profile

Weili Han      

 

Professor, PhD Supervisor

Software School, Fudan University, Shanghai, P. R. China

 

Email:  wlhan@fudan.edu.cn

Phone:  +86-21-51355388 (office)

Fax:  +86-21-51355358

Chinese Version


[Research]     [Publications]    [Teaching]    [Links]


Brief Biography

Weili Han received his B.S. of Geochemistry, his B.E. of Computer Software at USTC in 1998, and his PhD of Computer Science and Technology at Zhejiang University in 2003. Then, he joined the faculty of Software School at Fudan University. Now, he is a full professor and deputy dean of Software School, Fudan University. He is also a deputy director member of the Expert Group of Information Security in CIE and the secretary of CCF Shanghai Chapter. From 2008 to 2009, he visited Purdue University as a visiting scholar funded by China Scholarship Council and Purdue University. His research interests are mainly in the fields of Data Systems Security, Access Control, and AI Systems Security. He is now members of the ACM, SIGSAC, CCF, CIE.

I'm seeking for Master and PhD candidates who have strong interests in data systems security. If you are interested, feel free to drop me an email and introduce yourself!

News

Research Topics

 

Publications

Selected Research Papers

Journal Papers

  1. Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang. senDroid: Auditing Sensor Access in Android System-wide, IEEE Transactions on Dependable and Secure Computing (TDSC), 2017. (DOI: 10.1109/TDSC.2017.2768536) (paper, bib).
  2. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang. Socialized Policy Administration, Computers & Security (COSE), 2017, 67: 232-243.(paper, bib)
  3. Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu. Shadow Attacks based on Password Reuses: A Quantitative Empirical View, IEEE Transactions on Dependable and Secure Computing (TDSC), 2016, (DOI: 10.1109/TDSC.2016.2568187). (pdf, bib)
  4. Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu. Regional Patterns and Vulnerability Analysis of Chinese Web Passwords, IEEE Transactions on Information Forensics and Security (TIFS), 2016, 11 (2): 258-272. (paper, bib)
  5. Zheran Fang, Weili Han, Yingjiu Li. Permission Based Android Security: Issues and Countermeasures. Computers & Security (COSE), 2014, 43: 205-218. (paper, bib)
  6. Weili Han, Zheran Fang, Laurence T. Yang, Gang Pan, Zhaohui Wu. Collaborative Policy Administration. IEEE Transactions on Parallel and Distributed Systems (TPDS), 2014, 25 (2): 498-507. (paper, bib)
  7. Weili Han, Ye Cao, Elisa Bertino, Jianming Yong. Using Automated Individual White-List to Protect Web Digital Identities, Expert Systems With Applications (ESWA), 2012, 39: 11861¨C11869.(paper, bib)

Conference Papers

  1. Minyue Ni, Yang Zhang, Weili Han, Jun Pang. An Empirical Study on User Access Control in Online Social Networks. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016), June 6-8, Shanghai, China: 13-23. (pdf, bib, accept rate = 18/55)
  2. Zeran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen. revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. In Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), May 30-June 3, Xi'an, China: 747-758.(pdf, bib, accept rate = 73/350)
  3. Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino. Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 135-145.(pdf, bib, accept rate=17/49)
  4. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni. SPA: Inviting Your Friends to Help Set Android Apps, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 221-231.(pdf, bib, accept rate=17/49)
  5. Zhigong Li, Weili Han, Wenyuan Xu. A Large-Scale Empirical Analysis of Chinese Web Passwords, In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), San Diego, August 20-22, 2014: 559-574.(pdf, bib)
More Papers@DBLP
Citations@Google Scholar

Fundings

  1. NSFC: Research for the Mechanism of Mobile Sensing Security and Its Optimization, 2016.1-2019.12, 771.2K RMB (Grant No. 6157050249). (PI)
  2. Fudan Innovation Project: Research for the Mechanisms and Schemes of Big Data Security£¬2017.1-2019.12, 300K RMB. (PI)
  3. Payfont: Research for Authentication Methods of Dynamical Multiple Factors, 2017.1-2017.12, 480K RMB. (PI)
  4. STCSM: Data Exchange Supporting Big Data Arena: Research for Key Technologies and Toolkits (Grant No. 16DZ1100200), 2016.7-2018.6, 19940K RMB. (co-PI, General Secretary of Project)

Professional Activities

Editor Services

Chairs/Program Committee Members for Conferences

Teaching

  1. Introduction to Web Application

Summer, from 2004

for Freshman students

  2. Data Structures and Algorithm Design

Winter, from 2003

for Sophomore students

  3. Principle of Information Security

Winter, from 2004

for Master of Software Engineering

  4. Network and Computer Security

Summer, from 2010

for Graduate student

materials

 

Students
I am now luckily working with:
   Zheqing Guo (M'15), Jiao Liang (M'15), Wu Liu (M'15), Sisi Li (M'16), Chang Cao (M'16), Haoyang Jia (M'17), Dingyi Tang (M'17), Size Chen (M'17), Yimin Shen (M'17), Tianhao Mao, Zhan Shi, Yuwen He
Alumni
  Masters: Xingdong Shi (M'04, Intel), Liu He (M'04), Haili Zhang (M'05, Intel), Ting Chen (M'05), Yi Wang (M'06), Ye Cao (M'07, SPD Bank), Jun Gao (M'07, Fudan), Pengpeng Huang (M'07, IBM), Jiping Zhou (M'07, CMU), Jianfei Chen (M'08), Qi Zheng (M'08), Yujia Tang (M'08), Chang Lei (M'10, IBM), Yun Gu (M'11), Tao Zhou (M'12, CFFEX), Weiwei Peng (M'12, Unipay), Yin Zhang (M'12, Ebay), Wei Wang (M'12, CFFEX), Ruiqi Bu (M'13, CISCO), Zheran Fang (M'13, MicroSoft), Zhigong Li (M'13, Unity), Minyue Ni (M'14, Pingan), Liangxin Liu (M'12, Xueersi), Lang Yuan (M'14, VMWare), Dong Li (M'14),
  Undergraduates: Danhao Guo (12',CMU), Yuxuan Liu (12', 360), Xinyi Zhang (10', UCSB), Xiaoning Du (10', NUS), Qihui Zhao (09', Baidu), Chengguang Shen (08', UCLA), Yuliang Yin (08', CMU), Cheng Sun (07', CMU), Jing Li (07', CISCO), Jin Han (02', SMU), Qiang Yan (02', SMU)

Academic

CERIAS

CiteSeer@PSU

DBLP Biobliography

Friends

Gang Pan Ninghui Li Xinyu Tang Qun Ni Weidong Zhao