Conference Papers

Conference Publications
49. Mahmood, S. H. A. and Abbasi, A. “Using Deep Generative Models to Boost Forecasting: A Phishing Prediction Case Study,” IEEE International Conference on Data Mining (ICDM) Workshops, Sorrento, Italy, November 17-20, 2020. PDF
48. Mahmood, S. H. A., Ali, S. M., and Abbasi, A. “Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Virtual Conference, November 9-10, 2020. PDF
47. Dobolyi, D. G., Abbasi, A., Zahedi, F. M., and Vance, A. “An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Virtual Conference, November 9-10, 2020.
46. Kitchens, B., Abbasi, A., and Claggett, J. “Beating the Clock with MedCrawl: A Social Listening Platform for Health 2.0,” INFORMS Workshop on Data Science , Washington D.C., November 7-8, 2020.
45. Abbasi, A., Claggett, J., Kitchens, B., and Chen, H. “MedCrawl: Improving Public Health Outcomes through Effective and Efficient Social Listening,” In the 10th Conference on Health IT and Analytics, Washington D.C., November 15-16, 2019
44. Khaja, H. I., Abate, M., Zheng, W., Abbasi, A., and Adjeroh, D. “Evaluating Semantic Similarity for Adverse Drug Event Narratives,” International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction (SBP), Washington D.C., 2018. PDF
43. Li, J., Abbasi, A., Ahmad, F., and Chen, H. “Deep Learning for Psychometric NLP,” Workshop on Information Technologies and Systems (WITS) , Santa Clara, CA, December 15-16, 2018. PDF
42. Ahmad, F., Abbasi, A., Kitchens, B., and Zeng, D. “Finding Needles in a Haystack: Deep Learning for Rare Adverse Event Detection,” INFORMS Workshop on Data Science, Phoenix, AZ, November 3, 2018.
41. Li, J., Abbasi, A., Ahmad, F., and Chen, H. “PyNDA: Deep Learning for Psychometric Natural Language Processing,” INFORMS Workshop on Data Science, Phoenix, AZ, November 3, 2018 (Best Paper Nominee). PDF
40. Tremblay, M. C., Kohli, R., Forsgren, N., Grover, V., Abbasi, A., Hevner, A., and Rapaport, R. “Will Artificial Intelligence Automate Theory Building? Are there Lessons for Academia from Practice?,” International Conference on Information Systems, San Francisco, CA, December 13-16, 2018.
39. Dobolyi, D., Abbasi, A., Zahedi, M. Z., and Vance, T. “Predicting User Susceptibility to Phishing Websites,” INFORMS Workshop on Data Science, Houston, TX, October 21, 2017. PDF
38. Li, J., Larsen, K., and Abbasi, A. “Unlocking our Behavioral Knowledge Inheritance through Ontology Learning: A Design Framework, an Instantiation, and a Randomized Experiment,” INFORMS Workshop on Data Science, Houston, TX, October 21, 2017. PDF
37. Adjeroh, D., Allaga, M., Tun, J., Lin, J., Jiang, Y., Abbasi, A., and Zhou, X. “String-Based Models for Predicting RNA-Protein Interaction,” ACM Conference on Bioinformatics, Computational Biology and Health Informatics, Boston, MA, August 20-23, 2017. PDF
36. Abbasi, A., Dobolyi, D., Zahedi, M. Z., and Vance, T. “The Phishing Funnel Model: Predicting User Susceptibility to Phishing Attacks,” In the 13th Annual Winter Conference on Business Analytics, Salt Lake City, UT, March 2-4, 2017.
35. Li, J., Abbasi, A., Cheema, A., and Abraham, L. “Path to Purpose? Impact of Online Purchases’ Hedonic and Utilitarian Characteristics on the Customer Journey,” Workshop on Information Technologies and Systems (WITS), Dublin, Ireland, December 15-16, 2016.
34. Li, J., Larsen, K., and Abbasi, A. “Unlocking Knowledge Inheritance of Behavioral Research through Ontology Learning: An Ontology-Based Search Engine,” Workshop on Information Technologies and Systems (WITS), Dublin, Ireland, December 15-16, 2016 (Best Prototype Award). PDF
33. Dobolyi, D. and Abbasi, A. “PhishMonger: A Free and Open Source Public Archive of Real-World Phishing Websites,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Tucson, Arizona, Sept. 27-30, 2016.
32. Abbasi, A., and Zahedi, F. M. “Phishing Susceptibility: The Good, the Bad, and the Ugly,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Tucson, Arizona, Sept. 27-30, 2016.
31. Abbasi, A., Zhao, K., and Abraham, B. “A Prototype System for Collecting and Analyzing Credible Online Medical Content,” International Conference on Design Science Research in Information Systems and Technology (DESRIST), St. John’s, Canada, May 23-24, 2016.
30. Li, J., Larsen, K., and Abbasi, A. “TheoryOn: Designing a Construct-based Search Engine to Reduce Information Overload for Behavioral Science Research,” International Conference on Design Science Research in Information Systems and Technology (DESRIST), St. John’s, Canada, May 23-24, 2016.
29. Abbasi, A., Li, J., Abbasi, S., Adjeroh, D., Abate, M., Zheng, W. “Don’t Mention It? Analyzing User-generated Content Signals for Early Adverse Drug Event Warnings,” Workshop on Information Technologies and Systems (WITS), Dallas, Texas, December 12-13, 2015 (Best Paper Award).
28. Sharif, H., Ismail, S., Farooqi, S., Khan, M. T., Gulzar, M. A., Lakhani, H., Zaffar, F. and Abbasi, A. “A Classification Based Framework to Predict Viral Threads,” In the 19th Pacific Asia Conference on Information Systems (PACIS), Singapore, July 5-9, 2015.
27. Abbasi, A., Li, W., Benjamin, V., Hu, S., and Chen, H. “Descriptive Analytics: Examining Expert Hackers in Web Forums,” IEEE Joint Intelligence and Security Informatics Conference (IEEE ISI), The Hague, Netherlands, September 24-26, 2014.
26. Sharif, H., Zaffar, F., Abbasi, A., and Zimbra, D. “Detecting Adverse Drug Reactions using a Sentiment Classification Framework,” ASE Conference on Social Computing, Stanford, May 26-30, 2014.
25. Li, W., Abbasi, A., Hu, S., Benjamin, V., and Chen, H. “Modeling Interactions in Web Forums,” ASE Conference on Social Computing (SocialCom), Stanford, May 26-30, 2014.
24. Abbasi, A., Hassan, A., and Dhar, M. “Benchmarking Twitter Sentiment Analysis Tools,” In the 9th Language Resources and Evaluation Conference (LREC), Reykjavik, Iceland, May 26-31, 2014.
23. Abbasi, A., Fu, T., Zeng, D., and Adjeroh, D. “Crawling Credible Online Medical Sentiments for Social Intelligence,” ASE/IEEE International Conference on Social Computing (SocialCom), Washington D.C., September 8-14, 2013.
22. Hassan, A., Abbasi, A., and Zeng, D. “Twitter Sentiment Analysis: A Bootstrap Ensemble Framework,” ASE/IEEE International Conference on Social Computing (SocialCom), Washington D.C., September 8-14, 2013.
21. Beal, R., Adjeroh, D., and Abbasi, A. “The Forward Stem Matrix,” ACM Conference on Bioinformatics, Computational Biology and Biomedical Informatics, Washington D.C., September 22-25, 2013.
20. Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C., and Chen, H. “Evaluating Text Visualization: An Experiment in Authorship Analysis,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Seattle, Washington, June 4-7, 2013 (Best Paper Nominee).
19. Abbasi, A., Zahedi, F. M., and Chen, Y. “Impact of Anti-Phishing Tool Performance on Attack Success Rates,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Washington D.C., June 11-14, 2012.
18. Koepke, J., Kaza, S., and Abbasi, A. “Identification of Malicious and Fake Websites: Using Information from the Transport and Internet Layers of the Network Stack,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Washington D.C., June 11-14, 2012.
