Department of Biomedical Informatics, Vanderbilt University
Office Address: Suite 1475, 2525 West End Ave, Nashville, TN, 37203
Office Phone: 615-343-1939
Our paper "Building bridges Across Electronic Health Record Systems Through Inferred Phenotypic Topics" published in Journal of Biomedical Informatics has been selected as the Editors' Choice paper for Volume 55.
Notice of Award: I received a K99 award (Learning Patterns of Collaboration to Optimize the Management of Care Providers under Award Number K99LM011933) from National library of Medicine starting from May, 2015.
Google Scholar Citations
You Chen Citations ( h-index: 12)
I received the PhD degree in computer science in 2010 from the Chinese Academy of Sciences, which is one of the top research institutes in China. Ranging from 2010 to 2014, I had been working as a postdoctoral researcher in the field of biomedical Informatics, at the Department of Biomedical Informatics, Vanderbilt University.
My research interests include health data analytics, healthcare organization modeling, healthcare workflow modeling, transfer learning of phenotypes and healthcare security and privacy.
2010~Present Data mining research in healthcare informatics
This research focuses on:
(a) preventing patient information from being illegally accessed by hospital employees through social network analysis on access logs of electronic health records (EHR). Community based Anomaly Detection System (CADS) and Specialized Network Anomaly Detection (SNAD) were developed to detect anomalous insiders and specific actions of insiders respectively.
(b) learning collaborative relations to optimize the management of care providers. This work investigates the collaborative relation patterns of care providers through their utilizations of health information systems. We found the relations among organization areas such as departments are more stable than relations among care providers, which indicates data-informed organization relations could be leveraged to assist in the management of healthcare organizations.
(c) learning effectiveness of clinic workflows to optimize the management of patients. This work intends to build relations between clinical workflows and phenotypes, and then manage phenotypic workflows according to their effectiveness learned from utilization of health information systems.
(d) building bridges to connect disparate healthcare organizations through phenotypes. This work aims to connect healthcare organizations through a common standard criteria which here refers to phenotypes.
2007~2010 Data mining research in social media
My major research on this issue is finding high quality messages, threads and topics in web forums. We use data mining technologies such as wavelet transformation, clustering algorithms and time series to extract high quality messages, threads and topics. This is a best way to quickly get useful information from large amount of user generated contents in social media.
2004~2007 Data mining research in network security
My major research focuses on lightweight intrusion detection system and anomaly detection, which aim to model behaviors of the network traffic through statistical features and detect anomalous actions via the modeled behavior patterns. We designed several lightweight intrusion detection models or anomaly detection systems such as PCA-C4.5 and TCM-KNN. Also we wrote a survey of lightweight intrusion detection systems in 2006, which describes lightweight intrusion detection systems from a global view.
ACM Computing Review, (CR)
Conference PC Memeber and Reviewer:
The Australasian Data Mining Conference (AusDM 2012, 2013, 2014, 2015)
ACM Symposium on Access Control Models and Technology (SACMAT 2012)
IEEE International Conference on Data Mining (ICDM 2010, 2011, 2012, 2013, 2014)
Automated Detection of Anomalous Accesses to Electronic Health Records. R01, NLM/NIH (Working as a Post-Doc)
Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. November 14-18, 2015, San Francisco, CA
Creating Interpretable Collaborative Patterns to Detect Insider Threats, ICERM, Brown University, October 22-24, 2014, Providence, Rhode Island
Auditing Medical Records Accesses via Healthcare Interaction Networks, American Medical Informatics Association (AMIA) 2012 Annual Symposium, November 06, 2012, Chicago, IL
Leveraging Social networks to Detect Anomalous insider actions in Collaborative Environments, IEEE International Conference on Intelligence and Security Informatics, July 11, 2011, Beijing, China
Uncovering Anomalous Usage of Medical Records via Social Network Analysis, Team for Research in Ubiquitous Secure Technology, November, 2nd, 2011, Washington DC, U.S.
Protecting Patients through Dynamic Network Analysis of Hospital Department Relationships, Team for Research in Ubiquitous Secure Technology, November, 15, 2012, Washington DC, U.S.
Guest Lecture on Anomaly Detection, course (BMIF-380 / CS-396), Vanderbilt University, April. 2011
Guest Lecture on Medical Information Management and Mining, course (BMIF-380/ CS-396), Jan, 15, 2013
Guest Lecture on EMR System Usage Auditing, course (BMIF-380/ CS-396), Jan, 17, 2013
Guest Lecture on Insider Threats Detection in Electronic Medical Record Systems, course (BMIF-380/ CS-396), Feb, 04, 2015
Guest Lecture on Creating interpretable Collaborative Patterns for Auditing, course (BMIF-380/ CS-396), Feb, 09, 2015
2015, Paper "Building bridges Across Electronic Health Record Systems through Inferred Phenotypic Topics” published in Journal of Biomedical Informatics has been selected as the Editors' Choice paper for Volume 55.
