Hsinchun Chen

Last updated
ISBN 978-1-4614-1556-5), Infectious Disease Informatics (2010; ISBN 978-1-4419-1277-0), Sports Data Mining (2010; ISBN 978-1-4419-6729-9), Mapping Nanotechnology Innovations and Knowledge (2009; ISBN 978-0-387-71619-0), Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security (2008, ISBN 978-0-387-71612-1), Digital Government: E-Government Research, Case Studies, and Implementation (2008; ISBN 978-0-387-71610-7); Intelligence and Security Informatics for International Security: Information Sharing and Data Mining (2006; ISBN 978-0-387-24379-5); and Medical Informatics: Knowledge Management and Data Mining in Biomedicine (2005; ISBN 978-0-387-24381-8), all published by Springer.

He spearheaded the development of the International Conference of Asian Digital Library (ICADL) and the IEEE International Conference on Intelligence and Security Informatics (ISI).

In 1997, Chen began development of the COPLINK software, [8] which supports information sharing, analysis, and visualization of law enforcement data. He founded Knowledge Computing Corporation (KCC) to commercialize COPLINK, [9] which then entered the market in 2002 [10] and is now used in thousands of law enforcement agencies across the United States. [11] COPLINK's functions have been described in numerous local, regional, and national sources including the New York Times, [12] the Boston Globe, [13] and the Denver Post. [14] In 2003, COPLINK was named a finalist for the IACP/Motorola Webber Seavey Award: Quality in Law Enforcement. [15] In July 2009, KCC merged with i2 Inc., [16] a market leader in security analytics. In September 2011, the KCC/i2 firm was acquired by IBM for $500 million. [17] In October 2017, IBM sold Coplink to Forensic Logic. [18]

The "Dark Web" Project

Chen is also the director of the Artificial Intelligence Lab's project, "Dark Web Terrorism Research," the goal of which is to develop and use automated tools to systematically collect and analyze terrorist content from the Internet. [19] One software program developed as part of the project, "Writeprint," aims to support authorship identification of online postings and other writings. [20] The Dark Web project is supported by grants from the National Science Foundation [21] [22] and other federal agencies, and has been recognized in the national press including Science News, Wired Magazine, Discover Magazine, and the Toronto Star. [23] [24] [25] [26]

The "Hacker Web" Project and AZSecure Program

Chen was awarded a grant of $1.2M from the National Science Foundation (NSF) for “Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social Media Analytics” (NSF SES #1314631). [27] Co-PIs are Dr. Salim Hariri (UA; ECE); Dr. Ronald Breiger (UA; Sociology); and Dr. Tom Holt (MSU; Criminology). The Hacker Web project aims to investigate questions regarding hacker behavior, markets, and community structure, among other things. The intended result is a computational framework including algorithms, software, and tools for access and use by other researchers to examine how cyber attacker groups form, develop, and spread their ideas. The project is funded through August 2016.

Chen was also awarded $4.2M from NSF (with UA co-PIs Drs. Salim Hariri, Mark Patton, and Paulo Goes) for the AZSecure Cybersecurity Scholarship-for-Service program at The University of Arizona (NSF DUE #1303362). [28] Project funds provide scholarships for undergraduate, graduate, and doctoral students studying cyber security, in exchange for government service. Students are recruited from across Arizona, including from military bases, community college, and tribal colleges. The program asserts a special emphasis on minority recruitment and retention. Program components are described as including student mentoring and development, independent study and research, internship and post-graduation placement assistance, and program assessment and evaluation. The program is aimed at helping to fill expected federal vacancies in cyber security and related positions over the next 5 years. [29]

The Smart Health Project

Chen has developed the "Smart Health" project in his Lab, which lists the following research objectives: (1) developing technical approaches to support cyber-enabled patient empowerment; (2) developing personalized healthcare and community mapping techniques; and (3) conducting theory-driven assessment and evaluation research. [30] DiabeticLink research includes information extraction, sentiment analysis, and social network analysis to be integrated into the DiabeticLink portal. SilverLink is being developed in the U.S., China, and Taiwan to support senior citizens living independently. SilverLink's capabilities include a home-health system that monitors fall detection, daily health status, and activity levels, and can alert caregivers in the event of anomalous situations. [31] Chen also founded Caduceus Intelligence Corporation (CIC), a UA spinoff company working in the area of healthcare information systems. [32] CIC lists web analytics, smart health, patient support, and knowledge discovery as its areas of expertise. [33]

Data Infrastructure Building Blocks for Intelligence and Security Informatics

As part of ongoing work in intelligence and security informatics, Chen was awarded over $1.4M from NSF for a three-year pilot demonstration project to make available data and analysis tools to serve information and cyber security researchers. [34] The funds are to support the creation of an archive of open source and other data, such as network data, data from honeypots, hacker forums, phishing data, and security-related tweets, in numerous languages including English, Arabic, French, Russian, and more. The project is also intended to provide tools and support for social network analysis and data visualization. [35] [36] The project is intended to serve individuals working in "academia, government, and industry to share data, information, and expertise relevant to research in intelligence and security informatics." [37]

Awards

He is a Fellow of ACM, IEEE and AAAS, and received the IEEE Computer Society Technical Achievement Award in 2006 and the INFORMS Design Science Award in 2008. A paper for which he was co-author was given the MISQ Best Paper Award for 2010 ("Detecting Fake Websites: The Contribution of Statistical Learning Theory", by Ahmed Abbasi, Zhu Zhang, David Zimbra, Hsinchun Chen, and Jay F. Nunamaker Jr., published in volume 34, issue 3 of MIS Quarterly). [38] Also in 2010, he was recognized as "Distinguished Alumnus" of the National Chiao Tung University in Taiwan [39] and named a Distinguished University Chair Professor of National Taiwan University. In 2011, he received the IEEE 2011 Research Achievement and Leadership Award in Intelligence and Security Informatics and was a finalist for the AZ Tech Council's Governor's Innovation of the Year Award. The Arizona Daily Star recognized his accomplishments as a top scientist in its 2012 series, "Centennial Salute to Science". [40] In March 2013 he was named the Thomas R. Brown Chair in Management and Technology at the UA, as well as the UA's 2013 Innovator of the Year. In May he was inducted as a University of Arizona Regents' Professor. [32] He was elected as a China National 1000-Elite Chair Professor with the Tsinghua University in 2013. In 2015 he was named a fellow of the Association for Computing Machinery "for contributions to the research and development of security informatics and health informatics systems." [41]

Notes and references

  1. "資管系特聘教授陳炘鈞博士演講" [Lecture by special professor Chen Hsinchun of the Faculty of Information Management]. National Taiwan University. 27 March 2018. Retrieved 29 May 2018.
  2. "AI Lab Director: Dr. Hsinchun Chen". University of Arizona Artificial Intelligence Lab. Archived from the original on 19 August 2016. Retrieved 19 July 2016.
  3. Archived 2010-07-08 at the Wayback Machine http://ai.arizona.edu/hchen/ Retrieved June 22, 2010.
  4. Huang, Hsieh-Hong; et al. (2005). "An Evaluation of Publication Productivity in Information Systems: 1999 to 2003". Communications of the Association for Information Systems. 15. doi: 10.17705/1CAIS.01531 .
  5. Liu, Xiaoming; Bollen, J; Nelson, M; Vandesompel, H; et al. (2005). "Co-authorship Networks in the Digital Library Research Community". Information Processing and Management. 41 (6): 1462–1480. arXiv: cs/0502056 . Bibcode:2005cs........2056L. doi:10.1016/j.ipm.2005.03.012. S2CID   2536130.
  6. Gallivan, Michael; et al. (2007). "Analyzing IS Research Productivity: An Inclusive Approach to Global IS Scholarship". European Journal of Information Systems. 16: 36–53. doi:10.1057/palgrave.ejis.3000667. S2CID   1072246.
  7. Chua, Alton; Yang, Christopher C.; et al. (2008). "The shift towards multi-disciplinarity in information science". Journal of the American Society for Information Science and Technology. 59 (13): 2156–2170. doi:10.1002/asi.20929.
  8. Copenhaver, Larry (2002-10-23). "Tucson Cops, Local Software to Help in D.C. Sniper Probe". Tucson Citizen.
  9. O'Harrow Jr., Robert; et al. (2008-03-06). "National Dragnet Is a Click Away: Authorities to Gain Fast and Expansive Access to Records". Washington Post. Retrieved 2010-10-11.
  10. "i2 Company Management" . Retrieved 2010-10-11.
  11. Sink, Mindy (2002-11-03). "An Electronic Copy That Plays Hunches". New York Times.
  12. Cook, Gareth; et al. (2004-07-24). "Software Helps Police Draw Crime Links". Boston Globe.
  13. Thornton, Susan (2008-03-06). "COPLINK helping catch more bad guys". Denver Post. Retrieved 2010-10-11.
  14. "IACP/Motorola Webber Seavey Award: Quality in Law Enforcement: 2003 Abstracts". 2003. Retrieved 2010-10-12.
  15. Darcy, Darlene (2009-07-02). "i2 Inc. acquires Knowledge Computing Corp". Washington Business Journal. Retrieved 2010-10-11.
  16. "Hsinchun Chen's Tech Spinoff Bought by IBM". Archived from the original on 2012-02-01. Retrieved 2012-03-16.
  17. Wichner, David. "IBM sells off police data-search software developed at the UA". Arizona Daily Star. Retrieved 2017-12-27.
  18. Groc, Isabelle (2008-02-27). "The Online Hunt for Terrorists: Researchers are using Web spiders to track down terrorists online". PC Magazine. Retrieved 2010-10-12.
  19. Rotstein, Arthur (2007-11-11). ""Dark Web" tool seeks online terrorists". Business Week.
  20. National Science Foundation (2007-08-07). "Award Abstract #0709338: CRI:CRD - Developing a Dark Web Collection and Infrastructure for Computational and Social Sciences" . Retrieved 2010-11-12.
  21. National Science Foundation (2007-07-18). "Award Abstract #0730908: EXP-LA: Explosives and IEDs in the Dark Web: Discovery, Categorization, and Analysis" . Retrieved 2010-11-12.
  22. Rehmeyer, Julie (Jan 13, 1007). "Tiny Behavioral Differences Can Reveal Your Identity Online". Science News. 171 (2): 2. doi:10.1002/scin.2007.5591710210.
  23. "Global Jihad Online: Terrorist Networks Are More Wired Than Ever (Section: START: Infoporn)". Wired Magazine. 14: 12. December 1, 2006.
  24. "The Future of Terrorists". Discover Magazine. July 2006.
  25. "Trolling for Terrorists". Toronto Star. September 8, 2006.
  26. "NSF Award Abstract #1314631" . Retrieved 2014-01-14.
  27. "NSF Award Abstract #1303362" . Retrieved 2014-01-17.
  28. "AZSecure Cybersecurity Fellowship Program". Archived from the original on 2014-01-21. Retrieved 2014-01-17.
  29. "Smart Health and DiabeticLink Research". Archived from the original on 2014-03-25. Retrieved 2014-01-17.
  30. Chuang, Joshua; Maimoon, Lubaina; Yu, Shuo; Hongyi, Zhu; Nybroe, Casper; Hsiao, Owen; Li, Shu-Hsing; Lu, Hsinmin; Chen, Hsinchun (January 20, 2016). "SilverLink: Smart Home Health Monitoring for Senior Care". Smart Health. Lecture Notes in Computer Science. Vol. 9545. pp. 3–14. doi:10.1007/978-3-319-29175-8_1. ISBN   978-3-319-29174-1. S2CID   17442817.
  31. 1 2 "Hsinchun Chen's Exciting Year - A Recap". Archived from the original on 2014-03-25. Retrieved 2014-01-17.
  32. "Caduceus Intel". Archived from the original on 2014-03-25. Retrieved 2014-01-17.
  33. "Data Infrastructure Buildings Blocks (DIBBs) for Intelligence + Security Informatics (ISI)". Artificial Intelligence Laboratory. Retrieved 2016-06-21.
  34. "NSF Award Search: Award#1443019 - CIF21 DIBBs: DIBBs for Intelligence and Security Informatics Research Community". nsf.gov. Retrieved 2016-06-21.
  35. "Data Science Testbed for Security Researchers". AZSecure - Data for Intelligence and Security Informatics. Retrieved 2016-06-21.
  36. "Intelligence and Security Informatics (ISI)". www.linkedin.com. Retrieved 2016-06-21.
  37. "MISQ Paper of the Year Recipients" . Retrieved 2012-03-16.
  38. "Distinguished Alumni" . Retrieved 2014-03-24.
  39. "100 Days of Science: UA professor, TPD Advanced Crime Analysis" (PDF). Archived from the original (PDF) on 2014-03-25. Retrieved 2012-08-17.
  40. ACM Fellows Named for Computing Innovations that Are Advancing Technology in the Digital Age, Association for Computing Machinery, 2015, archived from the original on 2015-12-09, retrieved 2015-12-09
Hsinchun Chen
Academic background
Alma mater National Chiao Tung University

Related Research Articles

<span class="mw-page-title-main">Ralph Merkle</span> American cryptographer

Ralph C. Merkle is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics.

Peter Pin-Shan Chen is a Taiwanese American computer scientist. He is a (retired) distinguished career scientist and faculty member at Carnegie Mellon University and Distinguished Chair Professor Emeritus at LSU. He is known for the development of the entity–relationship model in 1976.

Clyde Lee Giles is an American computer scientist and the David Reese Professor at the College of Information Sciences and Technology (IST) at the Pennsylvania State University. He is also Graduate Faculty Professor of Computer Science and Engineering, Courtesy Professor of Supply Chain and Information Systems, and Director of the Intelligent Systems Research Laboratory. He was Interim Associate Dean of Research in the College of IST. He graduated from Oakhaven High School in Memphis, Tennessee. His graduate degrees are from the University of Michigan and the University of Arizona and his undergraduate degrees are from Rhodes College and the University of Tennessee. His PhD is in optical sciences with advisor Harrison H. Barrett. His academic genealogy includes two Nobel laureates, Arnold Sommerfeld and prominent mathematicians.

Neuroinformatics is the emergent field that combines informatics and neuroscience. Neuroinformatics is related with neuroscience data and information processing by artificial neural networks. There are three main directions where neuroinformatics has to be applied:

Laboratory informatics is the specialized application of information technology aimed at optimizing and extending laboratory operations. It encompasses data acquisition, instrument interfacing, laboratory networking, data processing, specialized data management systems, a laboratory information management system, scientific data management, and knowledge management. It has become more prevalent with the rise of other "informatics" disciplines such as bioinformatics, cheminformatics and health informatics. Several graduate programs are focused on some form of laboratory informatics, often with a clinical emphasis. A closely related - some consider subsuming - field is laboratory automation.

<span class="mw-page-title-main">Drexel University College of Computing and Informatics</span> Computing and informatics college in Philadelphia, Pennsylvania, U.S.

The Drexel University College of Computing & Informatics (CCI), formerly the College of Information Science and Technology or iSchool, is one of the primary colleges of Drexel University in Philadelphia, Pennsylvania. The College of Computing & Informatics has faculty and administrative offices, research laboratories, collaborative learning spaces, and classrooms located at 3675 Market Street Philadelphia, PA. The current dean is Yi Deng.

John Yen is Professor of Data Science and Professor-in-Charge of Data Science in the College of Information Sciences and Technology at Pennsylvania State University. He currently leads the Laboratory of AI for Cyber Security at Penn State. He was the founder and a former Director of the Cancer Informatics Initiative there.

<span class="mw-page-title-main">International School of Information Management</span>

The International School of Information Management (ISiM) is the first Indian i-School and is an autonomous constituent institute of the University of Mysore, located in Mysore in Karnataka, Southern India. ISiM was conceptualised and established in 2005, in collaboration with the leading information schools in the U.S – namely the School of Information at the University of Michigan, the School of Information Sciences at the University of Pittsburgh, and the School of Information Studies at Syracuse University, International Institute of Information Technology (IIIT) Bangalore, and Dalhousie University of Canada. ISiM was established with grants from the Ford Foundation and Bangalore based Informatics India Pvt. Ltd.

Cyber-Physical System (CPS) are integrations of computation with physical processes. In cyber-physical systems, physical and software components are deeply intertwined, able to operate on different spatial and temporal scales, exhibit multiple and distinct behavioral modalities, and interact with each other in ways that change with context. CPS involves transdisciplinary approaches, merging theory of cybernetics, mechatronics, design and process science. The process control is often referred to as embedded systems. In embedded systems, the emphasis tends to be more on the computational elements, and less on an intense link between the computational and physical elements. CPS is also similar to the Internet of Things (IoT), sharing the same basic architecture; nevertheless, CPS presents a higher combination and coordination between physical and computational elements.

Informatics is the study of computational systems. According to the ACM Europe Council and Informatics Europe, informatics is synonymous with computer science and computing as a profession, in which the central notion is transformation of information. In some cases, the term "informatics" may also be used with different meanings, e.g. in the context of social computing, or in context of library science.

Dawn Song is a Chinese American academic and is a professor at the University of California, Berkeley, in the Electrical Engineering and Computer Science Department.

Judith L. Klavans is a linguist and computer scientist. She has been active in academia, industry and government in furthering the development and application of computational approaches to the study of language, with publications in areas including speech synthesis, machine translation, the development of resources and corpus analysis, internet addiction, information retrieval, and automatic summarization. Her technologies have been applied in fields ranging from medical informatics, cybersecurity, database interoperability, cultural heritage institutions and Digital Government.

<span class="mw-page-title-main">Salvatore J. Stolfo</span> American computer scientist

Salvatore J. Stolfo is an academic and professor of computer science at Columbia University, specializing in computer security.

Behavior informatics (BI) is the informatics of behaviors so as to obtain behavior intelligence and behavior insights. BI is a research method combining science and technology, specifically in the area of engineering. The purpose of BI includes analysis of current behaviors as well as the inference of future possible behaviors. This occurs through pattern recognition.

Longbing Cao is an AI and data science researcher at the University of Technology Sydney, Australia. His broad research interest involves artificial intelligence, data science, behavior informatics, and their enterprise applications.

Justin Cappos is a computer scientist and cybersecurity expert whose data-security software has been adopted by a number of widely used open-source projects. His research centers on software update systems, security, and virtualization, with a focus on real-world security problems.

Sushil Jajodia is an American computer scientist known for his work on cyber security and privacy, databases, and distributed systems.

<span class="mw-page-title-main">Yuval Elovici</span>

Yuval Elovici is a computer scientist. He is a professor in the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev (BGU), where he is the incumbent of the Davide and Irene Sala Chair in Homeland Security Research. He is the director of the Cyber Security Research Center at BGU and the founder and director of the Telekom Innovation Laboratories at Ben-Gurion University. In addition to his roles at BGU, he also serves as the lab director of Singapore University of Technology and Design’s (SUTD) ST Electronics-SUTD Cyber Security Laboratory, as well as the research director of iTrust. In 2014 he co-founded Morphisec, a start-up company, that develops cyber security mechanisms related to moving target defense.

Latifur Khan joined the University of Texas at Dallas in 2000, where he has been conducting research and teaching as a Professor in the Department of Computer Science.