Heqing Huang

According to our database1, Heqing Huang authored at least 24 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Query grouping-based multi-query optimization framework for interactive SQL query engines on Hadoop.
Concurrency and Computation: Practice and Experience, 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces.
IEEE Trans. Services Computing, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Semantics-Based Repackaging Detection for Mobile Apps.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Learning from Big Malwares.
Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, 2016

2015
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study.
STTT, 2014

ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

2012
Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

2011
A hybrid ranking approach to estimate vulnerability for dynamic attacks.
Computers & Mathematics with Applications, 2011

Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Mining Hot Clusters of Similar Anomalies for System Management.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

Estimate the influential level of vulnerability instance based on hybrid ranking for dynamic network attacking scenarios.
Proceedings of the 10th International Conference on Information Sciences, 2010

2009
A Novel Top-k Query Scheme in Unstructured P2P Networks.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2006
Grid Service Three-step Matching Model Based on Ontology.
Proceedings of the 14th IEEE International Conference on Networks, 2006


  Loading...