Weili Han

Orcid: 0000-0001-8663-436X

According to our database1, Weili Han authored at least 81 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Bitcoin Transaction Analyzing and Tracking Mechanism in Specified Network Zone.
J. Inf. Sci. Eng., March, 2024

Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization.
CoRR, 2024

BFTDiagnosis: An automated security testing framework with malicious behavior injection for BFT protocols.
Comput. Networks, 2024

Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering.
Proceedings of the ACM on Web Conference 2024, 2024

2023
Towards Understanding the fairness of differentially private margin classifiers.
World Wide Web (WWW), May, 2023

Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering.
CoRR, 2023

Improving Real-world Password Guessing Attacks via Bi-directional Transformers.
Proceedings of the 32nd USENIX Security Symposium, 2023

Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin.
ACM Trans. Web, 2022

#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing.
Comput. Secur., 2022

A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis.
Proceedings of the International Conference on Networking and Network Applications, 2022

pMPL: A Robust Multi-Party Learning Framework with a Privileged Party.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively.
IEEE Trans. Inf. Forensics Secur., 2021

A Smart Framework for Fine-Grained Microphone Acoustic Permission Management.
IEEE Trans. Dependable Secur. Comput., 2021

Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study.
Secur. Commun. Networks, 2021

Efficiently answering top-k frequent term queries in temporal-categorical range.
Inf. Sci., 2021

Privacy Compliance: Can Technology Come to the Rescue?
IEEE Secur. Priv., 2021

Temporal Networks Based Industry Identification for Bitcoin Users.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Digit Semantics based Optimization for Practical Password Cracking Tools.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
senDroid: Auditing Sensor Access in Android System-Wide.
IEEE Trans. Dependable Secur. Comput., 2020

Decentralized data access control over consortium blockchains.
Inf. Syst., 2020

SoK: Training Machine Learning Models over Multiple Sources with Privacy Preservation.
CoRR, 2020

Automated Enforcement of the Principle of Least Privilege over Data Source Access.
Proceedings of the 19th IEEE International Conference on Trust, 2020

BinDex: A Two-Layered Index for Fast and Robust Scans.
Proceedings of the 2020 International Conference on Management of Data, 2020

2019
An Explainable Password Strength Meter Addon via Textual Pattern Recognition.
Secur. Commun. Networks, 2019

Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019

FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things.
IEEE Access, 2019

2018
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis.
IEEE Trans. Dependable Secur. Comput., 2018

Invisible Mask: Practical Attacks on Face Recognition with Infrared.
CoRR, 2018

DESC: enabling secure data exchange based on smart contracts.
Sci. China Inf. Sci., 2018

2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017

Re-identification of Vehicular Location-Based Metadata.
EAI Endorsed Trans. Security Safety, 2017

Socialized policy administration.
Comput. Secur., 2017

Does #like4like indeed provoke more likes?
Proceedings of the International Conference on Web Intelligence, 2017

A Privacy Preserving Data Aggregation Scheme to Investigate Apps Installment in Massive Mobile Devices.
Proceedings of the 2017 International Conference on Identification, 2017

Cyberspace-Oriented Access Control: Model and Policies.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A highly linear voltage-to-time converter with variable conversion gain for time-based ADCs.
Proceedings of the 12th IEEE International Conference on ASIC, 2017

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT).
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords.
IEEE Trans. Inf. Forensics Secur., 2016

SCout: Prying Into Supply Chains via a Public Query Interface.
IEEE Syst. J., 2016

An Internet-of-Things solution for food safety and quality control: A pilot project in China.
J. Ind. Inf. Integr., 2016

Unique on the Road: Re-identification of Vehicular Location-Based Metadata.
Proceedings of the Security and Privacy in Communication Networks, 2016

An Empirical Study on User Access Control in Online Social Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Camera-Recognizable and Human-Invisible Labelling for Privacy Protection.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion.
Inf. Syst. Frontiers, 2015

The design of an electronic pedigree system for food safety.
Inf. Syst. Frontiers, 2015

Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

SPA: Inviting Your Friends to Help Set Android Apps.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
Collaborative Policy Administration.
IEEE Trans. Parallel Distributed Syst., 2014

Security of e-systems.
Secur. Commun. Networks, 2014

Dynamic combination of authentication factors based on quantified risk and benefit.
Secur. Commun. Networks, 2014

Permission based Android security: Issues and countermeasures.
Comput. Secur., 2014

A Large-Scale Empirical Analysis of Chinese Web Passwords.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Data driven quantitative trust model for the Internet of Agricultural Things.
Proceedings of the 4th International Conference on the Internet of Things, 2014

APP Vetting Based on the Consistency of Description and APK.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Efficient General Policy Decision by Using Mutable Variable Aware Cache.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Role mining algorithm evaluation and improvement in large volume android applications.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
Using automated individual white-list to protect web digital identities.
Expert Syst. Appl., 2012

A survey on policy languages in network and security management.
Comput. Networks, 2012

Using IoT Technologies to Resolve the Food Safety Problem - An Analysis Based on Chinese Food Standards.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Optimizing the storage of massive electronic pedigrees in HDFS.
Proceedings of the 3rd IEEE International Conference on the Internet of Things, 2012

2011
Sybil attack detection based on signature vectors in VANETs.
Int. J. Crit. Comput. Based Syst., 2011

Using a Smart Phone to Strengthen Password-Based Authentication.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Poster: using quantified risk and benefit to strengthen the security of information sharing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: collaborative policy administration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
A trusted decentralized access control framework for the client/server architecture.
J. Netw. Comput. Appl., 2010

Specify and enforce the policies of quantified risk adaptive access control.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
An Access Control Language for a General Provenance Model.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System.
Proceedings of the POLICY 2009, 2009

A Robust Detection of the Sybil Attack in Urban VANETs.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

2008
Process-context aware matchmaking for web service composition.
J. Netw. Comput. Appl., 2008

Anti-phishing based on automated individual white-list.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

2007
Integrated business-process driven design for service-oriented enterprise applications.
Int. J. Pervasive Comput. Commun., 2007

2005
Service-Oriented Business Solution Development Driven by Process Model.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Context-sensitive Access Control Model and Implementation.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2003
Network Self-Organizing Information Exploitation Model Based on GCA.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Network Behavior Analysis Based on a Computer Network Model.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2002
Research on an Event Specification for Event-Based Collaboration Support Software Architecture.
Proceedings of the Seventh International Conference on CSCW in Design, 2002

2001
An Event and Service Interacting Model and Event Detection Based on the Broker/Service Model.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001


  Loading...