Calculated based on number of publications stored in Pure and citations from Scopus
1989 …2024

Research activity per year

Filter
Chapter

Search results

  • 2016

    Conducting large-scale analyses of underground hacker communities

    Benjamin, V., Samtani, S. & Chen, H., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 56-75 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Scopus citations
  • 2013

    Revealing the Hidden World of the Dark Web: Social Media Forums and Videos11

    Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., 2013, Intelligent Systems for Security Informatics. Elsevier Inc., p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Scopus citations
  • 2008

    Exploring gray web forums: Analysis and investigation of forum-based communities in Taiwan

    Wang, J. H., Fu, T., Lin, H. M. & Chen, H., 2008, Intelligence and Security Informatics: Techniques and Applications. Chen, H. & Yang, C. (eds.). p. 121-134 14 p. (Studies in Computational Intelligence; vol. 135).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Suspect vehicle identification for border safety

    Kaza, S. & Chen, H., 2008, Intelligence and Security Informatics: Techniques and Applications. Chen, H. & Yang, C. (eds.). p. 305-318 14 p. (Studies in Computational Intelligence; vol. 135).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Syndromic surveillance systems

    Yan, P., Chen, H. & Zeng, D., 2008, Annual Review of Information Science and Technology. Information Today, p. 425-495 71 p. (Annual Review of Information Science and Technology; vol. 42).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    45 Scopus citations
  • Understanding the nexus of terrorist web sites

    Xu, J. & Chen, H., 2008, Intelligence and Security Informatics: Techniques and Applications. Chen, H. & Yang, C. (eds.). p. 65-78 14 p. (Studies in Computational Intelligence; vol. 135).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2007

    Identification of Marker Genes from High-Dimensional Microarray Data for Cancer Classification

    Li, J., Su, H. & Chen, H., May 23 2007, Knowledge Discovery in Bioinformatics: Techniques, Methods, and Applications. John Wiley & Sons, Inc., p. 71-87 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • 2004

    Analyzing and visualizing criminal network dynamics: A case study

    Xu, J., Marshall, B., Kaza, S. & Chen, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Moore, R. & Leavitt, J. (eds.). Springer-Verlag, p. 359-377 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3073).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    42 Scopus citations
  • Information sharing and collaboration policies within government agencies

    Atabakhsh, H., Larson, C., Petersen, T., Violette, C. & Chen, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Moore, R. & Leavitt, J. (eds.). Springer-Verlag, p. 467-475 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3073).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    17 Scopus citations
  • Terrorism Knowledge Discovery Project: A knowledge discovery approach to addressing the threats of terrorism

    Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M. & Chen, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Moore, R. & Leavitt, J. (eds.). Springer-Verlag, p. 125-145 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3073).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    30 Scopus citations
  • West Nile Virus and Botulism portal: A case study in infectious disease informatics

    Zeng, D., Chen, H., Tseng, C., Larson, C., Eidson, M., Gotham, I., Lynch, C. & Ascher, M., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Moore, R. & Leavitt, J. (eds.). Springer-Verlag, p. 28-41 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3073).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    17 Scopus citations
  • 2003

    An international perspective on fighting cybercrime

    Chang, W., Chung, W., Chen, H. & Chou, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 379-384 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    13 Scopus citations
  • A spatio temporal visualizer for law enforcement

    Buetow, T., Chaboya, L., O'Toole, C., Cushna, T., Daspit, D., Petersen, T., Atabakhsh, H. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 181-194 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    10 Scopus citations
  • Authorship analysis in cybercrime investigation

    Zheng, R., Qin, Y., Huang, Z. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    76 Scopus citations
  • CMedPort: Intelligent searching for Chinese medical information

    Zhou, Y., Qin, J. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Tengku Sembok, T. M., Zaman, H. B., Chen, H., Urs, S. R. & Myaeng, S. H. (eds.). Springer-Verlag, p. 34-45 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2911).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Collaborative workflow management for interagency crime analysis

    Zhao, J. L., Bi, H. H. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 266-280 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Scopus citations
  • COPLINK agent: An architecture for information monitoring and sharing in law enforcement

    Zeng, D., Chen, H., Daspit, D., Shan, F., Nandiraju, S., Chau, M. & Lin, C., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 281-295 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    5 Scopus citations
  • CrimeLink Explorer: Using domain knowledge to facilitate automated crime association analysis

    Schroeder, J., Xu, J. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 168-180 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    16 Scopus citations
  • Supporting multilingual information retrieval in Web applications: An English-Chinese Web portal experiment

    Qin, J., Zhou, Y., Chau, M. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Tengku Sembok, T. M., Zaman, H. B., Chen, H., Urs, S. R. & Myaeng, S. H. (eds.). Springer-Verlag, p. 149-152 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2911).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    4 Scopus citations
  • Untangling criminal networks: A Case study

    Xu, J. & Chen, H., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Chen, H., Zeng, D. D., Madhusudan, T., Miranda, R., Schroeder, J. & Demchak, C. (eds.). Springer-Verlag, p. 232-248 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2665).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    39 Scopus citations
  • 1999

    Digital Libraries: Social Issues and Technological Advances

    Chen, H. & Houston, A. L., 1999, Advances in Computers. C ed. Academic Press Inc., p. 257-314 58 p. (Advances in Computers; vol. 48, no. C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    4 Scopus citations