Skip to main navigation
Skip to search
Skip to main content
Illinois Experts Home
LOGIN & Help
Home
Profiles
Research units
Research & Scholarship
Datasets
Honors
Press/Media
Activities
Search by expertise, name or affiliation
How to Cover up Anomalous Accesses to Electronic Health Records
Xiaojun Xu
, Qingying Hao
, Zhuolin Yang
,
Bo Li
, David Liebovitz
,
Gang Wang
,
Carl A. Gunter
Siebel School of Computing and Data Science
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'How to Cover up Anomalous Accesses to Electronic Health Records'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Access Restriction
100%
Adversarial Machine Learning
100%
Anomaly-Based Detection
100%
Attackers
100%
Detection Algorithm
100%
Generalizability
100%
Graph Neural Network
100%
Lateral Movement
100%
training algorithm
100%
Training Phase
100%
Keyphrases
Access Log
25%
Access Restriction
25%
Adversarial Learning
25%
Adversary
25%
Anomaly Detection System
25%
Attacker
25%
Detection Algorithm
25%
Detection Model
25%
Detection System
100%
Electronic Health Records
100%
Evaluation Period
25%
Evasion Attack
50%
Fool
25%
Graph Anomaly Detection
25%
Graph Neural Network
25%
Heuristic-based
25%
Highest Weight
25%
Illegitimate Access
25%
Large-scale Dataset
25%
Lateral Movement
25%
Machine Learning Strategies
25%
Neural Network Model
25%
Poisoning Attack
25%
Training Algorithm
25%
Training Phase
25%