default search action
Yong Huang 0005
Person information
- affiliation: Huazhong University of Science and Technology, Wuhan, China
Other persons with the same name
- Yong Huang — disambiguation page
- Yong Huang 0001 — Guangzhou University, Guangzhou, China
- Yong Huang 0002 — Beijing Institute of Technology, School of Optics and Photonics, Beijing, China
- Yong Huang 0003 — Guangxi University for Nationalities, Nanning, China
- Yong Huang 0004 — Sichuan University, Chengdu, China
- Yong Huang 0006 — Shanghai Institute of Aerospace Control Technology, Shanghai, China
- Yong Huang 0007 — Naval Aviation University, Radar Target Detection Research Group, Yantai, China
- Yong Huang 0008 — Wuhan University, School of Information Management, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Fei Xiao, Yong Huang, Yingying Zuo, Wei Kuang, Wei Wang:
Over-the-Air Adversarial Attacks on Deep Learning Wi-Fi Fingerprinting. IEEE Internet Things J. 10(11): 9823-9835 (2023) - [i8]Fei Xiao, Yong Huang, Yingying Zuo, Wei Kuang, Wei Wang:
Over-The-Air Adversarial Attacks on Deep Learning Wi-Fi Fingerprinting. CoRR abs/2301.03760 (2023) - 2022
- [j4]Yong Huang, Xiang Li, Wei Wang, Tao Jiang, Qian Zhang:
Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information. IEEE Trans. Wirel. Commun. 21(6): 4340-4349 (2022) - [i7]Yong Huang, Xiang Li, Wei Wang, Tao Jiang, Qian Zhang:
Forgery Attack Detection in Surveillance Video Streams Using Wi-Fi Channel State Information. CoRR abs/2201.09487 (2022) - 2021
- [j3]Yong Huang, Wei Wang, Tao Jiang, Qian Zhang:
Detecting Colluding Sybil Attackers in Robotic Networks Using Backscatters. IEEE/ACM Trans. Netw. 29(2): 793-804 (2021) - [c4]Yong Huang, Xiang Li, Wei Wang, Tao Jiang, Qian Zhang:
Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos. INFOCOM 2021: 1-10 - [i6]Yong Huang, Xiang Li, Wei Wang, Tao Jiang, Qian Zhang:
Towards Cross-Modal Forgery Detection and Localization on Live Surveillance Videos. CoRR abs/2101.00848 (2021) - 2020
- [j2]Hui Hou, Shiwen Yu, Hao Wang, Yan Xu, Xiang Xiao, Yong Huang, Xixiu Wu:
A Hybrid Prediction Model for Damage Warning of Power Transmission Line Under Typhoon Disaster. IEEE Access 8: 85038-85050 (2020) - [j1]Yong Huang, Wei Wang, Hao Wang, Tao Jiang, Qian Zhang:
Authenticating On-Body IoT Devices: An Adversarial Learning Approach. IEEE Trans. Wirel. Commun. 19(8): 5234-5245 (2020) - [c3]Yong Huang, Wei Wang, Yiyuan Wang, Tao Jiang, Qian Zhang:
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation. INFOCOM 2020: 2185-2193 - [i5]Yong Huang, Wei Wang, Hao Wang, Tao Jiang, Qian Zhang:
Authenticating On-Body IoT Devices: An Adversarial Learning Approach. CoRR abs/2005.11170 (2020) - [i4]Yong Huang, Wei Wang, Tao Jiang, Qian Zhang:
Detecting Colluding Sybil Attackers in Robotic Networks using Backscatters. CoRR abs/2012.14227 (2020)
2010 – 2019
- 2019
- [c2]Yong Huang, Mengnian Xu, Wei Wang, Hao Wang, Tao Jiang, Qian Zhang:
Towards Motion Invariant Authentication for On-Body IoT Devices. ICC 2019: 1-7 - [i3]Yong Huang, Mengnian Xu, Wei Wang, Hao Wang, Tao Jiang, Qian Zhang:
Towards Motion Invariant Authentication for On-Body IoT Devices. CoRR abs/1904.03968 (2019) - [i2]Yong Huang, Wei Wang, Yiyuan Wang, Tao Jiang, Qian Zhang:
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation. CoRR abs/1912.04613 (2019) - 2018
- [c1]Yong Huang, Wei Wang, Biao He, Liang Sun, Tao Jiang:
On Secure Transmission Design: An Information Leakage Perspective. GLOBECOM 2018: 1-6 - [i1]Yong Huang, Wei Wang, Biao He, Liang Sun, Tao Jiang:
On Secure Transmission Design: An Information Leakage Perspective. CoRR abs/1807.07873 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint