Wenchao Huang

ORCID: 0000-0002-2043-2439
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Indoor and Outdoor Localization Technologies
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Network Security and Intrusion Detection
  • Speech and Audio Processing
  • Blockchain Technology Applications and Security
  • Underwater Vehicles and Communication Systems
  • Software Testing and Debugging Techniques
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • Digital and Cyber Forensics
  • Internet Traffic Analysis and Secure E-voting
  • Access Control and Trust
  • Web Data Mining and Analysis
  • Energy Efficient Wireless Sensor Networks
  • Security in Wireless Sensor Networks
  • Optical Wireless Communication Technologies
  • Sparse and Compressive Sensing Techniques
  • Mobile and Web Applications
  • Software Engineering Research
  • Mobile Ad Hoc Networks
  • Cryptography and Residue Arithmetic
  • User Authentication and Security Systems

University of Science and Technology of China
2015-2025

Fuzhou University
2025

Peking University Cancer Hospital
2023-2024

Peking University
2023-2024

East China University of Political Science and Law
2024

Commercial Aircraft Corporation of China (China)
2019

University of California System
2018

Los Angeles City College
2018

Nanjing Institute of Technology
2018

University of California, Los Angeles
2018

Hypoxia is characteristic of the tumor microenvironment, which correlated with resistance to photodynamic therapy (PDT), radiotherapy, chemotherapy, and immunotherapy. Catalase potentially useful catalyze conversion endogenous H2O2 O2 for hypoxia reversion. However, efficient delivery catalase into regions tumors a huge challenge. Here, we report self-assembly ultra-acid-sensitive polymer conjugates albumin nanomicelles that are responsive acidic microenvironment. The immunogenicity...

10.1021/jacs.3c13501 article EN Journal of the American Chemical Society 2024-03-12

Device-free passive human activity recognition plays an important role in many applications, such as smart homes, identification, health care, etc. However, existing systems either require a dedicated device or do not meet the scenarios of signals through wall. To address this challenge, we present TW-See, device-free system with Wi-Fi signals, which does any and meets TW-See mainly exploits two key techniques to recognize different activities. First, propose opposite robust PCA (Or-PCA)...

10.1109/tvt.2018.2878754 article EN IEEE Transactions on Vehicular Technology 2018-10-30

We propose an accurate acoustic direction finding scheme, Swadloon, according to the arbitrary pattern of phone shaking in rough horizontal plane. Swadloon tracks displacement smartphone relative with resolution less than 1 millimeter. The is then obtained by combining velocity from one inertial sensors. Major challenges implementing are measure precisely and estimate accurately when speed phone-shaking low changes arbitrarily. rigorous methods address these challenges, apply several case...

10.1109/infocom.2014.6847959 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

In this work, we explore a new networking mechanism with smart glasses, through which users can express their interest and connect to target simply by gaze. Doing this, attempt let wearable devices understand human attention intention, pair carried according such intention. To achieve ambitious goal, propose proof-of-concept system iGaze, visual driven suite: an iGaze glass (hardware), protocol VAN (software). Our glass, is low-cost head-mounted camera, orientation sensors, microphone...

10.1145/2639108.2639119 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2014-09-05

We propose AccountTrade, a set of accountable protocols, for big data trading among dishonest consumers. To secure the environment, our protocols achieve book-keeping ability and accountability against consumers who may misbehave throughout dataset transactions. Specifically, we study responsibilities in design AccountTrade to try deviate from their responsibilities. uniqueness index, new rigorous measurement uniqueness, as well several enable brokers blame consumer when misbehavior is...

10.1109/infocom.2017.8057004 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2017-05-01

We propose an accurate acoustic direction finding scheme, Swadloon, according to the arbitrary pattern of phone shaking in a rough horizontal plane. Swadloon leverages sensors smartphone without requirement any specialized devices. Our design exploits key observation: relative displacement and velocity phone-shaking movement corresponds subtle phase frequency shift Doppler effects experienced received signal by phone. tracks with resolution less than 1 millimeter. The is then obtained...

10.1109/tmc.2014.2377717 article EN IEEE Transactions on Mobile Computing 2014-12-04

Compressive sensing (CS)-based in-network data processing is a promising approach to reduce packet transmission in wireless sensor networks. Existing CS-based gathering methods require large number of sensors involved each CS measurement gathering, leading the relatively high cost. In this paper, we propose sparsest random scheduling for compressive scheme, which decreases cost from O(N) O(log(N)) without increasing measurements as well. our present matrix, where row has only one nonzero...

10.1109/twc.2014.2332344 article EN IEEE Transactions on Wireless Communications 2014-06-23

Anti-icing/de-icing coatings on equipment surfaces are becoming an important protective measure against frost formation and buildup, especially when they used in very harsh environments. Herein, perfluorodecyltriethoxysilane (FAS) has been grafted onto the surface of graphene (GPE) via hydrolysis alkaline condition. The FAS modified (F-GPE) is hydrophobic conductive. A photothermal electrothermal superhydrophobic coating obtained by mixing F-GPE into epoxy resin as a filler for anti/de-icing...

10.2139/ssrn.5084413 preprint EN 2025-01-01

In this paper, a set of accountable protocols denoted as AccountTrade is proposed for big data trading among dishonest consumers. For achieving secure environment, achieves book-keeping ability and accountability against consumers throughout the (i.e., buying selling) datasets. We investigate consumers' responsibilities in dataset trading, then we design to achieve that are likely deviate from responsibilities. Specifically, uniqueness index defined proposed, which new rigorous measurement...

10.1109/tifs.2018.2848657 article EN publisher-specific-oa IEEE Transactions on Information Forensics and Security 2018-06-18

In this paper, we propose and implement WalkieLokie, a novel acoustic-based relative positioning system. WalkieLokie facilitates multitude of Augmented Reality (AR) applications: users with smart devices can passively acquire surrounding information in real time, similar to the commercial AR system Wikitude; presenters, who want share or introduce themselves, actively launch function on demand. The key rational is that user perceive series spatial-related acoustic signals emitted from...

10.1145/2971648.2971655 article EN 2016-09-09

Better understanding of mobile applications' behaviors would lead to better malware detection/classification and app recommendation for users. In this work, we design a framework AppDNA automatically generate compact representation each comprehensively profile its behaviors. The behavior difference between two apps can be measured by the distance their representations. As result, versatile generated once app, then used wide variety objectives, including detection, categorizing, plagiarism...

10.1109/infocom.2018.8486327 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

Many approaches have been proposed to secure various ad hoc routing protocols. However, many attacks such as wormhole attacks, vertex cut and traffic-analysis based are still not well addressed. In this paper, we propose a novel protocol DAAODV which is on ad-hoc on-demand distance vector (AODV). takes full advantage of trusted computing technology, particularly the direct anonymous attestation (DAA) property-based (PBA) an without requirement third party (TTP). Moreover, efficient signing...

10.1109/cse.2009.87 article EN 2009-01-01

Data mining is an important technology for the information society. Due to limited computation resources of data owners and prevalence cloud computing, outsourced becoming more attractive. The privacy security issues are outstanding recently. Though existing model computing consists multiple owners, there little consideration collaboration between them. But such necessary with trend partition among different entities nowadays. Besides, most work based on semi-honest assumption can not deal...

10.1109/trustcom.2012.251 article EN 2012-06-01

Due to the popularity of mobile internet and location-aware devices, there is an explosion location trajectory data moving objects. A few proposals have been proposed for privacy preserving publishing, most them assume attacks with same adversarial background knowledge. In practice, different users requirements. Such non-personalized assumption does not meet personalized requirements, meanwhile, it looses chance achieve better utility by taking advantage differences users' We study...

10.1049/cje.2017.01.024 article EN Chinese Journal of Electronics 2017-03-01
Coming Soon ...