2013, Recipient of a training grant from National Library of Medicine (NLM/NIH)
2012, Paper, "Detecting Anomalous Insiders in Collaborative Information Systems," was named one of the top 100 articles of 2012 in computer science by the journal ACM Computing Reviews
2011, Paper, "Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments," was honored as a best paper of the IEEE Intelligence and Security Informatics Conference
2007-2008, outstanding student of the Chinese Academy of Sciences
2008-2009, outstanding student of the Chinese Academy of Sciences
2009, BEWINNER COMMUNICATIONS Award for outstanding PhD candidate students
2003, First Place of National Mathematical Contest in Modeling
Peer-reviewed Journals and Articles (selected from 33 publications)
You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl Gunter, Abel Kho, David Liebovitz, Jimeng Sun, Joshua Denny, Bradley Malin. Building bridges Across Electronic Health Record Systems Through Inferred Phenotypic Topics. Journal of Biomedical informatics. Vol.55, p482-93. [PMID: 25841328; PMCID: 4464930] pdf Appendix
You Chen, Nancy Lorenzi, Steve Nyemba, Jonathan S. Schildcrout and Bradley Malin. We Work with Them? Health Workers Interpretation of Organizational Relations Mined from Electronic Health Records. International Journal of Medical Informatics. Vol.83.No 7, p495-506. [PMID: 24845147; PMCID: 4159755] pdf Appendix
You Chen, Steve Nyemba and Bradley Malin. Detecting Anomalous Insiders in Collaborative Information Systems. IEEE Transaction on Dependable and Secure Computing. Vol.9.No 3, p332-344. [PMID: 24489520; PMCID: 3905623] pdf
You Chen, Steve Nyemba, Wen Zhang and Bradley Malin. Specializing Network Analysis to Detect Anomalous Insider Actions. Security Informatics. 1:5, 2012, p1-24. [PMID: 23399988; PMCID: 3566705] pdf
Zhijun Yin, You Chen, Daniel Fabbri, Jimeng Sun and Bradley Malin. #PrayForDad: Learning the Semantics Behind Why Social Media Users Disclose Health Information. The 10th International AAAI Conference on Web and Social Media. 2016, forthcoming. pdf
You Chen, Wei Xie, Carl Gunter, David Liebovitz, Sanjay Mehrotra, He Zhang, Bradley Malin. Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. AMIA 2015 Annual Symposium. p416-425. pdf
Yichen Wang , Robert Chen, Joydeep Ghosh, Joshua Denny, Able Kho, You Chen, Bradley Malin, jimeng Sun. Rubik: knowledge Guided tensor Factorization and Completion for Health Data Analytics . The 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD). 2015. pdf
Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl Gunter, Patrick Lawlor, David Liebovitz, Bradley Malin. Decide Now or Later ?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions. ACM SIGSAC Conference on Computer and Communications Security (CCS). 2014. P1182-1192. pdf
Wen Zhang , You Chen, Carl Gunter, David Liebovitz and Brad Malin. Evolving Role Definition Through Permission Invocation Patterns . The ACM Symposium on Access Control Models and Technologies (SACMAT). 2012. P37-48. pdf
You Chen, Steve Nyemba and Bradley Malin. Auditing Medical Records Accesses via Healthcare Interaction Networks. AMIA 2012 Annual Symposium. p93-102. [PMID: 23304277; PMCID: 3540438] pdf
You Chen, Steve Nyemba, Wen Zhang and Bradley Malin. Leveraging Social Networks to Detect Anomalous Insider Actions in Collaborative Environments. IEEE Intelligence and Security Informatics (ISI). 2011.p119-124. [PMID: 25621314; PMCID: 4303584 ] pdf
You Chen and Bradley Malin. Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs. Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY). 2011, p63-74. [PMID: 25485309; PMCID:4257138] pdf
Sen Yang, Xueqi Cheng, You Chen, Gaolin Fang, Jin Zhang, Hongbo Xu. Detect Events on Noisy Textual Datasets. Proceedings of the 12th Asia-Pacific Web Conference. p372-374
Xiangtao Liu, Shuo Bai, You Chen, Xueqi Cheng. Improving the routing performance of KAD through social network analysis. IEEE symposium on Computers and Communications, 2010, p721-727
You Chen, Xueqi Cheng, Sen Yang. Bursty Topics Extraction for Web Forums. 11th ACM International Conference on Web Information and Data Management (WIDM). 2009. p55-58. pdf
You Chen, Xueqi Cheng, Yulan Huang. A Wavelet-based Model to Recognize High-quality Topics on Web Forum. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, WI. 2008. p343-351. pdf
You Chen, Lei Dai, Xueqi Cheng. GATS-C4.5: An Algorithm for Optimizing Features in Flow Classification. IEEE Consumer Communications and Networking Conference, CCNC,2008. p466-470.
You Chen, Wenfa Li, Xueqi Cheng. Toward Building Lightweight Intrusion Detection System through Modified RMHC and SVM. 15th IEEE International Conference on Networks, ICON. 2007, p83-88 pdf
Yang Li, Binxing Fang, Li Guo, You Chen. Network anomaly detection based on TCM-KNN algorithm. ASIACCS 2007. p13-19
You Chen, Yang Li, Xueqi Cheng, Li Guo. Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. Conference on Information Security and Cryptology, 2006, LNCS4318, p153-167. pdf