Weili Han      


Professor, PhD Supervisor

Software School, Fudan University, Shanghai, P. R. China



Phone:  +86-21-51355388 (office)

Fax:  +86-21-51355358

Chinese Version

[Research]     [Publications]    [Teaching]    [Links]

Brief Biography

Weili Han received his B.S. of Geochemistry, his B.E. of Computer Software at USTC in 1998, and his PhD of Computer Science and Technology at Zhejiang University in 2003. Then, he joined the faculty of Software School at Fudan University. Now, he is a full professor and deputy dean of Software School, Fudan University. He is also a deputy director member of the Expert Group of Information Security in CIE and the secretary of CCF Shanghai Chapter. From 2008 to 2009, he visited Purdue University as a visiting scholar funded by China Scholarship Council and Purdue University. His research interests are mainly in the fields of Data Systems Security, Access Control, and AI Security. He is now members of the ACM, SIGSAC, CCF, CIE.

I'm seeking for Master and PhD candidates who have strong interests in data systems security. If you are interested, feel free to drop me an email and introduce yourself!


Research Topics



Selected Research Papers

Journal Papers

  1. Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang. senDroid: Auditing Sensor Access in Android System-wide, IEEE Transactions on Dependable and Secure Computing (TDSC), 2017. (DOI: 10.1109/TDSC.2017.2768536) (paper, bib).
  2. Jiao Liang, Weili Han, Zeqing Guo, Yaoliang Chen, Chang Cao, Xiaoyang Sean Wang, Fenghua Li. DESC: Enabling Secure Data Exchange based on Smart Contracts, SCIENCE CHINA Information Sciences, 2017, (paper, bib).
  3. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang. Socialized Policy Administration, Computers & Security (COSE), 2017, 67: 232-243.(paper, bib)
  4. Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem Beyah. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords, IEEE Transactions on Dependable and Secure Computing (TDSC), 2017, 14(5): 550-564. (paper, bib)
  5. Yi Liu, Weili Han, Yin Zhang, Lulu Li, Junyu Wang, Lirong Zheng. An Internet-of-Things Solution for Food Safety and Quality Control: A Pilot Project in China, Journal of Industrial Information Integration, 2016, 3: 1-7. (paper, bib)
  6. Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu. Shadow Attacks based on Password Reuses: A Quantitative Empirical View, IEEE Transactions on Dependable and Secure Computing (TDSC), 2016, (DOI: 10.1109/TDSC.2016.2568187). (pdf, bib)
  7. Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu. Regional Patterns and Vulnerability Analysis of Chinese Web Passwords, IEEE Transactions on Information Forensics and Security (TIFS), 2016, 11 (2): 258-272. (paper, bib)
  8. Liangxing Liu, Weili Han, Tao Zhou, Xinyi Zhang. SCout: Prying into Supply Chains via a Public Query Interface, IEEE Systems Journal, 2016, 10(1): 179-188.(pdf, bib).
  9. Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang, Lirong Zheng. The Design of an Electronic Pedigree System for Food Safety, Information Systems Frontiers, 2015, 17(2): 275-287. (paper, bib)
  10. Zhibo Pang, Qiang Chen, Weili Han, Lirong Zheng. Value-Centric Design of the Internet-of-Things Solution for Food Supply Chain: Value Creation, Sensor Portfolio and Information Fusion, Information Systems Frontiers, 2015, 17(2): 289-319. (paper, bib)
  11. Zheran Fang, Weili Han, Yingjiu Li. Permission Based Android Security: Issues and Countermeasures. Computers & Security (COSE), 2014, 43: 205-218. (paper, bib)
  12. Weili Han, Zheran Fang, Laurence T. Yang, Gang Pan, Zhaohui Wu. Collaborative Policy Administration. IEEE Transactions on Parallel and Distributed Systems (TPDS), 2014, 25 (2): 498-507. (paper, bib)
  13. Weili Han, Chen Sun, Chenguang Shen, Chang Lei, Sean Shen. Dynamic Combination of Authentication Factors based on Quantified Risk and Benefit, Security and Communication Networks (SCN), 2014, 7 (2):385C396. (paper, bib)
  14. Weili Han, Ye Cao, Elisa Bertino, Jianming Yong. Using Automated Individual White-List to Protect Web Digital Identities, Expert Systems With Applications (ESWA), 2012, 39: 11861C11869.(paper, bib)
  15. Weili Han, Chang Lei. A Survey on Policy Languages in Network and Security Management, Computer Networks (COMNET), 2012, 56(1): 477C489. (paper, bib)
  16. Weili Han, Min Xu, Weidong Zhao, Guofu Li. A Trusted Decentralized Access Control Framework for the Client/Server Architecture, Journal of Network and Computer Application (JNCA), 2010, 33 (2): 76-83. (paper, bib)
  17. Weili Han, Xingdong Shi, Ronghua Chen. Process-Context Aware Matchmaking for Web Service Composition, Journal of Network and Computer Application (JNCA), 2008, Vol 31(4): 559-576. (paper, bib)

