Weihong Han

Orcid: 0000-0001-9997-1509

According to our database1, Weihong Han authored at least 98 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning.
IEEE Trans. Intell. Transp. Syst., September, 2024

MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss.
Knowl. Based Syst., January, 2024

Disentangled Orchestration on Cyber Ranges.
IEEE Trans. Dependable Secur. Comput., 2024

HOCM-Net: 3D coarse-to-fine structural prior fusion based segmentation network for the surgical planning of hypertrophic obstructive cardiomyopathy.
Expert Syst. Appl., 2024

Exploring Advanced Methodologies in Security Evaluation for LLMs.
CoRR, 2024

2023
REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion.
IEEE Internet Things J., September, 2023

Multi-key Fully Homomorphic Encryption without CRS from RLWE.
Comput. Stand. Interfaces, August, 2023

IR-Capsule: Two-Stream Network for Face Forgery Detection.
Cogn. Comput., January, 2023

Analyzing Security Attacks Against Platoon of Intelligent and Connected Vehicles.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

A Social Bot Detection Method Using Multi-features Fusion and Model Optimization Strategy.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

2022
A Hybrid Intelligent Approach to Attribute Advanced Persistent Threat Organization Using PSO-MSVM Algorithm.
IEEE Trans. Netw. Serv. Manag., December, 2022

Proliferation of Cyber Situational Awareness: Today's Truly Pervasive Drive of Cybersecurity.
Secur. Commun. Networks, 2022

False Alert Detection Based on Deep Learning and Machine Learning.
Int. J. Semantic Web Inf. Syst., 2022

Orchestrating Heterogeneous Cyber-range Event Chains With Serverless-container Workflow.
Proceedings of the 30th International Symposium on Modeling, 2022

Generic Construction of Trace-and-Revoke Inner Product Functional Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

A Review of Attribution Technical for APT Attacks.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Review of Provenance Graph based APT Attack Detection: Applications and Developments.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Entity Alignment: Optimization by Seed Selection.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Introduction to the MDATA Model.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence.
IEEE Trans. Comput. Soc. Syst., 2021

Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.
Secur. Commun. Networks, 2021

A weighted network community detection algorithm based on deep learning.
Appl. Math. Comput., 2021

A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

An android malware detection approach using multi-feature fusion and TF-IDF algorithm.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBM.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey of Advanced Persistent Threats Attack and Defense.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey of DeepFakes Generation and Detection.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Topic representation model based on microblogging behavior analysis.
World Wide Web, 2020

Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Long-Term Spatiotemporal Trend Analysis (1998-2016) of PM2.5 in China Using Satellite Product.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2020

Framework Design of Environment Monitoring System Based on Machine Learning.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Adversarial Examples for Chinese Text Classification.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Seeds Optimization for Entity Alignment in Knowledge Graph Embedding.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Resume Extraction and Validation from Public Information.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Novel Malware Detection Framework Based on Weighted Heterograph.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

An APT Group Knowledge Model based on MDATA.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019

Bidirectional self-adaptive resampling in internet of things big data learning.
Multim. Tools Appl., 2019

Distribution-Sensitive Unbalanced Data Oversampling Method for Medical Diagnosis.
J. Medical Syst., 2019

A Novel Solutions for Malicious Code Detection and Family Clustering Based on Machine Learning.
IEEE Access, 2019

Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation.
IEEE Access, 2019

Review: Topic Model Application for Social Network Public Opinion Analysis.
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

Calculation of Network Security Index Based on Convolution Neural Networks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Identify Influentials Based on User Behavior Across Different Topics.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Research of Trojan Attack Effect Evaluation Based on FAHP.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Multi-source Knowledge Fusion: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

HDGS: A Hybrid Dialogue Generation System using Adversarial Learning.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Intrusion Detection Results Analysis Based on Variational Auto-Encoder.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

BICON: Connecting the Same Users of Different Social Networks using BiLSTM.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

FSM-Based Cyber Security Status Analysis Method.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Joint Extraction of Entities and Relations Based on Multi-label Classification.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Construction of Cyber Range Network Security Indication System Based on Deep Learning.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Structure-Based De-Anonymization Attack on Graph Data Using Weighted Neighbor Match.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

2018
Repost prediction incorporating time-sensitive mutual influence in social networks.
J. Comput. Sci., 2018

Individual Analysis Model and Related Research in Social Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

Topic Analysis Model for Online Social Network.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A New Air Pollution Source Identification Method Based on Remotely Sensed Aerosol and Improved Glowworm Swarm Optimization.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2017

A new algorithm for high temporal and spatial resolution aerosol retrieval using gaofen-4 and landsat-8 data.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

A Multi-attention-Based Bidirectional Long Short-Term Memory Network for Relation Extraction.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Sockpuppet gang detection on social media sites.
Frontiers Comput. Sci., 2016

A new aerosol retrieval algorithm based on statistical segmentation using Landsat-8 OLI data.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

A new algorithm for aerosol retrieval using HJ-1 CCD and MODIS NDVI data over urban areas.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

A new air pollution sources identification method based on remotely sensed aerosol and swarm intelligence.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

2015
Aerosol Retrieval over Urban Area by Syngertic Use of Feng Yun-3C MERSI and Terra MODIS Data.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Air Pollution Sources Identification Precisely Based on Remotely Sensed Aerosol and Glowworm Swarm Optimization.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

A Consistent Hashing Based Data Redistribution Algorithm.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques, 2015

2014
Hierarchical classification with a topic taxonomy via LDA.
Int. J. Mach. Learn. Cybern., 2014

A Novel Feature Selection Method Based on Category Distribution and Phrase Attributes.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

A Top K Relative Outlier Detection Algorithm in Uncertain Datasets.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

The Research of Partitioning Model Based on Virtual Identity Data.
Proceedings of the Web Technologies and Applications, 2014

2013
Measuring Micro-blogging User Influence Based on User-Tweet Interaction Model.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

Chinese Text Classification Based on Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013

Imbalanced Chinese Text Classification Based on Weighted Sampling.
Proceedings of the Trustworthy Computing and Services, 2013

Spatial distribution of PM2.5 concentration based on aerosol optical thickness inverted by Landsat ETM+ data over Chengdu.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

Ensemble multi-label learning based on neural network.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

A Combination Method for Multi-class Imbalanced Data Classification.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

Research on Large Scale Hierarchical Classification Based on Candidate Search.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
A Multi-phase k-anonymity Algorithm Based on Clustering Techniques.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Research and Implement of Security Situation Awareness System YH-SSAS.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A New K-anonymity Algorithm towards Multiple Sensitive Attributes.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2009
Research of Massive Internet Text Data Real-Time Loading and Index System.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Effective Feature Selection on Data with Uncertain Labels.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
Fast similarity matching on data stream with noise.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

2007
Deployment of Context-Aware Component-Based Applications Based on Middleware.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Continuous Kernel-Based Outlier Detection over Distributed Data Streams.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Instant Message Clustering Based on Extended Vector Space Model.
Proceedings of the Advances in Computation and Intelligence, 2007

Continuous Adaptive Outlier Detection on Distributed Data Streams.
Proceedings of the High Performance Computing and Communications, 2007

Middleware Based Context Management for the Component-Based Pervasive Computing.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Context-Aware Middleware Support for Component Based Applications in Pervasive Computing.
Proceedings of the Advanced Parallel Processing Technologies, 7th International Symposium, 2007

2006
Research and Implement of Real-Time Data Loading System IMIL.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

Towards A Context-Aware Middleware for Deploying Component-Based Applications in Pervasive Computing.
Proceedings of the Grid and Cooperative Computing, 2006

2005
An Optimal Component Distribution Algorithm Based on MINLP.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Transactional Business Coordination and Failure Recovery for Web Services Composition.
Proceedings of the Grid and Cooperative Computing, 2004

2003
StarOTS: An Effcient Distributed Transaction Recovery Mechanism in the CORBA Component Runtime Environment.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

A Dynamic Reconfiguration Platform Based on Distributed Component Technology CCM.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003


  Loading...