Weili Han      


Professor, PhD Supervisor

Software School, Fudan University, Shanghai, P. R. China



Phone:  +86-21-51355388 (office)

Fax:  +86-21-51355358

Chinese Version

[Research]     [Publications]    [Teaching]    [Links]

Brief Biography

Weili Han received his B.S. of Geochemistry, his B.E. of Computer Software at USTC in 1998, and his PhD of Computer Science and Technology at Zhejiang University in 2003. Then, he joined the faculty of Software School at Fudan University. Now, he is a full professor and deputy dean of Software School, Fudan University. He is also a deputy director member of the Expert Group of Information Security in CIE and the secretary of CCF Shanghai Chapter. From 2008 to 2009, he visited Purdue University as a visiting scholar funded by China Scholarship Council and Purdue University. His research interests are mainly in the fields of Data Systems Security, Access Control, and AI Systems Security. He is now members of the ACM, SIGSAC, CCF, CIE.

I'm seeking for Master and PhD candidates who have strong interests in data systems security. If you are interested, feel free to drop me an email and introduce yourself!


Research Topics



Selected Research Papers

Journal Papers

  1. Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu. Shadow Attacks based on Password Reuses: A Quantitative Empirical View, IEEE Transactions on Dependable and Secure Computing (TDSC), 2018, 15 (2): 309-320. (paper, bib)
  2. Jiao Liang, Weili Han, Zeqing Guo, Yaoliang Chen, Chang Cao, Xiaoyang Sean Wang, Fenghua Li. DESC: enabling secure data exchange based on smart contracts, SCIENCE CHINAInformation Sciences, 2018, 61: 049102. (paper, bib)
  3. Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang. senDroid: Auditing Sensor Access in Android System-wide, IEEE Transactions on Dependable and Secure Computing (TDSC), 2017. (DOI: 10.1109/TDSC.2017.2768536) (paper, bib).
  4. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang. Socialized Policy Administration, Computers & Security (COSE), 2017, 67: 232-243.(paper, bib)
  5. Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu. Regional Patterns and Vulnerability Analysis of Chinese Web Passwords, IEEE Transactions on Information Forensics and Security (TIFS), 2016, 11 (2): 258-272. (paper, bib)
  6. Zheran Fang, Weili Han, Yingjiu Li. Permission Based Android Security: Issues and Countermeasures. Computers & Security (COSE), 2014, 43: 205-218. (paper, bib)
  7. Weili Han, Zheran Fang, Laurence T. Yang, Gang Pan, Zhaohui Wu. Collaborative Policy Administration. IEEE Transactions on Parallel and Distributed Systems (TPDS), 2014, 25 (2): 498-507. (paper, bib)
  8. Weili Han, Ye Cao, Elisa Bertino, Jianming Yong. Using Automated Individual White-List to Protect Web Digital Identities, Expert Systems With Applications (ESWA), 2012, 39: 11861¨C11869.(paper, bib)

Conference Papers

  1. Minyue Ni, Yang Zhang, Weili Han, Jun Pang. An Empirical Study on User Access Control in Online Social Networks. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016), June 6-8, Shanghai, China: 13-23. (pdf, bib, accept rate = 18/55)
  2. Zeran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen. revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. In Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), May 30-June 3, Xi'an, China: 747-758.(pdf, bib, accept rate = 73/350)
  3. Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino. Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 135-145.(pdf, bib, accept rate=17/49)
  4. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni. SPA: Inviting Your Friends to Help Set Android Apps, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 221-231.(pdf, bib, accept rate=17/49)
  5. Zhigong Li, Weili Han, Wenyuan Xu. A Large-Scale Empirical Analysis of Chinese Web Passwords, In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), San Diego, August 20-22, 2014: 559-574.(pdf, bib)
More Papers@DBLP
Citations@Google Scholar


  1. NSFC: Password Security Research, 2019.1-2022.12, 2480K RMB (Grant No. U1836207). (PI)
  2. National Key R&D Program of China: Accurate Law Services, 2018.7-2021.6, 509.2K RMB (Grant No. 2018YFC0830900). (co-PI)
  3. STCSM: Big Data Analysis, 2018.7-2020.6, 450K RMB (Grant No. 18511103600). (co-PI)
  4. NSFC: Research for the Mechanism of Mobile Sensing Security and Its Optimization, 2016.1-2019.12, 771.2K RMB (Grant No. 61572136). (PI)
  5. Fudan Innovation Project: Research for the Mechanisms and Schemes of Big Data Security£¬2017.1-2019.12, 300K RMB. (PI)

Professional Activities

Editor Services

Chairs/Program Committee Members for Conferences


  1. Introduction to Web Application

Summer, from 2004

for Freshman students

  2. Data Structures and Algorithm Design

Winter, from 2003

for Sophomore students

  3. Principle of Information Security

Winter, from 2004

for Master of Software Engineering

  4. Network and Computer Security

Summer, from 2010

for Graduate student



I am now luckily working with:
   Ph.D. Students: Min Xu (D'18)
   Master Students: Zheqing Guo (M'15), Sisi Li (M'16), Chang Cao (M'16), Haoyang Jia (M'17), Dingyi Tang (M'17), Size Chen (M'17), Yimin Shen (M'17), Dingjie Chen (M'18), Chaoyang Lv (M'18), Zhengxuan Yu (M'18)
   Undergraduates: Haoqi Wu (U'15), Junjie Zhang (U'15), Hongze Shang (U'15), Lu Sun (U'15), Shilei Chen (U'15)
  Masters: Xingdong Shi (M'04, Intel), Liu He (M'04), Haili Zhang (M'05, Intel), Ting Chen (M'05), Yi Wang (M'06), Ye Cao (M'07, SPD Bank), Jun Gao (M'07, Fudan), Pengpeng Huang (M'07, IBM), Jiping Zhou (M'07, CMU), Jianfei Chen (M'08), Qi Zheng (M'08), Yujia Tang (M'08), Chang Lei (M'10, IBM), Yun Gu (M'11), Tao Zhou (M'12, CFFEX), Weiwei Peng (M'12, Unipay), Yin Zhang (M'12, Ebay), Wei Wang (M'12, CFFEX), Ruiqi Bu (M'13, CISCO), Zheran Fang (M'13, MicroSoft), Zhigong Li (M'13, Unity), Minyue Ni (M'14, Pingan), Liangxin Liu (M'12, Xueersi), Lang Yuan (M'14, VMWare), Dong Li (M'14), Jiao Liang (M'15, Unity), Wu Liu (M'15, SAP),
  Undergraduates: Tianhao Mao (13', IU), Danhao Guo (12',CMU), Yuxuan Liu (12', 360), Xinyi Zhang (10', UCSB), Xiaoning Du (10', NUS), Qihui Zhao (09', Baidu), Chengguang Shen (08', UCLA), Yuliang Yin (08', CMU), Cheng Sun (07', CMU), Jing Li (07', CISCO), Jin Han (02', SMU), Qiang Yan (02', SMU)




DBLP Biobliography


Gang Pan Ninghui Li Xinyu Tang Qun Ni Weidong Zhao