Lansheng Han
·Paper Publications
- [31] Liu Q, Han L S*(Correspond author), Zou M.S. Dynamic parameter branching process model of worm propagation[C]. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE Xplore, 2009:238-244..
- [32] Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou. Sub-connection Based Isolation Against Network Virus. International Journal of Digital Content Technology and its Applications(J), Volume 3, Number 1, March 2009, pp. 110-122(EI期刊).
- [33] Han Lansheng, Hong Fan, Asiedu Baffour Kojo. Least Privileges and Role’s Inheritance of RBAC. Wuhan University Journal of Natural Sciences,11(1) 2006,185-187.(EI期刊).
- [34] 付才,洪亮,彭冰,韩兰胜,徐兰芳. 移动自组网中非完全信息节点风险评估.计算机学报, 32(4),2009: p 805-816(EI) .
- [35] Ahmad, Nafees; Iqbal, Khalid; Han, Lansheng*(通讯作者); Iqbal, Naeem; Abid, Muhammad Adil. Zone Based Lossy Image Compression Using Discrete Wavelet and Discrete Cosine Transformations Security and Privacy in New Computing Environments International Conference, SPNCE 2019, EI/ LNICST/Springer, 2019,Pages:731-742国际会议.
- [36] Lansheng Han, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu. Malware Discrimination Based on Reversed Association Task. IEEE CPS Proceedings of Trustcom2017, The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17) Sydney, Australia, August 1 - 4, 2017(EI,CCF的C类国际会议).
- [37] Lansheng Han, Changhua Sun, Mengxiao Qian, Shuxia Han, and Hamza Kwisaba. Group assist recommendation model based on intelligent mobile terminals-GARMIT. the l3th International Conference on Mobile Web and Intelligent Information Systems (MobiWis 2016) Vienna, Austria, 22-24 Aug. 2016 Published by Lecture Notes in Computer Science, Springer (EI).
- [38] Qian Yu, Lansheng Han*(通讯作者), Tinghui Dong, Cai Fu, Ming Liu. Reverse Technique of Malicious Obfuscated Binary Code Based on Control Flow Graph, Proceeding of ICNC-FSKD 2014, published by DEStech Publications, 17602-4967, U.S.A. August 22-24, 2014 Xiamen. .
- [39] Han Lansheng, Pan Haiqing, Yang Ziqi,etc. Analysis of Trojan Attacks on Multi-level Security Network by Information Flow Path. IEEE Proc. of The International Conference on Multimedia Information Networking and Security (MINES 2013) Oct.3-5. Beijing . .
- [40] Aihua Peng , Lansheng Han*(correspond author), Yanan Yu , and Mingquan Li. Algebra-based Behavior Identification of Trojan Horse. The 5th International Symposium on Cyberspace Safety and Security (CSS 2013))Zhangjiajie, China, November 13-15, 2013. .