[中文] [Eng]

- AP at BUPT
- Ph.D. at THU
- Beijing, China
<aside>
<img src="/icons/mail_gray.svg" alt="/icons/mail_gray.svg" width="40px" /> Email
</aside>
<aside>
<img src="attachment:64d34605-5497-4b94-9c42-20e23376155a:google_scholar图像-removebg-preview.png" alt="attachment:64d34605-5497-4b94-9c42-20e23376155a:google_scholar图像-removebg-preview.png" width="40px" /> Scholar
</aside>
<aside>
<img src="attachment:18d00f86-89f5-45d4-ba61-a9fc74f838bf:github.png" alt="attachment:18d00f86-89f5-45d4-ba61-a9fc74f838bf:github.png" width="40px" /> Github
</aside>
<aside>
<img src="attachment:2ef8c68c-70cb-429c-ab98-daea83e1496f:id.png" alt="attachment:2ef8c68c-70cb-429c-ab98-daea83e1496f:id.png" width="40px" /> OCRID
</aside>
<aside>
<img src="attachment:9dc86646-77be-4718-bbb6-b51664237812:05815E603799A29D53DDB1E0FAF_557A7220_102AD-removebg-preview.png" alt="attachment:9dc86646-77be-4718-bbb6-b51664237812:05815E603799A29D53DDB1E0FAF_557A7220_102AD-removebg-preview.png" width="40px" /> 校网主页
</aside>
<aside>
<img src="attachment:b1096152-2707-43b2-bd5b-f9c8b5ca792d:学院logo.png" alt="attachment:b1096152-2707-43b2-bd5b-f9c8b5ca792d:学院logo.png" width="40px" /> 院网主页
</aside>

About Me
I’m currently an associate researcher (assistant professor) at the Beijing University of Posts and Telecommunications (BUPT). Before that, I received my Ph.D. from Tsinghua University in 2024, advised by Prof. Zhiliang Wang, and also a joint Ph.D. at Nanyang Technological University advised by Prof. Yang Liu. My research focuses on building trustworthy and practical AI (including LLM/Agents) for Cybersecurity, as well as other intersections between AI and Security (See my full biography here).
Research Interests
- AI/LLM + Security: trustworthy AI & AI for cybersecurity
- Traffic Analysis: ETA, anomaly detection, fingerprinting, classification
- Network Security: measurement and security analysis on diverse network architectures and protocols
News
- [July 4, 2025] One paper was accepted by IEEE TIFS (Congratulations to Su!)
- [May 14, 2025] One paper was accepted by IEEE TIFS (Congratulations to Susu!)
- [March 29, 2025] Our paper on persistent validation and anomaly detection for path-aware networks was accepted by CCS’25 (Congratulations to Keji!)
- [March 26, 2025] One paper was accepted by ICDCS’24 (Congratulations to Keji!)
- [October 17, 2024] Our paper GEAD on CCS’24 won Distinguished Artifact Award! (award rate: 10/121=8.2%) !
- [July 19, 2024] One paper on audit log compaction was accepted by RAID’24 (Congratulations to Hongbin!)
- [July 11, 2024] I joined the School of Cyberspace Security, Beijing University of Posts and Telecommunications (BUPT)!
Selected Publications [More]
<aside>
<img src="/icons/info-alternate_lightgray.svg" alt="/icons/info-alternate_lightgray.svg" width="40px" />
corresponding author, * equal contribution,
</aside>
- Keji Miao, Jie Yuan, Xinghai Wei, Xingwu Wang, Dongqi Han#, Haiguang Wang, Runshan Hu, Xiaoyong Li, Zitong Jin, Wenqi Chen. 1BIT: Persistent Path Validation with Customized Noise Signal Characteristics. ACM Conference on Computer and Communications Security (CCS), 2025 (acceptance rate: ??/?? = ??%) [Code][Paper][Slides][Talk]
- Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu. Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications. ACM Conference on Computer and Communications Security (CCS), 2024 (acceptance rate: 331/1964 = 16.9%) [Code][Paper][Slides][Talk], :badge: Artifact (Available+Evaluated-Reusable+Results Reproduced), :award: Distinguished Artifact Awards
- Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin. Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation. Annual Network and Distributed System Security Symposium (NDSS) (acceptance rate: 58/398=14.5%) [Code][Paper][Slides][Talk], :microphone1: IEEE Meeting 119, :award: IRTF Applied Networking Research Prize
- Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin. DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications. ACM Conference on Computer and Communications Security (CCS), 2021 (acceptance rate: 65/315=20.6%) [Code][Paper][Cite]
- Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin. Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors. IEEE Journal on Selected Areas in Communications (JSAC), 2021 [Code][Paper][Cite]