profile

Weili Han      

 

教授,博导

复旦大学 软件学院

 

电子邮件:  wlhan@fudan.edu.cn

电话:  +86-21-51355388 (办公室)

传真:  +86-21-51355358

English Version



简要介绍

博士,复旦大学教授,软件学院副院长,中国电子学会信息安全专家委员会副主任委员,上海市计算机学会信息安全专委会秘书。 研究方向:数据系统安全;访问控制;人工智能安全。 1998年毕业于中国科技大学,于2003年在浙江大学计算机系获得博士学位,同年进入复旦大学软件学院,从事教学和科研工作。 2008年9月到2009年9月,前往普渡大学计算机系访学。为国家商用密码管理局RFID工作专项组专家成员,International Journal of Communication Systems副编辑, Security and Communication Networks客座编辑。 曾参与组织多个国际重要学术会议 (SACMAT 2016本地主席;IoT 2012:任出版主席) 及担任会议程序委员会委员 (如SACMAT、ASIACCS、WWW、IEEE POLICY、ACM DIM等)。

我们研究组正在寻求对数据系统安全具有强烈兴趣的同学作为组员。欢迎感兴趣的同学加入,有意请投简历到我的邮箱。

研究兴趣

出版

代表论文

期刊论文

  1. Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang. senDroid: Auditing Sensor Access in Android System-wide, IEEE Transactions on Dependable and Secure Computing (TDSC), 2017. (DOI: 10.1109/TDSC.2017.2768536) (paper, bib).
  2. Jiao Liang, Weili Han, Zeqing Guo, Yaoliang Chen, Chang Cao, Xiaoyang Sean Wang, Fenghua Li. DESC: Enabling Secure Data Exchange based on Smart Contracts, SCIENCE CHINA Information Sciences, 2017, (paper, bib).
  3. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang. Socialized Policy Administration, Computers & Security (COSE), 2017, 67: 232-243.(paper, bib)
  4. Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, Raheem Beyah. Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords, IEEE Transactions on Dependable and Secure Computing (TDSC), 2017, 14(5): 550-564. (paper, bib)
  5. Yi Liu, Weili Han, Yin Zhang, Lulu Li, Junyu Wang, Lirong Zheng. An Internet-of-Things Solution for Food Safety and Quality Control: A Pilot Project in China, Journal of Industrial Information Integration, 2016, 3: 1-7. (paper, bib)
  6. Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu. Shadow Attacks based on Password Reuses: A Quantitative Empirical View, IEEE Transactions on Dependable and Secure Computing (TDSC), 2016, (DOI: 10.1109/TDSC.2016.2568187). (pdf, bib)
  7. Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu. Regional Patterns and Vulnerability Analysis of Chinese Web Passwords, IEEE Transactions on Information Forensics and Security (TIFS), 11 (2), 2016, 258-272. (paper, bib)
  8. Liangxing Liu, Weili Han, Tao Zhou, Xinyi Zhang. SCout: Prying into Supply Chains via a Public Query Interface, IEEE Systems Journal, 2016, 10(1): 179-188.(pdf, bib).
  9. Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang, Lirong Zheng. The Design of an Electronic Pedigree System for Food Safety, Information Systems Frontiers, 17(2): 275-287, 2015. (paper, bib)
  10. Zhibo Pang, Qiang Chen, Weili Han, Lirong Zheng. Value-Centric Design of the Internet-of-Things Solution for Food Supply Chain: Value Creation, Sensor Portfolio and Information Fusion, Information Systems Frontiers, 17(2): 289-319, 2015. (paper, bib)
  11. Zheran Fang, Weili Han, Yingjiu Li. Permission Based Android Security: Issues and Countermeasures. Computers & Security (COSE), 2014, 43: 205-218. (paper, bib)
  12. Weili Han, Zheran Fang, Laurence T. Yang, Gang Pan, Zhaohui Wu. Collaborative Policy Administration. IEEE Transactions on Parallel and Distributed Systems (TPDS), 2014, 25 (2): 498-507. (paper, bib)
  13. Weili Han, Chen Sun, Chenguang Shen, Chang Lei, Sean Shen. Dynamic Combination of Authentication Factors based on Quantified Risk and Benefit, Security and Communication Networks (SCN), 2014, 7 (2):385–396. (paper, bib)
  14. Weili Han, Ye Cao, Elisa Bertino, Jianming Yong. Using Automated Individual White-List to Protect Web Digital Identities, Expert Systems With Applications (ESWA), 2012, 39: 11861–11869.(paper bib)
  15. Weili Han, Chang Lei. A Survey on Policy Languages in Network and Security Management, Computer Networks (COMNET), 2012, 56(1): 477–489. (paper bib)
  16. Weili Han, Min Xu, Weidong Zhao, Guofu Li. A Trusted Decentralized Access Control Framework for the Client/Server Architecture, Journal of Network and Computer Application (JNCA), 2010, 33 (2): 76-83. (paper bib)
  17. Weili Han, Xingdong Shi, Ronghua Chen. Process-Context Aware Matchmaking for Web Service Composition, Journal of Network and Computer Application (JNCA), 2008, Vol 31(4): 559-576. (paper bib)

