User profiles for Dongqi Han

Dongqi Han

- Verified email at mails.tsinghua.edu.cn - Cited by 277

Dongqi Han

- Verified email at oist.jp - Cited by 111

Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors

D Han, Z Wang, Y Zhong, W Chen… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
Machine learning (ML), especially deep learning (DL) techniques have been increasingly
used in anomaly-based network intrusion detection systems (NIDS). However, ML/DL has …

Variational recurrent models for solving partially observable control tasks

D Han, K Doya, J Tani - arXiv preprint arXiv:1912.10703, 2019 - arxiv.org
In partially observable (PO) environments, deep reinforcement learning (RL) agents often
suffer from unsatisfactory performance, since two problems need to be tackled together: how to …

Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications

D Han, Z Wang, W Chen, Y Zhong, S Wang… - Proceedings of the …, 2021 - dl.acm.org
Unsupervised Deep Learning (DL) techniques have been widely used in various security-related
anomaly detection applications, owing to the great promise of being able to detect …

[HTML][HTML] Self-organization of action hierarchy and compositionality by reinforcement learning with recurrent neural networks

D Han, K Doya, J Tani - Neural Networks, 2020 - Elsevier
Recurrent neural networks (RNNs) for reinforcement learning (RL) have shown distinct
advantages, eg, solving memory-dependent tasks and meta-learning. However, little effort has …

Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning

…, Z Wang, T Zhou, H Sun, X Yin, D Han… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Host-based threats such as Program Attack, Malware Implantation, and Advanced Persistent
Threats (APT), are commonly adopted by modern attackers. Recent studies propose …

[PDF][PDF] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.

D Han, Z Wang, W Chen, K Wang, R Yu, S Wang… - NDSS, 2023 - ndss-symposium.org
Concept drift is one of the most frustrating challenges for learning-based security
applications built on the closeworld assumption of identical distribution between training and …

A multidimensional chaotic image encryption algorithm based on the region of interest

Y Liu, J Zhang, D Han, P Wu, Y Sun… - Multimedia Tools and …, 2020 - Springer
Most image encryption algorithms encrypt the whole image, but only part of the data is
important in the image. In this paper, we propose a multidimensional chaotic image encryption …

Variational oracle guiding for reinforcement learning

D Han, T Kozuno, X Luo, ZY Chen, K Doya… - International …, 2021 - openreview.net
How to make intelligent decisions is a central problem in machine learning and artificial
intelligence. Despite recent successes of deep reinforcement learning (RL) in various decision …

[PDF][PDF] ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.

W Chen, Z Wang, D Han, C Duan, X Yin, J Yang, X Shi - NDSS, 2022 - researchgate.net
Securing inter-domain routing systems of the Internet from illegitimate prefix annoucements
has been a great concern for the researchers and network operators. After the failure of …

Recent advances in differentiation of isomers by ion mobility mass spectrometry

Q Wu, JY Wang, DQ Han, ZP Yao - TrAC Trends in Analytical Chemistry, 2020 - Elsevier
Differentiation of isomers is an important analytical task in many fields, eg, chemistry, biology,
pharmaceutical science, medicine, environmental science, food science. Ion mobility mass …