What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Weili Han
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Is MPC Secure? Leveraging Neural Network Classifiers to Detect Data Leakage Vulnerabilities in MPC Implementations.
Guopeng Lin
Xiaoning Du
Lushan Song
Weili Han
Jin Tan
Junming Ma
Wenjing Fang
Lei Wang
2025
conf/asiaccs
On the Account Security Risks Posed by Password Strength Meters.
Ming Xu
Weili Han
Jitao Yu
Jing Liu
Xinyi Zhang
Yun Lin
Jin Song Dong
2025
conf/uss
HawkEye: Statically and Accurately Profiling the Communication Cost of Models in Multi-party Learning.
Wenqiang Ruan
Xin Lin
Ruisheng Zhou
Guopeng Lin
Shui Yu
Weili Han
2025
conf/uss
Suda: An Efficient and Secure Unbalanced Data Alignment Framework for Vertical Privacy-Preserving Machine Learning.
Lushan Song
Qizhi Zhang
Yu Lin
Haoyu Niu
Daode Zhang
Zheng Qu
Weili Han
Jue Hong
Quanwei Cai
Ye Wu
2024
journals/tifs
Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework With Privileged Parties.
Lushan Song
Zhexuan Wang
Guopeng Lin
Weili Han
2024
conf/ccs
Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization.
Guopeng Lin
Weili Han
Wenqiang Ruan
Ruisheng Zhou
Lushan Song
Bingshuai Li
Yunfeng Shao
2023
conf/uss
Improving Real-world Password Guessing Attacks via Bi-directional Transformers.
Ming Xu
Jitao Yu
Xinyi Zhang
Chuanwang Wang
Shenghao Zhang
Haoqi Wu
Weili Han
2023
conf/sp
Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy.
Wenqiang Ruan
Mingxin Xu
Wenjing Fang
Li Wang
Lei Wang
Weili Han
2022
journals/compsec
#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing.
Chuanwang Wang
Junjie Zhang
Ming Xu
Haodong Zhang
Weili Han
2022
conf/ccs
pMPL: A Robust Multi-Party Learning Framework with a Privileged Party.
Lushan Song
Jiaxuan Wang
Zhexuan Wang
Xinyu Tu
Guopeng Lin
Wenqiang Ruan
Haoqi Wu
Weili Han
2021
journals/tifs
TransPCFG: Transferring the Grammars From Short Passwords to Guess Long Passwords Effectively.
Weili Han
Ming Xu
Junjie Zhang
Chuanwang Wang
Kai Zhang
X. Sean Wang
2021
conf/ccs
Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations.
Ming Xu
Chuanwang Wang
Jitao Yu
Junjie Zhang
Kai Zhang
Weili Han
2021
conf/acsac
Digit Semantics based Optimization for Practical Password Cracking Tools.
Haodong Zhang
Chuanwang Wang
Wenqiang Ruan
Junjie Zhang
Ming Xu
Weili Han
2017
journals/compsec
Socialized policy administration.
Zeqing Guo
Weili Han
Liangxing Liu
Wenyuan Xu
Minyue Ni
Yunlei Zhao
Xiaoyang Sean Wang
2016
journals/tifs
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords.
Weili Han
Zhigong Li
Lang Yuan
Wenyuan Xu
2016
conf/ccs
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Zheran Fang
Weili Han
Dong Li
Zeqing Guo
Danhao Guo
Xiaoyang Sean Wang
Zhiyun Qian
Hao Chen
2014
journals/compsec
Permission based Android security: Issues and countermeasures.
Zheran Fang
Weili Han
Yingjiu Li
2014
conf/uss
A Large-Scale Empirical Analysis of Chinese Web Passwords.
Zhigong Li
Weili Han
Wenyuan Xu
2013
conf/ccs
Role mining algorithm evaluation and improvement in large volume android applications.
Xinyi Zhang
Weili Han
Zheran Fang
Yuliang Yin
Hossen Asiful Mustafa
2011
conf/ccs
Poster: using quantified risk and benefit to strengthen the security of information sharing.
Weili Han
Chenguang Shen
Yuliang Yin
Yun Gu
Chen Chen
2011
conf/ccs
Poster: collaborative policy administration.
Weili Han
Zheran Fang
Weifeng Chen
Wenyuan Xu
Chang Lei
Coauthors
Bingshuai Li
(1)
Chang Lei
(1)
Chen Chen
(1)
Chenguang Shen
(1)
Chuanwang Wang
(5)
Danhao Guo
(1)
Daode Zhang
(1)
Dong Li
(1)
Guopeng Lin
(5)
Hao Chen
(1)
Haodong Zhang
(2)
Haoqi Wu
(2)
Haoyu Niu
(1)
Hossen Asiful Mustafa
(1)
Jiaxuan Wang
(1)
Jin Song Dong
(1)
Jin Tan
(1)
Jing Liu
(1)
Jitao Yu
(3)
Jue Hong
(1)
Junjie Zhang
(4)
Junming Ma
(1)
Kai Zhang
(2)
Lang Yuan
(1)
Lei Wang
(1)
Lei Wang
(1)
Li Wang
(1)
Liangxing Liu
(1)
Lushan Song
(5)
Ming Xu
(5)
Ming Xu
(1)
Mingxin Xu
(1)
Minyue Ni
(1)
Qizhi Zhang
(1)
Quanwei Cai
(1)
Ruisheng Zhou
(2)
Shenghao Zhang
(1)
Shui Yu
(1)
Weifeng Chen
(1)
Weili Han
(21)
Wenjing Fang
(2)
Wenqiang Ruan
(5)
Wenyuan Xu
(2)
Wenyuan Xu
(2)
X. Sean Wang
(1)
Xiaoning Du
(1)
Xiaoyang Sean Wang
(2)
Xin Lin
(1)
Xinyi Zhang
(3)
Xinyu Tu
(1)
Ye Wu
(1)
Yingjiu Li
(1)
Yu Lin
(1)
Yuliang Yin
(2)
Yun Gu
(1)
Yun Lin
(1)
Yunfeng Shao
(1)
Yunlei Zhao
(1)
Zeqing Guo
(2)
Zheng Qu
(1)
Zheran Fang
(4)
Zhexuan Wang
(2)
Zhigong Li
(2)
Zhiyun Qian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to