HUST Associate Professor of Information Security

Phone: (027)87543986

Email: 1998010309@hust.edu.cn

Academic Areas: Information Security, Security of Network,, Security of Big Data.

Research Interests:

Academic Degrees

Bachelor degree of Mathematics (1991-1995)

Mathematical department, Lanzhou University, Lanzhou, P.R. China

Master degree of Computer Science and Software (1998-2001)

School of computer science, Huazhong University of Science and Technology , Wuhan, P.R. China

PhD degree of Information Security (2003-2006)

School of computer Science, Huazhong University of Science and Technology, Wuhan, P.R. China

Selected Publications

     Lansheng Han, Mengxiao Qian, Xingbo Xu,Cau Fu, Kwisaba Hamza. Malicious Code Detection Model based Based on Behavior Association, Journal of Tsinghua University(Science and Technology), 2014, Sept.

[2] Qian Yu Lansheng Han Tinghui Cai Fu Dong Ming Liu. Reverse Technique of Malicious Obfuscated Binary Code Based on Control Flow Graph, Proceeding of ICNC-FSKD 2014, published by DEStech Publications, 17602-4967, U.S.A. August 22-24, 2014 Xiamen.

[3] 杜楠 韩兰胜* 付才 张忠科 刘铭. 基于相识度的恶意代码检测, 计算机科学, Jan. 2015,

[4]   韩兰胜,彭爱华*, Wenyuan Liao, 付才. 基于布尔代数的木马行为界定及判别. 小型微型计算机系统,VOL.35  N0. 7 2014

[5] Guozheng Hu , Lansheng Han , Zhanqing Wang , Xiangsheng Xia. “Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model” Information Science, Elsvier, ,Pages 174-187,Volume 247, Pages 1-202 (20 October 2013),

[6] Liang chen, lansheng han*(correspond author),Jiandu jing, dongping Hu. A post-quantum provable data possession protocol in cloud. Security and Communication Networks,Volume 6, Issue 5, pages 658–667, May 2013,

[7] Cai Fu, Min Li, Deqing Zou, Lansheng Han, James J. Park and Shuyan Qu “Community Vitality in Dynamic Temporal Networks," International Journal of Distributed Sensor Networks, vol. 2013, Article ID 281565, 10 pages, 2013. doi:10.1155/2013/281565.

[8] Han Lansheng, Pan Haiqing, Yang Ziqi,etc. Analysis of Trojan Attacks on Multi-level Security Network by Information Flow Path. IEEE Proc. of The International Conference on Multimedia Information Networking and Security (MINES 2013) Oct.3-5. Beijing .

[9] Aihua Peng , Lansheng Han* , Yanan Yu , and Mingquan Li. Algebra-based Behavior Identification of Trojan Horse. The 5th  International  Symposium on Cyberspace Safety and Security (CSS 2013))Zhangjiajie, China, November 13-15, 2013.

[10]韩兰胜,高昆仑,赵保华等.基于API 函数及其参数相结合的恶意软件行为检测. 计算 机应用研究, 第30卷第11 期2013年11月,3407-3410

[11]Lansheng Han, Cai Fu, Deqing Zou, ChangHoon Lee, Wenjing Jia. Task-based behavior detection of illegal codes; Mathematical and Computer Modelling (J), v55,n1, 2012,1, p80-86(SCI.EI in English)

[12]Lansheng han, xiao qu, yuan li, tao yin. The probability of trojan attacks on multi-level security strategy based network(extended vision). Journal of networks (j). 2012, 3

[13]Tao Yin, Lan-sheng HAN*(Correspond author), Chun Wan, Xiao Qu. The probability of Trojan attacks on multi-level security based network. IEEE Proceeding of The Second International Conference on Multimedia Information Networking & Security (MINES 2010). 4-6 Nov. 2010 Nanjing China.

[14]Lansheng Han*, Xiao Qu, Yuan Li, Tao Yin. The probability of Trojan attacks on multi-level security strategy based network (extended vision). Journal of Networks (J). 2012, 3

[15]Wan Chun, Qin Hao, Lan-sheng HAN*(Correspond author), Zhang Yunhe. The P2P Traffic Identification Based On GA-SVM. IEEE Proceeding of 3rd International Conference on Environmental and Computer Science(ICECS 2010), October 18 - 19, 2010,Kunming, China.)

[16]Mengsong Zou, Lan-sheng HAN*(Correspond author), Ming liu, Qiwen Liu. Virus Method based on Behavior Resource Tree. Journal of Informational Processing Systems(J). Vol (7) No 1, 2011. Page:173-186,

[17]Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou. Sub-connection Based Isolation Against Network Virus. International Journal of Digital Content Technology and its Applications(J), Volume 3, Number 1, March 2009, pp. 110-122

[18]Lansheng Han, Hui Liu and Asiedu Baffour Kojo. Analytic Model for Network Viruses. In Proceedings of the ICNC2005, LNCS3612, Springer-Verlag, Berlin Heidelberg, pp. 903-910. (SCI、EI、ISTP, in English)

[19]Han Lansheng, Hong Fan, Peng Bing. Network Based Immunization Against Computer Virus. IEEE Proceeding of FCST 2006, Aisu-Wakamatsu, Fukushima, Japan. 2006 Nov.17-18, pp79-82(in English)

[20]Lansheng Han, Shuxia Han, Qingmei Deng etc.Source Tracing and Pursuing Network virus. IEEE Proceeding of CIT2008, Sydney Austrlia, 8-11July, 2008.

[21]LanshengHan MingLiu ZhixiangLiu. TypeBased Network Isolation Against Net Virus. IEEE proceeding of WICOM 2008, Dalian China, 19-21September. 2008

[22] Lansheng Han, Shuxia Han, Bing Peng, “Fuzzy Tracing the Network Virus”. In Proceeding of ICFIE2007, Advances in Soft Computing(ASC), ISSN:1615-3871, Springer-Verlag, Berlin Heidelberg, 51-57

[23] Cong Zheng, Lansheng Han*(Correspond author), Jihang Ye, Mengsong Zou,Qiwen Liu. A Fuzzy Comprehensive Evaluation Model for Harms of Computer Virus, 2009 IEEE 6th International conference on Mobile AdHoc and Sensor System, MASS09, Maco China,Oct.2009, pp. 708-713,.

[24] Ming Liu, Lansheng Han*(Correspond author) , Mengsong Zou, Qiwen Liu, "An Evaluating Model for Anti-virus Ability Based on AHP," 2009 International Conference on Computational Science and Engineering, August 29-August 31 2009 Vancouver, Canada, vol. 1, pp.394-398,

[25]Lansheng Han, Ming Liu, Qiwen Liu, Mengsong Zou. Sub-connection Based Isolation Against Network Virus. International Journal of Digital Content Technology and its Applications Volume 3, Number 1, March 2009

[26]Han Lansheng, Hong Fan, Asiedu Baffour Kojo. Least Privileges and Role’s Inheritance of RBAC. Wuhan University Journal of Natural Sciences,11(1) 2006,185-187.

[27]Han lansheng, Chen Wei, Han shuxia. Two Issues of Spreading Model for Network Viruses. Computer Engineering and Applications. 41(29), 2005,16-18.

[28]Han Lansheng, Hong Fan, Luo Ting. Three Security Principles of Role-based Access Control. Journal of Huazhong University of Science and Technology. (1) 2006, 36-38

[29]Lansheng Han, Varney Washington, Yuanbo Wang, Shuxia Han. Tracing the Source of Network Virus Within a Subnet. IEEE Proceeding of CSCWD2006,IEEE press, 2006(2), 952-956.

[30]Han lansheng, Han Shuxia, Varney Washington. Problems in Source-tracing of Network Virus. Computer Science 2006,(9), 33: 8-11 [31]Han Lansheng, Hong Fan, Han Shuxia. Recursive Spreading Model of Email Virus. Computer Engineering. 2007.5:1-3

[32]Han lansheng, Han Shuxia, Yangming, Varney Washington. The Epidemic Threshold of A More General Epidemic Model for Network Viruses. IEEE Proceeding Third International Conference on Natural Computation. Vol II,  2007 ICNC, pp. 66-69

[33]Han Lansheng, Han Shuxia Varney Washington. Fuzzy Tracing the Source of Network Virus. Proceeding of ICFIE2007, Advances in Soft Computing (ASC), ISSN: 1615- 3871, Springer-Verlag, Berlin Heidelberg, 51-57 (

[34]Han Lansheng, Hong Fan. Office automation system based on RBAC. Journal of Huazhong University of Science and Technology. (6) 2002, 67-69

[35]Han Lansheng, Liu Hui. How to set up and configure the Role of RBAC. Journal of Hubei Polytechnic University. 17(3), 2002, 21-23,

[36]Han Lansheng, Liu Hui. Design and Realization of Role-based Access Control by OOD. Microcomputer Development. (12) 2002,5 67-69,

[37]Chen Wei, Han lansheng. Documen System based on SOA. Microcomputer Development, 31(5), 2005. 32-35,

[38]Han Lansheng, "Community Vitality in Dynamic Temporal Networks," International Journal of Distributed Sensor Networks, vol. 2013, Article ID 281565, 10 pages, 2013. doi:10.1155/2013/281565.

[39]Fu Cai, Li Min,ZOU DEQING*, HAN LANSHENG, JAMES J. PARK. Community Vitality in Dynamic Temporal Networks,International Journal of Distributed Sensor Networks,Volume 2013 (2013),dx.doi.org/10.1155/2013/281565 SCIE

[40]Fu Cai, Huang Qingfeng,Han LanSheng,Shen Li,Liu Xiao-Yang.Virus propagation power of the dynamic network,EURASIP Journal on Wireless Communications and Networking 2013, 2013:210  doi:10.1186/1687-1499-2013-210 SCIE

[41]Qu Shuyan, Fu Cai*, Han Lansheng.Broadcast Power, Retweeting Power and Propagation Power of Microblog.2013 Fifth International Conference on Multimedia Information Networking and Security (MINES 2103),1-3 November 2013 in Beijing, China,IEEE Press.

[42]Fu Cai, Cui YongQuan*, Han LanSheng, Fang ZhiCun. Projection Pursuit based Wormhole Detection in Ad Hoc Network.2013(15th) IEEE International Conference on High Performance Computing and Communications,13-15 November 2013 in Zhangjiajie,China,IEEE Press,p1315-1322

[43]Cai Fu, Deliang Xu*, Lansheng Han, Jingfang Xu,Zhicun Fang.Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.5th International Symposium onCyberspace Safety and Security, CSS 2013,Zhangjiajie, China, November 13-15, 2013 p429-435

[44]Ruan Ou,Fu Cai*, Zhou Jing, Han Lansheng, Xiao-Yang Liu.Efficient Fair UC-Secure Two-Party Computation on Committed Inputs.Melbourne, Australia, 16-18 July, 2013.IEEE Press,pp544-551

Awards and Honors

1 Leader of the project ” Tracing and Pursing the Network Virus” (No:60703048) supported by National Natural Science Foundation of China (2008-2010)

2 Leader of the project “the Models of Tracing and Pursing the Virus”(No:2007ABA313) supported by Natural Science Foundation of Hubei Province (2007-2009)

3 Leader of the project”Task-based Identification for the Combination behavior of the Trojans” (No:61272033) supported by National Natural Science Foundation of China (2013-2016)

4 Main member of project “Polymorphism Clustering and Evolution research and behavior in Mobile Networks ”(No:61272405) supported by National Natural Science Foundation of China (2013-2016)

5 Main member of national top-secret project of a document management system, 1998-1999;

6 Main member of project "Top Secret Document Management System"1999-2001;

7 Main member of Application and implementation of virtual teaching platform September 2007 the Ministry of Science and Technology Support Program;

8 Leader of project "unlimited network vulnerabilities mining", 2010, National Information Security Evaluation Center;

9 Leader of project of the Blue Ocean Technology "Ludo intelligent algorithm research"2010 presided over;

10 Leader of project "Network Security Platform Integrated Management" development, March 2011-2013;

11 Leader of project of the National Electricity Institute intelligent public trusted platform subkey - R & D network security status monitoring, June 2012-2013,12;

12 Vice leader of CSIC virtualization subprojects, September 2012-2014;

13 Leader of HustBlackHat network battle formation team 2013-2014;

14 Leader of a wireless smart device security sector monitoring system2014;

15 Got three national invention patents, five software copyrights, one of a textbook editor.

Courses Taught

Teach Discrete Mathematic (in Chinese) for College Students every year from 2001,

Teach Discrete Mathematical Structures (in English, published by Prentice Hall) for Foreigner Students of HUST every year from 2003-2010

Teach Computer Virus and its Prevention for College Students Majoring in Information Security every year since 2009

Teach Graphic theory for College Students Majoring in Internet of things since 2010.

Login and edit information