Calculated based on number of publications stored in Pure and citations from Scopus
1989 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • Conference contribution

    Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

    Chung, K. C., Chen, H. C. & Liao, W., 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6133735. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Content analysis of Jiliadi extremist groups' videos

    Salem, A., Reid, E. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 615-620 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Convergence of knowledge management and e-learning: The GetSmart experience

    Marshall, B., Zhang, Y., Chen, H., Lally, A., Shen, R., Fox, E. & Cassel, L. N., 2003, Proceedings - 2003 Joint Conference on Digital Libraries, JCDL 2003. Delcambre, L., Henry, G. & Marshall, C. C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 135-146 12 p. 1204854. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    60 Scopus citations
  • Dark-net ecosystem cyber-threat intelligence (CTI) Tool

    Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H. & Samtani, S., Jul 2019, 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019. Zheng, X., Abbasi, A., Chau, M., Wang, A. & Zhou, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 92-97 6 p. 8823501. (2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Dark web forums portal: Searching and analyzing Jihadist forums

    Yulei, Z., Shuo, Z., Li, F., Yan, D., Larson, C. A. & Hsinchun, C., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 71-76 6 p. 5137274. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Deep learning based topic identification and categorization: Mining diabetes-related topics on Chinese health websites

    Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Database Systems for Advanced Applications - 21st International Conference, DASFAA 2016, Proceedings. Navathe, S. B., Wu, W., Shekhar, S., Du, X., Xiong, H. & Wang, X. S. (eds.). Springer-Verlag, p. 481-500 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Descriptive analytics: Examining expert hackers in web forums

    Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Scopus citations
  • Detecting cyber threats in non-english dark net markets: A cross-lingual transfer learning approach

    Ebrahimi, M., Surdeanu, M. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 8587404. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Detecting cyber threats in non-english hacker forums: An adversarial cross-lingual knowledge transfer approach

    Ebrahimi, M., Samtani, S., Chai, Y. & Chen, H., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020. Institute of Electrical and Electronics Engineers Inc., p. 20-26 7 p. 9283883. (Proceedings - 2020 IEEE Symposium on Security and Privacy Workshops, SPW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Scopus citations
  • Developing a Dark Web collection and infrastructure for computational and social sciences

    Zhang, Y., Zeng, S., Huang, C. N., Fan, L., Yu, X., Dang, Y., Larson, C. A., Denning, D., Roberts, N. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 59-64 6 p. 5484774. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Developing understanding of hacker language through the use of lexical semantics

    Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Diabetes-related topic detection in Chinese health websites using deep learning

    Chen, X., Zhang, Y., Xing, C., Liu, X. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Diabeticlink: An internationally collaborative cyber-enabled patient empowerment platform

    Samtani, G., Maimoon, L., Chuang, J., Nybroe, C., Liu, X., Wiil, U., Li, S. H. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 299-310 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • DiabeticLink: An integrated and intelligent cyber-enabled health social platform for diabetic patients

    Chuang, J., Hsiao, O., Wu, P. L., Chen, J., Liu, X., De La Cruz, H., Li, S. H. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 63-74 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • DiabeticLink: A health big data system for patient empowerment and personalized healthcare

    Chen, H., Compton, S. & Hsiao, O., 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Digital libraries supporting digital government

    Marchionini, G., Craig, A., Brandt, L., Klavans, J. & Chen, H., 2001, Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries. p. 395-397 3 p. (Proceedings of First ACM/IEEE-CS Joint Conference on Digital Libraries).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Digital libraries supporting digital government

    Marchionini, G., Craig, A., Brandt, L., Klavans, J. & Chen, H., 2001, Proceedings of the 1st ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL 2001. Association for Computing Machinery, p. 395-397 3 p. (Proceedings of the ACM International Conference on Digital Libraries).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Digital library development in the Asia Pacific

    Chen, H., 2005, Digital Libraries: Implementing Strategies and Sharing Experiences - 8th International Conference on Asian Digital Libraries, ICADL 2005, Proceedings. p. 509-524 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3815 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Distilling Contextual Embeddings into A Static Word Embedding for Improving Hacker Forum Analytics

    Ampel, B. & Chen, H., 2021, Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Dynamic social network analysis of a dark network: Identifying significant facilitators

    Kaza, S., Hu, D. & Chen, H., 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. IEEE Computer Society, p. 40-46 7 p. 4258671. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Dynamic user-level affect analysis in social media: Modeling violence in the dark web

    Zeng, S., Lin, M. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • EconPort: A digital library for microeconomics education

    Chen, H., Zeng, D., Kalla, R., Huang, Z., Cox, J. C. & Swarthout, J. T., 2003, Proceedings - 2003 Joint Conference on Digital Libraries, JCDL 2003. Delcambre, L., Henry, G. & Marshall, C. C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 388 1 p. 1204904. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Effect of inventor status on intra-organizational innovation evolution

    Kaza, S. & Chen, H., 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755398. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Emoticon analysis for Chinese health and fitness topics

    Yu, S., Zhu, H., Jiang, S. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Evaluating an integrated forum portal for terrorist surveillance and analysis

    Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Evaluating text visualization: An experiment in authorship analysis

    Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Examining agencies' satisfaction with electronic record management systems in e-government: A large-scale survey study

    Hsu, F. M., Hu, P. J. H., Chen, H. & Hu, H. F., 2009, Designing E-Business Systems: Markets, Services, and Networks - 7th Workshop on E-Business, WEB 2008, Revised Selected Papers. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Business Information Processing; vol. 22 LNBIP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Exploiting multi-link SCTP for live TV broadcasting service

    Liu, H. S., Hsieh, C. C., Chen, H. C., Hsieh, C. H., Liao, W., Chu, P. C. & Wang, C. H., 2010, 2010 IEEE 71st Vehicular Technology. 5493654. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Exploring extremism and terrorism on the web: The Dark Web project

    Hsinchun, C., 2007, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4430 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Exploring hacker assets in underground forums

    Samtani, S., Chinn, R. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 31-36 6 p. 7165935. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Scopus citations
  • Exploring key hackers and cybersecurity threats in Chinese hacker communities

    Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 7745436. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Exploring the dark side of the Web: Collection and analysis of U.S. extremist online forums

    Zhou, Y., Qin, J., Lai, G., Reid, E. & Chen, H., 2006, Intelligence and Security Informatics - IEEE International Conference on Intelligence and Security Informatics, ISI 2006, Proceedings. Springer-Verlag, p. 621-626 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3975 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach

    Otto, K., Ampel, B., Samtani, S., Zhu, H. & Chen, H., 2021, Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Exploring the online underground marketplaces through topic-based social network and clustering

    Huang, S. Y. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 145-150 6 p. 7745458. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

    Benjamin, V., Li, W., Holt, T. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7165944. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    74 Scopus citations
  • Fall detection with orientation calibration using a single motion sensor

    Yu, S. & Chen, H., 2017, Wireless Mobile Communication and Healthcare - 6th International Conference, MobiHealth 2016, Proceedings. Rizzo, G., Perego, P. & Andreoni, G. (eds.). Springer-Verlag, p. 233-240 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 192).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • From digital library to digital government: A case study in crime data mapping and mining

    Chen, H., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, E-P., Foo, S., Khoo, C., Chen, H., Fox, E., Urs, S. & Costantino, T. (eds.). Springer-Verlag, p. 36-52 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2555).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Gender difference analysis of political web forums: An experiment on an international Islamic women's forum

    Yulei, Z., Yan, D. & Hsinchun, C., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 61-64 4 p. 5137272. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Genescene: Biomedical text and data mining

    Leroy, G., Chen, H., Martinez, J. D., Eggers, S., Falsey, R. R., Kislin, K. L., Huang, Z., Li, J., Xu, J., McDonald, D. M. & Ng, G., 2003, Proceedings - 2003 Joint Conference on Digital Libraries, JCDL 2003. Delcambre, L., Henry, G. & Marshall, C. C. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 116-118 3 p. 1204849. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Global disease surveillance using social media: HIV/AIDS content intervention in web forums

    Ku, Y., Chiu, C., Zhang, Y., Fan, L. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 170 1 p. 5484749. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Global foot-and-mouth disease surveillance using bioportal

    Thurmond, M., Perez, A., Tseng, C., Chen, H. & Zeng, D., 2007, Intelligence and Security Informatics: Biosurveillance - Second NSF Workshop, BioSurveillance 2007, Proceedings. Springer-Verlag, p. 169-179 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4506 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Graph kernel-based learning for gene function prediction from gene interaction network

    Li, X., Zhang, Z., Chen, H. & Li, J., 2007, Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007. p. 368-373 6 p. 4413079. (Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • HealthQA: A Chinese QA summary system for smart health

    Yin, Y., Zhang, Y., Liu, X., Zhang, Y., Xing, C. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 51-62 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Health-related spammer detection on chinese social media

    Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 284-295 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Identification of extremist videos in online video sharing sites

    Tianjun, F., Huang, C. N. & Hsinchun, C., 2009, 2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009. p. 179-181 3 p. 5137295. (2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web

    Liu, Y., Lin, F. Y., Ahmad-Post, Z., Ebrahimi, M., Zhang, N., Hu, J. L., Xin, J., Li, W. & Chen, H., Nov 9 2020, Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020. Institute of Electrical and Electronics Engineers Inc., 9280540. (Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs

    Du, P. Y., Zhang, N., Ebrahimi, M., Samtani, S., Lazarine, B., Arnold, N., Dunn, R., Suntwal, S., Angeles, G., Schweitzer, R. & Chen, H., Dec 24 2018, 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018. Lee, D., Mezzour, G., Kumaraguru, P. & Saxena, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 70-75 6 p. 8587327. (2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Identifying adverse drug events from health social media: A case study on heart disease discussion forums

    Liu, X., Liu, J. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach

    Vahedi, T., Ampel, B., Samtani, S. & Chen, H., 2021, Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Identifying devices across the IPv4 address space

    Jicha, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 199-201 3 p. 7745469. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations