Hongmu Han

Orcid: 0000-0002-6909-5242

According to our database1, Hongmu Han authored at least 24 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-Based Traceable Multi-Level Revocation Attribute-Based Encryption.
IEEE Access, 2024

Decentralized Trust Management and Incentive Mechanisms for Secure Information Sharing in VANET.
IEEE Access, 2024

Enhancing IoT Security and Efficiency: A Blockchain-Assisted Multi-Keyword Searchable Encryption Scheme.
IEEE Access, 2024

MTESformer: Multi-Scale Temporal and Enhance Spatial Transformer for Traffic Flow Prediction.
IEEE Access, 2024

2023
An Efficient Code-Embedding-Based Vulnerability Detection Model for Ethereum Smart Contracts.
Int. J. Data Warehous. Min., January, 2023

GPChain: Optimizing Cross-Shard Transactions and Load Imbalance in Sharded Blockchain Networks.
Proceedings of the Internet of Things, 2023

LMQF: Hyperledger Fabric Concurrent Transaction Conflict Solution Based on Distributed Lock and Message Queue.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

W2V-SA: A Deep Neural Network-based Approach to Smart Contract Vulnerability Detection.
Proceedings of the 7th International Conference on Computational Linguistics and Intelligent Systems. Volume I: Machine Learning Workshop, 2023

2022
DC-Gossip: An Enhanced Broadcast Protocol in Hyperledger Fabric Based on Density Clustering.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

BMTAC: a decentralized, auditable, time-limited, multi-authority attribute access control scheme in blockchain environment.
Proceedings of the IEEE Smartworld, 2022

MCRaft: synergistic collaboration of multi leaders for IoT cluster stability optimization.
Proceedings of the IEEE Smartworld, 2022

Incentive-compatible Intelligence Collaboration Analysis Framework Based on Blockchain and Evolutionary Game.
Proceedings of the IEEE Smartworld, 2022

2021
Detecting Privacy Leaks in Android Hybrid Applications Based on Dynamic Taint Tracking.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
Improving Restore Performance of Packed Datasets in Deduplication Systems via Reducing Persistent Fragmented Chunks.
IEEE Trans. Parallel Distributed Syst., 2020

A weighted recommendation algorithm based on multiview clustering of user.
J. Intell. Fuzzy Syst., 2020

2019
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method.
Secur. Commun. Networks, 2019

面向Android第三方库的共谋行为检测 (Collusion Behavior Detection Towards Android Third-party Libraries).
计算机科学, 2019

2018
Identify and Inspect Libraries in Android Applications.
Wirel. Pers. Commun., 2018

2017
Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis Approach.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Practical Compartmentation Approach for the Android App Coexistence.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

2016
Identifying malicious Android apps using permissions and system events.
Int. J. Embed. Syst., 2016

2015
Context Awareness through Reasoning on Private Analysis for Android Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Adaptive Multi-keyword Ranked Search Over Encrypted Cloud Data.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2007
Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...