Heqing Huang  Heqing Huang photo         

contact information

Research Staff Member
Thomas J. Watson Research Center, Yorktown Heights, NY USA



CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Yuan, Xuejing and Chen, Yuxuan and Zhao, Yue and Long, Yunhui and Liu, Xiaokang and Chen, Kai and Zhang, Shengzhi and Huang, Heqing and Wang, Xiaofeng and Gunter, Carl A
arXiv preprint arXiv:1801.08535, 2018

A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform
Huang, Heqing and Zheng, Cong and Zeng, Junyuan and Zhou, Wu and Zhu, Sencun and Liu, Peng and Molloy, Ian and Chari, Suresh and Zhang, Ce and Guan, Quanlong
IEEE Transactions on Big Data, IEEE, 2018


IDIoT: Securing the Internet of Things like it's 1994
Barrera, David and Molloy, Ian and Huang, Heqing
arXiv preprint arXiv:1712.03623, 2017

SweetDroid: Toward a Context-Sensitive Privacy Policy Enforcement Framework for Android OS
Chen, Xin and Huang, Heqing and Zhu, Sencun and Li, Qing and Guan, Quanlong
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, pp. 75--86


Android Malware Development on Public Malware Scanning Platforms: A Large-scale Data-driven Study
Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Suresh Chari, Ce Zhang
Proceedings of the 2016 IEEE International Conference on Big Data (Big Data), IEEE Computer Society

Learning from Big Malwares
Linhai Song, Heqing Huang, Wu Zhou, Wenfei Wu, Yiying Zhang
Proceedings of the 7th ACM SIGOPS Asia-Pacific Workshop on Systems, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance
Le Guan, Jun Xu, Shuai Wang, Xinyu Xing, Lin Lin, Heqing Huang, Peng Liu, Wenke Lee
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, pp. 42--55, ACM, 2016

Semantics-Based Repackaging Detection for Mobile Apps
Quanlong Guan, Heqing Huang, Weiqi Luo, and Sencun Zhu,
International Symposium on Engineering Secure Software and Systems, pp. 89--105, 2016


From system services freezing to system server shutdown in android: All you need is a loop in an app
Huang, Heqing and Zhu, Sencun and Chen, Kai and Liu, Peng
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1236--1247, 2015

Towards discovering and understanding unexpected hazards in tailoring antivirus software for android
Huang, Heqing and Chen, Kai and Ren, Chuangang and Liu, Peng and Zhu, Sencun and Wu, Dinghao
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 7--18, 2015

Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
Chen, Kai and Wang, Peng and Lee, Yeonjoon and Wang, XiaoFeng and Zhang, Nan and Huang, Heqing and Zou, Wei and Liu, Peng
24th USENIX Security Symposium (USENIX Security 15), pp. 659--674, 2015


Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile Platforms
Huang, Heqing and Chen, Kai and Liu, Peng and Zhu, Sencun and Wu, Dinghao
International Conference on Security and Privacy in Communication Systems, pp. 359--366, 2014

ViewDroid: towards obfuscation-resilient mobile application repackaging detection
Zhang, Fangfang and Huang, Heqing and Zhu, Sencun and Wu, Dinghao and Liu, Peng
Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, pp. 25--36


A framework for evaluating mobile app repackaging detection algorithms
Huang, Heqing and Zhu, Sencun and Liu, Peng and Wu, Dinghao
International Conference on Trust and Trustworthy Computing, pp. 169--186, 2013


Distilling critical attack graph surface iteratively through minimum-cost sat solving
Huang, Heqing and Zhang, Su and Ou, Xinming and Prakash, Atul and Sakallah, Karem
Proceedings of the 27th Annual Computer Security Applications Conference, pp. 31--40, 2011