profile

Weili Han      Ph.D.

 

副教授

复旦大学 软件学院

 

电子邮件:  wlhan@fudan.edu.cn

电话:  +86-21-51355388 (办公室)

传真:  +86-21-51355358

English Version



简要介绍

博士,复旦大学副教授,软件学院副院长,中国电子学会信息安全专家委员会副主任委员,中国计算机学会上海秘书长,上海市计算机学会信息安全专委会秘书,CCF YOCSEF上海副主席。 研究方向:访问控制;数字身份安全;分布式系统。 1998年毕业于中国科技大学,于2003年在浙江大学计算机系获得博士学位,同年进入复旦大学软件学院,从事教学和科研工作。 2008年9月到2009年9月,前往普渡大学计算机系访学。为国家商用密码管理局RFID工作专项组专家成员,International Journal of Communication Systems副编辑, Security and Communication Networks客座编辑。 曾参与组织多个国际重要学术会议 (SACMAT 2016本地主席;SecureCom 2013: Publicity Chair;IoT Security Workshop:与Daniel Engels共同主持;IoT 2012:任出版主席) 及担任会议程序委员会委员 (如SACMAT、ASIACCS、WWW、IEEE POLICY、ACM DIM等)。

我们研究组正在寻求对数据与系统安全具有强烈兴趣的同学作为组员。欢迎感兴趣的同学加入,有意请投简历到我的邮箱。

研究兴趣

出版

代表论文

期刊论文

  1. Yi Liu, Weili Han, Yin Zhang, Lulu Li, Junyu Wang, Lirong Zheng. An Internet-of-Things Solution for Food Safety and Quality Control: A Pilot Project in China, Journal of Industrial Information Integration, 2016. (DOI: 10.1016/j.jii.2016.06.001) (paper, bib)
  2. Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu. Shadow Attacks based on Password Reuses: A Quantitative Empirical View, IEEE Transactions on Dependable and Secure Computing (TDSC), 2016, (DOI: 10.1109/TDSC.2016.2568187). (pdf, bib)
  3. Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu. Regional Patterns and Vulnerability Analysis of Chinese Web Passwords, IEEE Transactions on Information Forensics and Security (TIFS), 11 (2), 2016, 258-272. (paper, bib)
  4. Liangxing Liu, Weili Han, Tao Zhou, Xinyi Zhang. SCout: Prying into Supply Chains via a Public Query Interface, IEEE Systems Journal, 2016, 10(1): 179-188.(pdf, bib).
  5. Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem Beyah. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords, IEEE Transactions on Dependable and Secure Computing (TDSC), 2015, (DOI: 10.1109/TDSC.2015.2481884). (paper, bib)
  6. Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang, Lirong Zheng. The Design of an Electronic Pedigree System for Food Safety, Information Systems Frontiers, 17(2): 275-287, 2015. (paper, bib)
  7. Zhibo Pang, Qiang Chen, Weili Han, Lirong Zheng. Value-Centric Design of the Internet-of-Things Solution for Food Supply Chain: Value Creation, Sensor Portfolio and Information Fusion, Information Systems Frontiers, 17(2): 289-319, 2015. (paper, bib)
  8. Zheran Fang, Weili Han, Yingjiu Li. Permission Based Android Security: Issues and Countermeasures. Computers & Security (COSE), 2014, 43: 205-218. (paper, bib)
  9. Weili Han, Zheran Fang, Laurence T. Yang, Gang Pan, Zhaohui Wu. Collaborative Policy Administration. IEEE Transactions on Parallel and Distributed Systems (TPDS), 2014, 25 (2): 498-507. (paper, bib)
  10. Weili Han, Chen Sun, Chenguang Shen, Chang Lei, Sean Shen. Dynamic Combination of Authentication Factors based on Quantified Risk and Benefit, Security and Communication Networks (SCN), 2014, 7 (2):385–396. (paper, bib)
  11. Weili Han, Ye Cao, Elisa Bertino, Jianming Yong. Using Automated Individual White-List to Protect Web Digital Identities, Expert Systems With Applications (ESWA), 2012, 39: 11861–11869.(paper bib)
  12. Weili Han, Chang Lei. A Survey on Policy Languages in Network and Security Management, Computer Networks (COMNET), 2012, 56(1): 477–489. (paper bib)
  13. Weili Han, Min Xu, Weidong Zhao, Guofu Li. A Trusted Decentralized Access Control Framework for the Client/Server Architecture, Journal of Network and Computer Application (JNCA), 2010, 33 (2): 76-83. (paper bib)
  14. Weili Han, Xingdong Shi, Ronghua Chen. Process-Context Aware Matchmaking for Web Service Composition, Journal of Network and Computer Application (JNCA), 2008, Vol 31(4): 559-576. (paper bib)

