default search action
Gang Wang 0011
Person information
- affiliation: University of Illinois at Urbana-Champaign, IL, USA
- affiliation (former): Virginia Tech, Blacksburg, Department of Computer Science, VA, USA
- affiliation (former): University of California, Santa Barbara, CA, USA
Other persons with the same name
- Gang Wang — disambiguation page
- Gang Wang 0001 — Nankai University, College of Computer and Control Engineering, Tianjin, China
- Gang Wang 0002 — University of Massachusetts Dartmouth, Charlton College of Business, MA, USA (and 2 more)
- Gang Wang 0003 — Hefei University of Technology, School of Management, China
- Gang Wang 0004 — Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong
- Gang Wang 0005 — Xi'an Jiaotong University, Institute of Biomedical Engineering, School of Life Science and Technology, China
- Gang Wang 0006 — Hubei University of Technology, School of Science, Wuhan, China (and 1 more)
- Gang Wang 0007 — Ningbo University, Faculty of Electrical Engineering and Computer Science, China (and 1 more)
- Gang Wang 0008 — Shanghai University of Finance and Economics, School of Statistics and Management, China (and 1 more)
- Gang Wang 0009 — NEC Labs, Beijing, China
- Gang Wang 0010 — Microsoft Research Asia, Beijing, China
- Gang Wang 0012 — Alibaba AI Labs, Hangzhou, China (and 3 more)
- Gang Wang 0013 — Jilin University, Changchun, China
- Gang Wang 0014 — Beijing Institute of Technology, School of Automation, China (and 1 more)
- Gang Wang 0015 — Intuit Inc., Mountain View, CA, USA (and 1 more)
- Gang Wang 0016 — Beihang University, School of Electrical and Information Engineering, China
- Gang Wang 0017 — South China University of Technology, School of Electric Power, Guangzhou, China (and 1 more)
- Gang Wang 0018 — Wuhan University, School of Mathematics and Statistics, China
- Gang Wang 0019 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Gang Wang 0020 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Center for Robotics, Chengdu, China
- Gang Wang 0021 — Harbin Institute of Technology, Communication Research Center, China
- Gang Wang 0022 — National Joint Engineering Laboratory of Internet Applied Technology of Mines, Xuzhou, China (and 1 more)
- Gang Wang 0023 — Beihang University, School of Computer Science and Engineering, Beijing Key Laboratory of Digital Media, China
- Gang Wang 0024 — University of Nevada, Department of Electrical and Biomedical Engineering, Robotics and Biomimetics Laboratory, Reno, NV, USA (and 1 more)
- Gang Wang 0025 — Beijing University of Posts and Telecommunications, School of Automation, China (and 1 more)
- Gang Wang 0026 — Northeastern University, School of Information Science and Engineering, Shenyang, China
- Gang Wang 0027 — University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Gang Wang 0028 — National Digital Switching System Engineering and Technology Research Center of China, Zhengzhou, China
- Gang Wang 0029 — Ludong University, Yantai, China
- Gang Wang 0030 — Air Force Engineering University, Air Defense and Anti Missile Academy, Xi'an, China
- Gang Wang 0031 — Chinese Academy of Medical Sciences, Beijing, China (and 1 more)
- Gang Wang 0032 — University of Science and Technology of China, Hefei, China (and 2 more)
- Gang Wang 0033 — Emerson Automation Solutions, Round Rock, TX, USA (and 1 more)
- Gang Wang 0034 — Guizhou Institute of Technology, School of Mechanical Engineering, China
- Gang Wang 0035 — Nankai University, Chern Institute of Mathematics and LPMC, China
- Gang Wang 0036 — Qufu Normal University, School of Management Science, Rizhao, China
- Gang Wang 0037 — Marine Geological Resources Survey Center of Hebei Province, Qinhuangdao, China
- Gang Wang 0038 — National University of Defense Technology, College of Aerospace Science and Engineering, Changsha, China
- Gang Wang 0039 — Peking University Third Hospital, General Surgery Department, Beijing, China
- Gang Wang 0040 — Macau University of Science and Technology, Institute of Systems Engineering, Taipa, Macau
- Gang Wang 0041 — Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c92]Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang:
It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias. CHI 2024: 778:1-778:20 - [c91]Chenkai Wang, Zhuofan Jia, Hadjer Benkraouda, Cody Zevnik, Nicholas Heuermann, Roopa Foulger, Jonathan A. Handler, Gang Wang:
VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks. CHI 2024: 835:1-835:17 - [c90]Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing:
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation. ICML 2024 - [c89]Margie Ruffin, Haeseung Seo, Aiping Xiong, Gang Wang:
Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles on User Perception towards Disinformation. ICWSM 2024: 1328-1341 - [c88]Akul Goyal, Gang Wang, Adam Bates:
R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection. SP 2024: 3515-3532 - [c87]Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang:
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors. USENIX Security Symposium 2024 - [c86]Apurva Virkud, Muhammad Adil Inam, Andy Riddle, Jason Liu, Gang Wang, Adam Bates:
How does Endpoint Detection use the MITRE ATT&CK Framework? USENIX Security Symposium 2024 - [c85]Limin Yang, Zhi Chen, Chenkai Wang, Zhenning Zhang, Sushruth Booma, Phuong Cao, Constantin Adam, Alexander Withers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Gang Wang:
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center. USENIX Security Symposium 2024 - [c84]Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. WWW 2024: 1712-1723 - [i15]Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang:
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages. CoRR abs/2404.02832 (2024) - [i14]Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing:
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation. CoRR abs/2405.03064 (2024) - [i13]Akul Goyal, Jason Liu, Adam Bates, Gang Wang:
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs. CoRR abs/2408.13347 (2024) - 2023
- [j18]Margie Ruffin, Gang Wang, Kirill Levchenko:
Explaining Why Fake Photos are Fake: Does It Work? Proc. ACM Hum. Comput. Interact. 7(GROUP): 1-22 (2023) - [j17]Faysal Hossain Shezan, Minjun Long, David Hasani, Gang Wang, Yuan Tian:
SenRev: Measurement of Personal Information Disclosure in Online Health Communities. Proc. Priv. Enhancing Technol. 2023(3): 233-251 (2023) - [c83]Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, Yonghwi Kwon:
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation. ASPLOS (4) 2023: 169-188 - [c82]Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates:
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems. NDSS 2023 - [c81]Zhi Chen, Zhenning Zhang, Zeliang Kan, Limin Yang, Jacopo Cortellazzi, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors. SP (Workshops) 2023: 21-28 - [c80]Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. SP 2023: 719-736 - [c79]Jaron Mink, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang:
Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations. SP 2023: 2068-2085 - [c78]Yaman Yu, Saidivya Ashok, Smirity Kaushik, Yang Wang, Gang Wang:
Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments. SP 2023: 2885-2902 - [c77]Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David M. Liebovitz, Gang Wang, Carl A. Gunter:
How to Cover up Anomalous Accesses to Electronic Health Records. USENIX Security Symposium 2023: 229-246 - [c76]Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing:
AIRS: Explanation for Deep Reinforcement Learning based Security Applications. USENIX Security Symposium 2023: 7375-7392 - 2022
- [c75]Yong Liang, Zhun Zhao, Linlin Xiong, Gang Wang:
Research on Electromagnetic Spectrum Management and Control System of Launch Site Based on Big Data. ISCIT 2022: 117-121 - [c74]Sagar Samtani, Gang Wang, Ali Ahmadzadeh, Arridhana Ciptadi, Shanchieh Yang, Hsinchun Chen:
ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense. KDD 2022: 4900-4901 - [c73]Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang:
An In-depth Analysis of Duplicated Linux Kernel Bug Reports. NDSS 2022 - [c72]Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang:
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. USENIX Security Symposium 2022: 1669-1686 - [c71]Margie Ruffin, Israel Lopez-Toledo, Kirill Levchenko, Gang Wang:
Casing the Vault: Security Analysis of Vault Applications. WPES@CCS 2022: 175-180 - [c70]Chenkai Wang, Gang Wang:
Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol. WWW 2022: 681-689 - [c69]Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang:
Beyond Bot Detection: Combating Fraudulent Online Survey Takers✱. WWW 2022: 699-709 - [i12]Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang:
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers. CoRR abs/2202.05470 (2022) - 2021
- [j16]Natã M. Barbosa, Gang Wang, Blase Ur, Yang Wang:
Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3): 88:1-88:32 (2021) - [j15]Huandong Wang, Yong Li, Gang Wang, Depeng Jin:
Linking Multiple User Identities of Multiple Services from Massive Mobility Traces. ACM Trans. Intell. Syst. Technol. 12(4): 39:1-39:28 (2021) - [j14]Huandong Wang, Yong Li, Chen Gao, Gang Wang, Xiaoming Tao, Depeng Jin:
Anonymization and De-Anonymization of Mobility Trajectories: Dissecting the Gaps Between Theory and Practice. IEEE Trans. Mob. Comput. 20(3): 796-815 (2021) - [j13]Huan Yan, Haohao Fu, Yong Li, Tzu-Heng Lin, Gang Wang, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
On Migratory Behavior in Video Consumption. IEEE Trans. Netw. Serv. Manag. 18(2): 1775-1788 (2021) - [c68]Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes:
