AI Lab Publications

AI Lab Publications

 

 

This section provides a complete bibliography of papers published by the AI Lab in professional and scientific journals and magazines.  For other forms of publication, please see the various drop-down sections.

2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1991 | 1990

2024

  1. B. Ampel, S. Samtani, H. Zhu, and H. Chen, "Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach," MIS Quarterly, Volume 48, Number 1, Pages 137-166, 2024.
  2. B. Ampel, S. Samtani, H. Zhu, H. Chen, and J. F. Nunamaker, “Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach,” Journal of Management Information Systems (JMIS), Volume 41, Number 1, Pages 236-265, 2024.
  3. F. Y. Lin, S. Samtani, H. Zhu, L. Brandimarte, and H. Chen, "Automated Analysis of Changes in Privacy Policies: A Structured Self-Attentive Sentence Embedding Approach," MIS Quarterly, forthcoming, 2024.
  4. S. Yu, Y. Chai, S. Samtani, H. Liu, and H. Chen, “Motion Sensor-Based Fall Prevention for Senior Care: A Hidden Markov Model with Generative Adversarial Network (HMM-GAN) Approach,” Information Systems Research, forthcoming, 2024.
  5. B. Ampel, C. Yang, J, Hu, and H. Chen, “Large Language Models for Conducting Advanced Text Analytics Information Systems Research,” ACM Transactions on Management Information Systems (TMIS), forthcoming, 2024.
  6. M. Ebrahimi, Y. Chai, W. Li, J. Pacheco, and H. Chen, “RADAR: A Framework for Developing Adversarially Robust Cyber Defense AI Agents with Deep Reinforcement Learning,” MIS Quarterly, forthcoming, 2024.

2023

  1. M. Ebrahimi, Y. Chai, H. Zhang, and H. Chen, "Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity," IEEE Transactions on Pattern Recognition and Machine Intelligence (TPAMI), Volume 45, Number 2, Pages 1862-1875, 2023.
  2. S. Samtani, H. Zhu, B. Padmanabhan, Y. Chai, H. Chen, and J. F. Nunamaker, “Deep Learning for Information Systems Research,” Journal of Management Information Systems, Volume 40, Number 1, Pages 271-301, 2023.

2022

  1. B. Wen, P. Hu, M. Ebrahimi, and H. Chen, “Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics,” ACM Transactions on Management Information Systems (TMIS), Volume 13, Number 1, Pages 10:1-10:24, 2022.
  2. N. Zhang, M. Ebrahimi, W. Li, H. Chen, "Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence," ACM Transactions on Management Information Systems (TMIS), Volume 13, Number 2, Pages 21:1-21:21, 2022.
  3. S. Samtani, Y. Chai, and H. Chen, "Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-based Deep Structured Semantic Model," MIS Quarterly, Volume 46, Number 2, Pages 909-944, June 2022.
  4. M. Ebrahimi, Y. Chai, S. Samtani, and H. Chen, “Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning,” MIS Quarterly, Volume 46, Number 2, Number 1209-1226, June 2022.
  5. S. Yu, Y. Chai, H. Chen, S. J. Sherman, and R. A. Brown, "Wearable Sensor-based Chronic Condition Severity Assessment: An Adversarial Attention-based Deep Multisource Multitask Learning Approach,” MIS Quarterly, Volume 46, Number 3, Pages 1355-1394, September 2022.
  6. W. Li and H. Chen, “Discovering Emerging Threats in the Hacker Community: A Non-parametric Emerging Topic Detection Framework,” MIS Quarterly, Volume 46, Number 4, December 2022.
  7. S. Samtani, H. Chen, M. Kantarcioglu, and B. Thuraisingham "Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)," IEEE Transactions on Dependable Security Computing (TDSC), Volume 19, Number 4, Pages 2149-2150, 2022.

2021

  1. S. Yu, Y. Chai, H. Chen, R. A. Brown, S. J. Sherman, and J. F. Nunamker, “Fall Detection with Wearable Sensors: A Hierarchical Attention-based Convolutional Neural Network Approach,” Journal of Management Information Systems, Volume 38, Number 4, Pages 1095-1121, 2021.
  2. Samtani, W. Li, V. Benjamin, and H. Chen, “Developing Situational Awareness from the Dark Web: The AZSecure Hacker Assets Portal,” ACM Digital Threats Research and Practice (DTRAP), Volume 2, Issue 4, Pages 1-10, 2021. 
  3. H. Zhu, S. Samtani, R. Brown, and H. Chen, “A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns,” MIS Quarterly, Volume 45, Number 2, June 2021.
  4. Q. Li, J. Tan, J. Wang, and H. Chen, “A Multimodal Event-driven LSTM Model for Stock Prediction Using Online News,” IEEE Transactions on Knowledge and Data Engineering, Volume 33, Number 10, Pages 3323-3337, 2021.
  5. Y. Dang, Y. Zhang, and H. Chen, “Leveraging the IS Success Model to Examine a Large-scale Social Media Search System,” Pacific Asia Journal of the Association for Information Systems, 2021.
  6. S. Samtani, M. Kantarcioglu, and H. Chen, “A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems,” ACM Transactions on Management Information Systems, Volume 12, Number 1, Pages 1-18, 2021.

2020

  1. F. Ahmad, A. Abbasi, J. Li, D.G. Dobolyi, R.G. Netemeyer, G.D. Clifford, H. Chen, "A Deep Learning Architecture for Psychometric Natural Language Processing," ACM Transactions on Information Systems, Volume 33, Number 1, Pages 6:1-6:29, 2020.
  2. I. Bardhan, H. Chen, and E. Karahanna, “Connecting Systems, Data, and People: A Multidisciplinary Research Roadmap for Chronic Disease Management,” Volume 44, Number 1, March 2020.
  3. Y. Dang, Y. Zhang, and H. Chen, “Leveraging the IS Success Model to Examine a Large-scale Social Media Search System,” Pacific Asia Journal of the Association for Information Systems, forthcoming, 2020.
  4. Y. Dang, Y. Zhang, Sue Brown, and H. Chen, “Examining the Impacts of Mental Workload and Task-Technology Fit on User Acceptance of the Social Media Search System,” Information Systems Frontiers, Volume 22, Number 3, Pages 697-718, 2020.
  5. M. Chau, T. Li, P. Wong, J. Xu, P. Yip, and H. Chen, “Finding People with Emotional Distress in Online Social Media: A Design Combining Machine Learning and Rule-based Classification,” MIS Quarterly, Volume 44, Number 2, Pages 933-955, 2020.
  6. H. Zhu, S. Samtani, H. Chen, and J. F. Nunamaker, “Human Identification for Activities of Daily Living: A Deep Transfer Approach,” Journal of Management Information Systems, Volume 37, Number 2, Pages 457-483, 2020.
  7.  M. Ebrahimi, J. F. Nunamaker, and H. Chen, “Semi-Supervised Cyber Threat identification in Dark Net Market: A Transductive and Deep Learning Approach,” Journal of Management Information Systems, Volume 37, Number 3, Pages 694-722, 2020.
  8. S. Samtani, M. Kantarcioglu, and H. Chen. “Trailblazing the Artificial Intelligence for Cybersecurity Discipline: A Multi-Disciplinary Research Roadmap,” ACM Transactions on Management Information Systems, Volume 11, Number 4, Pages 1-19, 2020.
  9. S. Samtani, H. Zhu, and H. Chen, “Proactively Identifying Emerging Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF),” ACM Transactions on Privacy and Security, Volume 23, Number 4, Pages 1-33, 2020.
  10. Y. Zhang, Y. Dang, and H. Chen, “An Exploratory Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in Their Social Interactions for Help-Seeking,” Information Systems Frontiers, Volume 24, Number 4, Pages 911-925, 2020.

2019

  1. V. Benjamin, J. Valacich, H. Chen, " DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation, with Ethics," MIS Quarterly, Volume 43, Number 1, 2019. 
  2. S. Yu, H. Zhu, H. Chen, "Emoticon Analysis for Chinese Social Media and E-Commerce: The AZEmo System," ACM Transactions on Management Information Systems, Volume 9, Number 4, 16:1-16:22, 2019.
  3. Y. Lin, M. Lin, and H. Chen, “Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act,” Information Systems Research, Volume 30, Number 1, Pages 306-318, 2019.
  4. L. Wu, H. Zhu, H. Chen, and M. C. Roco, “Comparing Nanotechnology Landscapes in the US and China: A Patent Analysis Perspective,” Journal of Nanoparticle Research, Volume 21, August, 2019.
  5. S. Jiang and H. Chen, “Examining Patterns of Scientific Knowledge Diffusion Based on Knowledge Cyber Infrastructure: A Multi-dimensional Network Approach,” Scientometrics, Volume 121, Number 3, Pages 1599-1617, 2019.

2018

  1. Q. Li, Y. Chen, J. Wang, Y. Chan, and H. Chen, "Web Media and Stock Markets: A Survey and Future Directions from a Big Data Perspective," IEEE Transactions on Knowledge and Data Engineering, Volume 30, Number 2, Pages 381-399, 2018.
  2. W. Li, J. Yun, H. Chen, "Supervised Topic Modeling using Hierarchical Dirichlet Process-based Inverse Regression: Experiments on E-Commerce Applications," IEEE Transactions on Knowledge and Data Engineering, Volume 30, Number 6, Pages 1192-1205, 2018.
  3. S. Samtani, S. Yu, H. Zhu, M. Patton, J. Matherly, and H. Chen, "Identifying Supervisory Control and Data Acquisition (SCADA) Devices and Their Vulnerabilities on the Internet of Things (IoT): A Text Mining Approach," IEEE Intelligent Systems, Volume 33, Number 2, Pages 63-73, 2018.
  4. S. Yu and H. Chen, " Hidden Markov Model Based Fall Detection with Motion Sensor Orientation Calibration: A Case for Real-Life Home Monitoring," IEEE Journal of Biomedical and Health Informatics, Volume 22, Number 6, Pages 1847-1853, 2018.
  5. D. Zimbra, A. Abbasi, D. Zeng, and H. Chen, "The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation," ACM Transactions on Management Information Systems, Volume 9, Number 2, Pages 5:1-5:29, 2018.
  6. H. Zhu, R. Brown, and H. Chen, "A Sequence-to-Sequence Model-Based Deep Learning Approach for Recognizing of Daily Living for Senior Care," Journal of Biomedical Informatics, Volume 84, Pages 148-158, 2018

2017

  1. Y. Lin, H. Chen, R. Brown, and S. Li, “Healthcare Predictive Analytics for Risk Profiling in Chronic Care: A Bayesian Multi-Task Learning Approach,” MIS Quarterly, Volume 41, Number 2, Pages 473-495, June 2017.
  2. Y. Zhang, Y. Dang, S. Brown, and H. Chen, “Investigating the Impacts of Avatar Gender, Avatar Age, and Region Theme on Avatar Activity in the Virtual World,” Computers in Human Behavior, Volume 68, Pages 378-387, 2017.
  3. W. Shang, H. Chen, and C. Livoti, "Adverse Drug Reaction Early Warning Using User Search Data," Online Information Review, Volume 41, Issue 4, Pages 524-536
  4. S. Samtani, R. Chinn, H. Chen, and J.F. Nunamaker, "Exploring Emerging Hacker Assets and Key Hackers for Proactive Threat Intelligence," Journal of Nanoparticle Research, Volume 19, Number 11, 2017. 

2016

  1. S. Jiang and H. Chen, “NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks,” IEEE Transactions on Knowledge and Data Engineering, Volume 28, Number 3, Pages 729-740, 2016.
  2. Q. Li, Y. Chen, L. L. Jiang, P. Li, and H. Chen, “A Tensor-based Information Framework for Predicting the Stock Market,” ACM Transactions on Information Systems, Volume 34, Number 2, Pages 1-31, 2016.
  3. X. Li, T. Zhang, L. Song, Y. Zhang, G. Zhang, C. Xing, and H. Chen, “Effects of Heart Rate Variability Biofeedback Therapy on Patients with Poststroker Depression: A Case Study,” Chinese Medical Journal, Volume 128, Number 18, Pages 2542-2545, 2016.
  4. J. Woo and H. Chen, “Epidemic Model for Information Diffusion in Web Forums: Experiments in Marketing Exchange and Political Dialog,” SpringerPlus, 5:66, 2016.
  5. J. Woo, S. Ha, and H. Chen, “Tracing Topic Discussion with Event-driven SIR Model in Online Forums,” Journal of Electronic Commerce Research, Volume 17, Number 2, Pages 169-187, 2016.
  6. J. Qiao, Y. Meng, H. Chen, H. Huang, and G. Li, “Modeling One-Mode Projection of Bipartite Networks by Tagging Vertex Information,” Physica A, Volume 457, Pages 270-279, September, 2016.
  7.  V. Benjamin, B. Zhang, J. F. Nunamaker, and H. Chen, “Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities,” Journal of Management Information Systems, Volume 33, Number 2, Pages 482-510, 2016.
  8. W. Li, H. Chen, and, J. F. Nunamaker, “Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System,” Journal of Management Information Systems, Volume 33, Number 2, Pages 1059-1086, 2016.

2015

  1. S. Jiang, Q. Gao, and H. Chen, “The Roles of Sharing, Transfer, and Public Funding in Nanotechnology Knowledge Diffusion Networks,” Journal of the American Society for Information Science and Technology, Volume 66, Number 6, Pages 1017-1029, 2015.
  2. D. Zimbra, H. Chen, and R. F. Lusch, “Stakeholder Analyses of Firm-Related Web Forums: Applications in Stock Return Prediction,” ACM Transactions on Management Information Systems, Volume 6, Number 1, Pages 2:1-2:38, 2015.
  3. X. Liu and H. Chen, “Identifying Adverse Drug Events from Patient Social Media: A Case Study of Diabetes,” IEEE Intelligent Systems, Volume 30, Number 3, Pages 44-51, 2015
  4. A. Abbasi, F. Zahedi, D. Zeng, Y. Chen, H. Chen, and J. F. Nunamaker, “Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information,” Journal of Management Information Systems, Volume 31, Number 4, Pages 109-157, 2015.
  5. X. Liu and H. Chen, “A Research Framework for Pharmacovigilance in Health Social Media: Identification and Evaluation of Patient Adverse Drug Event Reports,” Journal of Biomedical Informatics, forthcoming, 2015.
  6. B. Wu, S. Jiang, and H. Chen, “The Impact of Individual Attributes on Knowledge Diffusion in Web Forums,” Quality and Quantity, forthcoming, 2015.
  7. X. Li, T. Zhang, L. Song, Y. Zhang, G. Zhang, C. Xing, and H. Chen, “Effects of Heart Rate Variability Biofeedback Therapy on Patients with Poststroker Depression: A Case Study,” Chinese Medical Journal, forthcoming, 2015.
  8. X. Liu, S. Jiang, H. Chen, C. Larson, and M. C. Roco, “Modeling Knowledge Diffusion in Scientific Innovation Networks: An Institutional Comparison Between China and U.S. with Illustration for Nanotechnology,” Scientometrics, forthcoming, 2015.
  9. Q. Li, Y. Chen, L. L. Jiang, P. Li, and H. Chen, “A Tensor-based Information Framework for Predicting the Stock Market,” ACM Transactions on Information Systems, forthcoming, 2015.

