Zhihui Han

According to our database1, Zhihui Han authored at least 18 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
New hybrid algorithm combining multiple transportation modes for an environmental protection workshop layout.
J. Ambient Intell. Humaniz. Comput., October, 2023

EEG-based sleep staging via self-attention based capsule network with Bi-LSTM model.
Biomed. Signal Process. Control., September, 2023

2022
Measurement of Malware Family Classification on a Large-Scale Real-World Dataset.
Proceedings of the IEEE International Conference on Trust, 2022

APT Attribution for Malware Based on Time Series Shapelets.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Correlated Status Update of Energy Harvesting Sensors Based on Reinforcement Learning.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

Explainable APT Attribution for Malware Using NLP Techniques.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

CTSCOPY: Hunting Cyber Threats within Enterprise via Provenance Graph-based Analysis.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
A dynamic generalized coherence factor for side lobe suppression in ultrasound imaging.
Comput. Biol. Medicine, 2020

Dissecting Mobile Offerwall Advertisements: An Explorative Study.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

2019
A New Algorithm for Blood Flow Measurement Based on the Doppler Flow Spectrogram.
IEEE Access, 2019

2017
The complexity of the tourism development industry based on AHP and ZZ City.
Int. J. Appl. Decis. Sci., 2017

2016
Entropy Complexity and Stability of a Nonlinear Dynamic Game Model with Two Delays.
Entropy, 2016

2015
Operating System Security Policy Hardening via Capability Dependency Graphs.
Proceedings of the Information Security Practice and Experience, 2015

2014
Evaluating and comparing the quality of access control in different operating systems.
Comput. Secur., 2014

Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Quantitatively Measure Access Control Mechanisms across Different Operating Systems.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Measuring and Comparing the Protection Quality in Different Operating Systems.
Proceedings of the Network and System Security - 7th International Conference, 2013


  Loading...