Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques S Samtani, S Yu, H Zhu, M Patton, H Chen 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 25-30, 2016 | 80 | 2016 |
Proactively identifying emerging hacker threats from the dark web: A diachronic graph embedding framework (d-gef) S Samtani, H Zhu, H Chen ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-33, 2020 | 60 | 2020 |
Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach S Samtani, S Yu, H Zhu, M Patton, J Matherly, H Chen IEEE Intelligent Systems 33 (2), 63-73, 2018 | 54* | 2018 |
A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns H Zhu, S Samtani, R Brown, H Chen MIS Quarterly 45 (2), 859-896, 2021 | 48 | 2021 |
Human identification for activities of daily living: A deep transfer learning approach H Zhu, S Samtani, H Chen, JF Nunamaker Jr Journal of Management Information Systems 37 (2), 457-483, 2020 | 45 | 2020 |
A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care H Zhu, H Chen, R Brown Journal of biomedical informatics 84, 148-158, 2018 | 40 | 2018 |
International perspective on nanotechnology papers, patents, and NSF awards (2000–2016) H Zhu, S Jiang, H Chen, MC Roco Journal of Nanoparticle Research 19 (11), 370, 2017 | 34 | 2017 |
Labeling hacker exploits for proactive cyber threat intelligence: a deep transfer learning approach B Ampel, S Samtani, H Zhu, S Ullman, H Chen 2020 IEEE international conference on intelligence and security informatics …, 2020 | 32 | 2020 |
Comparing nanotechnology landscapes in the US and China: a patent analysis perspective L Wu, H Zhu, H Chen, MC Roco Journal of nanoparticle research 21, 1-20, 2019 | 31 | 2019 |
SilverLink: smart home health monitoring for senior care J Chuang, L Maimoon, S Yu, H Zhu, C Nybroe, O Hsiao, SH Li, H Lu, ... Smart Health: International Conference, ICSH 2015, Phoenix, AZ, USA …, 2016 | 24 | 2016 |
Deep learning for information systems research S Samtani, H Zhu, B Padmanabhan, Y Chai, H Chen, JF Nunamaker Jr Journal of Management Information Systems 40 (1), 271-301, 2023 | 20 | 2023 |
Identifying vulnerable GitHub repositories and users in scientific cyberinfrastructure: An unsupervised graph embedding approach B Lazarine, S Samtani, M Patton, H Zhu, S Ullman, B Ampel, H Chen 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 20 | 2020 |
Emoticon analysis for Chinese social media and e-commerce: The AZEmo system S Yu, H Zhu, S Jiang, Y Zhang, C Xing, H Chen ACM Transactions on Management Information Systems (TMIS) 9 (4), 1-22, 2019 | 13 | 2019 |
SilverLink: developing an international smart and connected home monitoring system for senior care L Maimoon, J Chuang, H Zhu, S Yu, KS Peng, R Prayakarao, J Bai, ... Smart Health: International Conference, ICSH 2016, Haikou, China, December …, 2017 | 12 | 2017 |
Smart vulnerability assessment for scientific cyberinfrastructure: An unsupervised graph embedding approach S Ullman, S Samtani, B Lazarine, H Zhu, B Ampel, M Patton, H Chen 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 9 | 2020 |
Additive feature attribution explainable methods to craft adversarial attacks for text classification and text regression Y Chai, R Liang, S Samtani, H Zhu, M Wang, Y Liu, Y Jiang IEEE Transactions on Knowledge and Data Engineering, 2023 | 6 | 2023 |
Fear appeals and information security behaviors: An empirical study on Mechanical Turk S Samtani, H Zhu, S Yu AIS Transactions on Replication Research 5 (1), 5, 2019 | 6 | 2019 |
Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations B Lazarine, Z Zhang, A Sachdeva, S Samtani, H Zhu Proceedings of the 15th Workshop on Cyber Security Experimentation and Test …, 2022 | 3 | 2022 |
Emoticon analysis for chinese health and fitness topics S Yu, H Zhu, S Jiang, H Chen Smart Health: International Conference, ICSH 2014, Beijing, China, July 10 …, 2014 | 3 | 2014 |
CREATING PROACTIVE CYBER THREAT INTELLIGENCE WITH HACKER EXPLOIT LABELS: A DEEP TRANSFER LEARNING APPROACH. BM Ampel, S Samtani, H Zhu, H Chen MIS Quarterly 48 (1), 2024 | 2 | 2024 |