System for measuring information leakage of deep learning models Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy US Patent 11,886,989, 2024 | | 2024 |
Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch S Xu, Q Zhou, H Huang, X Jia, H Du, Y Chen, Y Xie Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |
Verifiable deep learning training service Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy US Patent 11,816,575, 2023 | | 2023 |
Recurrent neural network based anomaly detection H Huang, T Lee, IM Molloy, Z Gu, J Zhang, JR Rao US Patent 11,775,637, 2023 | 1 | 2023 |
Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation Y Teng, W Wang, J Shao, H Wan, H Huang, Y Liu, J Lin European Symposium on Research in Computer Security, 212-234, 2023 | | 2023 |
Identifying internet of things network anomalies using group attestation H Huang, KK Singh US Patent 11,520,880, 2022 | 12 | 2022 |
Privacy enhancing deep learning cloud service using a trusted execution environment Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy US Patent 11,443,182, 2022 | 20 | 2022 |
Privacy Enhancing Deep Learning Cloud Service Using a Trusted Execution Environment Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy US Patent App. 17/743,571, 2022 | 1 | 2022 |
Beacon: Directed grey-box fuzzing with provable path pruning H Huang, Y Guo, Q Shi, P Yao, R Wu, C Zhang 2022 IEEE Symposium on Security and Privacy (SP), 36-50, 2022 | 80 | 2022 |
Recurrent neural network based anomaly detection H Huang, T Lee, IM Molloy, Z Gu, J Zhang, JR Rao US Patent 11,301,563, 2022 | 11 | 2022 |
Portable citrus detection system combining UAV and edge equipment H Huang, M Kadoch International Conference On Signal And Information Processing, Networking …, 2021 | | 2021 |
Design of citrus fruit detection system based on mobile platform and edge computer device H Huang, T Huang, Z Li, S Lyu, T Hong Sensors 22 (1), 59, 2021 | 22 | 2021 |
Endpoint inter-process activity extraction and pattern matching X Shu, Z Gu, H Huang, MP Stoecklin, J Zhang US Patent 11,184,374, 2021 | 11 | 2021 |
Protecting deep learning models using watermarking Z Gu, H Huang, MP Stoecklin, J Zhang US Patent 11,163,860, 2021 | 1 | 2021 |
Malware clustering approaches based on cognitive computing techniques S Chari, H Huang, T Lee, Y Park US Patent 11,159,547, 2021 | 5 | 2021 |
Deactivating evasive malware Z Gu, H Huang, J Jang, DH Kirat, X Shu, MP Stoecklin, J Zhang US Patent 11,144,642, 2021 | | 2021 |
Fuzzing SMT solvers via two-dimensional input space exploration P Yao, H Huang, W Tang, Q Shi, R Wu, C Zhang Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021 | 16 | 2021 |
Single channel input multi-factor authentication via separate processing pathways S Chari, Z Gu, H Huang, D Pendarakis US Patent 10,904,246, 2021 | | 2021 |
Tree-Type Irrigation Pipe Network Planning and Design Method Using ICSO-ASV Z Li, Z Lin, S Lyu, Z Wei, H Huang Water 12 (7), 1985, 2020 | | 2020 |
Scarecrow: Deactivating evasive malware via its own evasive logic J Zhang, Z Gu, J Jang, D Kirat, M Stoecklin, X Shu, H Huang 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 16 | 2020 |