Peiyi Han
Orcid: 0000-0002-3845-7749
According to our database1,
Peiyi Han
authored at least 39 papers
between 2016 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Robotics Autom. Lett., February, 2025
2024
IEEE Trans. Artif. Intell., February, 2024
Generative data augmentation with differential privacy for non-IID problem in decentralized clinical machine learning.
Future Gener. Comput. Syst., 2024
FEDKA: Federated Knowledge Augmentation for Multi-Center Medical Image Segmentation on non-IID Data.
Proceedings of the IEEE International Conference on Acoustics, 2024
Enhancing Text-to-SQL Parsing through Question Rewriting and Execution-Guided Refinement.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Int. J. Mach. Learn. Cybern., March, 2023
Entropy, January, 2023
IEEE Trans. Serv. Comput., 2023
Appl. Soft Comput., 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
2022
IEEE Trans. Emerg. Top. Comput. Intell., 2022
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning.
Future Gener. Comput. Syst., 2022
Comput. Secur., 2022
Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
2021
Log Sequence Anomaly Detection Based on Local Information Extraction and Globally Sparse Transformer Model.
IEEE Trans. Netw. Serv. Manag., 2021
An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images.
Comput. Electr. Eng., 2021
Reconstruct Anomaly to Normal: Adversarially Learned and Latent Vector-Constrained Autoencoder for Time-Series Anomaly Detection.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Pattern Recognit. Lett., 2020
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage.
IEEE Access, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
IEEE Access, 2018
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 International Conference on Computing, 2017
2016
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective.
Sci. Program., 2016