Ahmed Abbasi

Orcid: 0000-0001-7698-7794

According to our database1, Ahmed Abbasi authored at least 90 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multimodal Mental Health Digital Biomarker Analysis From Remote Interviews Using Facial, Vocal, Linguistic, and Cardiovascular Patterns.
IEEE J. Biomed. Health Informatics, March, 2024

FL-NAS: Towards Fairness of NAS for Resource Constrained Devices via Large Language Models.
CoRR, 2024

2023
Examining User Heterogeneity in Digital Experiments.
ACM Trans. Inf. Syst., October, 2023

Getting Personal: A Deep Learning Artifact for Text-Based Measurement of Personality.
Inf. Syst. Res., March, 2023

Data Science for Social Good.
J. Assoc. Inf. Syst., 2023

Enabling On-Device Large Language Model Personalization with Self-Supervised Data Selection and Synthesis.
CoRR, 2023

Bias A-head? Analyzing Bias in Transformer-Based Language Model Attention Heads.
CoRR, 2023

Exploring the Relationship between In-Context Learning and Instruction Tuning.
CoRR, 2023

When Automated Assessment Meets Automated Content Generation: Examining Text Quality in the Era of GPTs.
CoRR, 2023

2022
Deep Learning for Adverse Event Detection From Web Search.
IEEE Trans. Knowl. Data Eng., 2022

A Large-Scale Benchmark Dataset for Anomaly Detection and Rare Event Classification for Audio Forensics.
IEEE Access, 2022

Benchmarking Intersectional Biases in NLP.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

BARLE: Background-Aware Representation Learning for Background Shift Out-of-Distribution Detection.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Deepfake Audio Detection Via Feature Engineering And Machine Learning.
Proceedings of the CIKM 2022 Workshops co-located with 31st ACM International Conference on Information and Knowledge Management (CIKM 2022), 2022

Auto-Debias: Debiasing Masked Language Models with Automated Biased Prompts.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites.
Inf. Syst. Res., 2021

Call for Papers - Special Issue of <i>Information Systems Research</i> - Unleashing the Power of Information Technology for Strategic Management of Disasters.
Inf. Syst. Res., 2021

Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools.
Inf. Manag., 2021

Toward Tweet-Mining Framework for Extracting Terrorist Attack-Related Information and Reporting.
IEEE Access, 2021

The Illusion of Certainty and Data-Driven Decision Making in Emergent Situations.
Proceedings of the 42nd International Conference on Information Systems, 2021

Constructing a Psychometric Testbed for Fair Natural Language Processing.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Detecting Drug-Drug Interactions using Protein Sequence-Structure Similarity Networks.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

2020
A Deep Learning Architecture for Psychometric Natural Language Processing.
ACM Trans. Inf. Syst., 2020

TheoryOn: A Design Framework and System for Unlocking Behavioral Knowledge Through Ontology Learning.
MIS Q., 2020

Constructing a Testbed for Psychometric Natural Language Processing.
CoRR, 2020

Phishcasting: Deep Learning for Time Series Forecasting of Phishing Attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Using Deep Generative Models to Boost Forecasting: A Phishing Prediction Case Study.
Proceedings of the 20th International Conference on Data Mining Workshops, 2020

2019
Don't Mention It? Analyzing User-Generated Content Signals for Early Adverse Event Warnings.
Inf. Syst. Res., 2019

Using discussion logic in analyzing online group discussions: A text mining approach.
Inf. Manag., 2019

2018
The State-of-the-Art in Twitter Sentiment Analysis: A Review and Benchmark Evaluation.
ACM Trans. Manag. Inf. Syst., 2018

Text Analytics to Support Sense-Making in Social Media: A Language-Action Perspective.
MIS Q., 2018

Advanced Customer Analytics: Strategic Value Through Integration of Relationship-Oriented Big Data.
J. Manag. Inf. Syst., 2018

Evaluating Semantic Similarity for Adverse Drug Event Narratives.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

2017
String-Based Models for Predicting RNA-Protein Interaction.
Proceedings of the 8th ACM International Conference on Bioinformatics, 2017

2016
Big Data Research in Information Systems: Toward an Inclusive Research Agenda.
J. Assoc. Inf. Syst., 2016

PhishMonger: A free and open source public archive of real-world phishing websites.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Phishing susceptibility: The good, the bad, and the ugly.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

TheoryOn: Designing a Construct-Based Search Engine to Reduce Information Overload for Behavioral Science Research.
Proceedings of the Tackling Society's Grand Challenges with Design Science, 2016

A Prototype System for Collecting and Analyzing Credible Online Medical Content.
Proceedings of the Tackling Society's Grand Challenges with Design Science, 2016

2015
Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information.
J. Manag. Inf. Syst., 2015

Fake-Website Detection Tools: Identifying Elements that Promote Individuals' Use and Enhance Their Performance.
J. Assoc. Inf. Syst., 2015

Predictive Analytics: Predictive Modeling at the Micro Level.
IEEE Intell. Syst., 2015

Predictive [Guest editors' introduction].
IEEE Intell. Syst., 2015

Predicting Behavior.
IEEE Intell. Syst., 2015

A Classification Based Framework to Predict Viral Threads.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

2014
Evaluating text visualization for authorship analysis.
Secur. Informatics, 2014

Social Media Analytics for Smart Health.
IEEE Intell. Syst., 2014

Benchmarking Twitter Sentiment Analysis Tools.
Proceedings of the Ninth International Conference on Language Resources and Evaluation, 2014

Descriptive Analytics: Examining Expert Hackers in Web Forums.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

2013
A Random Walk Model for Item Recommendation in Social Tagging Systems.
ACM Trans. Manag. Inf. Syst., 2013

A Random Walk Model for Item Recommendation in Folksonomies.
CoRR, 2013

Design Elements that Promote the use of Fake Website Detection Tools.
CoRR, 2013

Evaluating the Usefulness of Sentiment Information for Focused Crawlers.
CoRR, 2013

A Statistical Learning Based System for Fake Website Detection.
CoRR, 2013

Evaluating Link-Based Techniques for Detecting Fake Pharmacy Websites.
CoRR, 2013

Detecting Fake Escrow Websites using Rich Fraud Cues and Kernel Based Methods.
CoRR, 2013

Twitter Sentiment Analysis: A Bootstrap Ensemble Framework.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Crawling Credible Online Medical Sentiments for Social Intelligence.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Evaluating text visualization: An experiment in authorship analysis.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

The Forward Stem Matrix: An Efficient Data Structure for Finding Hairpins in RNA Secondary Structures.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers.
ACM Trans. Inf. Syst., 2012

Detecting Fake Medical Web Sites Using Recursive Trust Labeling.
ACM Trans. Inf. Syst., 2012

MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud.
MIS Q., 2012

Exploratory experiments to identify fake websites by using features from the network stack.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Impact of anti-phishing tool performance on attack success rates.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

2011
Selecting Attributes for Sentiment Classification Using Feature Relation Networks.
IEEE Trans. Knowl. Data Eng., 2011

Boosting Unsupervised Additive Clustering Using Cluster-Wise Optimization and Multi-label Learning.
Proceedings of the Data Mining Workshops (ICDMW), 2011

Interface Design Elements for Anti-phishing Systems.
Proceedings of the Service-Oriented Perspectives in Design Science Research, 2011

2010
Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement.
Proceedings of the Security Informatics, 2010

Detecting Fake Websites: The Contribution of Statistical Learning Theory.
MIS Q., 2010

A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study.
J. Comput. Mediat. Commun., 2010

A focused crawler for Dark Web forums.
J. Assoc. Inf. Sci. Technol., 2010

Intelligent Feature Selection for Opinion Classification.
IEEE Intell. Syst., 2010

2009
A comparison of fraud cues and classification methods for fake escrow website detection.
Inf. Technol. Manag., 2009

A Comparison of Tools for Detecting Fake Websites.
Computer, 2009

2008
Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums.
ACM Trans. Inf. Syst., 2008

Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace.
ACM Trans. Inf. Syst., 2008

Affect Analysis of Web Forums and Blogs Using Correlation Ensembles.
IEEE Trans. Knowl. Data Eng., 2008

CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication.
MIS Q., 2008

Stylometric Identification in Electronic Markets: Scalability and Robustness.
J. Manag. Inf. Syst., 2008

A hybrid approach to Web forum interactional coherence analysis.
J. Assoc. Inf. Sci. Technol., 2008

Developing ideological networks using social network analysis and writeprints: A case study of the international Falun Gong movement.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

2007
Categorization and analysis of text in computer mediated communication archives using visualization.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2007

Interaction Coherence Analysis for Dark Web Forums.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Affect Intensity Analysis of Dark Web Forums.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

A Framework for Stylometric Similarity Detection in Online Settings.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Visualizing Authorship for Identification.
Proceedings of the Intelligence and Security Informatics, 2006

2005
Applying Authorship Analysis to Extremist-Group Web Forum Messages.
IEEE Intell. Syst., 2005

Applying Authorship Analysis to Arabic Web Content.
Proceedings of the Intelligence and Security Informatics, 2005


  Loading...