17. France, S. and Abbasi, A. “Boosting Unsupervised Additive Clustering Using Cluster-Wise Optimization and Multi-Label Learning,” IEEE International Conference on Data Mining Workshops (ICDM), Vancouver, Canada, December 11, 2011.
16. Zhang, Z., Zeng, D., Abbasi, A., and Peng, J. “A Random Walk Model for Item Recommendation in Folksonomies,” In the 21st Workshop on Information Technologies and Systems (WITS), Shanghai, China, December 3-4, 2011.
15. Zahedi, F. M., Abbasi, A., and Chen, Y. “Design Elements that Promote the use of Fake Website Detection Tools,” In the 10th AIS SIG-HCI Workshop, Shanghai, China, December 4, 2011 (Best Paper Nominee).
14. Zahedi, F. M., Abbasi, A., and Chen, Y. “Trust Calibration of Security IT Artifacts: The Case of Fake Website Detection Tools,” In the Workshop on Information Security and Privacy (WISP), Shanghai, China, December 4, 2011.
13. Chen, Y., Zahedi, F. M., and Abbasi, A. “Interface Design Elements for Anti-Phishing Systems,” International Conference on Design Science Research in Information Systems and Technology (DESRIST), Milwaukee, Wisconsin, May 5-6, 2011 (Best Paper Nominee).
12. Abbasi, A. “Leveraging Website Genre and Structure Information for Fake Website Detection,” Workshop on Information Technologies and Systems (WITS), St. Louis, Missouri, December 11-12, 2010 (Best Paper Award).
11. Fu, T., Abbasi, A., Zeng, D., and Chen, H. “Evaluating the Usefulness of Sentiment Information for Focused Crawlers,” Workshop on Information Technologies and Systems (WITS), St. Louis, Missouri, December 11-12, 2010.
10. Abbasi, A., Kaza, S., and Zahedi, F. M. “Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites,” Workshop on Information Technologies and Systems (WITS), Phoenix, Arizona, December 14-15, 2009.
9. Abbasi, A., Zhang, Z., and Chen, H. “A Statistical Learning Based System for Fake Website Detection,” In the Workshop on Secure Knowledge Management , Dallas, Texas, November 3-4, 2008.
8. Chen, Y., Abbasi, A., and Chen, H. “Developing Ideological Networks using Social Network Analysis and Writeprints: A Case Study of the International Falun Gong Movement,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Taiwan, June 17-20, 2008, pp. 7-12.
7. Abbasi, A. and Chen, H. “Detecting Fake Escrow Websites using Rich Fraud Cues and Kernel Based Methods,” Workshop on Information Technologies and Systems (WITS), Montreal, Canada, December 8-9, 2007, pp. 55-60.
6. Abbasi, A. and Chen, H. “A Framework for Stylometric Similarity Detection in Online Settings,” In the 13th Americas Conference on Information Systems (AMCIS), Keystone, Colorado, August 9-12, 2007.
5. Abbasi, A. and Chen, H. "Categorization and Analysis of Text in Computer Mediated Communication Archives using Visualization," ACM/IEEE Joint Conference on Digital Libraries (JCDL), Vancouver, Canada, June 18-23, 2007, pp. 11-18.
4. Abbasi, A. and Chen, H. "Affect Intensity Analysis of Dark Web Forums," IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), New Brunswick, New Jersey, May 23-24, 2007, pp. 282-288.
3. Fu, T., Abbasi, A. and Chen, H. "Interaction Coherence Analysis for Dark Web Forums," IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), New Brunswick, New Jersey, May 23-24, 2007, pp. 342-349.
2. Abbasi, A. and Chen, H. "Visualizing Authorship for Identification," IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), San Diego, California, May 23-24, 2006, pp. 60-71.
1. Abbasi, A. and Chen, H. "Applying Authorship Analysis to Arabic Web Content," IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Atlanta, Georgia, May 18-19, 2005, pp. 183-197.