| A machine learning-based framework to identify type 2 diabetes through electronic health records T Zheng, W Xie, L Xu, X He, Y Zhang, M You, G Yang, Y Chen International journal of medical informatics 97, 120-127, 2017 | 455 | 2017 |
| Survey and taxonomy of feature selection algorithms in intrusion detection system Y Chen, Y Li, XQ Cheng, L Guo International conference on information security and cryptology, 153-167, 2006 | 235 | 2006 |
| Human-centered design to address biases in artificial intelligence Y Chen, EW Clayton, LL Novak, S Anders, B Malin Journal of medical Internet research 25, e43251, 2023 | 229 | 2023 |
| Rubik: Knowledge guided tensor factorization and completion for health data analytics Y Wang, R Chen, J Ghosh, JC Denny, A Kho, Y Chen, BA Malin, J Sun Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015 | 222 | 2015 |
| Thinking about gpt-3 in-context learning for biomedical ie? think again BJ Gutierrez, N McNeal, C Washington, Y Chen, L Li, H Sun, Y Su Findings of the Association for Computational Linguistics: EMNLP 2022, 4497-4512, 2022 | 213 | 2022 |
| Predicting missing values in medical data via XGBoost regression X Zhang, C Yan, C Gao, BA Malin, Y Chen Journal of healthcare informatics research 4 (4), 383-394, 2020 | 201 | 2020 |
| Metrics for assessing physician activity using electronic health record log data CA Sinsky, A Rule, G Cohen, BG Arndt, TD Shanafelt, CD Sharp, ... Journal of the American Medical Informatics Association 27 (4), 639-643, 2020 | 177 | 2020 |
| Detecting Anomalous Insiders in Collaborative Information Systems Y Chen, S Nyemba, B Malin Dependable and Secure Computing, IEEE Transactions on, 1-1, 2012 | 129 | 2012 |
| Detection of anomalous insiders in collaborative environments via relational analysis of access logs Y Chen, B Malin Proceedings of the first ACM conference on Data and application security and …, 2011 | 124 | 2011 |
| Network anomaly detection based on TCM-KNN algorithm Y Li, B Fang, L Guo, Y Chen Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 114 | 2007 |
| Deep learning predicts extreme preterm birth from electronic health records C Gao, S Osmundson, DRV Edwards, GP Jackson, BA Malin, Y Chen Journal of biomedical informatics 100, 103334, 2019 | 98 | 2019 |
| Association of postoperative delirium with cognitive outcomes: a meta-analysis H Huang, H Li, X Zhang, G Shi, M Xu, X Ru, Y Chen, MB Patel, EW Ely, ... Journal of Clinical Anesthesia 75, 110496, 2021 | 97 | 2021 |
| A Lightweight Intrusion Detection System Based on Feature Selection H Huang, S An Proceedings of the 2012 Second International Conference on Electric …, 2012 | 76* | 2012 |
| Building bridges across electronic health record systems through inferred phenotypic topics Y Chen, J Ghosh, CA Bejan, CA Gunter, S Gupta, A Kho, D Liebovitz, ... Journal of biomedical informatics 55, 82-93, 2015 | 72 | 2015 |
| DMMS: A Decentralized Blockchain Ledger for the Management of Medication Histories P Li, SD Nelson, BA Malin, Y Chen Blockchain in Healthcare Today, 2019 | 67 | 2019 |
| An efficient feature selection algorithm toward building lightweight intrusion detection system YC HW Shen, Y Li, XQ Cheng CHINESE JOURNAL OF COMPUTERS 30 (8), 1398-1408, 2007 | 63* | 2007 |
| Specializing network analysis to detect anomalous insider actions Y Chen, S Nyemba, W Zhang, B Malin, HY Shahir, U Glässer, R Farahbod, ... Security Informatics 1 (1), 5, 2012 | 59 | 2012 |
| Inferring clinical workflow efficiency via electronic medical record utilization Y Chen, W Xie, CA Gunter, D Liebovitz, S Mehrotra, H Zhang, B Malin AMIA annual symposium proceedings 2015, 416, 2015 | 57 | 2015 |
| Digital information ecosystems in modern care coordination and patient care pathways and the challenges and opportunities for AI solutions Y Chen, CU Lehmann, B Malin Journal of Medical Internet Research 26, e60258, 2024 | 49 | 2024 |
| A lightweight intrusion detection model based on feature selection and maximum entropy model Y Li, BX Fang, Y Chen, L Guo 2006 International Conference on Communication Technology, 1-4, 2006 | 46 | 2006 |