πββοΈΒ AP at BUPT
πΒ Ph.D. at THU
π Beijing, China
<aside> π§ Email
</aside>
<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" width="40px" /> Github
</aside>
<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" width="40px" /> Scholar
</aside>
<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" width="40px" /> ResearchGate
</aside>
<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" width="40px" /> OCRID
</aside>
[Last Update December 3, 2024]
Iβm an assistant professor at the Beijing University of Posts and Telecommunications (BUPT). Before that, I received my Ph.D. from Tsinghua University in 2024, advised by Prof. Zhiliang Wang, and also a joint Ph.D. at Nanyang Technological University advised by Prof. Yang Liu. My research focuses on the intersection between AI and Cybersecurity.
<aside> <img src="/icons/fire_red.svg" alt="/icons/fire_red.svg" width="40px" /> Research Interests
<aside> <img src="/icons/info-alternate_lightgray.svg" alt="/icons/info-alternate_lightgray.svg" width="40px" />
</aside>
<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [CCSβ24] Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications
π€Β Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu
<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSSβ23] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation
π€Β Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin
<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [CCSβ21] DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
π€Β Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin
<aside> <img src="/icons/book_purple.svg" alt="/icons/book_purple.svg" width="40px" /> [JSACβ21] Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors
π€Β Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, Shuqiang Lu, Xingang Shi, Xia Yin