Publications

Peer-Reviewed Journal Articles

  1. Li, W., & Chen, H. (2022). Discovering Emerging Threats in the Hacker Community: A Nonparametric Emerging Topic Detection Framework. MIS Quarterly, 46(4), 2337-2350.

  2. Li, W., & Chai, Y. (2022). Assessing and Enhancing Adversarial Robustness of Predictive Analytics: An Empirically Tested Design Framework. Journal of Management Information Systems, 39(2), 542-572.

  3. Zhang, N., Ebrahimi, M., Li, W., & Chen, H. (2022). Counteracting dark Web text-based CAPTCHA with generative adversarial learning for proactive cyber threat intelligence. ACM Transactions on Management Information Systems, 13(2), 1-21.

  4. Chai, Y., Zhou, Y., Li, W., & Jiang, Y. (2022). An explainable multi-modal hierarchical attention model for developing phishing threat intelligence. IEEE Transactions on Dependable and Secure Computing, 19(2), 790-803.

  5. Samtani, S., Li, W., Benjamin, V., & Chen, H. (2021). Informing cyber threat intelligence through dark Web situational awareness: The AZSecure hacker assets portal. Digital Threats: Research and Practice, 2(4), 1-10.

  6. Li, W., Yin, J., & Chen, H. (2018). Supervised topic modeling using hierarchical dirichlet process-based inverse regression: Experiments on e-commerce applications. IEEE Transactions on Knowledge and Data Engineering, 30(6), 1192-1205.

  7. Li, W., Chen, H., & Nunamaker Jr, J. F. (2016). Identifying and profiling key sellers in cyber carding community: AZSecure text mining system. Journal of Management Information Systems, 33(4), 1059-1086.

Book Chapter

  1. Samtani, S., Abate, M., Benjamin, V., & Li, W. (2020). Cybersecurity as an industry: A cyber threat intelligence perspective. The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154.

Refereed Conference Papers

  1. Lin, Y. & Li, W. (2023). A Theory of Open Source Security: The Spillover of Security Knowledge in Vulnerability Disclosures through Software Supply Chains. The 22nd Workshop on the Economics of Information Security (WEIS).

  2. Ebrahimi, M. R., Li, W., Chai, Y., Pacheco, J., & Chen, H. (2022). An Adversarial Reinforcement Learning Framework for Robust Machine Learning-based Malware Detection. In 2022 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 567-576). IEEE.

  3. Hu, J. L., Ebrahimi, M., Li, W., Li, X., & Chen, H. (2022). Multi-view Representation Learning from Malware to Defend Against Adversarial Variants. In 2022 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 1-8). IEEE.

  4. Sachin, P. K., Schecter, A., & Li, W. (2022). Emotions in Microblogs and Information Diffusion: Evidence of a Curvilinear Relationship. ICIS 2022 Proceedings.

  5. Liu, Y., Lin, F. Y., Ebrahimi, M., Li, W., & Chen, H. (2021). Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), 1–6. (Best Paper Award)

  6. Ding, Z., Benjamin, V., Li, W., & Yin, X. (2021). Exploring Differences Among Darknet and Surface Internet Hacking Communities. 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), 1–3.

  7. Ebrahimi, M., Pacheco, J., Li, W., Hu, J. L., & Chen, H. (2021). Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces. 2021 IEEE Security and Privacy Workshops (SPW), 85–91.

  8. Chen, W., Li, W., & Xie, K. (2020). Growing Entrepreneurship with Crypto Tokens. ICIS 2020 Proceedings. (Best Paper in Track Award)

  9. Du, B., Singhal, P., Benjamin, V., & Li, W. (2020). Detecting Cyber-Adversarial Videos in Traditional Social Media. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 1–3.

  10. Zhang, N., Ebrahimi, M., Li, W., & Chen, H. (2020). A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 1–6.

  11. Liu, Y., Lin, F. Y., Ahmad-Post, Z., Ebrahimi, M., Zhang, N., Hu, J. L., Xin, J., Li, W., & Chen, H. (2020). Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 1–6.

  12. Lin, F., Liu, Y., Ebrahimi, M., Ahmad-Post, Z., Hu, J. L., Xin, J., Samtani, S., Li, W., & Chen, H. (2020). Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach. 2020 International Conference on Data Mining Workshops (ICDMW), 488–495.

  13. Chai, Y., Li, W., Zhu, B., & Liu, H. (2019). Detecting Fake Reviews in the Cold Start Setting: A Deep Generative Topic Modeling Framework. Workshop on Information Technology and Systems (WITS 2019).

  14. Chai, Y., & Li, W. (2019). Towards Deep Learning Interpretability: A Topic Modeling Approach. ICIS 2019 Proceedings.

  15. Chai, Y., Li, W., Zhu, B., & Liu, H. (2019). Detecting Fake Reviews in the Cold Start Setting with Deep Learning. INFORMS Workshop on Data Science (DS 2019).

  16. Chen, W., Li, W., & Xie, K. (2019). Funding Open Source Software with Cryptocurrency Tokens: The Impact of Exchange Listing on Blockchain Project Development. Conference on Information Systems and Technology (CIST 2019).

  17. Li, W., Yin, J., & Chen, H. (2016). Identifying Key Data Breach Services with Nonparametric Supervised Topic Model. Workshop on Information Technology and Systems (WITS 2016).

  18. Li, W., Yin, J., & Chen, H. (2016). Identifying High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model. ICIS 2016 Proceedings.

  19. Li, W., Yin, J., & Chen, H. (2016). Targeting key data breach services in underground supply chain. 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 322–324.

  20. Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., Li, W., & Chen, H. (2016). Exploring key hackers and cybersecurity threats in Chinese hacker communities. 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 13–18.

  21. Zhao, K., Zhang, Y., Xing, C., Li, W., & Chen, H. (2016). Chinese underground market jargon analysis based on unsupervised learning. 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 97–102.

  22. Benjamin, V., Li, W., Holt, T. J., & Chen, H. (2015). Exploring Threats and Vulnerabilities in Hacker Web: Forums, IRC and Carding Shops. 2015 IEEE International Conference on Intelligence and Security Informatics (ISI), 85–90.

  23. Li, W., & Chen, H. (2014). Identifying top sellers in underground economy using deep learning-based sentiment analysis. Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, 64–67.

  24. Li, W., Abbasi, A., Hu, S., Benjamin, V. A., & Chen, H. (2014). Modeling Interactions in Web Forums. 2014 International Conference on Social Computing.

  25. Abbasi, A., Li, W., Benjamin, V. A., Hu, S., & Chen, H. (2014). Descriptive Analytics: Examining Expert Hackers in Web Forums. 2014 IEEE Joint Intelligence and Security Informatics Conference, 56–63.