default search action
Weili Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Jitao Wang, Bo Zhang, Kai Wang, Yuzhou Wang, Weili Han:
BFTDiagnosis: An automated security testing framework with malicious behavior injection for BFT protocols. Comput. Networks 249: 110404 (2024) - [j34]Dapeng Huang, Chen Chen, Haowei Luo, Kai Wang, Weili Han:
A Bitcoin Transaction Analyzing and Tracking Mechanism in Specified Network Zone. J. Inf. Sci. Eng. 40(2): 375-396 (2024) - [c42]Kai Wang, Yakun Cheng, Michael Wen Tong, Zhenghao Niu, Jun Pang, Weili Han:
Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering. WWW 2024: 1880-1891 - [i6]Guopeng Lin, Weili Han, Wenqiang Ruan, Ruisheng Zhou, Lushan Song, Bingshuai Li, Yunfeng Shao:
Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization. CoRR abs/2406.07948 (2024) - 2023
- [j33]Wenqiang Ruan, Mingxin Xu, Yinan Jing, Weili Han:
Towards Understanding the fairness of differentially private margin classifiers. World Wide Web (WWW) 26(3): 1201-1221 (2023) - [c41]Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han:
Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. SP 2023: 1926-1943 - [c40]Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han:
Improving Real-world Password Guessing Attacks via Bi-directional Transformers. USENIX Security Symposium 2023: 1001-1018 - [i5]Kai Wang, Maike Tong, Changhao Wu, Jun Pang, Chen Chen, Xiapu Luo, Weili Han:
Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering. CoRR abs/2303.01012 (2023) - 2022
- [j32]Chuanwang Wang, Junjie Zhang, Ming Xu, Haodong Zhang, Weili Han:
#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing. Comput. Secur. 121: 102848 (2022) - [j31]Kai Wang, Jun Pang, Dingjie Chen, Yu Zhao, Dapeng Huang, Chen Chen, Weili Han:
A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin. ACM Trans. Web 16(2): 7:1-7:29 (2022) - [c39]Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han:
pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. CCS 2022: 2689-2703 - [c38]Dapeng Huang, Haoran Chen, Kai Wang, Chen Chen, Weili Han:
A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis. NaNA 2022: 176-183 - [i4]Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han:
Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy. CoRR abs/2208.08662 (2022) - [i3]Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han:
pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. CoRR abs/2210.00486 (2022) - 2021
- [j30]Wenqiang Ruan, Mingxin Xu, Haoyang Jia, Zhenhuan Wu, Lushan Song, Weili Han:
Privacy Compliance: Can Technology Come to the Rescue? IEEE Secur. Priv. 19(4): 37-43 (2021) - [j29]Zhenying He, Lu Wang, Chang Lu, Yinan Jing, Kai Zhang, Weili Han, Jianxin Li, Chengfei Liu, X. Sean Wang:
Efficiently answering top-k frequent term queries in temporal-categorical range. Inf. Sci. 574: 238-258 (2021) - [j28]Ruixin Shi, Yongbin Zhou, Yong Li, Weili Han:
Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. Secur. Commun. Networks 2021: 5563884:1-5563884:16 (2021) - [j27]Weili Han, Chang Cao, Zhe Zhou, Shize Chen, Lingqi Huang, X. Sean Wang:
A Smart Framework for Fine-Grained Microphone Acoustic Permission Management. IEEE Trans. Dependable Secur. Comput. 18(6): 2705-2718 (2021) - [j26]Weili Han, Ming Xu, Junjie Zhang, Chuanwang Wang, Kai Zhang, X. Sean Wang:
TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively. IEEE Trans. Inf. Forensics Secur. 16: 451-465 (2021) - [c37]Haodong Zhang, Chuanwang Wang, Wenqiang Ruan, Junjie Zhang, Ming Xu, Weili Han:
Digit Semantics based Optimization for Practical Password Cracking Tools. ACSAC 2021: 513-527 - [c36]Ming Xu, Chuanwang Wang, Jitao Yu, Junjie Zhang, Kai Zhang, Weili Han:
Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations. CCS 2021: 5-20 - [c35]Weili Han, Dingjie Chen, Jun Pang, Kai Wang, Chen Chen, Dapeng Huang, Zhijie Fan:
Temporal Networks Based Industry Identification for Bitcoin Users. WASA (1) 2021: 108-120 - 2020
- [j25]Yaoliang Chen, Shi Chen, Jiao Liang, Lance Feagan, Weili Han, Sheng Huang, X. Sean Wang:
Decentralized data access control over consortium blockchains. Inf. Syst. 94: 101590 (2020) - [j24]Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang:
senDroid: Auditing Sensor Access in Android System-Wide. IEEE Trans. Dependable Secur. Comput. 17(2): 407-421 (2020) - [c34]Linwei Li, Kai Zhang, Jiading Guo, Wen He, Zhenying He, Yinan Jing, Weili Han, X. Sean Wang:
BinDex: A Two-Layered Index for Fast and Robust Scans. SIGMOD Conference 2020: 909-923 - [c33]Haoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han:
Automated Enforcement of the Principle of Least Privilege over Data Source Access. TrustCom 2020: 510-517 - [i2]Lushan Song, Haoqi Wu, Wenqiang Ruan, Weili Han:
SoK: Training Machine Learning Models over Multiple Sources with Privacy Preservation. CoRR abs/2012.03386 (2020)
2010 – 2019
- 2019
- [j23]Weidong Fang, Ming Xu, Chunsheng Zhu, Weili Han, Wuxiong Zhang, Joel J. P. C. Rodrigues:
FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things. IEEE Access 7: 13476-13485 (2019) - [j22]Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo, Jinjun Chen:
Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies. IEEE Internet Things J. 6(2): 1471-1483 (2019) - [j21]Ming Xu, Weili Han:
An Explainable Password Strength Meter Addon via Textual Pattern Recognition. Secur. Commun. Networks 2019: 5184643:1-5184643:10 (2019) - 2018
- [j20]Jiao Liang, Weili Han, Zeqing Guo, Yaoliang Chen, Chang Cao, Xiaoyang Sean Wang, Fenghua Li:
DESC: enabling secure data exchange based on smart contracts. Sci. China Inf. Sci. 61(4): 049102:1-049102:3 (2018) - [j19]Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu:
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. IEEE Trans. Dependable Secur. Comput. 15(2): 309-320 (2018) - [i1]Zhe Zhou, Di Tang, Xiaofeng Wang, Weili Han, Xiangyu Liu, Kehuan Zhang:
Invisible Mask: Practical Attacks on Face Recognition with Infrared. CoRR abs/1803.04683 (2018) - 2017
- [j18]Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang:
Socialized policy administration. Comput. Secur. 67: 232-243 (2017) - [j17]Zheng Tan, Cheng Wang, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han:
Re-identification of Vehicular Location-Based Metadata. EAI Endorsed Trans. Security Safety 4(11): e1 (2017) - [j16]Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem A. Beyah:
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords. IEEE Trans. Dependable Secur. Comput. 14(5): 550-564 (2017) - [c32]Tanveer A. Zia, Peng Liu, Weili Han:
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT). ARES 2017: 55:1-55:7 - [c31]Yan Ye, Weili Han, Haiyue Yan, Fujiang Lin:
A highly linear voltage-to-time converter with variable conversion gain for time-based ADCs. ASICON 2017: 44-47 - [c30]Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo:
Cyberspace-Oriented Access Control: Model and Policies. DSC 2017: 261-266 - [c29]Tianhao Mao, Chang Cao, Xiangru Peng, Weili Han:
A Privacy Preserving Data Aggregation Scheme to Investigate Apps Installment in Massive Mobile Devices. IIKI 2017: 331-340 - [c28]Yang Zhang, Minyue Ni, Weili Han, Jun Pang:
Does #like4like indeed provoke more likes? WI 2017: 179-186 - 2016
- [j15]Yi Liu, Weili Han, Yin Zhang, Lulu Li, Junyu Wang, Lirong Zheng:
An Internet-of-Things solution for food safety and quality control: A pilot project in China. J. Ind. Inf. Integr. 3: 1-7 (2016) - [j14]Liangxing Liu, Weili Han, Tao Zhou, Xinyi Zhang:
SCout: Prying Into Supply Chains via a Public Query Interface. IEEE Syst. J. 10(1): 179-188 (2016) - [j13]Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu:
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords. IEEE Trans. Inf. Forensics Secur. 11(2): 258-272 (2016) - [c27]Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen:
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. AsiaCCS 2016: 747-758 - [c26]Dong Li, Danhao Guo, Weili Han, Hao Chen, Chang Cao, Xiaoyang Sean Wang:
Camera-Recognizable and Human-Invisible Labelling for Privacy Protection. MSN 2016: 365-369 - [c25]Minyue Ni, Yang Zhang, Weili Han, Jun Pang:
An Empirical Study on User Access Control in Online Social Networks. SACMAT 2016: 13-23 - [c24]Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang:
Unique on the Road: Re-identification of Vehicular Location-Based Metadata. SecureComm 2016: 496-513 - 2015
- [j12]Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang, Li-Rong Zheng:
The design of an electronic pedigree system for food safety. Inf. Syst. Frontiers 17(2): 275-287 (2015) - [j11]Zhibo Pang, Qiang Chen, Weili Han, Li-Rong Zheng:
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion. Inf. Syst. Frontiers 17(2): 289-319 (2015) - [c23]Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino:
Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking. SACMAT 2015: 135-145 - [c22]Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni:
SPA: Inviting Your Friends to Help Set Android Apps. SACMAT 2015: 221-231 - 2014
- [j10]Zheran Fang, Weili Han, Yingjiu Li:
Permission based Android security: Issues and countermeasures. Comput. Secur. 43: 205-218 (2014) - [j9]Mohammad S. Obaidat, Petros Nicopolitidis, Weili Han:
Security of e-systems. Secur. Commun. Networks 7(2): 322-324 (2014) - [j8]Weili Han, Chen Sun, Chenguang Shen, Chang Lei, Sean Shen:
Dynamic combination of authentication factors based on quantified risk and benefit. Secur. Commun. Networks 7(2): 385-396 (2014) - [j7]Weili Han, Zheran Fang, Laurence Tianruo Yang, Gang Pan, Zhaohui Wu:
Collaborative Policy Administration. IEEE Trans. Parallel Distributed Syst. 25(2): 498-507 (2014) - [c21]Weili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang:
APP Vetting Based on the Consistency of Description and APK. INTRUST 2014: 259-277 - [c20]Weili Han, Yun Gu, Yin Zhang, Li-Rong Zheng:
Data driven quantitative trust model for the Internet of Agricultural Things. IOT 2014: 31-36 - [c19]Zhigong Li, Weili Han, Wenyuan Xu:
A Large-Scale Empirical Analysis of Chinese Web Passwords. USENIX Security Symposium 2014: 559-574 - 2013
- [c18]Xinyi Zhang, Weili Han, Zheran Fang, Yuliang Yin, Hossen Asiful Mustafa:
Role mining algorithm evaluation and improvement in large volume android applications. SESP@CCS Asia 2013: 19-26 - [c17]Liangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang:
Efficient General Policy Decision by Using Mutable Variable Aware Cache. COMPSAC 2013: 359-368 - 2012
- [j6]Weili Han, Chang Lei:
A survey on policy languages in network and security management. Comput. Networks 56(1): 477-489 (2012) - [j5]Weili Han, Ye Cao, Elisa Bertino, Jianming Yong:
Using automated individual white-list to protect web digital identities. Expert Syst. Appl. 39(15): 11861-11869 (2012) - [c16]Yin Zhang, Weili Han, Wei Wang, Chang Lei:
Optimizing the storage of massive electronic pedigrees in HDFS. IOT 2012: 68-75 - [c15]Yun Gu, Weili Han, Li-Rong Zheng, Bo Jin:
Using IoT Technologies to Resolve the Food Safety Problem - An Analysis Based on Chinese Food Standards. WISM 2012: 380-392 - 2011
- [j4]Chen Chen, Weili Han, Xin Wang:
Sybil attack detection based on signature vectors in VANETs. Int. J. Crit. Comput. Based Syst. 2(1): 25-37 (2011) - [c14]Weili Han, Zheran Fang, Weifeng Chen, Wenyuan Xu, Chang Lei:
Poster: collaborative policy administration. CCS 2011: 777-780 - [c13]Weili Han, Chenguang Shen, Yuliang Yin, Yun Gu, Chen Chen:
Poster: using quantified risk and benefit to strengthen the security of information sharing. CCS 2011: 781-784 - [c12]Weili Han, Ye Cao, Chang Lei:
Using a Smart Phone to Strengthen Password-Based Authentication. iThings/CPSCom 2011: 372-379 - 2010
- [j3]Weili Han, Min Xu, Weidong Zhao, Guofu Li:
A trusted decentralized access control framework for the client/server architecture. J. Netw. Comput. Appl. 33(2): 76-83 (2010) - [c11]Chen Chen, Weili Han, Jianming Yong:
Specify and enforce the policies of quantified risk adaptive access control. CSCWD 2010: 110-115
2000 – 2009
- 2009
- [c10]Chen Chen, Xin Wang, Weili Han, Binyu Zang:
A Robust Detection of the Sybil Attack in Urban VANETs. ICDCS Workshops 2009: 270-276 - [c9]Weili Han, Qun Ni, Hong Chen:
Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System. POLICY 2009: 45-52 - [c8]Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han:
An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 - 2008
- [j2]Weili Han, Xingdong Shi, Ronghua Chen:
Process-context aware matchmaking for web service composition. J. Netw. Comput. Appl. 31(4): 559-576 (2008) - [c7]Ye Cao, Weili Han, Yueran Le:
Anti-phishing based on automated individual white-list. Digital Identity Management 2008: 51-60 - 2007
- [j1]Xingdong Shi, Weili Han, Yinsheng Li, Ying Huang:
Integrated business-process driven design for service-oriented enterprise applications. Int. J. Pervasive Comput. Commun. 3(2): 175-189 (2007) - 2005
- [c6]Weili Han, Junjing Zhang, Xiaobo Yao:
Context-sensitive Access Control Model and Implementation. CIT 2005: 757-763 - [c5]Xingdong Shi, Weili Han, Yinsheng Li, Ying Huang:
Service-Oriented Business Solution Development Driven by Process Model. CIT 2005: 1086-1092 - 2003
- [c4]Yujun Liu, Shuai Dianxun, Weili Han:
Network Self-Organizing Information Exploitation Model Based on GCA. GCC (2) 2003: 327-334 - [c3]Weili Han, Shuai Dianxun, Yujun Liu:
Network Behavior Analysis Based on a Computer Network Model. GCC (2) 2003: 418-421 - 2002
- [c2]Ping-Peng Yuan, Gang Chen, Jinxiang Dong, Weili Han:
Research on an Event Specification for Event-Based Collaboration Support Software Architecture. CSCWD 2002: 99-104 - 2001
- [c1]Ping-Peng Yuan, Gang Chen, Jinxiang Dong, Weili Han:
An Event and Service Interacting Model and Event Detection Based on the Broker/Service Model. CSCWD 2001: 20-24
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint