Teng Huang

Orcid: 0000-0001-7261-6398

According to our database1, Teng Huang authored at least 79 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets.
Trans. Emerg. Telecommun. Technol., April, 2024

Defenses to Membership Inference Attacks: A Survey.
ACM Comput. Surv., April, 2024

Slim UNETR: Scale Hybrid Transformers to Efficient 3D Medical Image Segmentation Under Limited Computational Resources.
IEEE Trans. Medical Imaging, March, 2024

Cam-PC: A Novel Method for Camouflaging Point Clouds to Counter Adversarial Deception in Remote Sensing.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

LEOCN: Real-time and complete network simulation framework for LEO constellation networks<sup>1</sup>.
J. High Speed Networks, 2024

2023
Empirical study of privacy inference attack against deep reinforcement learning models.
Connect. Sci., December, 2023

A stealthy and robust backdoor attack via frequency domain transform.
World Wide Web (WWW), September, 2023

Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion.
Sensors, August, 2023

Publishing locally private high-dimensional synthetic data efficiently.
Inf. Sci., July, 2023

Smart contract watermarking based on code obfuscation.
Inf. Sci., May, 2023

Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval.
Neural Comput. Appl., April, 2023

A Dataset of Service Time and Related Patient Characteristics from an Outpatient Clinic.
Data, March, 2023

Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2023

Holistic Implicit Factor Evaluation of Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Explanation leaks: Explanation-guided model extraction attacks.
Inf. Sci., 2023

A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability.
Int. J. Intell. Syst., 2023

A Physically Feasible Counter-Attack Method for Remote Sensing Imaging Point Clouds.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

AgileNet: A Rapid and Efficient Breast Lesion Segmentation Method for Medical Image Analysis.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Event Sparse Net: Sparse Dynamic Graph Multi-representation Learning with Temporal Attention for Event-Based Data.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Lightweight Multispectral Skeleton and Multi-stream Graph Attention Networks for Enhanced Action Prediction with Multiple Modalities.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

MMA: Multi-Metric-Autoencoder for Analyzing High-Dimensional and Incomplete Data.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Experimental Comparison of Graph Edit Distance Computation Methods.
Proceedings of the 24th IEEE International Conference on Mobile Data Management, 2023

Progressive Label Propagation for Semi-Supervised Multi-Dimensional Classification.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

A Survey of Privacy Preserving Subgraph Matching Methods.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Challenges and Prospects to Time Series Burst Overlap Interferometry (BOI): Some Insights From a New BOI Algorithm Test Over the Chaman Fault.
IEEE Trans. Geosci. Remote. Sens., 2022

A New Spatiotemporal InSAR Tropospheric Noise Filtering: An Interseismic Case Study Over Central San Andreas Fault.
IEEE Trans. Geosci. Remote. Sens., 2022

Quantum-Enhanced Deep Learning-Based Lithology Interpretation From Well Logs.
IEEE Trans. Geosci. Remote. Sens., 2022

Seismic Local Instantaneous Frequency Extraction for Describing Superposed Sands.
IEEE Geosci. Remote. Sens. Lett., 2022

Similarity-based integrity protection for deep learning systems.
Inf. Sci., 2022

Cloud-Based Computational Data-Enabled Predictive Control.
IEEE Internet Things J., 2022

Template-Based Minor Embedding for Adiabatic Quantum Optimization.
INFORMS J. Comput., 2022

JANOS: An Integrated Predictive and Prescriptive Modeling Framework.
INFORMS J. Comput., 2022

CRFL: A novel federated learning scheme of client reputation assessment via local model inversion.
Int. J. Intell. Syst., 2022

Towards explainable model extraction attacks.
Int. J. Intell. Syst., 2022

Sparse-Dyn: Sparse dynamic graph multirepresentation learning via event-based sparse temporal attention network.
Int. J. Intell. Syst., 2022

Graph Decipher: A transparent dual-attention graph neural network to understand the message-passing mechanism for the node classification.
Int. J. Intell. Syst., 2022

Understanding adaptive gradient clipping in DP-SGD, empirically.
Int. J. Intell. Syst., 2022

DPCL: Contrastive representation learning with differential privacy.
Int. J. Intell. Syst., 2022

A Supervised Link Prediction Method Using Optimized Vertex Collocation Profile.
Entropy, 2022

Multi-Metric AutoRec for High Dimensional and Sparse User Behavior Data Prediction.
CoRR, 2022

Auto-Focus Contrastive Learning for Image Manipulation Detection.
CoRR, 2022

AutoRec++: Incorporating Debias Methods into Autoencoder-based Recommender System.
Proceedings of the IEEE Smartworld, 2022

Towards Differentially Private Contrastive Learning.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
Robust Model Predictive Tracking Control for Robot Manipulators With Disturbances.
IEEE Trans. Ind. Electron., 2021

A Sequential Approach for Sentinel-1 TOPS Time-Series Co-Registration Over Low Coherence Scenarios.
IEEE Trans. Geosci. Remote. Sens., 2021

Adversarial examples: attacks and defenses in the physical world.
Int. J. Mach. Learn. Cybern., 2021

Querying little is enough: Model inversion attack via latent information.
Int. J. Intell. Syst., 2021

Camdar-adv: Generating adversarial patches on 3D object.
Int. J. Intell. Syst., 2021

PLD-SLAM: A New RGB-D SLAM Method with Point and Line Features for Indoor Dynamic Scene.
ISPRS Int. J. Geo Inf., 2021

A Novel Semi-Supervised Convolutional Neural Network Method for Synthetic Aperture Radar Image Recognition.
Cogn. Comput., 2021

CMT: An Efficient Algorithm for Scalable Packet Classification.
Comput. J., 2021

Adversarial perturbation in remote sensing image recognition.
Appl. Soft Comput., 2021

Social Media Sentiment and COVID-19 Transmission: Results from a Time-varying SIR Model.
Proceedings of the 25th Pacific Asia Conference on Information Systems, 2021

Dual-Channel Graph Contextual Self-Attention Network for Session-Based Recommendation.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
A dynamic and hierarchical access control for IoT in multi-authority cloud storage.
J. Netw. Comput. Appl., 2020

Adversarial attacks on deep-learning-based SAR image target recognition.
J. Netw. Comput. Appl., 2020

Adversarial attacks on deep-learning-based radar range profile target recognition.
Inf. Sci., 2020

A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme.
Complex., 2020

Adversarial Example Attacks in the Physical World.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Querying Little Is Enough: Model Inversion Attack via Latent Information.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Predicting Pushing Action Effects on Spatial Object Relations by Learning Internal Prediction Models.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

Universal Adversarial Perturbations of Malware.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

Camdar-Adv: Method for Generating Adversarial Patches on 3D Object.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

A preliminary investigation of COVID -19 transmission in the United States by incorporating social media sentiments.
Proceedings of the Information for a Sustainable World: Addressing Society's Grand Challenges, 2020

2019
A New Model of RGB-D Camera Calibration Based On 3D Control Field.
Sensors, 2019

An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment.
Complex., 2019

A Novel Semi-Supervised Learning Method Based on Fast Search and Density Peaks.
Complex., 2019

A New Algorithm for SAR Image Target Recognition Based on an Improved Deep Convolutional Neural Network.
Cogn. Comput., 2019

A Novel HRRP Target Recognition Method Based on LSTM and HMM Decision-making.
Proceedings of the 25th International Conference on Automation and Computing, 2019

Single Image Dehazing Algorithm Based on Sky Segmentation.
Proceedings of the 6th International Conference on Behavioral, 2019

2018
Predictive and Prescriptive Analytics for Location Selection of Add-on Retail Products.
CoRR, 2018

2017
Combining Deep Convolutional Neural Network and SVM to SAR Image Target Recognition.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

The Comparison of Single-Hop and LEACH Protocols in Wireless Sensor Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2015
A Simplified and Efficient LTE RRC Conformance Testing Adapter.
J. Softw., 2015

TTCN-3 Codec Implementation for LTE RRM Conformance Test.
J. Softw., 2015

Design and Implementation of System Under Test for LTE Protocol Conformance Testing.
J. Commun., 2015

2014
Study of Cl<sup>-</sup>(H<sub>2</sub>O)<sub><i>n</i></sub> (<i>n</i> = 1-4) using basin-hopping method coupled with density functional theory.
J. Comput. Chem., 2014

The ABCIT research platform.
Proceedings of the 14th International Workshop on Acoustic Signal Enhancement, 2014


  Loading...