libraries: International Collaboration and Cross-Fertilization - 7th International Conference on Asian Digital Libraries, ICADL 2004. Miao, Q., Lim, E.-P., Chen, Z., Fu, Y., Chen, H. & Fox, E. (eds.). Springer-Verlag, p. 515-518 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3334 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Using importance flooding to identify interesting networks of criminal activity

    Marshall, B. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 14-25 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Using social contextual information to match criminal identities

    Wang, G. A., Xu, J. J. & Chen, H., 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS'06. p. 81b 1579451. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Using social network analysis to identify key hackers for keylogging tools in hacker forums

    Samtani, S. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 319-321 3 p. 7745500. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Visualization in law enforcement

    Chen, H., Atabakhsh, H., Tseng, C., Marshall, B., Kaza, S., Eggers, S., Gowda, H., Shah, A., Petersen, T. & Violette, C., 2005, CHI'05 Extended Abstracts on Human Factors in Computing Systems, CHI EA'05. p. 1268-1271 4 p. (Conference on Human Factors in Computing Systems - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Visualizing authorship for identification

    Abbasi, A. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 60-71 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • Visualizing internet search results with adaptive self-organizing maps

    Roussinov, D., Tolle, K., Ramsey, M., McQuaid, M. & Chen, H., Aug 1 1999, Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1999. Association for Computing Machinery, Inc, p. 336 1 p. (Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1999).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations