Protecting intellectual property of deep neural networks with watermarking J Zhang, Z Gu, J Jang, H Wu, MP Stoecklin, H Huang, I Molloy Proceedings of the 2018 on Asia conference on computer and communications ¡¦, 2018 | 468 | 2018 |
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu 24th USENIX Security Symposium (USENIX Security 15), 2015 | 274 | 2015 |
{CommanderSong}: A systematic approach for practical adversarial voice recognition X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ... 27th USENIX security symposium (USENIX security 18), 49-64, 2018 | 256 | 2018 |
ViewDroid: Towards obfuscation-resilient mobile application repackaging detection F Zhang, H Huang, S Zhu, D Wu, P Liu Proceedings of the 2014 ACM conference on Security and privacy in wireless ¡¦, 2014 | 247 | 2014 |
Verifiable Deep Learning Training Service Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy US Patent App. 16/124,657, 2020 | 158 | 2020 |
A framework for evaluating mobile app repackaging detection algorithms H Huang, S Zhu, P Liu, D Wu Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 ¡¦, 2013 | 117 | 2013 |
SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces F Zhao, J Zhou, C Nie, H Huang, H Jin IEEE Transactions on Services Computing, 2015 | 111 | 2015 |
Distilling critical attack graph surface iteratively through minimum-cost sat solving H Huang, S Zhang, X Ou, A Prakash, K Sakallah Proceedings of the 27th Annual Computer Security Applications Conference, 31-40, 2011 | 83 | 2011 |
From system services freezing to system server shutdown in android: All you need is a loop in an app H Huang, S Zhu, K Chen, P Liu Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications ¡¦, 2015 | 75 | 2015 |
Securing input data of deep learning inference systems via partitioned enclave execution Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy arXiv preprint arXiv:1807.00969, 1-14, 2018 | 68* | 2018 |
Threat intelligence computing X Shu, F Araujo, DL Schales, MP Stoecklin, J Jang, H Huang, JR Rao Proceedings of the 2018 ACM SIGSAC conference on computer and communications ¡¦, 2018 | 67 | 2018 |
IDIoT: Securing the Internet of Things like it's 1994 D Barrera, I Molloy, H Huang arXiv preprint arXiv:1712.03623, 2017 | 41 | 2017 |
All your alexa are belong to us: A remote voice control attack against echo X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy 2018 IEEE global communications conference (GLOBECOM), 1-6, 2018 | 40 | 2018 |
Standardizing IoT network security policy enforcement D Barrera, I Molloy, H Huang Workshop on decentralized IoT security and standards (DISS) 2018, 6, 2018 | 36 | 2018 |
Semantics-based repackaging detection for mobile apps Q Guan, H Huang, W Luo, S Zhu Engineering Secure Software and Systems: 8th International Symposium, ESSoS ¡¦, 2016 | 33 | 2016 |
Protecting deep learning models using watermarking Z Gu, H Huang, MP Stoecklin, J Zhang US Patent 11,163,860, 2021 | 29 | 2021 |
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android H Huang, K Chen, C Ren, P Liu, S Zhu, D Wu Proceedings of the 10th ACM Symposium on Information, Computer and ¡¦, 2015 | 28 | 2015 |
Android malware development on public malware scanning platforms: A large-scale data-driven study H Huang, C Zheng, J Zeng, W Zhou, S Zhu, P Liu, S Chari, C Zhang 2016 IEEE International Conference on Big Data (Big Data), 1090-1099, 2016 | 26 | 2016 |
From physical to cyber: Escalating protection for personalized auto insurance L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD ¡¦, 2016 | 21 | 2016 |
A hybrid ranking approach to estimate vulnerability for dynamic attacks F Zhao, H Huang, H Jin, Q Zhang Computers & Mathematics with Applications 62 (12), 4308-4321, 2011 | 19 | 2011 |