Wenchao Huang

Orcid: 0000-0002-9735-9356

According to our database1, Wenchao Huang authored at least 101 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Underwater Cable Localization Method Based on Beetle Swarm Optimization Algorithm.
IEEE CAA J. Autom. Sinica, September, 2023

Reachable set estimation of multi-agent systems with semi-Markov switching topologies and time-delay.
J. Frankl. Inst., 2023

Automated Inference on Financial Security of Ethereum Smart Contracts.
Proceedings of the 32nd USENIX Security Symposium, 2023

EOSVERIF: An Automated Analyzer for EOSIO Smart Contracts.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

MVVDroid: Android Malware Detection based on Multi-View Visualization.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

2022
Learning-Based Bending Stiffness Parameter Estimation by a Drape Tester.
ACM Trans. Graph., 2022

Robust distributed adaptive consensus for linear multiagent systems with uncertain topologies.
Trans. Inst. Meas. Control, 2022

Research on air quality prediction based on improved long short-term memory network algorithm.
PeerJ Comput. Sci., 2022

Place recognition and navigation of outdoor mobile robots based on random Forest learning with a 3D LiDAR.
J. Intell. Robotic Syst., 2022

Event-triggered leader-following consensus of multi-agent systems under semi-Markov switching topology with partially unknown rates.
J. Frankl. Inst., 2022

Distributed Robust Containment Control of Linear Heterogeneous Multi-Agent Systems: An Output Regulation Approach.
IEEE CAA J. Autom. Sinica, 2022

An Automated Analyzer for Financial Security of Ethereum Smart Contracts.
CoRR, 2022

2021
Robust H∞ control for nonlinear course system of unmanned surface vessel with polytopic uncertainty based on sum of squares.
Trans. Inst. Meas. Control, 2021

AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs.
IEEE Trans. Inf. Forensics Secur., 2021

Robust distributed adaptive consensus for discrete-time multiagent systems with uncertain topologies.
Neurocomputing, 2021

A proactive secret sharing scheme based on Chinese remainder theorem.
Frontiers Comput. Sci., 2021

Static Type Inference for Foreign Functions of Python.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Security Analysis of Session Initiation Protocol Digest Access Authentication Scheme.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

2020
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications.
IEEE Syst. J., 2020

Limiting Privacy Breaches in Average-Distance Query.
Secur. Commun. Networks, 2020

A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security.
Quantum Inf. Process., 2020

Incremental learning imbalanced data streams with concept drift: The dynamic updated ensemble algorithm.
Knowl. Based Syst., 2020

Threshold changeable secret sharing with secure secret reconstruction.
Inf. Process. Lett., 2020

On reachable set estimation of multi-agent systems.
Neurocomputing, 2020

A Formal Framework of Shielding Systems by Stepwise Refinement.
Int. J. Netw. Secur., 2020

Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications.
Int. J. Netw. Secur., 2020

Static Analysis of Superfluous Network Transmissions in Android Applications.
Int. J. Netw. Secur., 2020

SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies.
Proceedings of the 29th USENIX Security Symposium, 2020

Identifying compatibility-related APIs by exploring biased distribution in Android apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

Joint Self-Attention and Multi-Embeddings for Chinese Named Entity Recognition.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

Automated Theorem Proving via Interacting with Proof Assistants by Dynamic Strategies.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

KIMS: Kernel Integrity Measuring System based on TrustZone.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

Context-aware Generation of Proof Scripts for Theorem Proving.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

SPrune: A Code Pruning Tool for Ethereum Solidity Contract Static Analysis.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

2019
TW-See: Human Activity Recognition Through the Wall With Commodity Wi-Fi Devices.
IEEE Trans. Veh. Technol., 2019

Complementary sliding mode control with adaptive switching gain for PMSM.
Trans. Inst. Meas. Control, 2019

AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers.
IEEE Trans. Inf. Forensics Secur., 2019

AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications.
Neurocomputing, 2019

Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem.
Discret. Appl. Math., 2019

Tightly Coupled Secret Sharing and Its Application to Group Authentication.
CoRR, 2019

DC-Link Voltage Regulation for Wind Power System by Complementary Sliding Mode Control.
IEEE Access, 2019

Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Observer and Controller Design for State-Delay Takagi-Sugeno Fuzzy Systems Subjected to Unknown Time-Varying Output Delays.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

Real-Time Multi-Modal People Detection and Tracking of Mobile Robots with A RGB-D Sensor.
Proceedings of the 4th IEEE International Conference on Advanced Robotics and Mechatronics, 2019

An Observational Study on Compatibility-Related API Usage.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

Differentially Private Geo-Social Ranking.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

Drift-detection Based Incremental Ensemble for Reacting to Different Kinds of Concept Drift.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

Formal Verification of BNB Smart Contract.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

FLChain: A Blockchain for Auditable Federated Learning with Trust and Incentive.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

2018
Wide Swath Stereo Mapping from Gaofen-1 Wide-Field-View (WFV) Images Using Calibration.
Sensors, 2018

Extrinsic Calibration of 2D Laser Rangefinders Based on a Mobile Sphere.
Remote. Sens., 2018

Lightitude: Indoor Positioning Using Uneven Light Intensity Distribution.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Robust consensus control for a class of second-order multi-agent systems with uncertain topology and disturbances.
Neurocomputing, 2018

Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem.
IACR Cryptol. ePrint Arch., 2018

Verifying Security Protocols using Dynamic Strategies.
CoRR, 2018

AppDNA: App Behavior Profiling via Graph-based Deep Learning.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Deep Learning Approach Based on CSP for EEG Analysis.
Proceedings of the Intelligent Information Processing IX, 2018

A Novel Detection Method for Word-Based DGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Formal Framework for State Continuity of Protected Modules.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Formally Verifying Memory Isolation Based on ARM Processors.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Automatically Detecting Malicious Sensitive Data Usage in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Detecting Stubborn Permission Requests in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Identifying Superfluous Network Transmissions in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

KeyChain: Blockchain-Based Key Distribution.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

2017
Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers.
IEEE J. Sel. Areas Commun., 2017

A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems.
Int. J. Netw. Secur., 2017

AccountTrade: Accountable protocols for big data trading against dishonest consumers.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

LightCon: Simplify line-of-sight connection with visible symbols in industrial wireless networks.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A Verified Secure Protocol Model of OAuth Dynamic Client Registration.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Mining Anomalous Usage of Sensitive Data through Anomaly Detection.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
An Accurate Direction Finding Scheme Using Virtual Antenna Array via Smartphones.
Sensors, 2016

Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones.
IEEE Trans. Mob. Comput., 2015

Robust consensus for linear multi-agent systems with mixed uncertainties.
Syst. Control. Lett., 2015

WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker.
CoRR, 2015

Magemite: Character inputting system based on magnetic sensor.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation.
Proceedings of the Database Systems for Advanced Applications, 2015

Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2014
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014

Demo: visual attention driven networking with smart glasses.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

It starts with iGaze: visual attention driven networking with smart glasses.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Fine-Grained Refinement on TPM-Based Protocol Applications.
IEEE Trans. Inf. Forensics Secur., 2013

Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining.
CoRR, 2013

A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
CoRR, 2013

Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones.
CoRR, 2013

An efficient compressive data gathering routing scheme for large-scale wireless sensor networks.
Comput. Electr. Eng., 2013

TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Integrating Social Information into Collaborative Filtering for Celebrities Recommendation.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

2012
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012

2011
The Study and Development of Modern Wave Soldering Materials for 3C Products.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2009
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

1997
Norms and Inequalities Related to Schur Products of Rectangular Matrices.
SIAM J. Matrix Anal. Appl., April, 1997

Approximability by Weighted Norms of the Structured and VolumetricSingular Values of a Class of Nonnegative Matrices.
SIAM J. Matrix Anal. Appl., January, 1997


  Loading...