Conference Papers

  1. Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang. Unique on the Road: Re-identication of Vehicular Location-Based Metadata. In Proceedings of the 2016 International Conference on Security and Privacy in Communication Networks (SECURECOMM 2016), Oct. 10-12, Guangzhou, China.(accept rate=30/137)
  2. Minyue Ni, Yang Zhang, Weili Han, Jun Pang. An Empirical Study on User Access Control in Online Social Networks. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016), June 6-8, Shanghai, China: 13-23. (pdf, bib, accept rate = 18/55)
  3. Zeran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen. revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. In Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), May 30-June 3, Xi'an, China: 747-758.(pdf, bib, accept rate = 73/350)
  4. Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino. Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 135-145.(pdf, bib, accept rate=17/49)
  5. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni. SPA: Inviting Your Friends to Help Set Android Apps, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 221-231.(pdf, bib, accept rate=17/49)
  6. Zhigong Li, Weili Han, Wenyuan Xu. A Large-Scale Empirical Analysis of Chinese Web Passwords, In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), San Diego, August 20-22, 2014: 559-574.(pdf, bib)
  7. Weili Han, Yun Gu, Yin Zhang, Lirong Zheng. Data Driven Quantitative Trust Model for the Internet of Agricultural Things. In Proceedings of The 4th International Conference on the Internet of Things (IoT 2014), October 6-8, 2014, Cambridge, MA, USA. (paper, bib)
  8. Liangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang. Efficient General Policy Decision by Using Mutable Variable Aware Cache. In Proceedings of the 37th IEEE Computer Software and Applications Conference (COMPSAC 2013), July 22- 26, 2013, Kyoto, Japan. (paper, bib)
  9. Yin Zhang, Weili Han, Wei Wang, Chang Lei. Optimizing the Storage of Massive Electronic Pedigrees in HDFS, In Proceedings of The 3rd International Conference on the Internet of Things (IoT 2012), 2012, Wuxi, China. (paper, bib)
  10. Weili Han, Qun Ni, Hong Chen. Apply Measurable Risk to Strengthen Security of a Role-based Delegation Supporting Workflow System. In Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009), July 20-22, 2009, London, UK. (paper, bib)
  11. Ye Cao, Weili Han, Yueran Le. Anti-phishing Based on Automated Individual White-List. In Proceedings of the 4th ACM Workshop on Digital Identity Management (DIM 2008), Collocated with the 15th ACM Conference on Computer and Communications Security, 2008, Fairfax, VA, USA: 51-60. (DOI: 10.1145/1456424.1456434) (pdf, slides, bib)
More Papers@DBLP
Citations@Google Scholar


  1. Payfont: Research for Authentication Methods of Dynamical Multiple Factors, 2017.1-2017.12, 480K RMB. (PI)
  2. STCSM: Data Exchange Supporting Big Data Arena: Research for Key Technologies and Toolkits (Grant No. 16DZ1100200), 2016.7-2018.6, 19940K RMB. (co-PI, General Secretary of Project)

Professional Activities

Editor Services

Chairs/Program Committee Members for Conferences


  1. Introduction to Web Application

Summer, from 2004

for Freshman students

  2. Data Structures and Algorithm Design

Winter, from 2003

for Sophomore students

  3. Principle of Information Security

Winter, from 2004

for Master of Software Engineering

  4. Network and Computer Security

Summer, from 2010

for Graduate student



I am now luckily working with:
   Zheqing Guo (M'15), Jiao Liang (M'15), Wu Liu (M'15), Sisi Li (M'16), Chang Cao (M'16), Haoyang Jia (M'17), Dingyi Tang (M'17), Size Chen (M'17), Yimin Shen (M'17), Tianhao Mao, Zhan Shi, Yuwen He
  Masters: Xingdong Shi (M'04, Intel), Liu He (M'04), Haili Zhang (M'05, Intel), Ting Chen (M'05), Yi Wang (M'06), Ye Cao (M'07, SPD Bank), Jun Gao (M'07, Fudan), Pengpeng Huang (M'07, IBM), Jiping Zhou (M'07, CMU), Jianfei Chen (M'08), Qi Zheng (M'08), Yujia Tang (M'08), Chang Lei (M'10, IBM), Yun Gu (M'11), Tao Zhou (M'12, CFFEX), Weiwei Peng (M'12, Unipay), Yin Zhang (M'12, Ebay), Wei Wang (M'12, CFFEX), Ruiqi Bu (M'13, CISCO), Zheran Fang (M'13, MicroSoft), Zhigong Li (M'13, Unity), Minyue Ni (M'14, Pingan), Liangxin Liu (M'12, Xueersi), Lang Yuan (M'14, VMWare), Dong Li (M'14),
  Undergraduates: Danhao Guo (12',CMU), Yuxuan Liu (12', 360), Xinyi Zhang (10', UCSB), Xiaoning Du (10', NUS), Qihui Zhao (09', Baidu), Chengguang Shen (08', UCLA), Yuliang Yin (08', CMU), Cheng Sun (07', CMU), Jing Li (07', CISCO), Jin Han (02', SMU), Qiang Yan (02', SMU)




DBLP Biobliography


Gang Pan Ninghui Li Xinyu Tang Qun Ni Weidong Zhao