


default search action
Zhen Han 0001
Person information
- affiliation: Beijing Jiaotong University, Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, China
- affiliation (PhD 1991): China Academy of Engineering Physics, Beijing, China
Other persons with the same name
- Zhen Han — disambiguation page
- Zhen Han 0002
— Wuhan University, National Engineering Research Center for Multimedia Software, School of Computer Science, China
- Zhen Han 0003 — LMU Munich, Ludwig Maximilian University of Munich, Munich Center for Machine Learning, Germany (and 1 more)
- Zhen Han 0004
— China North Vehicle Research Institute, CNVRI, Chinese Scholartree Ridge State Key Laboratory, Beijing, China (and 1 more)
- Zhen Han 0005
— Xidian University, School of Telecommunication Engineering, Xi'an, China
- Zhen Han 0006
— Zhejiang International Studies University, Department of Physical Education, Hangzhou, China
- Zhen Han 0007 — East China Normal University, Software Engineering Institute, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Xiangrui Xu
, Pengrui Liu
, Yiwen Zhao
, Lei Han
, Wei Wang
, Yongsheng Zhu, Chongzhen Zhang, Bin Wang
, Jian Shen
, Zhen Han
:
Enhancing Privacy in Distributed Intelligent Vehicles With Information Bottleneck Theory. IEEE Internet Things J. 12(5): 4914-4921 (2025) - [j31]Xiangrui Xu
, Wei Wang
, Zheng Chen, Bin Wang
, Chao Li, Li Duan
, Zhen Han, Yufei Han:
Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems. IEEE Trans. Dependable Secur. Comput. 22(2): 1537-1550 (2025) - [j30]Guorong Chen
, Chao Li
, Wei Wang
, Li Duan
, Bin Wang
, Zhen Han
, Xiangliang Zhang
:
FairReward: Towards Fair Reward Distribution Using Equity Theory in Blockchain-Based Federated Learning. IEEE Trans. Dependable Secur. Comput. 22(2): 1612-1626 (2025) - [i3]Xuzeng Li, Tao Zhang, Jian Wang, Zhen Han, Jiqiang Liu, Jiawen Kang, Dusit Niyato, Abbas Jamalipour:
Achieving Network Resilience through Graph Neural Network-enabled Deep Reinforcement Learning. CoRR abs/2501.11074 (2025) - 2024
- [j29]Xiangyu Wei
, Guorong Chen, Yongsheng Zhu
, Fuqiang Hu, Chongzhen Zhang, Zhen Han
, Wei Wang
:
FedHGL: Cross-Institutional Federated Heterogeneous Graph Learning for IoT. IEEE Internet Things J. 11(15): 25590-25599 (2024) - [j28]Yalun Wu
, Yingxiao Xiang
, Endong Tong
, Yuqi Ye
, Zhibo Cui
, Yunzhe Tian
, Lejun Zhang
, Jiqiang Liu
, Zhen Han
, Wenjia Niu
:
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Netw. 38(3): 63-69 (2024) - [j27]Xiangyu Wei
, Wei Wang
, Chongsheng Zhang
, Weiping Ding
, Bin Wang
, Yaguan Qian
, Zhen Han
, Chunhua Su
:
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks. ACM Trans. Knowl. Discov. Data 18(8): 204:1-204:25 (2024) - [c17]Yalun Wu, Qiong Li, Yingxiao Xiang, Jinkai Zheng, Xingyu Wu, Zhen Han, Jiqiang Liu, Wenjia Niu:
Nightfall Deception: A Novel Backdoor Attack on Traffic Sign Recognition Models via Low-Light Data Manipulation. ADMA (3) 2024: 433-445 - 2023
- [j26]Jing Bai
, Xiaolin Chang
, Fumio Machida
, Lili Jiang
, Zhen Han
, Kishor S. Trivedi
:
Impact of Service Function Aging on the Dependability for MEC Service Function Chain. IEEE Trans. Dependable Secur. Comput. 20(4): 2811-2824 (2023) - [j25]Xiangrui Xu
, Pengrui Liu, Wei Wang
, Hongliang Ma, Bin Wang
, Zhen Han
, Yufei Han:
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(6): 4551-4563 (2023) - [j24]Xudong He
, Jian Wang
, Jiqiang Liu
, Weiping Ding
, Zhen Han
, Bin Wang
, Jamel Nebhen
, Wei Wang
:
