Heqing Huang

Orcid: 0000-0001-8113-3531

Affiliations:
  • IBM T.J. Watson Research Center, Yorktown Heights, NY, USA
  • Pennsylvania State University, State College, PA, USA (PhD)


According to our database1, Heqing Huang authored at least 23 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Trans. Big Data, 2021

2020
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside.
EAI Endorsed Trans. Security Safety, 2020

Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Reaching Data Confidentiality and Model Accountability on the CalTrain.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
Proceedings of the 27th USENIX Security Symposium, 2018

All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
Proceedings of the IEEE Global Communications Conference, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
IDIoT: Securing the Internet of Things like it's 1994.
CoRR, 2017

SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces.
IEEE Trans. Serv. Comput., 2016

Exploiting Insurance Telematics for Fun and Profit.
CoRR, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Semantics-Based Repackaging Detection for Mobile Apps.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
ViewDroid: towards obfuscation-resilient mobile application repackaging detection.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
A Framework for Evaluating Mobile App Repackaging Detection Algorithms.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

2011
A hybrid ranking approach to estimate vulnerability for dynamic attacks.
Comput. Math. Appl., 2011


  Loading...