Hsinchun Chen

Hsinchun Chen

Professor, Management Information Systems
Regents Professor
Member of the Graduate Faculty
Professor, BIO5 Institute
Primary Department
Contact
(520) 621-4153

Research Interest

Dr Chen's areas of expertise include:Security informatics, security big data; smart and connected health, health analytics; data, text, web mining.Digital library, intelligent information retrieval, automatic categorization and classification, machine learning for IR, large-scale information analysis and visualization.Internet resource discovery, digital libraries, IR for large-scale scientific and business databases, customized IR, multilingual IR.Knowledge-based systems design, knowledge discovery in databases, hypertext systems, machine learning, neural networks computing, genetic algorithms, simulated annealing.Cognitive modeling, human-computer interactions, IR behaviors, human problem-solving process.

Publications

Chen, H. (2011). Social intelligence and cultural awareness. IEEE Intelligent Systems, 26(4), 80-84.

Abstract:

The Board on Human-Systems Integration of the US National Research Council (NRC) held a workshop on Unifying Social Frameworks: Sociocultural Data to Accomplish Department of Defense Missions from 16-17 August 2010. Presenters and discussants addressed the variables and complex influenced human behavior, focusing on potential applications to the full spectrum of military operations. Major General Michael T. Flynn of the US Army, delivered the keynote address providing vital information about the cultural situation and needs of the military operating in Afghanistan. Two themes emerged from the workshop, including a theme focusing on data, its collection, its use in models, and the value of analyzing large collections of sociocultural data to identify the groups and individuals that are expected to pose risks in a particular environment.

Lin, Y., Lin, Y., Lin, M., Lin, M., Chen, H., & Chen, H. (2014). Does Meaningful Use Improve Hospital Quality of Care?. Information Systems Research.
Qin, J., Zhou, Y., Xu, J. J., & Chen, H. (2005). Studying the structure of terrorist networks: A web structural mining approach. Association for Information Systems - 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale, 2, 523-530.

Abstract:

Because terrorist organizations often operate in network forms where individual terrorists collaborate with each other to carry out attacks, we could gain valuable knowledge about the terrorist organizations by studying structural properties of such terrorist networks. However, previous studies of terrorist network structure have generated little actionable results. This is due to the difficulty in collecting and accessing reliable data and the lack of advanced network analysis methodologies in the field. To address these problems, we introduced the Web structural mining technique into the terrorist network analysis field which, to the best our knowledge, has never been done before. We employed the proposed technique on a Global Salafi Jihad network dataset collected through a large scale empirical study. Results from our analysis not only provide insights for terrorism research community but also support decision making in law-reinforcement, intelligence, and security domains to make our nation safer.

Xin, L. i., Zhang, Z., Chen, H., & Jiexun, L. i. (2007). Graph kernel-based learning for gene function prediction from gene interaction network. Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007, 368-373.

Abstract:

Prediction of gene functions is a major challenge to biologists in the post-genomic era. Interactions between genes and their products compose networks and can be used to infer gene functions. Most previous studies used heuristic approaches based on either local or global information of gene interaction networks to assign unknown gene functions. In this study, we propose a graph kernel-based method that can capture the structure of gene interaction networks to predict gene functions. We conducted an experimental study on a test-bed of P53-related genes. The experimental results demonstrated better performance for our proposed method as compared with baseline methods. © 2007 IEEE.

Chen, H., Thoms, S., & Tianjun, F. u. (2008). Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups. IEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008, 98-103.

Abstract:

As part of the NSF-funded Dark Web research project, this paper presents an exploratory study of cyber extremism on the Web 2.0 media: blogs, YouTube, and Second Life. We examine international Jihadist extremist groups that use each of these media. We observe that these new, interactive, multimedia-rich forms of communication provide effective means for extremists to promote their ideas, share resources, and communicate among each other. The development of automated collection and analysis tools for Web 2.0 can help policy makers, intelligence analysts, and researchers to better understand extremists' ideas and communication patterns, which may lead to strategies that can counter the threats posed by extremists in the second-generation Web. ©2008 IEEE.