Showing 1 - 7 results of 7 for search 'Peiyi Han', query time: 0.01s
Refine Results
-
1
Research on technology of data encryption and search based on access broker by Guofeng WANG, Chuanyi LIU, Peiyi HAN, Hezhong PAN, Binxing FANG
Published 2018-07-01Get full text
Article -
2
Goalie: Defending Against Correlated Value and Sign Encoding Attacks by Rongfei Zhuang, Ximing Fu, Chuanyi Liu, Peiyi Han, Shaoming Duan
Published 2025-03-01Get full text
Article -
3
Research on data encryption system and technology for cloud storage by Peiyi HAN, Chuanyi LIU, Jiahui WANG, Shaoming DUAN, Hezhong PAN, Binxing FANG
Published 2020-08-01Get full text
Article -
4
Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode by Hezhong PAN, Peiyi HAN, Xiayu XIANG, Shaoming DUAN, Rongfei ZHUANG, Chuanyi LIU
Published 2021-11-01Get full text
Article -
5
Research on data encryption system and technology for cloud storage by Peiyi HAN, Chuanyi LIU, Jiahui WANG, Shaoming DUAN, Hezhong PAN, Binxing FANG
Published 2020-08-01Get full text
Article -
6
Improving long‐tail classification via decoupling and regularisation by Shuzheng Gao, Chaozheng Wang, Cuiyun Gao, Wenjian Luo, Peiyi Han, Qing Liao, Guandong Xu
Published 2025-02-01Get full text
Article -
7
Generate medical synthetic data based on generative adversarial network by Xiayu XIANG, Jiahui WANG, Zirui WANG, Shaoming DUAN, Hezhong PAN, Rongfei ZHUANG, Peiyi HAN, Chuanyi LIU
Published 2022-03-01Get full text
Article