Heqing Huang

According to our database1, Heqing Huang authored at least 27 papers between 2006 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


High-Precision Indoor Visible Light Positioning Using Modified Momentum Back Propagation Neural Network with Sparse Training Point.
Sensors, 2019

A High Efficient Code for Visible Light Positioning System Based on Image Sensor.
IEEE Access, 2019

Query grouping-based multi-query optimization framework for interactive SQL query engines on Hadoop.
Concurrency and Computation: Practice and Experience, 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018

All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
Proceedings of the IEEE Global Communications Conference, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces.
IEEE Trans. Services Computing, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Semantics-Based Repackaging Detection for Mobile Apps.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Learning from Big Malwares.
Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, 2016

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study.
STTT, 2014

ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

A hybrid ranking approach to estimate vulnerability for dynamic attacks.
Computers & Mathematics with Applications, 2011

Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

Mining Hot Clusters of Similar Anomalies for System Management.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

Estimate the influential level of vulnerability instance based on hybrid ranking for dynamic network attacking scenarios.
Proceedings of the 10th International Conference on Information Sciences, 2010

A Novel Top-k Query Scheme in Unstructured P2P Networks.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

Grid Service Three-step Matching Model Based on Ontology.
Proceedings of the 14th IEEE International Conference on Networks, 2006