default search action
Lansheng Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Haili Sun, Yan Huang, Lansheng Han, Cai Fu, Hongle Liu, Xiang Long:
MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network. Comput. Secur. 139: 103570 (2024) - [j36]Haili Sun, Yan Huang, Chunjie Zhou, Lansheng Han, Hongle Liu, Juan Chen, Xin Li:
Space Decoupled Prototype Learning for Few-Shot Attack Detection in Cyber-Physical Systems. IEEE Trans. Ind. Informatics 20(10): 12350-12362 (2024) - [j35]Shuai Jiang, Cai Fu, Shuai He, Jianqiang Lv, Lansheng Han, Hong Hu:
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection. IEEE Trans. Software Eng. 50(10): 2485-2497 (2024) - [c29]Xiaowei Guo, Cai Fu, Juan Chen, Hongle Liu, Lansheng Han, Wenjin Li:
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge. ISSTA 2024: 199-209 - [i11]Mingrui Ma, Lansheng Han, Chunjie Zhou:
Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples. CoRR abs/2402.07408 (2024) - [i10]Mingrui Ma, Lansheng Han, Chunjie Zhou:
Research and application of Transformer based anomaly detection model: A literature review. CoRR abs/2402.08975 (2024) - [i9]Haili Sun, Yan Huang, Lansheng Han, Cai Fu, Chunjie Zhou:
Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems. CoRR abs/2403.02616 (2024) - [i8]Mingrui Ma, Lansheng Han, Chunjie Zhou:
Research and application of artificial intelligence based webshell detection model: A literature review. CoRR abs/2405.00066 (2024) - [i7]Zeqing Qin, Yiwei Wu, Lansheng Han:
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification. CoRR abs/2409.07407 (2024) - 2023
- [j34]Mingrui Ma, Lansheng Han, Chunjie Zhou:
BTAD: A binary transformer deep neural network model for anomaly detection in multivariate time series data. Adv. Eng. Informatics 56: 101949 (2023) - [j33]Yuanhai Fan, Chuanhao Wan, Cai Fu, Lansheng Han, Hao Xu:
VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs. Comput. Secur. 130: 103247 (2023) - [c28]Wei Liao, Lansheng Han, Peng Chen:
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography. ISPA/BDCloud/SocialCom/SustainCom 2023: 72-79 - [i6]Haili Sun, Yan Huang, Lansheng Han, Chunjie Zhou:
Few-shot Detection of Anomalies in Industrial Cyber-Physical System via Prototypical Network and Contrastive Learning. CoRR abs/2302.10601 (2023) - [i5]Haili Sun, Yan Huang, Lansheng Han, Cai Fu, Hongle Liu, Xiang Long:
MTS-DVGAN: Anomaly Detection in Cyber-Physical Systems using a Dual Variational Generative Adversarial Network. CoRR abs/2311.02378 (2023) - 2022
- [j32]Shuai Jiang, Cai Fu, Yekui Qian, Shuai He, Jianqiang Lv, Lansheng Han:
IFAttn: Binary code similarity analysis based on interpretable features with attention. Comput. Secur. 120: 102804 (2022) - [j31]Mingrui Ma, Lansheng Han, Yekui Qian:
CVDF DYNAMIC - A Dynamic Fuzzy Testing Sample Generation Framework Based on BI-LSTM and Genetic Algorithm. Sensors 22(3): 1265 (2022) - [j30]Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu, Yekui Qian:
Attack detection based on invariant state set for SDN-enabled vehicle platoon control system. Veh. Commun. 34: 100417 (2022) - [c27]Kai Chen, Jingxian Zhu, Lansheng Han, Shenghui Li, Pengyi Gao:
A Novel Network Security Situation Awareness Model for Advanced Persistent Threat. DSC 2022: 9-16 - [c26]Kai Chen, Jietong Su, Lansheng Han, Shenghui Li, Pengyi Gao:
Hybrid butterfly optimization algorithm-based support vector machine for botnet command-and-control channel detection. DSC 2022: 314-321 - [c25]Haili Sun, Yan Huang, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou:
Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity. TrustCom 2022: 435-440 - [i4]Haili Sun, Yan Huang, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou:
Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity. CoRR abs/2209.12482 (2022) - [i3]Xiang Long, Yan Huang, Zhendong Liu, Lansheng Han, Haili Sun, Jingyuan He:
WebCrack: Dynamic Dictionary Adjustment for Web Weak Password Detection based on Blasting Response Event Discrimination. CoRR abs/2210.14582 (2022) - 2021
- [j29]Sajid Khan, Lansheng Han, Yekui Qian, Hongwei Lu, Shi Meng Jiao:
Security of multimedia communication with game trick based fast, efficient, and robust color-/gray-scale image encryption algorithm. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j28]Jingjing Wang, Lansheng Han, Man Zhou, Wenkui Qian, Dezhi An:
Adaptive evaluation model of web spam based on link relation. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j27]Shuai Jiang, Hong Yao, Cai Fu, Yekui Qian, Lansheng Han:
Function-level obfuscation detection method based on Graph Convolutional Networks. J. Inf. Secur. Appl. 61: 102953 (2021) - [j26]Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu:
Intrusion Detection System for IoT Heterogeneous Perceptual Network. Mob. Networks Appl. 26(4): 1461-1474 (2021) - 2020
- [j25]Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu:
Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant. Comput. Networks 172: 107174 (2020) - [j24]Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu, Dezhi An:
Cooperative malicious network behavior recognition algorithm in E-commerce. Comput. Secur. 95: 101868 (2020) - [c24]Chenglong Yang, Cai Fu, Yekui Qian, Hong Yao, Guanyun Feng, Lansheng Han:
Deep Learning-Based Reverse Method of Binary Protocol. SPDE 2020: 606-624 - [i2]Jianhao Ding, Lansheng Han:
A Fixed point view: A Model-Based Clustering Framework. CoRR abs/2002.08032 (2020) - [i1]Xiaodong Qi, Lansheng Han:
Gödel's Sentence Is An Adversarial Example But Unsolvable. CoRR abs/2002.10703 (2020)
2010 – 2019
- 2019
- [j23]Sajid Khan, Lansheng Han, Hongwei Lu, Khushbu Khalid Butt, Guehguih Bachira, Naimat-Ullah Khan:
A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI. IEEE Access 7: 81333-81350 (2019) - [j22]Lansheng Han, Man Zhou, Yekui Qian, Cai Fu, Deqing Zou:
An Optimized Static Propositional Function Model to Detect Software Vulnerability. IEEE Access 7: 143499-143510 (2019) - [j21]Lansheng Han, Man Zhou, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu:
Targeting malware discrimination based on reversed association task. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j20]Sajid Khan, Lansheng Han, Ghulam Mudassir, Guehguih Bachira, Hidayat Ullah:
3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA. Entropy 21(11): 1075 (2019) - [j19]Cai Fu, Chenchen Peng, Xiao-Yang Liu, Laurence T. Yang, Jia Yang, Lansheng Han:
Search engine: The social relationship driving power of Internet of Things. Future Gener. Comput. Syst. 92: 972-986 (2019) - [j18]Lansheng Han, Man Zhou, Wenjing Jia, Zakaria Dalil, Xingbo Xu:
Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 476: 491-504 (2019) - [c23]Deliang Xu, Zewei Cen, Cai Fu, Tao Liu, Guohui Li, Lansheng Han, Zhaokang Ke:
A live migration strategy for virtual encryption card equipment. HP3C 2019: 106-112 - 2018
- [j17]Lansheng Han, Yongquan Cui, Congying Dou, Nan Du, Shuxia Han, Jingmao You:
Equilibrium Index and Core Node Set of New Social Networks. IEEE Access 6: 9059-9069 (2018) - [j16]Lansheng Han, Songsong Liu, Shuxia Han, Wenjing Jia, Jingwei Lei:
Owner based malware discrimination. Future Gener. Comput. Syst. 80: 496-504 (2018) - [j15]Jianhao Ding, Lansheng Han, Dan Li:
An adaptive control momentum method as an optimizer in the cloud. Future Gener. Comput. Syst. 89: 192-200 (2018) - 2017
- [j14]Dezhang Kong, Cai Fu, Jia Yang, Deliang Xu, Lansheng Han:
The Impact of the Collective Influence of Search Engines on Social Networks. IEEE Access 5: 24920-24930 (2017) - [j13]Min Li, Cai Fu, Xiao-Yang Liu, Jia Yang, Tianqing Zhu, Lansheng Han:
Evolutionary virus immune strategy for temporal networks based on community vitality. Future Gener. Comput. Syst. 74: 276-290 (2017) - [j12]Zili Xiong, Lansheng Han, Xingbo Xu, Cai Fu, Buyu Liu:
基于博弈的无线传感器网络入侵检测模型 (Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory). 计算机科学 44(Z6): 326-332 (2017) - [c22]Lansheng Han, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu:
Malware Discrimination Based on Reversed Association Task. TrustCom/BigDataSE/ICESS 2017: 120-127 - 2016
- [j11]Tao Wang, Lansheng Han, Cai Fu, Deqing Zou, Ming Liu:
软件漏洞静态检测模型及检测框架 (Static Detection Model and Framework for Software Vulnerability). 计算机科学 43(5): 80-86 (2016) - [c21]Hong Yao, Cai Fu, Qingfeng Huang, Zhicun Fang, JieHua Zeng, Lansheng Han:
Communities Evolution Analysis Based on Events in Dynamic Complex Network. DASC/PiCom/DataCom/CyberSciTech 2016: 497-503 - [c20]Lansheng Han, Changhua Sun, Mengxiao Qian, Shuxia Han, Hamza Kwisaba:
Group Assist Recommendation Model Based on Intelligent Mobile Terminals - GARMIT. MobiWIS 2016: 416-430 - [c19]Zonghao Guo, Ou Wei, Peng Yu, Lansheng Han, Weiming Wu:
Model Checking Probabilistic Network Propagation Protection Strategies. Trustcom/BigDataSE/ISPA 2016: 354-361 - 2015
- [j10]Nan Du, Lansheng Han, Cai Fu, Zhongke Zhang, Ming Liu:
基于相识度的恶意代码检测 (Detection of Malware Code Based on Acquaintance Degree). 计算机科学 42(1): 187-192 (2015) - [c18]Cai Fu, Li Min, Jia Yang, Deliang Xu, Xiaoyang Liu, Lansheng Han:
Evolutionary Virus Immune Strategy Based on Community Vitality. CIT/IUCC/DASC/PICom 2015: 1725-1732 - [c17]Jia Yang, Cai Fu, Deliang Xu, Lansheng Han, Xiao-Yang Liu:
Search Engine: A Hidden Power for Virus Propagation in Community Networks. CSCloud 2015: 87-92 - [c16]Changming Liu, Cai Fu, Deliang Xu, Lin Sun, Lansheng Han:
An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery. ICA3PP (1) 2015: 730-743 - [c15]Rui Ye, Cai Fu, Lansheng Han, Deliang Xu:
Multidimensional Trust Evaluation Model Based on Redemption and Data Aggregation. SKG 2015: 212-216 - 2014
- [c14]Cai Fu, Kang Zhang, Zhicun Fang, Lansheng Han, Jing Chen:
K-clique community detection based on union-find. CITS 2014: 1-5 - 2013
- [j9]Cai Fu, Qingfeng Huang, Lansheng Han, Li Shen, Xiaoyang Liu:
Virus propagation power of the dynamic network. EURASIP J. Wirel. Commun. Netw. 2013: 210 (2013) - [j8]Cai Fu, Min Li, Deqing Zou, Shuyan Qu, Lansheng Han, James Hyuk Park:
Community Vitality in Dynamic Temporal Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j7]Guozheng Hu, Lansheng Han, Zhanqing Wang, Xiangsheng Xia:
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model. Inf. Sci. 247: 174-187 (2013) - [j6]Liang Chen, Lansheng Han, Jiandu Jing, Dongping Hu:
A post-quantum provable data possession protocol in cloud. Secur. Commun. Networks 6(5): 658-667 (2013) - [c13]Aihua Peng, Lansheng Han, Yanan Yu, Nan Du, Mingquan Li:
Algebra-Based Behavior Identification of Trojan Horse. CSS 2013: 323-337 - [c12]Cai Fu, Deliang Xu, Lansheng Han, Jingfang Xu, Zhicun Fang:
Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN. CSS 2013: 429-440 - [c11]Cai Fu, Yongquan Cui, Lansheng Han, Zhicun Fang:
Projection Pursuit Based Wormhole Detection in Ad Hoc Network. HPCC/EUC 2013: 1315-1322 - [c10]Ou Ruan, Cai Fu, Jing Zhou, Lansheng Han, Xiaoyang Liu:
Efficient Fair UC-Secure Two-Party Computation on Committed Inputs. TrustCom/ISPA/IUCC 2013: 544-551 - 2012
- [j5]Lansheng Han, Xiao Qu, Yuan Li, Tao Yin:
The Probability of Trojan Attacks on Multi-level Security Strategy based Network. J. Networks 7(2): 300-304 (2012) - [j4]Lansheng Han, Cai Fu, Deqing Zou, Changhoon Lee, Wenjing Jia:
Task-based behavior detection of illegal codes. Math. Comput. Model. 55(1-2): 80-86 (2012) - 2011
- [j3]Mengsong Zou, Lansheng Han, Ming Liu, Qiwen Liu:
Virus Detection Method based on Behavior Resource Tree. J. Inf. Process. Syst. 7(1): 173-186 (2011) - [j2]Cai Fu, Xiang Gao, Ming Liu, Xiaoyang Liu, Lansheng Han, Jing Chen:
GRAP: Grey risk assessment based on projection in ad hoc networks. J. Parallel Distributed Comput. 71(9): 1249-1260 (2011) - 2010
- [c9]Cai Fu, Jihang Ye, Li Zhang, Yunhe Zhang, Lansheng Han:
A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks. UIC/ATC Workshops 2010: 154-159
2000 – 2009
- 2009
- [j1]Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou:
Sub-connection Based Isolation Against Network Virus. J. Digit. Content Technol. its Appl. 3(1): 110-122 (2009) - [c8]Ming Liu, Lansheng Han, Mengsong Zou, Qiwen Liu:
An Evaluating Model for Anti-virus Ability Based on AHP. CSE (1) 2009: 394-398 - [c7]Xiaoyang Liu, Cai Fu, Jiandong Yang, Lansheng Han:
Grey Model-Enhanced Risk Assessment and Prediction for P2P Nodes. FCST 2009: 681-685 - [c6]Cong Zheng, Lansheng Han, Jihang Ye, Mengsong Zou, Qiwen Liu:
A Fuzzy Comprehensive Evaluation Model for Harms of Computer Virus. MASS 2009: 708-713 - 2007
- [c5]Lansheng Han, Shuxia Han, Bing Peng, Varney Washington:
Fuzzy Tracing the Source of Net-Virus. ICFIE 2007: 50-58 - [c4]Lansheng Han, Shuxia Han, Min Yang:
The Epidemic Threshold of a More General Epidemic Spreading Model for Network Viruses. ICNC (2) 2007: 66-69 - 2006
- [c3]Lansheng Han, Varney Washington, Yuanbo Wang, Shuxia Han:
Tracing the Source of Net-Virus within a Subnet. CSCWD 2006: 952-956 - [c2]Lansheng Han, Fan Hong, Bing Peng:
Network Based Immunization Against Computer Virus. FCST 2006: 79-82 - 2005
- [c1]Lansheng Han, Hui Liu, Baffour Kojo Asiedu:
Analytic Model for Network Viruses. ICNC (3) 2005: 903-910
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint