Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Peiyi Han"'
Autor:
Xiayu XIANG, Jiahui WANG, Zirui WANG, Shaoming DUAN, Hezhong PAN, Rongfei ZHUANG, Peiyi HAN, Chuanyi LIU
Publikováno v:
Tongxin xuebao, Vol 43, Pp 211-224 (2022)
Modeling the probability distribution of rows in structured electronic health records and generating realistic synthetic data is a non-trivial task.Tabular data usually contains discrete columns, and traditional encoding approaches may suffer from th
Externí odkaz:
https://doaj.org/article/1a92c10c51f040029f4b2114e7992825
Publikováno v:
Tongxin xuebao, Vol 42, Pp 133-144 (2021)
The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model
Externí odkaz:
https://doaj.org/article/312b658c54444d34825ea5b629caf88c
Publikováno v:
Frontiers in Oncology, Vol 12 (2022)
BackgroundAlthough neoadjvuant chemoradiotherapy (CRT) improves the local control rate of locally advanced rectal cancer (LARC), it fails to significantly improve disease-free survival (DFS) and overall survival (OS). We explored the efficacy of prol
Externí odkaz:
https://doaj.org/article/3a4df8cc3eac424a820d982c499898dd
Publikováno v:
Tongxin xuebao, Vol 41, Pp 55-65 (2020)
To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic p
Externí odkaz:
https://doaj.org/article/de825140992d42cd88464d8d4c1713a9
Publikováno v:
IEEE Access, Vol 8, Pp 68449-68459 (2020)
Browser-based cloud storage services are still broadly used in enterprises for online sharing and collaboration. However, sensitive information in images or documents may be easily leaked outside trusted enterprise on-premises due to such cloud servi
Externí odkaz:
https://doaj.org/article/f39d7e35a7764bb08f2b4586368b004a
Autor:
Shaoming Duan, Chuanyi Liu, Peiyi Han, Xiaopeng Jin, Xinyi Zhang, Tianyu He, Hezhong Pan, Xiayu Xiang
Publikováno v:
Entropy, Vol 25, Iss 1, p 88 (2022)
In this paper, we study the problem of privacy-preserving data synthesis (PPDS) for tabular data in a distributed multi-party environment. In a decentralized setting, for PPDS, federated generative models with differential privacy are used by the exi
Externí odkaz:
https://doaj.org/article/d0812315ee184f77b90c8900b74630f5
Publikováno v:
Applied Sciences, Vol 12, Iss 17, p 8763 (2022)
Cloud platforms allow administrators or management applications with privileged accounts to remotely perform privileged operations for specific tasks, such as deleting virtual hosts. When privileged accounts are leaked and conduct dangerous privilege
Externí odkaz:
https://doaj.org/article/6d9a36c78454463aa6c877787e19e011
Publikováno v:
Applied Sciences, Vol 12, Iss 3, p 1742 (2022)
The multi-label recognition of damaged waste bottles has important significance in environmental protection. However, most of the previous methods are known for their poor performance, especially in regards to damaged waste bottle classification. In
Externí odkaz:
https://doaj.org/article/c6e22f9c2a1847ea85bee02776e29cb1
Publikováno v:
Tongxin xuebao, Vol 39, Pp 1-14 (2018)
Broker executed searchable encryption (BESE) scheme was proposed for the confidentiality issues of cloud application data.The scheme did not need to modify the cloud application or user habits,thus had strong applicability.Firstly,systematic and quan
Externí odkaz:
https://doaj.org/article/4278d42622914809b8ec0dbfa6b861ed
Publikováno v:
IEEE Access, Vol 6, Pp 2908-2921 (2018)
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high e
Externí odkaz:
https://doaj.org/article/9041500f545a458e9d2adbbc559fd864