Zhen Han
Orcid: 0000-0002-3688-873XAffiliations:
- Beijing Jiaotong University, Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, China
- China Academy of Engineering Physics, Beijing, China (PhD 1991)
According to our database1,
Zhen Han
authored at least 53 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Enhancing Privacy in Distributed Intelligent Vehicles With Information Bottleneck Theory.
IEEE Internet Things J., March, 2025
Achieving Network Resilience through Graph Neural Network-enabled Deep Reinforcement Learning.
CoRR, January, 2025
IEEE Trans. Inf. Forensics Secur., 2025
Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems.
IEEE Trans. Dependable Secur. Comput., 2025
FairReward: Towards Fair Reward Distribution Using Equity Theory in Blockchain-Based Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2025
2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation.
IEEE Netw., May, 2024
IEEE Internet Things J., 2024
Nightfall Deception: A Novel Backdoor Attack on Traffic Sign Recognition Models via Low-Light Data Manipulation.
Proceedings of the Advanced Data Mining and Applications - 20th International Conference, 2024
2023
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Impact of Service Function Aging on the Dependability for MEC Service Function Chain.
IEEE Trans. Dependable Secur. Comput., 2023
2022
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance.
Int. J. Intell. Syst., December, 2022
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective.
Peer-to-Peer Netw. Appl., 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Access, 2021
Blockchain-based decentralized federated learning: A secure and privacy-preserving system.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
2020
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.
Wirel. Commun. Mob. Comput., 2020
IEEE Trans. Comput. Soc. Syst., 2020
Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions.
IEEE Access, 2020
Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views.
IEEE Access, 2020
Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.
Proceedings of the Intelligent Information Processing X, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
Cybersecur., 2019
Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface.
IEEE Access, 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
2018
Future Gener. Comput. Syst., 2018
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.
CoRR, 2018
Comput. J., 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst., 2017
CoRR, 2017
2016
Public verifiability for shared data in cloud storage with a defense against collusion attacks.
Sci. China Inf. Sci., 2016
2015
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation.
Inf. Sci., 2015
Concurr. Comput. Pract. Exp., 2015
2014
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
2011
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI.
Frontiers Comput. Sci. China, 2011
2010
Frontiers Comput. Sci. China, 2010
2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts.
Proceedings of IEEE International Conference on Communications, 2008
2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005