default search action
Weiqing Huang
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Shunliang Zhang, Weiqing Huang, Yinlong Liu:
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G. Comput. Secur. 148: 104100 (2025) - [c103]Bingyang Li, Weiqing Huang, Wen Wang, Qing Wang:
Spectrum Painting for On-Device Signal Classification. WoWMoM 2025: 229-238 - 2024
- [j21]Xinbo Han, Guizhong Xu, Meng Zhang, Zheng Yang, Ziyang Yu, Weiqing Huang, Chen Meng:
DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification. Comput. Networks 245: 110372 (2024) - [j20]Haitian Yang, Degang Sun, Yan Wang, Weiqing Huang:
DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks. Inf. Sci. 680: 121174 (2024) - [j19]Haitian Yang, Degang Sun, Weiqing Huang:
DualAttlog: Context aware dual attention networks for log-based anomaly detection. Neural Networks 180: 106680 (2024) - [c102]Ran Liu, Ming Liu, Min Yu, He Zhang, Jianguo Jiang, Gang Li, Weiqing Huang:
SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization. ACL (Findings) 2024: 9632-9651 - [c101]Guokun Xu, Weijie Wang, Degang Sun, Yanpeng Ma, Yan Wang, Weiqing Huang:
MLNT: A Multi-Level Network Traps Deployment Method. CSCWD 2024: 42-47 - [c100]Shuai Wang, Siye Wang, Yue Feng, Weiqing Huang, Shang Jiang, Yanfang Zhang:
RP-Fusion: Robust RFID Indoor Localization Via Fusion RSSI and Phase Fingerprint. CSCWD 2024: 145-150 - [c99]Ran Liu, Ming Liu, Min Yu, Jianguo Jiang, Gang Li, Dan Zhang, Jingyuan Li, Xiang Meng, Weiqing Huang:
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization. ECAI 2024: 3709-3716 - [c98]Miao Jiang, Min Li, Junxing Ren, Weiqing Huang:
HOICS: Zero-Shot Hoi Detection via Compatibility Self-Learning. ICASSP 2024: 1-5 - [c97]Lu Yuan, Jiyan Sun, Shangyuan Zhuang, Yinlong Liu, Liru Geng, Jing Zou, Peizhe Xin, Weiqing Huang, Wei Ma:
Manticore: An Unsupervised Intrusion Detection System Based on Contrastive Learning in 5G Networks. ICASSP 2024: 4705-4709 - [c96]Yangyang Zong, Zhixin Shi, Weiqing Huang:
LONGAN: Detecting Lateral Movement based on Heterogeneous Graph Neural Networks with Temporal Features. ISCC 2024: 1-6 - [i2]Haitian Yang, Degang Sun, Wen Liu, Yanshu Li, Yan Wang, Weiqing Huang:
ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis. CoRR abs/2402.11841 (2024) - [i1]Ran Liu, Ming Liu, Min Yu, Jianguo Jiang, Gang Li, Dan Zhang, Jingyuan Li, Xiang Meng, Weiqing Huang:
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization. CoRR abs/2408.10115 (2024) - 2023
- [j18]Chang He, Weiqing Huang, Haibin Ouyang, Steven Li, Jianhua Xiang:
Virus control optimizer based on the prevention and control mechanism of COVID-19 for engineering optimization problems. Appl. Soft Comput. 147: 110770 (2023) - [j17]Haitian Yang, Xiang Meng, Xuan Zhao, Yan Wang, Yuejun Liu, Xiaoyu Kang, Jiahui Shen, Weiqing Huang:
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication. Comput. Secur. 128: 103159 (2023) - [j16]Leiqi Wang, Xiu Ma, Ning Li, Qiujian Lv, Yan Wang, Weiqing Huang, Haiyan Chen:
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks. Comput. Secur. 135: 103466 (2023) - [j15]Yuemei Wu, Dong Wei, Caili Guo, Weiqing Huang:
Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems. IEEE Trans. Inf. Forensics Secur. 18: 2144-2159 (2023) - [c95]Leiqi Wang, Zijun Cheng, Qiujian Lv, Yan Wang, Shixiang Zhang, Weiqing Huang:
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks. CSCWD 2023: 47-52 - [c94]Yi Liu, Weiqing Huang, Siye Wang:
TransRF: Towards a Generalized and Cross-Domain RFID Sensing System Using Few-Shot Learning. CSCWD 2023: 571-576 - [c93]He Zhu, Ce Li, Haitian Yang, Yan Wang, Weiqing Huang:
Prompt Makes mask Language Models Better Adversarial Attackers. ICASSP 2023: 1-5 - [c92]Lu Yuan, Yuan Meng, Jiyan Sun, Shangyuan Zhuang, Yinlong Liu, Liru Geng, Weiqing Huang:
ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization. ICCS (5) 2023: 476-491 - [c91]Leiqi Wang, Xu Wang, Qiujian Lv, Yan Wang, Xinxing Zhou, Weiqing Huang:
CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks. IC-NIDC 2023: 414-420 - [c90]Haitian Yang, Degang Sun, Wen Liu, Yanshu Li, Yan Wang, Weiqing Huang:
ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis. ICONIP (4) 2023: 200-212 - [c89]Miao Jiang, Weiqing Huang, Min Li, Bo Meng, Junxing Ren, Ruwen Bai, Yang Yang:
UDA-HOID: Unsupervised Domain Adaptation for Human-Object Interaction Detection. ICTAI 2023: 603-610 - [c88]Yuanyuan Wang, Gengwang Li, Min Yu, Kam-Pui Chow, Jianguo Jiang, Xiang Meng, Weiqing Huang:
A Dynamic Malicious Document Detection Method Based on Multi-Memory Features. IFIP Int. Conf. Digital Forensics 2023: 203-218 - [c87]Haitian Yang, Degang Sun, Yan Wang, Nan Zhao, Shixiang Zhang, Weiqing Huang:
AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification. IJCNN 2023: 1-8 - [c86]Zhixin Shi, Hao Wu, Jing Zhang, Meng Zhang, Weiqing Huang:
FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers. ISCC 2023: 816-822 - [c85]Weiqing Huang, Yangyang Zong, Zhixin Shi, Puzhuo Liu:
MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning. ISCC 2023: 1274-1279 - [c84]Huadong Guo, Weiqing Huang, Wen Wang, Meng Zhang, Zhaohua Qiu, Jinglong Guo:
Analysis and Optimization of Anti-jamming Performance of User Terminals with Low Sidelobe Levels for LEO Satellite Systems. MILCOM 2023: 351-356 - [c83]Huadong Guo, Weiqing Huang, Wen Wang, Jinglong Guo, Zhaohua Qiu:
An Interference Mitigation Strategy for LEO Satellite Systems based on Adaptive Beamforming with Sidelobe Suppression. MSN 2023: 135-142 - [c82]Zheng Yang, Degang Sun, Yan Wang, Xinbo Han, Chen Meng, Weiqing Huang:
DTrap: A cyberattack-defense confrontation technique based on Moving Target Defense. TrustCom 2023: 2652-2659 - [c81]Cheng Peng, Wei Fan, Weiqing Huang, Dali Zhu:
A Novel Approach based on Improved Naive Bayes for 5G Air Interface DDoS Detection. WCNC 2023: 1-6 - 2022
- [j14]Haitian Yang, Xuan Zhao, Yan Wang, Degang Sun, Wei Chen, Weiqing Huang:
BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection. Knowl. Inf. Syst. 64(8): 2189-2213 (2022) - [j13]Weiqing Huang, Junkai Lian, Dawei An, Mingyang Chen, Yinfeng Lei:
Bidirectional Drive with Inhibited Hysteresis for Piezoelectric Actuators. Sensors 22(4): 1546 (2022) - [c80]Yue Feng, Weiqing Huang, Siye Wang, Yanfang Zhang, Shang Jiang, Ziwen Cao:
Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection. CollaborateCom (2) 2022: 75-90 - [c79]Bo Liu, Yanyun Xu, Weiqing Huang, Shaoying Guo:
Detecting USB Storage Device Behaviors by Exploiting Electromagnetic Emanations. ICC 2022: 4980-4985 - [c78]Weiqing Huang, Yangyang Zong, Zhixin Shi, Leiqi Wang, Pengcheng Liu:
PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection. IJCNN 2022: 1-8 - [c77]Fangtao Zhang, Xiu Ma, Weiqing Huang:
SeqA-ITD: User Behavior Sequence Augmentation for Insider Threat Detection at Multiple Time Granularities. IJCNN 2022: 1-7 - [c76]Yuemei Wu, Dong Wei, Jing Li, Weiqing Huang, Xiang Meng:
Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems. ISCC 2022: 1-7 - [c75]Jinlong Xu, Dong Wei, Weiqing Huang:
Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint. ISCC 2022: 1-7 - [c74]Yuemei Wu, Dong Wei, Qiaoyu Zhang, Weiqing Huang, Xiang Meng:
Physical Layer Authentication Based on Continuous Channel Polarization Response in Low SNR scenes. PIMRC 2022: 1116-1121 - [c73]Haitian Yang, Xuan Zhao, Yan Wang, Min Li, Wei Chen, Weiqing Huang:
DGQAN: Dual Graph Question-Answer Attention Networks for Answer Selection. SIGIR 2022: 1230-1239 - [c72]Weiqing Huang, Xinbo Han, Meng Zhang, Min Li, Wen Liu, Zheng Yang, Haitian Yang:
MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection. TrustCom 2022: 391-398 - [c71]Yiqing Liu, Weiqing Huang, Wen Wang, Jingru Geng, Zhaohua Qiu:
An Efficient Interference Calculation Model Based on Large Scale Constellations Probabilistic Analysis. WASA (2) 2022: 64-79 - [c70]Feng Guo, Ning Zhang, Qian Zou, Qingshan Kong, Zhiqiang Lv, Weiqing Huang:
MEBV: Resource Optimization for Packet Classification Based on Mapping Encoding Bit Vectors. WASA (3) 2022: 84-95 - [c69]Jinlong Xu, Dong Wei, Weiqing Huang:
Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT. WoWMoM 2022: 434-443 - 2021
- [j12]Yue Feng, Weiqing Huang, Siye Wang, Yanfang Zhang, Shang Jiang:
Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach. Comput. Networks 189: 107922 (2021) - [j11]Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li, Weiqing Huang:
An end-to-end text spotter with text relation networks. Cybersecur. 4(1): 7 (2021) - [j10]Jianguo Jiang, Boquan Li, Baole Wei, Gang Li, Chao Liu, Weiqing Huang, Meimei Li, Min Yu:
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. J. Comput. Secur. 29(4): 403-421 (2021) - [c68]Bo Liu, Qingshan Kong, Weiqing Huang, Shaoying Guo:
Detection of Events in OTDR Data via Variational Mode Decomposition and Hilbert Transform. ICCCS 2021: 38-43 - [c67]Zhongfeng Jin, Nan Li, Chao Liu, Meimei Li, Shaohua An, Weiqing Huang:
A Contextual and Content Features-Based Device Behavioral Fingerprinting Method in Smart Grid. HPCC/DSS/SmartCity/DependSys 2021: 415-422 - [c66]Shaoying Guo, Yanyun Xu, Weiqing Huang, Bo Liu:
An SEI-Based Identification Scheme for Illegal FM Broadcast. HPCC/DSS/SmartCity/DependSys 2021: 517-524 - [c65]Haitian Yang, Chonghui Zheng, Xuan Zhao, Yan Wang, Zheng Yang, Chao Ma, Qi Zhang, Weiqing Huang:
BERTDAN: Question-Answer Dual Attention Fusion Networks with Pre-trained Models for Answer Selection. ICONIP (3) 2021: 520-531 - [c64]Haitian Yang, Xuan Zhao, Degang Sun, Yan Wang, Weiqing Huang:
Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models. ICSOC 2021: 736-743 - [c63]Shaoying Guo, Yanyun Xu, Weiqing Huang, Bo Liu:
Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient. ICT 2021: 1-6 - [c62]Yuankun Wang, Weiqing Huang, Qiaoyu Zhang, Dong Wei:
A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis. ICT 2021: 1-6 - [c61]Weiqing Huang, Miao Jiang, Min Li, Bo Meng, Junxing Ren, Shixian Zhao, Ruwen Bai, Yang Yang:
Causal Intervention for Object Detection. ICTAI 2021: 770-774 - [c60]Jianguo Jiang, Nan Song, Min Yu, Kam-Pui Chow, Gang Li, Chao Liu, Weiqing Huang:
Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning. IFIP Int. Conf. Digital Forensics 2021: 135-155 - [c59]Degang Sun, Yunting Guo, Min Yu, Gang Li, Chao Liu, Jianguo Jiang, Weiqing Huang:
FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNN 2021: 1-8 - [c58]Weiqing Huang, Chenggang Jia, Min Yu, Gang Li, Chao Liu, Jianguo Jiang:
UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection. ISCC 2021: 1-7 - [c57]Weiqing Huang, He Zhu, Ce Li, Qiujian Lv, Yan Wang, Haitian Yang:
ITDBERT: Temporal-semantic Representation for Insider Threat Detection. ISCC 2021: 1-7 - [c56]Weiqing Huang, Yiqing Liu, Wen Wang, Jingru Geng:
A GSO Protected Area Calculation Model based on Controllable NGSO System Parameters. ISCC 2021: 1-6 - [c55]Chao Liu, Shuai Yu, Min Yu, Baole Wei, Boquan Li, Gang Li, Weiqing Huang:
Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios. ISCC 2021: 1-7 - [c54]Haitian Yang, Degang Sun, Yan Wang, He Zhu, Ning Li, Weiqing Huang:
FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication. ISCC 2021: 1-6 - [c53]Haitian Yang, Xuan Zhao, Degang Sun, Yan Wang, He Zhu, Chao Ma, Weiqing Huang:
Multi-Modal fake news Detection on Social Media with Dual Attention Fusion Networks. ISCC 2021: 1-6 - [c52]Chao Liu, Xintong Wei, Min Yu, Gang Li, Xiangmei Ma, Jianguo Jiang, Weiqing Huang:
Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels. KSEM 2021: 162-173 - [c51]Jianguo Jiang, Qiang Liu, Min Yu, Gang Li, Mingqi Liu, Chao Liu, Weiqing Huang:
Landscape-Enhanced Graph Attention Network for Rumor Detection. KSEM 2021: 188-199 - [c50]Weiqing Huang, Bingyang Li, Wen Wang, Meng Zhang, Sixue Lu, Yushan Han:
AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse Mapping. MSN 2021: 89-96 - [c49]Bo Liu, Yanyun Xu, Weiqing Huang, Shaoying Guo:
Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices. MSN 2021: 334-340 - [c48]Shaoying Guo, Yanyun Xu, Weiqing Huang, Bo Liu:
Specific Emitter Identification for WiFi Devices via Bezier Curve Fitting. PIMRC 2021: 1493-1499 - [c47]Leiqi Wang, Weiqing Huang, Qiujian Lv, Yan Wang, Haiyan Chen:
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic. WASA (2) 2021: 84-95 - [c46]Jianguo Jiang, Chenghao Wang, Min Yu, Chenggang Jia, Gang Li, Chao Liu, Weiqing Huang:
