Peiyi Han

Orcid: 0000-0002-3845-7749

According to our database1, Peiyi Han authored at least 34 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings.
IEEE Trans. Artif. Intell., February, 2024

2023
VESC: a new variational autoencoder based model for anomaly detection.
Int. J. Mach. Learn. Cybern., March, 2023

HT-Fed-GAN: Federated Generative Model for Decentralized Tabular Data Synthesis.
Entropy, January, 2023

FIGAT: Accurately Classify Individual Crime Risks With Multi-Information Fusion.
IEEE Trans. Serv. Comput., 2023

LayerLog: Log sequence anomaly detection based on hierarchical semantics.
Appl. Soft Comput., 2023

A Framework of Large-Scale Peer-to-Peer Learning System.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Taking Away Both Model and Data: Remember Training Data by Parameter Combinations.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning.
Future Gener. Comput. Syst., 2022

Fed-TDA: Federated Tabular Data Augmentation on Non-IID Data.
CoRR, 2022

On-manifold adversarial attack based on latent space substitute model.
Comput. Secur., 2022

Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
Log Sequence Anomaly Detection Based on Local Information Extraction and Globally Sparse Transformer Model.
IEEE Trans. Netw. Serv. Manag., 2021

An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images.
Comput. Electr. Eng., 2021

Reconstruct Anomaly to Normal: Adversarially Learned and Latent Vector-Constrained Autoencoder for Time-Series Anomaly Detection.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

FIGAT: Accurately Predict Individual Crime Risks with Multi-information Fusion.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Sampled Data Debugging via Fuzzy C-Means.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

PRFP: Privacy-respecting and Accurate Device Fingerprint Identification.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Scene text reading based cloud compliance access.
World Wide Web, 2020

Pixel re-representations for better classification of images.
Pattern Recognit. Lett., 2020

CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage.
IEEE Access, 2020

SecureMLDebugger: A Privacy-Preserving Machine Learning Debugging Tool.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Fingerprinting SDN Applications via Encrypted Control Traffic.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications.
IEEE Access, 2018

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018

Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
SafeBox: A scheme for searching and sharing encrypted data in cloud applications.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Cloud Access Security Broker based approach for encrypted data search and sharing.
Proceedings of the 2017 International Conference on Computing, 2017

2016
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective.
Sci. Program., 2016


  Loading...