韓蘭勝

韓蘭勝,博士,華中科技大學計算機科學與技術學院副教授,研究生導師;擔任國際學術期刊International Journal of Digital Content Technology and its Applications 和International Journal of Communication Networks and Infoemation Security的客座編輯及相關國際會議評審,第二屆國家大學生信息安全競賽評審,中國計算機學會會員。

基本介紹

  • 中文名:韓蘭勝
  • 職業:研究生導師
  • 學位/學歷:博士
  • 職務:副教授
教育背景,研究方向,工作經歷,研究論文,項目與獲獎,

教育背景

1991-1995蘭州大學數學系本科,理學學士;
1998-2001華中理工大學計算機學院,工學碩士;
2003-2006華中科技大學計算機學院,工學博士;

研究方向

計算機及網路信息安全;惡意代碼;大數據安全等

工作經歷

1995-1998甘肅衛生廳省疾控中心CDC,網路維護及創建電子檔案管理;
1998-今 華中科技大學計算機學院,信息安全實驗室,從事計算機信息安全專業的科研、教學工作;
自2006年以來多次出國參加國際會議或學術交流或訪問.

研究論文

[1]韓蘭勝,彭愛華*,Wenyuan Liao,付才.基於布爾代數的木馬行為界定及判別.小型微型計算機系統,VOL.35 N0. 7 2014
[2]Guozheng Hu , Lansheng Han , Zhanqing Wang , Xiangsheng Xia.“Cryptanalysis and improvement of acertificateless threshold signature secure in the standard model”Information Science, Elsvier,,Pages 174-187,Volume 247, Pages 1-202 (20 October 2013)SCI,A類,
[3]Liang chen, lansheng han*(correspond author),Jiandu jing, dongpingHu. A post-quantum provable data possession protocol in cloud. Security andCommunication Networks,Volume6, Issue 5, pages 658–667, May 2013,SCI,C類
[4]Cai Fu, Min Li, Deqing Zou, Lansheng Han, James J. Park and ShuyanQu“Community Vitality in DynamicTemporal Networks," International Journal of Distributed Sensor Networks,vol. 2013, Article ID 281565, 10 pages, 2013. doi:10.1155/2013/281565.SCI,
[5]Han Lansheng, Pan Haiqing, Yang Ziqi,etc. Analysis of TrojanAttacks on Multi-level Security Network by Information Flow Path. IEEE Proc. ofThe International Conference on Multimedia Information Networking and Security(MINES 2013) Oct.3-5. Beijing .
[6]Aihua Peng , Lansheng Han* , Yanan Yu , and Mingquan Li.Algebra-based Behavior Identification of Trojan Horse. The 5th InternationalSymposium on Cyberspace Safety and Security (CSS 2013))Zhangjiajie,China, November 13-15, 2013.
[7]韓蘭勝,高崑崙,趙保華等.基於API函式及其參數相結合的惡意軟體行為檢測.計算機套用研究,第30卷第11期2013年11月,3407-3410
[8]Lansheng Han, Cai Fu, Deqing Zou, ChangHoon Lee, Wenjing Jia.Task-based behavior detection of illegal codes; Mathematical and ComputerModelling (J), v55,n1, 2012,1, p80-86(SCI.)
[9]Lansheng han, xiao qu, yuan li, tao yin. The probability of trojanattacks on multi-level security strategy based network(extended vision).Journal of networks (j). 2012, 3
[10]Tao Yin, Lan-sheng HAN*(Correspond author), Chun Wan, Xiao Qu. Theprobability of Trojan attacks on multi-level security based network. IEEEProceeding of The Second International Conference on Multimedia InformationNetworking & Security (MINES 2010). 4-6 Nov. 2010 Nanjing China.
[11]Lansheng Han*, Xiao Qu, Yuan Li, Tao Yin. The probability ofTrojan attacks on multi-level security strategy based network (extendedvision). Journal of Networks (J). 2012, 3
[12]Wan Chun, Qin Hao, Lan-sheng HAN*(Correspondauthor), ZhangYunhe. The P2P Traffic Identification Based On GA-SVM. IEEE Proceeding of 3rdInternational Conference on Environmental and Computer Science(ICECS 2010),October 18 - 19, 2010,Kunming,China.
[13]Mengsong Zou, Lan-sheng HAN*(Correspondauthor), Ming liu,Qiwen Liu. Virus Method based on Behavior Resource Tree. Journal ofInformational Processing Systems(J). Vol (7) No 1, 2011. Page:173-186
[14]Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou. Sub-connectionBased Isolation Against Network Virus. International Journal of Digital ContentTechnology and its Applications(J), Volume 3, Number 1, March 2009, pp. 110-122
[15]Lansheng Han, Hui Liu and Asiedu Baffour Kojo. Analytic Model forNetwork Viruses. In Proceedings of the ICNC2005, LNCS3612, Springer-Verlag,Berlin Heidelberg, pp. 903-910. (SCI)
[16]Han Lansheng, Hong Fan,Peng Bing. Network Based Immunization Against Computer Virus. IEEE Proceedingof FCST 2006, Aisu-Wakamatsu, Fukushima, Japan.2006Nov.17-18, pp79-82
[17]LanshengHan, Shuxia Han, Qingmei Deng etc.Source Tracing and Pursuing Network virus. IEEEProceeding of CIT2008, Sydney Austrlia, 8-11July, 2008.
[18]LanshengHanMingLiu ZhixiangLiu. TypeBased Network Isolation Against Net Virus. IEEEproceeding of WICOM 2008, Dalian China, 19-21September. 2008
[19]LanshengHan, Shuxia Han, Bing Peng,“Fuzzy Tracing the Network Virus”. In Proceeding of ICFIE2007, Advances in SoftComputing(ASC), ISSN:1615-3871,Springer-Verlag, Berlin Heidelberg, 51-57
[20]Cong Zheng,Lansheng Han*(Correspondauthor), Jihang Ye, Mengsong Zou,Qiwen Liu. A Fuzzy Comprehensive EvaluationModel for Harms of Computer Virus, 2009 IEEE 6th International conference onMobile AdHoc and Sensor System, MASS09, Maco China,Oct.2009, pp. 708-713,.
[21]Ming Liu,Lansheng Han*(Correspondauthor), Mengsong Zou, Qiwen Liu, "An Evaluating Model for Anti-virusAbility Based on AHP," 2009 International Conference on ComputationalScience and Engineering, August 29-August 31 2009 Vancouver, Canada, vol. 1,pp.394-398,
[22]LanshengHan, Ming Liu, Qiwen Liu, Mengsong Zou. Sub-connection Based Isolation AgainstNetwork Virus. International Journal of Digital Content Technology and itsApplications Volume 3, Number 1, March 2009
[23]HanLansheng, Hong Fan, Asiedu Baffour Kojo.Least Privileges and Role’s Inheritance of RBAC. Wuhan University Journal ofNatural Sciences,11(1) 2006,185-187.
[24]Han lansheng, Chen Wei, Han shuxia. Two Issues ofSpreading Model for Network Viruses. Computer Engineering and Applications.41(29), 2005,16-18.
[25]Han Lansheng, Hong Fan, Luo Ting. Three SecurityPrinciples of Role-based Access Control. Journal of Huazhong University ofScience and Technology. (1) 2006, 36-38.
[26]Lansheng Han, Varney Washington, Yuanbo Wang, ShuxiaHan. Tracing the Source of Network Virus Within a Subnet. IEEE Proceeding ofCSCWD2006,IEEE press, 2006(2), 952-956.
[27]Han lansheng, Han Shuxia, Varney Washington. Problems inSource-tracing of Network Virus. Computer Science2006,(9), 33: 8-11
[28]Han Lansheng, Hong Fan, Han Shuxia. Recursive SpreadingModel of Email Virus. Computer Engineering.2007.5:1-3
[29]Han lansheng, Han Shuxia, Yangming, Varney Washington.The Epidemic Threshold of A More GeneralEpidemic Model for Network Viruses.IEEE ProceedingThirdInternational Conference on Natural Computation. Vol II, 2007ICNC,pp. 66-69
[30]HanLansheng, Han Shuxia Varney Washington.Fuzzy Tracing the Source of Network Virus.Proceeding ofICFIE2007, Advances in Soft Computing (ASC), ISSN: 1615- 3871,Springer-Verlag, Berlin Heidelberg, 51-57
[31]HanLansheng, Hong Fan. Office automation system based on RBAC. Journal of Huazhong University of Science andTechnology. (6) 2002, 67-69
[32]Han Lansheng, Liu Hui. How to set up and configure theRole of RBAC. Journal of Hubei Polytechnic University. 17(3), 2002, 21-23
[33]Han Lansheng, Liu Hui. Design and Realization ofRole-based Access Control by OOD. Microcomputer Development. (12) 2002,5 67-69
[34]Chen Wei, Han lansheng. Documen System based on SOA.Microcomputer Development,31(5), 2005. 32-35
[35]Han Lansheng, "Community Vitality in Dynamic TemporalNetworks," International Journal of Distributed Sensor Networks, vol.2013, Article ID 281565, 10 pages, 2013. doi:10.1155/2013/281565.
[36]Fu Cai, Li Min,ZOU DEQING*, HAN LANSHENG, JAMES J. PARK. CommunityVitality in Dynamic Temporal Networks,International Journal of DistributedSensor Networks,Volume 2013 (2013),dx.doi.org/10.1155/2013/281565 SCIE
[37]Fu Cai, Huang Qingfeng,Han LanSheng,Shen Li,Liu Xiao-Yang.Viruspropagation power of the dynamic network,EURASIP Journal on WirelessCommunications and Networking 2013, 2013:210doi:10.1186/1687-1499-2013-210 SCIE
[38]Qu Shuyan, Fu Cai*, Han Lansheng.Broadcast Power, Retweeting Powerand Propagation Power of Microblog.2013 Fifth International Conference onMultimedia Information Networking and Security (MINES 2103),1-3 November 2013in Beijing, China,IEEE Press.
[39]Fu Cai, Cui YongQuan*, Han LanSheng, Fang ZhiCun. ProjectionPursuit based Wormhole Detection in Ad Hoc Network.2013(15th) IEEEInternational Conference on High Performance Computing and Communications,13-15November 2013 in Zhangjiajie,China,IEEE Press,p1315-1322
[40]Cai Fu, Deliang Xu*, Lansheng Han, Jingfang Xu,Zhicun Fang.Restrainingand Characterization of Virus Propagation in Large-Scale Wireless LAN.5thInternational Symposium onCyberspace Safety and Security, CSS 2013,Zhangjiajie,China, November 13-15, 2013 p429-435
[41]Ruan Ou,Fu Cai*, Zhou Jing, Han Lansheng, Xiao-Yang Liu.EfficientFair UC-Secure Two-Party Computation on Committed Inputs.Melbourne, Australia,16-18 July, 2013.IEEE Press,pp544-551

項目與獲獎

1998-1999負責參與國家某單位絕密件文檔管理系統;
1999-2002負責參與國家某單位九五重點攻關項目“絕密文檔管理系統”;
2004年參與某單位辦公信息系統開發;
2006年9月參與軍方某部-信息安全傳輸平台;
2010年參與國家某中心“無限網路漏洞挖掘”;
2010年主持某單位“飛行棋智慧型算法研究”;
2011年主持某單位“網路安全平台綜合管理”項目開發;
2012年主持某單位電力智慧型公網可信平台子項-網路安全狀態監控項目;
2012年參與某單位虛擬化子項目;
2013年組建華科黑帽子戰隊(HustBlackHat);
2014年主持某安全部門無線智慧型設備監控系統;
2006年獲湖北省自然科學基金資助(No:2007ABA313主持人);
2007年獲國家自然科學基金資助(No:60703048主持人);
2012年獲國家自然科學基金資助(No:61272033主持人);
2012年獲國家航五院創新基金資助(主持人);
2013年獲華中科技大學創新基金資助(主持人);
參與、合作其他國家、省部級項目5項;
以第一或通訊作者發表論文近40餘篇,其中多次被SCI、40餘次EI、DBLP、ISTP等索引;
申請、獲得國家發明專利3項,軟體著作權5項,主編教材一部。

相關詞條

熱門詞條

聯絡我們