default search action
Peiyi Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Tianyu He, Peiyi Han, Shaoming Duan, Zirui Wang, Wentai Wu, Chuanyi Liu, Jianrun Han:
Generative data augmentation with differential privacy for non-IID problem in decentralized clinical machine learning. Future Gener. Comput. Syst. 160: 171-184 (2024) - [j16]Wenjian Luo, Licai Zhang, Yulin Wu, Chuanyi Liu, Peiyi Han, Rongfei Zhuang:
Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings. IEEE Trans. Artif. Intell. 5(2): 814-826 (2024) - [c19]Wenxin Mao, Ruiqi Wang, Jiyu Guo, Jichuan Zeng, Cuiyun Gao, Peiyi Han, Chuanyi Liu:
Enhancing Text-to-SQL Parsing through Question Rewriting and Execution-Guided Refinement. ACL (Findings) 2024: 2009-2024 - [c18]Yuhao Zhang, Shaoming Duan, Xinyu Zha, Jinhang Su, Peiyi Han, Chuanyi Liu:
FEDKA: Federated Knowledge Augmentation for Multi-Center Medical Image Segmentation on non-IID Data. ICASSP 2024: 2116-2120 - [i3]Wenbo Xu, Liang Yan, Peiyi Han, Haifeng Zhu, Chuanyi Liu, Shaoming Duan, Cuiyun Gao, Yingwei Liang:
TCSR-SQL: Towards Table Content-aware Text-to-SQL with Self-retrieval. CoRR abs/2407.01183 (2024) - 2023
- [j15]Chunkai Zhang, Xinyu Wang, Hongye Zhang, Jiahua Zhang, Hanyu Zhang, Chuanyi Liu, Peiyi Han:
LayerLog: Log sequence anomaly detection based on hierarchical semantics. Appl. Soft Comput. 132: 109860 (2023) - [j14]Shaoming Duan, Chuanyi Liu, Peiyi Han, Xiaopeng Jin, Xinyi Zhang, Tianyu He, Hezhong Pan, Xiayu Xiang:
HT-Fed-GAN: Federated Generative Model for Decentralized Tabular Data Synthesis. Entropy 25(1): 88 (2023) - [j13]Chunkai Zhang, Xinyu Wang, Jiahua Zhang, Shaocong Li, Hanyu Zhang, Chuanyi Liu, Peiyi Han:
VESC: a new variational autoencoder based model for anomaly detection. Int. J. Mach. Learn. Cybern. 14(3): 683-696 (2023) - [j12]Wenbo Xu, Peiyi Han, Shaoming Duan, Chuanyi Liu:
FIGAT: Accurately Classify Individual Crime Risks With Multi-Information Fusion. IEEE Trans. Serv. Comput. 16(3): 1890-1903 (2023) - [c17]Yongkang Luo, Peiyi Han, Wenjian Luo, Shaocong Xue, Kesheng Chen, Linqi Song:
A Framework of Large-Scale Peer-to-Peer Learning System. ICONIP (2) 2023: 27-41 - 2022
- [j11]Chunkai Zhang, Xiaofeng Luo, Peiyi Han:
On-manifold adversarial attack based on latent space substitute model. Comput. Secur. 120: 102770 (2022) - [j10]Shaoming Duan, Chuanyi Liu, Zhengsheng Cao, Xiaopeng Jin, Peiyi Han:
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning. Future Gener. Comput. Syst. 137: 336-348 (2022) - [j9]Wenjian Luo, Licai Zhang, Peiyi Han, Chuanyi Liu, Rongfei Zhuang:
Taking Away Both Model and Data: Remember Training Data by Parameter Combinations. IEEE Trans. Emerg. Top. Comput. Intell. 6(6): 1427-1437 (2022) - [c16]Peiyi Han, Yunzhe Guo, Shaoming Duan, Chuanyi Liu, Yuxing Zhou:
Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption. ICDIS 2022: 148-154 - [c15]Zirui Wang, Shaoming Duan, Chengyue Wu, Wenhao Lin, Xinyu Zha, Peiyi Han, Chuanyi Liu:
Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning. ICDIS 2022: 336-343 - [i2]Shaoming Duan, Chuanyi Liu, Peiyi Han, Tianyu He, Yifeng Xu, Qiyuan Deng:
Fed-TDA: Federated Tabular Data Augmentation on Non-IID Data. CoRR abs/2211.13116 (2022) - [i1]Zirui Wang, Shaoming Duan, Chengyue Wu, Wenhao Lin, Xinyu Zha, Peiyi Han, Chuanyi Liu:
Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning. CoRR abs/2212.01109 (2022) - 2021
- [j8]Chunkai Zhang, Xin Guo, Yepeng Deng, Xuan Wang, Peiyi Han, Chuanyi Liu, Hanyu Zhang:
An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images. Comput. Electr. Eng. 95: 107402 (2021) - [j7]Chunkai Zhang, Xinyu Wang, Hongye Zhang, Hanyu Zhang, Peiyi Han:
Log Sequence Anomaly Detection Based on Local Information Extraction and Globally Sparse Transformer Model. IEEE Trans. Netw. Serv. Manag. 18(4): 4119-4133 (2021) - [c14]Xiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Chuanyi Liu:
Sampled Data Debugging via Fuzzy C-Means. DSC 2021: 32-39 - [c13]Xianzhe Yu, Peiyi Han, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Xiayu Xiang:
FIGAT: Accurately Predict Individual Crime Risks with Multi-information Fusion. DSC 2021: 248-255 - [c12]Xunan Gao, Peiyi Han, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Xiayu Xiang:
PRFP: Privacy-respecting and Accurate Device Fingerprint Identification. DSC 2021: 264-271 - [c11]Chunkai Zhang, Wei Zuo, Shaocong Li, Xuan Wang, Peiyi Han, Chuanyi Liu:
Reconstruct Anomaly to Normal: Adversarially Learned and Latent Vector-Constrained Autoencoder for Time-Series Anomaly Detection. PRICAI (2) 2021: 515-529 - 2020
- [j6]Peiyi Han, Chuanyi Liu, Jiahao Cao, Shaoming Duan, Hezhong Pan, Zekun Cao, Binxing Fang:
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage. IEEE Access 8: 68449-68459 (2020) - [j5]Junqian Wang, Hanyu Zhang, Peiyi Han, Chuanyi Liu, Yong Xu:
Pixel re-representations for better classification of images. Pattern Recognit. Lett. 140: 310-317 (2020) - [j4]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Binxing Fang:
Scene text reading based cloud compliance access. World Wide Web 23(4): 2633-2647 (2020) - [c10]Xiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Jiahao Cao, Chuanyi Liu:
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding. CIAT 2020: 407-413 - [c9]Peiyi Han, Chaozheng Wang, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Pengshuai Luo:
SecureMLDebugger: A Privacy-Preserving Machine Learning Debugging Tool. DSC 2020: 127-134
2010 – 2019
- 2019
- [c8]Peiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang:
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage. CNS 2019: 46-54 - [c7]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang, Binxing Fang:
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction. DSC 2019: 686-693 - [c6]Chuanyi Liu, Peiyi Han, Yingfei Dong, Hezhong Pan, Shaoming Duan, Binxing Fang:
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage. ICCCN 2019: 1-8 - [c5]Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:
Fingerprinting SDN Applications via Encrypted Control Traffic. RAID 2019: 501-515 - 2018
- [j3]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Peiyi Han, Hezhong Pan, Binxing Fang:
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications. IEEE Access 6: 2908-2921 (2018) - [j2]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Kim-Kwang Raymond Choo, Peiyi Han, Hezhong Pan, Binxing Fang:
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems. IEEE Access 6: 21828-21839 (2018) - [c4]Yan Li, Peiyi Han, Chuanyi Liu, Binxing Fang:
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis. DSC 2018: 242-249 - 2017
- [c3]Chuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang:
A Cloud Access Security Broker based approach for encrypted data search and sharing. ICNC 2017: 422-426 - [c2]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. SecureComm 2017: 530-549 - [c1]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
SafeBox: A scheme for searching and sharing encrypted data in cloud applications. SPAC 2017: 648-653 - 2016
- [j1]Peiyi Han, Chuanyi Liu, Binxing Fang, Guofeng Wang, Xiaobao Song, Lei Wan:
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective. Sci. Program. 2016: 8057208:1-8057208:9 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint