About
27
Publications
9,630
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
257
Citations
Citations since 2017
Publications
Publications (27)
Deep learning (DL) models have significantly improved the performance of text classification and text regression tasks. However, DL models are often strikingly vulnerable to adversarial attacks. Many researchers have aimed to develop adversarial attacks against DL models in realistic black-box settings (i.e., assuming no model knowledge is accessib...
Modern artificial intelligence (AI) is heavily reliant on deep learning (DL), an emerging class of algorithms that can automatically detect non-trivial patterns from petabytes of rapidly evolving "Big Data." Although the information systems (IS) discipline has embraced DL, questions remain about DL's interface with a domain and theory and DL contri...
Whereas modern medicine has enabled humans to live longer and more robust lives, recent years have seen a significant increase in chronic care costs. The prevention of threats to mobility is critical for chronic disease management. Researchers and physicians often analyze data from wearable motion sensor–based information systems (IS) to prevent fa...
Medical image annotation aims to automatically describe the content of medical images. It helps doctors to understand the content of medical image and make better informed decisions like diagnosis. Existing methods mainly follow the approach for natural images and fail to emphasize the object abnormalities, which is the essence of medical images an...
Advancing the quality of healthcare for senior citizens with chronic conditions is of great social relevance. To better manage chronic conditions, objective, convenient, and inexpensive wearable sensor- based information systems (IS) have been increasingly used by researchers and practitioners. However, existing models often focus on a single aspec...
In this paper, we focus on the popularity prediction for marketer-generated content (MGC), which has not been investigated by current studies. To address this problem, we propose a novel deep learning approach, namely the text-guided attention neural network (TGANN) model, to make full use of heterogeneous and multi-modal data related to MGCs (e.g....
International dark web platforms operating within multiple geopolitical regions and languages host a myriad of hacker assets such as malware, hacking tools, hacking tutorials, and malicious source code. Cybersecurity analytics organizations employ machine learning models trained on human-labeled data to automatically detect these assets and bolster...
Black hat hackers use malicious exploits to circumvent security controls and take advantage of system vulnerabilities worldwide, costing the global economy over $450 billion annually. While many organizations are increasingly turning to cyber threat intelligence (CTI) to help prioritize their vulnerabilities, extant CTI processes are often criticiz...
p> Deep learning (DL) models have significantly improved the performance of text classification and text regression tasks. However, DL models are often strikingly vulnerable to adversarial attacks. Many researchers have aimed to develop adversarial attacks against DL models in realistic black-box settings (i.e., assumes no model knowledge is access...
Learning predictive models in new domains with scarce training data is a growing challenge in modern supervised learning scenarios. This incentivizes developing domain adaptation methods that leverage the knowledge in known domains (source) and adapt to new domains (target) with a different probability distribution. This becomes more challenging wh...
Learning predictive models in new domains with scarce training data is a growing challenge in modern supervised learning scenarios. This incentivizes developing domain adaptation methods that leverage the knowledge in known domains (source) and adapt to new domains (target) with a different probability distribution. This becomes more challenging wh...
These are a series of online platforms that allow users to rate and comment on VR virtual reality applications. In this paper, we develop a topic model, namely the general and sparse topic model, that automatically identifies a set of features of VR applications from user reviews. In our context, we overcome two severe challenges (i.e., internal no...
Deep learning models have significantly advanced various natural language processing tasks. However, they are strikingly vulnerable to adversarial text attacks, even in the black-box setting where no model knowledge is accessible to hackers. Such attacks are conducted with a two-phase framework: 1) a sensitivity estimation phase to evaluate each el...
Deep learning models have significantly advanced various natural language processing tasks. However, they are strikingly vulnerable to adversarial text attacks, even in the black-box setting where no model knowledge is accessible to hackers. Such attacks are conducted with a two-phase framework: 1) a sensitivity estimation phase to evaluate each el...
Falls are among the most life-threatening events that challenge senior citizens’ independent living. Wearable sensor technologies have emerged as a viable solution for fall detection. However, existing fall detection models either focus on manual feature engineering or lack explainability. To advance the state-of-the-art of wearable sensor-based he...
Artificial Intelligence (AI) has rapidly emerged as a key disruptive technology in the 21st century. At the heart of modern AI lies Deep Learning (DL), an emerging class of algorithms that has enabled today's platforms and organizations to operate at unprecedented efficiency, effectiveness, and scale. Despite significant interest, IS contributions...
The regularity of devastating cyber-attacks has made cybersecurity a grand societal challenge. Many cybersecurity professionals are closely examining the international Dark Web to proactively pinpoint potential cyber threats. Despite its potential, the Dark Web contains hundreds of thousands of non-English posts. While machine translation is the pr...
The regularity of devastating cyber-attacks has made cybersecurity a grand societal challenge. Many cybersecurity professionals are closely examining the international Dark Web to proactively pinpoint potential cyber threats. Despite its potential, the Dark Web contains hundreds of thousands of non-English posts. While machine translation is the pr...
Peripapillary atrophy (PPA) is a clinical finding, which reflects the atrophy of retina layer and retinal pigment epithelium. The size of PPA area is a useful medical indicator, as it is highly associated with many diseases such as glaucoma and myopia. Therefore, separating the PPA area from retinal images, which is called PPA area segmentation, is...
Glaucoma is one of the leading causes of blindness in the world and there is no cure for it yet. But it is very meaningful to detect it early as earlier detection makes it possible to stop further loss of visions. Although deep learning models have proved their advantages in natural image analysis, they usually rely on large datasets to learn to ex...
Glaucoma is a group of eye diseases that damage the optic nerves progressively and lead to deterioration in vision irreversibly. Diagnosing glaucoma based on retinal images automatically is meaningful both in practice and research area. While deep learning models have achieved superior performance in natural images recognition and have been also us...