Fan Shi

ORCID: 0000-0003-4533-2706
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Information and Cyber Security
  • Spam and Phishing Detection
  • Advanced Frequency and Time Standards
  • Caching and Content Delivery
  • User Authentication and Security Systems
  • Spectroscopy and Quantum Chemical Studies
  • Web Application Security Vulnerabilities
  • Software Engineering Research
  • Software Testing and Debugging Techniques
  • Laser-Matter Interactions and Applications
  • Anomaly Detection Techniques and Applications
  • Machine Learning and Data Classification
  • GNSS positioning and interference
  • Cell Image Analysis Techniques
  • Software System Performance and Reliability
  • Corporate Finance and Governance
  • Mass Spectrometry Techniques and Applications
  • Biometric Identification and Security
  • Network Time Synchronization Technologies
  • Data Visualization and Analytics
  • Advanced Steganography and Watermarking Techniques
  • Access Control and Trust

National University of Defense Technology
2007-2025

Tianjin Chengjian University
2024

Anhui University
2021-2023

Tianjin University of Technology
2023

Fudan University
2020-2021

Chongqing University of Posts and Telecommunications
2021

Central South University
2020

Chinese Academy of Sciences
2012-2018

Wuhan Institute of Physics and Mathematics
2017-2018

University of Chinese Academy of Sciences
2018

Strong-field laser-molecule interaction forms much of the basis for initiating and probing ultrafast quantum dynamics. Previous studies aimed at elucidating origins vibrational coherences induced by intense laser fields have been confined to diatomic molecules. Furthermore, in all cases examined date, wave packet motion is found be R-selective depletion; launched bond softening, though theoretically predicted, remains hitherto unobserved. Here we employ exquisite sensitivity femtosecond...

10.1038/s41467-017-00848-2 article EN cc-by Nature Communications 2017-09-25

While recent debiasing methods for Scene Graph Generation (SGG) have shown impressive performance, these efforts often attribute model bias solely to the long-tail distribution of relationships, overlooking more profound causes stemming from skewed object and pair distributions. In this paper, we employ causal inference techniques causality among observed Our insight lies in ability capture unobservable effects between complex distributions, which is crucial tracing roots bias. Specifically,...

10.1109/tpami.2025.3537283 article EN IEEE Transactions on Pattern Analysis and Machine Intelligence 2025-01-01

Password guessing is a crucial research direction in password security, considering vulnerabilities like reuse and data breaches. While has extensively explored intra-site guessing, the complexities of cross-site attacks, where attackers use leaked from one site to target another, remain less understood. This study investigates impact dataset feature similarity on performance, revealing that differences significantly influence success more than model variations. By analyzing eight datasets...

10.3390/electronics14050945 article EN Electronics 2025-02-27

Password guessing is a primary method for password strength evaluation. Despite various models have been proposed, there still significant gap between their effectiveness and the actual cracking capabilities of attackers. Integrating multiple guessing, also known as hybrid could better capture real However, reason why can enhance capabilities, how to effectively integrate heterogeneous models, are not well understood. To address these issues, this paper draws inspiration from concept...

10.1109/tifs.2024.3376246 article EN cc-by-nc-nd IEEE Transactions on Information Forensics and Security 2024-01-01

The centralization of the global DNS ecosystem may accelerate creation an oligopoly market, thereby, increasing risk a single point failure and network traffic manipulation. Earlier studies have revealed level in terms market share public services seen by major CDN providers. However, infrastructure Ecosystem is not well understood. In this paper, we present novel lightweight measurement approach that effectively discovers resolver pools from probing point. We conduct Internet-wide active on...

10.3390/app13095739 article EN cc-by Applied Sciences 2023-05-06

Due to the increasing number of network security vulnerabilities, vulnerability risk assessment must be performed prioritize repair high-risk vulnerabilities. Traditional is based primarily on Common Vulnerability Scoring Systems (CVSS) and attack graphs. Nevertheless, CVSS metrics ignore impact specific network, which accounts that identical exists in different environments assigned repeated values. Additionally, graphs still suffer from scalability readability issues. To solve above...

10.1109/access.2020.3015551 article EN cc-by IEEE Access 2020-01-01

User authentication plays a critical role in access control of man-machine system, where the knowledge factor, such as personal identification number, constitutes most widely used element. However, factors are usually vulnerable to spoofing attack. Recently, inheritance fingerprints, emerges an efficient alternative resilient malicious users, but it normally requires special equipment. To this end, article, we propose WiPass, device-free system only leveraging pervasive Wi-Fi infrastructure...

10.1109/tii.2021.3108850 article EN IEEE Transactions on Industrial Informatics 2021-09-01

IP spoofing has nowadays become a research focus, as it been bothering netizens since the emergence of Internet. Though many studies have made their contributions to prevention IP-spoofing, most excellent one is SAVI (Source Address Validation Improvement) proposal advocated by IETF, can prevent IP-spoofing from happening automatically binding key properties hosts in layer2 access subnet. Nevertheless, till now, only focuses on IPv6 stack and simple network scenarios. To best our knowledge,...

10.1109/mnet.2013.6678929 article EN IEEE Network 2013-11-01

With the popularity of network technology and expansion scale, security risks are increasingly serious. Network vulnerability assessment methods, a active defense, have attracted many researchers. Most existing methods store different types data in ways, which makes querying analyzing inefficient, especially complex large-scale environment. In order to solve this problem, paper proposes method based on graph database. The host information, association relationship between hosts information...

10.1109/itnec48623.2020.9085039 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2020-05-05

A plethora of software vulnerabilities are exposed daily, posing a severe threat to the Internet. It is almost impossible for security experts or developers deal with all vulnerabilities. Therefore, it imperative rapidly assess severity vulnerability be able select which one should given preferential attention. CVSS now industry’s de facto evaluation standard, calculated quantitative formula measure vulnerability. The consists several metrics related vulnerability’s features. Security need...

10.3390/app12188983 article EN cc-by Applied Sciences 2022-09-07

This paper studies Chinese firms' earnings management strategy in response to the trade dispute investigations initiated by U.S. from 2001 2018. topic is important given increasingly severe international environment and significant influence of macro economy on financial reporting. We find that firms affected U.S.-initiated engage more upward management. Additionally, result pronounced with a negative market reaction around announcement investigations. Cross-sectional tests provide evidence...

10.1016/j.cjar.2020.09.002 article EN cc-by-nc-nd China Journal of Accounting Research 2020-10-31

Penetration testing is widely acknowledged as the foremost method for evaluating network security. However, three challenges impede generation of strategies that align with human expectations. In this article, we present, first time, a based on feedback to enhance strategy generation. Our approach comprises two components: agent training and decision-making. During training, establish hierarchical framework decompose tasks knowledge base offer advice improving data efficiency. We then impose...

10.1109/tii.2024.3379633 article EN IEEE Transactions on Industrial Informatics 2024-04-09

Internet users have suffered from phishing attacks for a long time. Attackers deceive through malicious constructed websites to steal sensitive information, such as bank account numbers, website usernames, and passwords. In recent years, many detection solutions been proposed, which mainly leverage whitelists or blacklists, content, side channel-based techniques. However, with the continuous improvement of technology, current methods difficulty in achieving effective detection. Hence, this...

10.3390/app11209733 article EN cc-by Applied Sciences 2021-10-18

The technique of binary code similarity detection (BCSD) has been applied in many fields, such as malware detection, plagiarism and vulnerability search, etc. Existing solutions for the BCSD problem usually compare specific features between binaries based on control flow graphs functions from or compute embedding vector solve deep learning algorithms. In this paper, another research perspective, we propose a new lightweight method to <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/access.2020.3004813 article EN cc-by IEEE Access 2020-01-01

With the vigorous development of Internet, ecosystem cyber-physical systems is also developing at a high speed, but may be accompanied by unknown vulnerabilities in process concrete implementation. Thus, number has been increasing year year. The vulnerability evaluation speed cannot keep up with exposure speed. traditional manual method can no longer effectively deal such large-scale vulnerabilities, resulting backlog vulnerabilities. Therefore, results have certain lag. To address this...

10.1155/2023/2118305 article EN cc-by Security and Communication Networks 2023-04-13

With the rapid development of Internet, malware variants have increased exponentially, which poses a key threat to cyber security. Persistent efforts been made classify variants, but there are still many challenges, including incapacity deal with various belonging similar families, problem time and resource consuming, etc. This paper proposes novel method, called Malware Entropy Sequences Reflect Family (MESRF), improve classification based on entropy sequences features. In prior research,...

10.1109/access.2020.3020330 article EN cc-by IEEE Access 2020-01-01

Last year the zero-baseline common-view test using BeiDou Navigation Satellite system (BDS) is done in BIRMM and result better than 5 ns. In this year, we have developed our own GPS/BD common view time frequency transfer receiver. Using receiver carried out two remote experiments BIRM-SIMT link BIRM-NTSC link, separately. Besides, took TWSTFT experiment together when made to check result. The some results are shown paper which show that precision BD at same level of GPS but slightly lower GPS.

10.1109/eftf.2016.7477801 article EN 2016-04-01

In recent years, Internet of things (IoT) devices are playing an important role in business, education, medical as well other fields. Devices connected to the is much more than number world population. However, it may face all kinds attacks from easily for its accessibility. As we know, most against IoT based on Web applications. So protecting security services can effectively improve situation ecosystem. Conventional attack detection methods highly rely samples, and artificial intelligence...

10.1177/1550147720917019 article EN cc-by International Journal of Distributed Sensor Networks 2020-04-01

This paper gives a test method of BeiDou timing receiver delay. A System simulator and time interval counter were used in the experiments. During process, most important step is to calibrate delay simulator. The uncertainty this analyzed be less than 1.5ns. Using method, some typical Chinese commercial receivers tested, results are shown figures. variations with temperature have been studied.

10.1109/fcs.2015.7138902 article EN 2015-04-01

Determining the application and version of nodes in Inter⁃ net Things (IoT) is very important for warning about managing vulnerabilities IoT. This article defines attributes determining By improving structure Internet web crawler, which obtains raw data from nodes, we can obtain da⁃ ta We improve on existing strate⁃ gy, only determinations are stored, by also storing downloaded locally MongoDB. stored be conveniently used to determine type node when a new determination method emerges or...

10.3969/j.issn.1673-5188.2015.03.009 article EN ZTE communications 2015-09-25

In this work, we have developed a new Micro-Mechanic-Hydrodynamic Model (MMH Model) to predict the yield stress of MagnetoRheological (MR) fluids, which is also applicable without no-slip boundary condition. We first determine storage modulus MR fluid with three-dimensional chain structure model taking into account field concentration between particles inside aggregates and effect saturation magnetisation particles. Then apparent viscosity by using balance magnetic torque hydrodynamic...

10.1504/ijmpt.2008.015892 article EN International Journal of Materials and Product Technology 2007-12-03
Coming Soon ...