Shuang Hao
According to our database1,
Shuang Hao
authored at least 38 papers
between 2005 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2018
Distilling relations using knowledge bases.
VLDB J., 2018
Higher Order Support Vector Random Fields for Hyperspectral Image Classification.
ISPRS Int. J. Geo-Information, 2018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Computers & Security, 2018
Measuring Privacy Threats in China-Wide Mobile Networks.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
In rDNS We Trust: Revisiting a Common Data-Source's Reliability.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Semantic Segmentation of Aerial Image Using Fully Convolutional Network.
Proceedings of the Image and Graphics Technologies and Applications, 2018
Cleaning Your Wrong Google Scholar Entries.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Discovering Mis-Categorized Entities.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks.
Proceedings of the Computer Security, 2018
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Proceedings of the Applied Networking Research Workshop, 2018
2017
Signature-Based Trajectory Similarity Join.
IEEE Trans. Knowl. Data Eng., 2017
On the Privacy and Security of the Ultrasound Ecosystem.
PoPETs, 2017
Analysis of mobile learning as an innovation in higher education: a comparative study of three countries.
IJMLO, 2017
Something from Nothing (There): Collecting Global IPv6 Datasets from DNS.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
Cleaning Relations Using Knowledge Bases.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
A Novel Cost-Based Model for Data Repairing.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017
2016
Probabilistic logical approach for testing diagnosability of stochastic discrete event systems.
Eng. Appl. of AI, 2016
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services.
Proceedings of the 25th International Conference on World Wide Web, 2016
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Drops for Stuff: An Analysis of Reshipping Mule Scams.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
MassJoin: A mapreduce-based method for scalable string similarity joins.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
2013
Understanding the domain registration behavior of spammers.
Proceedings of the 2013 Internet Measurement Conference, 2013
2011
Monitoring the initial DNS behavior of malicious domains.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
2009
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
Proceedings of the 18th USENIX Security Symposium, 2009
2006
Sensor Networks Routing via Bayesian Exploration.
Proceedings of the LCN 2006, 2006
Efficient and Density-Aware Routing for Wireless Sensor Networks.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006
2005
Using Trust for Restricted Delegation in Grid Environments.
Proceedings of the Information Security Practice and Experience, 2005
A queue model to detect DDos attacks.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005