Follow
Dongqi Han
Title
Cited by
Cited by
Year
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors
D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin
IEEE Journal on Selected Areas in Communications 39 (8), 2632-2647, 2021
105*2021
Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications
D Han, Z Wang, W Chen, Y Zhong, S Wang, H Zhang, J Yang, X Shi, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
512021
A multidimensional chaotic image encryption algorithm based on the region of interest
Y Liu, J Zhang, D Han, P Wu, Y Sun, YS Moon
Multimedia Tools and Applications 79, 17669-17705, 2020
442020
Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning
S Wang, Z Wang, T Zhou, H Sun, X Yin, D Han, H Zhang, X Shi, J Yang
IEEE Transactions on Information Forensics and Security 17, 3972-3987, 2022
412022
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
D Han, Z Wang, W Chen, K Wang, R Yu, S Wang, H Zhang, Z Wang, M Jin, ...
NDSS, 2023
142023
ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.
W Chen, Z Wang, D Han, C Duan, X Yin, J Yang, X Shi
NDSS, 2022
112022
Adsim: network anomaly detection via similarity-aware heterogeneous ensemble learning
W Chen, Z Wang, Y Zhong, D Han, C Duan, X Yin, J Yang, X Shi
2021 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2021
72021
BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems.
K Wang, Z Wang, D Han, W Chen, J Yang, X Shi, X Yin
NDSS, 2023
32023
Real-time feedback watermarking authentication scheme for streaming media
D Han, J Zhang, Y Liu, P Wu, Y Sun
Multimedia Tools and Applications 79, 12699-12725, 2020
32020
Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors
H Zhang, D Han, Y Liu, Z Wang, J Sun, S Zhuang, J Liu, J Dong
arXiv preprint arXiv:2401.10691, 2024
12024
Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild
D Han, S Wang, Z He, Z Wang, W Chen, C Li, J Yang, X Shi, X Yin
2023 IFIP Networking Conference (IFIP Networking), 1-9, 2023
12023
Network anomaly detection via similarity-aware ensemble learning with ADSim
W Chen, Z Wang, L Chang, K Wang, Y Zhong, D Han, C Duan, X Yin, ...
Computer Networks, 110423, 2024
2024
Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring Tasks
R Yu, F Xiao, Z Wang, J Yang, D Han, Z Wang, M Jin, C Li, E Dong, S Xia
2023 IEEE Symposium on Computers and Communications (ISCC), 1280-1286, 2023
2023
Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions
C Duan, J Li, D Han, L Fan, S Zhang, J Yang, Z Wang
Applied Cryptography in Computer and Communications: First EAI International …, 2021
2021
Live Video Streaming Authentication for Vehicle Multimedia based on Merkle Tree
D Han, J Zhang, Y Liu, P Wu, Y Sun
2018 International Conference on Network, Communication, Computer …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–15