Jin Han

According to our database1, Jin Han authored at least 30 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Paths to Fast Barrier Synchronization on the Node.
Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing, 2019

Risk-aware multi-objective optimized virtual machine placement in the cloud.
Journal of Computer Security, 2018

A New Dependency Parsing Tree Generation Algorithm Based on the Semantic Dependency Relationship Between Words.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Augmenting Bug Localization with Part-of-Speech and Invocation.
International Journal of Software Engineering and Knowledge Engineering, 2017

Optimizing visual comfort and classification accuracy for a hybrid P300-SSVEP brain-computer interface.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017

A malware detection system based on intermediate language.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

The Application of Naive Bayes Classifier in Name Disambiguation.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Reducing Security Risks of Clouds Through Virtual Machine Placement.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

MCSMGS: Malware Classification Model Based on Deep Learning.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

A multi-scaled hierarchical structure model for multispectral image detection.
Sig. Proc.: Image Comm., 2016

Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet.
Security and Communication Networks, 2016

Disclosure Pattern of Self-Labeled People Living with HIV/AIDS on Chinese Social Networking Site: An Exploratory Study.
Cyberpsy., Behavior, and Soc. Networking, 2016

Leakage-resilient password entry: Challenges, design, and evaluation.
Computers & Security, 2015

Privacy-preserving proof of storage in large group.
Proceedings of the International Carnahan Conference on Security Technology, 2015

Hybrid additive watermarking and its decoders.
Telecommunication Systems, 2013

Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Computing, 2013

Study of a speech coding algorithm based on a contact conduction transmitter in a complicated water area.
Proceedings of the Conference on Underwater Networks and Systems, 2013

Comparing Mobile Privacy Protection through Cross-Platform Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A Significance-Driven Framework for Characterizing and Finding Evolving Patterns of News Networks.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.
Proceedings of the IEEE 10th International Conference on Trust, 2011

On Detection of Erratic Arguments.
Proceedings of the Security and Privacy in Communication Networks, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

A multi-user steganographic file system on untrusted shared storage.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2009

Dynamic Model and Numerical Simulation of Particle Motion in Rotation Flow Field of Centrifuge.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

An interactive web system for integrated three-dimensional customization.
Computers in Industry, 2006