Zhen Han

Orcid: 0000-0002-3688-873X

Affiliations:
  • Beijing Jiaotong University, Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, China
  • China Academy of Engineering Physics, Beijing, China (PhD 1991)


According to our database1, Zhen Han authored at least 53 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Enhancing Privacy in Distributed Intelligent Vehicles With Information Bottleneck Theory.
IEEE Internet Things J., March, 2025

Achieving Network Resilience through Graph Neural Network-enabled Deep Reinforcement Learning.
CoRR, January, 2025

VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems.
IEEE Trans. Dependable Secur. Comput., 2025

FairReward: Towards Fair Reward Distribution Using Equity Theory in Blockchain-Based Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2025

2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024

Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation.
IEEE Netw., May, 2024

FedHGL: Cross-Institutional Federated Heterogeneous Graph Learning for IoT.
IEEE Internet Things J., 2024

Nightfall Deception: A Novel Backdoor Attack on Traffic Sign Recognition Models via Low-Light Data Manipulation.
Proceedings of the Advanced Data Mining and Applications - 20th International Conference, 2024

2023
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Impact of Service Function Aging on the Dependability for MEC Service Function Chain.
IEEE Trans. Dependable Secur. Comput., 2023

2022
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance.
Int. J. Intell. Syst., December, 2022

Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective.
Peer-to-Peer Netw. Appl., 2022

2021
Resilience-Driven Quantitative Analysis of Vehicle Platooning Service.
IEEE Trans. Veh. Technol., 2021

BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System.
IEEE Access, 2021

Blockchain-based decentralized federated learning: A secure and privacy-preserving system.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.
Wirel. Commun. Mob. Comput., 2020

Sensing Users' Emotional Intelligence in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions.
IEEE Access, 2020

Numerical Evaluation of Job Finish Time Under MTD Environment.
IEEE Access, 2020

Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views.
IEEE Access, 2020

Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.
Proceedings of the Intelligent Information Processing X, 2020

Processing in Memory Assisted MEC 3C Resource Allocation for Computation Offloading.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Model-based Performance Evaluation of a Moving Target Defense System.
Proceedings of the IEEE Global Communications Conference, 2020

DNS Rebinding Detection for Local Internet of Things Devices.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Adversarial attack and defense in reinforcement learning-from AI security view.
Cybersecur., 2019

Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface.
IEEE Access, 2019

Predicting Users' Emotional Intelligence with Social Networking Data.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

2018
Model-based sensitivity analysis of IaaS cloud availability.
Future Gener. Comput. Syst., 2018

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.
CoRR, 2018

Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers.
Comput. J., 2018

Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Designing Mutual Authentication Protocols in Industrial Wireless Network.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst., 2017

PrivMin: Differentially Private MinHash for Jaccard Similarity Computation.
CoRR, 2017

2016
Deterministic attribute-based encryption.
Int. J. High Perform. Comput. Netw., 2016

Public verifiability for shared data in cloud storage with a defense against collusion attacks.
Sci. China Inf. Sci., 2016

2015
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation.
Inf. Sci., 2015

OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines.
Concurr. Comput. Pract. Exp., 2015

Privacy beyond sensitive values.
Sci. China Inf. Sci., 2015

2014
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
IEEE Trans. Inf. Forensics Secur., 2014

A Privacy-Aware Access Model on Anonymized Data.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2011
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI.
Frontiers Comput. Sci. China, 2011

2010
Full and partial deniability for authentication schemes.
Frontiers Comput. Sci. China, 2010

An IBE scheme using ECC combined public key.
Comput. Electr. Eng., 2010

2008
A remote anonymous attestation protocol in trusted computing.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts.
Proceedings of IEEE International Conference on Communications, 2008

2005
An Efficient and Divisible Payment Scheme for M-Commerce.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Develop Secure Database System with Security Extended ER Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005


  Loading...