您当前的位置:>师资队伍>师资力量>
师资一览
登陆
  • 姓名:韩兰胜
  • 职称:副教授
  • 办公电话:18971274240
  • E-mail:hanlansheng@hust.edu.cn
  • 教师主页:

教育背景

1991-1995兰州大学数学系本科,理学学士;

1998-2001华中理工大学计算机学院,工学硕士;

2003-2006华中科技大学计算机学院,工学博士;


研究方向

计算机及网络信息安全;恶意代码;大数据安全等

工作经历

1995-1998甘肃卫生厅省疾控中心CDC,网络维护及创建电子档案管理;

1998-今 华中科技大学计算机学院,信息安全实验室,从事计算机信息安全专业的科研、教学工作;

自2006年以来多次出国参加国际会议或学术交流或访问.



研究论文

[1]           韩兰胜,彭爱华*,Wenyuan Liao, 付才. 基于布尔代数的木马行为界定及判别. 小型微型计算机系统,VOL.35  N0. 7 2014

[2]           Guozheng Hu , Lansheng Han , Zhanqing Wang , Xiangsheng Xia. Cryptanalysis and improvement of acertificateless threshold signature secure in the standard model Information Science, Elsvier, Pages 174-187Volume 247, Pages 1-202 (20 October 2013)SCIA类,

[3]           Liang chen, lansheng han*(correspond author),Jiandu jing, dongpingHu. A post-quantum provable data possession protocol in cloud. Security andCommunication NetworksVolume6, Issue 5, pages 658–667, May 2013SCIC

[4]           Cai Fu, Min Li, Deqing Zou, Lansheng Han, James J. Park and ShuyanQu Community Vitality in DynamicTemporal Networks," International Journal of Distributed Sensor Networks,vol. 2013, Article ID 281565, 10 pages, 2013. doi:10.1155/2013/281565.SCI,

[5]           Han Lansheng, Pan Haiqing, Yang Ziqi,etc. Analysis of TrojanAttacks on Multi-level Security Network by Information Flow Path. IEEE Proc. ofThe International Conference on Multimedia Information Networking and Security(MINES 2013) Oct.3-5. Beijing .

[6]           Aihua Peng , Lansheng Han* , Yanan Yu , and Mingquan Li.Algebra-based Behavior Identification of Trojan Horse. The 5th  International Symposium on Cyberspace Safety and Security (CSS 2013))Zhangjiajie,China, November 13-15, 2013.

[7]           韩兰胜,高昆仑,赵保华等.基于API函数及其参数相结合的恶意软件行为检测. 计算机应用研究, 30卷第11 201311,3407-3410

[8]           Lansheng Han, Cai Fu, Deqing Zou, ChangHoon Lee, Wenjing Jia.Task-based behavior detection of illegal codes; Mathematical and ComputerModelling (J), v55,n1, 2012,1, p80-86(SCI.)

[9]           Lansheng han, xiao qu, yuan li, tao yin. The probability of trojanattacks on multi-level security strategy based network(extended vision).Journal of networks (j). 2012, 3

[10]       Tao Yin, Lan-sheng HAN*(Correspond author), Chun Wan, Xiao Qu. Theprobability of Trojan attacks on multi-level security based network. IEEEProceeding of The Second International Conference on Multimedia InformationNetworking & Security (MINES 2010). 4-6 Nov. 2010 Nanjing China.

[11]       Lansheng Han*, Xiao Qu, Yuan Li, Tao Yin. The probability ofTrojan attacks on multi-level security strategy based network (extendedvision). Journal of Networks (J). 2012, 3

[12]       Wan Chun, Qin Hao, Lan-sheng HAN*(Correspondauthor), ZhangYunhe. The P2P Traffic Identification Based On GA-SVM. IEEE Proceeding of 3rdInternational Conference on Environmental and Computer Science(ICECS 2010),October 18 - 19, 2010Kunming,China.

[13]       Mengsong Zou, Lan-sheng HAN*(Correspondauthor), Ming liu,Qiwen Liu. Virus Method based on Behavior Resource Tree. Journal ofInformational Processing Systems(J). Vol (7) No 1, 2011. Page:173-186

[14]       Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou. Sub-connectionBased Isolation Against Network Virus. International Journal of Digital ContentTechnology and its Applications(J), Volume 3, Number 1, March 2009, pp. 110-122

[15]       Lansheng Han, Hui Liu and Asiedu Baffour Kojo. Analytic Model forNetwork Viruses. In Proceedings of the ICNC2005, LNCS3612, Springer-Verlag,Berlin Heidelberg, pp. 903-910. (SCI)

[16]       Han Lansheng, Hong Fan,Peng Bing. Network Based Immunization Against Computer Virus. IEEE Proceedingof FCST 2006, Aisu-Wakamatsu, Fukushima, Japan.2006Nov.17-18, pp79-82

[17]       LanshengHan, Shuxia Han, Qingmei Deng etc.Source Tracing and Pursuing Network virus. IEEEProceeding of CIT2008, Sydney Austrlia, 8-11July, 2008. 

[18]       LanshengHanMingLiu ZhixiangLiu. TypeBased Network Isolation Against Net Virus. IEEEproceeding of WICOM 2008, Dalian China, 19-21September. 2008

[19]    LanshengHan, Shuxia Han, Bing Peng,“Fuzzy Tracing the Network Virus”. In Proceeding of ICFIE2007, Advances in SoftComputing(ASC), ISSN:1615-3871, Springer-Verlag, Berlin Heidelberg, 51-57

[20]   Cong Zheng, Lansheng Han*(Correspondauthor), Jihang Ye, Mengsong Zou,Qiwen Liu. A Fuzzy Comprehensive EvaluationModel for Harms of Computer Virus, 2009 IEEE 6th International conference onMobile AdHoc and Sensor System, MASS09, Maco China,Oct.2009, pp. 708-713,. 

[21]   Ming Liu, Lansheng Han*(Correspondauthor) , Mengsong Zou, Qiwen Liu, "An Evaluating Model for Anti-virusAbility Based on AHP," 2009 International Conference on ComputationalScience and Engineering, August 29-August 31 2009 Vancouver, Canada, vol. 1,pp.394-398,

[22]       LanshengHan, Ming Liu, Qiwen Liu, Mengsong Zou. Sub-connection Based Isolation AgainstNetwork Virus. International Journal of Digital Content Technology and itsApplications Volume 3, Number 1, March 2009 

[23]       HanLansheng, Hong Fan, Asiedu Baffour Kojo.Least Privileges and Role’s Inheritance of RBAC. Wuhan University Journal ofNatural Sciences,11(1) 2006,185-187. 

[24]       Han lansheng, Chen Wei, Han shuxia. Two Issues ofSpreading Model for Network Viruses. Computer Engineering and Applications.41(29), 2005,16-18.

[25]       Han Lansheng, Hong Fan, Luo Ting. Three SecurityPrinciples of Role-based Access Control. Journal of Huazhong University ofScience and Technology. (1) 2006, 36-38.

[26]       Lansheng Han, Varney Washington, Yuanbo Wang, ShuxiaHan. Tracing the Source of Network Virus Within a Subnet. IEEE Proceeding ofCSCWD2006,IEEE press, 2006(2), 952-956. 

[27]       Han lansheng, Han Shuxia, Varney Washington. Problems inSource-tracing of Network Virus. Computer Science 2006,(9), 33: 8-11

[28]       Han Lansheng, Hong Fan, Han Shuxia. Recursive SpreadingModel of Email Virus. Computer Engineering.2007.5:1-3 

[29]       Han lansheng, Han Shuxia, Yangming, Varney Washington. The Epidemic Threshold of A More GeneralEpidemic Model for Network Viruses. IEEE Proceeding ThirdInternational Conference on Natural Computation. Vol II,  2007 ICNC,pp. 66-69 

[30]       HanLansheng, Han Shuxia Varney Washington.Fuzzy Tracing the Source of Network Virus. Proceeding ofICFIE2007, Advances in Soft Computing (ASC), ISSN: 1615- 3871, Springer-Verlag, Berlin Heidelberg, 51-57

[31]       HanLansheng, Hong Fan. Office automation system based on RBAC. Journal of Huazhong University of Science andTechnology. (6) 2002, 67-69 

[32]       Han Lansheng, Liu Hui. How to set up and configure theRole of RBAC. Journal of Hubei Polytechnic University. 17(3), 2002, 21-23

[33]       Han Lansheng, Liu Hui. Design and Realization ofRole-based Access Control by OOD. Microcomputer Development. (12) 2002,5 67-69

[34]       Chen Wei, Han lansheng. Documen System based on SOA.Microcomputer Development, 31(5), 2005. 32-35

[35]       Han Lansheng, "Community Vitality in Dynamic TemporalNetworks," International Journal of Distributed Sensor Networks, vol.2013, Article ID 281565, 10 pages, 2013. doi:10.1155/2013/281565.

[36]       Fu Cai, Li Min,ZOU DEQING*, HAN LANSHENG, JAMES J. PARK. CommunityVitality in Dynamic Temporal Networks,International Journal of DistributedSensor Networks,Volume 2013 (2013),dx.doi.org/10.1155/2013/281565 SCIE

[37]       Fu Cai, Huang Qingfeng,Han LanSheng,Shen Li,Liu Xiao-Yang.Viruspropagation power of the dynamic network,EURASIP Journal on WirelessCommunications and Networking 2013, 2013:210 doi:10.1186/1687-1499-2013-210 SCIE

[38]       Qu Shuyan, Fu Cai*, Han Lansheng.Broadcast Power, Retweeting Powerand Propagation Power of Microblog.2013 Fifth International Conference onMultimedia Information Networking and Security (MINES 2103),1-3 November 2013in Beijing, China,IEEE Press.

[39]       Fu Cai, Cui YongQuan*, Han LanSheng, Fang ZhiCun. ProjectionPursuit based Wormhole Detection in Ad Hoc Network.2013(15th) IEEEInternational Conference on High Performance Computing and Communications,13-15November 2013 in Zhangjiajie,China,IEEE Press,p1315-1322

[40]       Cai Fu, Deliang Xu*, Lansheng Han, Jingfang Xu,Zhicun Fang.Restrainingand Characterization of Virus Propagation in Large-Scale Wireless LAN.5thInternational Symposium onCyberspace Safety and Security, CSS 2013,Zhangjiajie,China, November 13-15, 2013 p429-435

[41]       Ruan Ou,Fu Cai*, Zhou Jing, Han Lansheng, Xiao-Yang Liu.EfficientFair UC-Secure Two-Party Computation on Committed Inputs.Melbourne, Australia,16-18 July, 2013.IEEE Press,pp544-551


科研项目与获奖

1998-1999负责参与国家某单位绝密件文档管理系统;

1999-2002负责参与国家某单位九五重点攻关项目“绝密文档管理系统”;

2004年参与某单位办公信息系统开发;

2006年9月参与军方某部-信息安全传输平台;

2010年参与国家某中心“无限网络漏洞挖掘”;

2010年主持某单位“飞行棋智能算法研究”;

2011年主持某单位“网络安全平台综合管理”项目开发;

2012年主持某单位电力智能公网可信平台子项-网络安全状态监控项目;

2012年参与某单位虚拟化子项目;

2013年组建华科黑帽子战队(HustBlackHat);

2014年主持某安全部门无线智能设备监控系统;

2006年获湖北省自然科学基金资助(No:2007ABA313主持人);

2007年获国家自然科学基金资助(No:60703048主持人);

2012年获国家自然科学基金资助(No:61272033主持人);

2012年获国家航五院创新基金资助(主持人);

2013年获华中科技大学创新基金资助(主持人);

参与、合作其他国家、省部级项目5项;

以第一或通讯作者发表论文近40余篇,其中多次被SCI、40余次EI、DBLP、ISTP等索引;

申请、获得国家发明专利3项,软件著作权5项,主编教材一部。