Hang Hu

Affiliations:
  • Virginia Tech, Blacksburg, VA, USA


According to our database1, Hang Hu authored at least 15 papers between 2017 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Assessing Browser-level Defense against IDN-based Phishing.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
VerHealth: Vetting Medical Voice Applications through Policy Enforcement.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies.
CoRR, 2020

Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

A Case Study of the Security Vetting Process of Smart-home Assistant Applications.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

2019
Characterizing Pixel Tracking through the Lens of Disposable Email Services.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Revisiting Email Spoofing Attacks.
CoRR, 2018

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

End-to-End Measurements of Email Spoofing Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild.
Proceedings of the Internet Measurement Conference 2018, 2018

The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Towards the Adoption of Anti-spoofing Protocols for Email Systems.
CoRR, 2017

Empirical Analysis of Password Reuse and Modification across Online Service.
CoRR, 2017


  Loading...