Jin Han

According to our database1, Jin Han authored at least 28 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Risk-aware multi-objective optimized virtual machine placement in the cloud.
Journal of Computer Security, 2018

A New Dependency Parsing Tree Generation Algorithm Based on the Semantic Dependency Relationship Between Words.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Augmenting Bug Localization with Part-of-Speech and Invocation.
International Journal of Software Engineering and Knowledge Engineering, 2017

A malware detection system based on intermediate language.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

The Application of Naive Bayes Classifier in Name Disambiguation.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Reducing Security Risks of Clouds Through Virtual Machine Placement.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

MCSMGS: Malware Classification Model Based on Deep Learning.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
A multi-scaled hierarchical structure model for multispectral image detection.
Sig. Proc.: Image Comm., 2016

Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet.
Security and Communication Networks, 2016

Disclosure Pattern of Self-Labeled People Living with HIV/AIDS on Chinese Social Networking Site: An Exploratory Study.
Cyberpsy., Behavior, and Soc. Networking, 2016

2015
Leakage-resilient password entry: Challenges, design, and evaluation.
Computers & Security, 2015

Privacy-preserving proof of storage in large group.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2013
Hybrid additive watermarking and its decoders.
Telecommunication Systems, 2013

Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Computing, 2013

Study of a speech coding algorithm based on a contact conduction transmitter in a complicated water area.
Proceedings of the Conference on Underwater Networks and Systems, 2013

Comparing Mobile Privacy Protection through Cross-Platform Applications.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Designing leakage-resilient password entry on touchscreen mobile devices.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Launching Generic Attacks on iOS with Approved Third-Party Applications.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

A Significance-Driven Framework for Characterizing and Finding Evolving Patterns of News Networks.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.
Proceedings of the IEEE 10th International Conference on Trust, 2011

On Detection of Erratic Arguments.
Proceedings of the Security and Privacy in Communication Networks, 2011

A software-based root-of-trust primitive on multicore platforms.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
A multi-user steganographic file system on untrusted shared storage.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
Dynamic Model and Numerical Simulation of Particle Motion in Rotation Flow Field of Centrifuge.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

2006
An interactive web system for integrated three-dimensional customization.
Computers in Industry, 2006


  Loading...