Gang Wang

If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 30 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Automatic IoT Device Classification using Traffic Behavioral Characteristics

Hsu, A., Tront, J., Raymond, D., Wang, G. & Butt, A., Apr 2019, 2019 IEEE SoutheastCon, SoutheastCon 2019. Institute of Electrical and Electronics Engineers Inc., 9020640. (Conference Proceedings - IEEE SOUTHEASTCON; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Characterizing pixel tracking through the lens of disposable email services

    Hu, H., Peng, P. & Wang, G., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 365-379 15 p. 8835374. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Opening the blackbox of virustotal: Analyzing online phishing scan engines

    Peng, P., Yang, L., Song, L. & Wang, G., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 478-485 8 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security certification in payment card industry: Testbeds, measurements, and recommendations

    Rahaman, S., Wang, G. & Yao, D., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 481-498 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Towards the detection of inconsistencies in public security vulnerability reports

    Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y. & Wang, G., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 869-885 17 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution