Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hongyi Peng
@article{DBLP:journals/pacmmod/LiCGPGY23, author = {Anran Li and Yue Cao and Jiabao Guo and Hongyi Peng and Qing Guo and Han Yu}, title = {FedCSS: Joint Client-and-Sample Selection for Hard Sample-Aware Noise-Robust Federated Learning}, journal = {Proc. {ACM} Manag. Data}, volume = {1}, number = {3}, pages = {212:1--212:24}, year = {2023}, url = {https://doi.org/10.1145/3617332}, doi = {10.1145/3617332}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmmod/LiCGPGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiPZHGYL23, author = {Anran Li and Hongyi Peng and Lan Zhang and Jiahui Huang and Qing Guo and Han Yu and Yang Liu}, title = {FedSDG-FS: Efficient and Secure Feature Selection for Vertical Federated Learning}, booktitle = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications, New York City, NY, USA, May 17-20, 2023}, pages = {1--10}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/INFOCOM53939.2023.10228895}, doi = {10.1109/INFOCOM53939.2023.10228895}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiPZHGYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SachidanandaPPYL23, author = {Vinay Sachidananda and Rajendra Patil and Hongyi Peng and Yang Liu and Kwok{-}Yan Lam}, title = {ThreatLand: Extracting Intelligence from Audit Logs via {NLP} methods}, booktitle = {20th Annual International Conference on Privacy, Security and Trust, {PST} 2023, Copenhagen, Denmark, August 21-23, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/PST58708.2023.10320173}, doi = {10.1109/PST58708.2023.10320173}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/SachidanandaPPYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-10417, author = {Anran Li and Hongyi Peng and Lan Zhang and Jiahui Huang and Qing Guo and Han Yu and Yang Liu}, title = {FedSDG-FS: Efficient and Secure Feature Selection for Vertical Federated Learning}, journal = {CoRR}, volume = {abs/2302.10417}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.10417}, doi = {10.48550/ARXIV.2302.10417}, eprinttype = {arXiv}, eprint = {2302.10417}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-10417.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PatilSPSG22, author = {Rajendra Patil and Vinay Sachidananda and Hongyi Peng and Akshay Sachdeva and Mohan Gurusamy}, title = {{MARK:} Fill in the blanks through a JointGAN based data augmentation for network anomaly detection}, journal = {Comput. Secur.}, volume = {119}, pages = {102759}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102759}, doi = {10.1016/J.COSE.2022.102759}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PatilSPSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PengSLPLMG22, author = {Hongyi Peng and Vinay Sachidananda and Teng Joon Lim and Rajendra Patil and Mingchang Liu and Sivaanandh Muneeswaran and Mohan Gurusamy}, editor = {Cristina Alcaraz and Liqun Chen and Shujun Li and Pierangela Samarati}, title = {{ODDITY:} An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection}, booktitle = {Information and Communications Security - 24th International Conference, {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13407}, pages = {417--437}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15777-6\_23}, doi = {10.1007/978-3-031-15777-6\_23}, timestamp = {Fri, 02 Sep 2022 10:50:10 +0200}, biburl = {https://dblp.org/rec/conf/icics/PengSLPLMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiuSPPMG22, author = {Mingchang Liu and Vinay Sachidananda and Hongyi Peng and Rajendra Patil and Sivaanandh Muneeswaran and Mohan Gurusamy}, editor = {Cristina Alcaraz and Liqun Chen and Shujun Li and Pierangela Samarati}, title = {Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach}, booktitle = {Information and Communications Security - 24th International Conference, {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13407}, pages = {525--545}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15777-6\_29}, doi = {10.1007/978-3-031-15777-6\_29}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiuSPPMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LiuSPPMG22, author = {Mingchang Liu and Vinay Sachidananda and Hongyi Peng and Rajendra Patil and Sivaanandh Muneeswaran and Mohan Gurusamy}, title = {{LOG-OFF:} {A} Novel Behavior Based Authentication Compromise Detection Approach}, booktitle = {19th Annual International Conference on Privacy, Security {\&} Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PST55820.2022.9851969}, doi = {10.1109/PST55820.2022.9851969}, timestamp = {Fri, 02 Sep 2022 18:51:56 +0200}, biburl = {https://dblp.org/rec/conf/pst/LiuSPPMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MuneeswaranSPPL22, author = {Sivaanandh Muneeswaran and Vinay Sachidananda and Rajendra Patil and Hongyi Peng and Mingchang Liu and Mohan Gurusamy}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {529--546}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_28}, doi = {10.1007/978-3-031-25538-0\_28}, timestamp = {Thu, 06 Jul 2023 17:45:42 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MuneeswaranSPPL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MeidanSPSES20, author = {Yair Meidan and Vinay Sachidananda and Hongyi Peng and Racheli Sagron and Yuval Elovici and Asaf Shabtai}, title = {A novel approach for detecting vulnerable IoT devices connected behind a home {NAT}}, journal = {Comput. Secur.}, volume = {97}, pages = {101968}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101968}, doi = {10.1016/J.COSE.2020.101968}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MeidanSPSES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/JiangPY16, author = {Chunfu Jiang and Hongyi Peng and Yu{-}Kuan Yang}, title = {Tail variance of portfolio under generalized Laplace distribution}, journal = {Appl. Math. Comput.}, volume = {282}, pages = {187--203}, year = {2016}, url = {https://doi.org/10.1016/j.amc.2016.02.005}, doi = {10.1016/J.AMC.2016.02.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/JiangPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/PengJFL14, author = {Hongyi Peng and Chunfu Jiang and Xiang Fang and Jinshan Liu}, title = {Variable selection for Fisher linear discriminant analysis using the modified sequential backward selection algorithm for the microarray data}, journal = {Appl. Math. Comput.}, volume = {238}, pages = {132--140}, year = {2014}, url = {https://doi.org/10.1016/j.amc.2014.03.141}, doi = {10.1016/J.AMC.2014.03.141}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/PengJFL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/PengFLFJ13, author = {Hongyi Peng and Yinlian Fu and Jinshan Liu and Xiang Fang and Chunfu Jiang}, title = {Optimal gene subset selection using the modified {SFFS} algorithm for tumor classification}, journal = {Neural Comput. Appl.}, volume = {23}, number = {6}, pages = {1531--1538}, year = {2013}, url = {https://doi.org/10.1007/s00521-012-1148-2}, doi = {10.1007/S00521-012-1148-2}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/PengFLFJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/PengZ07, author = {Hongyi Peng and Siming Zhu}, title = {Handling of incomplete data sets using {ICA} and {SOM} in data mining}, journal = {Neural Comput. Appl.}, volume = {16}, number = {2}, pages = {167--172}, year = {2007}, url = {https://doi.org/10.1007/s00521-006-0058-6}, doi = {10.1007/S00521-006-0058-6}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/PengZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.