🙋♂️ AP at BUPT
🎓 Ph.D. at THU
📍 Beijing, China
<aside> 📧 Email
</aside>
<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" width="40px" /> Scholar
</aside>
<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" width="40px" /> Github
</aside>
<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" width="40px" /> Research Gate
</aside>
<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" width="40px" /> OCRID
</aside>
<aside> <img src="attachment:5bc04f55-8027-413d-8e52-34a922eee8ba:北邮校徽.png" alt="attachment:5bc04f55-8027-413d-8e52-34a922eee8ba:北邮校徽.png" width="40px" /> 个人主页(中文)
</aside>
[Last Update June 13, 2025]
I’m an associate researcher (assistant professor) at the Beijing University of Posts and Telecommunications (BUPT). Before that, I received my Ph.D. from Tsinghua University in 2024, advised by Prof. Zhiliang Wang, and also a joint Ph.D. at Nanyang Technological University advised by Prof. Yang Liu. My research focuses on the intersection between AI and Cybersecurity.
<aside> <img src="/icons/fire_red.svg" alt="/icons/fire_red.svg" width="40px" /> Research Interests
<aside> <img src="/icons/info-alternate_lightgray.svg" alt="/icons/info-alternate_lightgray.svg" width="40px" />
</aside>
1BIT: Persistent Path Validation with Customized Noise Signal Characteristics Keji Miao, Jie Yuan, Xinghai Wei, Xingwu Wang, Dongqi Han#, Haiguang Wang, Runshan Hu, Xiaoyong Li, Zitong Jin, Wenqi Chen CCS’25 (acceptance rate: ??/?? = ??%) [Code][Paper][Slides][Talk]
Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications
Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu
CCS’24 (acceptance rate: 331/1964 = 16.9%) [Code][Paper][Slides][Talk], 🏅Artifact (Available, Evaluated-Reusable, Results Reproduced), 🏆**Distinguished Artifact Awards!**
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin NDSS’23 (acceptance rate: 58/398=14.5%) [Code][Paper][Slides][Talk], 🎙️IEEE Meeting 119, 🏆IRTF **Applied Networking Research Prize!**
DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin CCS’21 (acceptance rate: 65/315=20.6%) [Code][Paper][Cite]
Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin JSAC’21 (IEEE Journal on Selected Areas in Communications) ****[Code][Paper][Cite]