Calculated based on number of publications stored in Pure and citations from Scopus
1989 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2016

    Identifying the socio-spatial dynamics of terrorist attacks in the Middle East

    Li, Z., Sun, D., Chen, H. & Huang, S. Y., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7745463. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Identifying top listers in Alphabay using Latent Dirichlet Allocation

    Grisham, J., Barreras, C., Afarin, C., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 219 1 p. 7745477. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Intelligence and security informatics: 11th Pacific Asia workshop, PAISI 2016 Auckland, New Zealand, April 19, 2016 proceedings

    Chau, M., Alan Wang, G. & Chen, H., 2016, Intelligence and Security Informatics - 11th Pacific Asia Workshop, PAISI 2016, Proceedings. Chau, M., Wang, G. A. & Chen, H. (eds.). Springer-Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • NATERGM: A model for examining the role of Nodal Attributes in dynamic social media networks

    Jiang, S. & Chen, H., Jun 22 2016, 2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1458-1459 2 p. 7498373. (2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • SCADA honeypots: An in-depth analysis of Conpot

    Jicha, A., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 196-198 3 p. 7745468. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    56 Scopus citations
  • Sentiment analysis on chinese health forums: A preliminary study of different language models

    Zhang, Y., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 68-81 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Shodan visualized

    Ercolani, V. J., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 193-195 3 p. 7745467. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Silverlink: Smart home health monitoring for senior care

    Chuang, J., Maimoon, L., Yu, S., Zhu, H., Nybroe, C., Hsiao, O., Li, S. H., Lu, H. & Chen, H., 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Targeting key data breach services in underground supply chain

    Li, W., Yin, J. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 322-324 3 p. 7745501. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Using social network analysis to identify key hackers for keylogging tools in hacker forums

    Samtani, S. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 319-321 3 p. 7745500. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • 2015

    Developing understanding of hacker language through the use of lexical semantics

    Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Exploring hacker assets in underground forums

    Samtani, S., Chinn, R. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 31-36 6 p. 7165935. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    68 Scopus citations
  • Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

    Benjamin, V., Li, W., Holt, T. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7165944. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    90 Scopus citations
  • Intelligence and security informatics: Pacific Asia Workshop, PAISI 2015 Ho Chi Minh City, Vietnam, May 19, 2015 proceedings

    Chau, M., Wang, G. A. & Chen, H., 2015, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Proceedings. Chau, M., Wang, G. A. & Chen, H. (eds.). Springer-Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tensor-based learning for predicting stock movements

    Li, Q., Jiang, L. L., Li, P. & Chen, H., Jun 1 2015, Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI 2015 and the 27th Innovative Applications of Artificial Intelligence Conference, IAAI 2015. AI Access Foundation, p. 1784-1790 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • 2014

    A control study on the effects of HRV biofeedback therapy in patients with post-stroke depression

    Li, X., Zhang, T., Song, L., Zhang, Y., Xing, C. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A multi-theoretical framework for hypotheses testing of temporal network patterns

    Jiang, S. & Chen, H., 2014, 35th International Conference on Information Systems "Building a Better World Through Information Systems", ICIS 2014. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Collaborative friendship networks in online healthcare communities: An exponential random graph model analysis

    Song, X., Jiang, S., Yan, X. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 75-87 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Descriptive analytics: Examining expert hackers in web forums

    Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Scopus citations
  • Diabetes-related topic detection in Chinese health websites using deep learning

    Chen, X., Zhang, Y., Xing, C., Liu, X. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 13-24 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • DiabeticLink: An integrated and intelligent cyber-enabled health social platform for diabetic patients

    Chuang, J., Hsiao, O., Wu, P. L., Chen, J., Liu, X., De La Cruz, H., Li, S. H. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 63-74 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Emoticon analysis for Chinese health and fitness topics

    Yu, S., Zhu, H., Jiang, S. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • HealthQA: A Chinese QA summary system for smart health

    Yin, Y., Zhang, Y., Liu, X., Zhang, Y., Xing, C. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 51-62 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Identifying adverse drug events from health social media: A case study on heart disease discussion forums

    Liu, X., Liu, J. & Chen, H., 2014, Smart Health - International Conference, ICSH 2014, Proceedings. Springer-Verlag, p. 25-36 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Identifying top sellers in underground economy using deep learning-based sentiment analysis

    Li, W. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 64-67 4 p. 6975555. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • Time-to-event modeling for predicting hacker IRC community participant trajectory

