All Publications |
---|
123. (J61) Zheng, R., Li, J., Zivkovic, M., and Abbasi, A. "Automating in High-Expertise, Low-Label Environments: Evidence-Based Medicine by Expert-Augmented Few-Shot Learning," MIS Quarterly, forthcoming. |
122. (J60) Abbasi, A., Somanchi, S., and Kelley, K. "The Critical Challenge of using Large-scale Digital Experiment Platforms for Scientific Discovery," MIS Quarterly, 49(1), 2025, pp. 1-28. |
121. (J59) Qin, R., Cook, R., Yang, K., Abbasi, A., Dobolyi, D., … Clifford, G. "Language Models for Online Depression Detection: A Review and Benchmark Analysis on Remote Interviews," ACM Transactions on MIS, 16(2), 2025, no. 12, pp. 1-35. |
120. (J58) Mao, W., Qiu, X., and Abbasi, A. “LLMs and Their Applications in Medical Artificial Intelligence,” ACM Transactions on MIS, 16(2), 2025, no. 10, pp. 1-7. |
119. (J57) Yang, Y., Lalor, J. P., Abbasi, A., and Zeng, D. "Hierarchical Deep Document Model," IEEE Transactions on Knowledge and Data Engineering, 37(1), 2025, pp. 351-364. |
118. (J56) Bevilacqua, M., Oketch, K., Qin, R., Stamey, W., Zhang, X., Gan, Y., Yang, K. Abbasi, A. "When Automated Assessment Meets Automated Content Generation: Examining Text Quality in the Era of GPTs," ACM Transactions on Information Systems, 43(2), 2025, no. 2, pp. 1-36. |
117. (C62) Cook, R., Lalor, J. P., and Abbasi, A. "No Simple Answer to Data Complexity: An Examination of Instance-Level Complexity Metrics for Classification Tasks," In the Annual Meeting of the North American Association for Computational Linguistics (NAACL), Albuquerque, April-May, 2025. |
116. (C61) Yang, Y., Duan, H., Abbasi, A., Lalor, J. P., and Tam, K. Y. "Bias A-head? Analyzing Bias in Transformer-Based Language Model Attention Heads," In the 5th Workshop on Trustworthy Natural Language Processing (TrustNLP @ NAACL) , 2025., Albuquerque, April-May, 2025. |
115. (C60) Prat, N., Lalor, J. P., and Abbasi, A. "GALEA – Leveraging Generative Agents in Artifact Evaluation," In the 20th International Conference on Design Science Research in Information Systems and Technology (DESRIST) , Montego Bay, Jamaica, June 2025. |
114. (J55) Abbasi, A., Parsons, J., Pant, G., Sheng, O., and Sarker, S. "Pathways for Design Research on Artificial Intelligence," Information Systems Research, 35(2), 2024, pp. 1-19. PDF |
113. (J54) Kitchens, B., Claggett, J., and Abbasi, A. "Timely, Granular, and Actionable: Designing a Social Listening Platform for Public Health 3.0," MIS Quarterly, 48(3), 2024, pp. 899-930. |
112. (J53) Lalor, J. P., Abbasi, A., Oketch, K., Yang, Y., and Forsgren, N. “Should Fairness be a Metric or a Model? A Model-based Framework for Assessing Bias in Machine Learning Pipelines,” ACM Transactions on Information Systems, 42(4), 2024, no. 99, pp. 1-41. Selected for presentation at ACM SIGIR. PDF |
111. (J52) Abbasi, A., Merrill, R. L., Rao, R., and Sheng, O. “Preparedness and Response in the Century of Disasters: Overview of Information Systems Research Frontiers,” Information Systems Research, 35(2), 2024, pp. 460-468. |
110. (J51) Jiang, Z., Seyedi, S., Griner, E., Abbasi, A., Rad, A. B., Kwon, H., Cotes, R. O., & Clifford, G. D. "Evaluating and Mitigating Unfairness in Multimodal Remote Mental Health Assessments," PLOS Digital Health, 3(7), 2024, e0000413. |
109. (J50) Jiang, Z., Seyedi, S., Griner, E., Abbasi, A., Bahrami Rad, A., Kwon, H., Cotes, R. O., Clifford, G. D. "Multimodal mental health digital biomarker analysis from remote interviews using facial, vocal, linguistic, and cardiovascular patterns," IEEE Journal of Biomedical and Health Informatics, 28(3), 2024, 1680-1691. |
108. (J49) Sarrazin-Gendron, R., Gheidari, P. G., Butyaev, A.,…Borderlands Science Development Team, Borderlands Science Players (BSP), Szantner, A., and Waldispuhl, J. "Improving Microbial Phylogeny with Citizen Science within a Mass-market Video Game," Nature Biotechnology, 2024, April 15. Was one of the top BSP members. |
107. (C59) Duan, H., Yang, Y., Abbasi, A., and Tam, K. Y. "Exploring the Relationship between In-Context Learning and Instruction Tuning," In Findings of the Empirical Methods in Natural Language Processing (EMNLP Findings), Miami, December 2024. PDF |
106. (C58) Qin, R., Yan, Z., Zeng, D., Jia, Z., Liu, D., Liu, J., Abbasi, A., Zheng, Z., Cao, N., Ni, K., Xiong, J., and Shi, Y. "Robust Implementation of Retrieval-Augmented Generation on Edge-based Computing-in-Memory Architectures," In the IEEE International Conference on Computer-Aided Design (ICCAD), New Jersey, October 2024. PDF |
105. (C57) Qin, R., Xia, J., Jia, Z., Jiang, M., Abbasi, A., Zhou, P., Hu, J. and Shi, Y. "Enabling On-Device Large Language Model Personalization with Self-Supervised Data Selection and Synthesis," In the ACM/IEEE Design Automation Conference (DAC), San Francisco, June 2024. PDF |
104. (C56) Qin, R., Hu, Y., Yan, Z., Xiong, J., Abbasi, A., and Shi, Y. "FL-NAS: Towards Fairness of NAS for Resource Constrained Devices via Large Language Models," In the IEEE Asia and South Pacific Design Automation Conference (ASP-DAC), Incheon, South Korea, January 2024. PDF |
103. (J48 Abbasi, A., Chiang, R. H. L., and Xu, J. “Data Science for Social Good,” Journal of the Association for Information Systems, 24(6), 2023. PDF |
102. (J47) Somanchi, S., Abbasi, A., Kelley, K., Dobolyi, D., and Yuan, T. “Examining User Heterogeneity in Digital Experiments,” ACM Transactions on Information Systems, 41(4), 2023, no. 100. PDF |
101. (J46) Seyedi, S., Griner, E., Corbin, L., Jiang, Z. Iacobelli, L., Milloy, A., Boazak, M. Bahrami Rad, A., Abbasi, A., Cotes, R. O., Clifford, G. D. “A Comparison of HIPAA-Compliant Transcription Services for Virtual Psychiatric Interviews,” JMIR Mental Health, 10(1), 2023, e48517. PDF |
100. (J45) Yang, K., Lau, R. Y. K., and Abbasi, A. “Getting Personal: A Deep Learning Artifact for Text-based Measurement of Personality,” Information Systems Research, 34(1), 2023, pp. 194-222. PDF |
99. (J44) Ahmad, F., Abbasi, A., Kitchens, B., Adjeroh, D., and Zeng, D. “Deep Learning for Adverse Event Detection from Web Search,” IEEE Transactions on Knowledge and Data Engineering, 34(6), 2022, pp. 2681-2695. PDF |
98. (C55) Duan, H., Yang, Y., Abbasi, A., and Tam, K. Y. “BARLE: Background-Aware Representation Learning for Background Shift Out-of-Distribution Detection” In Findings of the Empirical Methods in Natural Language Processing (EMNLP), Abu Dhabi, UAE, December 2022. PDF |
97. (C54) Lalor, J. P., Yang, Y., Smith, K., Forsgren, N., and Abbasi, A. “Benchmarking Intersectional Biases in NLP,” In the Annual Meeting of the North American Association for Computational Linguistics (NAACL), July 10-15, 2022. PDF |
96. (C53) Guo, Y., Yang, Y., and Abbasi, A. “Auto-Debias: Debiasing Masked Language Models with Automated Biased Prompts,” In the 60th Annual Meeting of the Association for Computational Linguistics (ACL), May 22-27, 2022. PDF |
95. (J43) Abbasi, A., Dobolyi, D.,Vance, T., and Zahedi, F. M. “The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites,” Information Systems Research, 32(2), 2021, pp. 410-436. PDF Appendices |
94. (J42) Chen, Y., Zahedi, F. M., Abbasi, A., and Dobolyi, D. “Trust Calibration of Security IT Artifacts: A Multi-Domain Study of Phishing-Website Detection Tools,” Information and Management, 58(1), 2021, 103394. PDF |
93. (C52) Islam, S., Abbasi, A., Agrawal, N., Zheng, W., Doretto, G., and Adjeroh, D. “Detecting Drug-Drug Interactions using Protein Sequence-Structure Similarity Networks,” IEEE BIBM International Workshop on Deep Learning in Bioinformatics, Biomedicine, and Healthcare Informatics, December 9-12, 2021. PDF |
92. (C51) Abbasi, A., Dobolyi, D. G., Lalor, J., Netemeyer, R. N., Smith, K., and Yang, Y. “Constructing a Psychometric Testbed for Fair Natural Language Processing,” Conference on Empirical Methods in Natural Language Processing (EMNLP), Punta Cana, Dominican Republic, November 7-11, 2021. PDF |
91. (C50) Berente, N., Lalor, J., Somanchi, S., and Abbasi, A. “The Illusion of Certainty and Data-Driven Decision Making in Emergent Situations,” International Conference on Information Systems (ICIS) , Austin. Texas, December 7-11, 2021. |
90. (J41) Li, J., Larsen, K., and Abbasi, A. “TheoryOn: A Design Framework and System for Unlocking Behavioral Knowledge through Ontology Learning,” MIS Quarterly, 44(4), 2020, pp. 1733-1772. PDF Appendices |
89. (J40) Li, J., Abbasi, A., Cheema, A., and Abraham, L. “Path to Purpose? How Online Customer Journeys Differ for Hedonic versus Utilitarian Purchases,” Journal of Marketing, 84(4), 2020, pp. 127-146. PDF |
88. (J39) Ahmad, F., Abbasi, A., Li, J., Dobolyi, D., Netemeyer, R., Clifford, G., and Chen, H. “A Deep Learning Architecture for Psychometric Natural Language Processing,” ACM Transactions on Information Systems, 38(1), 2020, no. 6. PDF |
87. (J38)Netemeyer, R., Dobolyi, D., Abbasi, A., Clifford, G., and Taylor, H. “Health Literacy, Health Numeracy and Trust in Doctor: Effects on Key Consumer Health Outcomes,” Journal of Consumer Affairs, 54(1), 2020, pp. 3-42. PDF |
86. (C49) Mahmood, S. H. A. and Abbasi, A. “Using Deep Generative Models to Boost Forecasting: A Phishing Prediction Case Study,” IEEE International Conference on Data Mining (ICDM) Workshops, Sorrento, Italy, November 17-20, 2020. PDF |
85. (C48) Mahmood, S. H. A., Ali, S. M., and Abbasi, A. “Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Virtual Conference, November 9-10, 2020. PDF |
84. (C47) Dobolyi, D. G., Abbasi, A., Zahedi, F. M., and Vance, A. “An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Virtual Conference, November 9-10, 2020. |
83. (C46) Kitchens, B., Abbasi, A., and Claggett, J. “Beating the Clock with MedCrawl: A Social Listening Platform for Health 2.0,” INFORMS Workshop on Data Science , Washington D.C., November 7-8, 2020. |
82. (J37) Abbasi, A., Li, J., Adjeroh, D., Abate, M., and Zheng W. “Don’t Mention It? Analyzing User-generated Content Signals for Early Adverse Event Warnings,” Information Systems Research, 30(3), 2019, pp. 1007-1028. PDF |
81. (J36) Abbasi, A., Kitchens, B., and Ahmad, F. “The Risks of AutoML and How to Avoid Them,” Harvard Business Review, October 24, 2019, digital article: https://hbr.org/2019/10/the-risks-of-automl-and-how-to-avoid-them |
80. (J35) Deng, S., Zhang, P., Zhou, Y., and Abbasi, A. “Using Discussion Logic in Analyzing Online Group Discussions: A Text Mining Approach,” Information and Management, 56(4), 2019, pp. 536-551. PDF |
79. (C45) Abbasi, A., Claggett, J., Kitchens, B., and Chen, H. “MedCrawl: Improving Public Health Outcomes through Effective and Efficient Social Listening,” In the 10th Conference on Health IT and Analytics, Washington D.C., November 15-16, 2019 |
78. (J34) Abbasi, A., Li, J., Clifford, G. D., and Taylor, H. A, “Make ‘Fairness By Design’ Part of Machine Learning,” Harvard Business Review, August 5, 2018, digital article: https://hbr.org/2018/08/make-fairness-by-design-part-of-machine-learning |
77. (J33) Kitchens, B., Dobolyi, D., Li, J., and Abbasi, A. “Advanced Customer Analytics: Strategic Value through Integration of Relationship-Oriented Big Data,” Journal of Management Information Systems, 35(2), 2018, pp. 540-574. PDF |
76. (J32) Abbasi, A. Zhou, Y., Deng, S., and Zhang, P. “Text Analytics to Support Sense-making in Social Media: A Language-Action Perspective,” MIS Quarterly, 42(2), 2018, pp. 427-464. PDF Appendices |
75. (J31) Zimbra, D., Abbasi, A., Zeng, D., and Chen, H. “The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation,” ACM Transactions on Management Information Systems, 9(2), 2018, no. 5. PDF |
74. (J30) Taylor, H. A., Henderson, F., Abbasi, A., and Clifford, G. D., “Cardiovascular Disease in African Americans: Innovative Community Engagement for Research Recruitment and Impact,” American Journal of Kidney Diseases, 72(5)(Supp 1), 2018, S43-S46. PDF |
73. (J29) Adjeroh, D., Allaga, M., Tan, J., Lin, J., Jiang, Y., Abbasi, A., and Zhou, X. “Feature-Based and String-Based Models for Predicting RNA-Protein Interaction,” Molecules, 23(3), 2018, 697. PDF |
72. (C44) Khaja, H. I., Abate, M., Zheng, W., Abbasi, A., and Adjeroh, D. “Evaluating Semantic Similarity for Adverse Drug Event Narratives,” International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction (SBP), Washington D.C., 2018. PDF |
71. (C43) Li, J., Abbasi, A., Ahmad, F., and Chen, H. “Deep Learning for Psychometric NLP,” Workshop on Information Technologies and Systems (WITS) , Santa Clara, CA, December 15-16, 2018. PDF |
70. (C42) Ahmad, F., Abbasi, A., Kitchens, B., and Zeng, D. “Finding Needles in a Haystack: Deep Learning for Rare Adverse Event Detection,” INFORMS Workshop on Data Science, Phoenix, AZ, November 3, 2018. |
69. (C41) Li, J., Abbasi, A., Ahmad, F., and Chen, H. “PyNDA: Deep Learning for Psychometric Natural Language Processing,” INFORMS Workshop on Data Science, Phoenix, AZ, November 3, 2018 (Best Paper Nominee). PDF |
68. (C40) Tremblay, M. C., Kohli, R., Forsgren, N., Grover, V., Abbasi, A., Hevner, A., and Rapaport, R. “Will Artificial Intelligence Automate Theory Building? Are there Lessons for Academia from Practice?,” International Conference on Information Systems, San Francisco, CA, December 13-16, 2018. |
67. (C39) Dobolyi, D., Abbasi, A., Zahedi, M. Z., and Vance, T. “Predicting User Susceptibility to Phishing Websites,” INFORMS Workshop on Data Science, Houston, TX, October 21, 2017. PDF |
66. (C38) Li, J., Larsen, K., and Abbasi, A. “Unlocking our Behavioral Knowledge Inheritance through Ontology Learning: A Design Framework, an Instantiation, and a Randomized Experiment,” INFORMS Workshop on Data Science, Houston, TX, October 21, 2017. PDF |
65. (C37) Adjeroh, D., Allaga, M., Tun, J., Lin, J., Jiang, Y., Abbasi, A., and Zhou, X. “String-Based Models for Predicting RNA-Protein Interaction,” ACM Conference on Bioinformatics, Computational Biology and Health Informatics, Boston, MA, August 20-23, 2017. PDF |
64. (C36) Abbasi, A., Dobolyi, D., Zahedi, M. Z., and Vance, T. “The Phishing Funnel Model: Predicting User Susceptibility to Phishing Attacks,” In the 13th Annual Winter Conference on Business Analytics, Salt Lake City, UT, March 2-4, 2017. |
63. (J28) Abbasi, A., Sarker, S., and Chiang, R. H. L. “Big Data Research in Information Systems: Toward an Inclusive Research Agenda,” Journal of the Association for Information Systems, 17(2), no. 3, 2016. PDF |
62. (C35) Li, J., Abbasi, A., Cheema, A., and Abraham, L. “Path to Purpose? Impact of Online Purchases’ Hedonic and Utilitarian Characteristics on the Customer Journey,” Workshop on Information Technologies and Systems (WITS), Dublin, Ireland, December 15-16, 2016. |
61. (C34) Li, J., Larsen, K., and Abbasi, A. “Unlocking Knowledge Inheritance of Behavioral Research through Ontology Learning: An Ontology-Based Search Engine,” Workshop on Information Technologies and Systems (WITS), Dublin, Ireland, December 15-16, 2016 (Best Prototype Award). PDF |
60. (C33) Dobolyi, D. and Abbasi, A. “PhishMonger: A Free and Open Source Public Archive of Real-World Phishing Websites,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Tucson, Arizona, Sept. 27-30, 2016. |
59. (C32) Abbasi, A., and Zahedi, F. M. “Phishing Susceptibility: The Good, the Bad, and the Ugly,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Tucson, Arizona, Sept. 27-30, 2016. |
58. (C31) Abbasi, A., Zhao, K., and Abraham, B. “A Prototype System for Collecting and Analyzing Credible Online Medical Content,” International Conference on Design Science Research in Information Systems and Technology (DESRIST), St. John’s, Canada, May 23-24, 2016. |
57. (C30) Li, J., Larsen, K., and Abbasi, A. “TheoryOn: Designing a Construct-based Search Engine to Reduce Information Overload for Behavioral Science Research,” International Conference on Design Science Research in Information Systems and Technology (DESRIST), St. John’s, Canada, May 23-24, 2016. |
56. (J27) Zahedi, F. M., Abbasi, A., and Chen, Y. “Fake-Website Detection Tools: Identifying Design Elements that Promote Individuals’ Use and Enhance their Performance,” Journal of the Association for Information Systems, 16(6), 2015, pp. 448-484. PDF |
55. (J26) Abbasi, A., Zahedi, F. M., Zeng, D., Chen, Y., Chen, H., and Nunamaker Jr., J. F. “Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information,” Journal of Management Information Systems, 31(4), 2015, pp. 109-157. PDF |
54. (J25) Abbasi, A., Lau, R. Y. K., and Brown, D. E. “Predicting Behavior,” IEEE Intelligent Systems, 30(3), 2015, pp. 35-43. PDF |
53. (J24) Brown, D. E., Abbasi, A., and Lau, R. Y. K., “Predictive Analytics: Predictive Modeling at the Micro Level,” IEEE Intelligent Systems, 30(3), 2015, pp. 6-8. PDF |
52. (J23) Brown, D. E., Abbasi, A., and Lau, R. Y. K., “Predictive Analytics,” IEEE Intelligent Systems, 30(2), 2015, pp. 6-8. PDF |
51. (C29) Abbasi, A., Li, J., Abbasi, S., Adjeroh, D., Abate, M., Zheng, W. “Don’t Mention It? Analyzing User-generated Content Signals for Early Adverse Drug Event Warnings,” Workshop on Information Technologies and Systems (WITS), Dallas, Texas, December 12-13, 2015 (Best Paper Award). |
50. (C28) Sharif, H., Ismail, S., Farooqi, S., Khan, M. T., Gulzar, M. A., Lakhani, H., Zaffar, F. and Abbasi, A. “A Classification Based Framework to Predict Viral Threads,” In the 19th Pacific Asia Conference on Information Systems (PACIS), Singapore, July 5-9, 2015. |
49. (J22) Abbasi, A. and Adjeroh, D. “Social Media Analytics for Smart Health,” IEEE Intelligent Systems, 29(2), 2014, pp. 60-64. PDF |
48. (J21) Adjeroh, D., Beal, R., Abbasi, A., Zheng, W., Abate, M., and Ross, A. “Signal Fusion for Social Media Analysis of Adverse Drug Events,” IEEE Intelligent Systems, 29(2), 2014, pp. 74-80. PDF |
47. (J20) Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A., and Chen, H. “Evaluating Text Visualization for Authorship Analysis,” Security Informatics, 3(10), 2014. |
46. (C27) Abbasi, A., Li, W., Benjamin, V., Hu, S., and Chen, H. “Descriptive Analytics: Examining Expert Hackers in Web Forums,” IEEE Joint Intelligence and Security Informatics Conference (IEEE ISI), The Hague, Netherlands, September 24-26, 2014. |
45. (C26) Sharif, H., Zaffar, F., Abbasi, A., and Zimbra, D. “Detecting Adverse Drug Reactions using a Sentiment Classification Framework,” ASE Conference on Social Computing, Stanford, May 26-30, 2014. |
44. (C25) Li, W., Abbasi, A., Hu, S., Benjamin, V., and Chen, H. “Modeling Interactions in Web Forums,” ASE Conference on Social Computing (SocialCom), Stanford, May 26-30, 2014. |
43. (C24) Abbasi, A., Hassan, A., and Dhar, M. “Benchmarking Twitter Sentiment Analysis Tools,” In the 9th Language Resources and Evaluation Conference (LREC), Reykjavik, Iceland, May 26-31, 2014. |
42. (J19) Zhang, Z., Zeng, D., Abbasi, A., Peng, J., and Zheng, X. “A Random Walk Model for Item Recommendation in Social Tagging Systems,” ACM Transactions on Management Information Systems, 4(2), 2013, no. 8. PDF |
41. (C23) Abbasi, A., Fu, T., Zeng, D., and Adjeroh, D. “Crawling Credible Online Medical Sentiments for Social Intelligence,” ASE/IEEE International Conference on Social Computing (SocialCom), Washington D.C., September 8-14, 2013. |
40. (C22) Hassan, A., Abbasi, A., and Zeng, D. “Twitter Sentiment Analysis: A Bootstrap Ensemble Framework,” ASE/IEEE International Conference on Social Computing (SocialCom), Washington D.C., September 8-14, 2013. |
39. (C21) Beal, R., Adjeroh, D., and Abbasi, A. “The Forward Stem Matrix,” ACM Conference on Bioinformatics, Computational Biology and Biomedical Informatics, Washington D.C., September 22-25, 2013. |
38.(C20) Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C., and Chen, H. “Evaluating Text Visualization: An Experiment in Authorship Analysis,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Seattle, Washington, June 4-7, 2013 (Best Paper Nominee). |
37. (J18) Abbasi, A., Albrecht, C. C., Vance, A., and Hansen, J. V. “MetaFraud: A Meta-learning Framework for Detecting Financial Fraud,” MIS Quarterly, 36(4), 2012, pp. 1293–1327. PDF Appendices |
36. (J17) Fu, T., Abbasi, A., Zeng, D., and Chen, H. “Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers,” ACM Transactions on Information Systems, 30(4), 2012, no. 24. PDF |
35. (J16) Abbasi, A., Zahedi, F. M., and Kaza, S. “Detecting Fake Medical Web Sites using Recursive Trust Labeling,” ACM Transactions on Information Systems, 30(4), 2012, no. 22. PDF |
34. (C19) Abbasi, A., Zahedi, F. M., and Chen, Y. “Impact of Anti-Phishing Tool Performance on Attack Success Rates,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Washington D.C., June 11-14, 2012. |
