Jennifer Jie Xu
Cited by
Cited by
Crime data mining: a general framework and some examples
H Chen, W Chung, JJ Xu, G Wang, Y Qin, M Chau
computer 37 (4), 50-56, 2004
Mining communities and their relationships in blogs: A study of online hate groups
M Chau, J Xu
International Journal of Human-Computer Studies 65 (1), 57-70, 2007
Business intelligence in blogs: Understanding consumer interactions and communities.
M Chau, J Xu
MIS quarterly 36 (4), 2012
Criminal network analysis and visualization
J Xu, H Chen
Communications of the ACM 48 (6), 100-107, 2005
CrimeNet explorer: a framework for criminal network knowledge discovery
JJ Xu, H Chen
ACM Transactions on Information Systems (TOIS) 23 (2), 201-226, 2005
COPLINK: managing law enforcement data and knowledge
H Chen, D Zeng, H Atabakhsh, W Wyzga, J Schroeder
Communications of the ACM 46 (1), 28-34, 2003
The topology of dark networks
J Xu, H Chen
Communications of the ACM 51 (10), 58-65, 2008
Extracting meaningful entities from police narrative reports
M Chau, JJ Xu, H Chen
Proceedings of the 2002 annual national conference on Digital government …, 2002
Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks
JJ Xu, H Chen
Decision Support Systems 38 (3), 473-487, 2004
Crime data mining: an overview and case studies
H Chen, W Chung, Y Qin, M Chau, JJ Xu, G Wang, R Zheng, H Atabakhsh
Proceedings of the 2003 annual national conference on Digital government …, 2003
Are blockchains immune to all malicious attacks?
Financial Innovation 2 (1), 1-9, 2016
Expertise visualization: An implementation and study based on cognitive fit theory
Z Huang, H Chen, F Guo, JJ Xu, S Wu, WH Chen
Decision Support Systems 42 (3), 1539-1557, 2006
Analyzing terrorist networks: A case study of the global salafi jihad network
J Qin, JJ Xu, D Hu, M Sageman, H Chen
International Conference on Intelligence and Security Informatics, 287-304, 2005
Analyzing and visualizing criminal network dynamics: A case study
J Xu, B Marshall, S Kaza, H Chen
International conference on intelligence and security informatics, 359-377, 2004
Untangling criminal networks: A case study
J Xu, H Chen
International Conference on Intelligence and Security Informatics, 232-248, 2003
Intelligence and security informatics
H Chen, J Xu
Springer Berlin/Heidelberg., 2006
Automatically detecting criminal identity deception: an adaptive detection algorithm
GA Wang, H Chen, JJ Xu, H Atabakhsh
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2006
The social identity of IS: analyzing the collaboration network of the ICIS conferences (1980-2005)
J Xu, M Chau
ICIS 2006 Proceedings, 39, 2006
Terrorism knowledge discovery project: A knowledge discovery approach to addressing the threats of terrorism
E Reid, J Qin, W Chung, J Xu, Y Zhou, R Schumaker, M Sageman, ...
International Conference on Intelligence and Security Informatics, 125-145, 2004
Automated criminal link analysis based on domain knowledge
J Schroeder, J Xu, H Chen, M Chau
Journal of the American Society for Information Science and Technology 58 (6 …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20