


default search action
Teng Huang 0001
Person information
- affiliation: Guangzhou University, Institute of Artificial Intelligence and Blockchain, Guangzhou, China
- affiliation (PhD 2019): Beihang University, Beijing, China
Other persons with the same name
- Teng Huang — disambiguation page
- Teng Huang 0002
— Sun Yat-sen University, School of Business, Guangzhou, China (and 1 more) - Teng Huang 0003
— Southeast University, School of Computer Science and Engineering, Nanjing, China - Teng Huang 0004
— East China University of Science and Technology, Department of Computer Science and Engineering, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j39]Yan Pang, Xiangfu Liu, Teng Huang, Yile Hong, Jiahui Huang, Sisi Duan, Changyu Dong:
Graph-Based Contract Sensing Framework for Smart Contract Vulnerability Detection. IEEE Trans. Big Data 11(6): 3356-3368 (2025)
[j38]Teng Huang
, Jiahui Huang
, Changyu Dong
, Sisi Duan
, Yan Pang
:
SAMamba: Structure-Aware Mamba for Ethereum Fraud Detection. IEEE Trans. Inf. Forensics Secur. 20: 7410-7423 (2025)
[j37]Jiahui Huang
, Teng Huang
, Changyu Dong
, Sisi Duan
, Yan Pang
:
Hierarchical Network With Local-Global Awareness for Ethereum Account De-anonymization. IEEE Trans. Syst. Man Cybern. Syst. 55(9): 5839-5852 (2025)- 2024
[j36]Yan Li, Hongyang Yan, Teng Huang, Zijie Pan
, Jiewei Lai, Xiaoxue Zhang, Kongyang Chen
, Jin Li:
Model architecture level privacy leakage in neural networks. Sci. China Inf. Sci. 67(3) (2024)
[j35]Jianhong Li
, Qi Chen
, Jin Li, Zihan Jiang
, Guoyu Yang, Teng Huang, Hongyang Yan, Duncan S. Wong:
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus. Comput. Stand. Interfaces 90: 103855 (2024)
[j34]Li Hu
, Anli Yan
, Hongyang Yan
, Jin Li
, Teng Huang
, Yingying Zhang
, Changyu Dong
, Chunsheng Yang
:
Defenses to Membership Inference Attacks: A Survey. ACM Comput. Surv. 56(4): 92:1-92:34 (2024)
[j33]Jiahui Huang
, Teng Huang
, Huanchun Wei, Jiehua Zhang, Hongyang Yan, Duncan S. Wong, Haibo Hu
:
zkChain: A privacy-preserving model based on zk-SNARKs and hash chain for efficient transfer of assets. Trans. Emerg. Telecommun. Technol. 35(4) (2024)
[j32]Weichu Deng
, Jin Li, Hongyang Yan
, Arthur Sandor Voundi Koe, Teng Huang
, Jianfeng Wang
, Cong Peng:
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols. J. Inf. Secur. Appl. 86: 103885 (2024)
[j31]Cong Li, Haiyang Wang, Weipeng Liang, Yunhao Li, Hongyang Yan, Teng Huang, Bo Li, Jianwei He:
LEOCN: Real-time and complete network simulation framework for LEO constellation networks1. J. High Speed Networks 30(1): 1-18 (2024)
[j30]Bo Wei
, Teng Huang
, Xi Zhang, Jiaming Liang, Yunhao Li
, Cong Cao, Dan Li
, Yongfeng Chen
, Huagang Xiong
, Feng Jiang, Xiqiu Zhang:
Cam-PC: A Novel Method for Camouflaging Point Clouds to Counter Adversarial Deception in Remote Sensing. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 56-67 (2024)
[j29]Teng Huang
, Cheng Liang
, Di Wu
, Yi He
:
A Debiasing Autoencoder for Recommender System. IEEE Trans. Consumer Electron. 70(1): 3603-3613 (2024)
[j28]Teng Huang
, Yile Hong
, Yan Pang
, Jiaming Liang
, Jie Hong
, Lin Huang
, Yuan Zhang
, Yan Jia
, Patrizia Savi
:
AdaptFormer: An Adaptive Hierarchical Semantic Approach for Change Detection on Remote Sensing Images. IEEE Trans. Instrum. Meas. 73: 1-12 (2024)
[j27]Yan Pang
, Jiaming Liang
, Teng Huang
, Hao Chen
, Yunhao Li
, Dan Li
, Lin Huang
, Qiong Wang
:
Slim UNETR: Scale Hybrid Transformers to Efficient 3D Medical Image Segmentation Under Limited Computational Resources. IEEE Trans. Medical Imaging 43(3): 994-1005 (2024)
[j26]Ruitao Hou
, Anli Yan, Hongyang Yan, Teng Huang:
Bag of tricks for backdoor learning. Wirel. Networks 30(8): 7569-7579 (2024)
[c15]Yunhao Li
, Zibin Chen, Junming Yan
, Ziyu Ding
, Jie Li, Teng Huang
, Xiaoqing Pei, Zheng Zhang, Qiong Wang
, Yan Pang
:
Optimized Breast Lesion Segmentation in Ultrasound Videos Across Varied Resource-Scant Environments. ACCV (8) 2024: 469-484
[c14]Jiaming Liang
, Mingdu Zhang, Caiyan Tan, Teng Huang
, Xi Zhang, Zheng Zhang, Shegan Gao, Qian Sheng, Yan Pang
:
Comprehensive Transformer Integration Network (CTIN): Advancing Endoscopic Disease Segmentation with Hybrid Transformer Architecture. PRCV (15) 2024: 210-224
[c13]Yunhao Li, Caiyan Tan, Mingdu Zhang, Xi Zhang, Teng Huang
, Xiaoqing Pei, Yan Pang
:
IPM: An Intelligent Component for 3D Brain Tumor Segmentation Integrating Semantic Extractor and Pixel Refiner. PRCV (15) 2024: 225-240
[c12]Yile Hong
, Xiangfu Liu
, Mingwei Chen, Yan Pang
, Teng Huang
, Bo Wei, Aobo Lang, Xi Zhang:
SFFAFormer: An Semantic Fusion and Feature Accumulation Approach for Remote Sensing Image Change Detection. PRCV (13) 2024: 516-529- 2023
[j25]Behnam Zahednejad
, Teng Huang
, Saeed Kosari
, Xiaojun Ren
:
A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability. Int. J. Intell. Syst. 2023: 1-19 (2023)
[j24]Teng Huang, Jiahui Huang
, Yan Pang
, Hongyang Yan:
Smart contract watermarking based on code obfuscation. Inf. Sci. 628: 439-448 (2023)
[j23]Anli Yan, Teng Huang, Lishan Ke, Xiaozhang Liu, Qi Chen, Changyu Dong:
Explanation leaks: Explanation-guided model extraction attacks. Inf. Sci. 632: 269-284 (2023)
[j22]Chun Ding, Meimin Wang, Zhili Zhou
, Teng Huang, Xiaoliang Wang
, Jin Li:
Siamese transformer network-based similarity metric learning for cross-source remote sensing image retrieval. Neural Comput. Appl. 35(11): 8125-8142 (2023)
[j21]Weichu Deng
, Huanchun Wei, Teng Huang, Cong Cao, Yun Peng, Xuan Hu:
Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion. Sensors 23(16): 7246 (2023)
[j20]Peng Zhang
, Teng Huang
, Xiaoqiang Sun, Wei Zhao, Hongwei Liu, Shangqi Lai
, Joseph K. Liu
:
Privacy-Preserving and Outsourced Multi-Party K-Means Clustering Based on Multi-Key Fully Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 20(3): 2348-2359 (2023)
[j19]Anli Yan
, Hongyang Yan
, Li Hu
, Xiaozhang Liu
, Teng Huang
:
Holistic Implicit Factor Evaluation of Model Extraction Attacks. IEEE Trans. Dependable Secur. Comput. 20(6): 4678-4689 (2023)
[j18]Ruitao Hou, Teng Huang, Hongyang Yan, Lishan Ke, Weixuan Tang:
A stealthy and robust backdoor attack via frequency domain transform. World Wide Web (WWW) 26(5): 2767-2783 (2023)
[c11]Xingjiang Cheng
, Fuxing Zhang
, Yun Peng
, Xianmin Wang
, Teng Huang
, Ziye Zhou
, Duncan S. Wong, Changyu Dong
:
A Survey of Privacy Preserving Subgraph Matching Methods. AIS&P (1) 2023: 98-113
[c10]Gaoming Zhang, Sen Lin, Xianmin Wang, Teng Huang, Xuan Hu, Lingyun Zou:
Experimental Comparison of Graph Edit Distance Computation Methods. MDM 2023: 303-308
[c9]Cheng Liang, Di Wu, Yi He, Teng Huang, Zhong Chen
, Xin Luo:
MMA: Multi-Metric-Autoencoder for Analyzing High-Dimensional and Incomplete Data. ECML/PKDD (5) 2023: 3-19
[c8]Teng Huang
, Weiqing Kong
, Jiaming Liang
, Ziyu Ding
, Hui Li
, Xi Zhang:
Lightweight Multispectral Skeleton and Multi-stream Graph Attention Networks for Enhanced Action Prediction with Multiple Modalities. PRCV (1) 2023: 72-83
[c7]Jiaming Liang
, Teng Huang
, Dan Li
, Ziyu Ding
, Yunhao Li
, Lin Huang
, Qiong Wang
, Xi Zhang:
AgileNet: A Rapid and Efficient Breast Lesion Segmentation Method for Medical Image Analysis. PRCV (5) 2023: 419-430- 2022
[j17]Jiamin Zheng, Teng Huang
, Jiahui Huang:
CRFL: A novel federated learning scheme of client reputation assessment via local model inversion. Int. J. Intell. Syst. 37(8): 5457-5471 (2022)
[j16]Guanbiao Lin
, Hongyang Yan
, Guang Kou, Teng Huang
, Shiyu Peng, Yingying Zhang, Changyu Dong:
Understanding adaptive gradient clipping in DP-SGD, empirically. Int. J. Intell. Syst. 37(11): 9674-9700 (2022)
[j15]Wenjun Li
, Anli Yan, Di Wu
, Taoyu Zhu, Teng Huang
, Xuandi Luo
, Shaowei Wang:
DPCL: Contrastive representation learning with differential privacy. Int. J. Intell. Syst. 37(11): 9701-9725 (2022)
[j14]Anli Yan, Ruitao Hou, Xiaozhang Liu
, Hongyang Yan, Teng Huang
, Xianmin Wang:
Towards explainable model extraction attacks. Int. J. Intell. Syst. 37(11): 9936-9956 (2022)
[j13]Ruitao Hou, Shan Ai, Qi Chen, Hongyang Yan, Teng Huang, Kongyang Chen
:
Similarity-based integrity protection for deep learning systems. Inf. Sci. 601: 255-267 (2022)
[c6]Cheng Liang, Yi He, Teng Huang, Di Wu:
AutoRec++: Incorporating Debias Methods into Autoencoder-based Recommender System. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1876-1881
[i2]Wenyan Pan, Zhili Zhou, Guangcan Liu, Teng Huang, Hongyang Yan, Q. M. Jonathan Wu:
Auto-Focus Contrastive Learning for Image Manipulation Detection. CoRR abs/2211.10922 (2022)
[i1]Cheng Liang, Teng Huang, Yi He, Song Deng, Di Wu, Xin Luo:
Multi-Metric AutoRec for High Dimensional and Sparse User Behavior Data Prediction. CoRR abs/2212.13879 (2022)- 2021
[j12]Shan Ai, Arthur Sandor Voundi Koe
, Teng Huang
:
Adversarial perturbation in remote sensing image recognition. Appl. Soft Comput. 105: 107252 (2021)
[j11]Zhenyu Yue, Fei Gao, Qingxu Xiong, Jun Wang, Teng Huang, Erfu Yang
, Huiyu Zhou
:
A Novel Semi-Supervised Convolutional Neural Network Method for Synthetic Aperture Radar Image Recognition. Cogn. Comput. 13(4): 795-806 (2021)
[j10]Kanghua Mo, Xiaozhang Liu, Teng Huang
, Anli Yan:
Querying little is enough: Model inversion attack via latent information. Int. J. Intell. Syst. 36(2): 681-690 (2021)
[j9]Chang Chen
, Teng Huang
:
Camdar-adv: Generating adversarial patches on 3D object. Int. J. Intell. Syst. 36(3): 1441-1453 (2021)
[j8]Huali Ren, Teng Huang
, Hongyang Yan:
Adversarial examples: attacks and defenses in the physical world. Int. J. Mach. Learn. Cybern. 12(11): 3325-3336 (2021)- 2020
[j7]Ping Li, Shengjun Li
, Hongyang Yan, Lishan Ke
, Teng Huang
, Alzubair Hassan:
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme. Complex. 2020: 1784276:1-1784276:13 (2020)
[j6]Teng Huang
, Yongfeng Chen
, Bingjian Yao, Bifen Yang, Xianmin Wang, Ya Li:
Adversarial attacks on deep-learning-based radar range profile target recognition. Inf. Sci. 531: 159-176 (2020)
[j5]Khaled Riad
, Teng Huang
, Lishan Ke:
A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J. Netw. Comput. Appl. 160: 102633 (2020)
[j4]Teng Huang
, Qixiang Zhang, Jiabao Liu, Ruitao Hou, Xianmin Wang, Ya Li:
Adversarial attacks on deep-learning-based SAR image target recognition. J. Netw. Comput. Appl. 162: 102632 (2020)
[c5]Chang Chen
, Teng Huang
:
Camdar-Adv: Method for Generating Adversarial Patches on 3D Object. CSS 2020: 1-8
[c4]Ruitao Hou
, Xiaoyu Xiang
, Qixiang Zhang
, Jiabao Liu
, Teng Huang
:
Universal Adversarial Perturbations of Malware. CSS 2020: 9-19
[c3]Huali Ren, Teng Huang
:
Adversarial Example Attacks in the Physical World. ML4CS (2) 2020: 572-582
2010 – 2019
- 2019
[j3]Fei Gao, Teng Huang
, Jinping Sun, Jun Wang, Amir Hussain
, Erfu Yang
:
A New Algorithm for SAR Image Target Recognition Based on an Improved Deep Convolutional Neural Network. Cogn. Comput. 11(6): 809-824 (2019)
[j2]Rafik Hamza
, Alzubair Hassan, Teng Huang
, Lishan Ke
, Hongyang Yan:
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment. Complex. 2019: 1625678:1-1625678:11 (2019)
[j1]Fei Gao
, Teng Huang
, Jinping Sun
, Amir Hussain, Erfu Yang
, Huiyu Zhou
:
A Novel Semi-Supervised Learning Method Based on Fast Search and Density Peaks. Complex. 2019: 6876173:1-6876173:23 (2019)
[c2]Jun Tu
, Teng Huang
, Xusong Liu, Fei Gao, Erfu Yang
:
A Novel HRRP Target Recognition Method Based on LSTM and HMM Decision-making. ICAC 2019: 1-6- 2017
[c1]Fei Gao, Teng Huang
, Jun Wang, Jinping Sun, Erfu Yang
, Amir Hussain
:
Combining Deep Convolutional Neural Network and SVM to SAR Image Target Recognition. iThings/GreenCom/CPSCom/SmartData 2017: 1082-1085
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-29 01:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







