Gang Wang

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Read between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems

Shezan, F. H., Hu, H., Wang, J., Wang, G. & Tian, Y., Apr 20 2020, The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020. Association for Computing Machinery, Inc, p. 1006-1017 12 p. (The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2019

Automatic IoT Device Classification using Traffic Behavioral Characteristics

Hsu, A., Tront, J., Raymond, D., Wang, G. & Butt, A., Apr 2019, 2019 IEEE SoutheastCon, SoutheastCon 2019. Institute of Electrical and Electronics Engineers Inc., 9020640. (Conference Proceedings - IEEE SOUTHEASTCON; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Characterizing pixel tracking through the lens of disposable email services

Hu, H., Peng, P. & Wang, G., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 365-379 15 p. 8835374. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Opening the blackbox of virustotal: Analyzing online phishing scan engines

Peng, P., Yang, L., Song, L. & Wang, G., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 478-485 8 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security certification in payment card industry: Testbeds, measurements, and recommendations

Rahaman, S., Wang, G. & Yao, D., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 481-498 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Towards the detection of inconsistencies in public security vulnerability reports

Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y. & Wang, G., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 869-885 17 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

What happens after you leak your password: Understanding credential sharing on phishing sites

Peng, P., Xu, C., Quinn, L., Hu, H., Viswanath, B. & Wang, G., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 181-192 12 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2018

All your GPS are belong to us: Towards stealthy manipulation of road navigation systems

Zeng, K., Liu, S., Shu, Y., Wang, D., Li, H., Dou, Y., Wang, G. & Yang, Y., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1527-1544 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

End-to-end measurements of email spoofing attacks

Hu, H. & Wang, G., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1095-1112 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services

Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H. & Zhao, B. Y., Jun 2018, In : IEEE/ACM Transactions on Networking. 26, 3, p. 1123-1136 14 p.

Research output: Contribution to journalArticle

LEMNA: Explaining deep learning based security applications

Guo, W., Mu, D., Xu, J., Su, P., Wang, G. & Xing, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-379 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Needle in a haystack: Tracking down elite phishing domains in the wild

Tian, K., Jan, S. T. K., Hu, H., Yao, D. & Wang, G., Oct 31 2018, IMC 2018 - Proceedings of the Internet Measurement Conference. Association for Computing Machinery, p. 429-442 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pay-per-question: Towards targeted Q&A with payments

Jan, S. T. K., Wang, C., Zhang, Q. & Wang, G., Jan 7 2018, GROUP 2018 - Proceedings of the 2018 ACM Conference on Supporting Groupwork. Association for Computing Machinery, p. 1-11 11 p. (Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The next domino to fall: Empirical analysis of user passwords across online services

Wang, C., Jan, S. T. K., Hu, H., Bossart, D. & Wang, G., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 196-203 8 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards understanding the adoption of anti-spoofing protocols in email systems

Hu, H., Peng, P. & Wang, G., Nov 21 2018, Proceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018. Institute of Electrical and Electronics Engineers Inc., p. 94-101 8 p. 8543392. (Proceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Understanding the reproducibility of crowd-reported security vulnerabilities

Mu, D., Cuevas, A., Yang, L., Hu, H., Xing, X., Mao, B. & Wang, G., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 919-936 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

You are how you move: Linking multiple user identities from massive mobility traces

Wang, H., Li, Y., Wang, G. & Jin, D., Jan 1 2018, p. 189-197. 9 p.

Research output: Contribution to conferencePaper

Open Access

You are your photographs: Detecting multiple identities of vendors in the darknet marketplaces

Wang, X., Peng, P., Wang, C. & Wang, G., May 29 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 431-442 12 p. (ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

A first look: Using linux containers for deceptive honeypots

Kedrowitsch, A., Yao, D., Wang, G. & Cameron, K., Nov 3 2017, SafeConfig 2017 - Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 15-22 8 p. (SafeConfig 2017 - Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A first look at user switching behaviors over multiple video content providers

Yan, H., Lin, T. H., Wang, G., Li, Y., Zheng, H., Jin, D. & Zhao, B. Y., Jan 1 2017, Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017. AAAI Press, p. 700-703 4 p. (Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clickstream user behavior models

Wang, G., Zhang, X., Tang, S., Wilson, C., Zheng, H. & Zhao, B. Y., Jul 2017, In : ACM Transactions on the Web. 11, 4, 21.

Research output: Contribution to journalArticle

Cold hard E-cash: Friends and vendors in the venmo digital payments system

Zhang, X., Tang, S., Zhao, Y., Wang, G., Zheng, H. & Zhao, B. Y., Jan 1 2017, Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017. AAAI Press, p. 387-396 10 p. (Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collusive data leak and more: Large-scale threat analysis of inter-app communications

Bosu, A., Liu, F., Yao, D. D. & Wang, G., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 71-85 15 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Crowdsourcing cybersecurity: Cyber attack detection using social media

Khandpur, R. P., Ji, T., Jan, S., Wang, G., Lu, C. T. & Ramakrishnan, N., Nov 6 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1049-1057 9 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Inferring Venue Visits from GPS Trajectories

Gu, Q., Mathioudakis, M., Sacharidis, D. & Wang, G., Nov 7 2017, GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems. Ravada, S., Hoel, E., Tamassia, R., Newsam, S., Trajcevski, G. & Trajcevski, G. (eds.). Association for Computing Machinery, 81. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems; vol. 2017-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Measuring the insecurity of mobile deep links of Android

Liu, F., Wang, C., Pico, A., Yao, D. & Wang, G., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 953-969 17 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MR-Droid: A scalable and prioritized analysis of inter-app communication risks

Liu, F., Cai, H., Wang, G., Yao, D., Elish, K. O. & Ryder, B. G., Dec 19 2017, Proceedings - 2017 IEEE Symposium on Security and Privacy Workshops, SPW 2017. Institute of Electrical and Electronics Engineers Inc., p. 189-198 10 p. (Proceedings - 2017 IEEE Symposium on Security and Privacy Workshops, SPW 2017; vol. 2017-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On migratory behavior in video consumption

Yan, H., Lin, T. H., Wang, G., Li, Y., Zheng, H., Jin, D. & Zhao, B. Y., Nov 6 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1109-1118 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Prioritized analysis of inter-App communication risks

Liu, F., Cai, H., Wang, G., Yao, D., Elish, K. O. & Ryder, B. G., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 159-161 3 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Value and misinformation in collaborative investing platforms

Wang, T., Wang, G., Wang, B., Sambasivan, D., Zhang, Z., Li, X., Zheng, H. & Zhao, B. Y., May 2017, In : ACM Transactions on the Web. 11, 2, 8.

Research output: Contribution to journalArticle

Open Access
2016

Anatomy of a personalized livestreaming system

Wang, B., Zhang, X., Wang, G., Zheng, H. & Zhao, B. Y., Nov 14 2016, IMC 2016 - Proceedings of the 2016 ACM Internet Measurement Conference. Association for Computing Machinery, p. 485-498 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC; vol. 14-16-November-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Defending against sybil devices in crowdsourced mapping services

Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H. & Zhao, B. Y., Jun 20 2016, MobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 179-191 13 p. (MobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Poster: Defending against sybil devices in crowdsourced mapping services

Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H. & Zhao, B. Y., Jun 25 2016, MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, 1 p. (MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The power of comments: fostering social interactions in microblog networks

Wang, T., Chen, Y., Wang, Y., Wang, B., Wang, G., Li, X., Zheng, H. & Zhao, B. Y., Oct 1 2016, In : Frontiers of Computer Science. 10, 5, p. 889-907 19 p.

Research output: Contribution to journalArticle

Unsupervised clickstream clustering for user behavior analysis

Wang, G., Zhang, X., Tang, S., Zheng, H. & Zhao, B. Y., May 7 2016, CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, p. 225-236 12 p. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

"Will check-in for badges": Understanding bias and misbehavior on location-based social networks

Wang, G., Schoenebeck, S. Y., Zheng, H. & Zhao, B. Y., Jan 1 2016, Proceedings of the 10th International Conference on Web and Social Media, ICWSM 2016. AAAI Press, p. 417-426 10 p. (Proceedings of the 10th International Conference on Web and Social Media, ICWSM 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Crowds on wall street: Extracting value from collaborative investing platforms

Wang, G., Wang, T., Wang, B., Sambasivan, D., Zhang, Z., Zheng, H. & Zhao, B. Y., Feb 28 2015, CSCW 2015 - Proceedings of the 2015 ACM International Conference on Computer-Supported Cooperative Work and Social Computing. Association for Computing Machinery, Inc, p. 17-30 14 p. (CSCW 2015 - Proceedings of the 2015 ACM International Conference on Computer-Supported Cooperative Work and Social Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Practical conflict graphs in the wild

Zhou, X., Zhang, Z., Wang, G., Yu, X., Zhao, B. Y. & Zheng, H., Jun 1 2015, In : IEEE/ACM Transactions on Networking. 23, 3, p. 824-835 12 p., 6757020.

Research output: Contribution to journalArticle

2014

Man vs. Machine: Practical adversarial detection of malicious crowdsourcing workers

Wang, G., Wang, T., Zheng, H. & Zhao, B. Y., Jan 1 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 239-254 16 p. (Proceedings of the 23rd USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Whispers in the dark: Analysis of an anonymous social network

Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H. & Zhao, B. Y., Nov 5 2014, IMC 2014 - Proceedings of the 2014 ACM. Association for Computing Machinery, p. 137-149 13 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Characterizing and detecting malicious crowdsourcing

Wang, T., Wang, G., Li, X., Zheng, H. & Zhao, B. Y., Dec 1 2013, Proceedings of the SIGCOMM 2013 and Best Papers of the Co-Located Workshops. 4 ed. p. 537-538 2 p. (Computer Communication Review; vol. 43, no. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting malicious landing pages in malware distribution networks

Wang, G., Stokes, J. W., Herley, C. & Felstead, D., Sep 9 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2013. 6575316. (Proceedings of the International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Follow the green: Growth and dynamics in Twitter follower markets

Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H. & Zhao, B. Y., Dec 16 2013, IMC 2013 - Proceedings of the 13th ACM Internet Measurement Conference. p. 163-176 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On the validity of geosocial mobility traces

Zhang, Z., Zhou, L., Zhao, X., Wang, G., Su, Y., Metzger, M., Zheng, H. & Zhao, B. Y., Dec 1 2013, Proceedings of the 12th ACM Workshop on Hot Topics in Networks, HotNets 2013. 11. (Proceedings of the 12th ACM Workshop on Hot Topics in Networks, HotNets 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Practical conflict graphs for dynamic spectrum distribution

Zhou, X., Zhang, Z., Wang, G., Yu, X., Zhao, B. Y. & Zheng, H., Jul 22 2013, SIGMETRICS 2013 - Proceedings of the 2013 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPEC. ISS. ed. p. 5-16 12 p. (Performance Evaluation Review; vol. 41, no. 1 SPEC. ISS.).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wisdom in the social crowd: An analysis of Quora

Wang, G., Gill, K., Mohanlal, M., Zheng, H. & Zhao, B. Y., Dec 1 2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. p. 1341-1351 11 p. (WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

You are how you click: Clickstream analysis for sybil detection

Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H. & Zhao, B. Y., Jan 1 2013, Proceedings of the 22nd USENIX Security Symposium. USENIX Association, p. 241-255 15 p. (Proceedings of the 22nd USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Measurement-calibrated conflict graphs for dynamic spectrum distribution

Zhou, X., Zhang, Z., Wang, G., Yu, X., Zhao, B. Y. & Zheng, H., Dec 1 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks, DYSPAN 2012. 1 p. 6478150. (2012 IEEE International Symposium on Dynamic Spectrum Access Networks, DYSPAN 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Serf and turf: crowdturfing for fun and profit

Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H. & Zhao, B. Y., 2012, p. 679.

Research output: Contribution to conferencePaper

2011

I am the antenna: accurate outdoor AP location using smartphones

Zhang, Z., Zhou, X., Zhang, W., Zhang, Y., Wang, G., Zhao, B. Y. & Zheng, H., 2011, p. 109.

Research output: Contribution to conferencePaper