Jennifer Jie Xu
Citata da
Citata da
Crime data mining: a general framework and some examples
H Chen, W Chung, JJ Xu, G Wang, Y Qin, M Chau
computer 37 (4), 50-56, 2004
Business intelligence in blogs: Understanding consumer interactions and communities.
M Chau, J Xu
MIS quarterly 36 (4), 2012
Mining communities and their relationships in blogs: A study of online hate groups
M Chau, J Xu
International Journal of Human-Computer Studies 65 (1), 57-70, 2007
Criminal network analysis and visualization
J Xu, H Chen
Communications of the ACM 48 (6), 100-107, 2005
CrimeNet explorer: a framework for criminal network knowledge discovery
JJ Xu, H Chen
ACM Transactions on Information Systems (TOIS) 23 (2), 201-226, 2005
COPLINK: managing law enforcement data and knowledge
H Chen, D Zeng, H Atabakhsh, W Wyzga, J Schroeder
Communications of the ACM 46 (1), 28-34, 2003
The topology of dark networks
J Xu, H Chen
Communications of the ACM 51 (10), 58-65, 2008
Extracting meaningful entities from police narrative reports
M Chau, JJ Xu, H Chen
Proceedings of the 2002 annual national conference on Digital government …, 2002
Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks
JJ Xu, H Chen
Decision Support Systems 38 (3), 473-487, 2004
Are blockchains immune to all malicious attacks?
Financial Innovation 2 (1), 1-9, 2016
Crime data mining: an overview and case studies
H Chen, W Chung, Y Qin, M Chau, JJ Xu, G Wang, R Zheng, H Atabakhsh
Proceedings of the 2003 annual national conference on Digital government …, 2003
Analyzing terrorist networks: A case study of the global salafi jihad network
J Qin, JJ Xu, D Hu, M Sageman, H Chen
International Conference on Intelligence and Security Informatics, 287-304, 2005
How Will Blockchain Technology Impact Auditing and Accounting: Permissionless versus Permissioned Blockchain
M Liu, K Wu, JJ Xu
Current Issues in Auditing 13 (2), A19-A29, 2019
Expertise visualization: An implementation and study based on cognitive fit theory
Z Huang, H Chen, F Guo, JJ Xu, S Wu, WH Chen
Decision Support Systems 42 (3), 1539-1557, 2006
Analyzing and visualizing criminal network dynamics: A case study
J Xu, B Marshall, S Kaza, H Chen
International conference on intelligence and security informatics, 359-377, 2004
Untangling criminal networks: A case study
J Xu, H Chen
International Conference on Intelligence and Security Informatics, 232-248, 2003
Automatically detecting criminal identity deception: an adaptive detection algorithm
GA Wang, H Chen, JJ Xu, H Atabakhsh
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
Intelligence and security informatics
H Chen, J Xu
Annual review of information science and technology 40, 229, 2006
The social identity of IS: analyzing the collaboration network of the ICIS conferences (1980-2005)
J Xu, M Chau
ICIS 2006 Proceedings, 39, 2006
Automated criminal link analysis based on domain knowledge
J Schroeder, J Xu, H Chen, M Chau
Journal of the American Society for Information Science and Technology 58 (6 …, 2007
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20