Weili Han

According to our database1, Weili Han authored at least 54 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An Explainable Password Strength Meter Addon via Textual Pattern Recognition.
Security and Communication Networks, 2019

Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet of Things Journal, 2019

FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things.
IEEE Access, 2019

2018
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis.
IEEE Trans. Dependable Sec. Comput., 2018

DESC: enabling secure data exchange based on smart contracts.
SCIENCE CHINA Information Sciences, 2018

2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Sec. Comput., 2017

Re-identification of Vehicular Location-Based Metadata.
ICST Trans. Security Safety, 2017

Socialized policy administration.
Computers & Security, 2017

Does #like4like indeed provoke more likes?
Proceedings of the International Conference on Web Intelligence, 2017

A Privacy Preserving Data Aggregation Scheme to Investigate Apps Installment in Massive Mobile Devices.
Proceedings of the 2017 International Conference on Identification, 2017

Cyberspace-Oriented Access Control: Model and Policies.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A highly linear voltage-to-time converter with variable conversion gain for time-based ADCs.
Proceedings of the 12th IEEE International Conference on ASIC, 2017

Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT).
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords.
IEEE Trans. Information Forensics and Security, 2016

SCout: Prying Into Supply Chains via a Public Query Interface.
IEEE Systems Journal, 2016

Unique on the Road: Re-identification of Vehicular Location-Based Metadata.
Proceedings of the Security and Privacy in Communication Networks, 2016

An Empirical Study on User Access Control in Online Social Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Camera-Recognizable and Human-Invisible Labelling for Privacy Protection.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion.
Information Systems Frontiers, 2015

The design of an electronic pedigree system for food safety.
Information Systems Frontiers, 2015

Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

SPA: Inviting Your Friends to Help Set Android Apps.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
Collaborative Policy Administration.
IEEE Trans. Parallel Distrib. Syst., 2014

Security of e-systems.
Security and Communication Networks, 2014

Dynamic combination of authentication factors based on quantified risk and benefit.
Security and Communication Networks, 2014

Permission based Android security: Issues and countermeasures.
Computers & Security, 2014

A Large-Scale Empirical Analysis of Chinese Web Passwords.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Data driven quantitative trust model for the Internet of Agricultural Things.
Proceedings of the 4th International Conference on the Internet of Things, 2014

APP Vetting Based on the Consistency of Description and APK.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Efficient General Policy Decision by Using Mutable Variable Aware Cache.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Role mining algorithm evaluation and improvement in large volume android applications.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

2012
Using automated individual white-list to protect web digital identities.
Expert Syst. Appl., 2012

A survey on policy languages in network and security management.
Computer Networks, 2012

Using IoT Technologies to Resolve the Food Safety Problem - An Analysis Based on Chinese Food Standards.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Optimizing the storage of massive electronic pedigrees in HDFS.
Proceedings of the 3rd IEEE International Conference on the Internet of Things, 2012

2011
Sybil attack detection based on signature vectors in VANETs.
IJCCBS, 2011

Using a Smart Phone to Strengthen Password-Based Authentication.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Poster: using quantified risk and benefit to strengthen the security of information sharing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: collaborative policy administration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
A trusted decentralized access control framework for the client/server architecture.
J. Network and Computer Applications, 2010

Specify and enforce the policies of quantified risk adaptive access control.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
An Access Control Language for a General Provenance Model.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System.
Proceedings of the POLICY 2009, 2009

A Robust Detection of the Sybil Attack in Urban VANETs.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

2008
Process-context aware matchmaking for web service composition.
J. Network and Computer Applications, 2008

Anti-phishing based on automated individual white-list.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

2007
Integrated business-process driven design for service-oriented enterprise applications.
Int. J. Pervasive Computing and Communications, 2007

2005
Service-Oriented Business Solution Development Driven by Process Model.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Context-sensitive Access Control Model and Implementation.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2003
Network Self-Organizing Information Exploitation Model Based on GCA.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Network Behavior Analysis Based on a Computer Network Model.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2002
Research on an Event Specification for Event-Based Collaboration Support Software Architecture.
Proceedings of the Seventh International Conference on CSCW in Design, 2002

2001
An Event and Service Interacting Model and Event Detection Based on the Broker/Service Model.
Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, 2001


  Loading...