Research Output 1993 2019

Filter
Chapter
2018
1 Citation (Scopus)

How can fact encourage collaboration and selfcorrection?

VanLehn, K., Burkhardt, H., Cheema, S., Pead, D., Schoenfeld, A. & Wetzel, J., Jan 1 2018, Deep Comprehension: Multi-Disciplinary Approaches to Understanding, Enhancing, and Measuring Comprehension. Taylor and Francis, p. 114-127 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Posters
Students
poster
instruction
Handwriting
2016
29 Citations (Scopus)

An overview of sentiment analysis in social media and its applications in disaster relief

Beigi, G., Hu, X., Maciejewski, R. & Liu, H., 2016, Studies in Computational Intelligence. Springer Verlag, Vol. 639. p. 313-340 28 p. (Studies in Computational Intelligence; vol. 639).

Research output: Chapter in Book/Report/Conference proceedingChapter

Disasters
Competitive intelligence
World Wide Web
Websites
Visualization

A secure RFID access control mechanism

Huang, D. & Zhou, Z., Apr 19 2016, Security in RFID and Sensor Networks. CRC Press, p. 237-254 18 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Radio frequency identification (RFID)
Access control
2 Citations (Scopus)

Ransomware and cryptocurrency Partners in crime

Ahn, G-J., Doupe, A., Zhao, Z. & Liao, K., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 105-126 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

offense
4 Citations (Scopus)

Some less obvious features of classroom orchestration systems

VanLehn, K., Cheema, S., Wetzel, J. & Pead, D., Jan 1 2016, Educational Technologies: Challenges, Applications and Learning Outcomes. Nova Science Publishers, Inc., p. 73-94 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

classroom
small group work
poster
teacher
student
2015
2 Citations (Scopus)

Analyzing twitter data

Kumar, S., Morstatter, F. & Liu, H., Jan 1 2015, Twitter: A Digital Socioscope. Cambridge University Press, p. 21-51 31 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Interfaces (computer)
Application programs
Social sciences
Earthquakes
2 Citations (Scopus)

Cloud Security

Xing, T., Xiong, Z., Qian, H., Medhi, D. & Huang, D., Apr 7 2015, Cloud Services, Networking, and Management. wiley, p. 269-294 26 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Intrusion detection
Controllers
Software defined networking
2014

Analyzing twitter data

Kumar, S., Morstatter, F. & Liu, H., Jan 1 2014, SpringerBriefs in Computer Science. 9781461493716 ed. Springer, p. 35-48 14 p. (SpringerBriefs in Computer Science; no. 9781461493716).

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Crawling twitter data

Kumar, S., Morstatter, F. & Liu, H., Jan 1 2014, SpringerBriefs in Computer Science. 9781461493716 ed. Springer, p. 5-22 18 p. (SpringerBriefs in Computer Science; no. 9781461493716).

Research output: Chapter in Book/Report/Conference proceedingChapter

287 Citations (Scopus)

Feature selection for classification: A review

Tang, J., Alelyani, S. & Liu, H., Jan 1 2014, Data Classification: Algorithms and Applications. CRC Press, p. 37-64 28 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Feature extraction
Learning systems
Data mining
Throughput
Feature selection

Introduction

Kumar, S., Morstatter, F. & Liu, H., Jan 1 2014, SpringerBriefs in Computer Science. 9781461493716 ed. Springer, p. 1-3 3 p. (SpringerBriefs in Computer Science; no. 9781461493716).

Research output: Chapter in Book/Report/Conference proceedingChapter

Communication
1 Citation (Scopus)

Storing twitter data

Kumar, S., Morstatter, F. & Liu, H., Jan 1 2014, SpringerBriefs in Computer Science. 9781461493716 ed. Springer, p. 23-33 11 p. (SpringerBriefs in Computer Science; no. 9781461493716).

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Visualizing twitter data

Kumar, S., Morstatter, F. & Liu, H., Jan 1 2014, SpringerBriefs in Computer Science. 9781461493716 ed. Springer, p. 49-69 21 p. (SpringerBriefs in Computer Science; no. 9781461493716).

Research output: Chapter in Book/Report/Conference proceedingChapter

Communication
2013
10 Citations (Scopus)

Security and privacy in cloud computing: Towards a comprehensive framework

Takabi, H., Joshi, J. B. D. & Ahn, G-J., 2013, Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global, p. 164-184 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Cloud computing
Cost reduction
Momentum

Towards collaborative forensics

Mabey, M. & Ahn, G-J., Nov 1 2013, Information Reuse and Integration in Academia and Industry. Springer-Verlag Wien, Vol. 9783709115381. p. 237-260 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Crime
Digital forensics
2012
3 Citations (Scopus)

Analyzing behavior of the influential across social media

Agarwal, N., Kumar, S., Gao, H., Zafarani, R. & Liu, H., Jan 1 2012, Behavior Computing: Modeling, Analysis, Mining and Decision. Springer-Verlag London Ltd, p. 3-19 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Marketing
Blogs
4 Citations (Scopus)

Manipulating data and dimension reduction methods: Feature selection

Liu, H. & Zhao, Z., Nov 1 2012, Computational Complexity: Theory, Techniques, and Applications. Springer New York, Vol. 9781461418009. p. 1790-1800 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Feature extraction
Bibliographies
Glossaries
76 Citations (Scopus)

Text analytics in social media

Hu, X. & Liu, H., Aug 1 2012, Mining Text Data. Springer US, Vol. 9781461432234. p. 385-414 30 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2011

Data regulation protocol for source-end mitigation of distributed denial of service

Shah, N. & Huang, D., 2011, Network Security, Administration and Management: Advancing Technology and Practice. IGI Global, p. 277-287 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Hash functions
Communication
2010
5 Citations (Scopus)

Understanding group structures and properties in social media

Tang, L. & Liu, H., 2010, Link Mining: Models, Algorithms, and Applications. Springer New York, p. 163-185 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Social Media
Group Structure
Social Networking
Social Support
Growth
2009

Secure multi-path data delivery in sensor networks

Huang, D., 2009, From Problem toward Solution: Wireless Sensor Networks Security. Nova Science Publishers, Inc., p. 107-128 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Coding errors
Sensor networks
Telecommunication networks
Communication