Weiqing Huang
Orcid: 0000-0002-9155-4177
According to our database1,
Weiqing Huang
authored at least 126 papers
between 1999 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G.
Comput. Secur., 2025
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025
2024
Neural Networks, 2024
Inf. Sci., 2024
DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification.
Comput. Networks, 2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
LONGAN: Detecting Lateral Movement based on Heterogeneous Graph Neural Networks with Temporal Features.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Manticore: An Unsupervised Intrusion Detection System Based on Contrastive Learning in 5G Networks.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur., December, 2023
Virus control optimizer based on the prevention and control mechanism of COVID-19 for engineering optimization problems.
Appl. Soft Comput., November, 2023
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication.
Comput. Secur., May, 2023
Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
An Interference Mitigation Strategy for LEO Satellite Systems based on Adaptive Beamforming with Sidelobe Suppression.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Analysis and Optimization of Anti-jamming Performance of User Terminals with Low Sidelobe Levels for LEO Satellite Systems.
Proceedings of the IEEE Military Communications Conference, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023
ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization.
Proceedings of the Computational Science - ICCS 2023, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
TransRF: Towards a Generalized and Cross-Domain RFID Sensing System Using Few-Shot Learning.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
Sensors, 2022
BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection.
Knowl. Inf. Syst., 2022
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022
An Efficient Interference Calculation Model Based on Large Scale Constellations Probabilistic Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
MEBV: Resource Optimization for Packet Classification Based on Mapping Encoding Bit Vectors.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022
Physical Layer Authentication Based on Continuous Channel Polarization Response in Low SNR scenes.
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022
Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
SeqA-ITD: User Behavior Sequence Augmentation for Insider Threat Detection at Multiple Time Granularities.
Proceedings of the International Joint Conference on Neural Networks, 2022
PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
2021
J. Comput. Secur., 2021
Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach.
Comput. Networks, 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
A Novel Method for Malicious Implanted Computer Video Cable Detection via Electromagnetic Features.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021
Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse Mapping.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels.
Proceedings of the Knowledge Science, Engineering and Management, 2021
Proceedings of the Knowledge Science, Engineering and Management, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021
A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis.
Proceedings of the 28th International Conference on Telecommunications, 2021
Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient.
Proceedings of the 28th International Conference on Telecommunications, 2021
Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
BERTDAN: Question-Answer Dual Attention Fusion Networks with Pre-trained Models for Answer Selection.
Proceedings of the Neural Information Processing - 28th International Conference, 2021
A Contextual and Content Features-Based Device Behavioral Fingerprinting Method in Smart Grid.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Detection of Events in OTDR Data via Variational Mode Decomposition and Hilbert Transform.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data.
Wirel. Commun. Mob. Comput., 2020
RF-AMOC: Human-related RFID Tag Movement Identification in Access Management of Carries.
ACM Trans. Sens. Networks, 2020
Coupled Dynamic Modeling and Analysis of the Single Gimbal Control Moment Gyroscope Driven by Ultrasonic Motor.
IEEE Access, 2020
Novel design of Hardware Trojan: A generic approach for defeating testability based detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020
Depthwise Separable Convolutional Neural Network for Confidential Information Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2020
A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2020
Proceedings of the Knowledge Science, Engineering and Management, 2020
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors.
Proceedings of the Advances in Digital Forensics XVI, 2020
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020
A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
2019
Attend in Bands: Hyperspectral Band Weighting and Selection for Image Classification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2019
Malicious documents detection for business process management based on multi-layer abstract model.
Future Gener. Comput. Syst., 2019
Research on Physical Layer Security Scheme Based on OAM - Modulation for Wireless Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019
Proceedings of the Knowledge Science, Engineering and Management, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Attention Networks for Band Weighting And Selection In Hyperspectral Remote Sensing Image Classification.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019
Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the 26th International Conference on Telecommunications, 2019
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019
Sparse Representation for Device-Free Human Detection and Localization with COTS RFID.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Environmentally Adaptive Real-Time Detection of RFID False Readings in a New Practical Scenario.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the Knowledge Science, Engineering and Management, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
2017
Recognition of Electro-Magnetic Information Leakage of Computer Based on Multi-image Blind Deconvolution.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Recognition of Information Leakage of Computer via Conducted Emanations on the Power Line.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
2015
A comprehensive method to combine RFID indoor targets positioning with real geographic environment.
Comput. Sci. Inf. Syst., 2015
An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNES.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2000
IEEE Trans. Robotics Autom., 2000
Robotics Auton. Syst., 2000
1999
Proceedings of the 1999 IEEE International Conference on Robotics and Automation, 1999