Heqing Huang
Heqing Huang
IBM Thomas J. Watson Research Center
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th USENIX Security Symposium (USENIX Security 15), 2015
2232015
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection
F Zhang, H Huang, S Zhu, D Wu, P Liu
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
2052014
Protecting intellectual property of deep neural networks with watermarking
J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
1422018
A framework for evaluating mobile app repackaging detection algorithms
H Huang, S Zhu, P Liu, D Wu
International Conference on Trust and Trustworthy Computing, 169-186, 2013
1122013
Commandersong: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 49-64, 2018
1052018
SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
F Zhao, J Zhou, C Nie, H Huang, H Jin
IEEE Transactions on Services Computing, 2015
852015
Distilling critical attack graph surface iteratively through minimum-cost sat solving
H Huang, S Zhang, X Ou, A Prakash, K Sakallah
Proceedings of the 27th Annual Computer Security Applications Conference, 31-40, 2011
782011
From system services freezing to system server shutdown in android: All you need is a loop in an app
H Huang, S Zhu, K Chen, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
632015
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 2018
30*2018
IDIoT: Securing the Internet of Things like it's 1994
D Barrera, I Molloy, H Huang
arXiv preprint arXiv:1712.03623, 2017
292017
Threat intelligence computing
X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
282018
Semantics-based repackaging detection for mobile apps
Q Guan, H Huang, W Luo, S Zhu
International Symposium on Engineering Secure Software and Systems, 89-105, 2016
262016
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android
H Huang, K Chen, C Ren, P Liu, S Zhu, D Wu
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
232015
Standardizing IoT network security policy enforcement
D Barrera, I Molloy, H Huang
Workshop on decentralized IoT security and standards (DISS) 2018, 6, 2018
192018
All your alexa are belong to us: A remote voice control attack against echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy
2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018
162018
From physical to cyber: Escalating protection for personalized auto insurance
L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016
162016
Android malware development on public malware scanning platforms: A large-scale data-driven study
H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C Zhang
2016 IEEE International Conference on Big Data (Big Data), 1090-1099, 2016
142016
A hybrid ranking approach to estimate vulnerability for dynamic attacks
F Zhao, H Huang, H Jin, Q Zhang
Computers & Mathematics with Applications 62 (12), 4308-4321, 2011
142011
Verifiable Deep Learning Training Service
Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy
US Patent App. 16/124,657, 2020
112020
Sweetdroid: Toward a context-sensitive privacy policy enforcement framework for android os
X Chen, H Huang, S Zhu, Q Li, Q Guan
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, 75-86, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20