会议论文

  1. Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang. Unique on the Road: Re-identication of Vehicular Location-Based Metadata. In Proceedings of the 2016 International Conference on Security and Privacy in Communication Networks (SECURECOMM 2016), Oct. 10-12, Guangzhou, China.(accept rate=30/137)
  2. Minyue Ni, Yang Zhang, Weili Han, Jun Pang. An Empirical Study on User Access Control in Online Social Networks. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016), June 5-8, Shanghai, China: 13-23. (pdf,, bib, accepted rate=18/55)
  3. Zeran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen. revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. In Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), May 30-June 3, Xi'an, China: 747-758.(pdf, bib, accept rate = 73/350)
  4. Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino. Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 135-145.(pdf, bib)
  5. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni. SPA: Inviting Your Friends to Help Set Android Apps, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 221-231.(pdf, bib)
  6. Zhigong Li, Weili Han, Wenyuan Xu. A Large-Scale Empirical Analysis of Chinese Web Passwords, In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), San Diego, August 20-22, 2014: 559-574.(pdf, bib)
  7. Weili Han, Yun Gu, Yin Zhang, Lirong Zheng. Data Driven Quantitative Trust Model for the Internet of Agricultural Things. In Proceedings of The 4th International Conference on the Internet of Things (IoT 2014), October 6-8, 2014, Cambridge, MA, USA. (paper, bib)
  8. Liangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang. Efficient General Policy Decision by Using Mutable Variable Aware Cache. In Proceedings of the 37th IEEE Computer Software and Applications Conference (COMPSAC 2013), July 22- 26, 2013, Kyoto, Japan. (paper, bib)
  9. Yin Zhang, Weili Han, Wei Wang, Chang Lei. Optimizing the Storage of Massive Electronic Pedigrees in HDFS, In Proceedings of The 3rd International Conference on the Internet of Things (IoT 2012), 2012, Wuxi, China. (paper, bib)
  10. Weili Han, Qun Ni, Hong Chen. Apply Measurable Risk to Strengthen Security of a Role-based Delegation Supporting Workflow System. In Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009), July 20-22, 2009, London, UK. (paper bib)
  11. Ye Cao, Weili Han, Yueran Le. Anti-phishing Based on Automated Individual White-List. In Proceedings of the 4th ACM Workshop on Digital Identity Management (DIM 2008), Collocated with the 15th ACM Conference on Computer and Communications Security, 2008, Fairfax, VA, USA: 51-60. (DOI: 10.1145/1456424.1456434) (pdf, slides, bib)
更多...

书及章节

  1. Lirong Zheng, Hui Zhang, Weili Han, Xiaolin Zhou, et al. Technologies, Applications, and Governance in the Internet of Things, In Internet of Things - Global Technological and Societal Trends. From Smart Environments and Spaces to Green ICT, IERC Book 2011. 内容引用

教材

  1. 应用系统开发导论,清华大学出版社,2008 (ISBN: 9787302163695)
    书本 教案

专利

  1. 雷畅,韩伟力等。一种系统的策略冲突处理方法及策略冲突处理系统,国家发明专利。(已授权)(申请号:201210182953.5)
  2. 韩伟力等。一种量化风险和收益自适应的动态多因子认证方法,国家发明专利。(已授权)(申请号:201110419524.0)
  3. 韩伟力等。过程可信的电子履历单点生成和验证方法,国家发明专利。(已授权)(申请号:201110165971.8)
  4. 韩伟力等。协作式目标策略细化方法,国家发明专利。(已授权)(申请号:201110202953.2)
  5. 韩伟力。基于近距离无线通信手机的智能认证方法及系统,国家发明专利。(已授权)(申请号:200710039403.7)

学术活动

学术兼职

编辑

学术会议

 

教学

  1. Web应用基础

春季,自2004

大一学生

  2. 数据结构和算法设计

秋季,自2003

大二学生

  3. 信息安全工程

秋季, 自2005

工程硕士

  4. 网络与计算机安全

春季,自2010

 

所获奖励
  1. 2013 ACM上海卓越科学家提名奖
  2. Purdue大学公派访问学者, 2008。合作教授: Prof. Ninghui Li
  3. 复旦大学教学贡献奖, 2007

 

学术链接

CERIAS

CiteSeer@PSU

DBLP Biobliography

朋友圈

Gang Pan Ninghui Li Xinyu Tang Qun Ni