Gang Wang

Orcid: 0000-0002-8910-8979

Affiliations:
  • University of Illinois at Urbana-Champaign, IL, USA
  • Virginia Tech, Blacksburg, Department of Computer Science, VA, USA (former)
  • University of California, Santa Barbara, CA, USA (former)


According to our database1, Gang Wang authored at least 100 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SenRev: Measurement of Personal Information Disclosure in Online Health Communities.
Proc. Priv. Enhancing Technol., July, 2023

Explaining Why Fake Photos are Fake: Does It Work?
Proc. ACM Hum. Comput. Interact., 2023

AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

How to Cover up Anomalous Accesses to Electronic Health Records.
Proceedings of the 32nd USENIX Security Symposium, 2023

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Beyond Bot Detection: Combating Fraudulent Online Survey Takers✱.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Casing the Vault: Security Analysis of Vault Applications.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Research on Electromagnetic Spectrum Management and Control System of Launch Site Based on Big Data.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022

2021
On Migratory Behavior in Video Consumption.
IEEE Trans. Netw. Serv. Manag., 2021

Anonymization and De-Anonymization of Mobility Trajectories: Dissecting the Gaps Between Theory and Practice.
IEEE Trans. Mob. Comput., 2021

Linking Multiple User Identities of Multiple Services from Massive Mobility Traces.
ACM Trans. Intell. Syst. Technol., 2021

Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

CADE: Detecting and Explaining Concept Drift Samples for Security Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Double-Cross Attacks: Subverting Active Learning Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset.
Proceedings of the 30th USENIX Security Symposium, 2021

Assessing Browser-level Defense against IDN-based Phishing.
Proceedings of the 30th USENIX Security Symposium, 2021

BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware.
Proceedings of the IEEE Security and Privacy Workshops, 2021

FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

MLHat: Deployable Machine Learning for Security Defense.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Measuring DNS-over-HTTPS performance around the world.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
VerHealth: Vetting Medical Voice Applications through Policy Enforcement.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies.
CoRR, 2020

Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.
Proceedings of the 29th USENIX Security Symposium, 2020

Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A Case Study of the Security Vetting Process of Smart-home Assistant Applications.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Benchmarking Label Dynamics of VirusTotal Engines.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Modeling Spatio-Temporal App Usage for a Large User Population.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Proceedings of the 28th USENIX Security Symposium, 2019

Characterizing Pixel Tracking through the Lens of Disposable Email Services.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines.
Proceedings of the Internet Measurement Conference, 2019

Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
Proceedings of the Internet Measurement Conference, 2019

Towards Understanding the Adoption and Social Experience of Digital Wallet Systems.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Analyzing Payment-Driven Targeted Q8A Systems.
ACM Trans. Soc. Comput., 2018

Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services.
IEEE/ACM Trans. Netw., 2018

Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Revisiting Email Spoofing Attacks.
CoRR, 2018

All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems.
Proceedings of the 27th USENIX Security Symposium, 2018

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

End-to-End Measurements of Email Spoofing Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

You Are How You Move: Linking Multiple User Identities From Massive Mobility Traces.
Proceedings of the 2018 SIAM International Conference on Data Mining, 2018

De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild.
Proceedings of the Internet Measurement Conference 2018, 2018

Pay-per-Question: Towards Targeted Q&A with Payments.
Proceedings of the 2018 ACM Conference on Supporting Groupwork, 2018

The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

LEMNA: Explaining Deep Learning based Security Applications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Clickstream User Behavior Models.
ACM Trans. Web, 2017

Value and Misinformation in Collaborative Investing Platforms.
ACM Trans. Web, 2017

Towards the Adoption of Anti-spoofing Protocols for Email Systems.
CoRR, 2017

Empirical Analysis of Password Reuse and Modification across Online Service.
CoRR, 2017

Analyzing Payment Based Question and Answering Service.
CoRR, 2017

Measuring the Insecurity of Mobile Deep Links of Android.
Proceedings of the 26th USENIX Security Symposium, 2017

MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

A First Look: Using Linux Containers for Deceptive Honeypots.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017

Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

A First Look at User Switching Behaviors Over Multiple Video Content Providers.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Inferring Venue Visits from GPS Trajectories.
Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2017

Prioritized Analysis of Inter-App Communication Risks.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

On Migratory Behavior in Video Consumption.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Combating Attacks and Abuse in Large Online Communities.
PhD thesis, 2016

The power of comments: fostering social interactions in microblog networks.
Frontiers Comput. Sci., 2016

Poster: Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Anatomy of a Personalized Livestreaming System.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Unsupervised Clickstream Clustering for User Behavior Analysis.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Practical Conflict Graphs in the Wild.
IEEE/ACM Trans. Netw., 2015

Attacks and Defenses in Crowdsourced Mapping Services.
CoRR, 2015

Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Crowds on Wall Street: Extracting Value from Social Investing Platforms.
CoRR, 2014

Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Whispers in the dark: analysis of an anonymous social network.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Wisdom in the social crowd: an analysis of quora.
Proceedings of the 22nd International World Wide Web Conference, 2013

You Are How You Click: Clickstream Analysis for Sybil Detection.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Practical conflict graphs for dynamic spectrum distribution.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Characterizing and detecting malicious crowdsourcing.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Social Turing Tests: Crowdsourcing Sybil Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Follow the green: growth and dynamics in twitter follower markets.
Proceedings of the 2013 Internet Measurement Conference, 2013

On the validity of geosocial mobility traces.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

Detecting malicious landing pages in Malware Distribution Networks.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Serf and turf: crowdturfing for fun and profit.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Measurement-calibrated conflict graphs for dynamic spectrum distribution.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2011
Privacy, availability and economics in the Polaris mobile social network.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

I am the antenna: accurate outdoor AP location using smartphones.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011


  Loading...