You CHEN
You CHEN
Institute of Computing Technology, Chinese Academy of Sciences, Vanderbilt University
Verified email at vanderbilt.edu - Homepage
TitleCited byYear
Survey and taxonomy of feature selection algorithms in intrusion detection system
Y Chen, Y Li, XQ Cheng, L Guo
International Conference on Information Security and Cryptology, 153-167, 2006
1492006
Rubik: Knowledge guided tensor factorization and completion for health data analytics
Y Wang, R Chen, J Ghosh, JC Denny, A Kho, Y Chen, BA Malin, J Sun
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
1142015
Lightweight intrusion detection system based on feature selection
Y Chen, XQ Cheng, Y Li, L Dai
Ruan Jian Xue Bao(Journal of Software) 18 (7), 1639-1651, 2007
99*2007
Detection of anomalous insiders in collaborative environments via relational analysis of access logs
Y Chen, B Malin
Proceedings of the first ACM conference on Data and application security and …, 2011
742011
An efficient feature selection algorithm toward building lightweight intrusion detection system
YC HW Shen, Y Li, XQ Cheng
CHINESE JOURNAL OF COMPUTERS 30 (8), 1398-1408, 2007
71*2007
Detecting Anomalous Insiders in Collaborative Information Systems
Y Chen, S Nyemba, B Malin
Dependable and Secure Computing, IEEE Transactions on, 1-1, 2012
702012
Network anomaly detection based on TCM-KNN algorithm
Y Li, B Fang, L Guo, Y Chen
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
692007
A machine learning-based framework to identify type 2 diabetes through electronic health records
T Zheng, W Xie, L Xu, X He, Y Zhang, M You, G Yang, Y Chen
International journal of medical informatics 97, 120-127, 2017
682017
Building bridges across electronic health record systems through inferred phenotypic topics
Y Chen, J Ghosh, CA Bejan, CA Gunter, S Gupta, A Kho, D Liebovitz, ...
Journal of biomedical informatics 55, 82-93, 2015
392015
Finding high quality threads in web forums
Y Chen, XQ Cheng, S Yang
Ruanjian Xuebao/Journal of Software 22 (8), 1785-1804, 2011
35*2011
A network anomaly detection method based on transduction scheme
Y Li, BX Fang, L Guo, Y Chen
Ruan Jian Xue Bao(Journal of Software) 18 (10), 2595-2604, 2007
35*2007
Specializing network analysis to detect anomalous insider actions
Y Chen, S Nyemba, W Zhang, B Malin, HY Shahir, U Glässer, R Farahbod, ...
Security Informatics 1 (1), 5, 2012
322012
A lightweight intrusion detection model based on feature selection and maximum entropy model
Y Li, BX Fang, Y Chen, L Guo
2006 International Conference on Communication Technology, 1-4, 2006
312006
Leveraging social networks to detect anomalous insider actions in collaborative environments
Y Chen, S Nyemba, W Zhang, B Malin
Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011
272011
Evolving role definitions through permission invocation patterns
W Zhang, Y Chen, C Gunter, D Liebovitz, B Malin
Proceedings of the 18th ACM symposium on Access control models and …, 2013
242013
Inferring clinical workflow efficiency via electronic medical record utilization
Y Chen, W Xie, CA Gunter, D Liebovitz, S Mehrotra, H Zhang, B Malin
AMIA annual symposium proceedings 2015, 416, 2015
222015
Bursty topics extraction for web forums
Y Chen, S Yang, XQ Cheng
Proceeding of the eleventh international workshop on Web information and …, 2009
22*2009
We work with them? Healthcare workers interpretation of organizational relations mined from electronic health records
Y Chen, N Lorenzi, S Nyemba, JS Schildcrout, B Malin
International journal of medical informatics 83 (7), 495-506, 2014
172014
Auditing medical records accesses via healthcare interaction networks
Y Chen, S Nyemba, B Malin
AMIA Annual Symposium Proceedings 2012, 93, 2012
172012
A wavelet-based model to recognize high-quality topics on web forum
Y Chen, XQ Cheng, YL Huang
2008 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2008
132008
The system can't perform the operation now. Try again later.
Articles 1–20