Detecting offensive language in social media to protect adolescent online safety Y Chen, Y Zhou, S Zhu, H Xu 2012 international conference on privacy, security, risk and trust and 2012 …, 2012 | 867 | 2012 |
US domestic extremist groups on the Web: link and content analysis Y Zhou, E Reid, J Qin, H Chen, G Lai IEEE intelligent systems 20 (5), 44-51, 2005 | 249 | 2005 |
Text Analytics to Support Sense-Making in Social Media A Abbasi, Y Zhou, S Deng, P Zhang MIS Quarterly 42 (2), 427-464, 2018 | 165 | 2018 |
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity J Qin, Y Zhou, E Reid, G Lai, H Chen International Journal of Human-Computer Studies 65 (1), 71-84, 2007 | 127 | 2007 |
Building domain-specific web collections for scientific digital libraries: a meta-search enhanced focused crawling method J Qin, Y Zhou, M Chau Proceedings of the 4th ACM/IEEE-CS joint conference on Digital libraries …, 2004 | 122 | 2004 |
Employee satisfaction and corporate performance: Mining employee reviews on glassdoor. com N Luo, Y Zhou, J Shon | 80 | 2016 |
Building a scientific knowledge web portal: The NanoPort experience M Chau, Z Huang, J Qin, Y Zhou, H Chen Decision Support Systems 42 (2), 1216-1238, 2006 | 79 | 2006 |
The dark web portal project: collecting and analyzing the presence of terrorist groups on the web J Qin, Y Zhou, G Lai, E Reid, M Sageman, H Chen Intelligence and Security Informatics: IEEE International Conference on …, 2005 | 66 | 2005 |
Terrorism knowledge discovery project: A knowledge discovery approach to addressing the threats of terrorism E Reid, J Qin, W Chung, J Xu, Y Zhou, R Schumaker, M Sageman, ... Intelligence and Security Informatics: Second Symposium on Intelligence and …, 2004 | 66 | 2004 |
Is this app safe for children? A comparison study of maturity ratings on Android and iOS applications Y Chen, H Xu, Y Zhou, S Zhu Proceedings of the 22nd international conference on World Wide Web, 201-212, 2013 | 58 | 2013 |
Collecting and analyzing the presence of terrorists on the web: A case study of jihad websites E Reid, J Qin, Y Zhou, G Lai, M Sageman, G Weimann, H Chen Intelligence and Security Informatics: IEEE International Conference on …, 2005 | 57 | 2005 |
A multi-region empirical study on the internet presence of global extremist organizations J Qin, Y Zhou, H Chen Information Systems Frontiers 13, 75-88, 2011 | 50 | 2011 |
Children's exposure to mobile in-app advertising: an analysis of content appropriateness Y Chen, S Zhu, H Xu, Y Zhou 2013 International Conference on Social Computing, 196-203, 2013 | 49 | 2013 |
Comparison of two approaches to building a vertical search tool: a case study in the nanotechnology domain M Chau, H Chen, J Qin, Y Zhou, Y Qin, WK Sung, D McDonald Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries …, 2002 | 41 | 2002 |
On the topology of the dark web of terrorist groups J Xu, H Chen, Y Zhou, J Qin Intelligence and Security Informatics: IEEE International Conference on …, 2006 | 38 | 2006 |
CMedPort: An integrated approach to facilitating Chinese medical information seeking Y Zhou, J Qin, H Chen Decision Support Systems 42 (3), 1431-1448, 2006 | 31 | 2006 |
SpidersRUs: Creating specialized search engines in multiple languages M Chau, J Qin, Y Zhou, C Tseng, H Chen Decision Support Systems 45 (3), 621-640, 2008 | 29 | 2008 |
Collection of us extremist online forums: A web mining approach Y Zhou, J Qin, G Lai, H Chen 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 29 | 2007 |
Multilingual web retrieval: An experiment on a multilingual business intelligence portal Y Zhou, J Qin, H Chen, JF Nunamaker Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 29 | 2005 |
Exploring the dark side of the web: Collection and analysis of US extremist online forums Y Zhou, J Qin, G Lai, E Reid, H Chen Intelligence and Security Informatics: IEEE International Conference on …, 2006 | 25 | 2006 |