Weili Han
Title
Cited by
Cited by
Year
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion
Z Pang, Q Chen, W Han, L Zheng
Information Systems Frontiers, 1-31, 2012
2792012
Anti-phishing based on automated individual white-list
Y Cao, W Han, Y Le
Proceedings of the 4th ACM workshop on Digital identity management, 51-60, 2008
1672008
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
computers & security 43, 205-218, 2014
1552014
Geochemical and geochronological constraints on the suture location between the North and South China blocks in the Dabie Orogen, Central China
SG Li, F Huang, YH Nie, WL Han, G Long, HM Li, SQ Zhang, ZH Zhang
Physics and Chemistry of the Earth, Part A: Solid Earth and Geodesy 26 (9 …, 2001
1452001
A survey on policy languages in network and security management
W Han, C Lei
Computer networks 56 (1), 477-489, 2012
1402012
A robust detection of the sybil attack in urban vanets
C Chen, X Wang, W Han, B Zang
2009 29th IEEE International Conference on Distributed Computing Systems …, 2009
1232009
A large-scale empirical analysis of chinese web passwords
Z Li, W Han, W Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 559-574, 2014
1042014
Content recommendation system based on private dynamic user profile
T Chen, WL Han, HD Wang, YX Zhou, B Xu, BY Zang
2007 International conference on machine learning and cybernetics 4, 2112-2118, 2007
1032007
An Internet-of-Things solution for food safety and quality control: A pilot project in China
Y Liu, W Han, Y Zhang, L Li, J Wang, L Zheng
Journal of Industrial Information Integration 3, 1-7, 2016
1002016
An access control language for a general provenance model
Q Ni, S Xu, E Bertino, R Sandhu, W Han
Secure Data Management, 68-88, 2009
912009
Technologies, applications, and governance in the internet of things
L Zheng, H Zhang, W Han, X Zhou, J He, Z Zhang, Y Gu, J Wang
Internet of things-Global technological and societal trends. From smart …, 2011
642011
Using automated individual white-list to protect web digital identities
W Han, Y Cao, E Bertino, J Yong
Expert Systems with Applications 39 (15), 11861-11869, 2012
542012
Zero-sum password cracking game: A large-scale empirical study on the crackability, correlation, and security of passwords
S Ji, S Yang, X Hu, W Han, Z Li, R Beyah
IEEE transactions on dependable and secure computing 14 (5), 550-564, 2015
422015
Context-sensitive access control model and implementation
W Han, J Zhang, X Yao
The Fifth International Conference on Computer and Information Technology …, 2005
412005
The design of an electronic pedigree system for food safety
W Han, Y Gu, W Wang, Y Zhang, Y Yin, J Wang, LR Zheng
Information Systems Frontiers, 1-13, 2012
342012
Application-specific digital forensics investigative model in internet of things (iot)
T Zia, P Liu, W Han
Proceedings of the 12th International Conference on Availability …, 2017
322017
Process-context aware matchmaking for web service composition
W Han, X Shi, R Chen
Journal of Network and Computer Applications 31 (4), 559-576, 2008
322008
Shadow attacks based on password reuses: a quantitative empirical analysis
W Han, Z Li, M Ni, G Gu, W Xu
IEEE Transactions on Dependable and Secure Computing 15 (2), 309-320, 2016
312016
Regional patterns and vulnerability analysis of chinese web passwords
W Han, Z Li, L Yuan, W Xu
IEEE Transactions on Information Forensics and Security 11 (2), 258-272, 2015
312015
revdroid: Code analysis of the side effects after dynamic permission revocation of android apps
Z Fang, W Han, D Li, Z Guo, D Guo, XS Wang, Z Qian, H Chen
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
272016
The system can't perform the operation now. Try again later.
Articles 1–20