复旦大学  
更多 

代表性论文


2023年

  1. Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han. Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy.  In Proceedings of the 44th IEEE Symposium on Security and Privacy (IEEE S&P 2023), San Francisco, CA, May 22-24, 2023: 1926-1943. (Paper)

  2. Ming Xu, Jitao Yu, Xinyi Zhang, Chuanwang Wang, Shenghao Zhang, Haoqi Wu, Weili Han. Improving Real-world Password Guessing Attacks via Bi-directional Transformers. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security), Anaheim, CA, August 9–11, 2023. (Paper)

  3. 韩伟力,宋鲁杉,阮雯强,林国鹏,汪哲轩。安全多方学习:从安全计算到安全学习。 计算机学报,2023。(Paper)

  4. Wenqiang Ruan, Mingxin Xu, Yinan Jing, Weili Han. Towards understanding the fairness of differentially private margin classifiers, World Wide Web (WWWJ), 2023, 26(3): 1201-1221. (Paper)

2022年

  1. Lushan Song, Jiaxuan Wang, Zhexuan Wang, Xinyu Tu, Guopeng Lin, Wenqiang Ruan, Haoqi Wu, Weili Han. pMPL: A Robust Multi-Party Learning Framework with a Privileged Party, In Proceedings of 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS’22), November 7 - 11, 2022, Los Angeles, CA, USA: 2689–2703. (Preprint Version)

  2. Chuanwang Wang, Junjie Zhang, Ming Xu, Haodong Zhang, Weili Han. #Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing, Computers & Security (COSE), 2022, 131, 102848. (DOI: 10.1016/j.cose.2022.102848) (Paper)

  3. 韩伟力,张俊杰,徐铭,王传旺,张浩东,何震瀛,陈虎。参数化混合口令猜测方法,计算机研究与发展,2022,59 (12): 2708-2722。(DOI: 10.7544/issn1000-1239.20210456) (Paper)

  4. Kai Wang, Jun Pang, Dingjie Chen, Yu Zhao, Dapeng Huang, Chen Chen, Weili Han. A Large-scale Empirical Analysis of Ransomware Activities in Bitcoin, ACM Transactions on the Web (TWEB), 2022, 16(2): 1-29. (DOI: 10.1145/3494557) (Paper)

2021年

  1. Ming Xu, Chuanwang Wang, Jitao Yu, Junjie Zhang, Kai Zhang, Weili Han. Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations,  In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS’21), Nov. 15-19, 2021: 5-20. (Paper)

  2. Weili Han, Chang Cao, Zhe Zhou, Shize Chen, Lingqi Huang, X. Sean Wang. A Smart Framework for Fine-Grained Microphone Acoustic Permission Management, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021, 18(6): 2705-2718. (DOI: 10.1109/TDSC.2019.2962403) (Paper)

  3. Weili Han, Ming Xu , Junjie Zhang, Chuanwang Wang, Kai Zhang, X. Sean Wang. TransPCFG: Transferring the Grammars from Short Passwords to Guess Long Passwords Effectively, IEEE Transactions on Information Forensics and Security (TIFS), 2021, 16: 451-465. (DOI: 10.1109/TIFS.2020.3003696) (Paper)

  4. Haodong Zhang, Chuanwang Wang, Wenqiang Ruan, Junjie Zhang, Ming Xu, Weili Han. Digit Semantics based Optimization for Practical Password Cracking Tools.  In Proceedings of 2021 Annual Computer Security Applications Conference (ACSAC 2021), 2021: 513-527. (Paper)

  5. Wenqiang Ruan, Mingxin Xu, Haoyang Jia, Zhenhuan Wu, Lushan Song, Weili Han. Privacy Compliance: Can Technology Come to the Rescue? IEEE Security & Privacy, 2021, 19(4): 37-43. (Paper)

  6. Zhenying He, Lu Wang, Chang Lu, Yinan Jing, Kai Zhang, Weili Han, Jianxin Li, Chengfei Liu, X. Sean Wang. Efficiently answering top-k frequent term queries in temporal-categorical range. Information Sciences, 2021, 574: 238-258.

  7. Ruixin Shi, Yongbin Zhou, Yong Li, Weili Han. Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. Secure Communication and Networks (SCN), 2021: 5563884:1-5563884:16.

  8. Weili Han, Dingjie Chen, Jun Pang, Kai Wang, Chen Chen, Dapeng Huang, Zhijie Fan. Temporal Networks Based Industry Identification for Bitcoin Users. In Proceedings of WASA 2021: 108-120.

2020年

  1. Weili Han, Chang Cao, Hao Chen, Dong Li , Zheran Fang, Wenyuan Xu, X. Sean Wang. senDroid: Auditing Sensor Access in Android System-Wide, IEEE Transactions on Dependable and Secure Computing (TDSC), 2020, 17 (2): 407-421. (Paper)

  2. Linwei Li, Kai Zhang, Jiading Guo, Wen He, Zhenying He, Yinan Jing, Weili Han, X. Sean Wang. BinDex: A Two-Layered Index for Fast and Robust Scans, In Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data (SIGMOD’20), June 14-19, 2020, Portland, USA: 909-923. (Paper)

  3. Yaoliang Chen, Shi Chen, Jiao Liang, Lance Feagan, Weili Han, Sheng Huang, X. Sean Wang. Decentralized Data Access Control over Consortium Blockchains. Information Systems, 2020, 94: 101590.

  4. Haoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han. Automated Enforcement of the Principle of Least Privilege over Data Source Access. In Proceedings of TrustCom 2020, 510-517.

2019年及以前

  1. Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu. Shadow Attacks based on Password Reuses: A Quantitative Empirical View, IEEE Transactions on Dependable and Secure Computing (TDSC), 2018, 15 (2): 309-320.  (Paper)

  2. 韩伟力,袁琅,李思斯,王晓阳。一种基于样本的模拟口令集生成算法,计算机学报,2017,40(5):1-17. (Paper)

  3. Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, and Raheem Beyah. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords, IEEE Transactions on Dependable and Secure Computing (TDSC), 2017, 14 (5): 550-564. (Paper

  4. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang. Socialized policy administration. Computer & Security, 2017, 67: 232-243. 

  5. Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu. Regional Patterns and Vulnerability Analysis of Chinese Web Passwords, IEEE Transactions on Information Forensics and Security (TIFS), 2016, 11 (2): 258-272.  (Paper)

  6. Minyue Ni, Yang Zhang, Weili Han, Jun Pang. An Empirical Study on User Access Control in Online Social Networks. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016), Shanghai, China, June 5-8, 2016: 13-23.

  7. Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino. Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking. In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), Vienna, Austria, June 1-3, 2015: 135-145.

  8. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni. SPA: Inviting Your Friends to Help Set Android Apps. In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), Vienna, Austria, June 1-3, 2015: 221-231.

  9. Zhigong Li, Weili Han, Wenyuan Xu. A Large-Scale Empirical Analysis of Chinese Web Passwords, In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), San Diego, August 20-22, 2014: 559-574. (Paper)

  10. Weili Han, Zheran Fang, Laurence T. Yang, Gang Pan, Zhaohui Wu. Collaborative Policy Administration. IEEE Transactions on Parallel and Distributed Systems (TPDS), 2014, 25 (2): 498-507. (Paper)