Mengdie Huang (original) (raw)
About me
Welcome to my homepage. I am a Postdoctoral Research Associate in the Department of Computer Science at Purdue University, advised by Professor Elisa Bertino since July 2025. I also work closely with Professor Ninghui Li. From September 2022 to June 2025, I was a visiting Ph.D. student advised by Professor Bertino in the same department. I received my Ph.D. degree in Cyberspace Security from the School of Cyber Engineering at Xidian University in 2025, advised by Professor Xiaofeng Chen, and earned my M.S. degree from the Communication University of China in 2019.
My research interests lie in security and privacy in machine learning, networking, and multimedia. My recent work focuses on the robustness of deep neural networks and large vision-language models against adversarial attacks and distribution shifts. I have a solid foundation in deep learning, including adversarial training, certified defense, manifold learning, transfer learning, knowledge distillation, and contrastive learning. I have applied these techniques to a range of tasks in the image, text, and network traffic domains for prediction and generation.
If you are interested in my research or in need of any support, I am always open to discussion. You are welcome to reach out to me via email.
Under Review
- TriXfer: Triple-Cross Transfer Attack on Vision Transformer–Adapted Downstream Classifiers
- Dynamic Prototype Correction with Contrastive Rebalancing for Semi-Supervised Traffic Classification
Publications
- Research on Key Techniques for Adversarial Robustness of Deep Neural Networks
Mengdie Huang.
Dissertation for the Degree of Doctor of Philosophy, 2025
[dissertation] [slides] - CARD: Robustness-Preserving Transfer Learning for Network Intrusion Detection via Contrastive Adversarial Representation Distillation
Mengdie Huang, Yingjun Lin, Ninghui Li, Xiaofeng Chen, Elisa Bertino.
In IEEE Transactions on Dependable and Secure Computing (TDSC), 2025
[paper] [slides] [code] - Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems
Mengdie Huang, Yingjun Lin, Xiaofeng Chen, Elisa Bertino.
In ACM Transactions on Privacy and Security (TOPS), 2025
[paper] [slides] [code] - MARS: Robustness Certification for Deep Network Intrusion Detectors via Multi-Order Adaptive Randomized Smoothing
Mengdie Huang, Yingjun Lin, Xiaofeng Chen, Elisa Bertino.
In Proceedings of the 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2024
Best Paper Award
[paper] [slides] [code] - ARIoTEDef: Adversarially Robust IoT Early Defense System based on Self-Evolution against Multi-step Attacks
Mengdie Huang, Hyunwoo Lee, Ashish Kundu, Xiaofeng Chen, Anand Mudgerikar, Ninghui Li, Elisa Bertino.
In ACM Transactions on Internet of Things (TIOT), 2024
[paper] [slides] [code] - A Pro-Active Defense Framework for IoT Systems
Elisa Bertino, Hyunwoo Lee, Mengdie Huang, Charalampos Katsis, Zilin Shen, Bruno Ribeiro, Daniel De Mello, Ashish Kundu
In Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing (CIC), 2023
[paper] [slides] [code] - Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup
Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo.
In Proceedings of the 18th ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2023
[paper] [slides] [code] - GAME: Generative-based Adaptive Model Extraction Attack
Yi Xie, Mengdie Huang, Xiaoyu Zhang, Changyu Dong, Willy Susilo, Xiaofeng Chen.
In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS), 2022
[paper] [slides] [code] - Sparse Selective Encryption for HEVC 4K Video Using Spatial Error Spread
Mengdie Huang, Cheng Yang, Hao Li, Jian Shen.
In Journal of Internet Technology (JIT), 2019
[paper] [slides] [code] - Selective Encryption of H.264/AVC based on Block Weight Model
Mengdie Huang, Cheng Yang, Yuan Zhang.
In Proceedings of the 18th IEEE International Conference on Communication Technology (ICCT), 2018
[paper] [paper-ChineseVersion] [slides] [code] - An Effective Scheme for Provable Data Possessionl
Shanyue Bu, Mengdie Huang, Kun Yu.
In Proceedings of the International Conference on Intelligent Control and Computer Application (ICCA), 2016
[paper] [slides] [code]
Manuscript
- Membership Inference Attack against Large Vision-Language Model
- Adaptive Robust Defense on Large Vision-Language Model
- Graph-Diffusion and Feature-Recombination Enhanced Self-Attention for Network Traffic Classification
- EntroDelta: Training-Free Lossy-to-Lossless Compression for Fine-tuning Models
Projects
- Detection of GenAI Generated Malware Variants and Sandbox Evasion using GenAI
March 2023 - March 2024, Member, Purdue University
Sponsor: Cisco Systems, Inc. - Pro-Active Attack Management for Edge Computing Security
Nov 2022 - Dec 2023, Member, Purdue University
Sponsor: Cisco Systems, Inc. - Development and Application Demonstration of Cloud Aggregation System based on Streaming Media Technology
Sep 2017 - July 2018, Member, Communication University of China
Sponsor: National Science and Technology Support Program - Universal and Efficient 4K Video Protection Technology Supporting Coding Standard Extension
Jun 2018 - Jun 2019, Leader, Communication University of China
Sponsor: National College Students Innovation and Entrepreneurship Training Program - Data Possession Proof in Cloud Computing Environment
Jun 2014 - Jun 2016, Leader, Huaiyin Institute of Technology
Sponsor: Jiangsu College Students Innovation and Entrepreneurship Training Program
Employment
- PostDoctoral Research Associate, West Lafayette, US, July 2025 - Present
Advised by Professor Elisa Bertino and Professor Ninghui Li
Department of Computer Science, Purdue University - Visiting Scholar, West Lafayette, US, Sep 2022 - June 2025
Advised by Professor Elisa Bertino
Department of Computer Science, Purdue University - Research Assistant, Xi'an, China, Sep 2019 - Aug 2022
For Professor Xiaofeng Chen
School of Cyber Engineering, Xidian University - Teaching Assistant , Xi'an, China, Jul 2021 - Jul 2022
For Professor Miroslaw Kutylowski
Distributed Computing
School of Cyber Engineering, Xidian University
Department of Foundations of Computer Science, Wroclaw University of Technology - Teaching Assistant , Xi'an, China, Sep 2020 - Jan 2021
For Professor Jianfeng Wang
Probability Theory and Mathematical Statistics
School of Cyber Engineering, Xidian University - Internship, Beijing, China, May 2019 - Jul 2019
Academy of Broadcasting Science, National Radio and Television Administration - Internship, Beijing, China, Aug 2018 - Sep 2018
Commercialization Department, ByteDance Ltd
Education
- Purdue University, West Lafayette, US, Sep 2022 - June 2025
Visiting Ph.D student in Computer Science
Advisor: Professor Elisa Bertino - Xidian University, Xi'an, China, Sep 2019 - June 2025
Ph.D student in Cyberspace Security
Advisor: Professor Xiaofeng Chen - Communication University of China, Beijing, China, Sep 2017 - June 2019
Master in Electronics and Communication Engineering
Advisor: Professor Cheng Yang
Bachelor in Radio and Television Editing - Huaiyin Institute of Technology, Huai'an, China, Sep 2013 - June 2017
Bachelor in Communication Engineering
Advisor: Professor Ronglin Hu
Services
- Conference Reviewer
ACSAC (Annual Computer Security Applications Conference): 2024
ESORICS (European Symposium on Research in Computer Security): 2025, 2024, 2021
CODASPY (ACM Conference on Data and Application Security and Privacy): 2024, 2024, 2023
ML4CS (International Conference on Machine Learning for Cyber Security): 2022
ISC (Information Security Conference): 2022
ICICS (International Conference on Information and Communications Security): 2021
DSPP (International Conference on Data Security and Privacy Protection):2025, 2024 - Conference SubReviewer
USENIX Security (USENIX Security Symposium): 2026
SP (IEEE Symposium on Security and Privacy): 2025, 2026
CCS (ACM Conference on Computer and Communications Security): 2025 - Artifact Evaluation Committee Member
NDSS (Network and Distributed System Security Symposium): 2026
CCS (ACM Conference on Computer and Communications Security): 2025
Others
- Hometown
I am from Nanjing, Jiangsu Province, which is a city in eastern China and the ancient capital of six dynasties. - Sport
My favorite sport at the moment is swimming. I am familiar with the breaststroke and am learning freestyle. I also practiced badminton, aerobics and Latin dance. - Music
I like R&B music. The artists I often listen to are David Tao, Jay Chou, and Leehom Wang. I'm listening to KPOP (GD) music recently. - Food
My favorite food is taro and coconut.