Hongyi Peng

According to our database1, Hongyi Peng authored at least 13 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FedCSS: Joint Client-and-Sample Selection for Hard Sample-Aware Noise-Robust Federated Learning.
Proc. ACM Manag. Data, September, 2023

ThreatLand: Extracting Intelligence from Audit Logs via NLP methods.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

FedSDG-FS: Efficient and Secure Feature Selection for Vertical Federated Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

2022
MARK: Fill in the blanks through a JointGAN based data augmentation for network anomaly detection.
Comput. Secur., 2022

Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2022

LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2020
A novel approach for detecting vulnerable IoT devices connected behind a home NAT.
Comput. Secur., 2020

2016
Tail variance of portfolio under generalized Laplace distribution.
Appl. Math. Comput., 2016

2014
Variable selection for Fisher linear discriminant analysis using the modified sequential backward selection algorithm for the microarray data.
Appl. Math. Comput., 2014

2013
Optimal gene subset selection using the modified SFFS algorithm for tumor classification.
Neural Comput. Appl., 2013

2007
Handling of incomplete data sets using ICA and SOM in data mining.
Neural Comput. Appl., 2007


  Loading...