    Benjamin, V. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 6975550. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Uninvited connections: A study of vulnerable devices on the internet of things (IoT)

    Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 232-235 4 p. 6975580. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    102 Scopus citations
  • 2013

    A computational approach to detecting and assessing sustainability-related communities in social media

    Jiang, S. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 48-58 11 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

    Liu, X. & Chen, H., 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 134-150 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    86 Scopus citations
  • DiabeticLink: A health big data system for patient empowerment and personalized healthcare

    Chen, H., Compton, S. & Hsiao, O., 2013, Smart Health - International Conference, ICSH 2013, Proceedings. p. 71-83 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8040 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Evaluating text visualization: An experiment in authorship analysis

    Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Machine learning for attack vector identification in malicious source code

    Benjamin, V. A. & Chen, H., 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 21-23 3 p. 6578779. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Statistical modeling of nanotechnology knowledge diffusion networks

    Jiang, S., Gao, Q. & Chen, H., 2013, International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design. p. 3552-3571 20 p. (International Conference on Information Systems (ICIS 2013): Reshaping Society Through Information Systems Design; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2012

    An event-driven SIR model for topic diffusion in web forums

    Woo, J. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 108-113 6 p. 6284101. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Evaluating an integrated forum portal for terrorist surveillance and analysis

    Hu, P. J. H., Wan, X., Dang, Y., Larson, C. A. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 168-170 3 p. 6284288. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Partially supervised learning for radical opinion identification in hate group web forums

    Yang, M. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 96-101 6 p. 6284099. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Scalable sentiment classification across multiple dark web forums

    Zimbra, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 78-83 6 p. 6284095. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Securing cyberspace: Identifying key actors in hacker communities

    Benjamin, V. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Scopus citations
  • SHB 2012: International workshop on smart health and wellbeing

    Yang, C. C., Chen, H., Wactlar, H., Combi, C. K. & Tang, X., 2012, CIKM 2012 - Proceedings of the 21st ACM International Conference on Information and Knowledge Management. p. 2762-2763 2 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Understanding avatar sentiments using verbal and non- verbal cues

    Zhang, Y., Dang, Y., Brown, S. A. & Chen, H., 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 4030-4035 6 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Using burst detection techniques to identify suspicious vehicular traffic at border crossings

    Kaza, S., Lu, H. M., Zeng, D. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 212-214 3 p. 6284311. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2011

    An SIR model for violent topic diffusion in social media

    Woo, J., Son, J. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 15-19 5 p. 5984043. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Congestion-aware network-coding-based opportunistic routing in wireless ad hoc networks

    Chung, K. C., Chen, H. C. & Liao, W., 2011, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011. 6133735. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Dynamic user-level affect analysis in social media: Modeling violence in the dark web

    Zeng, S., Lin, M. & Chen, H., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 1-6 6 p. 5984041. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • The dark web forum portal: From multi-lingual to video

    Chen, H., Denning, D., Roberts, N., Larson, C. A., Yu, X. & Huang, C. N., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 7-14 8 p. 5984042. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    13 Scopus citations
  • The Geopolitical Web: Assessing societal risk in an uncertain world

    Chen, H., Larson, C. A., Elhourani, T., Zimbra, D. & Ware, D., 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011. p. 60-64 5 p. 5984051. (Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • What are the grand challenges in information systems research? a debate and discussion

    Limayem, M., Niederman, F., Slaughter, S. A., Chen, H., Gregor, S. & Winter, S. J., 2011, International Conference on Information Systems 2011, ICIS 2011. p. 4421-4425 5 p. (International Conference on Information Systems 2011, ICIS 2011; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2010

    Comparing the virtual linkage intensity and real world proximity of social movements

    Zimbra, D. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 144-146 3 p. 5484759. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Developing a Dark Web collection and infrastructure for computational and social sciences

    Zhang, Y., Zeng, S., Huang, C. N., Fan, L., Yu, X., Dang, Y., Larson, C. A., Denning, D., Roberts, N. & Chen, H., 2010, ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. p. 59-64 6 p. 5484774. (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Exploiting multi-link SCTP for live TV broadcasting service

    Liu, H. S., Hsieh, C. C., Chen, H. C., Hsieh, C. H., Liao, W., Chu, P. C. & Wang, C. H., 2010, 2010 IEEE 71st Vehicular Technology. 5493654. (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations