Han Qiu (邱寒)
Han Qiu (邱寒)
Verified email at - Homepage
Cited by
Cited by
Adversarial Attacks against Network Intrusion Detection in IoT Systems
H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu
IEEE Internet of Things Journal 8 (13), 10327-10335, 2020
Secure health data sharing for medical cyber-physical systems for the healthcare 4.0
H Qiu, M Qiu, M Liu, G Memmi
IEEE journal of biomedical and health informatics 24 (9), 2499-2505, 2020
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham
The 16th ACM ASIA Conference on Computer and Communications Security (ACM …, 2021
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction
H Qiu, Q Zheng, M Msahli, G Memmi, M Qiu, J Lu
IEEE Transactions on Intelligent Transportation Systems, 2020
Selective encryption on ECG data in body sensor network based on supervised machine learning
H Qiu, M Qiu, Z Lu
Information Fusion 55, 59-67, 2020
Deep residual learning-based enhanced JPEG compression in the Internet of Things
H Qiu, Q Zheng, G Memmi, J Lu, M Qiu, B Thuraisingham
IEEE Transactions on Industrial Informatics 17 (3), 2124-2133, 2020
A dynamic scalable blockchain based communication architecture for IoT
H Qiu, M Qiu, G Memmi, Z Ming, M Liu
Smart Blockchain: First International Conference, SmartBlock 2018, Tokyo …, 2018
Secure V2X Communication Network based on Intelligent PKI and Edge Computing
H Qiu, M Qiu, L Ruqian
IEEE Network 34 (2), 172-178, 2020
A User-centric Data Protection Method for Cloud Storage based on Invertible DWT
H Qiu, H Noura, M Qiu, Z Ming, G Memmi
IEEE Transactions on Cloud Computing 9 (4), 1293 - 1304, 2021
Review on image processing based adversarial example defenses in computer vision
M Qiu, H Qiu
2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020
Jtrans: Jump-aware transformer for binary code similarity detection
H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu, J Zhuge, C Zhang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
A data augmentation-based defense method against adversarial attacks in neural networks
Y Zeng, H Qiu, G Memmi, M Qiu
Algorithms and Architectures for Parallel Processing: 20th International …, 2020
All-Or-Nothing data protection for ubiquitous communication: challenges and perspectives
H Qiu, K Kapusta, Z Lu, M Qiu, G Memmi
Information Sciences 502, 434-445, 2019
An Efficient Key Distribution System for Data Fusion in V2X Heterogeneous Networks
H Qiu, M Qiu, L Zhihui, G Memmi
Information Fusion 50, 212-220, 2019
Towards Secure and Efficient Deep Learning Inference in Dependable IoT Systems
H Qiu, Q Zheng, T Zhang, M Qiu, G Memmi, J Lu
IEEE Internet of Things Journal 8 (5), 3180-3188, 2020
Interpreting Deep Learning Models in Natural Language Processing: A Review
X Sun, D Yang, X Li, T Zhang, Y Meng, H Qiu, G Wang, E Hovy, J Li
arXiv preprint arXiv:2110.10470, 2021
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models
S Guo, T Zhang, H Qiu, Y Zeng, T Xiang, Y Liu
International Joint Conference on Artificial Intelligence (IJCAI), 2021, 2021
Privacy-preserving Collaborative Learning with Automatic Transformation Search
W Gao, S Guo, T Zhang, H Qiu, Y Wen, Y Liu
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021, 2021
Secure data sharing through Untrusted clouds with blockchain-enhanced key management
M Qiu, H Qiu, H Zhao, M Liu, B Thuraisingham
2020 3rd International Conference on Smart BlockChain (SmartBlock), 11-16, 2020
An efficient preprocessing-based approach to mitigate advanced adversarial attacks
H Qiu, Y Zeng, Q Zheng, S Guo, T Zhang, H Li
IEEE Transactions on Computers, 2021
The system can't perform the operation now. Try again later.
Articles 1–20