Wenchao Huang
Orcid: 0000-0002-2043-2439Affiliations:
- University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
According to our database1,
Wenchao Huang
authored at least 82 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Detecting Android Malware by Visualizing App Behaviors From Multiple Complementary Views.
IEEE Trans. Inf. Forensics Secur., 2025
2024
IEEE Trans. Dependable Secur. Comput., 2024
WACANA: A Concolic Analyzer for Detecting On-chain Data Vulnerabilities in WASM Smart Contracts.
CoRR, 2024
JANUS: A Difference-Oriented Analyzer For Financial Centralization Risks in Smart Contracts.
CoRR, 2024
LightSLH: Provable and Low-Overhead Spectre v1 Mitigation through Targeted Instruction Hardening.
CoRR, 2024
Encrypted Mining Traffic Detection Mechanism Based on TLS Handshake Message and Machine Learning.
Proceedings of the 10th International Conference on Big Data Computing and Communications, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
2022
2021
AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs.
IEEE Trans. Inf. Forensics Secur., 2021
Frontiers Comput. Sci., 2021
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
Security Analysis of Session Initiation Protocol Digest Access Authentication Scheme.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021
2020
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications.
IEEE Syst. J., 2020
A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security.
Quantum Inf. Process., 2020
Incremental learning imbalanced data streams with concept drift: The dynamic updated ensemble algorithm.
Knowl. Based Syst., 2020
Inf. Process. Lett., 2020
Int. J. Netw. Secur., 2020
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications.
Int. J. Netw. Secur., 2020
Int. J. Netw. Secur., 2020
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies.
Proceedings of the 29th USENIX Security Symposium, 2020
Identifying compatibility-related APIs by exploring biased distribution in Android apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
Automated Theorem Proving via Interacting with Proof Assistants by Dynamic Strategies.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020
2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Inf. Forensics Secur., 2019
AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications.
Neurocomputing, 2019
Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem.
Discret. Appl. Math., 2019
CoRR, 2019
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
Drift-detection Based Incremental Ensemble for Reacting to Different Kinds of Concept Drift.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
2017
IEEE J. Sel. Areas Commun., 2017
A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems.
Int. J. Netw. Secur., 2017
AccountTrade: Accountable protocols for big data trading against dishonest consumers.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
2016
Sensors, 2016
Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016
2015
Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones.
IEEE Trans. Mob. Comput., 2015
WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker.
CoRR, 2015
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the Database Systems for Advanced Applications, 2015
Proceedings of the Big Data Computing and Communications - First International Conference, 2015
2014
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
CoRR, 2013
CoRR, 2013
An efficient compressive data gathering routing scheme for large-scale wireless sensor networks.
Comput. Electr. Eng., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Integrating Social Information into Collaborative Filtering for Celebrities Recommendation.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013
2012
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012
2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009