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. AsiaCCS 2021: 578-592 - [c67]Qingying Hao, Licheng Luo, Steve T. K. Jan, Gang Wang:
It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications. CCS 2021: 69-85 - [c66]Rishabh Chhabra, Paul Murley, Deepak Kumar, Michael D. Bailey, Gang Wang:
Measuring DNS-over-HTTPS performance around the world. Internet Measurement Conference 2021: 351-365 - [c65]Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh:
MLHat: Deployable Machine Learning for Security Defense. KDD 2021: 4161-4162 - [c64]Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G. Honavar, Gang Wang, Xinyu Xing:
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data. NDSS 2021 - [c63]Limin Yang, Arridhana Ciptadi, Ihar Laziuk, Ali Ahmadzadeh, Gang Wang:
BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. SP (Workshops) 2021: 78-84 - [c62]Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher W. Fletcher:
Double-Cross Attacks: Subverting Active Learning Systems. USENIX Security Symposium 2021: 1593-1610 - [c61]Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang:
CADE: Detecting and Explaining Concept Drift Samples for Security Applications. USENIX Security Symposium 2021: 2327-2344 - [c60]Hang Hu, Steve T. K. Jan, Yang Wang, Gang Wang:
Assessing Browser-level Defense against IDN-based Phishing. USENIX Security Symposium 2021: 3739-3756 - [c59]Shinan Liu, Xiang Cheng, Hanchao Yang, Yuanchao Shu, Xiaoran Weng, Ping Guo, Kexiong Curtis Zeng, Gang Wang, Yaling Yang:
Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset. USENIX Security Symposium 2021: 3935-3952 - 2020
- [j12]Faysal Hossain Shezan, Hang Hu, Gang Wang, Yuan Tian:
VerHealth: Vetting Medical Voice Applications through Policy Enforcement. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4): 153:1-153:21 (2020) - [c58]Shuofei Zhu, Ziyi Zhang, Limin Yang, Linhai Song, Gang Wang:
Benchmarking Label Dynamics of VirusTotal Engines. CCS 2020: 2081-2083 - [c57]Hang Hu, Limin Yang, Shihan Lin, Gang Wang:
A Case Study of the Security Vetting Process of Smart-home Assistant Applications. SP (Workshops) 2020: 76-81 - [c56]Steve T. K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang, Bimal Viswanath:
Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation. SP 2020: 1190-1206 - [c55]Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang:
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. USENIX Security Symposium 2020: 2361-2378 - [c54]Faysal Hossain Shezan, Hang Hu, Jiamin Wang, Gang Wang, Yuan Tian:
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems. WWW 2020: 1006-1017 - [i11]Hang Hu, Limin Yang, Shihan Lin, Gang Wang:
Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies. CoRR abs/2001.04520 (2020) - [i10]Sazzadur Rahaman, Gang Wang, Danfeng Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. CoRR abs/2002.02855 (2020)
2010 – 2019
- 2019
- [j11]Huandong Wang, Yong Li, Sihan Zeng, Gang Wang, Pengyu Zhang, Pan Hui, Depeng Jin:
Modeling Spatio-Temporal App Usage for a Large User Population. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(1): 27:1-27:23 (2019) - [c53]Steve T. K. Jan, Joseph Messou, Yen-Chen Lin, Jia-Bin Huang, Gang Wang:
Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks. AAAI 2019: 962-969 - [c52]Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang:
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites. AsiaCCS 2019: 181-192 - [c51]Sazzadur Rahaman, Gang Wang, Danfeng Daphne Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. CCS 2019: 481-498 - [c50]Shiliang Tang, Ziming Wu, Xinyi Zhang, Gang Wang, Xiaojuan Ma, Haitao Zheng, Ben Y. Zhao:
Towards Understanding the Adoption and Social Experience of Digital Wallet Systems. HICSS 2019: 1-10 - [c49]Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang:
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems. Internet Measurement Conference 2019: 230-244 - [c48]Peng Peng, Limin Yang, Linhai Song, Gang Wang:
Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines. Internet Measurement Conference 2019: 478-485 - [c47]Hang Hu, Peng Peng, Gang Wang:
Characterizing Pixel Tracking through the Lens of Disposable Email Services. IEEE Symposium on Security and Privacy 2019: 365-379 - [c46]Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang:
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. USENIX Security Symposium 2019: 869-885 - 2018
- [j10]Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, Depeng Jin:
Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 138:1-138:23 (2018) - [j9]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services. IEEE/ACM Trans. Netw. 26(3): 1123-1136 (2018) - [j8]Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang:
Analyzing Payment-Driven Targeted Q8A Systems. ACM Trans. Soc. Comput. 1(3): 12:1-12:21 (2018) - [c45]Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing:
LEMNA: Explaining Deep Learning based Security Applications. CCS 2018: 364-379 - [c44]Xiangwen Wang, Peng Peng, Chun Wang, Gang Wang:
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces. AsiaCCS 2018: 431-442 - [c43]Chun Wang, Steve T. K. Jan, Hang Hu, Douglas Bossart, Gang Wang:
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services. CODASPY 2018: 196-203 - [c42]Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang:
Pay-per-Question: Towards Targeted Q&A with Payments. GROUP 2018: 1-11 - [c41]Ke Tian, Steve T. K. Jan, Hang Hu, Danfeng Yao, Gang Wang:
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild. Internet Measurement Conference 2018: 429-442 - [c40]Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun:
De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice. NDSS 2018 - [c39]Huandong Wang, Yong Li, Gang Wang, Depeng Jin:
You Are How You Move: Linking Multiple User Identities From Massive Mobility Traces. SDM 2018: 189-197 - [c38]Hang Hu, Peng Peng, Gang Wang:
Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems. SecDev 2018: 94-101 - [c37]Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang:
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. USENIX Security Symposium 2018: 919-936 - [c36]Hang Hu, Gang Wang:
End-to-End Measurements of Email Spoofing Attacks. USENIX Security Symposium 2018: 1095-1112 - [c35]Kexiong Curtis Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang:
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems. USENIX Security Symposium 2018: 1527-1544 - [i9]Hang Hu, Gang Wang:
Revisiting Email Spoofing Attacks. CoRR abs/1801.00853 (2018) - 2017
- [j7]Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao:
Value and Misinformation in Collaborative Investing Platforms. ACM Trans. Web 11(2): 8:1-8:32 (2017) - [j6]Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, Ben Y. Zhao:
Clickstream User Behavior Models. ACM Trans. Web 11(4): 21:1-21:37 (2017) - [c34]Amiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, Gang Wang:
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. AsiaCCS 2017: 71-85 - [c33]Rupinder Paul Khandpur, Taoran Ji, Steve T. K. Jan, Gang Wang, Chang-Tien Lu, Naren Ramakrishnan:
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media. CIKM 2017: 1049-1057 - [c32]Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
On Migratory Behavior in Video Consumption. CIKM 2017: 1109-1118 - [c31]Fang Liu, Haipeng Cai, Gang Wang, Danfeng (Daphne) Yao, Karim O. Elish, Barbara G. Ryder:
Prioritized Analysis of Inter-App Communication Risks. CODASPY 2017: 159-161 - [c30]Qihang Gu, Dimitris Sacharidis, Michael Mathioudakis, Gang Wang:
Inferring Venue Visits from GPS Trajectories. SIGSPATIAL/GIS 2017: 81:1-81:4 - [c29]Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao:
Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System. ICWSM 2017: 387-396 - [c28]Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao:
A First Look at User Switching Behaviors Over Multiple Video Content Providers. ICWSM 2017: 700-703 - [c27]Alexander Kedrowitsch, Danfeng (Daphne) Yao, Gang Wang, Kirk W. Cameron:
A First Look: Using Linux Containers for Deceptive Honeypots. SafeConfig@CCS 2017: 15-22 - [c26]Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder:
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks. IEEE Symposium on Security and Privacy Workshops 2017: 189-198 - [c25]Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang:
Measuring the Insecurity of Mobile Deep Links of Android. USENIX Security Symposium 2017: 953-969 - [i8]Rupinder Paul Khandpur, Taoran Ji, Steve T. K. Jan, Gang Wang, Chang-Tien Lu, Naren Ramakrishnan:
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media. CoRR abs/1702.07745 (2017) - [i7]Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang:
Analyzing Payment Based Question and Answering Service. CoRR abs/1703.01333 (2017) - [i6]Chun Wang, Steve T. K. Jan, Hang Hu, Gang Wang:
Empirical Analysis of Password Reuse and Modification across Online Service. CoRR abs/1706.01939 (2017) - [i5]Hang Hu, Peng Peng, Gang Wang:
Towards the Adoption of Anti-spoofing Protocols for Email Systems. CoRR abs/1711.06654 (2017) - 2016
- [b1]Gang Wang:
Combating Attacks and Abuse in Large Online Communities. University of California, Santa Barbara, USA, 2016 - [j5]Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao:
The power of comments: fostering social interactions in microblog networks. Frontiers Comput. Sci. 10(5): 889-907 (2016) - [c24]Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao:
Unsupervised Clickstream Clustering for User Behavior Analysis. CHI 2016: 225-236 - [c23]Gang Wang, Sarita Yardi Schoenebeck, Haitao Zheng, Ben Y. Zhao:
"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks. ICWSM 2016: 417-426 - [c22]Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao:
Anatomy of a Personalized Livestreaming System. Internet Measurement Conference 2016: 485-498 - [c21]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Poster: Defending against Sybil Devices in Crowdsourced Mapping Services. MobiSys (Companion Volume) 2016: 146 - [c20]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Defending against Sybil Devices in Crowdsourced Mapping Services. MobiSys 2016: 179-191 - 2015
- [j4]Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:
Practical Conflict Graphs in the Wild. IEEE/ACM Trans. Netw. 23(3): 824-835 (2015) - [c19]Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao:
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms. CSCW 2015: 17-30 - [i4]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Bingzhe Liu, Haitao Zheng, Ben Y. Zhao:
Attacks and Defenses in Crowdsourced Mapping Services. CoRR abs/1508.00837 (2015) - 2014
- [c18]Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Whispers in the dark: analysis of an anonymous social network. Internet Measurement Conference 2014: 137-150 - [c17]Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao:
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. USENIX Security Symposium 2014: 239-254 - [i3]Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao:
Crowds on Wall Street: Extracting Value from Social Investing Platforms. CoRR abs/1406.1137 (2014) - 2013
- [c16]Gang Wang, Jack W. Stokes, Cormac Herley, David Felstead:
Detecting malicious landing pages in Malware Distribution Networks. DSN 2013: 1-11 - [c15]Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
On the validity of geosocial mobility traces. HotNets 2013: 11:1-11:7 - [c14]Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao:
Follow the green: growth and dynamics in twitter follower markets. Internet Measurement Conference 2013: 163-176 - [c13]Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Social Turing Tests: Crowdsourcing Sybil Detection. NDSS 2013 - [c12]Tianyi Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao:
Characterizing and detecting malicious crowdsourcing. SIGCOMM 2013: 537-538 - [c11]Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:
Practical conflict graphs for dynamic spectrum distribution. SIGMETRICS 2013: 5-16 - [c10]Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao:
You Are How You Click: Clickstream Analysis for Sybil Detection. USENIX Security Symposium 2013: 241-256 - [c9]Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao:
Wisdom in the social crowd: an analysis of quora. WWW 2013: 1341-1352 - 2012
- [c8]Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:
Measurement-calibrated conflict graphs for dynamic spectrum distribution. DySPAN 2012: 287 - [c7]Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao:
Serf and turf: crowdturfing for fun and profit. WWW 2012: 679-688 - [i2]Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Social Turing Tests: Crowdsourcing Sybil Detection. CoRR abs/1205.3856 (2012) - 2011
- [c6]Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng:
I am the antenna: accurate outdoor AP location using smartphones. MobiCom 2011: 109-120 - [c5]Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng, Ben Y. Zhao:
Privacy, availability and economics in the Polaris mobile social network. HotMobile 2011: 42-47 - [i1]Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao:
Serf and Turf: Crowdturfing for Fun and Profit. CoRR abs/1111.5654 (2011)
2000 – 2009
- 2009
- [c4]Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li:
Experimental study on neighbor selection policy for Phoenix Network Coordinate system. ICUMT 2009: 1-5 - 2006
- [c3]Jiexun Li, Gang Wang, Hsinchun Chen:
Identity Matching Based on Probabilistic Relational Models. AMCIS 2006: 189 - 2004
- [j3]Gang Wang, Hsinchun Chen, Homa Atabakhsh:
Automatically detecting deceptive criminal identities. Commun. ACM 47(3): 70-76 (2004) - [j2]Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, Michael Chau:
Crime Data Mining: A General Framework and Some Examples. Computer 37(4): 50-56 (2004) - [j1]Wingyan Chung, Yiwen Zhang, Zan Huang, Gang Wang, Thian-Huat Ong, Hsinchun Chen:
Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort). J. Assoc. Inf. Sci. Technol. 55(9): 818-831 (2004) - 2003
- [c2]Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh:
Crime Data Mining: An Overview and Case Studies. DG.O 2003 - [c1]Yilu Zhou, Jialun Qin, Hsinchun Chen, Zan Huang, Yiwen Zhang, Wingyan Chung, Gang Wang:
CMedPort: A Cross-Regional Chinese Medical Portal. JCDL 2003: 379
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-15 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint