Gang Wang

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

Read between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems

Shezan, F. H., Hu, H., Wang, J., Wang, G. & Tian, Y., Apr 20 2020, The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020. Association for Computing Machinery, Inc, p. 1006-1017 12 p. (The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2019

Automatic IoT Device Classification using Traffic Behavioral Characteristics

Hsu, A., Tront, J., Raymond, D., Wang, G. & Butt, A., Apr 2019, 2019 IEEE SoutheastCon, SoutheastCon 2019. Institute of Electrical and Electronics Engineers Inc., 9020640. (Conference Proceedings - IEEE SOUTHEASTCON; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Characterizing pixel tracking through the lens of disposable email services

Hu, H., Peng, P. & Wang, G., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 365-379 15 p. 8835374. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Opening the blackbox of virustotal: Analyzing online phishing scan engines

Peng, P., Yang, L., Song, L. & Wang, G., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 478-485 8 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security certification in payment card industry: Testbeds, measurements, and recommendations

Rahaman, S., Wang, G. & Yao, D., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 481-498 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Towards the detection of inconsistencies in public security vulnerability reports

Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y. & Wang, G., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 869-885 17 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

What happens after you leak your password: Understanding credential sharing on phishing sites

Peng, P., Xu, C., Quinn, L., Hu, H., Viswanath, B. & Wang, G., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 181-192 12 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2018

All your GPS are belong to us: Towards stealthy manipulation of road navigation systems

Zeng, K., Liu, S., Shu, Y., Wang, D., Li, H., Dou, Y., Wang, G. & Yang, Y., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1527-1544 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

End-to-end measurements of email spoofing attacks

Hu, H. & Wang, G., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1095-1112 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

LEMNA: Explaining deep learning based security applications

Guo, W., Mu, D., Xu, J., Su, P., Wang, G. & Xing, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-379 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Needle in a haystack: Tracking down elite phishing domains in the wild

Tian, K., Jan, S. T. K., Hu, H., Yao, D. & Wang, G., Oct 31 2018, IMC 2018 - Proceedings of the Internet Measurement Conference. Association for Computing Machinery, p. 429-442 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pay-per-question: Towards targeted Q&A with payments

Jan, S. T. K., Wang, C., Zhang, Q. & Wang, G., Jan 7 2018, GROUP 2018 - Proceedings of the 2018 ACM Conference on Supporting Groupwork. Association for Computing Machinery, p. 1-11 11 p. (Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The next domino to fall: Empirical analysis of user passwords across online services

Wang, C., Jan, S. T. K., Hu, H., Bossart, D. & Wang, G., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 196-203 8 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Towards understanding the adoption of anti-spoofing protocols in email systems

Hu, H., Peng, P. & Wang, G., Nov 21 2018, Proceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018. Institute of Electrical and Electronics Engineers Inc., p. 94-101 8 p. 8543392. (Proceedings - 2018 IEEE Cybersecurity Development Conference, SecDev 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Understanding the reproducibility of crowd-reported security vulnerabilities

Mu, D., Cuevas, A., Yang, L., Hu, H., Xing, X., Mao, B. & Wang, G., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 919-936 18 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

You are your photographs: Detecting multiple identities of vendors in the darknet marketplaces

Wang, X., Peng, P., Wang, C. & Wang, G., May 29 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 431-442 12 p. (ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

A first look: Using linux containers for deceptive honeypots

Kedrowitsch, A., Yao, D., Wang, G. & Cameron, K., Nov 3 2017, SafeConfig 2017 - Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 15-22 8 p. (SafeConfig 2017 - Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A first look at user switching behaviors over multiple video content providers

Yan, H., Lin, T. H., Wang, G., Li, Y., Zheng, H., Jin, D. & Zhao, B. Y., Jan 1 2017, Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017. AAAI Press, p. 700-703 4 p. (Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cold hard E-cash: Friends and vendors in the venmo digital payments system

Zhang, X., Tang, S., Zhao, Y., Wang, G., Zheng, H. & Zhao, B. Y., Jan 1 2017, Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017. AAAI Press, p. 387-396 10 p. (Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collusive data leak and more: Large-scale threat analysis of inter-app communications

Bosu, A., Liu, F., Yao, D. D. & Wang, G., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 71-85 15 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Crowdsourcing cybersecurity: Cyber attack detection using social media

Khandpur, R. P., Ji, T., Jan, S., Wang, G., Lu, C. T. & Ramakrishnan, N., Nov 6 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1049-1057 9 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Inferring Venue Visits from GPS Trajectories

Gu, Q., Mathioudakis, M., Sacharidis, D. & Wang, G., Nov 7 2017, GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems. Ravada, S., Hoel, E., Tamassia, R., Newsam, S., Trajcevski, G. & Trajcevski, G. (eds.). Association for Computing Machinery, 81. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems; vol. 2017-November).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Measuring the insecurity of mobile deep links of Android

Liu, F., Wang, C., Pico, A., Yao, D. & Wang, G., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 953-969 17 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MR-Droid: A scalable and prioritized analysis of inter-app communication risks

Liu, F., Cai, H., Wang, G., Yao, D., Elish, K. O. & Ryder, B. G., Dec 19 2017, Proceedings - 2017 IEEE Symposium on Security and Privacy Workshops, SPW 2017. Institute of Electrical and Electronics Engineers Inc., p. 189-198 10 p. (Proceedings - 2017 IEEE Symposium on Security and Privacy Workshops, SPW 2017; vol. 2017-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On migratory behavior in video consumption

Yan, H., Lin, T. H., Wang, G., Li, Y., Zheng, H., Jin, D. & Zhao, B. Y., Nov 6 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1109-1118 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. Part F131841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Prioritized analysis of inter-App communication risks

Liu, F., Cai, H., Wang, G., Yao, D., Elish, K. O. & Ryder, B. G., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 159-161 3 p. (CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

Anatomy of a personalized livestreaming system

Wang, B., Zhang, X., Wang, G., Zheng, H. & Zhao, B. Y., Nov 14 2016, IMC 2016 - Proceedings of the 2016 ACM Internet Measurement Conference. Association for Computing Machinery, p. 485-498 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC; vol. 14-16-November-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Defending against sybil devices in crowdsourced mapping services

Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H. & Zhao, B. Y., Jun 20 2016, MobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 179-191 13 p. (MobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Poster: Defending against sybil devices in crowdsourced mapping services

Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H. & Zhao, B. Y., Jun 25 2016, MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, 1 p. (MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unsupervised clickstream clustering for user behavior analysis

Wang, G., Zhang, X., Tang, S., Zheng, H. & Zhao, B. Y., May 7 2016, CHI 2016 - Proceedings, 34th Annual CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, p. 225-236 12 p. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

"Will check-in for badges": Understanding bias and misbehavior on location-based social networks

Wang, G., Schoenebeck, S. Y., Zheng, H. & Zhao, B. Y., Jan 1 2016, Proceedings of the 10th International Conference on Web and Social Media, ICWSM 2016. AAAI Press, p. 417-426 10 p. (Proceedings of the 10th International Conference on Web and Social Media, ICWSM 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2015

Crowds on wall street: Extracting value from collaborative investing platforms

Wang, G., Wang, T., Wang, B., Sambasivan, D., Zhang, Z., Zheng, H. & Zhao, B. Y., Feb 28 2015, CSCW 2015 - Proceedings of the 2015 ACM International Conference on Computer-Supported Cooperative Work and Social Computing. Association for Computing Machinery, Inc, p. 17-30 14 p. (CSCW 2015 - Proceedings of the 2015 ACM International Conference on Computer-Supported Cooperative Work and Social Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Man vs. Machine: Practical adversarial detection of malicious crowdsourcing workers

Wang, G., Wang, T., Zheng, H. & Zhao, B. Y., Jan 1 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 239-254 16 p. (Proceedings of the 23rd USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Whispers in the dark: Analysis of an anonymous social network

Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H. & Zhao, B. Y., Nov 5 2014, IMC 2014 - Proceedings of the 2014 ACM. Association for Computing Machinery, p. 137-149 13 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Characterizing and detecting malicious crowdsourcing

Wang, T., Wang, G., Li, X., Zheng, H. & Zhao, B. Y., Dec 1 2013, Proceedings of the SIGCOMM 2013 and Best Papers of the Co-Located Workshops. 4 ed. p. 537-538 2 p. (Computer Communication Review; vol. 43, no. 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detecting malicious landing pages in malware distribution networks

Wang, G., Stokes, J. W., Herley, C. & Felstead, D., Sep 9 2013, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2013. 6575316. (Proceedings of the International Conference on Dependable Systems and Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Follow the green: Growth and dynamics in Twitter follower markets

Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H. & Zhao, B. Y., Dec 16 2013, IMC 2013 - Proceedings of the 13th ACM Internet Measurement Conference. p. 163-176 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On the validity of geosocial mobility traces

Zhang, Z., Zhou, L., Zhao, X., Wang, G., Su, Y., Metzger, M., Zheng, H. & Zhao, B. Y., Dec 1 2013, Proceedings of the 12th ACM Workshop on Hot Topics in Networks, HotNets 2013. 11. (Proceedings of the 12th ACM Workshop on Hot Topics in Networks, HotNets 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Practical conflict graphs for dynamic spectrum distribution

Zhou, X., Zhang, Z., Wang, G., Yu, X., Zhao, B. Y. & Zheng, H., Jul 22 2013, SIGMETRICS 2013 - Proceedings of the 2013 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 1 SPEC. ISS. ed. p. 5-16 12 p. (Performance Evaluation Review; vol. 41, no. 1 SPEC. ISS.).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wisdom in the social crowd: An analysis of Quora

Wang, G., Gill, K., Mohanlal, M., Zheng, H. & Zhao, B. Y., Dec 1 2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. p. 1341-1351 11 p. (WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

You are how you click: Clickstream analysis for sybil detection

Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H. & Zhao, B. Y., Jan 1 2013, Proceedings of the 22nd USENIX Security Symposium. USENIX Association, p. 241-255 15 p. (Proceedings of the 22nd USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Measurement-calibrated conflict graphs for dynamic spectrum distribution

Zhou, X., Zhang, Z., Wang, G., Yu, X., Zhao, B. Y. & Zheng, H., Dec 1 2012, 2012 IEEE International Symposium on Dynamic Spectrum Access Networks, DYSPAN 2012. 1 p. 6478150. (2012 IEEE International Symposium on Dynamic Spectrum Access Networks, DYSPAN 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

Privacy, availability and economics in the Polaris mobile social network

Wilson, C., Steinbauer, T., Wang, G., Sala, A., Zheng, H. & Zhao, B. Y., Dec 1 2011, HotMobile 2011: The 12th Workshop on Mobile Computing Systems and Applications. p. 42-47 6 p. (HotMobile 2011: The 12th Workshop on Mobile Computing Systems and Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2010

Evaluating user knowledge in large scale online knowledge communities

Liu, X., Fan, W., Wang, G. & Jiao, J., Sep 17 2010, 2nd International Conference on Software Engineering and Data Mining, SEDM 2010. p. 404-409 6 p. 5542888. (2nd International Conference on Software Engineering and Data Mining, SEDM 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Experimental study on neighbor selection policy for Phoenix network coordinate system

Wang, G., Wu, S., Wang, G., Deng, B. & Li, X., Dec 1 2009, 2009 International Conference on Ultra Modern Telecommunications and Workshops. 5345351. (2009 International Conference on Ultra Modern Telecommunications and Workshops).

Research output: Chapter in Book/Report/Conference proceedingConference contribution