Hsinchun Chen

Hsinchun Chen

Professor, Management Information Systems
Regents Professor
Member of the Graduate Faculty
Professor, BIO5 Institute
Primary Department
Contact
(520) 621-4153

Research Interest

Dr Chen's areas of expertise include:Security informatics, security big data; smart and connected health, health analytics; data, text, web mining.Digital library, intelligent information retrieval, automatic categorization and classification, machine learning for IR, large-scale information analysis and visualization.Internet resource discovery, digital libraries, IR for large-scale scientific and business databases, customized IR, multilingual IR.Knowledge-based systems design, knowledge discovery in databases, hypertext systems, machine learning, neural networks computing, genetic algorithms, simulated annealing.Cognitive modeling, human-computer interactions, IR behaviors, human problem-solving process.

Publications

Chen, H., & She, L. (1994). Inductive query by examples (IQBE): A machine learning approach. Proceedings of the Hawaii International Conference on System Sciences, 3, 428-437.

Abstract:

This paper presents an incremental, inductive learning approach to query-by-examples for information retrieval (IR) and database management systems (DBMS). After briefly reviewing conventional information retrieval techniques and the prevailing database query paradigms, we introduce the ID5R algorithm, previously developed by Utgoff, for `intelligent' and system-supported query processing.

Wang, A. G., Atabakhsh, H., Petersen, T., & Chen, H. (2005). Discovering identity problems: A case study. Lecture Notes in Computer Science, 3495, 368-373.

Abstract:

Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5%) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30% of the suspects had used a false identity (i.e., intentional deception), while 42% had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings. © Springer-Verlag Berlin Heidelberg 2005.

Zhang, Y., Ximing, Y. u., Dang, Y., & Chen, H. (2010). An integrated framework for avatar data collection from the virtual world. IEEE Intelligent Systems, 25(6), 17-23.

Abstract:

To mine the rich social media data produced in virtual worlds, an integrated framework combines bot- and spider-based approaches to collect avatar behavioral and profile data. © 2010 IEEE.

Liu, X., & Chen, H. (2015). A Research Framework for Pharmacovigilance in Health Social Media: Identification and Evaluation of Patient Adverse Drug Event Reports. JOURNAL OF BIOMEDICAL INFORMATICS, 58, 268-279.
Kaza, S., Wang, Y., & Chen, H. (2006). Suspect vehicle identification for border safety with modified mutual information. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3975 LNCS, 308-318.

Abstract:

The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. Customs and Border Protection agents believe that vehicles involved in illegal activity operate in groups. If the criminal links of one vehicle are known then their border crossing patterns can be used to identify other partner vehicles. We perform this association analysis by using mutual information (MI) to identify pairs of vehicles that are potentially involved in criminal activity. Domain experts also suggest that criminal vehicles may cross at certain times of the day to evade inspection. We propose to modify the mutual information formulation to include this heuristic by using cross-jurisdictional criminal data from border-area jurisdictions. We find that the modified MI with time heuristics performs better than classical MI in identifying potentially criminal vehicles. © Springer-Verlag Berlin Heidelberg 2006.