Name
Affiliation
Papers
HSINCHUN CHEN
University of Arizona
506
Collaborators
Citations 
PageRank 
616
9569
813.33
Referers 
Referees 
References 
16111
7053
6511
Search Limit
1001000
Title
Citations
PageRank
Year
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics00.342021
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach00.342021
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web00.342020
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach00.342020
Corrections to “NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks”00.342020
Emoticon Analysis for Chinese Social Media and E-commerce: The AZEmo System.00.342019
A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care.00.342018
The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation.70.432018
Hidden Markov Model-Based Fall Detection With Motion Sensor Orientation Calibration: A Case for Real-Life Home Monitoring.60.512018
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System (CPS) Resiliency00.342018
Healthcare predictive analytics for risk profiling in chronic care: a Bayesian multitask learning approach80.462017
AZPharm MetaAlert: A Meta-learning Framework for Pharmacovigilance.00.342016
Deep Learning Based Topic Identification and Categorization: Mining Diabetes-Related Topics on Chinese Health Websites.10.362016
Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System.40.442016
SCADA honeypots: An in-depth analysis of Conpot60.712016
AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis20.402016
Stakeholder Analyses of Firm-Related Web Forums: Applications in Stock Return Prediction80.452015
Tensor-Based Learning For Predicting Stock Movements100.512015
Exploring hacker assets in underground forums130.972015
Text mining self-disclosing health information for public health service10.362014
DiabeticLink: a health big data system for patient empowerment and personalized healthcare40.542013
A Statistical Learning Based System for Fake Website Detection.20.372013
Securing cyberspace: Identifying key actors in hacker communities.110.862012
An SIR model for violent topic diffusion in social media50.682011
Dynamic user-level affect analysis in social media: Modeling violence in the Dark Web20.362011
Building a social media digital library: collection, management, and analytics10.352011
Knowledge mapping for rapidly evolving domains: A design science approach180.742011
Exploiting Emotions in Social Interactions to Detect Online Social Communities.10.372010
Global disease surveillance using social media: HIV/AIDS content intervention in web forums10.352010
Trends & Controversies20.392010
Social Media Analytics and Intelligence412.042010
Text-based video content classification for online video-sharing sites210.772010
Developing a Dark Web collection and infrastructure for computational and social sciences150.882010
Using Open Web APIs in Teaching Web Mining50.642009
IEDs in the dark web: Lexicon expansion and genre classification00.342009
Business stakeholder analyzer: An experiment of classifying stakeholders on the Web180.622009
Gender difference analysis of political web forums: An experiment on an international islamic women's forum20.382009
The Strategic Co-Alignment for Implementing Information Systems in E-Government.00.342009
AI, E-government, and Politics 2.0161.692009
Uncovering the dark Web: A case study of Jihad on the Web342.092008
Guest Editors' Introduction: Special Section on Intelligence and Security Informatics00.342008
Evaluating a news-aware quantitative trader: The effect of momentum and contrarian stock selection strategies150.882008
Mapping Dark Web Geolocation00.342008
Examining Agencies' Satisfaction with Electronic Record Management Systems in e-Government: A Large-Scale Survey Study.00.342008
BioPortal Infectious Disease Informatics research: disease surveillance and situational awareness00.342008
Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings534.512008
Using importance flooding to identify interesting networks of criminal activity110.562008
Discovery Of Improvised Explosive Device Content In The Dark Web10.432008
Automated criminal link analysis based on domain knowledge140.652007
Building a directory for the underdeveloped web: an experiment on the Arabic medical web directory00.342007
  • 1
  • 2