BibTeX records: Hongyi Peng

download as .bib file

@article{DBLP:journals/pacmmod/LiCGPGY23,
  author       = {Anran Li and
                  Yue Cao and
                  Jiabao Guo and
                  Hongyi Peng and
                  Qing Guo and
                  Han Yu},
  title        = {FedCSS: Joint Client-and-Sample Selection for Hard Sample-Aware Noise-Robust
                  Federated Learning},
  journal      = {Proc. {ACM} Manag. Data},
  volume       = {1},
  number       = {3},
  pages        = {212:1--212:24},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617332},
  doi          = {10.1145/3617332},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmmod/LiCGPGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiPZHGYL23,
  author       = {Anran Li and
                  Hongyi Peng and
                  Lan Zhang and
                  Jiahui Huang and
                  Qing Guo and
                  Han Yu and
                  Yang Liu},
  title        = {FedSDG-FS: Efficient and Secure Feature Selection for Vertical Federated
                  Learning},
  booktitle    = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications,
                  New York City, NY, USA, May 17-20, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/INFOCOM53939.2023.10228895},
  doi          = {10.1109/INFOCOM53939.2023.10228895},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiPZHGYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SachidanandaPPYL23,
  author       = {Vinay Sachidananda and
                  Rajendra Patil and
                  Hongyi Peng and
                  Yang Liu and
                  Kwok{-}Yan Lam},
  title        = {ThreatLand: Extracting Intelligence from Audit Logs via {NLP} methods},
  booktitle    = {20th Annual International Conference on Privacy, Security and Trust,
                  {PST} 2023, Copenhagen, Denmark, August 21-23, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PST58708.2023.10320173},
  doi          = {10.1109/PST58708.2023.10320173},
  timestamp    = {Tue, 12 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/SachidanandaPPYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-10417,
  author       = {Anran Li and
                  Hongyi Peng and
                  Lan Zhang and
                  Jiahui Huang and
                  Qing Guo and
                  Han Yu and
                  Yang Liu},
  title        = {FedSDG-FS: Efficient and Secure Feature Selection for Vertical Federated
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2302.10417},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.10417},
  doi          = {10.48550/ARXIV.2302.10417},
  eprinttype    = {arXiv},
  eprint       = {2302.10417},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-10417.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PatilSPSG22,
  author       = {Rajendra Patil and
                  Vinay Sachidananda and
                  Hongyi Peng and
                  Akshay Sachdeva and
                  Mohan Gurusamy},
  title        = {{MARK:} Fill in the blanks through a JointGAN based data augmentation
                  for network anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102759},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102759},
  doi          = {10.1016/J.COSE.2022.102759},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PatilSPSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PengSLPLMG22,
  author       = {Hongyi Peng and
                  Vinay Sachidananda and
                  Teng Joon Lim and
                  Rajendra Patil and
                  Mingchang Liu and
                  Sivaanandh Muneeswaran and
                  Mohan Gurusamy},
  editor       = {Cristina Alcaraz and
                  Liqun Chen and
                  Shujun Li and
                  Pierangela Samarati},
  title        = {{ODDITY:} An Ensemble Framework Leverages Contrastive Representation
                  Learning for Superior Anomaly Detection},
  booktitle    = {Information and Communications Security - 24th International Conference,
                  {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13407},
  pages        = {417--437},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15777-6\_23},
  doi          = {10.1007/978-3-031-15777-6\_23},
  timestamp    = {Fri, 02 Sep 2022 10:50:10 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PengSLPLMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiuSPPMG22,
  author       = {Mingchang Liu and
                  Vinay Sachidananda and
                  Hongyi Peng and
                  Rajendra Patil and
                  Sivaanandh Muneeswaran and
                  Mohan Gurusamy},
  editor       = {Cristina Alcaraz and
                  Liqun Chen and
                  Shujun Li and
                  Pierangela Samarati},
  title        = {Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature
                  Based Lenient Hybrid Approach},
  booktitle    = {Information and Communications Security - 24th International Conference,
                  {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13407},
  pages        = {525--545},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15777-6\_29},
  doi          = {10.1007/978-3-031-15777-6\_29},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiuSPPMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LiuSPPMG22,
  author       = {Mingchang Liu and
                  Vinay Sachidananda and
                  Hongyi Peng and
                  Rajendra Patil and
                  Sivaanandh Muneeswaran and
                  Mohan Gurusamy},
  title        = {{LOG-OFF:} {A} Novel Behavior Based Authentication Compromise Detection
                  Approach},
  booktitle    = {19th Annual International Conference on Privacy, Security {\&}
                  Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PST55820.2022.9851969},
  doi          = {10.1109/PST55820.2022.9851969},
  timestamp    = {Fri, 02 Sep 2022 18:51:56 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/LiuSPPMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MuneeswaranSPPL22,
  author       = {Sivaanandh Muneeswaran and
                  Vinay Sachidananda and
                  Rajendra Patil and
                  Hongyi Peng and
                  Mingchang Liu and
                  Mohan Gurusamy},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Hiatus: Unsupervised Generative Approach for Detection of DoS and
                  DDoS Attacks},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {529--546},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_28},
  doi          = {10.1007/978-3-031-25538-0\_28},
  timestamp    = {Thu, 06 Jul 2023 17:45:42 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MuneeswaranSPPL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MeidanSPSES20,
  author       = {Yair Meidan and
                  Vinay Sachidananda and
                  Hongyi Peng and
                  Racheli Sagron and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {A novel approach for detecting vulnerable IoT devices connected behind
                  a home {NAT}},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101968},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101968},
  doi          = {10.1016/J.COSE.2020.101968},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MeidanSPSES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/JiangPY16,
  author       = {Chunfu Jiang and
                  Hongyi Peng and
                  Yu{-}Kuan Yang},
  title        = {Tail variance of portfolio under generalized Laplace distribution},
  journal      = {Appl. Math. Comput.},
  volume       = {282},
  pages        = {187--203},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.amc.2016.02.005},
  doi          = {10.1016/J.AMC.2016.02.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/JiangPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/PengJFL14,
  author       = {Hongyi Peng and
                  Chunfu Jiang and
                  Xiang Fang and
                  Jinshan Liu},
  title        = {Variable selection for Fisher linear discriminant analysis using the
                  modified sequential backward selection algorithm for the microarray
                  data},
  journal      = {Appl. Math. Comput.},
  volume       = {238},
  pages        = {132--140},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.amc.2014.03.141},
  doi          = {10.1016/J.AMC.2014.03.141},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/PengJFL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/PengFLFJ13,
  author       = {Hongyi Peng and
                  Yinlian Fu and
                  Jinshan Liu and
                  Xiang Fang and
                  Chunfu Jiang},
  title        = {Optimal gene subset selection using the modified {SFFS} algorithm
                  for tumor classification},
  journal      = {Neural Comput. Appl.},
  volume       = {23},
  number       = {6},
  pages        = {1531--1538},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00521-012-1148-2},
  doi          = {10.1007/S00521-012-1148-2},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/PengFLFJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/PengZ07,
  author       = {Hongyi Peng and
                  Siming Zhu},
  title        = {Handling of incomplete data sets using {ICA} and {SOM} in data mining},
  journal      = {Neural Comput. Appl.},
  volume       = {16},
  number       = {2},
  pages        = {167--172},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00521-006-0058-6},
  doi          = {10.1007/S00521-006-0058-6},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/PengZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics