Weili Han
Orcid: 0000-0001-8663-436X
According to our database1,
Weili Han
authored at least 81 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Inf. Sci. Eng., March, 2024
Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization.
CoRR, 2024
BFTDiagnosis: An automated security testing framework with malicious behavior injection for BFT protocols.
Comput. Networks, 2024
Proceedings of the ACM on Web Conference 2024, 2024
2023
World Wide Web (WWW), May, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
ACM Trans. Web, 2022
#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing.
Comput. Secur., 2022
A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis.
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Secur. Commun. Networks, 2021
Inf. Sci., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
SoK: Training Machine Learning Models over Multiple Sources with Privacy Preservation.
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 2020 International Conference on Management of Data, 2020
2019
Secur. Commun. Networks, 2019
Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019
FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things.
IEEE Access, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Sci. China Inf. Sci., 2018
2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017
EAI Endorsed Trans. Security Safety, 2017
Proceedings of the International Conference on Web Intelligence, 2017
A Privacy Preserving Data Aggregation Scheme to Investigate Apps Installment in Massive Mobile Devices.
Proceedings of the 2017 International Conference on Identification, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
A highly linear voltage-to-time converter with variable conversion gain for time-based ADCs.
Proceedings of the 12th IEEE International Conference on ASIC, 2017
Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT).
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
An Internet-of-Things solution for food safety and quality control: A pilot project in China.
J. Ind. Inf. Integr., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion.
Inf. Syst. Frontiers, 2015
Inf. Syst. Frontiers, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
2014
Secur. Commun. Networks, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 4th International Conference on the Internet of Things, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
2013
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Role mining algorithm evaluation and improvement in large volume android applications.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
2012
Expert Syst. Appl., 2012
Comput. Networks, 2012
Using IoT Technologies to Resolve the Food Safety Problem - An Analysis Based on Chinese Food Standards.
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Proceedings of the 3rd IEEE International Conference on the Internet of Things, 2012
2011
Int. J. Crit. Comput. Based Syst., 2011
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Poster: using quantified risk and benefit to strengthen the security of information sharing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
J. Netw. Comput. Appl., 2010
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010
2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System.
Proceedings of the POLICY 2009, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
2008
J. Netw. Comput. Appl., 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
2007
Integrated business-process driven design for service-oriented enterprise applications.
Int. J. Pervasive Comput. Commun., 2007
2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
2002
Research on an Event Specification for Event-Based Collaboration Support Software Architecture.
Proceedings of the Seventh International Conference on CSCW in Design, 2002
2001
An Event and Service Interacting Model and Event Detection Based on the Broker/Service Model.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001