Weiqing Huang

Orcid: 0000-0002-9155-4177

According to our database1, Weiqing Huang authored at least 126 papers between 1999 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G.
Comput. Secur., 2025

Spectrum Painting for On-Device Signal Classification.
Proceedings of the 25th IEEE International Symposium on a World of Wireless, 2025

2024
DualAttlog: Context aware dual attention networks for log-based anomaly detection.
Neural Networks, 2024

DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks.
Inf. Sci., 2024

DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification.
Comput. Networks, 2024

Autocue : Targeted Textual Adversarial Attacks with Adversarial Prompts.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

LONGAN: Detecting Lateral Movement based on Heterogeneous Graph Neural Networks with Temporal Features.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

Manticore: An Unsupervised Intrusion Detection System Based on Contrastive Learning in 5G Networks.
Proceedings of the IEEE International Conference on Acoustics, 2024

HOICS: Zero-Shot Hoi Detection via Compatibility Self-Learning.
Proceedings of the IEEE International Conference on Acoustics, 2024

GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

MLNT: A Multi-Level Network Traps Deployment Method.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

RP-Fusion: Robust RFID Indoor Localization Via Fusion RSSI and Phase Fingerprint.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur., December, 2023

Virus control optimizer based on the prevention and control mechanism of COVID-19 for engineering optimization problems.
Appl. Soft Comput., November, 2023

CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication.
Comput. Secur., May, 2023

Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2023

A Novel Approach based on Improved Naive Bayes for 5G Air Interface DDoS Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

DTrap: A cyberattack-defense confrontation technique based on Moving Target Defense.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

An Interference Mitigation Strategy for LEO Satellite Systems based on Adaptive Beamforming with Sidelobe Suppression.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Analysis and Optimization of Anti-jamming Performance of User Terminals with Low Sidelobe Levels for LEO Satellite Systems.
Proceedings of the IEEE Military Communications Conference, 2023

FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

MESCAL: Malicious Login Detection Based on Heterogeneous Graph Embedding with Supervised Contrastive Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification.
Proceedings of the International Joint Conference on Neural Networks, 2023

A Dynamic Malicious Document Detection Method Based on Multi-Memory Features.
Proceedings of the Advances in Digital Forensics XIX, 2023

UDA-HOID: Unsupervised Domain Adaptation for Human-Object Interaction Detection.
Proceedings of the 35th IEEE International Conference on Tools with Artificial Intelligence, 2023

ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023

ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization.
Proceedings of the Computational Science - ICCS 2023, 2023

Prompt Makes mask Language Models Better Adversarial Attackers.
Proceedings of the IEEE International Conference on Acoustics, 2023

ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

TransRF: Towards a Generalized and Cross-Domain RFID Sensing System Using Few-Shot Learning.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Bidirectional Drive with Inhibited Hysteresis for Piezoelectric Actuators.
Sensors, 2022

BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection.
Knowl. Inf. Syst., 2022

Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

An Efficient Interference Calculation Model Based on Large Scale Constellations Probabilistic Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

MEBV: Resource Optimization for Packet Classification Based on Mapping Encoding Bit Vectors.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Trust, 2022

DGQAN: Dual Graph Question-Answer Attention Networks for Answer Selection.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Physical Layer Authentication Based on Continuous Channel Polarization Response in Low SNR scenes.
Proceedings of the 2022 IEEE 33rd Annual International Symposium on Personal, 2022

Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

SeqA-ITD: User Behavior Sequence Augmentation for Insider Threat Detection at Multiple Time Granularities.
Proceedings of the International Joint Conference on Neural Networks, 2022

PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

Detecting USB Storage Device Behaviors by Exploiting Electromagnetic Emanations.
Proceedings of the IEEE International Conference on Communications, 2022

Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation.
J. Comput. Secur., 2021

An end-to-end text spotter with text relation networks.
Cybersecur., 2021

Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach.
Comput. Networks, 2021

QAAN: Question Answering Attention Network for Community Question Classification.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

A Novel Method for Malicious Implanted Computer Video Cable Detection via Electromagnetic Features.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Specific Emitter Identification for WiFi Devices via Bezier Curve Fitting.
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021

Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse Mapping.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Landscape-Enhanced Graph Attention Network for Rumor Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Multi-Modal fake news Detection on Social Media with Dual Attention Fusion Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A GSO Protected Area Calculation Model based on Controllable NGSO System Parameters.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

ITDBERT: Temporal-semantic Representation for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching.
Proceedings of the International Joint Conference on Neural Networks, 2021

Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning.
Proceedings of the Advances in Digital Forensics XVII, 2021

Causal Intervention for Object Detection.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis.
Proceedings of the 28th International Conference on Telecommunications, 2021

Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient.
Proceedings of the 28th International Conference on Telecommunications, 2021

Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

BERTDAN: Question-Answer Dual Attention Fusion Networks with Pre-trained Models for Answer Selection.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

A Contextual and Content Features-Based Device Behavioral Fingerprinting Method in Smart Grid.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

An SEI-Based Identification Scheme for Illegal FM Broadcast.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Detection of Events in OTDR Data via Variational Mode Decomposition and Hilbert Transform.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data.
Wirel. Commun. Mob. Comput., 2020

RF-AMOC: Human-related RFID Tag Movement Identification in Access Management of Carries.
ACM Trans. Sens. Networks, 2020

ACD: An Adaptable Approach for RFID Cloning Attack Detection.
Sensors, 2020

Coupled Dynamic Modeling and Analysis of the Single Gimbal Control Moment Gyroscope Driven by Ultrasonic Motor.
IEEE Access, 2020

Novel design of Hardware Trojan: A generic approach for defeating testability based detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

AMQAN: Adaptive Multi-Attention Question-Answer Networks for Answer Selection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020

Depthwise Separable Convolutional Neural Network for Confidential Information Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2020

A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2020

SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2020

CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

TSCNN: A 3D Convolutional Activity Recognition Network Based on RFID RSSI.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors.
Proceedings of the Advances in Digital Forensics XVI, 2020

Adversarial Attack against LSTM-based DDoS Intrusion Detection System.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Similarity of Binaries Across Optimization Levels and Obfuscation.
Proceedings of the Computer Security - ESORICS 2020, 2020

CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

2019
Attend in Bands: Hyperspectral Band Weighting and Selection for Image Classification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2019

Malicious documents detection for business process management based on multi-layer abstract model.
Future Gener. Comput. Syst., 2019

Research on Physical Layer Security Scheme Based on OAM - Modulation for Wireless Communications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

A Secure and Power-Efficient Constellations for Physical Layer Security.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Machine Tools Fingerprinting for Distributed Numerical Control Systems.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

A Two-Stage Model Based on BERT for Short Fake News Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Android Malware Family Classification Based on Sensitive Opcode Sequence.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Attention Networks for Band Weighting And Selection In Hyperspectral Remote Sensing Image Classification.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Adversarial Attack Against DoS Intrusion Detection: An Improved Boundary-Based Method.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

A Dual-polarized Antennas Based Directional Modulation Scheme.
Proceedings of the 26th International Conference on Telecommunications, 2019

Effect of Damping Factor Variation on Eigenfrequency Drift for Ultrasonic Motors.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019

Sparse Representation for Device-Free Human Detection and Localization with COTS RFID.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A SeqGAN-Based Method for Mimicking Attack.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
HEVC Lossless Compression Coding Based on Hadamard Butterfly Transformation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Environmentally Adaptive Real-Time Detection of RFID False Readings in a New Practical Scenario.
Proceedings of the 2018 IEEE SmartWorld, 2018

ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection.
Proceedings of the Security and Privacy in Communication Networks, 2018

AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2018

MPP: A Join-dividing Method for Multi-table Privacy Preservation.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Recognition of Electro-Magnetic Information Leakage of Computer Based on Multi-image Blind Deconvolution.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Electromagnetic side channel analysis of laser facsimile.
Proceedings of the IEEE International Conference on Communications, 2017

Recognition of Information Leakage of Computer via Conducted Emanations on the Power Line.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

2015
A comprehensive method to combine RFID indoor targets positioning with real geographic environment.
Comput. Sci. Inf. Syst., 2015

An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNES.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2000
A learning controller for robot manipulators using Fourier series.
IEEE Trans. Robotics Autom., 2000

Fourier series based learning control and application to positioning table.
Robotics Auton. Syst., 2000

1999
Decentralized Learning Control for Robot Manipulators.
Proceedings of the 1999 IEEE International Conference on Robotics and Automation, 1999


  Loading...