33. (C18) Koepke, J., Kaza, S., and Abbasi, A. “Identification of Malicious and Fake Websites: Using Information from the Transport and Internet Layers of the Network Stack,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Washington D.C., June 11-14, 2012. |
32. (J15) Abbasi, A., France, S. L., Zhang, Z., and Chen, H. “Selecting Attributes for Sentiment Classification using Feature Relation Networks,” IEEE Transactions on Knowledge and Data Engineering, 23(3), 2011, pp. 447-462. PDF |
31. (C17) France, S. and Abbasi, A. “Boosting Unsupervised Additive Clustering Using Cluster-Wise Optimization and Multi-Label Learning,” IEEE International Conference on Data Mining Workshops (ICDM), Vancouver, Canada, December 11, 2011. |
30. (C16) Zhang, Z., Zeng, D., Abbasi, A., and Peng, J. “A Random Walk Model for Item Recommendation in Folksonomies,” In the 21st Workshop on Information Technologies and Systems (WITS), Shanghai, China, December 3-4, 2011. |
29. (C15) Zahedi, F. M., Abbasi, A., and Chen, Y. “Design Elements that Promote the use of Fake Website Detection Tools,” In the 10th AIS SIG-HCI Workshop, Shanghai, China, December 4, 2011 (Best Paper Nominee). |
28. (C14) Zahedi, F. M., Abbasi, A., and Chen, Y. “Trust Calibration of Security IT Artifacts: The Case of Fake Website Detection Tools,” In the Workshop on Information Security and Privacy (WISP), Shanghai, China, December 4, 2011. |
27. (C13) Chen, Y., Zahedi, F. M., and Abbasi, A. “Interface Design Elements for Anti-Phishing Systems,” International Conference on Design Science Research in Information Systems and Technology (DESRIST), Milwaukee, Wisconsin, May 5-6, 2011 (Best Paper Nominee). |
26. (J14) Zimbra, D., Abbasi, A., and Chen, H. “A Cyber-Archaeology Approach to Social Movement Research: Framework and Case Study,” Journal of Computer-Mediated Communication, 16, 2010, pp. 48-70. PDF |
25. (J13) Abbasi, A. “Intelligent Feature Selection for Opinion Classification,” IEEE Intelligent Systems, 25(4), 2010, pp. 75-79. PDF |
24. (J12) Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., and Nunamaker Jr., J. F. “Detecting Fake Websites: The Contribution of Statistical Learning Theory,” MIS Quarterly, 34(3), 2010, pp. 435-461, MISQ Best Paper Award for 2010, AIS 5 Best Publications for 2010. PDF |
23. (J11) Fu, T., Abbasi, A., and Chen, H. “A Focused Crawler for Dark Web Forums,” Journal of the American Society for Information Science and Technology, 61(6), 2010, pp. 1213-1231. PDF |
22. (J10) Chen, Y. Abbasi, A., and Chen, H. “Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement,” Annals of Information Systems, 9, 2010, pp. 1-24. PDF |
21. (C12) Abbasi, A. “Leveraging Website Genre and Structure Information for Fake Website Detection,” Workshop on Information Technologies and Systems (WITS), St. Louis, Missouri, December 11-12, 2010 (Best Paper Award). |
20. (C11) Fu, T., Abbasi, A., Zeng, D., and Chen, H. “Evaluating the Usefulness of Sentiment Information for Focused Crawlers,” Workshop on Information Technologies and Systems (WITS), St. Louis, Missouri, December 11-12, 2010. |
19. (J9) Abbasi, A. and Chen, H. “A Comparison of Tools for Detecting Fake Websites,” IEEE Computer, 42(10), 2009, pp. 78-86. PDF |
18. (J8) Abbasi, A. and Chen, H. “A Comparison of Fraud Cues and Classification Methods for Fake Escrow Website Detection,” Information Technology and Management, 10(2), 2009, pp. 83-101. PDF |
