KMap
Dr. Hsinchun Chen graduated with a BS degree from the National Chiao-Tong University (Taiwan), MBA from SUNY Buffalo, and an MS and Ph.D. from New York University. He is the University of Arizona Regents' Professor and Thomas R. Brown Chair professor in Management and Technology. He is also a Fellow of ACM, IEEE and AAAS. Dr. Chen served as the lead program director of the Smart and Connected (SCH) Program at the NSF for 2014-2015, a multi-year multi-agency health IT research program of in the U.S. He is author/editor of 20 books, 300 SCI journal articles, and 200 refereed conference articles covering digital library, data/text/web mining, business analytics, security informatics and health informatics. His overall h-index is 97 (35,000 citations for 900 papers according to Google Scholar), among the highest in MIS and top 50 in computer science. Dr. Chen founded the Artificial Intelligence Lab at The University of Arizona in 1989, which has received $50M+ research funding from NSF, NIH, NLM, DOD, DOJ, CIA, DHS and other agencies (100+ grants, 50+ from NSF). He has served as Editor-in-Chief, Senior Editor or AE of major ACM/IEEE (ACM TMIS, ACM TOIS, IEEE IS, IEEE SMC), MIS (MISQ, DSS) and Springer (JASIST) journals and conference/program chair of major ACM/IEEE/MIS conferences in digital library (ACM/IEEE JCDL, ICADL), information systems (ICIS), security informatics (IEEE ISI) and health informatics (ICSH). He is also a successful IT entrepreneur. His COPLINK/i2 system for security analytics was commercialized in 2000 and acquired by IBM as its leading government analytics product in 2011. Dr. Chen has served as an advisor to major federal research programs and was a Scientific Counselor of the National Library of Medicine (USA), National Library of China and Academia Sinica (Taiwan). He is a visiting chair professor at several major universities in China (Tsinghua University) and Taiwan (National Taiwan University). He is internationally renowned for leading research and development in the health analytics (data and text mining; health big data; DiabeticLink and SilverLink) and security informatics (counter terrorism and cyber security analytics; security big data; COPLINK, Dark Web, Hacker Web, and AZSecure) communities. His recent research includes SilverLink for mobile health and AZSecure for advanced cyber threat intelligence. Dr. Chen is director of the UA AZSecure Cybersecurity Program, with $10M+ funding from NSF SFS, SaTC and CICI programs and CAE-CD/CAE-R cybersecurity designations from NSA/DHS.

VOSviewer

Courses
  • WCM
    Web Computing and Mining

  • TDWM
    Topics in Data and Web Mining

  • DA
    Data Analytics

  • CWC
    Cyber Warfare Capstone

Grants
  • Funding agency logo
    CISE-MSI: DP: SaTC: MSI Research Capacity Building for Artificial Intelligence (AI)-enabled Vulnerability Assessment and Remediation in Cyberinfrastructure

    Principal Investigator (PI)

    2022

    $380.0K
    Active
  • Funding agency logo
    EAGER: SaTC-EDU: Artificial Intelligence and Cybersecurity Research and Education at Scale

    Principal Investigator (PI)

    2020

    $297.7K
    Active
  • Funding agency logo
    Cybersecurity Scholarship-for-Service Renewal at The University of Arizona: The AZSecure SFS Program

    Principal Investigator (PI)

    2019

    $2.4M
    Active
  • Funding agency logo
    CICI: SSC: Proactive Cyber Threat Intelligence and Comprehensive Network Monitoring for Scientific Cyberinfrastructure: The AZSecure Framework

    Principal Investigator (PI)

    2019

    $998.0K
    Active
  • Funding agency logo
    SaTC: CORE: Small: Cybersecurity Big Data Research for Hacker Communities: A Topic and Language Modeling Approach

    Principal Investigator (PI)

    2019

    $526.6K
    Active
  • Funding agency logo
    EAGER: A Longitudinal Study of Knowledge Diffusion and Societal Impact of Nanomanufacturing Research & Development: Harnessing Data for Science and Engineering

    Principal Investigator (PI)

    2018

    $158.4K
  • Funding agency logo
    Women in Cybersecurity Conference 2017 (WiCyS 2017)

    Principal Investigator (PI)

    2017

    $345.9K
  • Funding agency logo
    DRS - 2512 / ABRC/UofA Research Grant (Zhou)

    Co-Investigator (COI)

    2017

    $225.0K
  • Funding agency logo
    Creating a Cybersecurity Big Data and Analytics Sharing Platform

    Principal Investigator (PI)

    2017

    $180.0K
  • Funding agency logo
    SilverLink: A Smart and Connected Home Monitoring System for Senior Care: STTR Phase I

    Principal Investigator (PI)

    2016

    $87.1K
Books
  • Intelligence and Security Informatics: 12th Pacific Asia Workshop. Paisi 2017, Jeju Island, South Korea, May 23, 2017, Proceedings

    2017

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    2013

  • Infectious Disease Informatics and Biosurveillance

    2012

  • Intelligence and security informatics: Pacific Asia Workshop, PAISI 2012, Kuala Lumpur, Malaysia, May 29, 2012: proceedings

    2012

  • Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013 : proceedings

    2011

  • Data Mining for Social Network Data

    2010

  • Infectious disease informatics

    2010

  • Intelligence and security informatics : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : proceedings

    2010

  • Analysis of Affect Intensities in Extremist Group Forums

    2008

  • Biosurveillance and Biosecurity

    2008

  • Intelligence and Security Informatics: Biosurveillance

    2007

  • Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings

    2007

  • Intelligence and security informatics: international workshop, WISI 2006, Singapore, April 9, 2006 : proceedings

    2006

  • Digital Libraries: People, Knowledge, and Technology

    2002

News
  • UArizona Researchers Go on Offense, Defense in Battle Against Hackers

    2019

  • Cybersecurity Students Benefit From Scholarship Program

    2019

  • UA Expert Identifies 6 Easy Ways to Avoid Theft Online

    2016

  • New 'Rogue One' Film Provides Interesting Study in Cybersecurity

    2016

  • UA Talent Pipeline Stopping Data Breaches

    2015

  • UA Surgeon Takes on 'Medjacking'

    2015

  • UA Shares 'Never Settle' Progress With Regents

    2015

  • UA Offers Early Training in Cybersecurity

    2015

  • UA Honors 'Pillars' of Research, Teaching, Engagement

    2014

  • Brown Family Leaves Lasting Legacy on UA, Community

    2014

  • UA Regents’ Professors Named in College of Science, Eller College of Management

    2013

  • $5.4M in Cybersecurity Grants Awarded to UA Regents' Professor Hsinchun Chen

    2013

  • UA Innovator Awarded Thomas R. Brown Chair in Management and Technology

    2013

  • September 2013: Month in Review

    2013

  • November 2013: Month in Review

    2013

  • Three UA Faculty Members Inducted as Regents' Professors, Two as Distinguished Professors

    2013

  • Innovation Day Celebrates Entrepreneurship on Campus

    2012

  • New Center to Advance Movement of Ideas to Market

    2011

  • UA Tech Spinoff Acquired by IBM Corp.

    2011

  • UA Researchers Develop Prototype to Detect Fake Websites

    2011

  • UA-Led Asteroid Mission Wins State Innovation Award

    2011

  • Record Number of New Companies Launched by UA Researchers

    2009

  • Seven UA Scientists Named AAAS Fellows

    2006

  • Eller's Hsinchun Chen Awarded IEEE Fellowship

    2006

  • Lecture Series to Focus on Criminal Justice and Security

    2005

  • USS Arizona Bell Rings to Honor Outstanding Achievement

    2005

  • UA, Arizona Center for Innovation Hosts Inaugural Technology Innovation Awards

    2004

  • Second Security Symposium to Meet in Tucson

    2004

  • Al Qaeda Expert on Campus This Week

    2004

  • National Symposium on Intelligence and Security Informatics

    2003

  • Tucson, Phoenix Police Honor MIS Prof

    2002

  • Year in Review 2002: Eller College of Business and Public Administration

    2002

  • Eller College Named One of 20 Tech-Savvy Business Schools

    2001

  • Tucson To Host High-Level Law Enforcement Technology Workshop

    2001

Publications (559)
Recent
  • Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence

    2022

  • Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model

    2022

  • Automated Analysis of Changes in Privacy Policies: A Structured Self-Attentive Sentence Embedding Approach

    2022

  • Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics

    2022

  • Wearable Sensor-based Chronic Condition Severity Assessment: An Adversarial Attention-based Deep Multisource Multitask Learning Approach

    2022

  • Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning

    2022

  • A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems

    2021

  • Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach

    2021

  • Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Casual Language Model Approach

    2021

  • ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics

    2021

  • Automated PII Extraction for Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach

    2021

  • Deep Learning for Information Systems Research

    2021

  • Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model

    2021

  • Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approch

    2021

  • A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns

    2021

  • Binary Black-box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces

    2021

  • Distilling Contextual Embeddings Into A Static Word Embedding for Improving Hacker Forum Analytics

    2021

  • Fall Detection with Wearable Sensors: A Hierarchical Attention-based Convolutional Neural Network Approach

    2021

  • Linking Common Vulnerabilities and Exposures to the MITRE ATT CK Framework: A Self-Distillation Approach

    2021

  • A Multimodal Event-driven LSTM Model for Stock Prediction Using Online News

    2021

  • Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

    2020

  • Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach

    2020

  • Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web

    2020

  • A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web

    2020

  • Connecting Systems, Data, and People: A Multidisciplinary Research Roadmap for Chronic Disease Management

    2020

  • Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap

    2020

  • Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach

    2020

  • Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

    2020

  • Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach

    2020

  • Proactively Identifying Emerging Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)

    2020

  • Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach

    2020

  • Finding People with Emotional Distress in Online Social Media: A Design Combining Machine Learning and Rule-Based Classification

    2020

  • Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach

    2020

  • A Deep Learning Architecture for Psychometric Natural Language Processing

    2020

  • Dark Net Ecosystem Cyber Threat Intelligence Tool

    2019

  • Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach

    2019

  • An Exploratory Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in Their Social Interactions for Help-Seeking

    2019

  • Examining Patterns of Scientific Knowledge Diffusion Based on Knowledge Cyber Infrastructure: A Multi-dimensional Network Approach

    2019

  • DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation, with Ethics

    2019

  • Lecture Notes in Computer Science

    2019

  • Performance Modeling of Hyperledger Sawtooth Blockchain

    2019

  • Comparing Nanotechnology Landscapes in the US and China: A Patent Analysis Perspective

    2019

  • Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act

    2019

  • Emoticon Analysis for Chinese Social Media and E-Commerce: The AZEmo System

    2019

  • Hidden Markov Model Based Fall Detection with Motion Sensor Orientation Calibration: A Case for Real-Life Home Monitoring

    2018

  • Motion Sensor-Based Assessment on Fall Risk and Parkinson’s Disease Severity: A Deep Multi-Source Multi-Task Learning (DMML) Approach

    2018

  • A Sequence-to-Sequence Model-Based Deep Learning Approach for Recognizing Activity of Daily Living for Senior Care

    2018

  • Web Media and Stock Markets: A Survey and Future Directions from a Big Data Perspective

    2018

  • The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation

    2018

  • Lecture Notes in Computer Science 10983

    2018

  • Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency

    2018

  • Identifying, Collecting and Presenting Hacker Community Data: Forums, IRC, Carding Shops and DNMs

    2018

  • Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study

    2018

  • Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions

    2018

  • Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach: An Exploratory Study

    2018

  • Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach

    2018

  • Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence

    2017

  • Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments

    2017

  • Assessing medical device vulnerabilities on the Internet of Things

    2017

  • Investigating the Impacts of Avatar Gender, Avatar Age, and Region Theme on Avatar Activity in the Virtual World

    2017

  • Accessing Medical Device Vulnerabilities on the Internet of Things

    2017

  • Healthcare Predictive Analytics for Risk Profiling in Chronic Care: A Bayesian Multi-Task Learning Approach

    2017

  • Identifying Mobile Malware and Key Threat Actors in Online Hacker Forusm for Proactive Cyber Threat Intelligence

    2017

  • International perspective on nanotechnology papers, patents, and NSF awards (2000–2016)

    2017

  • Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach

    2017

  • Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence

    2017

  • Identify Key Data Breach Services with Nonparametric Supervised Topic Model

    2016

  • Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities

    2016

  • Modeling One-Mode Projection of Bipartite Networks by Tagging Vertex Information

    2016

  • A Tensor-based Information Framework for Predicting the Stock Market

    2016

  • Effects of Heart Rate Variability Biofeedback Therapy on Patients with Poststroke Depression: A Case Study

    2016

  • Identify High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model

    2016

  • Shodan Visualized

    2016

  • AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis

    2016

  • NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks

    2016

  • DiabeticLink: An Internationally Collaborative Cyber-Enabled Empowerment Platform

    2016

  • Targeting Key Data Breach Services in Underground Supply Chain

    2016

  • Tracing Topic Discussion with Event-driven SIR Model in Online Forums

    2016

  • Identifying Devices across the IPv4 Address Space

    2016

  • Identifying Language Groups within Multilingual Cybercriminal Forums

    2016

  • Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System

    2016

  • Anonymous Port Scanning Performing Network -Reconnaissance Through Tor

    2016

  • Effects of Individuals Motivations on Communications in Online Health Forums

    2016

  • Exploring the Online Underground Marketplaces through Topic-Based Social Network and Clustering

    2016

  • Chinese Underground Market Jargon Analysis Based on Unsupervised Learning

    2016

  • Sentiment Analysis on Chinese Health Forums: A Preliminary Study of Different Language Models

    2016

  • Identifying the Socio-Spatial Dynamics of Terrorist Attacks in the Middle East

    2016

  • Using Social Network Analysis to Identify Key Hackers for Keylogging Tools in Hacker Forums

    2016

  • Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation

    2016

  • SCADA Honeypots: An In-depth Analysis of Conpot

    2016

  • Epidemic Model for Information Diffusion in Web Forums: Experiments in Marketing Exchange and Political Dialog

    2016

  • SilverLink: Smart Home Health Monitoring for Senior Care

    2016

  • Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques

    2016

  • Exploring Key Hackers and Cybersecurity Threats in Chinese Hacker Communities

    2016

  • The roles of sharing, transfer, and public funding in nanotechnology knowledge-diffusion networks

    2015

  • The impact of individual attributes on knowledge diffusion in web forums

    2015

  • Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information

    2015

  • Modeling the dynamics of medical information through web forums in medical industry

    2015

  • Exploring Threats and Vulnerabilities in Hacker web: Forums, IRC and Carding Shops

    2015

  • Identifying Novel Adverse Drug Events from Health Social Media Using Distant Learning

    2015

  • A Research Framework for Pharmacovigilance in Health Social Media: Identification and Evaluation of Patient Adverse Drug Event Reports

    2015

  • Modeling Knowledge Diffusion in Scientific Innovation Networks: An Institutional Comparison Between China and U.S. with Illustration for Nanotechnology

    2015

  • Exploring Hacker Assets in Underground Forums

    2015

  • Improving YouTube Self-case Video Search: A Deep Learning Approach for Patuent Knowledge Extraction

    2015

  • Developing Understanding of Hacker Language through the use of Lexical Semantics

    2015

  • Identifying Adverse Drug Events from Patient Social Media A Case Study for Diabetes

    2015

  • Tensor-based Learning for Perceiving Information-driven Stock Movements

    2015

  • Evaluating text visualization for authorship analysis

    2014

  • Time-to-Event Predictive Modeling for Chronic Conditions Using Electronic Health Records

    2014

  • Collaborative Friendship Networks in Online Healthcare Communities: An Exponential Random Graph Model Analysis

    2014

  • Uninvited Connections: A Study of the Vulnerable Devices on the Internet of Things (IoT)

    2014

  • Nanotechnology knowledge diffusion: Measuring the impact of the research networking and a strategy for improvement

    2014

  • Identifying Adverse Drug Events from Health Social Media: A Case Study on Heart Disease Discussion Forums

    2014

  • HealthQA: A Chinese QA Summary System for Smart Health

    2014

  • Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan. Proceedings

    2014

  • Emoticon Analysis for Chinese Health and Fitness Topics

    2014

  • Smart and Connected Health (Guest Editor Introduction)

    2014

  • Descriptive Analytics: Investigating Expert Hackers in Hacker Forums

    2014

  • Analyzing firm-specific social media and market: A stakeholder-based event analysis framework

    2014

  • Time-to-event Modeling for Predicting Hacker Community Participant Trajectory

    2014

  • Text Mining Self-Disclosing Health Information for Public Health Service

    2014

  • DiabeticLInk: An Integrated and Intelligent Cyber-enabled Health Social Platform for Diabetic Patients

    2014

  • Identifying Top Sellers in Underground Economy Using Deep Learning-based Sentiment Analysis

    2014

  • International Conference on Smart Health, Proceedings

    2014

  • International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings

    2014

  • Bridging the Virtual and Real: The Relationship Between Web Content, Linkage, and Geographical Proximity of Social Movements

    2014

  • The information content of mandatory risk factor disclosures in corporate filings

    2014

  • An integrated framework for analyzing multilingual content in Web 2.0 social media

    2014

  • A Control Study on the Effects of HRV Biofeedback Therapy in Patients with Post-Stroke Depression

    2014

  • Analyzing market performance via social media: a case study of a banking industry crisis

    2014

  • Statistical modeling of nanotechnology knowledge diffusion networks

    2013

  • Machine learning for attack vector identification in malicious source code

    2013

  • Research note: Examining gender emotional differences in Web forum communication

    2013

  • Revealing the Hidden World of the Dark Web: Social Media Forums and Videos sup 1 /sup 1

    2013

  • Global nanotechnology development from 1991 to 2012: Patents, scientific publications, and effect of NSF funding

    2013

  • Evaluating text visualization: An experiment in authorship analysis

    2013

  • Business intelligence and analytics: Research directions

    2013

  • DiabeticLink: A health big data system for patient empowerment and personalized healthcare

    2013

  • Nanotechnology public funding and impact analysis: A tale of two decades (1991-2010)

    2013

  • AZDrugMiner: An information extraction system for mining patient-reported adverse drug events in online patient forums

    2013

  • MedTime: A temporal information extraction system for clinical narratives

    2013

  • SHB chairs' welcome

    2012

  • Partially supervised learning for radical opinion identification in hate group web forums

    2012

  • SHB 2012: International workshop on smart health and wellbeing

    2012

  • Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers

    2012

  • Credit Rating Change Modeling Using News and Financial Ratios

    2012

  • Using burst detection techniques to identify suspicious vehicular traffic at border crossings

