Wenchao Huang

According to our database1, Wenchao Huang authored at least 49 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
TW-See: Human Activity Recognition Through the Wall With Commodity Wi-Fi Devices.
IEEE Trans. Vehicular Technology, 2019

AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications.
Neurocomputing, 2019

DC-Link Voltage Regulation for Wind Power System by Complementary Sliding Mode Control.
IEEE Access, 2019

Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Observer and Controller Design for State-Delay Takagi-Sugeno Fuzzy Systems Subjected to Unknown Time-Varying Output Delays.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

2018
Wide Swath Stereo Mapping from Gaofen-1 Wide-Field-View (WFV) Images Using Calibration.
Sensors, 2018

Extrinsic Calibration of 2D Laser Rangefinders Based on a Mobile Sphere.
Remote Sensing, 2018

Lightitude: Indoor Positioning Using Uneven Light Intensity Distribution.
IMWUT, 2018

Robust consensus control for a class of second-order multi-agent systems with uncertain topology and disturbances.
Neurocomputing, 2018

AppDNA: App Behavior Profiling via Graph-based Deep Learning.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Deep Learning Approach Based on CSP for EEG Analysis.
Proceedings of the Intelligent Information Processing IX, 2018

A Novel Detection Method for Word-Based DGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Formal Framework for State Continuity of Protected Modules.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Formally Verifying Memory Isolation Based on ARM Processors.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Automatically Detecting Malicious Sensitive Data Usage in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Detecting Stubborn Permission Requests in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Identifying Superfluous Network Transmissions in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

KeyChain: Blockchain-Based Key Distribution.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers.
IEEE Journal on Selected Areas in Communications, 2017

A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems.
I. J. Network Security, 2017

AccountTrade: Accountable protocols for big data trading against dishonest consumers.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

LightCon: Simplify line-of-sight connection with visible symbols in industrial wireless networks.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A Verified Secure Protocol Model of OAuth Dynamic Client Registration.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Mining Anomalous Usage of Sensitive Data through Anomaly Detection.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
An Accurate Direction Finding Scheme Using Virtual Antenna Array via Smartphones.
Sensors, 2016

Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones.
IEEE Trans. Mob. Comput., 2015

Robust consensus for linear multi-agent systems with mixed uncertainties.
Systems & Control Letters, 2015

Magemite: Character inputting system based on magnetic sensor.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation.
Proceedings of the Database Systems for Advanced Applications, 2015

Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2014
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2014

Demo: visual attention driven networking with smart glasses.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

It starts with iGaze: visual attention driven networking with smart glasses.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Fine-Grained Refinement on TPM-Based Protocol Applications.
IEEE Trans. Information Forensics and Security, 2013

An efficient compressive data gathering routing scheme for large-scale wireless sensor networks.
Computers & Electrical Engineering, 2013

TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Integrating Social Information into Collaborative Filtering for Celebrities Recommendation.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

2012
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012

2011
The Study and Development of Modern Wave Soldering Materials for 3C Products.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2009
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...