Peng Wang

Affiliations:
  • Indiana University, Bloomington, IN, USA


According to our database1, Peng Wang authored at least 8 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Demystifying Local Business Search Poisoning for Illicit Drug Promotion.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2020
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2016
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015


  Loading...