    2012

  • Scalable sentiment classification across multiple dark web forums

    2012

  • An event-driven SIR model for topic diffusion in web forums

    2012

  • Understanding avatar sentiments using verbal and non- verbal cues

    2012

  • Evaluating sentiment in financial news articles

    2012

  • From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics

    2012

  • Evaluating an integrated forum portal for terrorist surveillance and analysis

    2012

  • Business intelligence and analytics: from big data to big impact

    2012

  • Artificial immune system for illicit content identification in social media

    2012

  • Securing cyberspace: Identifying key actors in hacker communities

    2012

  • Editorial: Design science, grand challenges, and societal impacts

    2011

  • Knowledge mapping for rapidly evolving domains: A design science approach

    2011

  • Giving context to accounting numbers: The role of news coverage

    2011

  • Enterprise risk and security management: Data, text and Web mining

    2011

  • Gender Classification for Web Forums

    2011

  • Determining inventor status and its effect on knowledge diffusion: A study on nanotechnology literature from China, Russia, and India

    2011

  • Social intelligence and cultural awareness

    2011

  • A multi-region empirical study on the internet presence of global extremist organizations

    2011

  • Smart market and money

    2011

  • The Geopolitical Web: Assessing societal risk in an uncertain world

    2011

  • Designing, Implementing, and Evaluating Information Systems for Law Enforcement—A Long-Term Design-Science Research Project

    2011

  • Identity matching using personal and social identity features

    2011

  • Analyzing information systems researchers' productivity and impacts: A perspective on the H index

    2011

  • An SIR model for violent topic diffusion in social media

    2011

  • An Integrated Framework for Avatar Data Collection from the Virtual World: A Case Study in Second Life

    2011

  • The Dark Web Forum Portal: From multi-lingual to video

    2011

  • Selecting attributes for sentiment classification using feature relation networks

    2011

  • A hierarchical Naïve Bayes model for approximate identity matching

    2011

  • ISI-KDD: SIGKDD workshop on intelligence and security informatics 2010

    2011

  • Special issue on social media analytics: Understanding the pulse of the society

    2011

  • Introduction to special issue on terrorism informatics

    2011

  • Dynamic user-level affect analysis in social media: Modeling violence in the dark web

    2011

  • Smart health and wellbeing

    2011

  • What are the grand challenges in information systems research? a debate and discussion

    2011

  • Managing emerging infectious diseases with information systems: Reconceptualizing outbreak management through the lens of loose coupling

    2011

  • Disease named entity recognition using semisupervised learning and conditional random fields

    2011

  • Al, Virtual Worlds, and Massively Multiplayer Online Games

    2011

  • A lexicon-enhanced method for sentiment classification: An experiment on online product reviews

    2010

  • An integrated framework for avatar data collection from the virtual world

    2010

  • Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement

    2010

  • Financial text mining: Supporting decision making using web 2.0 content

    2010

  • Gene function prediction with gene interaction networks: a context graph kernel approach.

    2010

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

    2010

  • User-generated content on social media: Predicting market success with online word-of-mouth

    2010

  • Sports knowledge management and data mining

    2010

  • Visualizing social network concepts

    2010

  • Interaction Analysis of the ALICE Chatterbot: A Two-Study Investigation of Dialog and Domain Questioning

    2010

  • Embedded analogue nonvolatile memory with feedback-controlled programming circuit on-chip

    2010

  • Detecting fake websites: The contribution of statistical learning theory

    2010

  • Comparing the virtual linkage intensity and real world proximity of social movements

    2010

  • Editorial: Welcome to the first issue of ACM TMIS

    2010

  • Business and market intelligence 2.0

    2010

  • Social Media Analytics and Intelligence

    2010

  • Developing a Dark Web collection and infrastructure for computational and social sciences

    2010

  • Global disease surveillance using social media: HIV/AIDS content intervention in web forums

    2010

  • A discrete stock price prediction engine based on financial news

    2010

  • Text-based video content classification for online video-sharing sites

    2010

  • Exploiting emotions in social interactions to detect online social communities

    2010

  • AI and opinion mining

    2010

  • A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study

    2010

  • A focused crawler for dark web forums

    2010

  • AI and security informatics

    2010

  • Prospective Infectious Disease Outbreak Detection Using Markov Switching Models

    2010

  • Burst Detection From Multiple Data Streams: A Network-Based Approach

    2010

  • Security Informatics

    2009

  • Business stakeholder analyzer: An experiment of classifying stakeholders on the web

    2009

  • Multilingual chief complaint classification for syndromic surveillance: an experiment with Chinese chief complaints.

    2009

  • Topological analysis of criminal activity networks: Enhancing transportation security

    2009

  • Browsing the underdeveloped web: An experiment on the arabic medical web directory

    2009

  • Automatic online news monitoring and classification for syndromic surveillance

    2009

  • IEDs in the dark web: Lexicon expansion and genre classification

    2009

  • Knowledge sharing and diffusion patterns

    2009

  • Xu responds

    2009

  • The Dynamics of Terrorist Networks: Understanding the Survival Mechanisms of Global Salafi Jihad

    2009

  • Managing Knowledge in Light of Its Evolution Process: An Empirical Study on Citation Network-Based Patent Classification

    2009

  • Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLNK mobile

    2009

  • Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (CSI-KDD): Preface

    2009

  • IEEE ISI 2009 welcome message from conference co-chairs

    2009

  • AI, e-government, and politics 2.0

    2009

  • A comparison of tools for detecting fake websites

    2009

  • Nano Mapper: An Internet knowledge mapping system for nanotechnology development

    2009

  • Using open web APIs in teaching web mining

    2009

  • A web-based system for near real-time surveillance and space-time cluster analysis of foot-and-mouth disease and other animal diseases.

    2009

  • A quantitative stock prediction system based on financial news

    2009

  • Effect of Inventor Status on Intra-Organizational Innovation Evolution

    2009

  • Examining agencies' satisfaction with electronic record management systems in e-government: A large-scale survey study

    2009

  • Gender difference analysis of political web forums: An experiment on an international Islamic women's forum

    2009

  • A comparison of fraud cues and classification methods for fake escrow website detection

    2009

  • Dark web forums portal: Searching and analyzing Jihadist forums

    2009

  • Identification of extremist videos in online video sharing sites

    2009

  • AI for Global Disease Surveillance

    2009

  • Identifying significant facilitators of dark network evolution

    2009

  • Arizona literature mapper: An integrated approach to monitor and analyze global bioterrorism research literature

    2009

  • Disease surveillance based on spatial contact networks: A case study of Beijing 2003 SARS epidemic

    2009

  • High-speed and low-power feRAM utilising merged BL/PL array architecture with twin-bitline-driven scheme

    2009

  • Textual analysis of stock market prediction using breaking financial news: The AZFin text system

    2009

  • AI and global science and technology assessment

    2009

  • The strategic co-alignment for implementing information systems in E-government

    2009

  • Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups

    2008

  • Stylometric identification in electronic markets: Scalability and robustness

    2008

  • Botnets, and the cybercriminal underground

    2008

  • IEDs in the Dark Web: Genre classification of improvised explosive device web pages

    2008

  • Exploring gray web forums: Analysis and investigation of forum-based communities in Taiwan

    2008

  • PRM-based identity matching using social context

    2008

  • Uncovering the Dark Web: A case study of Jjihad on the Web

    2008

  • Homeland security data mining using social network analysis

    2008

  • Cybergate: A design framework and system for text analysis of computer-mediated communication

    2008

  • The topology of dark networks

    2008

  • Nuclear threat detection via the nuclear web and dark web: Framework and preliminary study

    2008

  • Discovery of improvised explosive device content in the Dark Web

    2008

  • Bioterrorism event detection based on the Markov switching model: A simulated anthrax outbreak study

    2008

  • Kernel-based learning for biomedical relation extraction

    2008

  • Guest Editors Introduction: Special Section on Intelligence and Security Informatics

    2008

  • Combining probability models and web mining models: A framework for proper name transliteration

    2008

  • Understanding the nexus of terrorist web sites

    2008

  • Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace

    2008

  • Multimedia content coding and analysis: Unraveling the content of jihadi extremist groups' videos

    2008

  • Syndromic surveillance systems

    2008

  • A stack-based prospective spatio-temporal data analysis approach

    2008

  • A hybrid approach to web forum interactional coherence analysis

    2008

  • A longitudinal analysis of nanotechnology literature: 1976-2004

    2008

  • Mapping dark web geolocation

    2008

  • Affect analysis of web forums and blogs using correlation ensembles

    2008

  • Evaluating ontology mapping techniques: An experiment in public safety information sharing

    2008

  • Sentiment and affect analysis of Dark Web forums: measuring radicalization on the internet

    2008

  • A machine learning approach to web page filtering using content and structure analysis

    2008

  • Communication-Garden System: Visualizing a computer-mediated communication process

    2008

  • An integrated approach to mapping worldwide bioterrorism research capabilities

    2008

  • Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement

    2008

  • Evaluating a news-aware quantitative trader: The effect of momentum and contrarian stock selection strategies

    2008

  • Ontology-enhanced automatic chief complaint classification for syndromic surveillance

    2008

  • Analysis of cyberactivism: A case study of online free Tibet activities

    2008

  • Welcome message from conference co-chairs

    2008

  • Suspect vehicle identification for border safety

    2008

  • Organizing domain-specific information on the Web: An experiment on the Spanish business Web directory

    2008

  • Editors' introduction special issue on multilingual knowledge management

    2008

  • Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums

    2008

  • Editorial: Introduction to the special issue on decision support in medicine

    2007

  • A framework for stylometric similarity detection in online settings

    2007

  • Identification of Marker Genes from High-Dimensional Microarray Data for Cancer Classification

    2007

  • Evaluating the efficacy of a terrorism question/answer system

    2007

  • Automatic patent classification using citation network information: An experimental study in nanotechnology

    2007

  • Exploring extremism and terrorism on the web: The Dark Web project

    2007

  • Mapping the contemporary terrorism research domain

    2007

  • ISI 2007 Preface

    2007

  • Cyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems

    2007

  • Analyzing and visualizing gray Web forum structure

    2007

  • Building a directory for the underdeveloped web: An experiment on the arabic medical web directory

    2007

  • Graph Kernel-Based Learning for Gene Function Prediction from Gene Interaction Network

    2007

  • A Comparison of Collaborative-Filtering Recommendation Algorithms for E-commerce

    2007

  • Categorization and analysis of text in computer mediated communication archives using visualization

    2007

  • Dynamic Social Network Analysis of a Dark Network: Identifying Significant Facilitators

    2007

  • Medical Ontology-Enhanced Text Processing for Infectious Disease Informatics

    2007

  • User-centered evaluation of Arizona BioPathway: an information extraction, integration, and visualization system

    2007

  • Interaction Coherence Analysis for Dark Web Forums

    2007

  • A comparison of collaborative-filtering algorithms for ecommerce

    2007

  • Collection of U.S. Extremist Online Forums: A Web Mining Approach

    2007

  • Millimetre-wave signal generation using FWM effect in SOA

    2007

  • System for infectious disease information sharing and analysis: design and evaluation.

    2007

  • The Arizona IDMatcher: A Probabilistic Identity Matching System

    2007

  • Longitudinal study on patent citations to academic research articles in nanotechnology (1976-2004)

    2007

  • Incorporating web analysis into neural networks: An example in hopfield net searching

    2007

  • Leveraging Question Answer technology to address terrorism inquiry

    2007

  • Large-scale regulatory network analysis from microarray data: modified Bayesian network learning and association rule mining

    2007

  • Worldwide nanotechnology development: A comparative study of USPTO, EPO, and JPO patents (1976-2004)

    2007

  • Global mapping of gene/protein interactions in PubMed abstracts: A framework and an experiment with P53 interactions

    2007

  • Analyzing Consumer-Product Graphs: Empirical Findings and Applications in Recommender Systems

    2007

  • An evaluation of the chat and knowledge delivery components of a low-level dialog system:The AZ-ALICE experiment

    2007

  • Introduction to the special issue on decision support in medicine

    2007

  • Incorporating geographical contacts into social network analysis for contact tracing in epidemiology: A study on Taiwan SARS data

    2007

  • Patent citation network in nanotechnology (1976-2004)

    2007

  • Optimal search-based gene subset selection for gene array cancer classification

    2007

  • Affect intensity analysis of dark web forums

    2007

  • Enhancing border security: Mutual information analysis to identify suspect vehicles

    2007

  • Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity

    2007

  • Intelligence and security informatics: Information systems perspective

    2006

  • A framework for authorship identification of online messages: Writing-style features and classification techniques

    2006

  • Process-driven collaboration support for intra-agency crime analysis

    2006

  • CMedPort: An integrated approach to facilitating Chinese medical information seeking

    2006

  • Target vehicle identification for border safety with modified mutual information

    2006

  • The BioPortal project: a national center of excellence for infectious disease informatics

    2006

  • Textual analysis of stock market prediction using financial news articles

    2006

  • Evaluating mass knowledge acquisition using the ALICE chatterbot: The AZ-ALICE dialog system

    2006

  • Summary in context: Searching versus browsing

    2006

  • Efficient Scheduling of Periodic Information Monitoring Requests

    2006

  • Connecting NSF funding to patent innovation in nanotechnology (2001-2004)

    2006

  • On the topology of the dark web of terrorist groups

    2006

  • Fighting cybercrime: a review and the Taiwan experience

    2006

  • Identity matching based on probabilistic relational models

    2006

  • Visualizing authorship for identification

    2006

  • Using importance flooding to identify interesting networks of criminal activity

    2006

  • A framework for exploring Gray Web Forums: Analysis of forum-based communities in Taiwan

    2006

  • Supporting non-English web searching: an experiment on the Spanish business and the Arabic medical intelligence portals

    2006

  • Ontology-Based Automatic Chief Complaints Classification for Syndromic Surveillance

    2006

  • From fingerprint to writeprint

    2006

  • Aggregating automatically extracted regulatory pathway relations

    2006

  • Examining the business-technology alignment in government agencies: A study of electronic record management systems in Taiwan

    2006

  • Unraveling International Terrorist Groups' exploitation of the Web: Technical sophistication, media richness, and web interactivity

    2006

  • Content analysis of Jiliadi extremist groups' videos

    2006

  • Moving digital libraries into the student learning space: The GetSmart experience

    2006

  • A framework of integrating gene relations from heterogeneous data sources: An experiment on Arabidopsis thaliana

    2006

  • Matching knowledge elements in concept maps using a similarity flooding algorithm

    2006

  • Intelligence and Security Informatics

    2006

  • Multilingual web retrieval: An experiment in English-Chinese business intelligence

    2006

  • A probabilistic model for approximate identity matching

    2006

  • Building a scientific knowledge web portal: The NanoPort experience

    2006

  • Editorial: Intelligence and security informatics: information systems perspective

    2006

  • Using Social Contextual Information to Match Criminal Identities

    2006

  • Suspect vehicle identification for border safety with modified mutual information

    2006

  • Automatically detecting criminal identity deception: an adaptive detection algorithm

    2006

  • Extremist social movement groups and their online digital libraries

    2006

  • Expertise visualization: An implementation and study based on cognitive fit theory

    2006

  • A multi-layer Naïve Bayes model for approximate identity matching

    2006

  • Exploring the dark side of the Web: Collection and analysis of U.S. extremist online forums

    2006

  • The dark web portal project: Collecting and analyzing the presence of terrorist groups on the web

    2005

  • Frame-based argumentation for group decision task generation and identification

    2005

  • Optimal search-based gene selection for cancer prognosis

    2005

  • Newsmap: a knowledge map for online news

    2005

  • Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list

    2005

  • Experimental verification of adaptive PMD compensation in a 40-channel DWDM transmission system with 40-Gbps CSRZ format

    2005

  • Supporting Information Seeking in Multinational Organizations: A Knowledge Portal Approach

    2005

  • Mapping the contemporary terrorism research domain: Researchers, publications, and institutions analysis

    2005

  • Analyzing terrorist networks: A case study of the global salafi jihad network

    2005

  • Target vehicle identification for border safety using mutual information

    2005

  • Information visualization

    2005

  • Visualization in law enforcement

    2005

  • Using Genetic Algorithm in Building Domain-Specific Collections: An Experiment in the Nanotechnology Domain

    2005

  • Question answer TARA: A terrorism activity resource application

    2005

  • Lecture Notes in Computer Science: Preface

    2005

  • Prospective spatio-temporal data analysis for security informatics

    2005

  • Longitudinal nanotechnology development (1991 - 2002): National science foundation funding and its impact on patents

    2005

  • Introduction to the special topic issue: Intelligence and security informatics

    2005

  • A visual framework for knowledge discovery on the web: An empirical study of business intelligence exploration

    2005

  • CrimeNet explorer: A framework for criminal network knowledge discovery

    2005

  • Building web directories in different languages for decision support: A semi-automatic approach

    2005

  • CRIMINAL network analysis and visualization

    2005

  • Transforming open-source documents to terror networks: The arizona terrornet

    2005

  • Studying the presence of terrorism on the web: an knowledge portal approach

    2005

  • Applying authorship analysis to extremist-group Web forum messages

    2005

  • Artificial intelligence for homeland security

    2005

  • Genescene: An ontology-enhanced integration of linguistic and Co-occurrence based relations in biomedical Texts

    2005

  • Building knowledge management system for researching terrorist groups on the web

    2005

  • Collecting and analyzing the presence of terrorists on the Web: A case study of Jihad Websites

    2005

  • Border Safe: Cross-jurisdictional information sharing, analysis, and visualization

    2005

  • Studying the structure of terrorist networks: A web structural mining approach

    2005

  • Terror tracker system: A web portal for terrorism research

    2005

  • Digital library development in the Asia Pacific

    2005

  • BioPortal: a case study in infectious disease informatics

    2005

  • Using 3D interfaces to facilitate the spatial knowledge retrieval: A geo-referenced knowledge repository system

    2005

  • Applying authorship analysis to Arabic web content

    2005

  • Linking ontological resources using aggregatable substance identifiers to organize extracted relations

    2005

  • Discovering identity problems: A case study

    2005

  • Multilingual Web Retrieval: An Experiment on a Multilingual Business Intelligence Portal

    2005

  • Visualizing aggregated biological pathway relations

    2005

  • Cross-jurisdictional Criminal Activity Networks to support border and transportation security

    2004

  • Extracting gene pathway relations using a hybrid grammar: The Arizona Relation Parser

    2004

  • Biomedical informatics and security informatics research in digital library

    2004