HENG
profile photo

Heng Li

I received my Ph.D. degree from Huazhong University of Science and Technology (HUST) in Dec. 2023, advised by Prof. Wei Yuan. Currently, I am a postdoctoral researcher jointly supervised by Prof. Xinge You at HUST and Prof. Xiapu Luo at The Hong Kong Polytechnic University. My research interests lie at the intersection of software security and machine learning, with a focus on topics such as Adversarial Example and Android Malware Detection.

Email  /  Google Scholar

News

  • 1/2026, 1 paper has been accepted by WWW 2026.
  • 12/2025, 1 paper has been accepted by IEEE TDSC.
  • 10/2025, 1 paper has been accepted by Computers & Security.
  • 9/2025, 1 paper has been accepted by IEEE TIFS.
  • 12/2024, 1 paper has been accepted by NDSS 2025.
  • 12/2024, 1 paper has been accepted by JOS.
  • 07/2024, 1 paper has been accepted by ISSTA 2024.
  • 01/2024, 1 paper has been accepted by ICLR 2024.
  • 12/2023, 1 paper has been accepted by INFOCOM 2024.
  • 12/2023, 1 paper has been accepted by ICSE 2024.
  • Talks

  • 2025.12.30, Frontiers in Robotics and AI at National Postdoctoral Academic Forum. Thanks Wenbin He for the invitation.
  • 6/2023, Opening Ceremony Speech at School of Electronic Information and Communications, Huazhong University of Science and Technology.
  • 6/2022, Adversarial example attack in Android at VALSE 2022, TianJing, China.
  • 04/2022, AI + Security at CCF YOCSEF. Thanks Ziqi Zhu for the invitation.
  • Research

    I'm interested in software security and machine learning with a series of topics (e.g. Adversarail attack/defense).

    Conference Papers:

    1. Do You Really Know What I Am Doing? Backdoor Attacks on Provenanc-Based Intrusion Detection Systems
      Shaodi Xie, Wei Yuan, Haoyu Jiang, Zhu Gong, Haoran Wang, Heng Li#, Tiejun Wu
      WWW 2026 (# corresponding author)| paper

    2. Automated Malware Assembly Line: Uniting Piggybacking and Adversarial Example in Android Malware Generation
      Heng Li, Zhiyuan Yao, Bang Wu, Cuiying Gao, Teng Xu, Wei Yuan, Xiapu Luo
      NDSS 2025 | paper

    3. Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines
      Gao Cuiying, Yueming Wu, Heng Li, Wei Yuan, Haoyu Jiang, Yang Liu,
      ISSTA 2024 | paper

    4. Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information
      Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo
      USENIX SECURITY 2023 | paper

    5. Robust Android Malware Detection Against Adversarial Example Attacks
      Heng Li, Shiyao Zhou, Wei Yuan, Xiapu Luo, Cuiying Gao, Shuiyan Chen
      WWW 2021 | paper

    6. HARP: Let Object Detector Undergo Hyperplasia to Counter Adversarial Patches
      Junzhe Cai, Shuiyan Chen, Heng Li#, Beihao Xia, Zimin Mao, Wei Yuan
      ACM MM 2023 (# corresponding author) | paper

    7. Trace-agnostic and Adversarial Training-resilient Website Fingerprinting Defense
      Litao Qiao, Bang Wu, Heng Li, Cuiying Gao, Wei Yuan
      INFOCOM 2024 | paper

    8. A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments
      Cuiying Gao, Gaozhun Huang, Heng Li, Bang Wu, Yueming Wu, Wei Yuan
      ICSE 2024 | paper

    9. Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios
      Ziqiang Li, Hong Sun, Pengfei Xia, Heng Li, Beihao Xia, Yi Wu, Bin Li
      ICLR 2024 | paper

    10. Recent Advances in Concept Drift Adaptation Methods for Deep Learning
      Liheng Yuan, Heng Li, Beihao Xia, Cuiying Gao, Mingyue Liu, Wei Yuan, Xinge You
      IJCAI 2022 | paper

    Journal Papers:

    1. Why not Diversify Triggers? APK-Specific Backdoor Attack Against Android Malware Detection
      Heng Li, Bang Wu, Zhiyuan Yao, Cuiying Gao, Wei Yuan, Beihao Xia, Xiapu Luo
      IEEE TDSC 2025 | paper

    2. An Efficient Adversarial Attack on FCG-Based Android Malware Detection Systems
      Heng Li, Bang Wu, Wei Zhou, Wei Yuan, Cuiying Gao, Xinge You, Xiapu Luo
      IEEE TIFS 2025 | paper

    3. Improving the Transferability of Targeted Adversarial Examples by Style-Agnostic Attack
      Wei Zhou, Zimin Mao, Shuijun Yin, Hanwen Zhang, Zhicheng Huang, Heng Li#, Tiejun Wu, Wei Yuan
      Computers & Security 2025 (# corresponding author) | paper

    4. Android SDK安全性研究综述
      许腾, 刘路遥, 姜灏宇, 罗畅, 李珩#, 袁巍
      计算机科学 2025 (# corresponding author) | paper

    5. 安卓恶意软件对抗样本攻击技术综述
      李珩, 吴棒, 龚柱, 高翠莹, 袁巍, 罗夏朴
      软件学报 2024 | paper

    6. Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks
      Zimin Mao, Shuiyan Chen, Zhuang Miao, Heng Li#, Beihao Xia, Junzhe Cai, Wei Yuan, Xinge You
      Computers & Security 2024 (# corresponding author) | paper

    7. Semi-supervised Anomaly Detection with Contamination-resilience and Incremental Training
      Liheng Yuan, Fanghua Ye, Heng Li, Chenhao Zhang, Cuiying Gao, Chengqing Yu, Wei Yuan, Xinge You
      Engineering Applications of Artificial Intelligence 2024 | paper

    8. Adversarial-Example Attacks toward Android Malware Detection System
      Heng Li, Shiyao Zhou, Wei Yuan, Henry Leung
      IEEE Systems Journal 2019 | paper

    9. Obfuscation-resilient Android Malware Analysis Based on Complementary Features
      Cuiying Gao, Minghui Cai, Shuijun Yin, Gaozhun Huang, Heng Li#, Wei Yuan
      IEEE TIFS 2023 (# corresponding author) | paper

    10. A Lightweight On-device Detection Method for Android Malware
      Wei Yuan, Yuan Jiang, Heng Li#, Minghui Cai
      IEEE TSMC 2021 (# corresponding author) | paper

    11. Model Scheduling and Sample Selection for Ensemble Adversarial Example Attacks
      Zichao Hu*, Heng Li*, Liheng Yuan, Zhang Cheng, Wei Yuan, Ming Zhu
      Pattern Recognition 2022 (* equal contribution) | paper

    12. Black-box attack against handwritten signature verification with region-restricted adversarial perturbations
      Haoyang Li*, Heng Li*, Hansong Zhang, Wei Yuan
      Pattern Recognition 2021 (* equal contribution) | paper

    13. Detecting Android Malware With Pre-Existing Image Classification Neural Networks
      Chenhao Zhang, Shuijun Yin, Heng Li, Minghui Cai, Wei Yuan
      IEEE Signal Processing Letters 2023 | paper

    14. Resisting DNN-based Website Fingerprinting Attacks Enhanced by Adversarial Training
      Litao Qiao, Bang Wu, Shuijun Yin, Heng Li, Wei Yuan, Xiapu Luo
      IEEE TIFS 2023 | paper

    15. Learning features from enhanced function call graphs for Android malware detection
      Minghui Cai, Yuan Jiang, Cuiying Gao, Heng Li, Wei Yuan
      Neurocomputing 2020 | paper

    Industrial Experience

  • Alibaba DAMO Academy, Intelligent Computing Lab. Hosted by Hongxia Yang. Jun. 2022 – Sep. 2022.

  • Awards

  • 2025, Third prize in National Postdoctoral Innovation and Entrepreneurship Competition

  • 2023, Third prize in China Mobile Wutong Cup Big Data Innovation Competition

  • 2023, First prize in China Postgraduate Robot Innovation and Design Competition

  • 2022, Third prize in China Graduate AI Innovation Competition

  • Project

  • National Natural Science Foundation for Young Scientists of China. Jun. 2026 – Dec. 2028.

  • Postdoctoral Fellowship Program of CPSF. Jun. 2024 – Jun. 2026.

  • China Postdoctoral Science Foundation. Jun. 2024 – Jun. 2026.