Journal articles

 

You Chen, Patel Mayur, Candace McNaughton, Bradley Malin. Interaction Patterns of Trauma Providers Are Associated with Length of Stay. Journal of the American Medical Informatics Association. 2018. pdf Appendix

You Chen, Abel Kho, David Liebovitz, Catherine Ivory, Sarah Osmundson, Jiang Bian, Bradley Malin. Learning Bundled Care Opportunities from Electronic Medical Records. Journal of Biomedical Informatics. 2018. pdf

Tao Zheng, Wei Xie, Liling Xu, Ya Zhang, Gong Yang, You Chen. A Machine Learning-based Framework to Identify Type 2 Diabetes through Electronic Health Records. International Journal of Medical Informatics. 2017; 97:120-127. pdf

You Chen, Nancy Lorenzi, Warren Sandberg, Kelly Wolgast, Bradley Malin. Identifying Collaborative Care Teams through Electronic Medical Record Utilization Patterns. Journal of the American Medical Informatics Association. 2017;24(e1):e111–e120. pdf Appendix

You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl Gunter, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, Bradley Malin. Building bridges Across Electronic Health Record Systems Through Inferred Phenotypic Topics. Journal of Biomedical informatics. 2015. Vol.55, p482-93. [PMID: 25841328; PMCID: 4464930] pdf Appendix

You Chen, Nancy Lorenzi, Steve Nyemba, Jonathan S. Schildcrout and Bradley Malin. We Work with Them? Health Workers Interpretation of Organizational Relations Mined from Electronic Health Records. International Journal of Medical Informatics. 2014. Vol.83.No 7, p495-506. [PMID: 24845147; PMCID: 4159755] pdf Appendix

You Chen, Steve Nyemba and Bradley Malin. Detecting Anomalous Insiders in Collaborative Information Systems. IEEE Transaction on Dependable and Secure Computing. Vol.9.No 3, p332-344. [PMID: 24489520; PMCID: 3905623] pdf

You Chen, Steve Nyemba, Wen Zhang and Bradley Malin. Specializing Network Analysis to Detect Anomalous Insider Actions. Security Informatics. 1:5, 2012, p1-24. [PMID: 23399988; PMCID: 3566705] pdf

Conference articles

Gao C, Kho AN, Ivory C, Osmundson S, Malin BA, Chen Y.Predicting Length of Stay for Obstetric Patients via Electronic Medical Records. Stud Health Technol Inform. 2017;245:1019-1023. pdf

Thomas Li, Cheng Gao, Chao Yan, Sarah Osmundson, Bradley Malin, You Chen. Predicting Neonatal Encephalopathy From Maternal Data in Electronic Medical Records. AMIA 2018 Informatics Summit pdf

Wen Yin, Cheng Gao, Yaomin Xu, Bingshan Li, Douglas M. Ruderfer, You Chen. Learning Opportunities for Drug Repositioning via GWAS and PheWAS Findings. AMIA 2018 Informatics Summit pdf

Chao Yan, You Chen, Bo Li, David Liebovitz, Bradley Malin. Learning Clinical Workflows to Identify Subgroups of Heart Failure Patients. AMIA Annual Symposium. 2016. pdf

Zhijun Yin, You Chen, Daniel Fabbri, Jimeng Sun and Bradley Malin.  #PrayForDad: Learning the Semantics Behind Why Social Media Users Disclose Health Information. The 10th International AAAI Conference on Web and Social Media. 2016, forthcoming. pdf

You Chen, Wei Xie, Carl Gunter, David Liebovitz, Sanjay Mehrotra, He Zhang, Bradley Malin. Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. AMIA Annual Symposium. 2015. p416-425. pdf

Yichen Wang , Robert Chen, Joydeep Ghosh, Joshua Denny, Able Kho, You Chen, Bradley Malin, jimeng Sun. Rubik: knowledge Guided tensor Factorization and Completion for Health Data Analytics . The 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD). 2015. pdf

Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl Gunter, Patrick Lawlor, David Liebovitz, Bradley Malin. Decide Now or Later ?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions. ACM SIGSAC Conference on Computer and Communications Security (CCS). 2014. P1182-1192. pdf

Wen Zhang , You Chen, Carl Gunter, David Liebovitz and Brad Malin. Evolving Role Definition Through Permission Invocation Patterns. The ACM Symposium on Access Control Models and Technologies (SACMAT). 2012. P37-48. pdf

You Chen, Steve Nyemba and Bradley Malin. Auditing Medical Records Accesses via Healthcare Interaction Networks. AMIA Annual Symposium. 2012. p93-102. [PMID: 23304277; PMCID: 3540438] pdf

You Chen, Steve Nyemba, Wen Zhang and Bradley Malin. Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments. IEEE Intelligence and Security Informatics (ISI). 2011.p119-124. [PMID: 25621314; PMCID: 4303584 ] pdf

You Chen and Bradley Malin. Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs. Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY). 2011, p63-74. [PMID: 25485309; PMCID:4257138] pdf

Sen Yang, Xueqi Cheng, You Chen, Gaolin Fang, Jin Zhang, Hongbo Xu. Detect Events on Noisy Textual Datasets. Proceedings of the 12th Asia-Pacific Web Conference (APWEB). p372-374

Xiangtao Liu, Shuo Bai, You Chen, Xueqi Cheng. Improving the routing performance of KAD through social network analysis. IEEE symposium on Computers and Communications (SCC),2010, p721-727

You Chen, Xueqi Cheng, Sen Yang. Bursty Topics Extraction for Web Forums. 11th ACM International Conference on Web Information and Data Management (WIDM). 2009. p55-58. pdf

You Chen, Xueqi Cheng, Yulan Huang. A Wavelet-based Model to Recognize High-quality Topics on Web Forum. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, WI. 2008. p343-351. pdf

You Chen, Lei Dai, Xueqi Cheng. GATS-C4.5: An Algorithm for Optimizing Features in Flow Classification. IEEE Consumer Communications and Networking Conference, CCNC,2008. p466-470.

You Chen, Wenfa Li, Xueqi Cheng.Toward Building Lightweight Intrusion Detection System through Modified RMHC and SVM. 15th IEEE International Conference on Networks, ICON. 2007, p83-88 pdf

Yang Li, Binxing Fang, Li Guo, You Chen. Network anomaly detection based on TCM-KNN algorithm. ASIACCS 2007. p13-19

You Chen, Yang Li, Xueqi Cheng, Li Guo. Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. Conference on Information Security and Cryptology, 2006, LNCS4318, p153-167. pdf