


default search action
Wenbin Huang 0003
Person information
- affiliation: Hunan University, College of Computer Science and Electronics Engineering, Changsha, China
Other persons with the same name
- Wenbin Huang — disambiguation page
- Wenbin Huang 0001 — Xidian University, School of Microelectronics, Shaanxi Key Lab of Integrated Circuits and Systems, Xi'an, China
- Wenbin Huang 0002
— Chongqing University, State Key Laboratory of Mechanical Transmission, China (and 1 more) - Wenbin Huang 0004
— China University of Geosciences, Department of Computer Science, Wuhan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j7]Chun Wang
, Juan Luo
, Luxiu Yin
, Chuang Li, Wenbin Huang
, Wei Liang
, Kuan-Ching Li
:
Semi-Supervised Multi-Task Deep Learning for WiFi Fingerprint Database Construction in Building-Scale Localization. IEEE Trans. Consumer Electron. 71(1): 488-500 (2025)
[j6]Wenbin Huang
, Ju Ren
, Hangcheng Cao
, Hanyuan Chen, Hongbo Jiang
, Zhangjie Fu
:
Mitigating Voice Assistant Eavesdropping via Event Source Review on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 20: 9164-9179 (2025)
[c3]Hangcheng Cao
, Guowen Xu
, Wenbin Huang
, Hongwei Li
:
Can Small-scale Evaluation Reflect Real Ability? A Performance Study of Emerging Biometric Authentication. AsiaCCS 2025: 1535-1549- 2024
[j5]Wenbin Huang
, Wenjuan Tang
, Hanyuan Chen, Hongbo Jiang
, Yaoxue Zhang:
Unauthorized Microphone Access Restraint Based on User Behavior Perception in Mobile Devices. IEEE Trans. Mob. Comput. 23(1): 955-970 (2024)
[j4]Wenbin Huang
, Hanyuan Chen, Hangcheng Cao
, Ju Ren
, Hongbo Jiang
, Zhangjie Fu
, Yaoxue Zhang
:
Manipulating Voice Assistants Eavesdropping via Inherent Vulnerability Unveiling in Mobile Systems. IEEE Trans. Mob. Comput. 23(12): 11549-11563 (2024)
[j3]Wenbin Huang
, Wenjuan Tang
, Hongbo Jiang
, Yaoxue Zhang
:
Recognizing Voice Spoofing Attacks via Acoustic Nonlinearity Dissection for Mobile Devices. IEEE Trans. Mob. Comput. 23(12): 12080-12096 (2024)
[c2]Mengyuan Wang, Hongbo Jiang, Peng Peng, Youhuan Li, Wenbin Huang:
Toward Accurate Butterfly Counting with Edge Privacy Preserving in Bipartite Networks. INFOCOM 2024: 2289-2298
[i1]Hangcheng Cao, Wenbin Huang, Guowen Xu, Xianhao Chen, Ziyang He, Jingyang Hu, Hongbo Jiang, Yuguang Fang
:
Security Analysis of WiFi-based Sensing Systems: Threats from Perturbation Attacks. CoRR abs/2404.15587 (2024)- 2022
[j2]Wenbin Huang
, Wenjuan Tang
, Hongbo Jiang
, Jun Luo
, Yaoxue Zhang
:
Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices. IEEE Internet Things J. 9(7): 5304-5314 (2022)
[j1]Wenbin Huang
, Kun Xie
, Jie Li
:
A Novel Sequence Tensor Recovery Algorithm for Quick and Accurate Anomaly Detection. IEEE Trans. Netw. Sci. Eng. 9(5): 3531-3545 (2022)
[c1]Wenbin Huang, Wenjuan Tang, Kuan Zhang, Haojin Zhu, Yaoxue Zhang:
Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems. INFOCOM 2022: 31-40
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-28 23:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







