Benjamin W.K. Hung, Ph.D.


Operations Research and Systems Analyst
email: bwhung@ColoState.edu
CV
Google Scholar

Research Interests

Data science, pattern detection in social systems, network optimization, social network analysis, agent-based modeling, and computational social systems. My research advisor was Prof. Anura Jayasumana

Education


Publications

Journal Publications:
  1. J. Klausen, R. Libretti, B. W. Hung, and A. Jayasuamana, "Radicalization Trajectories: An Evidence-Based Computational Approach to Dynamic Risk Assessment of “Homegrown” Jihadists," Studies of Confliect & Terrorism, Volume 43, Issue 7, pp. 588-615, 2020.
  2. B. Hung, A. Jayasuaman and V. Bandara, "Finding Emergent Patterns of Behaviors in Dynamic Heterogeneous Social Networks," IEEE Transactions on Computational Social Systems, Volume 6, Issue 5, pp. 1007-1019, 2019.
  3. J. Klausen, R. Libretti, B. W. Hung and A. P. Jayasumana, "Radicalization Trajectories: An Evidence-Based Computational Approach to Dynamic Risk Assessment of ‘Homegrown’ Jihadists," Studies in Conflict & Terrorism, 2018.
  4. B. Hung, A. Jayasumana and V. Bandara, "INSiGHT: A system to detect violent extremist radicalization trajectories in dynamic graphs," Data & Knowledge Engineering, Volume 118, pp. 52-70, 2018.
  5. B. Hung, S. Kolitz, and A. Ozdaglar, “Optimization-Based Influencing of Village Social Networks in a Counterinsurgency,” Association of Computing Machinery Transactions on Intelligent Systems and Technology (ACM- TIST), Volume 4, Issue 3, June 2013.
Conference Presentations:
  1. B. Hung, S. Muramudalige, A. Jayasumana, J. Klausen, R. Libretti, E. Maloney and P. Renugopalakrishnan, "Recognizing Radicalization Indicators in Text Documents Using Human-in-the-Loop Information Extraction and Natural Language Processing Techniques," Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST), 2019.
  2. BS. R. Muramudalige, B. Hung and A. P. Jayasumana, "Investigative Graph Search using Graph Databases," Proceedings of Graph Computing (GC2019), 2019.
  3. B. Hung, A. Jayasumana, and Vidarshana Bandara, INSiGHT: A System for Detecting Radicalization Trajectories in Large Heterogeneous Graphs,” Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST), 2017.
  4. B. Hung, A. Jayasumana, and Vidarshana Bandara, “Pattern Matching Trajectories for Investigative Graph Searches,” Proceedings of the 3rd IEEE International Conference on Data Science and Advanced Analytics (DSAA) , 2016.
  5. B. Hung, A. Jayasumana, and Vidarshana Bandara, “Detecting Radicalization Trajectories Using Graph Pattern Matching Algorithms,” PhD Consortium, Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI) , 2016.
  6. B. Hung and A. Jayasumana, “Investigative Simulation: Towards Utilizing Graph Pattern Matching for Investigative Search,” Proceedings of the International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI) and IEEE/ACM International Conference in Advances in Social Network Analysis and Mining (ASONAM), 2016.
  7. W. Duff, R. Dowling, B. Hung, G. Lancaster, and L. Ridge, “Simulation of Auto Design Performance in the Market to Meet Fuel Efficiency Standards,” Proceedings of the Winter Simulation Conference, Huntington Beach, 2015.
  8. D. Beskow, B. Hung, R. Croft, Z. Horovitz, T. Maeker, M. Malta, and T. Schafer, “Decision Support Tool for the Global Reaction Force Outload Process,” Proceedings of the Industrial and Systems Engineering Research Conference (ISERC), Montreal, Canada, June 2014.
  9. E. Thornburg, B. Hung, and J. Jackson, “Learning with the iPad: Does this technology help or hinder student understanding,” Joint Mathematics Meeting, Mathematical Association of America, Boston, January, 2012.
  10. B. Hung, S. Kolitz, and A. Ozdaglar, “Optimization-Based Influencing of Village Social Networks in a Counterinsurgency,” Proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction (SBP) , LNCS 6589, pp. 10-17, March 2011.
Other Presentations and Posters:
  1. B. Hung, A. Jayasumana, and Vidarshana Bandara, “Detecting Radicalization Trajectories Using Graph Pattern Matching Algorithms,” IEEE International Conference on Intelligence and Security Informatics (ISI), poster presentation, September 2016. "Best Poster"
  2. B. Hung, "Influencing Activities in a Counterinsurgency in Afghanistan," Workshop on Populations and Crowds, Viterbi School of Engineering, University of Southern California, September 2012.
  3. B. Hung and S. Kolitz, "Social network generation model for rural Afghanistan," Human Social Cultural Behavioral (HSCB) Modeling Program Focus 2011 Conference, poster presentation, February 2011.
  4. B. Hung, “Optimization-Based Influencing of Village Social Networks in a Counterinsurgency,” Minerva at West Point Workshop, May 2012.
  5. B. Hung, “Optimization-Based Influencing of Village Social Networks in a Counterinsurgency,” Counterinsurgency and Counterterrorism Workshop, Security and Studies Program, Massachusetts Institute of Technology, 2011.
Thesis:
  1. B. Hung, “A Graph-Based, Systems Approach for Detecting Violent Extremist Radicalization Trajectories and Other Latent Behaviors,” Doctoral Dissertation, Walter Scott, Jr. College of Engineering, Colorado State University, Advisor: Anura P. Jayasumana, July 2017.
  2. B. Hung, “Optimization-Based Selection of Influential Agents in a Rural Afghan Social Network,” Master’s Thesis, MIT Operations Research Center, Thesis Supervisor: Asuman Ozdaglar, June 2010.