关注
Peiyi Han
Peiyi Han
在 hit.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Log sequence anomaly detection based on local information extraction and globally sparse transformer model
C Zhang, X Wang, H Zhang, H Zhang, P Han
IEEE Transactions on Network and Service Management 18 (4), 4119-4133, 2021
392021
IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications
G Wang, C Liu, Y Dong, P Han, H Pan, B Fang
IEEE Access 6, 2908-2921, 2017
392017
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction
A Ali-Gombe, S Sudhakaran, A Case, GG Richard III
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
302019
LayerLog: Log sequence anomaly detection based on hierarchical semantics
C Zhang, X Wang, H Zhang, J Zhang, H Zhang, C Liu, P Han
Applied Soft Computing 132, 109860, 2023
262023
Fingerprinting {SDN} applications via encrypted control traffic
J Cao, Z Yang, K Sun, Q Li, M Xu, P Han
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
262019
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning
S Duan, C Liu, Z Cao, X Jin, P Han
Future Generation Computer Systems 137, 336-348, 2022
202022
Leakage models and inference attacks on searchable encryption for cyber-physical social systems
G Wang, C Liu, Y Dong, KKR Choo, P Han, H Pan, B Fang
IEEE Access 6, 21828-21839, 2018
202018
A cloud access security broker based approach for encrypted data search and sharing
C Liu, G Wang, P Han, H Pan, B Fang
2017 International Conference on Computing, Networking and Communications …, 2017
192017
CloudDLP: Transparent and scalable data sanitization for browser-based cloud storage
P Han, C Liu, J Cao, S Duan, H Pan, Z Cao, B Fang
IEEE Access 8, 68449-68459, 2020
182020
Ht-fed-gan: Federated generative model for decentralized tabular data synthesis
S Duan, C Liu, P Han, X Jin, X Zhang, T He, H Pan, X Xiang
Entropy 25 (1), 88, 2022
142022
A serial attention frame for multi-label waste bottle classification
J Xiao, J Xu, C Tian, P Han, L You, S Zhang
Applied Sciences 12 (3), 1742, 2022
142022
Automatically crawling dynamic web applications via proxy-based javascript injection and runtime analysis
Y Li, P Han, C Liu, B Fang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
122018
Generative data augmentation for non-iid problem in decentralized clinical machine learning
Z Wang, S Duan, C Wu, W Lin, X Zha, P Han, C Liu
2022 4th International Conference on Data Intelligence and Security (ICDIS …, 2022
92022
VESC: a new variational autoencoder based model for anomaly detection
C Zhang, X Wang, J Zhang, S Li, H Zhang, C Liu, P Han
International Journal of Machine Learning and Cybernetics 14 (3), 683-696, 2023
82023
Query recovery attacks on searchable encryption based on partial knowledge
G Wang, C Liu, Y Dong, H Pan, P Han, B Fang
Security and Privacy in Communication Networks: 13th International …, 2018
82018
On-manifold adversarial attack based on latent space substitute model
C Zhang, X Luo, P Han
Computers & Security 120, 102770, 2022
72022
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding
X Xiang, S Duan, H Pan, P Han, J Cao, C Liu
Proceedings of the 2020 International Conference on Cyberspace Innovation of …, 2020
62020
SafeBox: A scheme for searching and sharing encrypted data in cloud applications
G Wang, C Liu, Y Dong, H Pan, P Han, B Fang
2017 International Conference on Security, Pattern Analysis, and Cybernetics …, 2017
62017
Fed‐DNN‐Debugger: Automatically Debugging Deep Neural Network Models in Federated Learning
S Duan, C Liu, P Han, X Jin, X Zhang, X Xiang, H Pan
Security and Communication Networks 2023 (1), 5968168, 2023
52023
FIGAT: Accurately classify individual crime risks with multi-information fusion
W Xu, P Han, S Duan, C Liu
IEEE Transactions on Services Computing 16 (3), 1890-1903, 2022
52022
系统目前无法执行此操作,请稍后再试。
文章 1–20