2014

  1. Y. Dang, Y. Zhang, P. Hu, S. Brown, Y. Ku, J. Hwang, and H. Chen, “An Integrated Framework for Analyzing Multilingual Content in Web 2.0 Social Media,” Decision Support Systems, Volume 61, Pages 126-135, 2014.
  2. S. Jiang, D. Zimbra, J. F. Nunamaker, and H. Chen, “Analyzing Firm-specific Social Media and Market: A Stakeholder-based Event Analysis Framework,” Decision Support Systems,” Volume 69, Pages 30-39, 2014.
  3. C. Jiang, K. Liang, H. Chen, Y. Ding, “Analyzing Market Performance via Social Media: A Case Study of a Banking Industry Crisis,” SCIENCE CHINA Information Sciences, Volume 57, Number 5, Pages 1-18, 2014.
  4. Y. Lin, H. Chen, R. Brown, S. Li, and H. Yang, “Time-to-Event Predictive Modeling for Chronic Conditions using Electronic Heal Records,” IEEE Intelligent Systems, Volume 29, Number 3, Pages 14-21, 2014.
  5. G. Leroy, H. Chen, and T. Rindflesch, “Smart and Connected Health,” IEEE Intelligent Systems, Volume 29, Number 3, Pages 2-5, 2014.
  6. X. Liu, S. Jiang, H. Chen, C. A. Larson, and M. C. Roco, “Nanotechnology Knowledge Diffusion: Measuring the Impact of the Research Networking and a Strategy for Improvement,” Journal of Nanoparticle Research, Volume 16, September, 2014.
  7. V. Benjamin, D. Zimbra, and H. Chen, “Bridging the Virtual and Real: The Relationships between Web Content, Linkage, and Geographical Proximity of Social Movements,” Journal of the American Society for Information Science and Technology, Volume 65, Issue 11, Pages 2210–2222, November 2014.
  8. Y. C. Ku, C. Chao, Y. Zhang, and H. Chen, “Text Mining Self-disclosing Health Information for Public Health Service,” Journal of the American Society for Information Science and Technology, Volume 65, Issue 5, Pages 928–947, May 2014.
  9. S. Jiang, Q. Gao, H. Chen, and M. Roco, “The Roles of Sharing, Transfer, and Public Funding in Nanotechnology Knowledge Diffusion,” Journal of the American Society for Information Science and Technology, Volume 66, Issue 5, Pages 1017–1029, May 2015 .  

2013

  1. H. Chen, M. C. Roco, and J. Son. "Nanotechnology Public Funding and Impact Analysis: A Tale of Two Decades (1991-2010)," IEEE Nanotechnology Magazine, Volume 7, Number 1, Pages 9-14, March 2013.
  2. L. Fan, Y. Zhang, Y. Dang, and H. Chen. "Analyzing sentiments in Web 2.0 social media data in Chinese: experiments on business and marketing related Chinese Web forums," Information Technology and Management, 12 pages, April 2013.
  3. X. Li and H. Chen. "Recommendation as Link Prediction in Bipartite Graphs: A Graph Kernel-based Machine Learning Approach," Decision Support Systems, Volume 54, Issue 2, Pages 880-890, January 2013.
  4. Y.-K. Lin, H. Chen, and R. Brown, "MedTime: A Temporal Information Extraction System for Clinical Narratives," Journal of Biomedical Informatics, (46, Supplement) Pages S20-S28, 2013.
  5. H. Chen, M. Roco, J. Son, S. Jiang, C. Larson, and Q. Gao, “Global Nanotechnology Development from 1991 to 2012: Patents, Scientific Publications, and Effect of NSF Funding,” Journal of Nanoparticle Research, 15-1951, August, 2013.
  6. Y. Zhang, D. Yang, and H. Chen, “Examining Gender Emotional Differences in Web Forum Communication,” Decision Support Systems, Volume 55, Number 3, Pages 851-860, 2013.
  7. J. L. Campbell, H. Chen, D. S. Dhaliwal, H. Lu, and L. B. Steele, “The Information Content of Mandatory Risk Factor Disclosures in Corporate Filings,” Review of Accounting Studies, October, 2013.  

2012

  1. M. Yang, M. Kiang, H. Chen, and Y. Li, “Artificial Immune System for Illicit Content Identification in Social Media,” Journal of the American Society for Information Science and Technology, Volume 63, Number 2, Pages 256-269, 2012.
  2. R. P. Schumaker, Y. Zhang, C. Huang, and H. Chen, “Evaluating Sentiment in Financial News Articles,” Decision Support Systems, Volume 53, Number 3, Pages 458-464, 2012.
  3. Y. Dang, Y. Zhang, H. Chen, S. Brown, P. J. Hu, and J. F. Nunamaker, “Theory-informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology,” Journal of Management Information Systems, Volume 28, Number 4, Spring, 2012.
  4. H. Chen, Roger Chiang, and Veda Storey, “Business Intelligence and Analytics: From Big Data to Big Impact,” MIS Quarterly, Volume 36, Number 4, Pages 1165-1188, December 2012.
  5. H. M. Lu, T. T. Tsai, H. Chen, M. W. Hung, and S. H. Li, “Credit Rating Change Modeling using News and Financial Ratios,” ACM Transactions on Management Information Systems, Volume 3, Number 1, Pages 14:1-14:30, 2012.
  6. T. Fu, A. Abbasi, D. Zeng, and H. Chen, “Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers,” ACM Transactions on Information Systems, Volume 30, Number 4, November, 2012.  

2011

  1. H. Chen, “Design Science, Grand Challenges, and Societal Impacts,” ACM Transactions on MIS, Volume 2, Number 1, Pages 1:1-1:10, March 2011.
  2. A. Abbasi, S. France, Z. Zhang, and H. Chen, “Selecting Attributes for Sentiment Classification using Feature Relation Networks,” IEEE Transactions on Knowledge and Data Engineering, Volume 23, Number 3, Pages 447-462, 2011.
  3. Y. Zhang, Y. Dang, P. J. Hu, S. Brown, and H. Chen, “Knowledge Mapping for Rapidly Evolving Domains: A Design Science Approach,” Decision Support Systems, Volume 50, Issue 2, Pages 415-427, January 2011.
  4. G. Wang, H. Atabakhsh, and H. Chen, “Approximate Identity Matching: A Multi-Layer Naïve Bayes Model,” Decision Support Systems, Volume 51, Number 3, Pages 413-423, 2011.
  5. J. Li, G. Wang, and H. Chen, “Identity Matching Using Social Identity Features,” Information Systems Frontiers, Volume 13, Number 1, 2011.
  6. H. Chen, M. Chau, and S. Li, “Enterprise Risk and Security Management: Data, Text and Web Mining,” Decision Support Systems, Volume 50, Number 4, Pages 949-650, 2011.
  7. K. Chen, H. Lu, T. Chen, S. Li, J. Lian, and H. Chen, “Giving Context to Accounting Numbers: The Role of News Coverage,” Decision Support Systems, Volume 50, Number 4, Pages 673-679, 2011.
  8. H. Chen and Y. Zhang, “AI, Virtual Worlds, and Massively Multiplayer Online Games,” IEEE Intelligent Systems, Volume 26, Number 1, Pages 80-82, January/February, 2011.
  9. N. Suakkaphong, Z. Zhang, and H. Chen, “Disease Named Entity Recognition using Semi-supervised Learning and Conditional Random Fields,” Journal of the American Society for Information Science and Technology, Volume 62, Number 4, Pages 727-737, 2011.
  10. X. Liu, S. Kaza, P. Zhang, and H. Chen, “Determining Inventor Status and Its Effect on Knowledge Diffusion: A Study on Nanotechnology Literature from China, Russia, and India,” Journal of the American Society for Information Science and Technology, Volume 62, Number 6, Pages 1166-1176, 2011.
  11. Y. Zhang, Y. Dang, and H. Chen, “Gender Classification for Web Forums,” IEEE Transactions on Systems, Man, and Cybernetics, Part A, Volume 41, Number 4, Pages 668-677,  2011.
  12. P. J. Hu, H. Hu, F. M. Hsu, and H. Chen, “Law Enforcement Officers’ Acceptance of Advanced E-Government Technology: A Survey Study of COPLINK Mobile,” Electronic Commerce Research and Applications, Volume 10, Number 1, Pages 6-16, January-February 2011
  13. P. Hu and H. Chen, “Analyzing Information Systems Researchers’ Productivity and Impacts: A Perspective on the H Index,” ACM Transactions on MIS, Volume 2, Number 2, Pages 7:1-7:8, June 2011.
  14. Y. Chen, S. Brown, P. J. Hu, and H. Chen, “Managing Emerging Infectious Diseases with Information Systems: Reconceptualizing Outbreak Management through the Lens of Loose Coupling,” Information Systems Research, Volume 22, Number 3, Pages 447-468, September 2011.
  15. H. Chen, “Smart Health and Wellbeing,” IEEE Intelligent Systems, Volume 26, Number 5, Pages 78-79, September/October, 2011.
  16. Y. Lin, R. Brown, H-J Yang, S. Li, H. Lu, and H. Chen, “Data Mining Large-scale Electronic Health Records for Clinical Support,” IEEE Intelligent Systems, Volume 26, Number 5, Pages 87-90, September/October, 2011.
  17. H. Chen, “Smart Market and Money,” IEEE Intelligent Systems, Volume 26, Number 6, Pages 82-84, November/December, 2011.
  18. H. Chen, E. C. Huang, H. Lu, and S. Li, “AZ SmartStock: Stock Prediction with Targeted Sentiment and Life Support,” IEEE Intelligent Systems, Volume 26, Number 6, Pages 84-88, November/December, 2011.
  19. D. Zimbra and H. Chen, “A Stakeholder Approach to Stock Prediction using Finance Social Media,” IEEE Intelligent Systems, Volume 26, Number 6, Pages 88-92, November/December, 2011.
  20. S. Kaza, P. J. Hu, H. Hu, and H. Chen, “Designing, Implementing, and Evaluating Information Systems for Law Enforcement: A Long-term Design Science Research Program,” Communications of the AIS, Volume 29, Article 28, 2011.

2010

  1. P. Hu, F. M. Hsu, and H. Chen, “Examining Agencies’ Satisfaction with Electronic Record Management Systems: A Large-scale Survey Study,” Journal of the American Society for Information Science and Technology, forthcoming, 2010.
  2. N. Memon, J. Xu, D. Hicks, and H. Chen, “Social Network Data Mining: Research Questions, Techniques, and Applications,” Annals of Information Systems, Volume 12, Pages 1-8, 2010.
  3. S. Kaza and H. Chen, “Identifying High-Status Nodes in Knowledge Networks,” Annals of Information Systems, Volume 12, Pages 91-108, 2010.
  4. Y. Dang, Y, Zhang, and H. Chen, “A Lexicon Enhanced Method for Sentiment Classification: An Experiment on Online Product Reviews,” IEEE Intelligent Systems, Volume 25, Number 4, Pages 46-53, 2010.
  5. B. Zhu, S. Watts, and H. Chen, “Visualizing Social Network Concepts,” Decision Support Systems, Volume 49, Number 2. Pages 151-161, 2010.
  6. Y. Dang, Y. Zhang, L. Fan, H. Chen, and M. C. Roco, “Trends in Worldwide Nanotechnology Patent Applications: 1991 to 2008,” Journal of Nanoparticle Research, Volume 12, Number 3, Pages 687-706, 2010.
  7. R. Schumaker and H. Chen, “Interaction Analysis of the ALICE Chatterbot: A Two-Study Investigation of Dialog and Domain Questioning,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 40, Number 1, Pages 40-51, 2010.
  8. M. Chau, C. Wong, Y. Zhou, J. Qin, and H. Chen, “Evaluating the Use of Search Engine Development Tools  in IT Education,” Journal of the American Society for Information Science and Technology, Volume 61, Number 2, Pages 288-299, 2010.
  9. H. Chen, "Business and Market Intelligence 2.0," IEEE Intelligent Systems, Volume 25, Number 1, Pages 68-71, January/February, 2010.
  10. Y. Liu, Y. Chen, R. F. Lusch, H. Chen, D. Zimbra, and S. Zeng, “User-Generated Content on Social Media: Predicting Market Success with Online Word-of-Mouth,” IEEE Intelligent Systems, Volume 25, Number 1, Pages 75-78, January/February, 2010.
  11. H. Lu, H. Chen, T. Chen, M. Hung, and S. Li, “Financial Text Mining: Supporting Decision Making Using Web 2.0 Content,” IEEE Intelligent Systems, Volume 26, Number 2, Pages 78-82, January/February, 2010.
  12. H. Lu, D. Zeng, and H. Chen, "Prospective Infectious Disease Outbreak Detection Using Markov Switching Models," IEEE Transactions on Knowledge and Data Engineering, Volume 22, Issue 4, Pages 565 - 577, April 2010.
  13. A. Sun, D. Zeng, and H. Chen, “Burst Detection from Multiple Data Streams: A Network Based Approach,” IEEE Transactions on Systems, Man, and Cybernetics, Part C, Volume 40, Number 3, Pages 258-267, 2010.
  14. C. Huang, T. J. Fu, and H. Chen, “Text-based Video Content Classification for Online Video-Sharing Sites,” Journal of the American Society for Information Science and Technology, Volume 61, Number 5, Pages 891-906, 2010.
  15. T.J. Fu, A. Abbasi, and H. Chen. "A Focused Crawler for Dark Web Forums," Journal of the American Society for Information Science and Technology, Volume 61, Number 6, Pages 1213-1231, June 2010.
  16. H. Chen and D. Zimbra, “AI and Opinion Mining,” IEEE Intelligent Systems, Volume 25, Number 3, Pages 74-76, May/June, 2010.
  17. A. Abbasi, Z. Zhang, D. Zimbra, H. Chen, and J. F. Nunamaker, “Detecting Fake Websites: The Contribution of Statistical Learning Theory,” MIS Quarterly, Volume 34, Number 3, Pages 435-461, September 2010. [Winner, MISQ Best Paper, 2010.]
  18. N. Memon, J. Xu, D. Hicks, and H. Chen, “Social Network Data Mining: Research Questions, Techniques, and Applications,” Annals of Information Systems, Volume 12, Pages 1-8, 2010.
  19. S. Kaza and H. Chen, “Identifying High-Status Nodes in Knowledge Networks,” Annals of Information Systems, Volume 12, Pages 91-108, 2010.
  20. H. Lu, H. Chen, T. Chen, M. Hung, and S. Li, “Financial Text Mining: Supporting Decision Making Using Web 2.0 Content,” IEEE Intelligent Systems, Volume 26, Number 2, Pages 78-82, January/February, 2010.
  21. D. Zimbra, A. Abbasi, and H. Chen, "A Cyber-Archaeology Approach to Social Movement Research: Framework and Case Study," Journal of Computer-Mediated Communication,Volume 16, Number 1, Pages 48-70, November 2010. Figures and tables available here.  

2009

  1. H. Chen, Y Zhang, and Y. Dang, “Intelligence and Security Informatics,” Encyclopedia of Library and Information Sciences, 3rd ed., 2009.
  2. H. Chen and D. Zeng, "AI for Global Disease Surveillance," IEEE Intelligent Systems, Volume 24, Number 6, Pages 66-69, November/December, 2009.
  3. H. Chen, X. Li, M. Chau, Y. Ho, and C. Tseng "Using Open Web APIs in Teaching Web Mining," IEEE Transactions on Education, Volume 52, Number 4, Pages 482-490, 2009.
  4. H. Chen, "AI, E-Government, and Politics 2.0," IEEE Intelligent Systems, Volume 24, Number 5, Pages 64-67, September/October, 2009.
  5. H. Chen, "AI and Global Science and Technology Assessment," IEEE Intelligent Systems, Volume 24, Number 4, Pages 68-71, July/August, 2009.
  6. X. Li, H. Chen, Z. Zhang, J. Li, and J.F. Nunamaker Jr., "Managing Knowledge in Light of Its Evolution Process: An Empirical Study on Citation Network-Based Patent Classification," Journal of Management Information Systems (JMIS), Volume 26, Number. 1 (2009), Pages 129-153.
  7. Y. Dang, H. Chen, Y. Zhang, M. Roco, "Knowledge Sharing and Diffusion Patterns: International Patent and Patent Family Analysis," IEEE Nanotechnology Magazine, Volume 3, Number 3, Pages 16-21, September 2009.
  8. Y. Dang, Y. Zhang, H. Chen, P. Hu, S. Brown and C. Larson, "Arizona Literature Mapper: An Integrated Approach to Monitor and Analyze Global Bioterrorism Research Literature," Journal of the American Society for Information Science and Technology, Volume 60, Number 7, Pages 1466-1485, July 2009.
  9. A. M. Perez, D. Zeng, C. Tseng, H. Chen, Z. Whedbee, D. Paton, and M. C. Thurmond, "A Web-based System for Near Real-time Surveillance and Space-time Cluster Analysis of Foot-and-mouth Disease and Other Animal Diseases," Preventive Veterinary Medicine, 2009.
  10. R. Schumaker and H. Chen,"Textual Analysis of Stock Market Prediction Using Breaking Financial News: The AZFinText System," ACM Transactions on Information Systems, Volume 27, Number 2, April 2009.
  11. D. Hu, S. Kaza, and H. Chen, "Identifying Significant Facilitators of Dark Network Evolution," Journal of the American Society for Information Science and Technology, Volume 60, Number 4, Pages 655-665, April 2009.
  12. S. Kaza, J. Xu, B. Marshall, and H. Chen, "Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security," IEEE Transactions on Intelligent Transformation Systems, Volume 10, No. 1, March 2009.
  13. W. Chung, H. Chen, and E. Reid, "Business Stakeholder Analyzer: An Experiment of Classifying Stakeholders on the Web," Journal of the American Society for Information Science and Technology, Volume 60, Number 1, Pages 59-74, January 2009.
  14. W. Chung and H. Chen, "Browsing the Underdeveloped Web: An Experiment on the Arabic Medical Web Directory," Journal of the American Society for Information Science and Technology, Volume 60, Number 3, Pages 595-607, January 2009.  

2008

  1. X. Yang, C. Wei, and H. Chen, "Introduction to the Special Issue on Multilingual Knowledge Management," Decision Support Systems, Volume 45, Number 3, Pages 551-553, June 2008.
  2. D. Zeng, H. Chen, F. Wang, and H. Kargupta, "Special Section on Intelligence and Security Informatics," IEEE Transactions on Knowledge and Data Engineering, Volume 20, Number 8, Pages 1009-1012, 2008.
  3. H.-M. Lu, D. Zeng, L. Trujillo, K. Komatsu, and H. Chen, "Ontology-enhanced Automatic Chief Complaint Classification for Syndromic Surveillance," Journal of Biomedical Informatics, Volume 4, Issue 2, Pages 340-356, April 2008.
  4. W. Chung, G. Lai, A. Bonillas, W. Xi, and H. Chen "Organizing Domain-specific information on the Web: An Experiment on the Spanish Business Web Directory," International Journal of Human-Computer Studies, Volume 66, Number 2, Pages 51-66, 2008.
  5. X. Li, D. Hu, Y. Dang, H. Chen, M. C. Roco, C. A. Larson, and J. Chan, "Nano Mapper: An Internet Knowledge Mapping System for Nanotechnology Development," Journal of Nanoparticle Research, Volume 10, 2008.
  6. Marshall, B., Chen, H., Kaza, S., "Using Importance Flooding to Identify Interesting Networks of Criminal Activity," Journal of the American Society for Information Science and Technology, Volume 59, Issue 13, Pages 2099-2114, November 2008.
  7. A. Kaza, and H. Chen, "Evaluating Ontology Mapping Technologies: An Experiment in Public Safety Information Sharing," Decision Support Systems, Vol. 45, No. 4, Pages 714-728, Nov. 2008.
  8. J. Xu and H. Chen, "The Topology of Dark Networks," Communications of the ACM, Volume 51, No. 10, Pages 58-65, Oct. 2008.
  9. X. Li, H. Chen, Y. Dang, Y. Lin, C. Larson, M. C. Roco, "A longitudinal analysis of nanotechnology literature: 1976-2004," Journal of Nanoparticle Research, Volume 10, Pages 3-22, 2008.
  10. A. Abbasi, H. Chen, S. Thoms, T. Fu, "Affect Analysis of Web Forums and Blogs Using Correlation Ensembles," IEEE Transactions on Knowledge and Data Engineering, Volume 20, Number 9, Pages 1168-1180, September 2008.
  11. H. Chen, W. Chung, J. Qin, E. Reid, M. Sageman, and G. Weinmann, "Uncovering the Dark Web: A Case Study of Jihad on the Web," Journal of the American Society for Information Science and Technology, Volume 59, Number 8, Pages 1347-1359, 2008.
  12. Abbasi, A., Chen, H. and Salem A., "Sentiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums." ACM Transactions on Information Systems, Vol. 26, No. 3, Article 12, June 2008.
  13. Y. Zhou, F. Huang, and H. Chen, "Combining Probability Models and Web Mining Models: A Framework for Proper Name Transliteration," Information Technology and Management, Vol. 9, No. 2, Pages 91-103, June 2008.
  14. Fu, T., Abbasi, A. and Chen, H., "A Hybrid Approach to Web Forum Interactional Coherence Analysis," Journal of the American Society for Information Science and Technology (JASIST), Vol. 59, No. 8, 2008.
  15. Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., and Weimann, G., "Uncovering the Dark Web: A Case Study of Jihad on the Web," Journal of the American Society for Information Science and Technology (JASIST), Vol. 59, No. 8, 2008.
  16. Chen, H., Roco, M., Li, X., and Lin, Y., "Trends in Nanotechnology Patents," Nature Nanotechnology, Vol.3, March 2008.
  17. Abbasi, A. and Chen, H., "Writeprints: A Stylometric Approach to Identity- Level Identification and Similarity Detection in Cyberspace," ACM Transactions on Information Systems, Vol. 26, No. 2, Article 7, March 2008 (29 pgs).
  18. A. Abbasi, H. Chen, J. F. Nunamaker Jr., "Stylometric Identification in Electronic Markets: Scalability and Robustness," Journal of Management Information Systems (JMIS), Vol. 25, No. 1, (2008), pgs. 49-78.
  19. A. Abbasi, and H. Chen, "CyberGate: A System and Design Frame-work for Text Analysis of Computer Mediated Communication," MIS Quarterly (MISQ), Vol. 32 No. 4 (December 2008, Special Issue on Design Science Research), pgs. 811-837.
  20. R. Schumaker and H. Chen, " Evaluating a News-Aware Quantitative Trader: the Effect of Momemtum and Contrarian Stock Selection Strategies," Journal of the American Society for Information Science and technology, 59(2), Pages 247-255, January 2008.
  21. Li, J., Zhang Z.,Li, X., Chen, H., "Kernel-based learning for Biomedical Relation Extraction," Journal of the American Society for Information Science and Technology, 59(5), 756-769, 2008.
  22. M. Chau and H. Chen, "A Machine Learning Approach to Web Page Filtering using Web Content and Web Structure Analysis," Decision Support Systems, Volume 44, Number 2, Pages 482-494, 2008.
  23. M. Chau, J. Qin, Y. Zhou, C. Tseng, and H. Chen, "SpidersRUs: Creating Specialized Search Engines in Multiple Languages," Decision Support Systems, Volume 45, Number 3, Pages 621-640, 2008.  

2007

  1. G. Leroy, J. Xu, W. Chung, S. Eggers, H. Chen, "An End User Evaluation of Query Formulation and Results Tools in Three Meta-search Engines," International Journal of Medical Informatics, Vol. 76, Nos. 11-12, Pages 780-789, Nov.-Dec. 2007.
  2. P. Yan, H. Chen and D. Zeng, "Syndromic Surveillance Systems," Annual Review of Information Science and Technology (ARIST), Volume 41, Pages 425-495, 2007.
  3. D. Hu, H. Chen, and M. C. Roco, "Longitudinal Study on Patent Citations to Academic Research Articles in Nanotechnology," Journal of Nanoparticle Research, Volume 9, Pages 529-542, 2007.
  4. R. Schumaker, Y Liu, M. Ginsberg, and H. Chen, "Evaluating the Efficacy of a Question Answer System," Communications of the ACM, Volume 50, Number 6, Pages 74-80, July 2007.
  5. Hu, P., Zeng, D., Larson, C., Chang, W., Tseng, L., Ma, J., and Chen, H., "System for Infectious Disease Information Sharing and Analysis: Design and Evaluation," IEEE Transactions on Information Technology In Biomedicine, Volume 11, No. 4, 2007, pages 483-492.
  6. Chau, M., Chen, H., "Incorporating Web Analysis Into Neural Networks: An Example in Hopfield Net Searching," IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews, Vol. 37, No.3, May 2007, Pages 352-358.
  7. Chau, M., Schroeder, J., Xu, J., Chen, H., "Automated Criminal Link Analysis Based on Domain Knowledge," Journal of the American Society for Information Science and Technology, Volume 58, Number 6, Pages 842-855, 2007.
  8. Chau, M., Shiu, B., Chan, I., Chen, H., "Redips: Backlink Search and Analysis on the Web for Business Intelligence Analysis," Journal of the American Society for Information Science and Technology, Vol. 58, No. 3, Pages 351-365, Feb. 2007.
  9. Qin, J., Zhou, Y., Reid, E.,Lai, G., Chen, H., "Analyzing Terror Campaigns on the Internet: Technical Sophistication, Content Richness, and Web Interactivity," International Journal of Human-Computer Studies, Volume 65, Pages 71-84, 2007.
  10. Quiñones, K., Su, H., Marshall, B., Eggers, S., and Chen, H., "User-centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System," IEEE Transactions on Information Technologies in Biomedicine, Volume 11, Number 5, Sep 2007, Pages 527-536.
  11. Reid, E., Chen, H., "Mapping the Contemporary Terrorism Research Domain," International Journal of Human-Computer Studies, Volume 65, Pages 42-56, 2007.
  12. Z. Huang, D. Zeng, and H. Chen, "A Comparative Study of Recommendation Algorithms in E-Commerce Applications," IEEE Intelligent Systems, Volume 22, Number 5, Pages 68-78, 2007.
  13. R. Schumaker, M. Ginsburg, H. Chen, and Y. Liu, "An Evaluation of the Chat and Knowledge Discovery Components of a Low-Level Dialog System: The AZ-ALICE Experiment," Decision Support Systems, Volume 42, Number 4, Pages 2236-2246, 2007.
  14. R. Schumaker and H. Chen, "Leveraging Question Answer Technology to Address Terrorism Inquiry," Decision Support Systems, Volume 43, Number 4, Pages 1419-1430, 2007.
  15. Z. Huang, D. Zeng, and H. Chen, "Analyzing Consumer-Product Graphs: Empirical Findings and Applications in Recommendation Systems," Management Science, Volume 53, Number 7, Pages 1146-1164, July 2007.
  16. Z. Huang, J. Li, H. Su, G. S. Watts, and H. Chen, "Large-scale Regulatory Network Analysis from Microarray Data: Modified Bayesian Network Learning and Association Rule Mining," Decision Support Systems, Volume 43, Number 4, Pages 1207-1225, 2007.
  17. R. Schumaker, Y. Liu, M. Ginsburg, and H. Chen, "Evaluating Mass Knowledge Acquisition using the ALICE Chatterbot: The AZ-ALICE Dialog System," International Journal of Human-Computer Studies, Volume 64, Number 11, Pages 1132-1140, 2007.
  18. S. Kaza, Y. Wang, and H. Chen, "Enhancing Border Security: Mutual Information Analysis to Identify Suspect Vehicles," Decision Support Systems, Volume 43, Number 1, Pages 199-210, 2007.
  19. J. Li, H. Su, H. Chen, and B. W. Futscher, "Optimal Search-Based Gene Subset Selection for Gene Array Cancer Classification," IEEE Transactions on Information Technology in Biomedicine, Volume 11, Number 4, Pages 398-405, 2007.
  20. X. Li, H. Chen, Z. Huang, H. Su, and J. Martinez, "Global Mapping of Gene/Protein Interactions in PubMed Abstracts: A Framework and an Experiment with P53 Interactions," Journal of Biomedical Informatics (JBI), Volume 40, Number 5, Pages 453-464, 2007.
  21. E. Reid and H. Chen, "Internet-savvy U.S. and Middle Eastern Extremist Groups," Mobilization: An International Quarterly Review, Volume 12, Number 2, Pages 177-192, 2007.
  22. G. Leroy and H. Chen, "Decision Support in Medicine," Decision Support Systems, Volume 43, Number 4, Pages 1203-1206, 2007.
  23. T. S. Raghu and H. Chen, "Cyberinfrastructure for Homeland Security: Advances in Information Sharing, Data Mining, and Collaboration Systems," Decision Support Systems, Volume 43, Number 4, Pages 1321-1323, 2007.  

2006

  1. Reid, E., and Chen, H., "Extremist Social Movements Groups and Their Online Digital Libraries," Information Outlook, Volume 10, Number 6, Pages 57-65, June 2006.
  2. Chen, H., Xu, J., "Intelligence and Security Informatics for National Security: A Knowledge Discovery Perspective," Annual Review of Information Science and Technology (ARIST), Volume 40, Pages 229-289, 2006. Marshall, B., Chen, H., Shen,
  3. R., and Fox, E. A., "Moving Digital Libraries into the Student Learning Space: the GetSmart Experience," ACM JERIC -- Journal on Educational Resources in Computing, Volume 6, Number 1, Article Number 2, March 2006.
  4. Li, J., Zheng, R., Chen, H., "From Fingerprint to Writeprint," Communications of the ACM: Volume 49, Number 4, Pages 76-82, April 2006
  5. Li, J., Li, X., Chen, H., and Galbraith, D., A Framework of Integrating Gene Relations from Heterogeneous Data Sources: An Experiment on Arabidopsis thaliana," Bioinfomatics, Volume 22, Number 16, Pages 2037-2043, 2006.
  6. Chen, H., "Intelligence and Security Informatics: Information Systems Perspective," Decision Support Systems: Special Issue on Intelligence and Security Informatics Volume 41, Issue 3, Pages 555-559, March 2006.
  7. Zhao, J., Bi, H., Chen, H., Zeng, D., Lin C., and Chau, M. L., "Process-Driven Collaboration Support for Intra-Agency Crime Analysis," Decision Support Systems: Special Issue on Intelligence and Security Informatics Volume 41, Issue 3, Pages 616-633, March 2006.
  8. Chung, W., Chen H., Cheng, W., and Chou, S., "Fighting Cybercrime: a Review and the Taiwan Experience," Decision Support Systems: Special Issue on Intelligence and Security Informatics, Volume 41, Issue 3, Pages 669-682, March 2006.
  9. Zheng, R., Li, J., Chen, H. and Z. Huang, "A Framework for Authorship Identification of Online Messages: Writing-Style Features and Classification Techniques" Journal of the American Society for Information Science and Technology, Volume 57, Number 3, Pages378-393, 2006
  10. McDonald, D. M., Chen, H., "Summary in Context: Searching Versus Browsing," Transactions on Information Systems, Volume 24, No. 1, January 2006, Pages 111-141
  11. Chen, H. and Xu, J. "Intelligence and Security Informatics," Annual Review of Information Science and Technology, Vol. 40, 2006, Pages 229-289
  12. Zhou, Y., Reid, E., Qin, J., Chen, H. and Lai, G., "US Domestic Extremist Groups on the Web:Link and Content Analysis," IEEE Intelligent Systems, Vol. 20, Issue 5, 2005, pp. 44-51
  13. Marshall, B.,Su, H., Mcdonald, D., Eggers, S., and Chen, H., "Aggregating Automatically Extracted Regulatory Pathway Relations," IEEE Transactions on Information Technology in Biomedicine, Volume 10, Number 1, Pages 100-108, Jan 2006.
  14. Y. Zhou, J. Qin and H. Chen, "CMedPort: An Integrated Approach to Facilitating Chinese Medical Information Seeking," Decision Support Systems, Volume 42, Number 3, Pages 1431-1448, 2006.  

2005

  1. Chen, H. and Wang, F., "Artificial Intelligence for Homeland Security," IEEE Intelligent Systems: Special issue on AI for Homeland Security, Volume 20, Number 5, Pages 12-16, 2005.
  2. Huang, Z., Chen, H., Yan, L., and Roco, M., "Longitudinal nanotechnology development (1991-2002: National Science Foundation funding and its impact on patents," Journal of Nanoparticle Research, Volume 7, Pages 343-376, 2005.
  3. Chen, H., "Applying Authorship Analysis to Extremist-Group Web Forum Messages," IEEE Intelligent Systems: special issue on AI for Homeland Security, Volume 20, Number 5, Pages 67-75, 2005.
  4. Xianga, Y.,*, Chaub, M., Atabakhsha, H., Chen, H., "Visualizing Criminal Relationships: Comparison of a Hyperbolic Tree and a Hierarchical List" Decision Support Systems, Volume 41, Number 1, Pages 69–83, 2005.
  5. Xu, Jennifer J., Chen, H.,"Criminal Network Analysis and Visualization," Communications of the ACM, Volume 48, Number 6, Pages 101-107 June 2005.
  6. Zhang, P., Sun, J., Chen, H., "Frame-based Argumentation for Group Decision Task Generation and Identification." Decision Support Systems (DSS), Volume 39, number 4, pages 643-659, June 2005.
  7. Ong, T., Chen, H., Sung, W., Zhu, B., "Newsmap: A Knowledge Map for Online News," Decision Support Systems (DSS), volume 39, number 4, pages 583-598, June 2005.
  8. Xu, J., Chen, H., "CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery," ACM Transactions on Information Systems, Volume 23, Number 2, Pages 201–226, April 2005.
  9. Chung, W., Chen, H., Nunamaker, J., "A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration," Journal of Management Information Systems, vol. 21, No. 4 ,57-84 (Spring 2005).
  10. Leroy, G., and Chen, H., "Genescene: An Ontology-Enhanced Integration of Linguistic and Co-Occurrence Based Relations in Biomedical Texts," Journal of The American Society for Information Science and Technology (JASIST) Volume 56 Number 5, 457-468, 2005.
  11. Chen, H., "Introduction to the Special Topic Issue: Intelligence and Security Informatics," Journal of The American Society for Information Science and Technology (JASIST) Vol. 56 No.3, 217-220, (2005).
  12. Hu, P., Lin, C., and Chen, H., "User Acceptance of Intelligence and Security Informatics Technology: A Study of COPLINK," Journal of The American Society for Information Science and Technology (JASIST) Volume 56 Number 3, Pages 235-244, 2005.
  13. Chung, W., Chen, H., Chaboya, L. G., O'Toole, C., and Atabakhsh, H., "Evaluating Event Visualization: A Usability Study of COPLINK Spatio-Temporal Visualizer," International Journal of Human-Computer Studies, Volume 62, Number 1, Pages 127-157, 2005.
  14. Chen, H., "Intelligence and Security Informatics," Journal of the American Society for Information Science and Technology, Volume 56, Number 3, Pages 217-220, 2005.
  15. Zhu, B., and Chen, H., "Information Visualization," Annual Review of Information Science and Technology (ARIST), Volume 39, Pages 139-178, 2005.
  16. Zhu, B., and Chen, H., "Using 3D Interfaces to Deliver Knowledge from a Multimedia Knowledge Repository," Decisions Support Systems, Volume 40, Number 2, Pages 167-182, August 2005.  

2004

  1. Lim, E., Chen, H., Neuhold, E. J., Sugimoto, S., and Li, J., "Introduction to the Journal on Digital Libraries, special issue on Asian digital libraries," International Journal on Digital Libraries, Volume 4, Number 4, Pages 245-246, 2004.
  2. Chen, H., Chau, M., "Web Mining: Machine Learning for Web Applications," Annual Review of Information Science and Technology (ARIST), 38, 289-329, 2004.
  3. McDonald, D. M., Chen, H., Su, H., and Marshall, B. B., "Extracting Gene Pathway Relations Using a Hybrid Grammar: The Arizona Relation Parser" Bioinformatics, Volume 20, Number 18, Pages 3370-3378, 2004.
  4. Huang, Z., Chen, H., Hsu, C.-J., Chen, W.-H., Wu, S., "Credit Rating Analysis with Support Vector Machines and Neural Networks: A Market Comparative Study," Decision Support Systems (DSS), 37(4), 543-558, (2004).
  5. Huang, Z., Chen, H., Chen, Z., and Roco, M. C., "International Nanotechnology Development in 2003: Country, Institution, and Technology Field Analysis Based on USPTO Patent Database," Journal of Nanoparticle Research (JNR), Volume 6, Number 4, Pages 325-354, 2004.
  6. Zeng, D., Chen, H., Tseng, C., Larson, C., Eidson, M., Gotham, I., Lynch, C., and Ascher, M. (2004). ''West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics,'' in Intelligence and Security Informatics, Proceedings of ISI-2004, Lecture Notes in Computer Science, Vol. 3073, Chen, H., Moore, R., Zeng, D., and Leavitt, J. (eds), Springer
  7. Xu, J., and Chen, H., "Fighting Organized Crime: Using Shortest-Path Algorithms to Identify Associations in Criminal Networks." Decision Support Systems, Volume 38, Number 3, Pages 473-488, 2004.
  8. Marshall, B., McDonald, D., Chen, H., and Chung, Wingyan, "EBizPort: Collecting and Analyzing Business Intelligence Information" Journal of the American Society for Information Science and Technology (JASIST), Special Issue on Document Search Interface Design for Large-scale Collections and Intelligent Access, (2004), Volume 55, Issue 10, (2004), 873-891
  9. Chung, W., Zhang, Y., Huang, Z., Wang, Z., Ong, T., and Chen, H.,"Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort)" Journal of the American Society for Information Science and Technology (JASIST), Special Issue on Information Seeking, Volume 55, Issue 9, (2004), 818-831
  10. Wang, G., Chen, H., and Atabakhsh, H., " Automatically Detecting Deceptive Criminal Identities" Communications of the ACM, March 2004/Vol. 47, No. 3, Pages 71-76.
  11. Huang, Z., Chen, H., and Zeng, D., " Applying Associative Retrieval Techniques to Alleviate the Sparsity Problem in Collaborative Filtering," ACM Transactions on Information Systems, Vol. 22, No. 1, January 2004, Pages 116–142.
  12. Huang, Z., Chung, W., and Chen, H., " A Graph Model for E-Commerce Recommender Systems," Journal of the American Society for Information Science and Technology, page 260-274, (2004)
  13. Chen, H., Wang, F. Y., and Zeng, D., "Intelligence and Security Informatics for Homeland Security: Information, Communication, and Transportation," IEEE Transactions on Intelligent Transportation Systems, Volume 5, Number 4, Pages 329-341, 2004.

2003

  1. M. Chau, Z. Huang, H. Chen, "Teaching Key Topics in Computer Science and Information Systems through a Web Search Engine Project," ACM Journal on Educational Resources in Computing (JERIC), Volume 3, Issue 3, Pages 1-14, 2003.
  2. Z. Huang, H. Chen, A. Yip, G. Ng, F. Guo, Z.-K. Chen and M. C. Roco, "Longitudinal Patent Analysis for Nanoscale Science and Engineering: Country, Institution and Technology Field," Journal of Nanoparticle Research (JNR), Volume 5, Pages 333-363, 2003.
  3. Hsinchun Chen, Haiyan Fan, Michael Chau, Daniel Zeng “Testing a Cancer Meta Spider,” International Journal of Human-computer Studies, 2003.
  4. G. Leroy, H. Chen, and J.D. Martinez “A Shallow Parser Based on Closed-class Words to Capture Relations in Biomedical Text,” Journal of Biomedical Informatics (JBI), Volume 36, Pages145-158, June 2003.
  5. G. Leroy, A.M. Lally, and H. Chen “The Use of Dynamic Contexts to Improve Casual Internet Searching,” ACM-TOIS, Volume 21, Issue 3, Pages 229 - 253,July 2003.
  6. M. Chau and H. Chen, “Comparison of Three Vertical Search Spiders,” Computer, Volume 36, Number 5, Pages 56-62,May 2003.
  7. H. Chen, “Introduction to the JASIST Special Topic Section on Web Retrieval and Mining: A Machine Learning Perspective,” Journal of the American Society for Information Science and Technology (JASIST), Volume 54, Issue 7, Pages 621-624,May 2003.
  8. N. Romano, C. Donovan, H. Chen, J. Nunamaker, “A Methodology for Analyzing Web-Based Qualitative Data,” Journal of Management Information Systems (JMIS), Volume 19, Number 4, Pages 213-246,Spring 2003.
  9. H. Chen, “Introduction to the Special Issue: "Web Retrieval and Mining,” Decision Support Systems (DSS), Volume 35, Number 1, Pages 1-5,April 2003.
  10. C. Yang, H. Chen and K. Hong “Visualization of large category map for Internet browsing,” Decision Support Systems (DSS), Volume 35, Number 1, Pages 89-102,April 2003.
  11. M. Chau, D. Zeng, H. Chen, M. Huang and D. Hendriawan “Design and evaluation of a multi-agent collaborative Web mining system,” Decision Support Systems (DSS), Volume 35, Number 1, Pages 167-183,April 2003.

2002

  1. R. V. Hauck, H. Atabakhsh, P. Ongvasith, H. Gupta, and H. Chen, “Using Coplink to Analyze Criminal-Justice Data,” IEEE Computer, Volume 35, Number 3, Pages 30-37, 2002.
  2. D. G. Roussinov and H. Chen, “Information Navigation on the Web by Clustering and Summarizing Query Results,” Information Processing and Management, Volume 37, Number 6, Pages 789-816, 2002.
  3. H. Chen, M. C. Chau, and D. Zeng, “CI Spider: A Tool for Competitive Intelligence on the Web,” Decision Support Systems, Volume 34, Number 1, Pages 1-17, December, 2002.

2001

  1. H. Chen, D. Roussinov, “Information Navigation on the Web by Clustering and Summarizing Query Results,” Information Processing and Management, Volume 37, Number 6, Pages 789-816, 2001.
  2. H. Chen, H. Fan, M. Chau and D. Zeng, “MetaSpider: Meta-Searching and Categorization on the Web,” Journal of the American Society for Information Science and Technology, Volume 52, Number 13, Pages 1134-1147, 2001.
  3. R. Hauck, R. Sewell, D.T. Ng, H. Chen, “Concept-based searching and browsing: a geoscience experiment ,” Journal of Information Science, Volume 27, Number 4, Pages 199-210, 2001.
  4. G. Leroy and H. Chen, "Meeting Medical Terminology Needs-The Ontology-Enhanced Medical Concept Mapper," IEEE Transactions on Information Technology in Biomedicine, Volume 5, Number 4, December 2001.  

2000

  1. B. Zhu, M. Ramsey and H. Chen, “Creating a Large-scale Content-based Airphoto Image Digital Library,” IEEE Transactions on Image Processing, Special Issue on Image and Video Processing for Digital Libraries, Volume 9, Number 1, Pages 163-167, January, 2000.
  2. K. Tolle and H. Chen, “Comparing Noun Phrasing Techniques for Use with Medical Digital Library Tools,” Journal of the American Society for Information Science, Special Issue on Digital Libraries, Volume 51, Number 4, Pages 352-370, 2000.
  3. B. Zhu and H. Chen, “Validating a Geographic Image Retrieval System,” Journal of the American Society for Information Science, Volume 51, Number 7, Pages 625-634, 2000.C. Lin, H. Chen and J. F. Nunamaker, “Verifying the Proximity Hypothesis for Self-Organizing Maps,” Journal of Management Information Systems, Volume 16, Number 3, Pages 57-70, 2000.
  4. A.L. Houston, H. Chen, B. R. Schatz, R. R. Sewell, K. M. Tolle, T. E. Doszkocs, S. M. Hubbard and D. T. Ng, “Exploring the Use of Concept Spaces to Improve Medical Information Retrieval,” Decision Support Systems, Special Issue on Decision Support for Health Care in a New Information Age, Volume 30, Number 2, Pages 171-186, 2000.
  5. K. M. Tolle, H. Chen and H. Chow, “Estimating drug/plasma concentration levels by applying neural networks to pharmacokinetic data sets,” Decision Support Systems, Special Issue on Decision Support for Health Care in a New Information Age, Volume 30, Number 2, Pages 139-152, 2000.
  6. G. Leroy, K. M. Tolle and H. Chen, “Customizable and Ontology-Enhanced Medical Information Retrieval Interfaces,” Methods of Information in Medicine, 2000.
  7. C. C. Yang, J. Yen and H. Chen, “Intelligent Internet Searching Engine based on Hybrid Simulated Annealing,” Decision Support Systems, 2000.
  8. N. C. Romano, C. Bauer, H. Chen and J. F. Nunamaker, “Quantifying Qualitative Data for Electronic Commerce Attitude Assessment and Visualization,” Journal of Management Information Systems, 2000.

1999

  1. B. R. Schatz, W. Mischo, T. Cole, A. Bishop, S. Harum, E. Johnson, L. Neumann, H. Chen, D. T. Ng, "Federated Search of Scientific Literature," IEEE Computer, Special Issue on Digital Libraries, Volume 32, Number 2, Pages 51-59, February 1999.
  2. B. R. Schatz and H. Chen, "Digital Libraries: Technological Advances and Social Impacts," IEEE Computer, Special Issue on Digital Libraries, Volume 32, Number 2, Pages 45-50, February 1999.
  3. B. Zhu, M. Ramsey, T. D. Ng, H. Chen and B. R. Schatz, "Creating a Large-Scale Digital Library for Georeferenced Information," D-Lib Magazine, Volume 5, Number 7/8, July/August 1999.
  4. H. Chen, "Semantic Research for Digital Libraries," D-Lib Magazine, Volume 5, Number 10/11, October/November 1999.
  5. H. Chen and A. Houston, "Digital Libraries: Social Issues and Technological Advances," in Advances in Computers, Edited by M. Zelkowitz, Volume 48, Pages 257-314, 1999.
  6. M. Ramsey, H. Chen, B. Zhu and B. R. Schatz, "A Collection of Visual Thesauri for Browsing Large Collections of Geographic Images," Journal of the American Society for Information Science, Volume 50, Number 9, pages 826-834, 1999.
  7. H. Chen, "From Information Retrieval to Knowledge Management: Enabling Technologies and Best Practices," Decision Support Systems, Volume 27, Number 1-2, Pages 1-4, November 1999.
  8. D. Roussinov and H. Chen, "Document Clustering for Electronic Meetings: An Experimental Comparison of Two Techniques," Decision Support Systems, Volume 27, Number 1-2, Pages 67-80, November 1999.
  9. M. McQuaid, T. Ong, H. Chen and J. F. Nunamaker, "Multidimensional Scaling for Group Memory Visualization," Decision Support Systems, Volume 27, Number 1-2, Pages 163-176, November 1999.
  10. A.L. Houston, H. Chen, S. M. Hubbard, B. R. Schatz, T. D. Ng, R. R. Sewell and K. M. Tolle, "Medical Data Mining on the Internet: Research on a Cancer Information System," Artificial Intelligence Review, Volume 13, Pages 437-466, 1999.

1998

  1. H. Chen, G. Shankaranarayanan, A. Iyer, and L. She, "A Machine Learning Approach to Inductive Query by Examples: An Experiment Using Relevance Feedback, ID3, Genetic Algorithms, and Simulated Annealing," Journal of the American Society for Information Science, Volume 49, Number 8, Pages 693-705, June 1998.
  2. H. Chen, J. Martinez, A. Kirchhoff, T. D. Ng, and B. R. Schatz, "Alleviating Search Uncertainty Through Concept Associations: Automatic Indexing, Co-occurrence Analysis, and Parallel Computing," Journal of the American Society for Information Science, Special Issue on "Management of Imprecision and Uncertainty in Information Retrieval and Database Management Systems," Volume 49, Number 3, Pages 206-216, 1998.
  3. H. Chen, "Artificial Intelligence Techniques for Emerging Information Systems Applications: Trailblazing Path to Semantic Interoperability," Journal of the American Society for Information Science, Volume 49, Number 7, Pages 579-581, 1998.
  4. H. Chen, A. L. Houston, R. R. Sewell and B. R. Schatz, "Internet Browsing and Searching: User Evaluation of Category Map and Concept Space Techniques," Journal of the American Society for Information Science, Special Issue on AI Techniques for Emerging Information Systems Applications, Volume 49, Number 7, Pages 582-603, 1998.
  5. H. Chen, Y. Chung, M. Ramsey, and C. Yang, "A Smart Itsy Bitsy Spider for the Web," Journal of the American Society for Information Science, Special Issue on AI Techniques for Emerging Information Systems Applications, Volume 49, Number 7, Pages 604-618, 1998.
  6. D. Roussinov and H. Chen, "A Scalable Self-Organizing Map Algorithm for Textual Classification: A Neural Network Approach to Automatic Thesaurus Generation," Communication and Cognition in Artificial Intelligence Journal (CC-AI), Volume 15, Number 1-2, Pages 81-111, 1998.
  7. H. Chen, O. Titkova, R. Orwig, and J. F. Nunamaker, "Information Visualization for Collaborative Computing," IEEE Computer, Volume 31, Number 8, Pages 75-82, August 1998.
  8. H. Chen, Y. Chung, M. Ramsey and C. Yang, "An Intelligent Personal Spider (Agent) for Dynamic Internet/Intranet Searching," Decision Support Systems, Volume 23, Pages 41-58, 1998.
  9. H. Chen, Y. Zhang and A. Houston, "Semantic Indexing and Searching Using a Hopfield Net," Journal of Information Science, Volume 24, Number 1, Pages 3-18, 1998
  10. M. Ramsey, T. Ong and H. Chen, "Multilingual Input System for the Web - an Open Multimedia Approach of Keyboard and Handwritten Recognition for Chinese and Japanese," Proceedings of IEEE Advances in Digital Libraries Conference (ADL '98), Santa Barbara, CA, April 22-24, Pages 188-195, 1998.

1997

  1. H. Chen, J. Martinez, T. D. Ng and B. R. Schatz, "A Concept Space Approach to Addressing the Vocabulary Problem in Scientific Information Retrieval: An Experiment on the Worm Community System," Journal of the American Society for Information Science, Volume 48, Number 1, Pages 17-31, January 1997.
  2. R. E. Orwig, H. Chen and J. F. Nunamaker, "A Graphical, Self-Organizing Approach to Classifying Electronic Meeting Output," Journal of the American Society for Information Science, Volume 48, Number 2, Pages 157-170, February 1997.
  3. H. Chow, K. Tolle, D. Roe, V. Elsberry and H. Chen, "Application of Neural Networks to Population Pharmacokinetics Data Analysis," Journal of Pharmaceutical Sciences, Volume 86, Number 7, Pages 840-845, July 1997.
  4. H. Chen, T. R. Smith, M. L. Larsgaard, L. L. Hill and M. Ramsey, "A Geographic Knowledge Representation System (GKRS) for Multimedia Geospatial Retrieval and Analysis," International Journal of Digital Libraries, Volume 1, Number 2, Pages 132-152, September 1997.

1996

  1. C. Lin and H. Chen, "An Automatic Indexing and Neural Network Approach to Concept Retrieval and Classification of Multilingual (Chinese-English) Documents," IEEE Transactions on Systems, Man, and Cybernetics, Volume 26, Number 1, Pages 1-14, February 1996.
  2. H. Chen, C. Schuffels and R. Orwig, "Internet Categorization and Search: A Self- Organizing Approach," Journal of Visual Communication and Image Representation, Special Issue on Digital Libraries, Volume 7, Number 1, Pages 88-102, 1996.
  3. B. Schatz and H. Chen, "Building Large-Scale Digital Libraries," IEEE Computer, Special Issue on "Building Large-scale Digital Libraries," Volume 29, Number 5, Pages 22-27, May 1996.
  4. B. Schatz, W. Mischo, T. Cole, J. Hardin, A. Bishop and H. Chen, "Federating Diverse Collections of Scientific Literature," IEEE Computer, Special Issue on "Building Large-scale Digital Libraries," Volume 29, Number 5, Pages 28-36, May 1996.
  5. H. Chen, A. Houston, J. Yen and J. F. Nunamaker, "Toward Intelligent Meeting Agents," IEEE Computer, Volume 29, Number 8, Pages 62-70, August 1996.
  6. H. Chen, B. Schatz, T. Ng, J. Martinez, A. Kirchhoff and C. Lin, "A Parallel Computing Approach to Creating Engineering Concept Spaces for Retrieval: The Illinois Digital Library Initiative Project," IEEE Transactions on Pattern Analysis and Machine Intelligence, Special Section on Digital Libraries: Representation and Retrieval, Volume 18, Number 8, Pages 771-782, August 1996.
  7. R. Orwig, H. Chen, D. Vogel and J. F. Nunamaker, "A Multi-Agent View of Strategic Planning Using Group Support Systems and Artificial Intelligence," Group Decision and Negotiation, Volume 5, Pages 37-59, 1996.

1995

  1. H. Chen, B. Schatz, T. Yim, and D. Fye, "Automatic Thesaurus Generation for an Electronic Community System," Journal of the American Society for Information Science, Volume 46, Number 3, Pages 175-193, April 1995.
  2. H. Chen, "Machine Learning for Information Retrieval: Neural Networks, Symbolic Learning, and Genetic Algorithms," Journal of the American Society for Information Science, Volume 46, Number 3, Pages 194-216, April 1995.
  3. H. Chen and T. Ng, "An Algorithmic Approach to Concept Exploration in a Large Knowledge Network (Automatic Thesaurus Consultation): Symbolic Branch-and-bound Search vs. Connectionist Hopfield Net Activation," Journal of the American Society for Information Science, Volume 46, Number 5, Pages 348-369, June 1995.
  4. H. Chow, H. Chen, T. Ng, P. Myrdal and S. H. Yalkowsky, "Using Backpropagation Networks for the Estimation of Aqueous Activity Coefficients of Aromatic Organic Compounds," Journal of Chemical Information and Computer Sciences, American Chemical Society, Volume 35, Number 4, Pages 723-728, July/August 1995.

1994

  1. H. Chen, “Collaborative Systems: Solving the Vocabulary Problem,” IEEE Computer, Special Issue on Computer-Supported Cooperative Work, Volume 27, Number 5, Pages 58-66, May 1994.
  2. H. Chen, A. K. Danowitz, K. J. Lynch, S. E. Goodman and W. K. McHenry, “Explaining and Alleviating Information Management Indeterminism: A Knowledge-Based Framework,” Information Processing and Management, Volume 30, Number 4, Pages 557-577, July-August 1994.
  3. H. Chen, P. Hsu, R. Orwig, L. Hoopes and J. Nunamaker, “Automatic Concept Classification of Text from Electronic Meetings,” Communications of the ACM, Volume 37, Number 10, Pages 56-73, October 1994.
  4. H. Chen, P. Buntin, L. She, S. Sutjahjo, C. Sommer and D. Neely, “Expert Prediction, Symbolic Learning, and Neural Networks: An Experiment on Greyhound Racing,” IEEE Expert, Volume 9, Number 6, Pages 21-27, December 1994.
  5. H. Chen and J. Kim, “GANNET: A Machine Learning Approach to Document Retrieval,” Journal of Management Information Systems, Volume 11, Number 3, Pages 9-43, Winter 1994/95.

1993

H. Chen, K. J. Lynch, K. Basu and T. Ng, “Generating, Integrating, and Activating Thesauri for Concept-Based Document Retrieval,” IEEE Expert, Special Series on Artificial Intelligence in Text-Based Information Systems, Volume 8, Number 2, Pages 25-34, April 1993.

1992

  1. H. Chen, K. J. Lynch, A. K. Himler and S. E. Goodman, “Information Management in Research Collaboration,” International Journal of Man-Machine Studies, Volume 36, Number 3, Pages 419-445, March 1992.
  2. H. Chen, “Knowledge-Based Document Retrieval: Framework and Design,” Journal of Information Science: Principles & Practice, Volume 18, Number 3, Pages 293-314, June 1992.
  3. H. Chen and K. J. Lynch, “Automatic Construction of Networks of Concepts Characterizing Document Databases,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 22, Number 5, Pages 885-902, 1992.
  4. E. Carmel, S. F. Crawford and H. Chen, ”Browsing in Hypertext: A Cognitive Study,” IEEE Transactions on Systems, Man, and Cybernetics, Volume 22, Number 5, Pages 865-884, 1992.
  5. E. M. Roche, S. E. Goodman and H. Chen, “The Landscape of International Computing,” Advances in Computers, Edited by M. C. Yovits, Volume 35, Pages 326-371, 1992.

1991

H. Chen and V. Dhar, “Cognitive Process as a Basis for Intelligent Retrieval Systems Design,” Information Processing and Management, Volume 27, Number 5, Pages 405-432, 1991.

1990

H. Chen and V. Dhar, “User Misconceptions of Information Retrieval Systems,” International Journal of Man-Machine Studies, Volume 32, Number 6, Pages 673-692, 1990.

The Artificial Intelligence Laboratory has hosted and sponsored a number of international conferences and workshops including the IEEE Intelligence and Security Informatics (ISI) conferences and the Biosurveillance and Biosecurity workshops. Below are listed papers presented at these and other conferences by AI Lab members.

20212020 | 2019 | 2018 |201720162015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1990 | 1987

2021

  • M. Ebrahimi, N. Zhang, J. Hu, M. Taqi Raza, H. Anderson, and H. Chen,  “Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model," 35th AAAI Conference on Artificial Intelligence, Workshop on Robust, Secure, and Efficient Machine Learning (RSEML), February 2-9, 2021.
  • T. Vahedi, B. Ampel, S. Samtani, and H. Chen, “Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach,” Proceedings of 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), San Antonio, Texas, November 2021.
  • K. Otto, B. Ampel, S. Samtani, H. Zhu, and H. Chen, “Exploring the Evolution of Exploit-Sharing Hackers:  An Unsupervised Graph Embedding Approach,” Proceedings of 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), San Antonio, Texas, November 2021.
  • B. Ampel and H. Chen, “Distilling Contextual Embeddings into A Static Word Embedding For Improving Hacker Forum Analytics,” Proceedings of 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), San Antonio, Texas, November 2021.
  • J. Hu, M. Ebrahimi, and H. Chen, "Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach," Proceedings of 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), San Antonio, Texas, November 2021.

2020

  • M. Ebrahimi, S. Samtani, Y. Chai, and H. Chen, “Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach,” IEEE Symposium on Security and Privacy (IEEE S&P 2020) Workshop on Deep Learning for Security (DLS), San Francisco, CA, May 21, 2020.
  • S. Ullman, S. Samtani, B. Lazarine, H. Zhu, B. Ampel, M. Patton, H. Chen, “Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2020) Submitted/Under Review.
  • B. Lazarine, S. Samtani, M. Patton, H. Zhu, S. Ullman, B. Ampel, H. Chen, “Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2020) Submitted/Under Review.
  • B. Ampel, S. Samtani, H. Zhu, S. Ullman, H. Chen, “Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2020) Submitted/Under Review.
  • F. Lin, L. Yizhi, M. Ebrahimi, Z. Ahmad-Post, J. Hu, J. Xin, S. Samtani, W. Li, H. Chen, “Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2020) Submitted/Under Review.
  • N. Zhang, M. Ebrahimi, W. Li, H. Chen, “A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2020) Submitted/Under Review.
  • Y. Liu, F. Lin, Z. Ahmad-Post, M. Ebrahimi, N. Zhang, J. Hu, J. Xin, W. Li, H. Chen, “Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2020) Submitted/Under Review.

2019

  • P. Du, M. Ebrahimi, N. Zhang, R. Brown, H. Chen, and S. Samtani, “Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach,” Proceedings of 2019 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2019), ShenZeng, China, July 2019.
  • N. Arnold, M. Ebrahimi, N. Zhang, B. Lazarine, S. Samtani, M. Patton, and H. Chen, “Dark Net Ecosystem Cyber Threat Intelligence Tool,” Proceedings of 2019 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2019), ShenZeng, China, July 2019.
  • B. Ampel, M. Patton, and H. Chen, “Performance Modeling of Hyperledger  Sawtooth Blockchain,” Proceedings of 2019 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2019), ShenZeng, China, July 2019.

2018

  • C. Harrell, S. Samtani, M. Patton, and H. Chen, “Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions,” Proceedings of 2018 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2018), Miami, Florida, November 2018.
  • P. Du, N. Zhang, M. Ebrahimi, S. Samtani, B. Lazarine, N. SArnold, R. Dunn, S. Suntwal, G. Angeles, R. Schweitzer, and H. Chen, “Identifying, Collecting and Presenting Hacker Community Data: Forums, IRC, Carding Shops and DNMs,” Proceedings of 2018 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2018), Miami, Florida, November 2018.
  • M. Ebrahimi, M. Surdeanu, S. Samtani, and H. Chen, “Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach: An Exploratory Study,” Proceedings of 2018 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2018), Miami, Florida, November 2018.
  • R. Williams, S. Samtani, M. Patton, and H. Chen, “Incremental Hacker Forum Exploit Collection and Classification for Practical Cyber Threat Intelligence: An Exploratory Study,” Proceedings of 2018 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2018), Miami, Florida, November 2018.
  • E. McMahon, M. Patton, H. Chen, and S. Samtani, “Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical Systems Resiliency,” Proceedings of 2018 IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2018), Miami, Florida, November 2018.
  • S. Yu and H. Chen, “Motion Sensor-Based Assessment on Fall Risk and Parkinson’s Disease Severity: A Deep Multi-Source Multi-Task Learning (DMML) Approach,” Proceedings of 2018 IEEE International Conference on Health Informatics (IEEE ICHI 2018), New York, New York, June 4-7, 2018.

2017

  • Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani, Mark Patton and Hsinchun Chen, (2017). “Assessing Medical Device Vulnerabilities on the Internet of Things,” ISI 2017 Proceedings of 2017 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 2017. 10.1109/ISI.2017.8004903
  • Ryan Williams, Emma McMahon, Sagar Samtani, Mark Patton and Hsinchun Chen, (2017). “Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices: A Scalable Approach,” ISI 2017 Proceedings of 2017 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 2017. 10.1109/ISI.2017.8004904
  • John Grisham, Sagar Samtani, Mark Patton and Hsinchun Chen, (2017). “Identifying Mobile Malware and Key Threat Actors in Online Hacker Forums for Proactive Cyber Threat Intelligence,” ISI 2017 Proceedings of 2017 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 2017. 10.1109/ISI.2017.8004867
  • Malaka El, Sagar Samtani, Hsinchun Chen, Mark Patton and Emma McMahone, (2017). “Benchmarking Vulnerability Scanners: An Experiment on SCADA Devices and Scientific Instruments,” ISI 2017 Proceedings of 2017 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 2017. 10.1109/ISI.2017.8004879
  • Rodney Rohrmann, Vincent Ercolani, Mark Patton, (2017). “Large Scale Port Scanning Through Tor Using Parallel Nmap Scans to Scan Large Portions of the IPv4 Range,” ISI 2017 Proceedings of 2017 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 2017. 10.1109/ISI.2017.8004906

2016

  • V. Ercolani, M. Patton, and H. Chen, “Shodan Visualized,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745467
  • J. Grisham, C. Barreras, C. Afarin, M. Patton, and H. Chen, “Identifying Top Listers in Alphabay Using Latent Dirichlet Allocation,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745477
  • R. Jicha, M. Patton, and H. Chen, “Identifying Devices across the IPv4 Address Space,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745469
  • A. Jicha, M. Patton, and H. Chen, “SCADA Honeypots: An In-depth Analysis of Conpot,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745468
  • R. Rohrmann, M. Patton, and H. Chen, “Anonymous Port Scanning Performing Network -Reconnaissance Through Tor,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745475
  • S. Samtani, and H. Chen, “Using Social Network Analysis to Identify Key Hackers for Keylogging Tools in Hacker Forums,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745500
  • S. Samtani, K. Chinn, C. Larson, and H. Chen, “AZSecure Hacker Assets Portal: Cyber Threat Intelligence and Malware Analysis,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745437
  • S. Samtani, S. Yu, H. Zhu, M. Patton, and H. Chen, “Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques,” ISI 2016, Proceedings of 2016 IEEE International Conference on Intelligence and Security Informatics, Tucson, Arizona, September 2016. DOI: 10.1109/ISI.2016.7745438
  • X. Zheng, D. Zeng, H. Chen, and S. J. Leischow (Eds.): International Conference on Smart Health, ICSH 2015, Phoenix, Arizona, Proceedings. Lecture Notes in Computer Science 9545, Springer 2016.
  • M. Chau, G. A. Wang, and H. Chen, (Eds.): Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2016, Auckland, New Zealand, April 2016. Proceedings. Lecture Notes in Computer Science 9650, 2016.

2015

  • Sagar Samtani, Ryan Chinn and Hsinchun Chen. Exploring Hacker Assets in Underground Forums. ISI 2015, Proceedings of 2015 IEEE International Conference on Intelligence and Security Informatics, Baltimore, Md., May 27-29, 2015.
  • Victor Benjamin, Hsinchun Chen. Developing Understanding of Hacker Language through the use of Lexical Semantics. ISI 2015, Proceedings of 2015 IEEE International Conference on Intelligence and Security Informatics, Baltimore, Md., May 27-29, 2015.
  • Victor Benjamin, Weifeng Li, Thomas Holt, Hsinchun Chen. Exploring Threats and Vulnerabilities in Hacker Web: Forums, IRC and Carding Shops. ISI 2015, Proceedings of 2015 IEEE International Conference on Intelligence and Security Informatics, Baltimore, Md., May 27-29, 2015.
  • M. Chau, G. A. Wang, and H. Chen, (Eds.): Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 2015. Proceedings. Lecture Notes in Computer Science 9074, 2015.

2014

  • V. A. Benjamin and H. Chen, “Time-to-event Modeling for Predicting Hacker Community Participant Trajectory,” ISI 2014, Proceedings of 2014 IEEE International Conference on Intelligence and Security Informatics, The Netherlands, September 2014.
  • W. Li and H. Chen, “Identifying Top Sellers in Underground Economy Using Deep Learning-based Sentiment Analysis,” ISI 2014, Proceedings of 2014 IEEE International Conference on Intelligence and Security Informatics, The Netherlands, September 2014.
  • A. Abbasi, W. Li, V. A. Benjamin, S. Hu, and H. Chen, “Descriptive Analytics: Investigating Expert Hackers in Hacker Forums,” ISI 2014, Proceedings of 2014 IEEE International Conference on Intelligence and Security Informatics, The Netherlands, September 2014.
  • J. Chuang, O. Hsiao, P. Wu, J. Chen, X. Liu, H. De La Cruz, S. Li, and H. Chen, “DiabeticLInk: An Integrated and Intelligent Cyber-enabled Health Social Platform for Diabetic Patients,” International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings. Lecture Notes in Computer Science 8549, Springer 2014.
  • X. Li, T. Zhang, L. Song, Y. Zhang, C. Xing, and H. Chen, “A Control Study on the Effects of HRV Biofeedback Therapy in Patients with Post-stroke Depression,” International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings. Lecture Notes in Computer Science 8549, Springer 2014.
  • X. Song, S. Jiang, X. Yan, and H. Chen, “Collaborative Friendship Betworks in Online Healthcare Communities: An Exponential Random Graph Model Analysis,” International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings. Lecture Notes in Computer Science 8549, Springer 2014.
  • Y. Yin, Y. Zhang, X. Liu, Y. Zhang, C. Xing, and H. Chen, “HealthQA: A Chinese QA Summary System for Smart Health,” International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings. Lecture Notes in Computer Science 8549, Springer 2014.
  • X. Liu, J. Liu, and H. Chen, “Identifying Adverse Drug Events from Health Social Media: A Case Study on Heart Disease Discussion Forums,” International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings. Lecture Notes in Computer Science 8549, Springer 2014.
  • X. Chen, Y. Zhang, C. Xing, X. Liu, and H. Chen, “Diabetes-related Topic Detection in Chinese Health Websites Using Deep Learning,” International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings. Lecture Notes in Computer Science 8549, Springer 2014.
  • S. Yu, H. Zhu, S. Jiang, and H. Chen, “Emoticon Analysis for Chinese Health and Fitness Topics,” International Conference on Smart Health, ICSH 2014, Beijing, China, July 2014. Proceedings. Lecture Notes in Computer Science 8549, Springer 2014.

2013

  • V. Benjamin, W. Chung, A. Abbasi, J. Chuang, C. A. Larson, H. Chen, “Evaluating Text Visualization: An Experiment in Authorship Analysis,” Proceedings of 2013 IEEE International Conference on Intelligence and Security Informatics, ISI 2013, Seattle, Washington, June 4-7.
  • V. Benjamin, H. Chen, “Machine Learning for Attack Vector Identification in Malicious Source Code,” Proceedings of 2013 IEEE International Conference on Intelligence and Security Informatics, ISI 2013, Seattle, Washington, June 4-7.

2012

  • H. Chen, “Dark Web: Exploring and Mining the Dark Side of the Web,” International Conference of Formal Concept Theory (ICFCA), Belgium, May 7-10, 2012.
  • H. Chen, “From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics,”European Intelligence and Security Informatics Conference (EISIC), Denmark, August 20-24, 2012.
  • C. Yang, H. Chen, H. Wactlar, C. Combi, and X. Tang, SHB 2012: International Workshop on Smart Health and Wellbeing. ACM International Conference on Information and Knowledge Management,(CIKM), Hawaii, October 29-November 2, 2012.
  • V. Benjamin and H. Chen, “Securing Cyberspace: Identifying Key Actors in Hacker Communities,” Proceedings of 2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.
  • D. Zimbra and H. Chen, “Scalable Sentiment Classification across Multiple Dark Web Forums,” IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.
  • M. Yang and H. Chen, “Partially Supervised Learning for Radical Opinion Identification in Hate Group,” Proceedings of 2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.
  • J. Woo and H. Chen, “A Event-Driven SIR Model for Topic Diffusion in Web Forums,” Proceedings of 2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.
  • P. Hu, D. Wan, Y. Dang, C. Larson, and H. Chen, “Evaluating an Integrated Forum Portal for Terrorist Surveillance and Analysis,” Proceedings of 2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.
  • S. Kaza and H. Chen, “Using Burst Detection Techniques to Identify Suspicious Vehicular Traffic at Border Crossings,” Proceedings of 2012 IEEE International Conference on Intelligence and Security Informatics, ISI 2012, Washington, DC, June 2012.

2011

  • H. Chen, C. Larson, T. Elhourani, D. Zimbra, and D. Ware, “The GeoPolitical Web: Assessing Societal Risk in an Uncertain World,” Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, July 2011.
  • H. Chen, D. Denning, N. Roberts, C. Larson, X. Yu, and C. Huang, “The Dark Web Forum Portal: From Multi-lingual to Video,” Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, July 2011.
  • S. Zeng, M. Lin, and H. Chen, “Dynamic User-level Affect Analysis in Social Media: Modeling Violence in the Dark Web,” Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, July 2011.
  • J. Woo, J. Son, and H. Chen, “An SIR Model for Violent Topic Diffusion in Social Media,” Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, Beijing, China, July 2011.

2010

  • Y. Zhang, S. Zeng, C. Huang, L. Fan, X. Yu, Y. Dang, C. Larson, D. Denning, N. Roberts, and H. Chen, “Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences,” Proceedings of 2010 IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, Canada, May 2010.
  • D. Zimbra and H. Chen, “Comparing the Virtual Linkage Intensity and Real World Proximity of Social Movements,” Proceedings of 2010 IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, Canada, May 2010.
  • Y. Ku, C. Chiu, Y. Zhang, L. Fan, and H. Chen, “Global Disease Surveillance using Social Media: HIV/AIDS Content Intervention in Web Forums,” Proceedings of 2010 IEEE International Conference on Intelligence and Security Informatics, ISI 2010, Vancouver, Canada, May 2010.

2009

  • Y. Zhang, Y. Dang, and H. Chen, "Gender Difference Analysis of Political Web Forums: An Experiment on an International Islamic Women's Forum," in Proceedings of the IEEE International Intelligence and Security Informatics Conference (Dallas, Texas, June 8-11, 2009).
  • Y. Zhang, S. Zeng, L. Fan, Y. Dang, C. Larson, and H. Chen, "Dark Web Forums Portal: Searching and Analyzing Jihadist Forums," in Proceedings of the IEEE International Intelligence and Security Informatics Conference (Dallas, Texas, June 8-11, 2009).
  • H. Chen, "IEDs in the Dark Web: Lexicon Expansion and Genre Classification," in Proceedings of the IEEE International Intelligence and Security Informatics Conference (Dallas, Texas, June 8-11, 2009).
  • T. Fu, C. Huang, and H. Chen, "Identification of Extremist Videos in Online Video Sharing Sites," in Proceedings of the IEEE International Intelligence and Security Informatics Conference (Dallas, Texas, June 8-11, 2009).
  • H. Lu, N. W. Huang, Z. Zhang, and T.-J. Chen, "Identifying Firm-specific Risk Statements in News Articles," in Proceedings of the Pacific Asian Workshop in Intelligence and Security Informatics (PAISI) (Bangkok, Thailand, April 2009). Springer; Lecture Notes in Computer Science, 5477.

2008

  • H. Chen and the Dark Web Team (2008). "IEDs in the Dark Web: Genre Classification of Improvised Explosive Device Web Pages," in Proceedings of the IEEE International Intelligence and Security Informatics Conference (Taipei, Taiwan, July 17-20, 2008). Springer Lecture Notes in Computer Science.
  • H. Chen and the Dark Web Team (2008). "Discovery of Improvised Explosive Device Content in the Dark Web," in Proceedings of the IEEE International Intelligence and Security Informatics Conference (Taipei, Taiwan, July 17-20, 2008). Springer Lecture Notes in Computer Science.
  • H. Chen and the Dark Web Team (2008). "Sentiment and Affect Analysis of Dark Web Forums: Measuring Radicalization on the Internet, " in Proceedings of the IEEE International Intelligence and Security Informatics Conference (Taipei, Taiwan, July 17-20, 2008). Springer Lecture Notes in Computer Science.
  • H. Chen, S. Thoms, T. Fu. "Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups," in Proceedings of the 2008 IEEE Intelligence and Security Informatics Conference, Taiwan, June 17-20, 2008.

2007

  • A. Abbasi and H. Chen. (2007). "Categorization and analysis of text in computer mediated communication archives using visualization," in Ray Larson, Edie Rasmussen, Shigeo Sugimoto and Elaine Toms, eds., Proceedings of the 2007 Joint Conference on Digital Libraries (JCDL), Vancouver, BC, Canada, June 18-23, 2007, p. 11-18.
  • X. Li, H. Chen, Z. Zhang, J. Li. "Automatic patent classification using citation network information: an experimental study in nanotechnology," in Ray Larson, Edie Rasmussen, Shigeo Sugimoto and Elaine Toms, eds., Proceedings of the 2007 Joint Conference on Digital Libraries (JCDL), Vancouver, BC, Canada, June 18-23, 2007, p. 419-427.
  • T. Fu, A. Abbasi, and H. Chen. (2007). "Interaction coherence analysis for Dark Web forums," in Gheorghe Muresan, Tayfur Altiok, Banjamin Melamed, and Daniel Zeng., Proceedings of the 2007 IEEE Intelligence and Security Informatics Conference, New Brunswick, NJ, May 23-24, p. 342-349.

2006

  • B. Marshall, and H. Chen, "Using Importance Flooding to Identify Interesting Networks of Criminal Activity", Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A. Springer. Pgs. 14-25.
  • A. Abbasi and H. Chen, "Visualizing Authorship for Identification," Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A. Springer. Pgs. 60-71.
  • P. Yan, D. Zeng, and H. Chen, "A Review of Public Health Syndromic Surveillance Systems," Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A. Springer. Pgs. 249-260.
  • S. Kaza, Y. Wang, and H. Chen, "Suspect Vehicle Identification for Border Safety with Modified Mutual Information." Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A. Springer. Pgs. 308-318.
  • J. Xu, H. Chen, Y. Zhou, J. Qin, "On the Topology of the Dark Web of Terrorist Groups." Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A. Springer. Pgs. 367-376.
  • G. Wang, H. Chen, and H. Atabakhsh, "A Multi-layer Naïve Bayes Model for Approximate Identity Matching," Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A. Springer. Pgs. 479-484.
  • J.-H. Wang, T.J. Fu, H.-H. Lin, and H. Chen, "A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan." Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A.. Springer. Pgs. 479-484.
  • J. Ma, D. Zeng, and H. Chen. "Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics." Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A.. Springer. Pgs. 542-547.
  • A. Salem, E. Reid, and H. Chen. "Content Analysis of Jihadi Extremist Groups Videos." Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A.. Springer. Pgs. 615-620.
  • Y. Zhou, J. Qin, G. Lai, E. Reid, and H. Chen. "Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums." Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), May 23-24, 2006, San Diego, U.S.A.. Springer. Pgs. 615-620.

2005

  • R. Schumaker, and "Textual Analysis of Stock Market Prediction Using Financial News Articles," 12th Americas Conference on Information Systems (AMCIS-2006), Aug 2006. Acapulco, Mexico
  • D. McDonald, H. Chen, and R. Schumaker, "Transforming Open-Source Documents to Terror Networks: The Arizona TerrorNet," American Association for Artificial Intelligence Conference Spring Symposia (AAAI-2005), March 2005. Stanford, CA
  • G. Wang, H. Atabakhsh, T. Petersen, H. Chen, "Discovering Identity Problems: A Case Study," In Proceedings of the Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics (ISI 2005), Atlanta, GA, USA, May 19-20, 2005
  • S. Kaza, B. Marshall, J. Xu, A. Wang, H. Gowda, H. Atabakhsh, T. Petersen, C. Violette, and H. Chen, "BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization," IEEE International Conference on Intelligence and Security Informatics (ISI), Atlanta, GA, 2005.
  • S. Kaza, T. Wang, H. Gowda, and H. Chen, "Target Vehicle Identification for Border Safety using Mutual Information," 8th International IEEE Conference on Intelligent Transportation Systems, Vienna, Austria, 2005.
  • S. Kaza, J. Xu, and H. Chen, "Topological Analysis of Criminal Activity Networks in Multiple Jurisdictions," The National Conference on Digital Government Research (DGO), Atlanta, GA, 2005.
  • H. Chen, H. Atabakhsh, C. Tseng, B. Marshall, S. Kaza, S. Eggers, H. Gowda, A. Shah, T. Petersen, and C. Violette, "Visualization in law enforcement," CHI '05 extended abstracts on Human factors in computing systems, Portland, OR, USA, 2005.
  • J. Xu, B. Marshall, S. Kaza, and H. Chen, "Analyzing and Visualizing Criminal Network Dynamics: A Case Study," IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, 2004.
  • Byron Marshall , Karin Quiñones, Hua Su, Shauna Eggers, and Hsinchun Chen"Visualizing Aggregated Biological Pathway Relations" 
  • Proceedings of the 2005 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2005), June 7-11 , Denver, CO, 2005.
  • Byron Marshall , Hua Su, Dan McDonald, and Hsinchun Chen, "Linking Ontological Resources Using Aggregatable Substance Identifiers to Organize Extracted Relations,"  Pacific Symposium on Biocomputing, Jan 4-8, 2005, Big Island, Hawaii.

2004

  • B. Marshall, S. Kaza, J. Xu, H. Atabakhsh, T. Petersen, C. Violette, and H. Chen, "Cross-Jurisdictional Criminal Activity Networks to Support Border and Transportation Security," 7th International IEEE Conference on Intelligent Transportation Systems, Washington D.C., 2004.
  • B. Marshall, T. Madhusudan. "Element matching in concept maps," Proceedings of the fourth ACM and IEEE Joint Conference on Digital Libraries (JCDL-2004), June 7-11, Tucson, AZ.
  • J Qin, Y. Zhou, and M.l Chau, "Building domain-specific web collections for scientific digital libraries: a meta-search enhanced focused crawling method." Proceedings of the fourth ACM and IEEE Joint Conference on Digital Libraries (JCDL-2004), June 7-11, Tucson, AZ.
  • W. Chung, L. Chaboya, C. O'Toole, and H. Atabakhsh. "An evaluation methodology for coordinated event visualization in digital libraries." Proceedings of the fourth ACM and IEEE Joint Conference on Digital Libraries (JCDL-2004), June 7-11, Tucson, AZ.
  • D. Zeng, H. Chen, C. Tseng, C. Larson, M. Eidson, I. Gotham, C. Lynch, and M. Ascher. "West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics." Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI 2004), June 10-11, 2004, Tucson, AZ, U.S. Springer. Pgs. 28-41.
  • E. Reid, J. Qin, W. Chung, J. Xu, Y. Zhou, R. Schumaker, M. Sageman, and H. Chen. "Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism." Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI 2004), June 10-11, 2004, Tucson, AZ, U.S. Springer. Pgs. 125-145.
  • J. Xu, B. Marshall, S. Kaza, and H. Chen, "Analyzing and Visualizing Criminal Network Dynamics: A Case Study." Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI 2004), June 10-11, 2004, Tucson, AZ, U.S. Springer. Pgs. 359-378.
  • H. Atabakhsh, C. Larson, T. Petersen, C. Violette, and H. Chen. "Information Sharing and Collaboration Policies within Government Agencies." Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI 2004), June 10-11, 2004, Tucson, AZ, U.S. Springer. Pgs. 467-475.

2003

  • C.Q. Yin, L.D. Nickels, C.Z. Chen, T. G. Ng, and H. Chen " DGPort: A Web Portal for Digital Government " Presented at dg.o2003, Digital Government Conference, May 18-21, 2003, Boston, MA 
  • G. Leroy H. Chen, J. D. Martinez, S. Eggers, R. R. Falsey, K. L. Kislin, Z. Huang, J. Li, J. Xu, D. M. McDonald, and G. Ng "Genescene: Biomedical Text and Data Mining", Presented at the Third ACM and IEEE Joint Conference on Digital Libraries (JCDL-2003), Houston, May 2003.
  • B. Marshall, Y. Zhang, H. Chen, A. Lally, R. Shen, E. Fox and L. Cassel "Convergence of Knowledge Management and E-Learning: the GetSmart Experience," Presented at the Third ACM and IEEE Joint Conference on Digital Libraries (JCDL-2003), Houston, May 2003.
  • R. Zheng, Y. Qin, Z. Huang, and H. Chen, "Authorship Analysis in Cybercrime Investigation." Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), June 2-3, 2003, Tucson, AZ, U.S. Springer. Pgs. 59-73.
  • J. Schroeder, J. Xu, and H. Chen, "CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis." Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), June 2-3, 2003, Tucson, AZ, U.S. Springer. Pgs. 168-180.
  • T. Buetow, L. Chaboya, C. Toole, T. Cushna, D. Daspit, T. Petersen, H. Atabakhsh, and H. Chen. "A Spatio Temporal Visualizer for Law Enforcement." Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), June 2-3, 2003, Tucson, AZ, U.S. Springer. Pgs. 181-194.
  • P. Hu, C. Lin, and H. Chen. "Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study." Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), June 2-3, 2003, Tucson, AZ, U.S. Springer. Pgs. 209-222.
  • J. Xu and H. Chen, "Untangling Criminal Networks: A Case Study." Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), June 2-3, 2003, Tucson, AZ, U.S. Springer. Pgs. 232-248.
  • J. L. Zhao, H. Bi, and H. Chen. "Collaborative Workflow Management for Interagency Crime Analysis." Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), June 2-3, 2003, Tucson, AZ, U.S. Springer. Pgs. 266-280.
  • D. Zeng, H. Chen, D. Daspit, F. Shan, S. Nandiraju, M. Chau, and C. Lin. "COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement." Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), June 2-3, 2003, Tucson, AZ, U.S. Springer. Pgs. 281-295.
  • W. Chang, W. Chung, H. Chen, and S. Chou. "An International Perspective on Fighting Cybercrime." Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), June 2-3, 2003, Tucson, AZ, U.S. Springer. Pgs. 379-384.

2002

  • Z. Huang, W. Chung, T.-H. Ong and H. Chen, A Graph-Based Recommender System for Digital Library, in: Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'02), Portland, Oregon, July 14-18, 65-73, (2002).
  • G. Leroy and H. Chen, "MedTextus: An Ontology-enhanced Medical Portal,"presented at the Workshop on Information Technology and Systems (WITS), Barcelona, December 2002.
  • Michael Chau, H. Chen, Jialun Qin, Yilu Zhou, Yi Qin, Wai-Ki Sung, Daniel McDonald, "Comparison of Two Approaches to Building a Vertical Search Tool: A Case Study in the Nanotechnology Domain," Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'02), Portland, Oregon, July 14-18, 2002.
  • G. Leroy and H. Chen, "Filling Preposition-based Templates to Capture Information from Medical Abstracts," presented at the Pacific Symposium on Biocomputing, Kaua’i, pp 350-361, January, 2002.
  • M. Chau, H. Chen, J. Qin, Y. Zhou, W.-K. Sung, M. Chen, Y. Qin, D. McDonald, A. Lally, M. Landon, "NanoPort: A Web Portal for Nanoscale Science and Technology," Proceedings of the Second ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'02), Portland, Oregon, July 14-18, 2002.
  • M. Chau, J. Xu, H. Chen, "Extracting Meaningful Entities from Police Narrative Reports," in Proceedings of the second National Conference on Digital Government Research, May 2002, Los Angeles CA.

2001

  • M. Chau, D. Zeng, and H. Chen, "Personalized Spiders for Web Search and Analysis," Proceedings of the First ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'01), Roanoke, Virginia, pp. 79-87, June 24-28, 2001.
  • H. Atabakhsh, J. Schroeder, H. Chen, M. Chau, J. Xu, J. Zhang, and H. Bi, "COPLINK Knowledge Management for Law Enforcement: Text Analysis, Visualization and Collaboration," Proceedings of the National Conference for Digital Government Research (dg.o 2001), Los Angeles, California, May 21-23, 2001.
  • H. Chau, H. Atabakhsh, D. Zeng, and H. Chen, "Building an Infrastructure for Law Enforcement Information Sharing and Collaboration: Design Issues and Challenges," Proceedings of the National Conference for Digital Government Research (dg.o 2001), Los Angeles, California, May 21-23, 2001.
  • H. Chen, "Medical Mining: A DLI-Status Report," Proceedings of the 4th International Conference of Asian Digital Libraries (ICADL 2001), Bangalore, India, December 10-12, 2001.
  • H. Chen, "Knowledge Management Systems: A Text Mining Perspective," Invited Tutorial for The 4th International Conference of Asian Digital Libraries (ICADL 2001), Bangalore, India, December 10-12, 2001.
  • B. Zhu and H. Chen, "Social Visualization for Computer-Mediated Communication: A Knowledge Management Perspective," Proceedings of WITS'01, Conference, New Orleans, Louisana, December 15-16, 2001.
  • H. Chen, "COPLINK: Knowledge Management for Law Enforcement," Proceedings of the National Conference on Digital Government Research, Los Angeles, CA, May 21-23, 2001.

2000

  • H. Chen, "A Case of Information Categorization in NSF DLI Research,"Proceedings of The Second International Roundtable on Terminology, Seoul, Korea, December 10, 2000.
  • H. Chen, "High-Performance Digital Library Classification Systems: An Experiment in Medical Informatics," Editors: G. M. Olson, T. W. Malone, and J. B. Smith, Proceedings of the Third International Asian Digital Library Conference, Seoul, Korea, December 6-9, 2000.
  • H. Chen, "UMLS and Linguistics Enhanced Medical Information Retrieval,"Proceedings of NHRI (National Health Research Institute) Research Resources 2000, Taipei, Taiwan, April 27, 2000.
  • N. C. Romano, C. Baur, H. Chen, "The MindMine Comment Analysis Tool for Collaborative Attitude Solicitation, Analysis, Sense-making and Visualization,"Proceedings of the 33th Annual Hawaii International Conference on System Sciences (HICSS-33), Maui, Hawaii, January 7-10, 2000.

1999

  • T. Ong and H. Chen, “Updateable PAT-Tree Approach to Chinese Key Phrase Extraction Using Mutual Information: A Linguistic Foundation for Knowledge Management,” Proceedings of the Second Asian Digital Library Conference , Taipei, Taiwan, November 8-9, 1999.
  • G. Leroy, K Tolle, and H. Chen, “Customizable and Ontology-Enhanced Medical Information Retrieval Interfaces,” Proceedings of International Medical Informatics Association Working Group 6 on Medical Concept Representation, Phoenix, Arizona, December 16-19, 1999.
  • B. Zhu, M. Ramsey, H. Chen, R. V. Hauck, T. D. Ng and B. R. Schatz, “Support Concept-based Multimedia Information Retrieval: A Knowledge Management Approach,” Proceedings of the ICIS Conference, Charlotte, North Carolina, December 12-15, 1999.
  • R. V. Hauck and H. Chen, “COPLINK: A Case of Intelligent Analysis and Knowledge Management,” Proceedings of the ICIS Conference , Charlotte, North Carolina, December 12-15, 1999.
  • N. C. Romano, D. Roussonov, J. F. Nunamaker, and H. Chen, “Collaborative Information Retrieval Environment: Integration of Information Retrieval with Group Support Systems,” Proceedings of the 32th Annual Hawaii International Conference on System Sciences (HICSS-32) , Maui, Hawaii, January 7-10, 1999.

1998

  • H. Chen, “The Illinois Digital Library Initiative Project: Federating Repositories and Semantic Research,” Proceedings of The First Asia Digital Library Workshop '98, Hong Kong, August 6-7, 1998.
  • M. Ramsey, T. Ong, and H. Chen, “Multilingual Input System on the Web - an Open Multimedia Approach of Handwriting and Keyboard Recognition for Chinese and Japanese,” Proceedings of IEEE Advances in Digital Libraries Conferences (ADL '98), Santa Barbara, CA, Pages 188-195, April 22-24, 1998.

1997

  • H. Chen, Y. Chung, M. Ramsey, C. Yang, P. Ma, and J. Yen , “Intelligent Agents on the Internet,” Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), Maui, Hawaii, January 7-10, 1997.

1996

  • B. Schatz, E. Johnson, P. Cochrane, and H. Chen, “Interactive Term for Users of Digital Libraries: Using Subject Thesauri and Co-occurrences Lists for Information Retrieval,” ACM Digital Library Conference, Pages 126-133, 1996.

1995

  • H. Chen, B. R. Schatz, C. Lin , “Concept Classification and Search on Internet Using Machine Learning and Parallel Computing Techniques,” World Wide Web 4 Conference, Boston, MA, Pages 58-59, Poster Proceedings, December 11-14, 1995.
  • J. Yen, H. Chen, P. Ma, and T. Bui , “An Issue Identifier for Online Financial Databases,” Proceedings of International Society for Decision Support Systems Third International Conference ISDSS'95, Hong Kong, June 22-23, 1995.

1994

  • H. Chen and B. Schatz , “Semantic Retrieval for the NCSA Mosaic,” Proceedings of the Second International World Wide Web Conferences '94, Chicago, Illinois, October 17-20, 1994.
  • J Martinez and H. Chen, “Cognitive Studies on the Use of Automatic Thesauri for Information Retrieval in Biological Domains,” AzLA Annual Conference, November, 1994.
  • H. Chen and L. She, “Inductive Query By Examples (IQBE): A Machine Learning Approach,” Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), Maui, Hawaii, January 4-7, 1994.
  • H. Chen, “An Algorithmic Approach to Building Organizational Memory for a Scientific Community,” Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), Maui, Hawaii, January 4-7, 1994.
  • H. Chen, “A Machine Learning Approach to Document Retrieval: An Overview and an Experiment,” Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), Maui, Hawaii, January 4-7, 1994.

1993

  • H. Chen , “ Approach on the Vocabulary Problem in Collaboration,” Proceedings in the National Science Foundation Coordination Theory and Collaboration Technology Workshop (NSFCTCT), Arlington, VA, July 8-10, 1993.
  • B. Schatz, E. Grossman, T. Friedman, K. Powell, J. Calley, H. Chen, L. Star, S. Hudson, S. Ward, “The Worm Community System, Release 2,” 1993 Meeting on C. elegans, University of Wisconsin, Madison, Wisconsin, June 2-6, 1993.

1992

  • K. J. Lynch and H. Chen, “Knowledge Discovery from Historical Data: An Algorithmic Approach,” Proceedings in the 25th Annual Hawaii International Conference on System Sciences (HICSS-25), Kaui, Hawaii, Pages 70-79, January 7-10, 1992.

1990

  • H. Chen and V. Dahr, “Online Query Refinement on Information Retrieval Systems: A Process Model of Searcher/System Interactions,” Proceedings in the 13th International Conference on Research and Development in Information Retrieval (SIGIR-90), Brussels, Belgium, 1990.
  • H. Chen and V. Dahr, “A Knowledge-Based Approach to the Design of Document-Based Retrieval Systems,” Proceedings in the 5th Conference on Office Information Systems (COIS-90), Boston, Massachusetts, 1990.
  • H. Chen, “A Knowledge-Based Design for Hypertext-Based Document Retrieval Systems,” Proceedings in the International Conference on Data Base and Expert Systems Applications (DEXA-90), Vienna, Austria, 1990.

1987

  • H. Chen and V. Dahr, “Reducing Indeterminism in Consultation: A Cognitive Model of User/Librarian Interactions,”Proceedings of the 6th National Conference on Artificial Intellegence (AAAI-87), Seattle, Washington, 1987.

1) T. J. Holt. Cybercrime Through an Interdisciplinary Lens, Routledge.  New York, NY 2017:

2) C. Yang, M. C.-L. Chau, J.-H. Wang, and H. Chen. SECURITY INFORMATICS (Annals of Information Systems, Volume 9, Springer, 2010:

  • Y.-D. Chen, A. Abbasi, and H. Chen, "Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement," pp. 1-24.

3) H. Chen and C. Yang, eds. INTELLIGENCE AND SECURITY INFORMATICS: TECHNIQUES AND APPLICATIONS, Berlin: Springer, 2008.

4) H. Chen, L. Brandt, V. Gregg, R. Traunmüller, Sharon Dawes, Eduard Hovy, Ann Macintosh, and C. Larson, eds. DIGITAL GOVERNMENT: E-GOVERNMENT RESEARCH, CASE STUDIES, AND IMPLEMENTATION, New York, NY: Springer, 2008.

5) H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, and D. Zeng, eds. NATIONAL SECURITY. (Handbooks in Information Systems, Volume 2.) Amsterdam, Boston: Elsevier, 2007.

  • D. Zeng, H. Chen, and W. Chang, "Spatio-Temporal Data Analysis in Security Informatics," Chapter 7, pgs. 165-186.
  • E. Reid, H. Chen, and J. Xu, "Social Network Analysis for Terrorism Research," Chapter 10, pgs. 243-270.

6) H. Chen, S. Fuller, C. Friedman, and W. Hersh, eds. MEDICAL INFORMATICS: KNOWLEDGE MANAGEMENT AND DATA MINING IN BIOMEDICINE. New York, NY: Springer, 2005.

  • H. Chen, S. Fuller, C. Friedman, and W. Hersh, "Knowledge Management, Data Mining, and Text Mining in Medical Informatics, Chapter 1, pgs 3-34.
  • S. Eggers, Z. Huang, H. Chen, L. Yan, C. Larson, A. Rashid, M. Chau and C. Lin, "Mapping Medical Informatics Research," Chapter 2, pgs. 35-62.
  • D. Zeng, H. Chen, C. Lynch, M. Eidson, I. Gotham, "Infectious Disease Informatics and Outbreak Detection," Chapter 13, pgs. 357-395.
  • D. McDonald, H. Su, J. Xu, C. Tseng, H. Chen, and G. Leroy, "Gene Pathway Text Mining and Visualization," Chapter 18, pgs. 519-546.
  • Z. Huang, H. Su, and H. Chen. "Joint Learning Using Multiple Types of Data and Knowledge," Chapter 21, pgs. 593-624.

7) M. Shaw, B. Blanning, T. Strader, and A. Whinston, eds. HANDBOOK ON ELECTRONIC COMMERCE. Handbook on Electronic Commerce, pages pp. 365-382. Springer, 2000.

8) S. Harum and M. Twindale. SUCCESSES AND FAILURES OF DIGITAL LIBRARIES. The 35th Annual Clinic on Library Applications of Data Processing. Graduate School of Library and Information Science, University of Illinois at Urbana-Champaign, 2000.

  • H. Chen, “Semantic Issues for Digital Libraries,” pgs. 51-60, 2000.
  • B. R. Schatz, W. Mischo, T. Cole, A. Bishop, S. Harum, E. Johnson, L. Neumann, H. Chen, and D. Ng, “Federated Search of Scientific Literatures: A Retrospective On the Illinois Digital Library Project,” in Successes and Failures of Digital Libraries, 35th Annual Clinic on Library Applications of Data Processing, Editors: S. Harum and M. Twindale, GSLIS, UIUC, Pages 41-57, 2000.

9) P. Gabriella and F. Crestani, eds. SOFT COMPUTING IN INFORMATION RETRIEVAL: TECHNIQUES AND APPLICATIONS. Physica-Verlag,

10) G. M. Olson, T. W. Malone, and J. B. Smith. COORDINATION THEORY AND COLLABORATION TECHNOLOGY. Lawrence Erlbaum Associates, Mahwah, NJ, 2000.

11) M. Shaw, B. Blanning, T. Strader, and A. Whinston, HANDBOOK ON ELECTRONIC COMMERCE. Berlin: Springer, 2000.

Below is the list of former PhD students who graduated from the MIS Department with Dr. Chen as their adviser; current affiliations when known are listed in parentheses.

2021 - 2024

  1. Steven Ullman, "Artificial Intelligence-Enabled Vulnerability Analysis and Management for IT Infrastructure: A Computational Design Science Approach," 2024 (UT San Antonio).
  2. Amy Fangyu Lin, "Artificial Intelligence-Enabled Information Privacy Analytics and Risk Assessment," 2024 (UT San Antonio).
  3. Benjamin Ampel, "Securing Cyberspace: AI-Enabled Cyber-Adversary Defense," 2024 (Georgia State U).
  4. Mohammadreza (Reza) Ebrahimi, "AI-Enabled Cybersecurity Analytics: Detecting and Defending Against Cyber Threats," 2021 (University of South Florida). ICIS ACM SIGMIS Doctoral Dissertation Award.

2016 - 2020

  1. Hongyi Zhu, "Developing Smart and Unobtrusive Mobile Home Care: A Deep Learning Approach." 2019 (UT San Antonio).
  2. Shuo Yu, "Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach," 2019 (Texas Tech).
  3. Sagar Samtani, “Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach,” 2018 (University of South Florida; Indiana University). ICIS ACM SIGMIS Doctoral Dissertation Award, 2019; NSF CyberCorps Scholar for Service (SFS) Hall of Fame recipient, 2022.
  4. Weifeng Li, “Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities,” 2017 (University of Georgia).
  5. Victor Benjamin, “Securing Cyberspace: Analyzing Cybercriminal Communities Through Web and Text Mining Perspectives,” 2016 (Arizona State University).
  6. Xiao Liu, “Health Data Analytics: Data and Text Mining Approaches for Pharmacovigilance,” 2016 (University of Utah, Arizona State University).

2011 - 2015

  1. Shan (Jonathan) Jiang, "Statistical Modeling of Multi-Dimensional Knowledge Diffusion Networks: An ERGM-Based Framework." 2015.
  2. Yu-Kai Lin, "Health Analytics and Predictive Modeling: Four Essays on Health Informatics," 2015.
  3. David Zimbra, "Stakeholder and Sentiment Analysis in Web Forums," 2012.
  4. Yan (Mandy) Dang, "Theory-Informed Design and Evaluation of Web-Based Knowledge Management Systems," 2011.
  5. Yulei (Gavin) Zhang, "Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World," 2011.

2006 - 2010

  1. Hsinmin Lu, "Surveillance in the Information Age: Tex Quantification, Anomaly Detection, and Empirical Evaluation," 2010.
  2. Xin Li, "Graph-based Learning for Information Systems," 2009.
  3. Ahmed Abbasi, “Categorization, Analysis, and Visualization of Computer-Mediated Communication and Electronic Markets,” 2008.
  4. Sidd Kaza, “Instance, Evolution, and Predictive Modeling of Social Networks,” 2008.
  5. Jason Jiexin Li, “Feature Construction, Selection, and Consolidation for Knowledge Discovery,” 2007.
  6. Rob Schumaker, “Knowledge Acquisition, Delivery and Prediction through Text Mining,” 2007.
  7. Alan Gang Wang, “Entity Matching for Intelligent Information Integration,” 2006.
  8. Dan M. McDonald, “Combining Text Structure and Meaning to Support Text Mining,” 2006.
  9. Jialun Qin, “Facilitating Knowledge Discovery by Mining the Content and Link Structure of the Web,” 2006.
  10. Yilu Zhou, “Supporting Multilingual Internet Searching and Browsing,” 2006.

2000 - 2005

  1. Zan Huang, “Graph-based Analysis for E-Commerce Recommendation,” 2005 (Penn State University). International Conference on Information Systems (ICIS) 2005 Best Dissertation Award, December 2005.
  2. Jennifer Xu, “Mining Static and Dynamic Structural Patterns in Networks for Knowledge Management: A Computational Framework and Case Studies,” 2005 (Bentley College, Boston).
  3. Byron Marshall, “Concept Mapping in Informal Node-Link Knowledge Representations,” 2005 (Oregon State University).
  4. Wingyan Chung, “An Automatic Text Mining Framework for Knowledge Discovery on the Web,” 2004 (University of Texas at El Paso; Santa Clara University).
  5. Thian-Huat Ong, “Language and Domain-Independent Knowledge Maps: A Statistical Phrase Indexing Approach,” 2004 (Cal State University at Sacramento).
  6. Chienting Lin, “Examining Technology Usability and Acceptance in Digital Government: A Case Study in Law Enforcement,” 2004 (Pace University).
  7. Gondy Leroy, “Facilitating Knowledge Discovery by Integrating Bottom-up and Top-Down Knowledge Sources: A Text Mining Approach,” 2003 (Claremont Graduate University).
  8. Michael Chau, “Searching and Mining the Web for Personalized and Specialized Information,” 2003 (Hong Kong University)
  9. Bin Zhu, “Information Visualization for Knowledge Repositories: Applications and Impacts,” 2002 (Boston University). CHI 2001 Consortium Student.
  10. Dorbin T. Ng, “A Concept Space Approach to Semantic Exchange,” 2000 (Carnegie Mellon University).

1990 - 1999

  1. Dmitri Roussinov, “Information Foraging Through Automatic Clustering and Summarization: A Self-organizing Approach,” 1999 (Syracuse University, Arizona State University, University of Strathclyde, Scotland). CHI 1999 Consortium Student. 
  2. Andrea L. Houston, “Information Classification: Usability Studies of Two Automatic Approaches,” 1998 (Louisiana State University).
  3. Richard E. Orwig, “A Graphical Self-Organizing Approach to Classifying Electronic Meeting Output,” 1995 (Susquehanna University).
  4. Randy J. Johnson, “A Cognitive Approach to the Representation of Managerial Competitive Intelligence Knowledge,” 1994.