Cited by
Cited by
A machine learning-based framework to identify type 2 diabetes through electronic health records
T Zheng, W Xie, L Xu, X He, Y Zhang, M You, G Yang, Y Chen
International journal of medical informatics 97, 120-127, 2017
Survey and taxonomy of feature selection algorithms in intrusion detection system
Y Chen, Y Li, XQ Cheng, L Guo
International Conference on Information Security and Cryptology, 153-167, 2006
Rubik: Knowledge guided tensor factorization and completion for health data analytics
Y Wang, R Chen, J Ghosh, JC Denny, A Kho, Y Chen, BA Malin, J Sun
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
Detection of anomalous insiders in collaborative environments via relational analysis of access logs
Y Chen, B Malin
Proceedings of the first ACM conference on Data and application security and …, 2011
Detecting Anomalous Insiders in Collaborative Information Systems
Y Chen, S Nyemba, B Malin
Dependable and Secure Computing, IEEE Transactions on, 1-1, 2012
Network anomaly detection based on TCM-KNN algorithm
Y Li, B Fang, L Guo, Y Chen
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
A Lightweight Intrusion Detection System Based on Feature Selection
H Huang, S An
Proceedings of the 2012 Second International Conference on Electric …, 2012
Metrics for assessing physician activity using electronic health record log data
CA Sinsky, A Rule, G Cohen, BG Arndt, TD Shanafelt, CD Sharp, ...
Journal of the American Medical Informatics Association 27 (4), 639-643, 2020
An efficient feature selection algorithm toward building lightweight intrusion detection system
YC HW Shen, Y Li, XQ Cheng
CHINESE JOURNAL OF COMPUTERS 30 (8), 1398-1408, 2007
Building bridges across electronic health record systems through inferred phenotypic topics
Y Chen, J Ghosh, CA Bejan, CA Gunter, S Gupta, A Kho, D Liebovitz, ...
Journal of biomedical informatics 55, 82-93, 2015
Specializing network analysis to detect anomalous insider actions
Y Chen, S Nyemba, W Zhang, B Malin, HY Shahir, U Glässer, R Farahbod, ...
Security Informatics 1 (1), 5, 2012
Inferring clinical workflow efficiency via electronic medical record utilization
Y Chen, W Xie, CA Gunter, D Liebovitz, S Mehrotra, H Zhang, B Malin
AMIA annual symposium proceedings 2015, 416, 2015
A lightweight intrusion detection model based on feature selection and maximum entropy model
Y Li, BX Fang, Y Chen, L Guo
2006 International Conference on Communication Technology, 1-4, 2006
Deep learning predicts extreme preterm birth from electronic health records
C Gao, S Osmundson, DRV Edwards, GP Jackson, BA Malin, Y Chen
Journal of biomedical informatics 100, 103334, 2019
DMMS: A Decentralized Blockchain Ledger for the Management of Medication Histories
P Li, SD Nelson, BA Malin, Y Chen
Blockchain in Healthcare Today, 2019
Leveraging social networks to detect anomalous insider actions in collaborative environments
Y Chen, S Nyemba, W Zhang, B Malin
Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011
Finding high quality threads in web forums
Y Chen, XQ Cheng, S Yang
Ruanjian Xuebao/Journal of Software 22 (8), 1785-1804, 2011
Identifying collaborative care teams through electronic medical record utilization patterns
Y Chen, NM Lorenzi, WS Sandberg, K Wolgast, BA Malin
Journal of the American Medical Informatics Association 24 (e1), e111-e120, 2017
We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records
Y Chen, N Lorenzi, S Nyemba, JS Schildcrout, B Malin
International journal of medical informatics 83 (7), 495-506, 2014
Interaction patterns of trauma providers are associated with length of stay
Y Chen, MB Patel, CD McNaughton, BA Malin
Journal of the American Medical Informatics Association 25 (7), 790-799, 2018
The system can't perform the operation now. Try again later.
Articles 1–20