17. (C10) Abbasi, A., Kaza, S., and Zahedi, F. M. “Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites,” Workshop on Information Technologies and Systems (WITS), Phoenix, Arizona, December 14-15, 2009. |
16. (J7) Abbasi, A., and Chen, H. “CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication,” MIS Quarterly, 32(4), 2008, pp. 811-837. PDF |
15. (J6) Abbasi, A., Chen, H., Thoms, S., and Fu, T. “Affect Analysis of Web Forums and Blogs using Correlation Ensembles,” IEEE Transactions on Knowledge and Data Engineering, 20(9), 2008, pp. 1168-1180. PDF |
14. (J5) Abbasi, A., Chen, H., and Nunamaker Jr., J. F. “Stylometric Identification in Electronic Markets: Scalability and Robustness,” Journal of Management Information Systems, 25(1), 2008, pp. 49-78. PDF |
13. (J4) Abbasi, A., Chen, H., and Salem, A. “Sentiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums,” ACM Transactions on Information Systems, 26(3), 2008, no. 12. PDF |
12. (J3) Fu, T., Abbasi, A., and Chen, H. “A Hybrid Approach to Web Forum Interactional Coherence Analysis,” Journal of the American Society for Information Science and Technology, 59(8), 2008, pp. 1195-1209. PDF |
11. (J2) Abbasi, A., and Chen, H. “Writeprints: A Stylometric Approach to Identity-Level Identification and Similarity Detection in Cyberspace,” ACM Transactions on Information Systems, 26(2), 2008, no. 7. PDF |
10. (C9) Abbasi, A., Zhang, Z., and Chen, H. “A Statistical Learning Based System for Fake Website Detection,” In the Workshop on Secure Knowledge Management , Dallas, Texas, November 3-4, 2008. |
9. (C8) Chen, Y., Abbasi, A., and Chen, H. “Developing Ideological Networks using Social Network Analysis and Writeprints: A Case Study of the International Falun Gong Movement,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Taiwan, June 17-20, 2008, pp. 7-12. |
8. (C7) Abbasi, A. and Chen, H. “Detecting Fake Escrow Websites using Rich Fraud Cues and Kernel Based Methods,” Workshop on Information Technologies and Systems (WITS), Montreal, Canada, December 8-9, 2007, pp. 55-60. |
7. (C6) Abbasi, A. and Chen, H. “A Framework for Stylometric Similarity Detection in Online Settings,” In the 13th Americas Conference on Information Systems (AMCIS), Keystone, Colorado, August 9-12, 2007. |
6. (C5) Abbasi, A. and Chen, H. "Categorization and Analysis of Text in Computer Mediated Communication Archives using Visualization," ACM/IEEE Joint Conference on Digital Libraries (JCDL), Vancouver, Canada, June 18-23, 2007, pp. 11-18. |
5. (C4) Abbasi, A. and Chen, H. "Affect Intensity Analysis of Dark Web Forums," IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), New Brunswick, New Jersey, May 23-24, 2007, pp. 282-288. |
4. (C3) Fu, T., Abbasi, A. and Chen, H. "Interaction Coherence Analysis for Dark Web Forums," IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), New Brunswick, New Jersey, May 23-24, 2007, pp. 342-349. |
3. (C2)Abbasi, A. and Chen, H. "Visualizing Authorship for Identification," IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), San Diego, California, May 23-24, 2006, pp. 60-71. |
2. (C1) Abbasi, A. and Chen, H. "Applying Authorship Analysis to Arabic Web Content," IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), Atlanta, Georgia, May 18-19, 2005, pp. 183-197. |
1. (J1) Abbasi, A., and Chen, H. “Applying Authorship Analysis to Extremist-Group Web Forum Messages,” IEEE Intelligent Systems, 20(5), 2005, pp. 67-75. PDF |