Weili Han
Cited by
Cited by
Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion
Z Pang, Q Chen, W Han, L Zheng
Information Systems Frontiers, 1-31, 2012
Anti-phishing based on automated individual white-list
Y Cao, W Han, Y Le
Proceedings of the 4th ACM workshop on Digital identity management, 51-60, 2008
Geochemical and geochronological constraints on the suture location between the North and South China blocks in the Dabie Orogen, Central China
SG Li, F Huang, YH Nie, WL Han, G Long, HM Li, SQ Zhang, ZH Zhang
Physics and Chemistry of the Earth, Part A: Solid Earth and Geodesy 26 (9 …, 2001
Permission based Android security: Issues and countermeasures
Z Fang, W Han, Y Li
computers & security 43, 205-218, 2014
A survey on policy languages in network and security management
W Han, C Lei
Computer Networks 56 (1), 477-489, 2012
A robust detection of the sybil attack in urban vanets
C Chen, X Wang, W Han, B Zang
2009 29th IEEE International Conference on Distributed Computing Systems …, 2009
Content recommendation system based on private dynamic user profile
T Chen, WL Han, HD Wang, YX Zhou, B Xu, BY Zang
2007 International Conference on Machine Learning and Cybernetics 4, 2112-2118, 2007
A large-scale empirical analysis of chinese web passwords
Z Li, W Han, W Xu
23rd {USENIX} Security Symposium ({USENIX} Security 14), 559-574, 2014
An access control language for a general provenance model
Q Ni, S Xu, E Bertino, R Sandhu, W Han
Secure Data Management, 68-88, 2009
An Internet-of-Things solution for food safety and quality control: A pilot project in China
Y Liu, W Han, Y Zhang, L Li, J Wang, L Zheng
Journal of Industrial Information Integration 3, 1-7, 2016
Technologies, applications, and governance in the internet of things
L Zheng, H Zhang, W Han, X Zhou, J He, Z Zhang, Y Gu, J Wang
Internet of things-Global technological and societal trends. From smart …, 2011
Using automated individual white-list to protect web digital identities
W Han, Y Cao, E Bertino, J Yong
Expert Systems with Applications 39 (15), 11861-11869, 2012
ELF3 promotes epithelial–mesenchymal transition by protecting ZEB1 from miR-141-3p-mediated silencing in hepatocellular carcinoma
L Zheng, M Xu, J Xu, K Wu, Q Fang, Y Liang, S Zhou, D Cen, L Ji, W Han, ...
Cell death & disease 9 (3), 1-14, 2018
Context-sensitive access control model and implementation
W Han, J Zhang, X Yao
The Fifth International Conference on Computer and Information Technology …, 2005
The design of an electronic pedigree system for food safety
W Han, Y Gu, W Wang, Y Zhang, Y Yin, J Wang, LR Zheng
Information Systems Frontiers, 1-13, 2012
Zero-sum password cracking game: A large-scale empirical study on the crackability, correlation, and security of passwords
S Ji, S Yang, X Hu, W Han, Z Li, R Beyah
IEEE transactions on dependable and secure computing 14 (5), 550-564, 2015
Process-context aware matchmaking for web service composition
W Han, X Shi, R Chen
Journal of Network and Computer Applications 31 (4), 559-576, 2008
基于 RFID 的物联网安全需求研究
彭朋, 韩伟力, 赵一鸣, 周建锁, 董浩然
计算机安全, 75-79, 2011
Regional patterns and vulnerability analysis of chinese web passwords
W Han, Z Li, L Yuan, W Xu
IEEE Transactions on Information Forensics and Security 11 (2), 258-272, 2015
加快新工科建设, 推进工程教育改革创新
胡波, 冯辉, 韩伟力, 徐雷
复旦教育论坛 15 (2), 20-27, 2017
The system can't perform the operation now. Try again later.
Articles 1–20