Han Qiu

Orcid: 0000-0003-2678-8070

Affiliations:
  • Tsinghua University, Beijing, China
  • Telecom-ParisTech, Paris, France (former, PhD 2015)


According to our database1, Han Qiu authored at least 102 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks.
IEEE Trans. Computers, March, 2024

Incremental Learning, Incremental Backdoor Threats.
IEEE Trans. Dependable Secur. Comput., 2024

COSMIC: Compress Satellite Images Efficiently via Diffusion Compensation.
CoRR, 2024

Course-Correction: Safety Alignment Using Synthetic Preferences.
CoRR, 2024

A Case for Application-Aware Space Radiation Tolerance in Orbital Computing.
CoRR, 2024

Backdooring Multimodal Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

You Only Query Once: An Efficient Label-Only Membership Inference Attack.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

UniGuard: A Unified Hardware-oriented Threat Detector for FPGA-based AI Accelerators.
Proceedings of the 34th International Conference on Field-Programmable Logic and Applications, 2024

Fingerprinting Image-to-Image Generative Adversarial Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Walking in Others' Shoes: How Perspective-Taking Guides Large Language Models in Reducing Toxicity and Bias.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Course-Correction: Safety Alignment Using Synthetic Preferences.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing: EMNLP 2024, 2024

Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Laser Shield: a Physical Defense with Polarizer against Laser Attacks on Autonomous Driving Systems.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

Message from the Program Chairs; CSCloud2024.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024

PhyScout: Detecting Sensor Spoofing Attacks via Spatio-temporal Consistency.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

VisionGuard: Secure and Robust Visual Perception of Autonomous Vehicles in Practice.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Persuasive Conversation.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
Automatic Transformation Search Against Deep Leakage From Gradients.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023

System Log Parsing: A Survey.
IEEE Trans. Knowl. Data Eng., August, 2023

DefQ: Defensive Quantization Against Inference Slow-Down Attack for Edge Computing.
IEEE Internet Things J., February, 2023

ADS-Lead: Lifelong Anomaly Detection in Autonomous Driving Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Wangiri Fraud: Pattern Analysis and Machine-Learning-Based Detection.
IEEE Internet Things J., 2023

Rethinking Adversarial Training with Neural Tangent Kernel.
CoRR, 2023

A Unified Hardware-based Threat Detector for AI Accelerators.
CoRR, 2023

Omnipotent Adversarial Training for Unknown Label-noisy and Imbalanced Datasets.
CoRR, 2023

Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Networking Perspective on Starlink's Self-Driving LEO Mega-Constellation.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing.
Proceedings of the IEEE INFOCOM 2023, 2023

Extracting Robust Models with Uncertain Examples.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

ATTA: Adversarial Task-transferable Attacks on Autonomous Driving Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

Computation and Data Efficient Backdoor Attacks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
Proceedings of the International Conference on Field Programmable Technology, 2023

MPass: Bypassing Learning-based Static Malware Detectors.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Public-attention-based Adversarial Attack on Traffic Sign Recognition.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud Data.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
jTrans: Jump-Aware Transformer for Binary Code Similarity.
CoRR, 2022

An Interpretable Federated Learning-based Network Intrusion Detection Framework.
CoRR, 2022

Interpreting AI for Networking: Where We Are and Where We Are Going.
IEEE Commun. Mag., 2022

Mitigating Targeted Bit-Flip Attacks via Data Augmentation: An Empirical Study.
Proceedings of the Knowledge Science, Engineering and Management, 2022

jTrans: jump-aware transformer for binary code similarity detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

BET: black-box efficient testing for convolutional neural networks.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Improved DC Estimation for JPEG Compression Via Convex Relaxation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Watermarking Pre-trained Encoders in Contrastive Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Improving Adversarial Robustness of 3D Point Cloud Classification Models.
Proceedings of the Computer Vision - ECCV 2022, 2022

Compressive sensing based asymmetric semantic image compression for resource-constrained IoT system.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

An MRC Framework for Semantic Role Labeling.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

Message from the Program Chairs IDS 2022.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

2021
Model Uncertainty Based Annotation Error Fixing for Web Attack Detection.
J. Signal Process. Syst., 2021

NFV Platforms: Taxonomy, Design Choices and Future Challenges.
IEEE Trans. Netw. Serv. Manag., 2021

Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

Deep Residual Learning-Based Enhanced JPEG Compression in the Internet of Things.
IEEE Trans. Ind. Informatics, 2021

A User-Centric Data Protection Method for Cloud Storage Based on Invertible DWT.
IEEE Trans. Cloud Comput., 2021

Novel denial-of-service attacks against cloud-based multi-robot systems.
Inf. Sci., 2021

Toward Secure and Efficient Deep Learning Inference in Dependable IoT Systems.
IEEE Internet Things J., 2021

Adversarial Attacks Against Network Intrusion Detection in IoT Systems.
IEEE Internet Things J., 2021

A General Framework for Defending Against Backdoor Attacks via Influence Graph.
CoRR, 2021

Interpreting Deep Learning Models in Natural Language Processing: A Review.
CoRR, 2021

Fingerprinting Multi-exit Deep Neural Network Models via Inference Time.
CoRR, 2021

Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated Learning.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Privacy-Preserving Collaborative Learning With Automatic Transformation Search.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0.
IEEE J. Biomed. Health Informatics, 2020

Lightweight Selective Encryption for Social Data Protection Based on EBCOT Coding.
IEEE Trans. Comput. Soc. Syst., 2020

Secure V2X Communication Network based on Intelligent PKI and Edge Computing.
IEEE Netw., 2020

HAPE: A programmable big knowledge graph platform.
Inf. Sci., 2020

Selective encryption on ECG data in body sensor network based on supervised machine learning.
Inf. Fusion, 2020

FenceBox: A Platform for Defeating Adversarial Examples with Data Augmentation Techniques.
CoRR, 2020

The Hidden Vulnerability of Watermarking for Deep Neural Networks.
CoRR, 2020

Mitigating Advanced Adversarial Attacks with More Advanced Gradient Obfuscation Techniques.
CoRR, 2020

Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques.
CoRR, 2020

Resisting Adversarial Examples via Wavelet Extension and Denoising.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Data Augmentation-Based Defense Method Against Adversarial Attacks in Neural Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Review on Image Processing Based Adversarial Example Defenses in Computer Vision.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

2019
All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives.
Inf. Sci., 2019

An efficient key distribution system for data fusion in V2X heterogeneous networks.
Inf. Fusion, 2019

DC coefficient recovery for JPEG images in ubiquitous communication systems.
Future Gener. Comput. Syst., 2019

TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction.
CoRR, 2019

Privacy-preserving Health Data Sharing for Medical Cyber-Physical Systems.
CoRR, 2019

DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

CECoR-Net: A Character-Level Neural Network Model for Web Attack Detection.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Secure Data Sharing with Fast Access Revocation through Untrusted Clouds.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Poster Abstract: Secure Data Sharing by Means of Fragmentation, Encryption, and Dispersion.
Proceedings of the IEEE INFOCOM 2019, 2019

Re-Think Monitoring Services for 5G Network: Challenges and Perspectives.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

Reinforcing Protection Against Chosen-Plaintext Attack Using Ciphertext Fragmentation in Multi-cloud Environments.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

Estimating Web Attack Detection via Model Uncertainty from Inaccurate Annotation.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

ChainIDE: A Cloud-Based Integrated Development Environment for Cross-Blockchain Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
An Efficient Data Protection Architecture Based on Fragmentation and Encryption.
CoRR, 2018

A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption Methods.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

A Dynamic Scalable Blockchain Based Communication Architecture for IoT.
Proceedings of the Smart Blockchain - First International Conference, 2018

2017
An efficient data protection architecture based on fragmentation and encryption. (Une architecture de protection des données efficace basée sur la fragmentation et le cryptage).
PhD thesis, 2017

An Efficient Secure Storage Scheme Based on Information Fragmentation.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2015
Fast Selective Encryption Methods for Bitmap Images.
Int. J. Multim. Data Eng. Manag., 2015

Data Protection: Combining Fragmentation, Encryption, and Dispersion, an Intermediary report.
CoRR, 2015

Data protection: Combining fragmentation, encryption, and dispersion.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

2014
Fast Selective Encryption Method for Bitmaps Based on GPU Acceleration.
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014


  Loading...