2024.png

🙋‍♂️ AP at BUPT

👨🏼‍🎓 Ph.D. at THU

📍 Beijing, China


<aside> 📧 Email

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" width="40px" /> Github

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" width="40px" /> Scholar

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" width="40px" /> ResearchGate

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" width="40px" /> OCRID

</aside>


Publications

CV

中文主页

Citation

Past News


https://mapmyvisitors.com/map.png?cl=080808&w=400&t=tt&d=dWLY2IqGDzKrlJ91eI0puaH-ndfLKB3uJ9AfIM5ul4k&co=ffffff&ct=808080

[Last Update August 27, 2024]

👨🏼‍🎓 个人简介 [Eng]

韩东岐,北京邮电大学特聘副研究员。2024年6月博士毕业于清华大学网络研究院(导师为王之梁副教授),清华大学网络研究院优秀毕业生。曾获国家公派留学资格在新加坡南洋理工大学刘杨教授课题组联合培养。主要研究方向为态势感知、可信AI和网络安全,在CCS、NDSS、JSAC、TIFS等网络及安全领域国际期刊和会议上发表论文十余篇,申请发明专利十项,相关研究获得IRTF应用网络研究奖。作为主要人员参与了重点研发、国网、阿里、奇安信等项目。

<aside> <img src="/icons/fire_red.svg" alt="/icons/fire_red.svg" width="40px" /> 招生信息 [官网主页]

招收25年硕士研究生(含24年9月推免),同时欢迎本科实习生,课题组经费充足,氛围良好,和国内外多所高校和企业有合作关系,欢迎有意从事相关科研的同学邮箱联系!

</aside>

🔬 研究兴趣

📖 教育背景

💼 工作经历

📝 代表成果

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [CCS’24] Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications

👤 Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSS’23] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation

👤 Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [CCS’21] DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

👤 Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/book_purple.svg" alt="/icons/book_purple.svg" width="40px" /> [JSAC’21] Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors

👤 Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, Shuqiang Lu, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [IFIP Networking’23] Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild

👤 Dongqi Han, Shangdong Wang, Zhize He, Zhiliang Wang, Wenqi Chen, Chenglong Li, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSS’23] BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems

👤 Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSS’22] ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment

👤 Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi

<aside> <img src="/icons/book_purple.svg" alt="/icons/book_purple.svg" width="40px" /> [TIFS’22] threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

👤 Su Wang, Zhiliang Wang, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang