You Chen

Assistant Professor

Department of Biomedical Informatics, Vanderbilt University

Office Address: Suite 1475, 2525 West End Ave, Nashville, TN, 37203

Office Phone: 615-343-1939

Email: you.chen@vanderbilt.edu

http://hiplab.mc.vanderbilt.edu/~ychen/chen.jpg


News

Our paper "Building bridges Across Electronic Health Record Systems Through Inferred Phenotypic Topics" published in Journal of Biomedical Informatics has been selected as the Editors' Choice paper for Volume 55.

Notice of Award: I received a K99 award (Learning Patterns of Collaboration to Optimize the Management of Care Providers under Award Number K99LM011933) from National library of Medicine starting from May, 2015.


Google Scholar Citations

You Chen Citations ( h-index: 12)


Introduction

I received the PhD degree in computer science in 2010 from the Chinese Academy of Sciences, which is one of the top research institutes in China. Ranging from 2010 to 2014, I had been working as a postdoctoral researcher in the field of biomedical Informatics, at the Department of Biomedical Informatics, Vanderbilt University.

My research interests include health data analytics, healthcare organization modeling, healthcare workflow modeling, transfer learning of phenotypes and healthcare security and privacy.


Research Experience

2010~Present Data mining research in healthcare informatics

This research focuses on:

(a) preventing patient information from being illegally accessed by hospital employees through social network analysis on access logs of electronic health records (EHR). Community based Anomaly Detection System (CADS) and Specialized Network Anomaly Detection (SNAD) were developed to detect anomalous insiders and specific actions of insiders respectively.

(b) learning collaborative relations to optimize the management of care providers. This work investigates the collaborative relation patterns of care providers through their utilizations of health information systems. We found the relations among organization areas such as departments are more stable than relations among care providers, which indicates data-informed organization relations could be leveraged to assist in the management of healthcare organizations.

(c) learning effectiveness of clinic workflows to optimize the management of patients. This work intends to build relations between clinical workflows and phenotypes, and then manage phenotypic workflows according to their effectiveness learned from utilization of health information systems.

(d) building bridges to connect disparate healthcare organizations through phenotypes. This work aims to connect healthcare organizations through a common standard criteria which here refers to phenotypes.

2007~2010 Data mining research in social media
My major research on this issue is finding high quality messages, threads and topics in web forums. We use data mining technologies such as wavelet transformation, clustering algorithms and time series to extract high quality messages, threads and topics. This is a best way to quickly get useful information from large amount of user generated contents in social media.

2004~2007 Data mining research in network security
My major research focuses on lightweight intrusion detection system and anomaly detection, which aim to model behaviors of the network traffic through statistical features and detect anomalous actions via the modeled behavior patterns. We designed several lightweight intrusion detection models or anomaly detection systems such as PCA-C4.5 and TCM-KNN. Also we wrote a survey of lightweight intrusion detection systems in 2006, which describes lightweight intrusion detection systems from a global view.

 


Professional Services

  Journal Reviewer:

Journal of the American Medical Informatics Association (JAMIA)

Journal of Biomedical Informatics (JBI)

IEEE Transaction on Dependable and Secure Computing (TDSC)

Physics Letters A

ACM Computing Review, (CR)

IEEE Journal on Biomedical and Health Informatics, (J-BHI)

Computer Methods and Programs in Biomedicine

Computer and Security

Artificial intelligence in Medicine

Information Sciences

BMC Medical Informatics & Decision Making

Journal of Network and Computer Applications

Plos One

Conference PC Memeber and Reviewer:

AMIA Annual Symposium(2012,2013, 2014, 2015, 2016)

International Conference on Healthcare Informatics, Imaging, and System Biology (HISB 2012)

The Australasian Data Mining Conference (AusDM 2012, 2013, 2014, 2015)

ACM Symposium on Access Control Models and Technology (SACMAT 2012)

IEEE International Conference on Data Mining (ICDM 2010, 2011, 2012, 2013, 2014)

 


Grants

Learning Patterns of Collaboration to optimize the Management of Care Providers. K99, NLM/NIH (PI)

Automated Detection of Anomalous Accesses to Electronic Health Records. R01, NLM/NIH (Working as a Post-Doc)

 


Presentations

Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. November 14-18, 2015, San Francisco, CA

Creating Interpretable Collaborative Patterns to Detect Insider Threats, ICERM, Brown University, October 22-24, 2014, Providence, Rhode Island

Auditing Medical Records Accesses via Healthcare Interaction Networks, American Medical Informatics Association (AMIA) 2012 Annual Symposium, November 06, 2012, Chicago, IL

Leveraging Social networks to Detect Anomalous insider actions in Collaborative Environments, IEEE International Conference on Intelligence and Security Informatics, July 11, 2011, Beijing, China

Uncovering Anomalous Usage of Medical Records via Social Network Analysis, Team for Research in Ubiquitous Secure Technology, November, 2nd, 2011, Washington DC, U.S.

Protecting Patients through Dynamic Network Analysis of Hospital Department Relationships, Team for Research in Ubiquitous Secure Technology, November, 15, 2012, Washington DC, U.S.

Guest Lecture on Anomaly Detection,  course (BMIF-380 / CS-396), Vanderbilt University, April. 2011

Guest Lecture on Medical Information Management and Mining, course (BMIF-380/ CS-396), Jan, 15, 2013

Guest Lecture on EMR System Usage Auditing, course (BMIF-380/ CS-396), Jan, 17, 2013

Guest Lecture on Insider Threats Detection in Electronic Medical Record Systems, course (BMIF-380/ CS-396), Feb, 04, 2015

Guest Lecture on Creating interpretable Collaborative Patterns for Auditing, course (BMIF-380/ CS-396), Feb, 09, 2015

 


Awards

2015, Paper "Building bridges Across Electronic Health Record Systems through Inferred Phenotypic Topics” published in Journal of Biomedical Informatics has been selected as the Editors' Choice paper for Volume 55.

2013, Recipient of a training grant from National Library of Medicine (NLM/NIH)

2012, Paper, "Detecting Anomalous Insiders in Collaborative Information Systems," was named one of the top 100 articles of 2012 in computer science by the journal ACM Computing Reviews

2011, Paper, "Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments," was honored as a best paper of the IEEE Intelligence and Security Informatics Conference

2007-2008, outstanding student of the Chinese Academy of Sciences

2008-2009, outstanding student of the Chinese Academy of Sciences

2009, BEWINNER COMMUNICATIONS Award for outstanding PhD candidate students

2003, First Place of National Mathematical Contest in Modeling


Peer-reviewed Journals and Articles (selected from 33 publications)

Journal articles

You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl Gunter, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, Bradley Malin. Building bridges Across Electronic Health Record Systems Through Inferred Phenotypic Topics. Journal of Biomedical informatics. Vol.55, p482-93. [PMID: 25841328; PMCID: 4464930] pdf Appendix

You Chen, Nancy Lorenzi, Steve Nyemba, Jonathan S. Schildcrout and Bradley Malin. We Work with Them? Health Workers Interpretation of Organizational Relations Mined from Electronic Health Records. International Journal of Medical Informatics. Vol.83.No 7, p495-506. [PMID: 24845147; PMCID: 4159755] pdf Appendix

You Chen, Steve Nyemba and Bradley Malin. Detecting Anomalous Insiders in Collaborative Information Systems. IEEE Transaction on Dependable and Secure Computing. Vol.9.No 3, p332-344. [PMID: 24489520; PMCID: 3905623] pdf

You Chen, Steve Nyemba, Wen Zhang and Bradley Malin. Specializing Network Analysis to Detect Anomalous Insider Actions. Security Informatics. 1:5, 2012, p1-24. [PMID: 23399988; PMCID: 3566705] pdf

Conference articles

Zhijun Yin, You Chen, Daniel Fabbri, Jimeng Sun and Bradley Malin.  #PrayForDad: Learning the Semantics Behind Why Social Media Users Disclose Health Information. The 10th International AAAI Conference on Web and Social Media. 2016, forthcoming. pdf

You Chen, Wei Xie, Carl Gunter, David Liebovitz, Sanjay Mehrotra, He Zhang, Bradley Malin. Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. AMIA 2015 Annual Symposium. p416-425. pdf

Yichen Wang , Robert Chen, Joydeep Ghosh, Joshua Denny, Able Kho, You Chen, Bradley Malin, jimeng Sun. Rubik: knowledge Guided tensor Factorization and Completion for Health Data Analytics . The 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD). 2015. pdf

Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl Gunter, Patrick Lawlor, David Liebovitz, Bradley Malin. Decide Now or Later ?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions. ACM SIGSAC Conference on Computer and Communications Security (CCS). 2014. P1182-1192. pdf

Wen Zhang , You Chen, Carl Gunter, David Liebovitz and Brad Malin. Evolving Role Definition Through Permission Invocation Patterns .  The ACM Symposium on Access Control Models and Technologies (SACMAT). 2012. P37-48. pdf

You Chen, Steve Nyemba and Bradley Malin. Auditing Medical Records Accesses via Healthcare Interaction Networks.   AMIA 2012 Annual Symposium. p93-102. [PMID: 23304277; PMCID: 3540438] pdf

You Chen, Steve Nyemba, Wen Zhang and Bradley Malin. Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments. IEEE Intelligence and Security Informatics (ISI). 2011.p119-124. [PMID: 25621314; PMCID: 4303584 ] pdf

You Chen and Bradley Malin. Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs. Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY). 2011, p63-74. [PMID: 25485309; PMCID:4257138] pdf

Sen Yang, Xueqi Cheng, You Chen, Gaolin Fang, Jin Zhang, Hongbo Xu. Detect Events on Noisy Textual Datasets. Proceedings of the 12th Asia-Pacific Web Conference. p372-374

Xiangtao Liu, Shuo Bai, You Chen, Xueqi Cheng. Improving the routing performance of KAD through social network analysis.  IEEE symposium on Computers and Communications,  2010, p721-727

You Chen, Xueqi Cheng, Sen Yang. Bursty Topics Extraction for Web Forums. 11th ACM International Conference on Web Information and Data Management (WIDM). 2009. p55-58. pdf

You Chen, Xueqi Cheng, Yulan Huang. A Wavelet-based Model to Recognize High-quality Topics on Web Forum. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, WI. 2008. p343-351. pdf

You Chen, Lei Dai, Xueqi Cheng. GATS-C4.5: An Algorithm for Optimizing Features in Flow Classification. IEEE Consumer Communications and Networking Conference, CCNC,2008. p466-470

You Chen, Wenfa Li, Xueqi Cheng. Toward Building Lightweight Intrusion Detection System through Modified RMHC and SVM. 15th IEEE International Conference on Networks, ICON. 2007, p83-88 pdf

Yang Li, Binxing Fang, Li Guo, You ChenNetwork anomaly detection based on TCM-KNN algorithm. ASIACCS 2007. p13-19

You Chen, Yang Li, Xueqi Cheng, Li Guo. Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. Conference on Information Security and Cryptology, 2006, LNCS4318, p153-167. pdf