发表论文
[1] 李庚旺, 喻民, 李罡, 姜建国, 黄伟庆. X-MBA: Towards Heterogeneous Mixed Boolean-Arithmetic Deobfuscation. MILCOM. 2024, 第 5 作者null(null): [2] 刘然, 刘明, 喻民, 姜建国, 李罡, 孟祥, 黄伟庆. GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization. ECAI. 2024, 第 7 作者null(null): [3] Shuai Wang, 王思叶, Yue Feng, Weiqing Huang, Shang Jiang, Yanfang Zhang. RP-Fusion:Robust RFID Indoor Localization Via Fusion RSSI and Phase Fingerprint. 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2024, 第 4 作者null(null): https://ieeexplore.ieee.org/document/10580694/authors#authors.[4] 姜建国, 李松, 喻民, 李罡, 刘超, 李梅梅, 黄伟庆. 基于敏感特征深度域关联的Android恶意应用检测方法. 信息安全学报[J]. 2024, 第 7 作者null(null): [5] 杜富强, 喻民, 李博权, Kam Pui Chow, 姜建国, 黄伟庆, 李敏. TAENet: Two-branch Autoencoder Network for Interpretable Deepfake Detection. DFRWS APAC. 2024, 第 6 作者null(null): [6] 秦康元, 刘然, 喻民, 李罡, 刘明奇, 黄伟庆, 姜建国. SecureSem: Sensitive Text Classification based on Semantic Feature Optimization. EAI ICDF2C. 2024, 第 6 作者null(null): [7] 张行, 庄理淇, 季飞, 魏冬, 黄伟庆, 付婧雯. 基于上行控制信道的移动通信空口流量分析技术. 信息安全学报[J]. 2024, 第 5 作者null(null): [8] 王浚哲, 徐锦龙, 孟祥, 魏冬, 黄伟庆. 基于人工极化指纹注入的物理层认证. 信息安全学报[J]. 2024, 第 5 作者null(null): [9] Han, Xinbo, Xu, Guizhong, Zhang, Meng, Yang, Zheng, Yu, Ziyang, Huang, Weiqing, Meng, Chen. DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification. COMPUTER NETWORKS[J]. 2024, 第 6 作者245: http://dx.doi.org/10.1016/j.comnet.2024.110372.[10] 王嘉文, 李博权, 喻民, Kam Pui Chow, 姜建国, 杜富强, 黄伟庆. Assessing Backdoor Risk in Deepfake Detectors. IFIP WG 11.9. 2024, 第 7 作者null(null): [11] 李冰洋, 黄伟庆, 王文, Qing Wang. Spectrum Painting for On-Device Signal Classification. The 25th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2024). 2024, 第 2 作者[12] 刘然, Ming Liu, 喻民, He Zhang, 姜建国, Gang Li, 黄伟庆. SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization. ACL. 2024, 第 7 作者null(null): [13] 王毅城, 徐艳云, 张萌, 黄伟庆. 文印一体机个体及工作状态识别方法研究. 信息安全学报[J]. 2023, 第 4 作者[14] 王媛媛, 李庚旺, 喻民, Kam-Pui Chow, 姜建国, 黄伟庆. A Dynamic Malicious Document Detection Method Based on Multi-Memory Features. IFIP WG 11.9. 2023, 第 6 作者null(null): [15] Lu Yuan, Yuan Meng, Jiyan Sun, Shangyuan Zhuang, Yinlong Liu, Liru Geng, Weiqing Huang. ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization. ICCS 2023. 2023, 第 7 作者[16] 方星, 胡波, 马超, 黄伟庆. 网络验证研究综述. 软件学报[J]. 2023, 第 4 作者[17] miao jiang, weiqing huang, min li, Bo Meng, Ruwen Bai, Yang Yang. UDA-HOID: Unsupervised Domain Adaptation for Human-Object Interaction Detection. 2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI). 2023, 第 2 作者[18] 石志鑫, 吴昊, 张竞, 张萌, 黄伟庆. FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers. ISCC. 2023, 第 5 作者[19] 郭华东, 黄伟庆, 王文, 仇昭花, 郭景龙. Analysis and Optimization of Anti-Jamming Performance of User Terminals With Low Sidelobe Levels for LEO Satellite Systems. IEEE Military Communications Conference (MILCOM 2023). 2023, 第 2 作者https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10356336&tag=1.[20] 冯越, 郑崇辉, 黄伟庆. 面向工作秘密防护的载体管控技术研究. 保密科学技术[J]. 2023, 第 3 作者[21] 刘超, 娄尘哲, 喻民, 姜建国, 黄伟庆. 面向恶意PDF文档分类的对抗样本生成方法研究. 信息安全学报[J]. 2023, 第 5 作者8(5): 14-26, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20230502&flag=1.[22] 黄伟庆, 王元坤, 张巧遇. 基于稀疏分量分析的海量短波电台快速 自动识别方法. 信息安全学报[J]. 2023, 第 1 作者https://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?flag=2&file_no=202102040000004&journal_id=xxaqxb.[23] 郭华东, 黄伟庆, 王文, 郭景龙, 仇昭花. An Interference Mitigation Strategy for LEO Satellite Systems based on Adaptive Beamforming with Sidelobe Suppression. The 19th International Conference on Mobility, Sensing and Networking (MSN 2023). 2023, 第 2 作者[24] 吴越梅, 魏冬, 郭彩丽, 黄伟庆. Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems. IEEE Transactions on information forensics and security[J]. 2023, 第 4 作者[25] 吴越梅, 魏冬, 张巧遇, 黄伟庆. Physical Layer Authentication Based on Continuous Channel Polarization Response in Low SNR scenes. 2022 IEEE PIMRC. 2022, 第 4 作者[26] 郑雪琪, 徐艳云, 黄伟庆. 基于卷积神经网络的计算机个体识别. 信息安全学报[J]. 2022, 第 3 作者[27] 刘沂青, 黄伟庆, 王文, 耿静茹, 仇昭花. An Efficient Interference Calculation Model Based on Large Scale Constellations Probabilistic Analysis. 2022 International Conference on Wireless Algorithms, Systems, and Applications(WASA2022). 2022, 第 2 作者https://rd.springer.com/chapter/10.1007/978-3-031-19214-2_6.[28] 黄伟庆, 宗扬扬, 石志鑫, 王蕾琪, 刘鹏程. PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection. IJCNN[J]. 2022, 第 1 作者[29] 徐锦龙, 魏冬, 黄伟庆. Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint. 2022 IEEE ISCC. 2022, 第 3 作者[30] 刘波, 徐艳云, 黄伟庆. Detecting USB Storage Device Behaviors by Exploiting Electromagnetic Emanations. IEEE International Conference on Communications, ICC 2022. 2022, 第 3 作者[31] Hlaitian Yang, Xuan Zhao, Yan Wang, Min Li, Wei Chen, Weiqing Huang. DGQAN: Dual Graph Question-Answer Attention Networks for Answer Selection. SIGIR ’22. 2022, 第 6 作者[32] Yang, Haitian, Zhao, Xuan, Wang, Yan, Sun, Degang, Chen, Wei, Huang, Weiqing. BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection. KNOWLEDGE AND INFORMATION SYSTEMS[J]. 2022, 第 6 作者64(8): 2189-2213, http://dx.doi.org/10.1007/s10115-022-01703-7.[33] Wang yuntao, Huang Weiqing. QAAN: Question Answering Attention Network for Community Question Classification. WCNC 2021[J]. 2021, 第 2 作者[34] wang yunkun, 黄伟庆, 张巧遇. A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis. ICT[J]. 2021, 第 2 作者[35] 喻民, 姜建国, 李罡, 刘超, 黄伟庆, 宋楠. 恶意文档检测研究综述. 信息安全学报[J]. 2021, 第 5 作者6(3): 54-76, [36] Jiang jianguo, Song nan, Yu min, Huang weiqing. A Semi-Supervised Method for Malicious PDF Detection. INTERNATIONALCONFERENCEONDIGITALFORENSICS2021. 2021, 第 4 作者null(null): [37] 黄伟庆, 贾成罡, 喻民, 李罡, 刘超, 姜建国. UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection. ISCC. 2021, 第 1 作者null(null): [38] Liu, Chao, Lou, Chenzhe, Yu, Min, Yiu, S M, Chow, K P, Li, Gang, Jiang, Jianguo, Huang, Weiqing. A novel adversarial example detection method for malicious PDFs using multiple mutated classifiers. Forensic Science International: Digital Investigation[J]. 2021, 第 8 作者38(null): [39] Yang, Haitian, Huang, Weiqing, Zhao, Xuan, Wang, Yan, Chen, Yuyan, Lv, Bin, Mao, Rui, Li, Ning, Hutter, F, Kersting, K, Lijffijt, J, Valera, I. AMQAN: Adaptive Multi-Attention Question-Answer Networks for Answer Selection. MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2020, PT III. 2021, 第 2 作者 通讯作者 12459: 584-599, [40] 黄伟庆, 刘沂青, 王文, 耿静茹. A GSO Protected Area Calculation Model based on Controllable NGSO System Parameters. 2021 IEEE Symposium on Computers and Communications(ISCC 2021). 2021, 第 1 作者https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9631527.[41] 姜建国, 李博权, 魏宝乐, 李罡, 刘超, 黄伟庆, 李梅梅, 喻民. FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. Journal of Computer Security[J]. 2021, 第 6 作者null(29): 403-421, [42] 刘波, 徐艳云, 黄伟庆, 郭少颖. Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices. 2022 17th-IEEE International Conference on Mobility, Sensing and Networking (MSN). 2021, 第 3 作者[43] 孙德刚, 郭韵婷, 喻民, 姜建国, 黄伟庆. FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNN. 2021, 第 5 作者null(null): [44] guo shaoying, 徐艳云, 黄伟庆. Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient. International Conference on Telecommunications(ICT)[J]. 2021, 第 3 作者[45] Jiang, Jianguo, Wei, Baole, Yu, Min, Li, Gang, Li, Boquan, Liu, Chao, Li, Min, Huang, Weiqing. An end-to-end text spotter with text relation networks. CYBERSECURITY[J]. 2021, 第 8 作者4(1): http://dx.doi.org/10.1186/s42400-021-00073-x.[46] 刘超, 于帅, 喻民, 魏宝乐, 李博权, 李罡, 黄伟庆. Adaptive smooth l1 loss: A better way to regress scene texts with extreme aspect ratio. ISCC. 2021, 第 7 作者null(null): [47] 姜建国, 刘强, 喻民, 黄伟庆, 李罡, 刘明奇. Landscape-Enhanced Graph Attention Network for Rumor Detection. KSEM. 2021, 第 4 作者null(null): [48] Feng, Yue, Huang, Weiqing, Wang, Siye, Zhang, Yanfang, Jiang, Shang. Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach. COMPUTER NETWORKS[J]. 2021, 第 2 作者189: http://dx.doi.org/10.1016/j.comnet.2021.107922.[49] 姜建国, 王承豪, 喻民, 贾成罡, 黄伟庆. NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary. WASA. 2021, 第 5 作者null(null): [50] Liu Chao, Wei Xintong, Yu Min, Jiang Jianguo, Li, Gang, Xiangmei Ma, Huang Weiqing. Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels. KSEM. 2021, 第 7 作者null(null): [51] 黄伟庆, 姜淼, 李敏. Causal Intervention for Object Detection. 2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI). 2021, 第 1 作者[52] 黄伟庆, 李冰洋, 王文, 张萌. AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse Mapping. 2021 International Conference on Mobile Ad-hoc and Sensor Networks(MSN). 2021, 第 1 作者https://ieeexplore.ieee.org/document/9751524.[53] 黄伟庆, 贾成罡, 喻民, KamPui Chow, Jiuming Chen, Chao Liu, 姜建国. Enhancing the feature profiles of web shells by analyzing the performance of multiple detectors. IFIPINTERNATIONALCONFERENCEONDIGITALFORENSICS. 2020, 第 1 作者null(null): 57-72, http://dx.doi.org/10.1007/978-3-030-56223-6_4.[54] Zhu, Shaoyi, Huang, Weiqing, Jia, Chenggang, Wang, Siye, Li, Bowen, Zhang, Yanfang. RF-AMOC: Human-related RFID Tag Movement Identification in Access Management of Carries. ACM TRANSACTIONS ON SENSOR NETWORKS[J]. 2020, 第 2 作者16(4): http://dx.doi.org/10.1145/3399678.[55] 张萌, 王文, 任俊星, 魏冬, 黄伟庆, 杨召阳, 吕志强. 基于HOG-SVM的跳频信号检测识别算法. 信息安全学报[J]. 2020, 第 5 作者5(3): 62-77, http://lib.cqvip.com/Qikan/Article/Detail?id=7102294064.[56] Huang, Weiqing, Zhang, Yanfang, Feng, Yue. ACD: An Adaptable Approach for RFID Cloning Attack Detection. SENSORS[J]. 2020, 第 1 作者20(8): [57] 黄伟庆, 彭潇, 石志鑫. 一种针对基于LSTM的DDoS检测器的对抗攻击算法. ICTAI2020. 2020, 第 1 作者[58] 黄伟庆. A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks. HPCC/DSS/SmartCity 2020. 2020, 第 1 作者[59] 吕遒健, 王妍, 黄伟庆. 以自主创新引领网络安全产业发展. 保密工作[J]. 2020, 第 3 作者3, http://lib.cqvip.com/Qikan/Article/Detail?id=7103316896.[60] Jiang, Jianguo, Lu, Yue, Yu, Min, Li, Gang, Liu, Chao, An, Shaohua, Huang, Weiqing. CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection. ISCC. 2020, 第 7 作者289-295, [61] 李梅梅, 郎宸, 喻民, 姜建国, 黄伟庆. SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection. KSEM. 2020, 第 5 作者[62] 黄伟庆. Adversarial Attack against LSTM-based DDoS Intrusion Detection System. ICTAI 2020. 2020, 第 1 作者[63] 姜建国, 李庚旺, 喻民, 李罡, 刘超, 吕志强, 吕彬, 黄伟庆. Similarity of Binaries Across Optimization Levels and Obfuscation. ESORICS 2020. 2020, 第 8 作者[64] Huang, Weiqing, Liu, Yi, Zhu, Shaoyi, Wang, Siye, Zhang, Yanfang, IEEE. TSCNN: A 3D Convolutional Activity Recognition Network Based on RFID RSSI. 2020INTERNATIONALJOINTCONFERENCEONNEURALNETWORKSIJCNN. 2020, 第 1 作者 通讯作者 [65] Liu Chao, Ma Xiangmei, Yu Min, 刘明奇, Jiang Jianguo, Huang Weiqing. A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition. KSEM. 2020, 第 6 作者null(null): [66] 卢越, 姜建国, 喻民, 黄伟庆. Depthwise Separable Convolutional Neural Network for Confidential Information Analysis. KSEM. 2020, 第 4 作者[67] 姜建国, 刘昭策, 喻民, 黄伟庆. HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph. HPCC. 2020, 第 4 作者[68] Huang, Weiqing, Zhu, Shaoyi, Wang, Siye, Xie, Jinxing, Zhang, Yanfang, Wen, S, Zomaya, A, Yang, LT. Sparse Representation for Device-Free Human Detection and Localization with COTS RFID. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I. 2020, 第 1 作者11944: 639-654, http://dx.doi.org/10.1007/978-3-030-38991-8_42.[69] 黄伟庆, 杨召阳, 魏冬, 张萌, 王文, 叶彬. 基于信息增益的无线通信信号指纹构建及识别机制研究. 信息安全学报[J]. 2020, 第 1 作者5(6): 11-26, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200602&flag=1.[70] Siye Wang, Ziwen Cao, Yanfang Zhang, Weiqing Huang, Jianguo Jiang. A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2020, 第 4 作者2020: https://doaj.org/article/9ecd3aeeed404fa7b1d21f80a0c621cb.[71] 徐艳云, 张萌, 黄伟庆. 信息设备电磁辐射信息泄漏的可检测距离估计方法研究. 信息安全学报[J]. 2020, 第 3 作者5(1): 44-56, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200105&flag=1.[72] 姜建国, 卢越, 喻民, 李罡, 黄伟庆. CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection. ECAI. 2020, 第 5 作者[73] Jiang, Jianguo, Li, Song, 喻民, Li, Gang, Liu, Chao, Chen, Kai, Liu, Hui, 黄伟庆. Android Malware Family Classification Based on Sensitive Opcode Sequence. ISCC. 2019, 第 8 作者null(null): 63-69, [74] 姜建国, Li, Boquan, 喻民, Liu, Chao, 黄伟庆, Fan, Lejun, Xia, Jianfeng. Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection. ICANN. 2019, 第 5 作者11729(null): 711-723, [75] Liu chao, Wu xinghua, 喻民, Jiang jianguo, 黄伟庆. A two-stage model based on BERT for short fake news detection. KSEM. 2019, 第 5 作者null(null): [76] Yu, Min, Jiang, Jianguo, Li, Gang, Lou, Chenzhe, Liu, Yunzheng, Liu, Chao, Huang, Weiqing. Malicious documents detection for business process management based on multi-layer abstract model. FUTURE GENERATION COMPUTER SYSTEMS[J]. 2019, 第 7 作者99: 517-526, http://dx.doi.org/10.1016/j.future.2019.04.012.[77] Siye Wang, Chang Ding, Weiqing Huang, Yanfang Zhang, Jianguo Jiang, Shaoyi Zhu, Yue Cui, Junyu Lin. Determination of an Indoor Target Position: An Accurate and Adaptable Approach Based on Differential Positioning. INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION[J]. 2019, 第 3 作者2019: https://doaj.org/article/e69631ff3e644bfcb209fdf2fdeaa002.[78] 黄伟庆. Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications. WASA 2019. 2019, 第 1 作者[79] Wang, Jing, Zhou, Jun, Huang, Weiqing. Attend in Bands: Hyperspectral Band Weighting and Selection for Image Classification. IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING[J]. 2019, 第 3 作者12(12): 4712-4727, http://dx.doi.org/10.1109/JSTARS.2019.2955097.[80] 黄伟庆. 基于稀疏学习的RFID被动式目标检测与定位. 19th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP). 2019, 第 1 作者[81] 姜建国, Chen, Jiuming, Gu, Tianbo, Choo, KimKwang Raymond, Liu, Chao, 喻民, 黄伟庆, Mohapatra, Prasant. Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation. MILCOM. 2019, 第 7 作者null(null): [82] 黄伟庆, 石志鑫, 彭潇. 基于SeqGAN的模拟攻击方法. Inscrypt2019. 2019, 第 1 作者[83] 姜建国, Chen, Jiuming, Gu, Tianbo, Choo, KimKwang Raymond, Liu, Chao, 喻民, 黄伟庆, Mohapatra, Prasant. Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection. MILCOM. 2019, 第 7 作者null(null): [84] 申金晶, 范伟, 彭诚, 张祖成, 黄伟庆. HDMI接口视频信息泄漏还原重建的影响因素研究. 保密科学技术[J]. 2019, 第 5 作者24-29, http://lib.cqvip.com/Qikan/Article/Detail?id=7001840275.[85] Zhang Qiaoyu, Yang Zhaoyang, Wang Wen, Ren Junxing, Huang Weiqing, Zhang Ning. A Dual-polarized Antennas Based Directional Modulation Scheme. 2019 26TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT). 2019, 第 5 作者468-473, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000495877200090.[86] 黄伟庆. 基于复合多尺度色散熵的特定辐射源识别. International Journal of Information and Communication Engineering. 2019, 第 1 作者[87] 黄伟庆. 基于布隆过滤器的RFID数据冗余处理算法研究 中文名称. 信 息 安 全 学 报. 2019, 第 1 作者[88] Peng, Xiao, Huang, Weiqing, Shi, Zhixin, IEEE. Adversarial Attack against DoS Intrusion Detection: An Improved Boundary-Based Method. 2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019). 2019, 第 2 作者1288-1295, [89] 黄伟庆. 基于物理层安全的安全高效星座设计方法. 第三届智能物联网会议. 2019, 第 1 作者[90] Liu Chao, Li Jianan, 喻民, Li Gang, Luo Bo, 陈恺, 姜建国, 黄伟庆. URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2018, 第 8 作者null(null): [91] 刘超, 李佳楠, 喻民, Luo Bo, 李松, 陈恺, 黄伟庆, 吕彬. FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection. SecureComm 2018. 2018, 第 7 作者null(null): [92] 姜建国, Li, Boquan, 喻民, Liu, Chao, Sun, Jianguo, 黄伟庆, 吕志强. AdvRefactor: A Resampling-Based Defense against Adversarial Attacks. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2018, PT II. 2018, 第 6 作者11165(null): 815-825, [93] 姜建国, Lu Yue, 喻民, Li Gang, Liu Chao, 黄伟庆. Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2018, PT II. 2018, 第 6 作者11062(null): 221-231, [94] 姜建国, Yu Qian, 喻民, Li Gang, Chen Jiuming, Liu Kunying, Liu Chao, 黄伟庆. ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE). 2018, 第 8 作者null(null): 1565-1569, [95] 黄伟庆, 夏剑锋, 喻民, 刘超. MPP: A Join-dividing Method for Multi-table Privacy Preservation. ISCC. 2018, 第 1 作者null(null): 315-320, [96] 姜建国, Li Song, 喻民, 陈恺, Liu Chao, 黄伟庆, Li Gang. MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment. 2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS). 2018, 第 6 作者null(null): 64-72, [97] Huang Weiqing, Hou Erhang, Zheng Liang, Feng Weimiao, Fang D, Zhu S, Kuang T. MixDroid: A Multi-features and Multi-classifiers Bagging System for Android Malware Detection. 6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018). 2018, 第 1 作者 通讯作者 1967: [98] 印曦, 黄伟庆. 基于混沌理论的彩色QR编码水印技术研究. 通信学报[J]. 2018, 第 2 作者39(7): 50-58, http://lib.cqvip.com/Qikan/Article/Detail?id=7000731968.[99] Zhu Shaoyi, Wang Siye, Zhang Fangtao, Zhang Yanfang, Feng Yue, Huang Weiqing, Wang G, Han Q, Bhuiyan MZA, Ma X, Loulergue F, Li P, Roveri M, Chen L. Environmentally Adaptive Real-time Detection of RFID False Readings in a New Practical Scenario. 2018IEEESMARTWORLDUBIQUITOUSINTELLIGENCECOMPUTINGADVANCEDTRUSTEDCOMPUTINGSCALABLECOMPUTINGCOMMUNICATIONSCLOUDBIGDATACOMPUTINGINTERNETOFPEOPLEANDSMARTCITYINNOVATIONSMARTWORLDSCALCOMUICATCCBDCOMIOPSCI. 2018, 第 6 作者338-345, http://dx.doi.org/10.1109/SmartWorld.2018.00090.[100] 印曦, 魏冬, 黄伟庆, 韦迪. 日本车联网信息安全发展现状与分析. 中国信息安全[J]. 2017, 第 3 作者98-101, http://lib.cqvip.com/Qikan/Article/Detail?id=671154593.[101] Yang, Shanjing, Liao, Xiaoyong, Hu, Jianlin, Huang, Weiqing, Qiu, M. Recognition of Information Leakage of Computer via Conducted Emanations on the Power Line. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS). 2017, 第 4 作者139-144, http://dx.doi.org/10.1109/BigDataSecurity.2017.51.[102] 黄伟庆. 基于恶意读写器发现的RFID空口入侵检测技术研究. 软件学报. 2017, 第 1 作者[103] Huang Weiqing, Ding Chang, Wang Siye, Lin Junyu, Zhu Shaoyi, Cui Yue, Ma L, Khreishah A, Zhang Y, Yan M. Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 1 作者10251: 546-558, [104] 黄伟庆. 基于电源线传导的计算机信息电磁泄漏识别. 第三届国际大数据云信息安全会议. 2017, 第 1 作者[105] 黄伟庆. 基于多图像盲解卷积的电磁信息泄漏识别. 无线算法、系统及应用. 2017, 第 1 作者[106] 黄伟庆. 一种基于差分定位原理的室内定位算法设计与实现. The 12th International Conference on Wireless Algorithms, Systems, and Applications. 2017, 第 1 作者[107] 胡波, 韩臻, 黄伟庆, 孙德刚. 适用于云取证的证据数据完整性评估方法. 华中科技大学学报:自然科学版[J]. 2016, 第 3 作者44(11): 82-86,96, http://lib.cqvip.com/Qikan/Article/Detail?id=670672802.[108] 黄伟庆. KVM虚拟化动态迁移技术的安全防护模型研究. 软件学报. 2016, 第 1 作者[109] 张萌, 黄伟庆, 王思叶, 孙德刚. 物理空间信息安全技术发展综述. 信息安全研究[J]. 2016, 第 2 作者2(2): 107-116, http://lib.cqvip.com/Qikan/Article/Detail?id=670052623.[110] Sun, DeGang, Shi, Jun, Wei, Dong, Zhang, Meng, Huang, WeiQing. Method for detecting text information leakage in electromagnetic radiation from a computer display. IET INFORMATION SECURITY[J]. 2016, 第 5 作者10(6): 413-417, https://www.webofscience.com/wos/woscc/full-record/WOS:000386964400010.[111] 范伟, 孔斌, 张珠君, 王停停, 张杰, 黄伟庆. KVM虚拟化动态迁移技术的安全防护模型. 软件学报[J]. 2016, 第 6 作者1402-1416, http://lib.cqvip.com/Qikan/Article/Detail?id=669126885.[112] Sun, Degang, Shi, Jun, Wei, Dong, Zhang, Meng, Huang, Weiqing. Efficient and anti-interference method of synchronising information extraction for cideo leaking signal. IET SIGNAL PROCESSING[J]. 2016, 第 5 作者10(1): 63-68, https://www.webofscience.com/wos/woscc/full-record/WOS:000368726200008.[113] Sun, Degang, Shi, Jun, Ding, Xuejie, Zhang, Meng, Huang, Weiqing, IEEE. Method for Detecting Information Leakage From Computer Display in Electromagnetic Radiation. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 5 作者2041-2046, [114] 赵军红, 张卫强, 郑明慧, 张萌, 黄伟庆. 多媒体技术在物理空间安全领域的应用与发展. 信息安全研究[J]. 2016, 第 5 作者2(2): 172-179, http://lib.cqvip.com/Qikan/Article/Detail?id=670052634.[115] 孔庆善, 康迪, 王野, 张萌, 黄伟庆. 光纤通信的光信息获取及防护技术研究. 信息安全研究[J]. 2016, 第 5 作者2(2): 123-130, http://lib.cqvip.com/Qikan/Article/Detail?id=670052625.[116] Sun Degang, Shi Jun, Wei Dong, Zhang Meng, Huang Weiqing, Qiu Xuguang, IEEE. A New Method to Recognize Computer through Electromagnetic Radiation Based on Spectral Centroid. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC). 2016, 第 5 作者184-186, [117] 徐艳云, 黄伟庆, 范伟, 张萌, 魏冬. 基于电源线的电磁信息泄漏建模与实验分析. 中国科学. 信息科学[J]. 2015, 第 2 作者45(10): 1341-1354, https://www.sciengine.com/doi/10.1360/N112014-00324.[118] Huang Weiqing, Ding Chang, Wang Siye, Hu Shuang, IEEE. An efficient clustering mining algorithm for indoor moving target trajectory based on the improved AGNES. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1. 2015, 第 1 作者 通讯作者 1318-1323, http://dx.doi.org/10.1109/Trustcom-2015.524.[119] 印曦, 魏冬, 黄伟庆, 韦迪. 日本车联网信息安全发展现状及对策. 中国信息安全[J]. 2015, 第 3 作者68-72, http://lib.cqvip.com/Qikan/Article/Detail?id=666065820.[120] 魏冬, 孔斌, 乔荣, 范伟, 黄伟庆. 基于极化状态— 幅度— 相位调制的高效无线传输方案. 中国科学. 信息科学[J]. 2015, 第 5 作者45(10): 1263-1279, https://www.sciengine.com/doi/10.1360/N112014-00323.[121] Huang Weiqing, Ding Chang, Wang Siye. A Comprehensive Method to Combine RFID Indoor Targets Positioning with Real Geographic Environment. COMPUTER SCIENCE AND INFORMATION SYSTEMS[J]. 2015, 第 1 作者 通讯作者 12(4): 1149-1169, https://www.webofscience.com/wos/woscc/full-record/WOS:000366127000002.[122] 欧长海, 王竹, 黄伟庆, 周新平, 艾娟, 庞娜. 基于汉明重量模型的密码设备放大模板攻击. 密码学报[J]. 2015, 第 3 作者2(5): 477-486, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=5557637&detailType=1.[123] Wei Dong, Zhang Meng, Fan Wei, Huang Weiqing, IEEE. A Spectrum Efficient Polarized OFDM Scheme for Wireless Depolarized Channel. 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC). 2015, 第 4 作者649-656, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000380481500104.[124] Huang Weiqing, Ding Chang, Wang Siye, Jing Xiang, Luo YuanJian, Zhang Yanfang, Zhang Zhujun, IEEE. An Efficient Visualization Method of RFID Indoor Positioning Data. 2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI). 2014, 第 1 作者 通讯作者 497-504, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000382386000090.[125] 黄伟庆. 信息安全标准化战略对国家核心利益的重要作用研究——从中关两国的比较视角. 北京电子科技学院学报[J]. 2013, 第 1 作者21(1): 5-13, http://lib.cqvip.com/Qikan/Article/Detail?id=45795716.[126] 丁楠, 黄伟庆. 云计算应用于涉密网的可行性研究. 保密科学技术[J]. 2012, 第 2 作者68-71, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479743.[127] 范伟, 朱大立, 黄伟庆. 基于云计算的服务器虚拟化技术探析. 保密科学技术[J]. 2012, 第 3 作者13-16, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479729.[128] 崔晓东, 王思叶, 黄伟庆. 独立的涉密网间跨域密钥分发技术研究. 信息安全与通信保密[J]. 2008, 第 3 作者113-116, http://lib.cqvip.com/Qikan/Article/Detail?id=28945909.