Gang Wang

20092019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 24 Similar Profiles
Application programs Engineering & Materials Science
Electronic mail Engineering & Materials Science
Websites Engineering & Materials Science
Internet Engineering & Materials Science
Communication Engineering & Materials Science
Global positioning system Engineering & Materials Science
Servers Engineering & Materials Science
Smartphones Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2009 2019

Characterizing pixel tracking through the lens of disposable email services

Hu, H., Peng, P. & Wang, G., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 365-379 15 p. 8835374. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Lenses
Pixels
Ecosystems

Opening the blackbox of virustotal: Analyzing online phishing scan engines

Peng, P., Yang, L., Song, L. & Wang, G., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 478-485 8 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Labels
Websites
Engines
Scanning
Labeling

Security certification in payment card industry: Testbeds, measurements, and recommendations

Rahaman, S., Wang, G. & Yao, D., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 481-498 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Testbeds
Security of data
Industry
Websites
Scanning

Towards the detection of inconsistencies in public security vulnerability reports

Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y. & Wang, G., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 869-885 17 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Deep learning

What happens after you leak your password: Understanding credential sharing on phishing sites

Peng, P., Xu, C., Quinn, L., Hu, H., Viswanath, B. & Wang, G., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 181-192 12 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Websites
Servers