Lansheng Han
·Paper Publications
- [1] Jingjing Wang, Lansheng Han*(通讯作者), Wenkui Qian(通讯作者), Man Zhou. Adaptive Evaluation Model of Web Spam Based on Link Relation" in its current form for publication in Transactions on Emerging Telecommunications Technologies. Transactions on Emerging Telecommunications Technologies,2020 DOI:10.1002/ett.4047 (SCI期刊、JCR Q2、CCF C).
- [2] Man Zhou, Lansheng Han*(通讯作者), Hongwei Lu, Cai Fu. Distributed Collaborative Intrusion Detection System for Vehicular Ad Hoc Networks Based on Invariant. Computer Networks. Elsevier,DOI information: 10.1016/j.comnet.2020.107174 (SCI期刊,CCF B, JCR Q1,中科院Q2,IF3.03) .
- [3] Sajid Khan, Lansheng Han*(通讯作者),Yekui Qian(通讯作者), Hongwei Lu. Security of Multimedia Communication with Game Trick based Fast, Efficient and Robust Color/Gray-scale Image Encryption Algorithm. Transactions on Emerging Telecommunications Technologies,2020 DOI: 10.1002/ett.4034 (SCI期刊,ETT-20-0076.R1、JCR Q2、CCF C).
- [4] Man Zhou a , Lansheng Han *(通讯作者), Hongwei Lu a , Cai Fu a , Dezhi An. Cooperative malicious network behavior recognition algorithm in E-commerce. Computers & Security, Computers & Security 95 (2020) 101868.(SCI期刊,CCF B,JCR Q1,中科院Q2,IF 3.06).
- [5] LANSHENG HAN 1, (Member, IEEE), MAN ZHOU 1, YEKUI QIAN2,CAI FU1, AND DEQING ZOU. An Optimized Static Propositional Function Model to Detect Software Vulnerability. IEEE ACCESS, VOLUME 7, 2019, Digital Object Identifier 10.1109/ACCESS.2019.2943896(SCI期刊,JCR Q1,中科院Q2,CCF B IF3.58).
- [6] Sajid Khan 1,* , Lansheng Han*(通讯作者), Ghulam Mudassir 3, Bachira Guehguih 1 and Hidayat Ullah. 3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA. Entropy 2019, 21, 1075; doi:10.3390/e21111075(SCI期刊,CCF C,中科院 3区, IF 2.419).
- [7] Man Zhou, Lansheng Han*(通讯作者), Hongwei Lu, Cai Fu. Intrusion Detection System for IoT Heterogeneous Perceptual Network. Mobile Networks and Applications DOI 10.1007/ s11036-019-01483-5/ 2019.11.Springer(SCI期刊,CCF C, 中科院分区3区,JCR Q2,IF2.39).
- [8] Lansheng Han, Man Zhou, Cai Fu. Chapter 46 An Static Propositional Function Model to Detect Software Vulnerability, Springer Science and Business Media LLC Chapter46, 2019.
- [9] Nafees Ahmad, Lansheng Han*(通讯作者), Khalid Iqbal, Rashid Ahmad,Muhammad Adil Abid and Naeem Iqbal. SARM: Salah Activities Recognition Model Based on Smartphone. Electronics 2019, 8, 881; doi:10.3390/electronics8080881(SCI期刊,JCR Q1,中科院3区,CCF C类 IF 1.764).
- [10] SAJID KHAN, LANSHENG HAN*(通讯作者), HONGWEI LU, KHUSHBU KHALID BUTT, GUEHGUIH BACHIRA, AND NAIMAT-ULLAH KHAN. A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI. IEEE Access, Page81333-81350,DOI: 10.1109/ACCESS.2019.2920383(SCI期刊,JCR Q1,CCF B ,中科院2区,IF3.58).