🧭  Home | CV | Publications | 中文


used.png

🤚🏼 fifth-year Ph.D. in THU

📍 Beijing, China

<aside> 📧 Email

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/b6267cb6-76da-41ad-9c84-1e64dd27eb60/github.png" width="40px" /> Github

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/eff6cdc1-0666-4d05-a627-ba7ffb78bd28/googlescholar.png" width="40px" /> Scholar

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/68a8c4df-612b-4b84-90e2-ecb6bef0f2b4/researchgate.png" width="40px" /> ResearchGate

</aside>

<aside> <img src="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" alt="https://s3-us-west-2.amazonaws.com/secure.notion-static.com/73910b13-920a-48ab-890a-8c38e19e0bf4/orcid.png" width="40px" /> OCRID

</aside>



https://mapmyvisitors.com/map.png?cl=080808&w=400&t=tt&d=dWLY2IqGDzKrlJ91eI0puaH-ndfLKB3uJ9AfIM5ul4k&co=ffffff&ct=808080

https://hits.seeyoufarm.com/api/count/incr/badge.svg?url=https://dongqi.notion.site/Dongqi-Han-4cec312e44bc47178a13ce93caa0b50c&count_bg=#A259C9&title_bg=#000000&icon=macys.svg&icon_color=#E7E7E7&title=hits&edge_flat=false

👨🏼‍🎓 About

Hello! I’m a fifth-year Ph.D. student in INSC at Tsinghua University, advised by Prof. Zhiliang Wang. My research focuses on trustworthy AI, anomaly detection, network traffic analysis, and other intersections between security and machine learning. Currently, I am working on improving the trustworthiness and practicability of machine learning in various security applications.

🔥 News

📝 Selected Publications

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [CCS’24] Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications

👤 Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang, Su Wang, Jiahai Yang, Xingang Shi, Xia Yin, Yang Liu

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSS’23] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation

👤 Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [CCS’21] DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

👤 Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/book_purple.svg" alt="/icons/book_purple.svg" width="40px" /> [JSAC’21] Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors

👤 Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, Shuqiang Lu, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [IFIP Networking’23] Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild

👤 Dongqi Han, Shangdong Wang, Zhize He, Zhiliang Wang, Wenqi Chen, Chenglong Li, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSS’23] BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems

👤 Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin

<aside> <img src="/icons/document_purple.svg" alt="/icons/document_purple.svg" width="40px" /> [NDSS’22] ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment

👤 Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi

<aside> <img src="/icons/book_purple.svg" alt="/icons/book_purple.svg" width="40px" /> [TIFS’22] threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

👤 Su Wang, Zhiliang Wang, Tao Zhou, Hongbin Sun, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang


Internal Links

Dongqi Han (CV)

中文简历

Publications

Citation

Past News


Powered by Fruition