Vanderbilt University, Chinese Academy of Sciences
Geverifieerd e-mailadres voor vanderbilt.edu - Homepage
Geciteerd door
Geciteerd door
A machine learning-based framework to identify type 2 diabetes through electronic health records
T Zheng, W Xie, L Xu, X He, Y Zhang, M You, G Yang, Y Chen
International journal of medical informatics 97, 120-127, 2017
Survey and taxonomy of feature selection algorithms in intrusion detection system
Y Chen, Y Li, XQ Cheng, L Guo
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006 …, 2006
Rubik: Knowledge guided tensor factorization and completion for health data analytics
Y Wang, R Chen, J Ghosh, JC Denny, A Kho, Y Chen, BA Malin, J Sun
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
Metrics for assessing physician activity using electronic health record log data
CA Sinsky, A Rule, G Cohen, BG Arndt, TD Shanafelt, CD Sharp, ...
Journal of the American Medical Informatics Association 27 (4), 639-643, 2020
Detection of anomalous insiders in collaborative environments via relational analysis of access logs
Y Chen, B Malin
Proceedings of the first ACM conference on Data and application security and …, 2011
Detecting Anomalous Insiders in Collaborative Information Systems
Y Chen, S Nyemba, B Malin
Dependable and Secure Computing, IEEE Transactions on, 1-1, 2012
Network anomaly detection based on TCM-KNN algorithm
Y Li, B Fang, L Guo, Y Chen
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Thinking about gpt-3 in-context learning for biomedical ie? think again
BJ Gutierrez, N McNeal, C Washington, Y Chen, L Li, H Sun, Y Su
arXiv preprint arXiv:2203.08410, 2022
Predicting missing values in medical data via XGBoost regression
X Zhang, C Yan, C Gao, BA Malin, Y Chen
Journal of healthcare informatics research 4, 383-394, 2020
A Lightweight Intrusion Detection System Based on Feature Selection
H Huang, S An
Proceedings of the 2012 Second International Conference on Electric …, 2012
Deep learning predicts extreme preterm birth from electronic health records
C Gao, S Osmundson, DRV Edwards, GP Jackson, BA Malin, Y Chen
Journal of biomedical informatics 100, 103334, 2019
Building bridges across electronic health record systems through inferred phenotypic topics
Y Chen, J Ghosh, CA Bejan, CA Gunter, S Gupta, A Kho, D Liebovitz, ...
Journal of biomedical informatics 55, 82-93, 2015
An efficient feature selection algorithm toward building lightweight intrusion detection system
YC HW Shen, Y Li, XQ Cheng
CHINESE JOURNAL OF COMPUTERS 30 (8), 1398-1408, 2007
Specializing network analysis to detect anomalous insider actions
Y Chen, S Nyemba, W Zhang, B Malin, HY Shahir, U Glässer, R Farahbod, ...
Security Informatics 1 (1), 5, 2012
DMMS: A Decentralized Blockchain Ledger for the Management of Medication Histories
P Li, SD Nelson, BA Malin, Y Chen
Blockchain in Healthcare Today, 2019
Association of postoperative delirium with cognitive outcomes: a meta-analysis
H Huang, H Li, X Zhang, G Shi, M Xu, X Ru, Y Chen, MB Patel, EW Ely, ...
Journal of Clinical Anesthesia 75, 110496, 2021
Human-centered design to address biases in artificial intelligence
Y Chen, EW Clayton, LL Novak, S Anders, B Malin
Journal of medical Internet research 25, e43251, 2023
Inferring clinical workflow efficiency via electronic medical record utilization
Y Chen, W Xie, CA Gunter, D Liebovitz, S Mehrotra, H Zhang, B Malin
AMIA annual symposium proceedings 2015, 416, 2015
A lightweight intrusion detection model based on feature selection and maximum entropy model
Y Li, BX Fang, Y Chen, L Guo
2006 International Conference on Communication Technology, 1-4, 2006
Leveraging social networks to detect anomalous insider actions in collaborative environments
Y Chen, S Nyemba, W Zhang, B Malin
Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20