Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion Z Pang, Q Chen, W Han, L Zheng Information Systems Frontiers, 1-31, 2012 | 385 | 2012 |
Anti-phishing based on automated individual white-list Y Cao, W Han, Y Le Proceedings of the 4th ACM workshop on Digital identity management, 51-60, 2008 | 243 | 2008 |
Permission based Android security: Issues and countermeasures Z Fang, W Han, Y Li computers & security 43, 205-218, 2014 | 189 | 2014 |
Geochemical and geochronological constraints on the suture location between the North and South China blocks in the Dabie Orogen, Central China SG Li, F Huang, YH Nie, WL Han, G Long, HM Li, SQ Zhang, ZH Zhang Physics and Chemistry of the Earth, Part A: Solid Earth and Geodesy 26 (9 …, 2001 | 158 | 2001 |
An Internet-of-Things solution for food safety and quality control: A pilot project in China Y Liu, W Han, Y Zhang, L Li, J Wang, L Zheng Journal of Industrial Information Integration 3, 1-7, 2016 | 157 | 2016 |
A survey on policy languages in network and security management W Han, C Lei Computer Networks 56 (1), 477-489, 2012 | 150 | 2012 |
A robust detection of the sybil attack in urban vanets C Chen, X Wang, W Han, B Zang 2009 29th IEEE International Conference on Distributed Computing Systems …, 2009 | 144 | 2009 |
A {Large-Scale} Empirical Analysis of Chinese Web Passwords Z Li, W Han, W Xu 23rd USENIX Security Symposium (USENIX Security 14), 559-574, 2014 | 138 | 2014 |
Content recommendation system based on private dynamic user profile T Chen, WL Han, HD Wang, YX Zhou, B Xu, BY Zang 2007 International conference on machine learning and cybernetics 4, 2112-2118, 2007 | 114 | 2007 |
An access control language for a general provenance model Q Ni, S Xu, E Bertino, R Sandhu, W Han Secure Data Management, 68-88, 2009 | 100 | 2009 |
Application-specific digital forensics investigative model in internet of things (iot) T Zia, P Liu, W Han Proceedings of the 12th International Conference on Availability …, 2017 | 96 | 2017 |
Using automated individual white-list to protect web digital identities W Han, Y Cao, E Bertino, J Yong Expert Systems with Applications 39 (15), 11861-11869, 2012 | 85 | 2012 |
Technologies, applications, and governance in the internet of things L Zheng, H Zhang, W Han, X Zhou, J He, Z Zhang, Y Gu, J Wang Internet of Things-Global Technological and Societal Trends from Smart …, 2022 | 79 | 2022 |
Zero-sum password cracking game: A large-scale empirical study on the crackability, correlation, and security of passwords S Ji, S Yang, X Hu, W Han, Z Li, R Beyah IEEE transactions on dependable and secure computing 14 (5), 550-564, 2015 | 65 | 2015 |
Shadow attacks based on password reuses: A quantitative empirical analysis W Han, Z Li, M Ni, G Gu, W Xu IEEE Transactions on Dependable and Secure Computing 15 (2), 309-320, 2016 | 55 | 2016 |
Regional patterns and vulnerability analysis of chinese web passwords W Han, Z Li, L Yuan, W Xu IEEE Transactions on Information Forensics and Security 11 (2), 258-272, 2015 | 55 | 2015 |
加快新工科建设, 推进工程教育改革创新——“综合性高校工程教育发展战略研讨会” 综述 胡波, 冯辉, 韩伟力, 徐雷 复旦教育论坛, 20-28, 2017 | 50 | 2017 |
FETMS: Fast and efficient trust management scheme for information-centric networking in Internet of Things W Fang, M Xu, C Zhu, W Han, W Zhang, JJPC Rodrigues IEEE access 7, 13476-13485, 2019 | 44 | 2019 |
The design of an electronic pedigree system for food safety W Han, Y Gu, W Wang, Y Zhang, Y Yin, J Wang, LR Zheng Information Systems Frontiers, 1-13, 2012 | 41 | 2012 |
Context-sensitive access control model and implementation W Han, J Zhang, X Yao The Fifth International Conference on Computer and Information Technology …, 2005 | 40 | 2005 |