According to our database1, Heqing Huang authored at least 27 papers between 2006 and 2019.
Legend:Book In proceedings Article PhD thesis Other
High-Precision Indoor Visible Light Positioning Using Modified Momentum Back Propagation Neural Network with Sparse Training Point.
A High Efficient Code for Visible Light Positioning System Based on Image Sensor.
IEEE Access, 2019
Query grouping-based multi-query optimization framework for interactive SQL query engines on Hadoop.
Concurrency and Computation: Practice and Experience, 2018
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
Proceedings of the IEEE Global Communications Conference, 2018
Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces.
IEEE Trans. Services Computing, 2016
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016
Semantics-Based Repackaging Detection for Mobile Apps.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016
Learning from Big Malwares.
Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, 2016
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015
Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study.
ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012
A hybrid ranking approach to estimate vulnerability for dynamic attacks.
Computers & Mathematics with Applications, 2011
Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Mining Hot Clusters of Similar Anomalies for System Management.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010
Estimate the influential level of vulnerability instance based on hybrid ranking for dynamic network attacking scenarios.
Proceedings of the 10th International Conference on Information Sciences, 2010
A Novel Top-k Query Scheme in Unstructured P2P Networks.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
Grid Service Three-step Matching Model Based on Ontology.
Proceedings of the 14th IEEE International Conference on Networks, 2006