Log sequence anomaly detection based on local information extraction and globally sparse transformer model C Zhang, X Wang, H Zhang, H Zhang, P Han IEEE Transactions on Network and Service Management 18 (4), 4119-4133, 2021 | 39 | 2021 |
IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications G Wang, C Liu, Y Dong, P Han, H Pan, B Fang IEEE Access 6, 2908-2921, 2017 | 39 | 2017 |
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction A Ali-Gombe, S Sudhakaran, A Case, GG Richard III 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 30 | 2019 |
LayerLog: Log sequence anomaly detection based on hierarchical semantics C Zhang, X Wang, H Zhang, J Zhang, H Zhang, C Liu, P Han Applied Soft Computing 132, 109860, 2023 | 26 | 2023 |
Fingerprinting {SDN} applications via encrypted control traffic J Cao, Z Yang, K Sun, Q Li, M Xu, P Han 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 26 | 2019 |
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning S Duan, C Liu, Z Cao, X Jin, P Han Future Generation Computer Systems 137, 336-348, 2022 | 20 | 2022 |
Leakage models and inference attacks on searchable encryption for cyber-physical social systems G Wang, C Liu, Y Dong, KKR Choo, P Han, H Pan, B Fang IEEE Access 6, 21828-21839, 2018 | 20 | 2018 |
A cloud access security broker based approach for encrypted data search and sharing C Liu, G Wang, P Han, H Pan, B Fang 2017 International Conference on Computing, Networking and Communications …, 2017 | 19 | 2017 |
CloudDLP: Transparent and scalable data sanitization for browser-based cloud storage P Han, C Liu, J Cao, S Duan, H Pan, Z Cao, B Fang IEEE Access 8, 68449-68459, 2020 | 18 | 2020 |
Ht-fed-gan: Federated generative model for decentralized tabular data synthesis S Duan, C Liu, P Han, X Jin, X Zhang, T He, H Pan, X Xiang Entropy 25 (1), 88, 2022 | 14 | 2022 |
A serial attention frame for multi-label waste bottle classification J Xiao, J Xu, C Tian, P Han, L You, S Zhang Applied Sciences 12 (3), 1742, 2022 | 14 | 2022 |
Automatically crawling dynamic web applications via proxy-based javascript injection and runtime analysis Y Li, P Han, C Liu, B Fang 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 12 | 2018 |
Generative data augmentation for non-iid problem in decentralized clinical machine learning Z Wang, S Duan, C Wu, W Lin, X Zha, P Han, C Liu 2022 4th International Conference on Data Intelligence and Security (ICDIS …, 2022 | 9 | 2022 |
VESC: a new variational autoencoder based model for anomaly detection C Zhang, X Wang, J Zhang, S Li, H Zhang, C Liu, P Han International Journal of Machine Learning and Cybernetics 14 (3), 683-696, 2023 | 8 | 2023 |
Query recovery attacks on searchable encryption based on partial knowledge G Wang, C Liu, Y Dong, H Pan, P Han, B Fang Security and Privacy in Communication Networks: 13th International …, 2018 | 8 | 2018 |
On-manifold adversarial attack based on latent space substitute model C Zhang, X Luo, P Han Computers & Security 120, 102770, 2022 | 7 | 2022 |
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding X Xiang, S Duan, H Pan, P Han, J Cao, C Liu Proceedings of the 2020 International Conference on Cyberspace Innovation of …, 2020 | 6 | 2020 |
SafeBox: A scheme for searching and sharing encrypted data in cloud applications G Wang, C Liu, Y Dong, H Pan, P Han, B Fang 2017 International Conference on Security, Pattern Analysis, and Cybernetics …, 2017 | 6 | 2017 |
Fed‐DNN‐Debugger: Automatically Debugging Deep Neural Network Models in Federated Learning S Duan, C Liu, P Han, X Jin, X Zhang, X Xiang, H Pan Security and Communication Networks 2023 (1), 5968168, 2023 | 5 | 2023 |
FIGAT: Accurately classify individual crime risks with multi-information fusion W Xu, P Han, S Duan, C Liu IEEE Transactions on Services Computing 16 (3), 1890-1903, 2022 | 5 | 2022 |