Heqing Huang

Orcid: 0009-0009-7493-6462

According to our database1, Heqing Huang authored at least 65 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Novel Category Discovery Without Forgetting for Automatic Target Recognition.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

SAND: Decoupling Sanitization from Fuzzing for Low Overhead.
CoRR, 2024

Plankton: Reconciling Binary Code and Debug Information.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

GIANTSAN: Efficient Memory Sanitization with Segment Folding.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
Cross-Modality Features Fusion for Synthetic Aperture Radar Image Segmentation.
IEEE Trans. Geosci. Remote. Sens., 2023

A Novel Unsupervised Video Anomaly Detection Framework Based on Optical Flow Reconstruction and Erased Frame Prediction.
Sensors, 2023

Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation.
Proceedings of the Computer Security - ESORICS 2023, 2023

Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch.
Proceedings of the Annual Computer Security Applications Conference, 2023

cPSIR: Circuit-Based Private Stateful Information Retrieval for Private Media Consumption.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Design of Citrus Fruit Detection System Based on Mobile Platform and Edge Computer Device.
Sensors, 2022

Research and Design of High-Fidelity Experimental Bed System for Wireless Sensor Network.
J. Electr. Comput. Eng., 2022

BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Trans. Big Data, 2021

Design of Internet of Things and big data analytics-based disaster risk management.
Soft Comput., 2021

Program analysis via efficient symbolic abstraction.
Proc. ACM Program. Lang., 2021

Join cardinality estimation by combining operator-level deep neural networks.
Inf. Sci., 2021

Combining Supervised and Un-supervised Learning for Automatic Citrus Segmentation.
CoRR, 2021

Skeletal approximation enumeration for SMT solver testing.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Fuzzing SMT solvers via two-dimensional input space exploration.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Exploratory and Confirmatory Factor Analysis of the Chinese Young Children's Video-Gaming Questionnaire.
Proceedings of the HCI in Games: Experience Design and Game Mechanics, 2021

The Foundations and Frontiers of Research on the Effect of Video Games on Child Development - A Scientometrics and Knowledge-Mapping Analysis Based on CiteSpace.
Proceedings of the HCI in Games: Experience Design and Game Mechanics, 2021

The Factorial Structure and Underlying Contributors of Parents' Behavioral Involvement in Children's Video Game Use.
Proceedings of the HCI in Games: Experience Design and Game Mechanics, 2021

Enhancing Model-Based Networked Control of Uncertain Process Systems Through Error-Triggered Parameter Re-Identification.
Proceedings of the 2021 American Control Conference, 2021

2020
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside.
EAI Endorsed Trans. Security Safety, 2020

Optimized idling grid-connection strategy for synchronous condenser.
Turkish J. Electr. Eng. Comput. Sci., 2020

Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Fast bit-vector satisfiability.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Relationship Between Young Children's Problematic Behaviors, Videogaming Status, and Parenting Styles.
Proceedings of the HCI in Games, 2020

Can Video Game Training Improve the Two-Dimensional Mental Rotation Ability of Young Children? - A Randomized Controlled Trial.
Proceedings of the HCI in Games, 2020

The Role of Parenting Styles and Parents' Involvement in Young Children's Videogames Use.
Proceedings of the HCI in Games, 2020

Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
High-Precision Indoor Visible Light Positioning Using Modified Momentum Back Propagation Neural Network with Sparse Training Point.
Sensors, 2019

A High Efficient Code for Visible Light Positioning System Based on Image Sensor.
IEEE Access, 2019

Informer: irregular traffic detection for containerized microservices RPC in the real world.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Reaching Data Confidentiality and Model Accountability on the CalTrain.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018

Query grouping-based multi-query optimization framework for interactive SQL query engines on Hadoop.
Concurr. Comput. Pract. Exp., 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018

All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
Proceedings of the IEEE Global Communications Conference, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
IDIoT: Securing the Internet of Things like it's 1994.
CoRR, 2017

SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces.
IEEE Trans. Serv. Comput., 2016

Exploiting Insurance Telematics for Fun and Profit.
CoRR, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

An Improved Algorithm Based on ROMP for Compressive Sensing.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

Semantics-Based Repackaging Detection for Mobile Apps.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Learning from Big Malwares.
Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, 2016

2015
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study.
Int. J. Softw. Tools Technol. Transf., 2014

ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

2012
Modelling Chinese Smart Grid: A Stochastic Model Checking Case Study
CoRR, 2012

Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

2011
A hybrid ranking approach to estimate vulnerability for dynamic attacks.
Comput. Math. Appl., 2011

Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Mining Hot Clusters of Similar Anomalies for System Management.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

Estimate the influential level of vulnerability instance based on hybrid ranking for dynamic network attacking scenarios.
Proceedings of the 10th International Conference on Information Sciences, 2010

2009
A Novel Top-k Query Scheme in Unstructured P2P Networks.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2006
Grid Service Three-step Matching Model Based on Ontology.
Proceedings of the 14th IEEE International Conference on Networks, 2006


  Loading...