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary. WASA (2) 2021: 147-159 - [c45]Weiqing Huang, Zhaowen Feng, Yanyun Xu, Ning Zhang:
A Novel Method for Malicious Implanted Computer Video Cable Detection via Electromagnetic Features. WCNC 2021: 1-6 - [c44]Yuntao Wang, Weiqing Huang:
QAAN: Question Answering Attention Network for Community Question Classification. WCNC 2021: 1-6 - 2020
- [j9]Song Pan, Fan Zhang Xu, Lei Chen, Weiqing Huang, Jintao Wu:
Coupled Dynamic Modeling and Analysis of the Single Gimbal Control Moment Gyroscope Driven by Ultrasonic Motor. IEEE Access 8: 146233-146247 (2020) - [j8]Weiqing Huang, Yanfang Zhang, Yue Feng:
ACD: An Adaptable Approach for RFID Cloning Attack Detection. Sensors 20(8): 2378 (2020) - [j7]Shao-yi Zhu, Weiqing Huang, Chenggang Jia, Siye Wang, Bowen Li, Yanfang Zhang:
RF-AMOC: Human-related RFID Tag Movement Identification in Access Management of Carries. ACM Trans. Sens. Networks 16(4): 33:1-33:23 (2020) - [j6]Siye Wang, Ziwen Cao, Yanfang Zhang, Weiqing Huang, Jianguo Jiang:
A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data. Wirel. Commun. Mob. Comput. 2020: 6937912:1-6937912:12 (2020) - [c43]Jianguo Jiang, Yue Lu, Min Yu, Yantao Jia, Jiafeng Guo, Chao Liu, Weiqing Huang:
CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection. ECAI 2020: 1834-1841 - [c42]Jianguo Jiang, Gengwang Li, Min Yu, Gang Li, Chao Liu, Zhiqiang Lv, Bin Lv, Weiqing Huang:
Similarity of Binaries Across Optimization Levels and Obfuscation. ESORICS (1) 2020: 295-315 - [c41]Jianguo Jiang, Zhaoce Liu, Min Yu, Gang Li, Song Li, Chao Liu, Weiqing Huang:
HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph. HPCC/DSS/SmartCity 2020: 328-335 - [c40]Zhongfeng Jin, Nan Li, Chao Liu, Meimei Li, Shaohua An, Weiqing Huang:
A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks. HPCC/DSS/SmartCity 2020: 360-368 - [c39]Weiqing Huang, Xiao Peng, Zhixin Shi, Yuru Ma:
Adversarial Attack against LSTM-based DDoS Intrusion Detection System. ICTAI 2020: 686-693 - [c38]Weiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow, Jiuming Chen, Chao Liu, Jianguo Jiang:
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors. IFIP Int. Conf. Digital Forensics 2020: 57-72 - [c37]Weiqing Huang, Yi Liu, Shao-yi Zhu, Siye Wang, Yanfang Zhang:
TSCNN: A 3D Convolutional Activity Recognition Network Based on RFID RSSI. IJCNN 2020: 1-8 - [c36]Jianguo Jiang, Yue Lu, Min Yu, Gang Li, Chao Liu, Shaohua An, Weiqing Huang:
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection. ISCC 2020: 1-7 - [c35]Chao Liu, Xiangmei Ma, Min Yu, Xinghua Wu, Mingqi Liu, Jianguo Jiang, Weiqing Huang:
A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition. KSEM (1) 2020: 174-185 - [c34]Meimei Li, Chen Lang, Min Yu, Yue Lu, Chao Liu, Jianguo Jiang, Weiqing Huang:
SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection. KSEM (2) 2020: 288-299 - [c33]Yue Lu, Jianguo Jiang, Min Yu, Chao Liu, Chaochao Liu, Weiqing Huang, Zhiqiang Lv:
Depthwise Separable Convolutional Neural Network for Confidential Information Analysis. KSEM (2) 2020: 450-461 - [c32]Haitian Yang, Weiqing Huang, Xuan Zhao, Yan Wang, Yuyan Chen, Bin Lv, Rui Mao, Ning Li:
AMQAN: Adaptive Multi-Attention Question-Answer Networks for Answer Selection. ECML/PKDD (3) 2020: 584-599 - [c31]Ning Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang:
Novel design of Hardware Trojan: A generic approach for defeating testability based detection. TrustCom 2020: 162-173
2010 – 2019
- 2019
- [j5]Min Yu, Jianguo Jiang, Gang Li, Chenzhe Lou, Yunzheng Liu, Chao Liu, Weiqing Huang:
Malicious documents detection for business process management based on multi-layer abstract model. Future Gener. Comput. Syst. 99: 517-526 (2019) - [j4]Jing Wang, Jun Zhou, Weiqing Huang:
Attend in Bands: Hyperspectral Band Weighting and Selection for Image Classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 12(12): 4712-4727 (2019) - [c30]Weiqing Huang, Xiao Peng, Zhixin Shi:
A SeqGAN-Based Method for Mimicking Attack. Inscrypt 2019: 118-133 - [c29]Min Yu, Jianguo Jiang, Gang Li, Jingyuan Li, Chenzhe Lou, Chao Liu, Weiqing Huang, Yuanzhuo Wang:
A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction. HPCC/SmartCity/DSS 2019: 2317-2323 - [c28]Weiqing Huang, Shao-yi Zhu, Siye Wang, Jinxing Xie, Yanfang Zhang:
Sparse Representation for Device-Free Human Detection and Localization with COTS RFID. ICA3PP (1) 2019: 639-654 - [c27]Jianguo Jiang, Boquan Li, Min Yu, Chao Liu, Weiqing Huang, Lejun Fan, Jianfeng Xia:
Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection. ICANN (3) 2019: 711-723 - [c26]Dawei An, Qingshuang Ning, Weiqing Huang, Haodong Xue, Jianhui Zhang:
Effect of Damping Factor Variation on Eigenfrequency Drift for Ultrasonic Motors. ICIRA (2) 2019: 285-291 - [c25]Qiaoyu Zhang, Zhaoyang Yang, Wen Wang, Junxing Ren, Weiqing Huang, Ning Zhang:
A Dual-polarized Antennas Based Directional Modulation Scheme. ICT 2019: 468-473 - [c24]Xiao Peng, Weiqing Huang, Zhixin Shi:
Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method. ICTAI 2019: 1288-1295 - [c23]Jing Wang, Jun Zhou, Weiqing Huang, Jackie Fang Chen:
Attention Networks for Band Weighting And Selection In Hyperspectral Remote Sensing Image Classification. IGARSS 2019: 3820-3823 - [c22]Jianguo Jiang, Song Li, Min Yu, Gang Li, Chao Liu, Kai Chen, Hui Liu, Weiqing Huang:
Android Malware Family Classification Based on Sensitive Opcode Sequence. ISCC 2019: 1-7 - [c21]Chao Liu, Xinghua Wu, Min Yu, Gang Li, Jianguo Jiang, Weiqing Huang, Xiang Lu:
A Two-Stage Model Based on BERT for Short Fake News Detection. KSEM (2) 2019: 172-183 - [c20]Weiqing Huang, Zhongfeng Jin, Nan Li, Chao Liu, Meimei Li:
Machine Tools Fingerprinting for Distributed Numerical Control Systems. LCN 2019: 348-355 - [c19]Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation. MILCOM 2019: 1-6 - [c18]Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection. MILCOM 2019: 109-114 - [c17]Weiqing Huang, Qiaoyu Zhang, Dong Wei, Huiyan Li:
A Secure and Power-Efficient Constellations for Physical Layer Security. SmartIoT 2019: 479-483 - [c16]Weiqing Huang, Yan Li, Dong Wei, Qiaoyu Zhang:
Research on Physical Layer Security Scheme Based on OAM - Modulation for Wireless Communications. WASA 2019: 573-586 - 2018
- [c15]Chao Liu, Jianan Li, Min Yu, Gang Li, Bo Luo, Kai Chen, Jianguo Jiang, Weiqing Huang:
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. IPCCC 2018: 1-7 - [c14]Weiqing Huang, Jianfeng Xia, Min Yu, Chao Liu:
MPP: A Join-dividing Method for Multi-table Privacy Preservation. ISCC 2018: 310-315 - [c13]Jianguo Jiang, Yue Lu, Min Yu, Gang Li, Chao Liu, Weiqing Huang, Fangtao Zhang:
Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis. KSEM (2) 2018: 221-231 - [c12]Jianguo Jiang, Song Li, Min Yu, Kai Chen, Chao Liu, Weiqing Huang, Gang Li:
MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment. MASS 2018: 64-72 - [c11]Jianguo Jiang, Boquan Li, Min Yu, Chao Liu, Jianguo Sun, Weiqing Huang, Zhiqiang Lv:
AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks. PCM (2) 2018: 815-825 - [c10]Chao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Weiqing Huang, Bin Lv:
FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection. SecureComm (1) 2018: 281-293 - [c9]Jianguo Jiang, Qian Yu, Min Yu, Gang Li, Jiuming Chen, Kunying Liu, Chao Liu, Weiqing Huang:
ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS. TrustCom/BigDataSE 2018: 1565-1569 - [c8]Shao-yi Zhu, Siye Wang, Fangtao Zhang, Yanfang Zhang, Yue Feng, Weiqing Huang:
Environmentally Adaptive Real-Time Detection of RFID False Readings in a New Practical Scenario. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 338-345 - [c7]Xi Yin, Weiqing Huang, Mohsen Guizani:
HEVC Lossless Compression Coding Based on Hadamard Butterfly Transformation. WASA 2018: 606-621 - 2017
- [c6]Shanjing Yang, Xiaoyong Liao, Jianlin Hu, Weiqing Huang:
Recognition of Information Leakage of Computer via Conducted Emanations on the Power Line. BigDataSecurity/HPSC/IDS 2017: 139-144 - [c5]Yanyun Xu, Jianlin Hu, Meng Zhang, Weiqing Huang:
Electromagnetic side channel analysis of laser facsimile. ICC 2017: 1-6 - [c4]Weiqing Huang, Chang Ding, Siye Wang, Junyu Lin, Shao-yi Zhu, Yue Cui:
Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method. WASA 2017: 546-558 - [c3]Shanjing Yang, Jianlin Hu, Weiqing Huang:
Recognition of Electro-Magnetic Information Leakage of Computer Based on Multi-image Blind Deconvolution. WASA 2017: 883-889 - 2015
- [j3]Weiqing Huang, Chang Ding, Siye Wang:
A comprehensive method to combine RFID indoor targets positioning with real geographic environment. Comput. Sci. Inf. Syst. 12(4): 1149-1169 (2015) - [c2]Weiqing Huang, Chang Ding, Siye Wang, Shuang Hu:
An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNES. TrustCom/BigDataSE/ISPA (1) 2015: 1318-1323
2000 – 2009
- 2000
- [j2]Lilong Cai, Weiqing Huang:
Fourier series based learning control and application to positioning table. Robotics Auton. Syst. 32(2-3): 89-100 (2000) - [j1]Xiaoqi Tang, Lilong Cai, Weiqing Huang:
A learning controller for robot manipulators using Fourier series. IEEE Trans. Robotics Autom. 16(1): 36-45 (2000)
1990 – 1999
- 1999
- [c1]Weiqing Huang, Lilong Cai, Xiaoqi Tang:
Decentralized Learning Control for Robot Manipulators. ICRA 1999: 843-848
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint