Teng Huang

Orcid: 0000-0001-7261-6398

Affiliations:
  • Guangzhou University, Institute of Artificial Intelligence and Blockchain, Guangzhou, China
  • Beihang University, Beijing, China (PhD 2019)


According to our database1, Teng Huang authored at least 55 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Hierarchical Network With Local-Global Awareness for Ethereum Account De-anonymization.
IEEE Trans. Syst. Man Cybern. Syst., September, 2025

SAMamba: Structure-Aware Mamba for Ethereum Fraud Detection.
IEEE Trans. Inf. Forensics Secur., 2025

2024
Bag of tricks for backdoor learning.
Wirel. Networks, November, 2024

zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets.
Trans. Emerg. Telecommun. Technol., April, 2024

Defenses to Membership Inference Attacks: A Survey.
ACM Comput. Surv., April, 2024

Slim UNETR: Scale Hybrid Transformers to Efficient 3D Medical Image Segmentation Under Limited Computational Resources.
IEEE Trans. Medical Imaging, March, 2024

A Debiasing Autoencoder for Recommender System.
IEEE Trans. Consumer Electron., February, 2024

AdaptFormer: An Adaptive Hierarchical Semantic Approach for Change Detection on Remote Sensing Images.
IEEE Trans. Instrum. Meas., 2024

Cam-PC: A Novel Method for Camouflaging Point Clouds to Counter Adversarial Deception in Remote Sensing.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

LEOCN: Real-time and complete network simulation framework for LEO constellation networks<sup>1</sup>.
J. High Speed Networks, 2024

Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024

Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus.
Comput. Stand. Interfaces, 2024

Model architecture level privacy leakage in neural networks.
Sci. China Inf. Sci., 2024

Comprehensive Transformer Integration Network (CTIN): Advancing Endoscopic Disease Segmentation with Hybrid Transformer Architecture.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

IPM: An Intelligent Component for 3D Brain Tumor Segmentation Integrating Semantic Extractor and Pixel Refiner.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

SFFAFormer: An Semantic Fusion and Feature Accumulation Approach for Remote Sensing Image Change Detection.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Optimized Breast Lesion Segmentation in Ultrasound Videos Across Varied Resource-Scant Environments.
Proceedings of the Computer Vision - ACCV 2024, 2024

2023
A stealthy and robust backdoor attack via frequency domain transform.
World Wide Web (WWW), September, 2023

Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion.
Sensors, August, 2023

Smart contract watermarking based on code obfuscation.
Inf. Sci., May, 2023

Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval.
Neural Comput. Appl., April, 2023

Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

Holistic Implicit Factor Evaluation of Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Explanation leaks: Explanation-guided model extraction attacks.
Inf. Sci., 2023

A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability.
Int. J. Intell. Syst., 2023

AgileNet: A Rapid and Efficient Breast Lesion Segmentation Method for Medical Image Analysis.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Lightweight Multispectral Skeleton and Multi-stream Graph Attention Networks for Enhanced Action Prediction with Multiple Modalities.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

MMA: Multi-Metric-Autoencoder for Analyzing High-Dimensional and Incomplete Data.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Experimental Comparison of Graph Edit Distance Computation Methods.
Proceedings of the 24th IEEE International Conference on Mobile Data Management, 2023

A Survey of Privacy Preserving Subgraph Matching Methods.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Similarity-based integrity protection for deep learning systems.
Inf. Sci., 2022

CRFL: A novel federated learning scheme of client reputation assessment via local model inversion.
Int. J. Intell. Syst., 2022

Towards explainable model extraction attacks.
Int. J. Intell. Syst., 2022

Understanding adaptive gradient clipping in DP-SGD, empirically.
Int. J. Intell. Syst., 2022

DPCL: Contrastive representation learning with differential privacy.
Int. J. Intell. Syst., 2022

Multi-Metric AutoRec for High Dimensional and Sparse User Behavior Data Prediction.
CoRR, 2022

Auto-Focus Contrastive Learning for Image Manipulation Detection.
CoRR, 2022

AutoRec++: Incorporating Debias Methods into Autoencoder-based Recommender System.
Proceedings of the IEEE Smartworld, 2022

2021
Adversarial examples: attacks and defenses in the physical world.
Int. J. Mach. Learn. Cybern., 2021

Querying little is enough: Model inversion attack via latent information.
Int. J. Intell. Syst., 2021

Camdar-adv: Generating adversarial patches on 3D object.
Int. J. Intell. Syst., 2021

A Novel Semi-Supervised Convolutional Neural Network Method for Synthetic Aperture Radar Image Recognition.
Cogn. Comput., 2021

Adversarial perturbation in remote sensing image recognition.
Appl. Soft Comput., 2021

2020
A dynamic and hierarchical access control for IoT in multi-authority cloud storage.
J. Netw. Comput. Appl., 2020

Adversarial attacks on deep-learning-based SAR image target recognition.
J. Netw. Comput. Appl., 2020

Adversarial attacks on deep-learning-based radar range profile target recognition.
Inf. Sci., 2020

A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme.
Complex., 2020

Adversarial Example Attacks in the Physical World.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Universal Adversarial Perturbations of Malware.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

Camdar-Adv: Method for Generating Adversarial Patches on 3D Object.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

2019
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment.
Complex., 2019

A Novel Semi-Supervised Learning Method Based on Fast Search and Density Peaks.
Complex., 2019

A New Algorithm for SAR Image Target Recognition Based on an Improved Deep Convolutional Neural Network.
Cogn. Comput., 2019

A Novel HRRP Target Recognition Method Based on LSTM and HMM Decision-making.
Proceedings of the 25th International Conference on Automation and Computing, 2019

2017
Combining Deep Convolutional Neural Network and SVM to SAR Image Target Recognition.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017


  Loading...