Follow
Hongyi Zhu
Title
Cited by
Cited by
Year
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques
S Samtani, S Yu, H Zhu, M Patton, H Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 25-30, 2016
802016
Proactively identifying emerging hacker threats from the dark web: A diachronic graph embedding framework (d-gef)
S Samtani, H Zhu, H Chen
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-33, 2020
602020
Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach
S Samtani, S Yu, H Zhu, M Patton, J Matherly, H Chen
IEEE Intelligent Systems 33 (2), 63-73, 2018
54*2018
A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns
H Zhu, S Samtani, R Brown, H Chen
MIS Quarterly 45 (2), 859-896, 2021
482021
Human identification for activities of daily living: A deep transfer learning approach
H Zhu, S Samtani, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 37 (2), 457-483, 2020
452020
A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care
H Zhu, H Chen, R Brown
Journal of biomedical informatics 84, 148-158, 2018
402018
International perspective on nanotechnology papers, patents, and NSF awards (2000–2016)
H Zhu, S Jiang, H Chen, MC Roco
Journal of Nanoparticle Research 19 (11), 370, 2017
342017
Labeling hacker exploits for proactive cyber threat intelligence: a deep transfer learning approach
B Ampel, S Samtani, H Zhu, S Ullman, H Chen
2020 IEEE international conference on intelligence and security informatics …, 2020
322020
Comparing nanotechnology landscapes in the US and China: a patent analysis perspective
L Wu, H Zhu, H Chen, MC Roco
Journal of nanoparticle research 21, 1-20, 2019
312019
SilverLink: smart home health monitoring for senior care
J Chuang, L Maimoon, S Yu, H Zhu, C Nybroe, O Hsiao, SH Li, H Lu, ...
Smart Health: International Conference, ICSH 2015, Phoenix, AZ, USA …, 2016
242016
Deep learning for information systems research
S Samtani, H Zhu, B Padmanabhan, Y Chai, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 40 (1), 271-301, 2023
202023
Identifying vulnerable GitHub repositories and users in scientific cyberinfrastructure: An unsupervised graph embedding approach
B Lazarine, S Samtani, M Patton, H Zhu, S Ullman, B Ampel, H Chen
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
202020
Emoticon analysis for Chinese social media and e-commerce: The AZEmo system
S Yu, H Zhu, S Jiang, Y Zhang, C Xing, H Chen
ACM Transactions on Management Information Systems (TMIS) 9 (4), 1-22, 2019
132019
SilverLink: developing an international smart and connected home monitoring system for senior care
L Maimoon, J Chuang, H Zhu, S Yu, KS Peng, R Prayakarao, J Bai, ...
Smart Health: International Conference, ICSH 2016, Haikou, China, December …, 2017
122017
Smart vulnerability assessment for scientific cyberinfrastructure: An unsupervised graph embedding approach
S Ullman, S Samtani, B Lazarine, H Zhu, B Ampel, M Patton, H Chen
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
92020
Additive feature attribution explainable methods to craft adversarial attacks for text classification and text regression
Y Chai, R Liang, S Samtani, H Zhu, M Wang, Y Liu, Y Jiang
IEEE Transactions on Knowledge and Data Engineering, 2023
62023
Fear appeals and information security behaviors: An empirical study on Mechanical Turk
S Samtani, H Zhu, S Yu
AIS Transactions on Replication Research 5 (1), 5, 2019
62019
Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations
B Lazarine, Z Zhang, A Sachdeva, S Samtani, H Zhu
Proceedings of the 15th Workshop on Cyber Security Experimentation and Test …, 2022
32022
Emoticon analysis for chinese health and fitness topics
S Yu, H Zhu, S Jiang, H Chen
Smart Health: International Conference, ICSH 2014, Beijing, China, July 10 …, 2014
32014
CREATING PROACTIVE CYBER THREAT INTELLIGENCE WITH HACKER EXPLOIT LABELS: A DEEP TRANSFER LEARNING APPROACH.
BM Ampel, S Samtani, H Zhu, H Chen
MIS Quarterly 48 (1), 2024
22024
The system can't perform the operation now. Try again later.
Articles 1–20