


default search action
Weiqing Huang
- > Home > Persons > Weiqing Huang
Publications
- 2025
[i4]Yachao Liang, Min Yu, Gang Li, Jianguo Jiang, Boquan Li, Feng Yu, Ning Zhang, Xiang Meng, Weiqing Huang:
SpeechForensics: Audio-Visual Speech Representation Learning for Face Forgery Detection. CoRR abs/2508.09913 (2025)- 2024
[c108]Ran Liu, Ming Liu, Min Yu, He Zhang, Jianguo Jiang, Gang Li, Weiqing Huang:
SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization. ACL (Findings) 2024: 9632-9651
[c105]Ran Liu, Ming Liu, Min Yu, Jianguo Jiang, Gang Li, Dan Zhang, Jingyuan Li, Xiang Meng, Weiqing Huang:
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization. ECAI 2024: 3709-3716
[c98]Yachao Liang, Min Yu, Gang Li, Jianguo Jiang, Boquan Li, Feng Yu, Ning Zhang, Xiang Meng, Weiqing Huang:
SpeechForensics: Audio-Visual Speech Representation Learning for Face Forgery Detection. NeurIPS 2024
[i1]Ran Liu, Ming Liu, Min Yu, Jianguo Jiang, Gang Li, Dan Zhang, Jingyuan Li, Xiang Meng, Weiqing Huang:
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization. CoRR abs/2408.10115 (2024)- 2021
[j12]Jianguo Jiang, Baole Wei, Min Yu
, Gang Li
, Boquan Li, Chao Liu, Min Li, Weiqing Huang:
An end-to-end text spotter with text relation networks. Cybersecur. 4(1): 7 (2021)
[j11]Chao Liu, Chenzhe Lou, Min Yu, Siu-Ming Yiu, Kam-Pui Chow, Gang Li
, Jianguo Jiang, Weiqing Huang:
A novel adversarial example detection method for malicious PDFs using multiple mutated classifiers. Digit. Investig. 38(Supplement): 301124 (2021)
[j10]Jianguo Jiang, Boquan Li
, Baole Wei, Gang Li
, Chao Liu, Weiqing Huang, Meimei Li, Min Yu:
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. J. Comput. Secur. 29(4): 403-421 (2021)
[c60]Jianguo Jiang, Nan Song, Min Yu, Kam-Pui Chow, Gang Li
, Chao Liu, Weiqing Huang:
Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning. IFIP Int. Conf. Digital Forensics 2021: 135-155
[c59]Degang Sun, Yunting Guo, Min Yu, Gang Li
, Chao Liu, Jianguo Jiang, Weiqing Huang:
FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNN 2021: 1-8
[c58]Weiqing Huang, Chenggang Jia, Min Yu, Gang Li
, Chao Liu, Jianguo Jiang:
UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection. ISCC 2021: 1-7
[c55]Chao Liu, Shuai Yu, Min Yu, Baole Wei, Boquan Li, Gang Li, Weiqing Huang:
Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios. ISCC 2021: 1-7
[c52]Chao Liu, Xintong Wei, Min Yu, Gang Li
, Xiangmei Ma, Jianguo Jiang, Weiqing Huang:
Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels. KSEM 2021: 162-173
[c51]Jianguo Jiang, Qiang Liu, Min Yu, Gang Li
, Mingqi Liu, Chao Liu, Weiqing Huang:
Landscape-Enhanced Graph Attention Network for Rumor Detection. KSEM 2021: 188-199
[c46]Jianguo Jiang, Chenghao Wang, Min Yu, Chenggang Jia, Gang Li
, Chao Liu, Weiqing Huang:
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary. WASA (2) 2021: 147-159- 2020
[c42]Jianguo Jiang, Gengwang Li, Min Yu, Gang Li
, Chao Liu, Zhiqiang Lv
, Bin Lv, Weiqing Huang:
Similarity of Binaries Across Optimization Levels and Obfuscation. ESORICS (1) 2020: 295-315
[c41]Jianguo Jiang, Zhaoce Liu, Min Yu, Gang Li
, Song Li, Chao Liu, Weiqing Huang:
HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph. HPCC/DSS/SmartCity 2020: 328-335
[c36]Jianguo Jiang, Yue Lu, Min Yu, Gang Li
, Chao Liu, Shaohua An, Weiqing Huang:
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection. ISCC 2020: 1-7- 2019
[j5]Min Yu
, Jianguo Jiang, Gang Li
, Chenzhe Lou, Yunzheng Liu, Chao Liu, Weiqing Huang:
Malicious documents detection for business process management based on multi-layer abstract model. Future Gener. Comput. Syst. 99: 517-526 (2019)
[c29]Min Yu, Jianguo Jiang, Gang Li
, Jingyuan Li
, Chenzhe Lou, Chao Liu, Weiqing Huang, Yuanzhuo Wang:
A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction. HPCC/SmartCity/DSS 2019: 2317-2323
[c22]Jianguo Jiang, Song Li, Min Yu, Gang Li
, Chao Liu, Kai Chen, Hui Liu, Weiqing Huang:
Android Malware Family Classification Based on Sensitive Opcode Sequence. ISCC 2019: 1-7
[c21]Chao Liu, Xinghua Wu, Min Yu
, Gang Li
, Jianguo Jiang, Weiqing Huang, Xiang Lu:
A Two-Stage Model Based on BERT for Short Fake News Detection. KSEM (2) 2019: 172-183- 2018
[c15]Chao Liu, Jianan Li, Min Yu, Gang Li
, Bo Luo
, Kai Chen, Jianguo Jiang, Weiqing Huang:
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. IPCCC 2018: 1-7
[c13]Jianguo Jiang, Yue Lu, Min Yu
, Gang Li
, Chao Liu, Weiqing Huang, Fangtao Zhang:
Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis. KSEM (2) 2018: 221-231
[c12]Jianguo Jiang, Song Li, Min Yu, Kai Chen, Chao Liu, Weiqing Huang, Gang Li
:
MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment. MASS 2018: 64-72
[c9]Jianguo Jiang, Qian Yu, Min Yu, Gang Li
, Jiuming Chen, Kunying Liu, Chao Liu, Weiqing Huang:
ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS. TrustCom/BigDataSE 2018: 1565-1569

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-03 00:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