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2643-2655 (2023) - 2022
- [j23]Longyang Yi
, Yangyang Sun
, Bin Wang, Li Duan
, Hongliang Ma, Bin Wang, Zhen Han, Wei Wang
:
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance. Int. J. Intell. Syst. 37(12): 11522-11546 (2022) - [j22]Jing Bai, Xiaolin Chang
, Fumio Machida, Zhen Han, Yang Xu, Kishor S. Trivedi:
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective. Peer-to-Peer Netw. Appl. 15(4): 1923-1938 (2022) - 2021
- [j21]Si Chen
, Lin Li
, Wenyu Zhang
, Xiaolin Chang
, Zhen Han
:
BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System. IEEE Access 9: 30124-30134 (2021) - [j20]Jing Bai
, Xiaolin Chang
, Kishor S. Trivedi
, Zhen Han
:
Resilience-Driven Quantitative Analysis of Vehicle Platooning Service. IEEE Trans. Veh. Technol. 70(6): 5378-5389 (2021) - [c16]Shuang Zhao, Yalun Wu, Rui Sun, Xiaoai Qian, Dong Zi, Zhiqiang Xie, Endong Tong, Wenjia Niu, Jiqiang Liu, Zhen Han:
Blockchain-based decentralized federated learning: A secure and privacy-preserving system. HPCC/DSS/SmartCity/DependSys 2021: 941-948 - 2020
- [j19]Jing Bai
, Xiaolin Chang
, Fumio Machida
, Kishor S. Trivedi
, Zhen Han
:
Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views. IEEE Access 8: 6448-6459 (2020) - [j18]Zhi Chen
, Xiaolin Chang
, Zhen Han
, Yang Yang
:
Numerical Evaluation of Job Finish Time Under MTD Environment. IEEE Access 8: 11437-11446 (2020) - [j17]Jiaping Men
, Zhuo Lv, Xiaojun Zhou, Zhen Han
, Hequn Xian, Yanan Song
:
Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions. IEEE Access 8: 83842-83857 (2020) - [j16]Xiangyu Wei
, Guangquan Xu
, Hao Wang
, Yongzhong He, Zhen Han
, Wei Wang
:
Sensing Users' Emotional Intelligence in Social Networks. IEEE Trans. Comput. Soc. Syst. 7(1): 103-112 (2020) - [j15]Yike Li
, Yingxiao Xiang
, Endong Tong
, Wenjia Niu
, Bowei Jia
, Long Li
, Jiqiang Liu
, Zhen Han
:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c15]Xudong He, Jian Wang, Jiqiang Liu, Zhen Han, Zhuo Lv, Wei Wang:
DNS Rebinding Detection for Local Internet of Things Devices. FCS 2020: 19-29 - [c14]Zhi Chen, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yang Yang, Zhen Han:
Model-based Performance Evaluation of a Moving Target Defense System. GLOBECOM 2020: 1-6 - [c13]Yang Yang, Xiaolin Chang, Ziye Jia, Zhu Han, Zhen Han:
Processing in Memory Assisted MEC 3C Resource Allocation for Computation Offloading. ICA3PP (1) 2020: 695-709 - [c12]Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han:
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. IIP 2020: 254-265 - [c11]Yang Yang, Xiaolin Chang, Ziye Jia, Zhu Han, Zhen Han:
Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading. ISPA/BDCloud/SocialCom/SustainCom 2020: 175-182
2010 – 2019
- 2019
- [j14]Jiaping Men
, Guangquan Xu, Zhen Han, Zhonghao Sun, Xiaojun Zhou, Wenjuan Lian
, Xiaochun Cheng
:
Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface. IEEE Access 7: 103751-103759 (2019) - [j13]Tong Chen
, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han:
Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecur. 2(1): 11 (2019) - [c10]Bo Liu, Xiaolin Chang, Yang Yang, Zhi Chen, Zhen Han:
Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach. ISCC 2019: 1-6 - [c9]Xiangyu Wei, Jin Li, Zhen Han, Wei Wang:
Predicting Users' Emotional Intelligence with Social Networking Data. SocialSec 2019: 191-202 - 2018
- [j12]Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li:
Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers. Comput. J. 61(9): 1296-1305 (2018) - [j11]Bo Liu, Xiaolin Chang, Zhen Han, Kishor S. Trivedi, Ricardo J. Rodríguez:
Model-based sensitivity analysis of IaaS cloud availability. Future Gener. Comput. Syst. 83: 1-13 (2018) - [c8]Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han:
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. DSC 2018: 773-780 - [c7]Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han:
Designing Mutual Authentication Protocols in Industrial Wireless Network. ICDIS 2018: 153-158 - [c6]Yang Yang
, Xiaolin Chang, Zhen Han, Lin Li:
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 346-353 - [i2]Tong Chen, Wenjia Niu, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, Zhen Han, Gang Li:
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding. CoRR abs/1807.06752 (2018) - 2017
- [j10]Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang
:
Characterizing Android apps' behavior for effective detection of malapps at large scale. Future Gener. Comput. Syst. 75: 30-45 (2017) - [i1]Ziqi Yan, Jiqiang Liu, Gang Li, Zhen Han, Shuo Qiu:
PrivMin: Differentially Private MinHash for Jaccard Similarity Computation. CoRR abs/1705.07258 (2017) - 2016
- [j9]Zhonghua Wang, Zhen Han, Jiqiang Liu:
Public verifiability for shared data in cloud storage with a defense against collusion attacks. Sci. China Inf. Sci. 59(3): 39101:1-39101:3 (2016) - [j8]Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu:
Deterministic attribute-based encryption. Int. J. High Perform. Comput. Netw. 9(5/6): 443-450 (2016) - 2015
- [j7]Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang:
Privacy beyond sensitive values. Sci. China Inf. Sci. 58(7): 1-15 (2015) - [j6]Bin Xing, Zhen Han, Xiaolin Chang, Jiqiang Liu:
OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurr. Comput. Pract. Exp. 27(5): 1092-1109 (2015) - [j5]Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf. Sci. 295: 221-231 (2015) - 2014
- [j4]Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang
:
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection. IEEE Trans. Inf. Forensics Secur. 9(11): 1869-1882 (2014) - [c5]Xuezhen Huang, Jiqiang Liu, Zhen Han:
A Privacy-Aware Access Model on Anonymized Data. INTRUST 2014: 201-212 - 2011
- [j3]Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei:
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Frontiers Comput. Sci. China 5(2): 169-180 (2011) - 2010
- [j2]Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng:
An IBE scheme using ECC combined public key. Comput. Electr. Eng. 36(6): 1046-1054 (2010) - [j1]Jiqiang Liu, Xun Chen, Zhen Han:
Full and partial deniability for authentication schemes. Frontiers Comput. Sci. China 4(4): 516-521 (2010)
2000 – 2009
- 2008
- [c4]Xiaolin Chang, Jogesh K. Muppala
, Zhen Han, Jiqiang Liu:
Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts. ICC 2008: 1835-1839 - [c3]Jiqiang Liu, Jia Zhao, Zhen Han:
A remote anonymous attestation protocol in trusted computing. IPDPS 2008: 1-6 - 2005
- [c2]Yong Zhao, Zhen Han, Jiqiang Liu, Zhigang Li:
An Efficient and Divisible Payment Scheme for M-Commerce. KES (3) 2005: 488-496 - [c1]Xin Liu, Zhen Han, Jiqiang Liu, Chang-xiang Shen:
Develop Secure Database System with Security Extended ER Model. KES (3) 2005: 1005-1010
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-18 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint