Hsinchun Chen | |
---|---|
Academic background | |
Alma mater | National Chiao Tung University |
Academic work | |
Institutions | University of Arizona |
Chinese name | |
Traditional Chinese | 陳炘鈞 [1] |
Simplified Chinese | 陈炘钧 |
Hanyu Pinyin | Chén Xīnjūn |
Hsinchun Chen is the Regents' Professor and Thomas R. Brown Chair of Management and Technology at the University of Arizona and the Director and founder of the Artificial Intelligence Lab (AI Lab). He also served as lead program director of the Smart and Connected Health program at the National Science Foundation from 2014 to 2015. [2] He received a B.S. degree from National Chiao Tung University in Taiwan,an MBA from SUNY Buffalo and an M.S. and Ph.D. in Information Systems from New York University.
Chen's research primarily focuses on data/web/text mining and knowledge management techniques. He has applied his work in the fields of web computing,search engines,digital libraries,health informatics,security informatics,biomedical informatics and business intelligence. His most notable contributions are in management information systems,digital libraries,health informatics,and security informatics.
He was the founding Editor-in-Chief (EIC) of the ACM Transactions on Management Information Systems (ACM TMIS),2009–2014,and is also founding editor-in-chief of the Springer journal Security Informatics. He serves or has served on ten editorial boards including:
Chen has also served as a Scientific Counselor/Advisor to the United States National Library of Medicine (NLM),Academia Sinica in Taiwan,and the National Library of China. [3]
In 2005,Chen was ranked #8 in publication productivity in Information Systems (CAIS 2005), [4] #1 in Digital Library research (IP&M 2005), [5] and #9 in a list of the "Top 32" most productive information systems researchers (EJIS 2007) [6] in three bibliometric studies. In 2008,Chen was recognized as one of the top-ranked authors in the Management Information Systems field. [7] His "H-index" score from Google Scholar is 90 (as of December 2017).
Chen has authored or edited more than 40 books and conference proceedings,30 book chapters,280 SCI journal articles,and 180 refereed conference articles. His books include:Dark Web (2012; ISBN 978-1-4614-1556-5), Infectious Disease Informatics (2010; ISBN 978-1-4419-1277-0), Sports Data Mining (2010; ISBN 978-1-4419-6729-9), Mapping Nanotechnology Innovations and Knowledge (2009; ISBN 978-0-387-71619-0), Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (2008, ISBN 978-0-387-71612-1), Digital Government: E-Government Research, Case Studies, and Implementation (2008; ISBN 978-0-387-71610-7); Intelligence and Security Informatics for International Security: Information Sharing and Data Mining (2006; ISBN 978-0-387-24379-5); and Medical Informatics: Knowledge Management and Data Mining in Biomedicine (2005; ISBN 978-0-387-24381-8), all published by Springer.
He spearheaded the development of the International Conference of Asian Digital Library (ICADL) and the IEEE International Conference on Intelligence and Security Informatics (ISI).
In 1997, Chen began development of the COPLINK software, [8] which supports information sharing, analysis, and visualization of law enforcement data. He founded Knowledge Computing Corporation (KCC) to commercialize COPLINK, [9] which then entered the market in 2002 [10] and is now used in thousands of law enforcement agencies across the United States. [11] COPLINK's functions have been described in numerous local, regional, and national sources including the New York Times, [12] the Boston Globe, [13] and the Denver Post. [14] In 2003, COPLINK was named a finalist for the IACP/Motorola Webber Seavey Award: Quality in Law Enforcement. [15] In July 2009, KCC merged with i2 Inc., [16] a market leader in security analytics. In September 2011, the KCC/i2 firm was acquired by IBM for $500 million. [17] In October 2017, IBM sold Coplink to Forensic Logic. [18]
Chen is also the director of the Artificial Intelligence Lab's project, "Dark Web Terrorism Research," the goal of which is to develop and use automated tools to systematically collect and analyze terrorist content from the Internet. [19] One software program developed as part of the project, "Writeprint," aims to support authorship identification of online postings and other writings. [20] The Dark Web project is supported by grants from the National Science Foundation [21] [22] and other federal agencies, and has been recognized in the national press including Science News, Wired Magazine, Discover Magazine, and the Toronto Star. [23] [24] [25] [26]
Chen was awarded a grant of $1.2M from the National Science Foundation (NSF) for “Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social Media Analytics” (NSF SES #1314631). [27] Co-PIs are Dr. Salim Hariri (UA; ECE); Dr. Ronald Breiger (UA; Sociology); and Dr. Tom Holt (MSU; Criminology). The Hacker Web project aims to investigate questions regarding hacker behavior, markets, and community structure, among other things. The intended result is a computational framework including algorithms, software, and tools for access and use by other researchers to examine how cyber attacker groups form, develop, and spread their ideas. The project is funded through August 2016.
Chen was also awarded $4.2M from NSF (with UA co-PIs Drs. Salim Hariri, Mark Patton, and Paulo Goes) for the AZSecure Cybersecurity Scholarship-for-Service program at The University of Arizona (NSF DUE #1303362). [28] Project funds provide scholarships for undergraduate, graduate, and doctoral students studying cyber security, in exchange for government service. Students are recruited from across Arizona, including from military bases, community college, and tribal colleges. The program asserts a special emphasis on minority recruitment and retention. Program components are described as including student mentoring and development, independent study and research, internship and post-graduation placement assistance, and program assessment and evaluation. The program is aimed at helping to fill expected federal vacancies in cyber security and related positions over the next 5 years. [29]
Chen has developed the "Smart Health" project in his Lab, which lists the following research objectives: (1) developing technical approaches to support cyber-enabled patient empowerment; (2) developing personalized healthcare and community mapping techniques; and (3) conducting theory-driven assessment and evaluation research. [30] DiabeticLink research includes information extraction, sentiment analysis, and social network analysis to be integrated into the DiabeticLink portal. SilverLink is being developed in the U.S., China, and Taiwan to support senior citizens living independently. SilverLink's capabilities include a home-health system that monitors fall detection, daily health status, and activity levels, and can alert caregivers in the event of anomalous situations. [31] Chen also founded Caduceus Intelligence Corporation (CIC), a UA spinoff company working in the area of healthcare information systems. [32] CIC lists web analytics, smart health, patient support, and knowledge discovery as its areas of expertise. [33]
As part of ongoing work in intelligence and security informatics, Chen was awarded over $1.4M from NSF for a three-year pilot demonstration project to make available data and analysis tools to serve information and cyber security researchers. [34] The funds are to support the creation of an archive of open source and other data, such as network data, data from honeypots, hacker forums, phishing data, and security-related tweets, in numerous languages including English, Arabic, French, Russian, and more. The project is also intended to provide tools and support for social network analysis and data visualization. [35] [36] The project is intended to serve individuals working in "academia, government, and industry to share data, information, and expertise relevant to research in intelligence and security informatics." [37]
He is a Fellow of ACM, IEEE and AAAS, and received the IEEE Computer Society Technical Achievement Award in 2006 and the INFORMS Design Science Award in 2008. A paper for which he was co-author was given the MISQ Best Paper Award for 2010 ("Detecting Fake Websites: The Contribution of Statistical Learning Theory", by Ahmed Abbasi, Zhu Zhang, David Zimbra, Hsinchun Chen, and Jay F. Nunamaker Jr., published in volume 34, issue 3 of MIS Quarterly). [38] Also in 2010, he was recognized as "Distinguished Alumnus" of the National Chiao Tung University in Taiwan [39] and named a Distinguished University Chair Professor of National Taiwan University. In 2011, he received the IEEE 2011 Research Achievement and Leadership Award in Intelligence and Security Informatics and was a finalist for the AZ Tech Council's Governor's Innovation of the Year Award. The Arizona Daily Star recognized his accomplishments as a top scientist in its 2012 series, "Centennial Salute to Science". [40] In March 2013 he was named the Thomas R. Brown Chair in Management and Technology at the UA, as well as the UA's 2013 Innovator of the Year. In May he was inducted as a University of Arizona Regents' Professor. [32] He was elected as a China National 1000-Elite Chair Professor with the Tsinghua University in 2013. In 2015 he was named a fellow of the Association for Computing Machinery "for contributions to the research and development of security informatics and health informatics systems." [41]
Ralph C. Merkle is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics.
Peter Pin-Shan Chen is a Taiwanese American computer scientist. He is a (retired) distinguished career scientist and faculty member at Carnegie Mellon University and Distinguished Chair Professor Emeritus at LSU. He is known for the development of the entity–relationship model in 1976.
Clyde Lee Giles is an American computer scientist and the David Reese Professor at the College of Information Sciences and Technology (IST) at the Pennsylvania State University. He is also Graduate Faculty Professor of Computer Science and Engineering, Courtesy Professor of Supply Chain and Information Systems, and Director of the Intelligent Systems Research Laboratory. He was Interim Associate Dean of Research in the College of IST. He graduated from Oakhaven High School in Memphis, Tennessee. His graduate degrees are from the University of Michigan and the University of Arizona and his undergraduate degrees are from Rhodes College and the University of Tennessee. His PhD is in optical sciences with advisor Harrison H. Barrett. His academic genealogy includes two Nobel laureates, Arnold Sommerfeld and prominent mathematicians.
Neuroinformatics is the emergent field that combines informatics and neuroscience. Neuroinformatics is related with neuroscience data and information processing by artificial neural networks. There are three main directions where neuroinformatics has to be applied:
Laboratory informatics is the specialized application of information technology aimed at optimizing and extending laboratory operations. It encompasses data acquisition, instrument interfacing, laboratory networking, data processing, specialized data management systems, a laboratory information management system, scientific data management, and knowledge management. It has become more prevalent with the rise of other "informatics" disciplines such as bioinformatics, cheminformatics and health informatics. Several graduate programs are focused on some form of laboratory informatics, often with a clinical emphasis. A closely related - some consider subsuming - field is laboratory automation.
The Drexel University College of Computing & Informatics (CCI), formerly the College of Information Science and Technology or iSchool, is one of the primary colleges of Drexel University in Philadelphia, Pennsylvania. The College of Computing & Informatics has faculty and administrative offices, research laboratories, collaborative learning spaces, and classrooms located at 3675 Market Street Philadelphia, PA. The current dean is Yi Deng.
John Yen is Professor of Data Science and Professor-in-Charge of Data Science in the College of Information Sciences and Technology at Pennsylvania State University. He currently leads the Laboratory of AI for Cyber Security at Penn State. He was the founder and a former Director of the Cancer Informatics Initiative there.
The International School of Information Management (ISiM) is the first Indian i-School and is an autonomous constituent institute of the University of Mysore, located in Mysore in Karnataka, Southern India. ISiM was conceptualised and established in 2005, in collaboration with the leading information schools in the U.S – namely the School of Information at the University of Michigan, the School of Information Sciences at the University of Pittsburgh, and the School of Information Studies at Syracuse University, International Institute of Information Technology (IIIT) Bangalore, and Dalhousie University of Canada. ISiM was established with grants from the Ford Foundation and Bangalore based Informatics India Pvt. Ltd.
Cyber-Physical System (CPS) are integrations of computation with physical processes. In cyber-physical systems, physical and software components are deeply intertwined, able to operate on different spatial and temporal scales, exhibit multiple and distinct behavioral modalities, and interact with each other in ways that change with context. CPS involves transdisciplinary approaches, merging theory of cybernetics, mechatronics, design and process science. The process control is often referred to as embedded systems. In embedded systems, the emphasis tends to be more on the computational elements, and less on an intense link between the computational and physical elements. CPS is also similar to the Internet of Things (IoT), sharing the same basic architecture; nevertheless, CPS presents a higher combination and coordination between physical and computational elements.
Informatics is the study of computational systems. According to the ACM Europe Council and Informatics Europe, informatics is synonymous with computer science and computing as a profession, in which the central notion is transformation of information. In some cases, the term "informatics" may also be used with different meanings, e.g. in the context of social computing, or in context of library science.
Dawn Song is a Chinese American academic and is a professor at the University of California, Berkeley, in the Electrical Engineering and Computer Science Department.
Judith L. Klavans is a linguist and computer scientist. She has been active in academia, industry and government in furthering the development and application of computational approaches to the study of language, with publications in areas including speech synthesis, machine translation, the development of resources and corpus analysis, internet addiction, information retrieval, and automatic summarization. Her technologies have been applied in fields ranging from medical informatics, cybersecurity, database interoperability, cultural heritage institutions and Digital Government.
Salvatore J. Stolfo is an academic and professor of computer science at Columbia University, specializing in computer security.
Behavior informatics (BI) is the informatics of behaviors so as to obtain behavior intelligence and behavior insights. BI is a research method combining science and technology, specifically in the area of engineering. The purpose of BI includes analysis of current behaviors as well as the inference of future possible behaviors. This occurs through pattern recognition.
Longbing Cao is an AI and data science researcher at the University of Technology Sydney, Australia. His broad research interest involves artificial intelligence, data science, behavior informatics, and their enterprise applications.
Justin Cappos is a computer scientist and cybersecurity expert whose data-security software has been adopted by a number of widely used open-source projects. His research centers on software update systems, security, and virtualization, with a focus on real-world security problems.
Sushil Jajodia is an American computer scientist known for his work on cyber security and privacy, databases, and distributed systems.
Yuval Elovici is a computer scientist. He is a professor in the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev (BGU), where he is the incumbent of the Davide and Irene Sala Chair in Homeland Security Research. He is the director of the Cyber Security Research Center at BGU and the founder and director of the Telekom Innovation Laboratories at Ben-Gurion University. In addition to his roles at BGU, he also serves as the lab director of Singapore University of Technology and Design’s (SUTD) ST Electronics-SUTD Cyber Security Laboratory, as well as the research director of iTrust. In 2014 he co-founded Morphisec, a start-up company, that develops cyber security mechanisms related to moving target defense.
Latifur Khan joined the University of Texas at Dallas in 2000, where he has been conducting research and teaching as a Professor in the Department of Computer Science.