Han Qiu
Orcid: 0000-0003-2678-8070Affiliations:
- Tsinghua University, Beijing, China
- Telecom-ParisTech, Paris, France (former, PhD 2015)
According to our database1,
Han Qiu
authored at least 102 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on qiuhan.info
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2024
IEEE Trans. Computers, March, 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
UniGuard: A Unified Hardware-oriented Threat Detector for FPGA-based AI Accelerators.
Proceedings of the 34th International Conference on Field-Programmable Logic and Applications, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Walking in Others' Shoes: How Perspective-Taking Guides Large Language Models in Reducing Toxicity and Bias.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing: EMNLP 2024, 2024
Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Laser Shield: a Physical Defense with Polarizer against Laser Attacks on Autonomous Driving Systems.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Persuasive Conversation.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2023
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023
IEEE Internet Things J., February, 2023
IEEE Trans. Intell. Transp. Syst., January, 2023
IEEE Internet Things J., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
Proceedings of the International Conference on Field Programmable Technology, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud Data.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
2022
CoRR, 2022
IEEE Commun. Mag., 2022
Proceedings of the Knowledge Science, Engineering and Management, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Compressive sensing based asymmetric semantic image compression for resource-constrained IoT system.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the 29th International Conference on Computational Linguistics, 2022
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022
2021
J. Signal Process. Syst., 2021
IEEE Trans. Netw. Serv. Manag., 2021
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Cloud Comput., 2021
Inf. Sci., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
CoRR, 2021
CoRR, 2021
Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated Learning.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0.
IEEE J. Biomed. Health Informatics, 2020
IEEE Trans. Comput. Soc. Syst., 2020
IEEE Netw., 2020
Selective encryption on ECG data in body sensor network based on supervised machine learning.
Inf. Fusion, 2020
FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques.
CoRR, 2020
Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques.
CoRR, 2020
Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques.
CoRR, 2020
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020
Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
A Data Augmentation-Based Defense Method Against Adversarial Attacks in Neural Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
2019
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives.
Inf. Sci., 2019
Inf. Fusion, 2019
Future Gener. Comput. Syst., 2019
TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction.
CoRR, 2019
CoRR, 2019
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019
Proceedings of the IEEE International Conference on Smart Cloud, 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion.
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
ChainIDE: A Cloud-Based Integrated Development Environment for Cross-Blockchain Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
CoRR, 2018
Proceedings of the Third International Conference on Security of Smart Cities, 2018
Proceedings of the Smart Blockchain - First International Conference, 2018
2017
An efficient data protection architecture based on fragmentation and encryption. (Une architecture de protection des données efficace basée sur la fragmentation et le cryptage).
PhD thesis, 2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
2015
Int. J. Multim. Data Eng. Manag., 2015
Data Protection: Combining Fragmentation, Encryption, and Dispersion, an Intermediary report.
CoRR, 2015
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015
2014
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014