Wei-qing Huang

According to our database1, Wei-qing Huang authored at least 15 papers between 2014 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Efficient and anti-interference method of synchronising information extraction for cideo leaking signal.
IET Signal Process., 2016

Method for detecting text information leakage in electromagnetic radiation from a computer display.
IET Inf. Secur., 2016

Method for Detecting Information Leakage from Computer Display in Electromagnetic Radiation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Polarization state Modulation based Physical Layer Security scheme for Wireless Communications.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
A Near Field Communication(NFC) Security Model Based on OSI Reference Model.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2015

POSTER: A Security Adaptive Steganography System Applied on Digital Audio.
Proceedings of the Security and Privacy in Communication Networks, 2015

A spectrum efficient polarized OFDM scheme for wireless depolarized channel.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

A spectrum efficient polarized PSK/QAM scheme in the wireless channel with polarization dependent loss effect.
Proceedings of the 22nd International Conference on Telecommunications, 2015

An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
An efficient visualization method of RFID indoor positioning data.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

A novel method for computer video leaking signal detection.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014


  Loading...