Follow
Yilu Zhou
Yilu Zhou
Associate Professor of Business, Fordham University
Verified email at fordham.edu
Title
Cited by
Cited by
Year
Detecting offensive language in social media to protect adolescent online safety
Y Chen, Y Zhou, S Zhu, H Xu
2012 international conference on privacy, security, risk and trust and 2012 …, 2012
8672012
US domestic extremist groups on the Web: link and content analysis
Y Zhou, E Reid, J Qin, H Chen, G Lai
IEEE intelligent systems 20 (5), 44-51, 2005
2492005
Text Analytics to Support Sense-Making in Social Media
A Abbasi, Y Zhou, S Deng, P Zhang
MIS Quarterly 42 (2), 427-464, 2018
1652018
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
J Qin, Y Zhou, E Reid, G Lai, H Chen
International Journal of Human-Computer Studies 65 (1), 71-84, 2007
1272007
Building domain-specific web collections for scientific digital libraries: a meta-search enhanced focused crawling method
J Qin, Y Zhou, M Chau
Proceedings of the 4th ACM/IEEE-CS joint conference on Digital libraries …, 2004
1222004
Employee satisfaction and corporate performance: Mining employee reviews on glassdoor. com
N Luo, Y Zhou, J Shon
802016
Building a scientific knowledge web portal: The NanoPort experience
M Chau, Z Huang, J Qin, Y Zhou, H Chen
Decision Support Systems 42 (2), 1216-1238, 2006
792006
The dark web portal project: collecting and analyzing the presence of terrorist groups on the web
J Qin, Y Zhou, G Lai, E Reid, M Sageman, H Chen
Intelligence and Security Informatics: IEEE International Conference on …, 2005
662005
Terrorism knowledge discovery project: A knowledge discovery approach to addressing the threats of terrorism
E Reid, J Qin, W Chung, J Xu, Y Zhou, R Schumaker, M Sageman, ...
Intelligence and Security Informatics: Second Symposium on Intelligence and …, 2004
662004
Is this app safe for children? A comparison study of maturity ratings on Android and iOS applications
Y Chen, H Xu, Y Zhou, S Zhu
Proceedings of the 22nd international conference on World Wide Web, 201-212, 2013
582013
Collecting and analyzing the presence of terrorists on the web: A case study of jihad websites
E Reid, J Qin, Y Zhou, G Lai, M Sageman, G Weimann, H Chen
Intelligence and Security Informatics: IEEE International Conference on …, 2005
572005
A multi-region empirical study on the internet presence of global extremist organizations
J Qin, Y Zhou, H Chen
Information Systems Frontiers 13, 75-88, 2011
502011
Children's exposure to mobile in-app advertising: an analysis of content appropriateness
Y Chen, S Zhu, H Xu, Y Zhou
2013 International Conference on Social Computing, 196-203, 2013
492013
Comparison of two approaches to building a vertical search tool: a case study in the nanotechnology domain
M Chau, H Chen, J Qin, Y Zhou, Y Qin, WK Sung, D McDonald
Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries …, 2002
412002
On the topology of the dark web of terrorist groups
J Xu, H Chen, Y Zhou, J Qin
Intelligence and Security Informatics: IEEE International Conference on …, 2006
382006
CMedPort: An integrated approach to facilitating Chinese medical information seeking
Y Zhou, J Qin, H Chen
Decision Support Systems 42 (3), 1431-1448, 2006
312006
SpidersRUs: Creating specialized search engines in multiple languages
M Chau, J Qin, Y Zhou, C Tseng, H Chen
Decision Support Systems 45 (3), 621-640, 2008
292008
Collection of us extremist online forums: A web mining approach
Y Zhou, J Qin, G Lai, H Chen
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
292007
Multilingual web retrieval: An experiment on a multilingual business intelligence portal
Y Zhou, J Qin, H Chen, JF Nunamaker
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
292005
Exploring the dark side of the web: Collection and analysis of US extremist online forums
Y Zhou, J Qin, G Lai, E Reid, H Chen
Intelligence and Security Informatics: IEEE International Conference on …, 2006
252006
The system can't perform the operation now. Try again later.
Articles 1–20