2024.png

๐Ÿ™‹โ€โ™‚๏ธย AP at BUPT

๐Ÿ‘จ๐Ÿผโ€๐ŸŽ“ย Ph.D. at THU

๐Ÿ“ Beijing, China


<aside> ๐Ÿ“ง Email

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" width="40px" /> Github

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" width="40px" /> Scholar

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" width="40px" /> ResearchGate

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" width="40px" /> OCRID

</aside>


Publications

**Curriculum Vitae (**CV)

ไธญๆ–‡็ฎ€ๅŽ†

Citation

Past News


https://mapmyvisitors.com/map.png?cl=080808&w=400&t=tt&d=dWLY2IqGDzKrlJ91eI0puaH-ndfLKB3uJ9AfIM5ul4k&co=ffffff&ct=808080

https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https://dongqi.notion.site/Dongqi-Han-4cec312e44bc47178a13ce93caa0b50c&count_bg=#A259C9&title_bg=#000000&icon=macys.svg&icon_color=#E7E7E7&title=hits&edge_flat=false

๐Ÿ‘จ๐Ÿผโ€๐ŸŽ“ About

Iโ€™m an assistant professor at the Beijing University of Posts and Telecommunications (BUPT). Before that, I received my Ph.D. from Tsinghua University in 2024, advised by Prof. Zhiliang Wang, and also a joint Ph.D. at Nanyang Technological University advised by Prof. Yang Liu. My research focuses on trustworthy AI, anomaly detection, network traffic analysis, and other intersections between security and machine learning.

<aside> <img src="/icons/fire_red.svg" alt="/icons/fire_red.svg" width="40px" /> Research Interests

  1. AI + Security: trustworthy AI & AI for cyber security
  2. Network Traffic Analysis: anomaly detection, fingerprinting, classification, etc.
  3. Network Measurement and Security: measurement and security analysis on diverse network architectures and protocols </aside>

๐Ÿ”ฅ News

๐Ÿ“ Selected Publications

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [CCSโ€™24] Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications

๐Ÿ‘คย Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSSโ€™23] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation

๐Ÿ‘คย Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [CCSโ€™21] DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

๐Ÿ‘คย Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/book_purple.svg" alt="/icons/book_purple.svg" width="40px" /> [JSACโ€™21] Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors

๐Ÿ‘คย Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, Shuqiang Lu, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [IFIP Networkingโ€™23] Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild

๐Ÿ‘คย Dongqi Han, Shangdong Wang, Zhize He, Zhiliang Wang, Wenqi Chen, Chenglong Li, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSSโ€™23] BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems

๐Ÿ‘คย Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSSโ€™22] ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment

๐Ÿ‘คย Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi

<aside> <img src="/icons/book_purple.svg" alt="/icons/book_purple.svg" width="40px" /> [TIFSโ€™22] threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

๐Ÿ‘คย Su Wang, Zhiliang Wang, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang