@inproceedings{han2023anomaly,
title={Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.},
author={Han, Dongqi and Wang, Zhiliang and Chen, Wenqi and Wang, Kai and Yu, Rui and Wang, Su and Zhang, Han and Wang, Zhihua and Jin, Minghui and Yang, Jiahai and others},
booktitle={NDSS},
year={2023}
}
@article{han2021evaluating,
title={Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors},
author={Han, Dongqi and Wang, Zhiliang and Zhong, Ying and Chen, Wenqi and Yang, Jiahai and Lu, Shuqiang and Shi, Xingang and Yin, Xia},
journal={IEEE Journal on Selected Areas in Communications},
volume={39},
number={8},
pages={2632--2647},
year={2021},
publisher={IEEE}
}
@inproceedings{han2023cutting,
title={Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild},
author={Han, Dongqi and Wang, Shangdong and He, Zhize and Wang, Zhiliang and Chen, Wenqi and Li, Chenglong and Yang, Jiahai and Shi, Xingang and Yin, Xia},
booktitle={2023 IFIP Networking Conference (IFIP Networking)},
pages={1--9},
year={2023},
organization={IEEE}
}
@inproceedings{han2021deepaid,
title={Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications},
author={Han, Dongqi and Wang, Zhiliang and Chen, Wenqi and Zhong, Ying and Wang, Su and Zhang, Han and Yang, Jiahai and Shi, Xingang and Yin, Xia},
booktitle={Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security},
pages={3197--3217},
year={2021}
}
@inproceedings{chen2021adsim,
title={Adsim: network anomaly detection via similarity-aware heterogeneous ensemble learning},
author={Chen, Wenqi and Wang, Zhiliang and Zhong, Ying and Han, Dongqi and Duan, Chenxin and Yin, Xia and Yang, Jiahai and Shi, Xingang},
booktitle={2021 IFIP/IEEE International Symposium on Integrated Network Management (IM)},
pages={608--612},
year={2021},
organization={IEEE}
}
@inproceedings{chen2022rov,
title={ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.},
author={Chen, Wenqi and Wang, Zhiliang and Han, Dongqi and Duan, Chenxin and Yin, Xia and Yang, Jiahai and Shi, Xingang},
booktitle={NDSS},
year={2022}
}
@article{wang2022threatrace,
title={Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning},
author={Wang, Su and Wang, Zhiliang and Zhou, Tao and Sun, Hongbin and Yin, Xia and Han, Dongqi and Zhang, Han and Shi, Xingang and Yang, Jiahai},
journal={IEEE Transactions on Information Forensics and Security},
volume={17},
pages={3972--3987},
year={2022},
publisher={IEEE}
}
@inproceedings{wang2023bars,
title={BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems.},
author={Wang, Kai and Wang, Zhiliang and Han, Dongqi and Chen, Wenqi and Yang, Jiahai and Shi, Xingang and Yin, Xia},
booktitle={NDSS},
year={2023}
}