Han Qiu (邱寒)
Han Qiu (邱寒)
Verified email at - Homepage
Cited by
Cited by
Adversarial Attacks against Network Intrusion Detection in IoT Systems
H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu
IEEE Internet of Things Journal 8 (13), 10327-10335, 2020
Secure health data sharing for medical cyber-physical systems for the healthcare 4.0
H Qiu, M Qiu, M Liu, G Memmi
IEEE journal of biomedical and health informatics 24 (9), 2499-2505, 2020
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction
H Qiu, Q Zheng, M Msahli, G Memmi, M Qiu, J Lu
IEEE Transactions on Intelligent Transportation Systems, 2020
Selective encryption on ECG data in body sensor network based on supervised machine learning
H Qiu, M Qiu, Z Lu
Information Fusion 55, 59-67, 2020
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham
The 16th ACM ASIA Conference on Computer and Communications Security (ACM …, 2021
A dynamic scalable blockchain based communication architecture for IoT
H Qiu, M Qiu, G Memmi, Z Ming, M Liu
Smart Blockchain: First International Conference, SmartBlock 2018, Tokyo …, 2018
A User-centric Data Protection Method for Cloud Storage based on Invertible DWT
H Qiu, H Noura, M Qiu, Z Ming, G Memmi
IEEE Transactions on Cloud Computing 9 (4), 1293 - 1304, 2021
Deep residual learning-based enhanced JPEG compression in the Internet of Things
H Qiu, Q Zheng, G Memmi, J Lu, M Qiu, B Thuraisingham
IEEE Transactions on Industrial Informatics 17 (3), 2124-2133, 2020
Secure V2X Communication Network based on Intelligent PKI and Edge Computing
H Qiu, M Qiu, L Ruqian
IEEE Network 34 (2), 172-178, 2020
All-Or-Nothing data protection for ubiquitous communication: challenges and perspectives
H Qiu, K Kapusta, Z Lu, M Qiu, G Memmi
Information Sciences 502, 434-445, 2019
An Efficient Key Distribution System for Data Fusion in V2X Heterogeneous Networks
H Qiu, M Qiu, L Zhihui, G Memmi
Information Fusion 50, 212-220, 2019
Review on image processing based adversarial example defenses in computer vision
M Qiu, H Qiu
2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020
A data augmentation-based defense method against adversarial attacks in neural networks
Y Zeng, H Qiu, G Memmi, M Qiu
Algorithms and Architectures for Parallel Processing: 20th International …, 2020
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models
S Guo, T Zhang, H Qiu, Y Zeng, T Xiang, Y Liu
International Joint Conference on Artificial Intelligence (IJCAI), 2021, 2021
Towards Secure and Efficient Deep Learning Inference in Dependable IoT Systems
H Qiu, Q Zheng, T Zhang, M Qiu, G Memmi, J Lu
IEEE Internet of Things Journal 8 (5), 3180-3188, 2020
An efficient preprocessing-based approach to mitigate advanced adversarial attacks
H Qiu, Y Zeng, Q Zheng, S Guo, T Zhang, H Li
IEEE Transactions on Computers, 2021
Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management
M Qiu, H Qiu, H Zhao, M Liu, B Thuraisingham
2020 3rd International Conference on Smart BlockChain (SmartBlock), 11-16, 2020
NFV Platforms: Taxonomy, Design Choices, and Future Challenges
T Zhang, H Qiu, L Linguaglossa, W Cerroni, P Giaccone
IEEE Transactions on Network and Service Management 18 (1), 30-48, 2021
Lightweight Selective Encryption for Social Data Protection based on EBCOT Coding
H Qiu, M Qiu, M Liu, Z Ming
IEEE Transactions on Computational Social Systems 7 (1), 205-214, 2020
Privacy-preserving Collaborative Learning with Automatic Transformation Search
W Gao, S Guo, T Zhang, H Qiu, Y Wen, Y Liu
IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021, 2021
The system can't perform the operation now. Try again later.
Articles 1–20