


default search action
Hsinchun Chen
Person information
- affiliation: University of Arizona, Tucson, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j280]Shuo Yu
, Yidong Chai
, Sagar Samtani
, Hongyan Liu
, Hsinchun Chen:
Motion Sensor-Based Fall Prevention for Senior Care: A Hidden Markov Model with Generative Adversarial Network Approach. Inf. Syst. Res. 35(1): 1-15 (2024) - [j279]Benjamin M. Ampel
, Sagar Samtani
, Hongyi Zhu, Hsinchun Chen, Jay F. Nunamaker Jr.:
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach. J. Manag. Inf. Syst. 41(1): 236-265 (2024) - [j278]Benjamin Ampel, Sagar Samtani
, Hongyi Zhu, Hsinchun Chen:
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach. MIS Q. 48(1): 137-166 (2024) - [j277]Fang Yu Lin, Sagar Samtani, Hongyi Zhu, Laura Brandimarte, Hsinchun Chen:
Automated Analysis of Changes in Privacy Policies: A Structured Self-Attentive Sentence Embedding Approach. MIS Q. 48(4): 1453-1482 (2024) - [c285]Mark W. Patton, Hsinchun Chen, Sagar Samtani, Hongyi Zhu:
Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI. HICSS 2024: 536-537 - [c284]Steven Ullman
, Benjamin M. Ampel
, Sagar Samtani
, Shanchieh Yang
, Hsinchun Chen
:
The 4th Workshop on Artificial Intelligence-enabled Cybersecurity Analytics. KDD 2024: 6741-6742 - [c283]Fang Yu Lin, Laura Brandimarte, Sue Brown, Hsinchun Chen:
Examining the Effect of Personalized PII Exposure Alerts on Individuals' Privacy Protection Motivation. MIPRO 2024: 1350-1355 - [i15]Brian Etter, James Lee Hu, Mohammedreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. CoRR abs/2402.02600 (2024) - 2023
- [j276]Sagar Samtani, Hongyi Zhu, Balaji Padmanabhan, Yidong Chai, Hsinchun Chen, Jay F. Nunamaker Jr.:
Deep Learning for Information Systems Research. J. Manag. Inf. Syst. 40(1): 271-301 (2023) - [j275]Mohammadreza Ebrahimi
, Yidong Chai
, Hao Helen Zhang, Hsinchun Chen:
Heterogeneous Domain Adaptation With Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity. IEEE Trans. Pattern Anal. Mach. Intell. 45(2): 1862-1875 (2023) - [c282]Benjamin Ampel, Yang Gao, James Lee Hu, Sagar Samtani, Hsinchun Chen:
Benchmarking the Robustness of Phishing Email Detection Systems. AMCIS 2023 - [c281]Brian Etter, James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. ICDM 2023: 101-109 - [c280]Brian Etter, James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. ICDM (Workshops) 2023: 1313-1321 - [c279]Benjamin Ampel, Kaeli Otto, Sagar Samtani
, Hsinchun Chen:
Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach. ISI 2023: 1-6 - [c278]Benjamin Ampel, Tala Vahedi
, Sagar Samtani
, Hsinchun Chen:
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach. ISI 2023: 1-6 - [c277]Sagar Samtani
, Shanchieh Yang
, Hsinchun Chen
:
The 3rd Workshop on Artificial Intelligence-enabled Cybersecurity Analytics. KDD 2023: 5880-5881 - [i14]Benjamin M. Ampel, Chi-Heng Yang, James Lee Hu, Hsinchun Chen:
Large Language Models for Conducting Advanced Text Analytics Information Systems Research. CoRR abs/2312.17278 (2023) - 2022
- [j274]Sagar Samtani
, Yidong Chai
, Hsinchun Chen
:
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model. MIS Q. 46(2): 911-946 (2022) - [j273]Mohammadreza Ebrahimi
, Yidong Chai
, Sagar Samtani
, Hsinchun Chen
:
Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning. MIS Q. 46(2): 1209-1226 (2022) - [j272]Sagar Samtani
, Hsinchun Chen, Murat Kantarcioglu
, Bhavani Thuraisingham:
Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI). IEEE Trans. Dependable Secur. Comput. 19(4): 2149-2150 (2022) - [j271]Bo Wen, Paul Jen-Hwa Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Key Factors Affecting User Adoption of Open-Access Data Repositories in Intelligence and Security Informatics: An Affordance Perspective. ACM Trans. Manag. Inf. Syst. 13(1): 10:1-10:24 (2022) - [j270]Ning Zhang, Mohammadreza Ebrahimi
, Weifeng Li
, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. ACM Trans. Manag. Inf. Syst. 13(2): 21:1-21:21 (2022) - [c276]James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li
, Xin Li, Hsinchun Chen:
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants. ICDM (Workshops) 2022: 1-8 - [c275]MohammadReza Ebrahimi, Weifeng Li
, Yidong Chai, Jason Pacheco, Hsinchun Chen:
An Adversarial Reinforcement Learning Framework for Robust Machine Learning-based Malware Detection. ICDM (Workshops) 2022: 567-576 - [c274]Sagar Samtani
, Gang Wang, Ali Ahmadzadeh, Arridhana Ciptadi, Shanchieh Yang, Hsinchun Chen:
ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense. KDD 2022: 4900-4901 - [i13]Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. CoRR abs/2201.02799 (2022) - [i12]Xin Li, Hsinchun Chen, Jiexun Li, Zhu Zhang:
Gene Function Prediction with Gene Interaction Networks: A Context Graph Kernel Approach. CoRR abs/2204.10473 (2022) - [i11]Xin Li, Hsinchun Chen, Zan Huang, Hua Su, Jesse D. Martinez:
Global Mapping of Gene/Protein Interactions in PubMed Abstracts: A Framework and an Experiment with P53 Interactions. CoRR abs/2204.10476 (2022) - [i10]Mohammadreza Ebrahimi, Yidong Chai, Hao Helen Zhang, Hsinchun Chen:
Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity. CoRR abs/2205.07853 (2022) - [i9]James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants. CoRR abs/2210.15429 (2022) - 2021
- [j269]Sagar Samtani
, Weifeng Li
, Victor A. Benjamin, Hsinchun Chen:
Informing Cyber Threat Intelligence through Dark Web Situational Awareness: The AZSecure Hacker Assets Portal. DTRAP 2(4): 27:1-27:10 (2021) - [j268]Shuo Yu, Yidong Chai, Hsinchun Chen, Randall A. Brown, Scott J. Sherman, Jay F. Nunamaker Jr.:
Fall Detection with Wearable Sensors: A Hierarchical Attention-based Convolutional Neural Network Approach. J. Manag. Inf. Syst. 38(4): 1095-1121 (2021) - [j267]Hongyi Zhu
, Sagar Samtani
, Randall A. Brown, Hsinchun Chen:
A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns. MIS Q. 45(2) (2021) - [j266]Qing Li
, Jinghua Tan
, Jun Wang
, Hsinchun Chen:
A Multimodal Event-Driven LSTM Model for Stock Prediction Using Online News. IEEE Trans. Knowl. Data Eng. 33(10): 3323-3337 (2021) - [j265]Sagar Samtani
, Murat Kantarcioglu, Hsinchun Chen:
A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems. ACM Trans. Manag. Inf. Syst. 12(1): 1:1-1:18 (2021) - [c273]Benjamin Ampel, Hsinchun Chen:
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics. ISI 2021: 1-3 - [c272]James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. ISI 2021: 1-6 - [c271]Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li
, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. ISI 2021: 1-6 - [c270]Kaeli Otto, Benjamin Ampel, Sagar Samtani
, Hongyi Zhu
, Hsinchun Chen:
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. ISI 2021: 1-6 - [c269]Tala Vahedi
, Benjamin Ampel, Sagar Samtani, Hsinchun Chen:
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach. ISI 2021: 1-6 - [c268]Sagar Samtani
, Shanchieh Yang, Hsinchun Chen:
ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics. KDD 2021: 4153-4154 - [c267]Mohammadreza Ebrahimi, Jason Pacheco, Weifeng Li
, James Lee Hu, Hsinchun Chen:
Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces. SP (Workshops) 2021: 85-91 - [i8]Benjamin Ampel, Sagar Samtani, Steven Ullman, Hsinchun Chen:
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach. CoRR abs/2108.01696 (2021) - [i7]Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. CoRR abs/2111.09415 (2021) - [i6]James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen:
Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach. CoRR abs/2112.01724 (2021) - 2020
- [j264]Mandy Yan Dang, Gavin Yulei Zhang, Susan A. Brown
, Hsinchun Chen:
Examining the impacts of mental workload and task-technology fit on user acceptance of the social media search system. Inf. Syst. Frontiers 22(3): 697-718 (2020) - [j263]Gavin Yulei Zhang, Mandy Yan Dang, Hsinchun Chen:
An Explorative Study on the Virtual World: Investigating the Avatar Gender and Avatar Age Differences in their Social Interactions for Help-Seeking. Inf. Syst. Frontiers 22(4): 911-925 (2020) - [j262]Hongyi Zhu
, Sagar Samtani
, Hsinchun Chen, Jay F. Nunamaker Jr.:
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach. J. Manag. Inf. Syst. 37(2): 457-483 (2020) - [j261]Mohammadreza Ebrahimi, Jay F. Nunamaker Jr., Hsinchun Chen:
Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach. J. Manag. Inf. Syst. 37(3): 694-722 (2020) - [j260]Michael Chau
, Tim M. H. Li
, Paul W. C. Wong, Jennifer J. Xu, Paul Siu Fai Yip, Hsinchun Chen:
Finding People with Emotional Distress in Online Social Media: A Design Combining Machine Learning and Rule-Based Classification. MIS Q. 44(2) (2020) - [j259]Sagar Samtani
, Hongyi Zhu
, Hsinchun Chen:
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF). ACM Trans. Priv. Secur. 23(4): 21:1-21:33 (2020) - [j258]Shan Jiang
, Hsinchun Chen:
Corrections to "NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks". IEEE Trans. Knowl. Data Eng. 32(12): 2500 (2020) - [j257]Faizan Ahmad, Ahmed Abbasi
, Jingjing Li, David G. Dobolyi
, Richard G. Netemeyer, Gari D. Clifford, Hsinchun Chen:
A Deep Learning Architecture for Psychometric Natural Language Processing. ACM Trans. Inf. Syst. 38(1): 6:1-6:29 (2020) - [c266]Fang Yu Lin, Yizhi Liu, Mohammadreza Ebrahimi, Zara Ahmad-Post, James Lee Hu, Jingyu Xin, Sagar Samtani
, Weifeng Li
, Hsinchun Chen:
Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach. ICDM (Workshops) 2020: 488-495 - [c265]Benjamin Ampel, Sagar Samtani
, Hongyi Zhu
, Steven Ullman
, Hsinchun Chen:
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. ISI 2020: 1-6 - [c264]Ben Lazarine, Sagar Samtani
, Mark W. Patton, Hongyi Zhu
, Steven Ullman
, Benjamin Ampel, Hsinchun Chen:
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. ISI 2020: 1-6 - [c263]Yizhi Liu, Fang Yu Lin, Zara Ahmad-Post, Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li
, Hsinchun Chen:
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web. ISI 2020: 1-6 - [c262]Steven Ullman
, Sagar Samtani
, Ben Lazarine, Hongyi Zhu
, Benjamin Ampel, Mark W. Patton, Hsinchun Chen:
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. ISI 2020: 1-6 - [c261]Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li
, Hsinchun Chen:
A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web. ISI 2020: 1-6 - [c260]Mohammadreza Ebrahimi, Sagar Samtani
, Yidong Chai, Hsinchun Chen:
Detecting Cyber Threats in Non-English Hacker Forums: An Adversarial Cross-Lingual Knowledge Transfer Approach. SP (Workshops) 2020: 20-26 - [i5]Sagar Samtani, Hongyi Zhu
, Balaji Padmanabhan, Yidong Chai, Hsinchun Chen:
Deep Learning for Information Systems Research. CoRR abs/2010.05774 (2020) - [i4]Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Muhammad Taqi Raza, Hsinchun Chen:
Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model. CoRR abs/2012.07994 (2020)
2010 – 2019
- 2019
- [j256]Yu-Kai Lin
, Mingfeng Lin
, Hsinchun Chen:
Do Electronic Health Records Affect Quality of Care? Evidence from the HITECH Act. Inf. Syst. Res. 30(1): 306-318 (2019) - [j255]Victor A. Benjamin, Joseph S. Valacich, Hsinchun Chen:
DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics. MIS Q. 43(1) (2019) - [j254]Shan Jiang
, Hsinchun Chen:
Examining patterns of scientific knowledge diffusion based on knowledge cyber infrastructure: a multi-dimensional network approach. Scientometrics 121(3): 1599-1617 (2019) - [j253]Shuo Yu
, Hongyi Zhu
, Shan Jiang, Yong Zhang, Chunxiao Xing
, Hsinchun Chen:
Emoticon Analysis for Chinese Social Media and E-commerce: The AZEmo System. ACM Trans. Manag. Inf. Syst. 9(4): 16:1-16:22 (2019) - [c259]Benjamin Ampel, Mark W. Patton, Hsinchun Chen:
Performance Modeling of Hyperledger Sawtooth Blockchain. ISI 2019: 59-61 - [c258]Nolan Arnold, Mohammadreza Ebrahimi, Ning Zhang, Ben Lazarine, Mark W. Patton, Hsinchun Chen, Sagar Samtani
:
Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool. ISI 2019: 92-97 - [c257]Po-Yi Du, Mohammadreza Ebrahimi, Ning Zhang, Hsinchun Chen, Randall A. Brown, Sagar Samtani
:
Identifying High-Impact Opioid Products and Key Sellers in Dark Net Marketplaces: An Interpretable Text Analytics Approach. ISI 2019: 110-115 - [e35]Hsinchun Chen, Daniel Zeng, Xiangbin Yan, Chunxiao Xing:
Smart Health - International Conference, ICSH 2019, Shenzhen, China, July 1-2, 2019, Proceedings. Lecture Notes in Computer Science 11924, Springer 2019, ISBN 978-3-030-34481-8 [contents] - 2018
- [j252]Sagar Samtani
, Shuo Yu, Hongyi Zhu
, Mark W. Patton, John Matherly, Hsinchun Chen:
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach. IEEE Intell. Syst. 33(2): 63-73 (2018) - [j251]Hongyi Zhu
, Hsinchun Chen, Randall A. Brown:
A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care. J. Biomed. Informatics 84: 148-158 (2018) - [j250]Mandy Yan Dang, Gavin Yulei Zhang, Hsinchun Chen:
Adoption of Social Media Search Systems: An IS Success Model Perspective. Pac. Asia J. Assoc. Inf. Syst. 10(2): 4 (2018) - [j249]Shuo Yu
, Hsinchun Chen, Randall A. Brown:
Hidden Markov Model-Based Fall Detection With Motion Sensor Orientation Calibration: A Case for Real-Life Home Monitoring. IEEE J. Biomed. Health Informatics 22(6): 1847-1853 (2018) - [j248]Qing Li
, Yan Chen, Jun Wang, Yuanzhu Chen, Hsinchun Chen:
Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective. IEEE Trans. Knowl. Data Eng. 30(2): 381-399 (2018) - [j247]Weifeng Li
, Junming Yin, Hsinchun Chen:
Supervised Topic Modeling Using Hierarchical Dirichlet Process-Based Inverse Regression: Experiments on E-Commerce Applications. IEEE Trans. Knowl. Data Eng. 30(6): 1192-1205 (2018) - [j246]David Zimbra, Ahmed Abbasi
, Daniel Zeng, Hsinchun Chen:
The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation. ACM Trans. Manag. Inf. Syst. 9(2): 5:1-5:29 (2018) - [c256]Shuo Yu, Hsinchun Chen, Randall A. Brown, Scott J. Sherman:
Motion Sensor-Based Assessment on Fall Risk and Parkinson's Disease Severity: A Deep Multi-Source Multi-Task Learning (DMML) Approach. ICHI 2018: 174-179 - [c255]Po-Yi Du, Ning Zhang, Mohammadreza Ebrahimi, Sagar Samtani
, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer, Hsinchun Chen:
Identifying, Collecting, and Presenting Hacker Community Data: Forums, IRC, Carding Shops, and DNMs. ISI 2018: 70-75 - [c254]Mohammadreza Ebrahimi, Mihai Surdeanu, Sagar Samtani
, Hsinchun Chen:
Detecting Cyber Threats in Non-English Dark Net Markets: A Cross-Lingual Transfer Learning Approach. ISI 2018: 85-90 - [c253]Ryan Williams, Sagar Samtani
, Mark W. Patton, Hsinchun Chen:
Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study. ISI 2018: 94-99 - [c252]Emma McMahon, Mark W. Patton, Sagar Samtani
, Hsinchun Chen:
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency. ISI 2018: 100-105 - [c251]Christopher R. Harrell, Mark W. Patton, Hsinchun Chen, Sagar Samtani
:
Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions. ISI 2018: 148-153 - [e34]Hsinchun Chen, Qing Fang, Daniel Zeng, Jiang Wu:
Smart Health - International Conference, ICSH 2018, Wuhan, China, July 1-3, 2018, Proceedings. Lecture Notes in Computer Science 10983, Springer 2018, ISBN 978-3-030-03648-5 [contents] - 2017
- [j245]Yulei Zhang, Yan Dang, Susan A. Brown
, Hsinchun Chen:
Investigating the impacts of avatar gender, avatar age, and region theme on avatar physical activity in the virtual world. Comput. Hum. Behav. 68: 378-387 (2017) - [j244]Sagar Samtani
, Ryan Chinn, Hsinchun Chen, Jay F. Nunamaker Jr.:
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence. J. Manag. Inf. Syst. 34(4): 1023-1053 (2017) - [j243]Yu-Kai Lin, Hsinchun Chen, Randall A. Brown, Shu-Hsing Li, Hung-Jen Yang:
Healthcare Predictive Analytics for Risk Profiling in Chronic Care: A Bayesian Multitask Learning Approach. MIS Q. 41(2): 473-495 (2017) - [j242]Wei Shang, Hsinchun Chen, Christine Livoti:
Adverse drug reaction early warning using user search data. Online Inf. Rev. 41(4): 524-536 (2017) - [c250]John Grisham, Sagar Samtani
, Mark W. Patton, Hsinchun Chen:
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. ISI 2017: 13-18 - [c249]Malaka El, Emma McMahon, Sagar Samtani
, Mark W. Patton, Hsinchun Chen:
Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. ISI 2017: 83-88 - [c248]Emma McMahon, Ryan Williams, Malaka El, Sagar Samtani
, Mark W. Patton, Hsinchun Chen:
Assessing medical device vulnerabilities on the Internet of Things. ISI 2017: 176-178 - [c247]Ryan Williams, Emma McMahon, Sagar Samtani
, Mark W. Patton, Hsinchun Chen:
Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach. ISI 2017: 179-181 - [e33]Hsinchun Chen, Daniel Dajun Zeng, Elena Karahanna, Indranil R. Bardhan:
Smart Health - International Conference, ICSH 2017, Hong Kong, China, June 26-27, 2017, Proceedings. Lecture Notes in Computer Science 10347, Springer 2017, ISBN 978-3-319-67963-1 [contents] - [e32]G. Alan Wang, Michael Chau, Hsinchun Chen:
Intelligence and Security Informatics - 12th Pacific Asia Workshop, PAISI 2017, Jeju Island, South Korea, May 23, 2017, Proceedings. Lecture Notes in Computer Science 10241, 2017, ISBN 978-3-319-57462-2 [contents] - 2016
- [j241]Victor A. Benjamin, Bin Zhang, Jay F. Nunamaker Jr., Hsinchun Chen:
Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities. J. Manag. Inf. Syst. 33(2): 482-510 (2016) - [j240]Weifeng Li
, Hsinchun Chen, Jay F. Nunamaker Jr.:
Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System. J. Manag. Inf. Syst. 33(4): 1059-1086 (2016) - [j239]Shan Jiang, Hsinchun Chen:
NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks. IEEE Trans. Knowl. Data Eng. 28(3): 729-740 (2016) - [j238]Qing Li, Yuanzhu Chen, LiLing Jiang, Ping Li, Hsinchun Chen:
A Tensor-Based Information Framework for Predicting the Stock Market. ACM Trans. Inf. Syst. 34(2): 11:1-11:30 (2016) - [c246]Xinhuan Chen, Yong Zhang, Jennifer Xu, Chunxiao Xing
, Hsinchun Chen:
Deep Learning Based Topic Identification and Categorization: Mining Diabetes-Related Topics on Chinese Health Websites. DASFAA (1) 2016: 481-500 - [c245]Shan Jiang, Hsinchun Chen:
NATERGM: A model for examining the role of Nodal Attributes in dynamic social media networks. ICDE 2016: 1458-1459 - [c244]Weifeng Li, Junming Yin, Hsinchun Chen:
Identifying High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model. ICIS 2016 - [c243]Lubaina Maimoon, Joshua Chuang, Hongyi Zhu
, Shuo Yu, Kuo-Shiuan Peng, Rahul Prayakarao, Jie Bai, Daniel Dajun Zeng, Shu-Hsing Li, Hsin-Min Lu
, Hsinchun Chen:
SilverLink: Developing an International Smart and Connected Home Monitoring System for Senior Care. ICSH 2016: 65-77 - [c242]Xiao Liu, Hsinchun Chen:
AZPharm MetaAlert: A Meta-learning Framework for Pharmacovigilance. ICSH 2016: 147-154 - [c241]Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing
, Weifeng Li
, Hsinchun Chen:
Exploring key hackers and cybersecurity threats in Chinese hacker communities. ISI 2016: 13-18 - [c240]Sagar Samtani
, Kory Chinn, Cathy Larson, Hsinchun Chen:
AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis. ISI 2016: 19-24 - [c239]Sagar Samtani
, Shuo Yu, Hongyi Zhu
, Mark W. Patton, Hsinchun Chen:
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. ISI 2016: 25-30 - [c238]Kangzhi Zhao, Yong Zhang, Chunxiao Xing
, Weifeng Li
, Hsinchun Chen:
Chinese underground market jargon analysis based on unsupervised learning. ISI 2016: 97-102 - [c237]Shin-Ying Huang, Hsinchun Chen:
Exploring the online underground marketplaces through topic-based social network and clustering. ISI 2016: 145-150 - [c236]