会议论文

  1. Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang. Unique on the Road: Re-identication of Vehicular Location-Based Metadata. In Proceedings of the 2016 International Conference on Security and Privacy in Communication Networks (SECURECOMM 2016), Oct. 10-12, Guangzhou, China.(accept rate=30/137)
  2. Minyue Ni, Yang Zhang, Weili Han, Jun Pang. An Empirical Study on User Access Control in Online Social Networks. In Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016), June 5-8, Shanghai, China: 13-23. (pdf,, bib, accepted rate=18/55)
  3. Zeran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen. revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. In Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), May 30-June 3, Xi'an, China: 747-758.(pdf, bib, accept rate = 73/350)
  4. Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino. Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 135-145.(pdf, bib)
  5. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni. SPA: Inviting Your Friends to Help Set Android Apps, In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015), June 1-3, 2015, Vienna, Austria: 221-231.(pdf, bib)
  6. Zhigong Li, Weili Han, Wenyuan Xu. A Large-Scale Empirical Analysis of Chinese Web Passwords, In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), San Diego, August 20-22, 2014: 559-574.(pdf, bib)
  7. Weili Han, Yun Gu, Yin Zhang, Lirong Zheng. Data Driven Quantitative Trust Model for the Internet of Agricultural Things. In Proceedings of The 4th International Conference on the Internet of Things (IoT 2014), October 6-8, 2014, Cambridge, MA, USA. (paper, bib)
  8. Liangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang. Efficient General Policy Decision by Using Mutable Variable Aware Cache. In Proceedings of the 37th IEEE Computer Software and Applications Conference (COMPSAC 2013), July 22- 26, 2013, Kyoto, Japan. (paper, bib)
  9. Yin Zhang, Weili Han, Wei Wang, Chang Lei. Optimizing the Storage of Massive Electronic Pedigrees in HDFS, In Proceedings of The 3rd International Conference on the Internet of Things (IoT 2012), 2012, Wuxi, China. (paper, bib)
  10. Weili Han, Qun Ni, Hong Chen. Apply Measurable Risk to Strengthen Security of a Role-based Delegation Supporting Workflow System. In Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009), July 20-22, 2009, London, UK. (paper bib)
  11. Ye Cao, Weili Han, Yueran Le. Anti-phishing Based on Automated Individual White-List. In Proceedings of the 4th ACM Workshop on Digital Identity Management (DIM 2008), Collocated with the 15th ACM Conference on Computer and Communications Security, 2008, Fairfax, VA, USA: 51-60. (DOI: 10.1145/1456424.1456434) (pdf, slides, bib)
更多...

在研项目

  1. 英国Payfont公司合作项目:动态多因子身份认证方法研究,2017.1-2017.12, 48万。(项目负责人)
  2. 上海市科委重大项目:支持数据交易的大数据试验场关键技术与工具研制(项目编号:16DZ1100200), 2016.7-2018.6, 1994万。(项目总体组秘书长)

学术活动

学术兼职

编辑

学术会议

 

教学

  1. Web应用基础

春季,自2004

大一学生

  2. 数据结构和算法设计

秋季,自2003

大二学生

  3. 信息安全工程

秋季, 自2005

工程硕士

  4. 网络与计算机安全

春季,自2010

 

所获奖励
  1. 上海市计算机学会信息安全最佳论文奖(2014-2016)
  2. 2013 ACM上海卓越科学家提名奖
  3. Purdue大学公派访问学者, 2008。合作教授: Prof. Ninghui Li
  4. 复旦大学教学贡献奖, 2007

 

学术链接

CERIAS

CiteSeer@PSU

DBLP Biobliography

朋友圈

Gang Pan Ninghui Li Xinyu Tang Qun Ni