


default search action
Huihui Huang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j10]Huihui Huang
, YunKai Song, Qiang Wei
, Ruilong Deng
, Yangyang Geng
, Haowen Chen
:
CCPA via Load Redistribution: Sequential Strategies and Vulnerability Analysis in Power Systems. IEEE Trans. Inf. Forensics Secur. 21: 2207-2219 (2026)
[i6]Huihui Huang, Jieke Shi, Junkai Chen, Ting Zhang, Yikun Li, Chengran Yang, Eng Lieh Ouh, Lwin Khin Shar, David Lo:
PenForge: On-the-Fly Expert Agent Construction for Automated Penetration Testing. CoRR abs/2601.06910 (2026)- 2025
[j9]Peng Miao
, Huihui Huang
:
Novel fixed-time zeroing neural network models for solving time-varying minimal rank outer inverse problem. Commun. Nonlinear Sci. Numer. Simul. 142: 108536 (2025)
[j8]Peng Miao
, Huihui Huang
:
A novel prescribed-time ZNN for solving time-varying complex Sylvester equation and application to pseudo-inverse. Commun. Nonlinear Sci. Numer. Simul. 150: 109021 (2025)
[j7]Chaoyang Zheng
, Yunchao Wang, Huihui Huang
, Yunfeng Wang, Haowen Chen, Qiang Wei:
Survey of network protocol fuzzers: Taxonomy, techniques, and directions. Comput. Secur. 159: 104683 (2025)
[j6]Muwei Jian, Huihui Huang, Haoran Zhang, Rui Wang, Xiaoguang Li, Hui Yu
:
CSSANet: A channel shuffle slice-aware network for pulmonary nodule detection. Neurocomputing 615: 128827 (2025)
[i5]Martin Weyssow, Chengran Yang, Junkai Chen, Yikun Li, Huihui Huang, Ratnadira Widyasari, Han Wei Ang, Frank Liauw, Eng Lieh Ouh, Lwin Khin Shar, David Lo:
R2Vul: Learning to Reason about Software Vulnerabilities with Reinforcement Learning and Structured Reasoning Distillation. CoRR abs/2504.04699 (2025)
[i4]Huihui Huang, Ratnadira Widyasari, Ting Zhang, Ivana Clairine Irsan, Jieke Shi, Han Wei Ang
, Frank Liauw, Eng Lieh Ouh, Lwin Khin Shar, Hong Jin Kang, David Lo:
Back to the Basics: Rethinking Issue-Commit Linking with LLM-Assisted Retrieval. CoRR abs/2507.09199 (2025)
[i3]Yikun Li, Ngoc Tan Bui, Ting Zhang, Martin Weyssow, Chengran Yang, Xin Zhou, Jinfeng Jiang, Junkai Chen, Huihui Huang, Huu Hung Nguyen, Chiok Yew Ho, Jie Tang, Ruiyin Li, Yide Yin, Han Wei Ang
, Frank Liauw, Eng Lieh Ouh, Lwin Khin Shar, David Lo:
Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses? CoRR abs/2507.21817 (2025)
[i2]Junkai Chen, Huihui Huang, Yunbo Lyu, Junwen An, Jieke Shi, Chengran Yang, Ting Zhang
, Haoye Tian, Yikun Li, Zhenhao Li, Xin Zhou, Xing Hu, David Lo:
SecureAgentBench: Benchmarking Secure Code Generation under Realistic Vulnerability Scenarios. CoRR abs/2509.22097 (2025)- 2024
[c5]Muwei Jian, Yukun Ling, Rui Wang, Yanjie Zhong, Huihui Huang, Xiaoguang Li:
RepViT Based Lightweight Architecture for Distracted Driving Detection. APSIPA 2024: 1-6
[c4]Ling Jiang
, Junwen An
, Huihui Huang
, Qiyi Tang
, Sen Nie
, Shi Wu
, Yuqun Zhang
:
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching. ICSE 2024: 224:1-224:13
[i1]Ling Jiang, Junwen An, Huihui Huang, Qiyi Tang, Sen Nie, Shi Wu, Yuqun Zhang:
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching. CoRR abs/2401.11161 (2024)- 2022
[j5]Sijia Huang, Site Luo
, Yang Yang, Ting Li, Yan Wu, Qiongfang Zeng, Huihui Huang:
Determination of Optical Rotation Based on Liquid Crystal Polymer Vortex Retarder and Digital Image Processing. IEEE Access 10: 8219-8226 (2022)
[j4]Xudong Li
, Jingyi Wang
, Haiyang Zhang
, Yongke Huang
, Huihui Huang
:
SwordNet: Chinese Character Font Style Recognition Network. IEEE Access 10: 8388-8398 (2022)- 2021
[j3]Huihui Huang
, Siqi Lu
, Zehui Wu, Qiang Wei:
An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture. EURASIP J. Wirel. Commun. Netw. 2021(1): 150 (2021)
[j2]Bin Yang
, Mo Huang, Yao Xie
, Changyuan Wang
, Yingjiao Rong, Huihui Huang, Tao Duan
:
Classification Method of Uniform Circular Array Radar Ground Clutter Data Based on Chaotic Genetic Algorithm. Sensors 21(13): 4596 (2021)
[j1]Haozhen Zhu
, Yao Xie
, Huihui Huang, Jing Chen, Yingjiao Rong, Changyuan Wang
:
DB-YOLO: A Duplicate Bilateral YOLO Network for Multi-Scale Ship Detection in SAR Images. Sensors 21(23): 8146 (2021)
2010 – 2019
- 2019
[c3]Jialin Wang, Yanchun Zhang, Qinying Ma, Huihui Huang, Xiaoyuan Hong:
Deep Learning for Single-Channel EEG Signals Sleep Stage Scoring Based on Frequency Domain Representation. HIS 2019: 121-133- 2013
[c2]Haitao Zhang, Liang Xu, Huihui Huang, Shasha Gao:
Mining spatial association rules from LBS anonymity dataset for improving utilization. Geoinformatics 2013: 1-6
2000 – 2009
- 2005
[c1]Huihui Huang, Wei Huang, Zhigang Liu, Weirong Chen, Qingquan Qian:
Content-based color image retrieval via lifting scheme. ISADS 2005: 378-383
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-04 23:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







