The documents listed below have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
C Conference Proceeding | J Journal Article | W Workshop Proceeding
A Study of Training Strategies on Enhancing Human Detection of Deepfake Images
Aiping Xiong, Haeseung Seo, Ester C. Chen, Margie Ruffin, Gang Wang, Dongwon Lee
Proceedings of The International AAAI Conference on Web and Social Media (ICWSM)
Copenhagen, Denmark, June 2025.
C
You Can’t Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries using Pseudo Labels
Hadjer Benkraouda, Nirav Diwan, Gang Wang
Proceedings of the 46th IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2025.
C
PDF
Self-Supervised Probability Imputation to Estimate the External-Natural Cause of Injury Matrix
Pirouz Naghavi, Erica Naghavi, Gang Wang, Liane Ong
Proceedings of Machine Learning for Health Symposium (ML4H)
Vancouver, Canada, December 2024.
C
PDF
How do Endpoint Detection Products use the MITRE ATT&CK Framework?
Apurva Virkud, Muhammad Adil Inam, Andy Riddle, Jason Liu, Gang Wang, Adam Bates
Proceedings of The 33rd USENIX Security Symposium (USENIX Security)
Philadelphia, PA, August 2024.
C
PDF Artifacts Available, Artifacts Functional, Results Reproduced
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors
Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang
Proceedings of The 33rd USENIX Security Symposium (USENIX Security)
Philadelphia, PA, August 2024.
C
PDF
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center
Limin Yang, Zhi Chen, Chenkai Wang, Zhenning Zhang, Sushruth Booma, Phuong Cao, Constantin Adam, Alex Withers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Gang Wang
Proceedings of The 33rd USENIX Security Symposium (USENIX Security)
Philadelphia, PA, August 2024.
C
PDF
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation
Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing
Proceedings of the 41st International Conference on Machine Learning (ICML)
Vienna, Austria, July 2024
C
PDF
Spotlight
Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles On User Perception Towards Disinformation
Margie Ruffin, Haeseung Seo, Aiping Xiong, Gang Wang
Proceedings of The International AAAI Conference on Web and Social Media (ICWSM)
Buffalo, NY, June 2024.
C
PDF
Practical Region-level Attack against Segment Anything Models
Yifan Shen, Zhengyuan Li, and Gang Wang
Proceedings of The IEEE CVPR Workshop on Fair, Data-efficient, and Trusted Computer Vision (TCV)
in conjunction with IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR)
Seattle, WA, June 2024.
W
PDF
It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias
Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang
Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI)
Honolulu, HI, May 2024.
C
PDF
VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks
Chenkai Wang, Zhuofan Jia, Hadjer Benkraouda, Cody Zevnik, Nicholas Heuermann, Roopa Foulger, Jonathan A. Handler, Gang Wang
Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI)
Honolulu, HI, May 2024.
C
PDF
Are Adversarial Phishing Webpages a Threat in Reality? Understanding the Users’ Perception of Adversarial Webpages
Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, and Gang Wang
Proceedings of The ACM Web Conference (WWW)
Singapore, May 2024.
C
Oral
PDF
R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection
Akul Goyal, Gang Wang, Adam Bates
Proceedings of The 45th IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2024.
C
PDF
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation
Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, Yonghwi Kwon
Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
CA, March 2024.
C
PDF
On a Foundation Model for Operating Systems
Divyanshu Saxena, Nihal Sharma, Donghyun Kim, Rohit Dwivedula, Jiayi Chen, Chenxi Yang, Sriram Ravula, Zichao Hu, Aditya Akella, Sebastian Angel, Joydeep Biswas, Swarat Chaudhuri, Isil Dillig, Alex Dimakis, Daehyeok Kim, Christopher Rossbach, Gang Wang
Proceedings of Machine Learning for Systems Workshop (MLSys)
in conjunction with Conference on Neural Information Processing Systems (NeurIPS)
New Orleans, LA, December 2023.
W
PDF
How to Cover up Anomalous Accesses to Electronic Health Records
Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl Gunter
Proceedings of The 32nd USENIX Security Symposium (USENIX Security)
Anaheim, CA, August 2023.
C
PDF
AIRS: Explanation for Deep Reinforcement Learning based Security Applications
Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing
Proceedings of The 32nd USENIX Security Symposium (USENIX Security)
Anaheim, CA, August 2023.
C
PDF
SenRev: Measurement of Personal Information Disclosure in Online Health Communities
Faysal Hossain Shezan, Minjun Long, David Hasani, Gang Wang, Yuan Tian
Proceedings of Privacy Enhancing Technologies Symposium (PoPETs/PETS)
Lausanne, Switzerland, July 2023.
C
PDF
Everybody’s Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations
Jaron Mink, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang
Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2023.
C
PDF
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang.
Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2023.
C
PDF
Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments
Yaman Yu, Saidivya Ashok, Smirity Kaushik, Yang Wang, Gang Wang
Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2023.
C
PDF
Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors
Zhi Chen, Zhenning Zhang, Zeliang Kan, Limin Yang, Jacopo Cortellazzi, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang
Proceedings of Deep Learning Security and Privacy Workshop (DLSP),
in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2023.
W
PDF
Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates
Proceedings of The Network and Distributed System Security Symposium (NDSS)
San Diego, CA, February 2023.
C
PDF
Explaining Why Fake Photos are Fake: Does It Work?
Margie Ruffin, Gang Wang, Kirill Levchenko
Proceedings of ACM International Conference on Supporting Group Work (GROUP)
Sanibel Island, FL, January 2023.
C
PDF
Casing the Vault: Security Analysis of Vault Applications
Margie Ruffin, Israel Lopez-Toledo, Kirill Levchenko, Gang Wang
Proceedings of Workshop on Privacy in the Electronic Society (WPES),
in conjunction with ACM Conference on Computer and Communications Security (CCS)
Los Angeles, CA, November 2022.
W
PDF
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks
Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang
Proceedings of The 31st USENIX Security Symposium (USENIX Security)
Boston, MA, August 2022.
C PDF
Website
Artifacts Available, Artifacts Functional, Results Reproduced
Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol
Chenkai Wang, Gang Wang
Proceedings of The ACM Web Conference (WWW)
Lyon, France. April 2022.
C PDF
Mozilla Bug Bounty $1,000
Beyond Bot Detection: Combating Fraudulent Online Survey Takers
Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang
Proceedings of The ACM Web Conference (WWW)
Lyon, France. April 2022.
C PDF
An In-depth Analysis of Duplicated Linux Kernel Bug Reports
Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang
Proceedings of The Network and Distributed System Security Symposium (NDSS)
San Diego, CA, February 2022.
C PDF
Measuring DNS-over-HTTPS Performance Around the World
Rishabh Chhabra, Paul Murley, Deepak Kumar, Michael Bailey, Gang Wang
Proceedings of The ACM Internet Measurement Conference (IMC)
Virtual Event, November 2021.
C
PDF
It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications
Qingying Hao, Licheng Luo, Steve TK Jan, Gang Wang
Proceedings of The ACM Conference on Computer and Communications Security (CCS)
Seoul, South Korea, November 2021.
C
PDF
Video
Who Am I? A Design Probe Exploring Real-Time Transparency About Online and Offline User Profiling Underlying Targeted Ads
Natã Miccael Barbosa, Gang Wang, Blase Ur, Yang Wang
Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
September 2021.
C
PDF
Double-Cross Attacks: Subverting Active Learning Systems
Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher Fletcher
Proceedings of The 30th USENIX Security Symposium (USENIX Security)
Vancouver, BC, Canada, August 2021.
C
PDF
CADE: Detecting and Explaining Concept Drift Samples for Security Applications
Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
Proceedings of The 30th USENIX Security Symposium (USENIX Security)
Vancouver, BC, Canada, August 2021.
C
PDF
Code
Supplementary
Artifact Evaluated
Assessing Browser-level Defense against IDN-based Phishing
Hang Hu*, Steve T.K. Jan*, Yang Wang, Gang Wang
Proceedings of The 30th USENIX Security Symposium (USENIX Security)
Vancouver, BC, Canada, August 2021.
C
PDF
(*Co-first authors with equal contribution)
Stars Can Tell: A Robust Method to Defend against GPS Spoofing using Off-the-shelf Chipset
Shinan Liu*, Xiang Cheng*, Hanchao Yang, Yuanchao Shu, Xiaoran Weng, Ping Guo, Kexiong (Curtis) Zeng, Gang Wang, Yaling Yang
Proceedings of The 30th USENIX Security Symposium (USENIX Security)
Vancouver, BC, Canada, August 2021.
C
PDF
Website
Code
Data
Artifact Evaluated
(*Co-first authors with equal contribution)
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps
Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes
Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)
Hong Kong, June 2021.
C
PDF
BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware
Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Gang Wang
Proceedings of Deep Learning and Security Workshop (DLS),
in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)
May 2021.
W
PDF
Data
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant Honavar, Gang Wang, Xinyu Xing
Proceedings of The Network and Distributed System Security Symposium (NDSS)
Virtual Conference, February 2021.
C
PDF
VerHealth: Vetting Medical Voice Applications through Policy Enforcement
Faysal Hossain Shezan, Hang Hu, Gang Wang, Yuan Tian
Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
December 2020.
C
PDF
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
Proceedings of The 29th USENIX Security Symposium (USENIX Security)
Boston, MA, August 2020.
C
PDF
Data
Artifact Evaluated
Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation
Steve T.K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang, Bimal Viswanath
Proceedings of The 41st IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2020.
C
PDF
Video
A Case Study of the Security Vetting Process of Smart-home Assistant Applications
Hang Hu, Limin Yang, Shihan Lin, Gang Wang
Proceedings of IEEE Workshop on the Internet of Safe Things (SafeThings),
in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2020.
W
PDF
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
Faysal Hossain Shezan, Hang Hu, Jiamin Wang, Gang Wang, Yuan Tian
Proceedings of The Web Conference (WWW)
Taipei, April 2020.
C
PDF
Data
Linking Multiple User Identities of Multiple Services from Massive Mobility Traces
Huandong Wang, Yong Li, Gang Wang, Depeng Jin
ACM Transactions on Intelligent Systems and Technology (TIST), 2020.
J
PDF
On Migratory Behavior in Video Consumption
Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
IEEE Transactions on Network and Service Management (TNSM), 2020.
J
PDF
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations
Sazzadur Rahaman, Gang Wang, Danfeng Yao
Proceedings of The 26th ACM Conference on Computer and Communications Security (CCS)
London, UK, November 2019.
C
PDF
Code
CSAW ’20 Applied Research Competition Finalist
Errors, Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of Ad-blocking Systems
Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang
Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
Amsterdam, Netherlands, October 2019.
C
PDF
Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
Peng Peng, Limin Yang, Linhai Song, Gang Wang
Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
Amsterdam, Netherlands, October 2019.
C
PDF
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites
Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang
Proceedings of The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS)
Auckland, New Zeland, July 2019.
C
PDF
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
Proceedings of The 28th USENIX Security Symposium (USENIX Security)
Santa Clara, CA, August 2019.
C
PDF
Data
Characterizing Pixel Tracking through the Lens of Disposable Email Services
Hang Hu, Peng Peng, Gang Wang
Proceedings of The 40th IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2019.
C
PDF
Video
Modeling Spatio-Temporal App Usage for a Large User Population
Huandong Wang, Yong Li, Sihan Zeng, Gang Wang, Pengyu Zhang, Pan Hui, Depeng Jin
Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
March 2019.
C
PDF
Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks
Steve T.K. Jan, Joseph Messou, Yen-Chen Lin, Jia-Bin Huang, Gang Wang
Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)
Honolulu, HI, January 2019.
C
PDF
Website
Spotlight
Towards Understanding the Adoption and Social Experience of Digital Wallet Systems
Shiliang Tang, Ziming Wu, Xinyi Zhang, Gang Wang, Xiaojuan Ma, Haitao Zheng, Ben Y. Zhao
Proceedings of Hawaii International Conference on System Sciences (HICSS)
Maui HI, January 2019.
C PDF
Anonymization and De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
IEEE Transactions on Mobile Computing (TMC), 2019.
J
PDF
Code
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild
Ke Tian, Steve T.K. Jan, Hang Hu, Danfeng Yao, Gang Wang
Proceedings of ACM Internet Measurement Conference (IMC)
Boston, MA, October 2018.
C PDF
Code
LEMNA: Explaining Deep Learning based Security Applications
Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing
Proceedings of The 25th ACM Conference on Computer and Communications Security (CCS)
Toronto, Canada, October 2018.
C
PDF
Code
Outstanding Paper Award
Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems
Hang Hu, Peng Peng, Gang Wang
Proceedings of The IEEE Cybersecurity Development Conference (SecDev)
Cambridge, MA, October 2018.
C
PDF
Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints
Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, Depeng Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
September 2018.
C
PDF
IMWUT Distinguished Paper Award
End-to-End Measurements of Email Spoofing Attacks
Hang Hu, Gang Wang
Proceedings of The 27th USENIX Security Symposium (USENIX Security)
Baltimore, MD, August 2018.
C
PDF
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
Proceedings of The 27th USENIX Security Symposium (USENIX Security)
Baltimore, MD, August 2018.
C
PDF
Data
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
Proceedings of The 27th USENIX Security Symposium (USENIX Security)
Baltimore, MD, August 2018.
C
PDF
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
Xiangwen Wang, Peng Peng, Chun Wang, Gang Wang
Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)
Songdo, Incheon, Korea, June 2018.
C
PDF
You Are How You Move: Linking Multiple User Identities From Massive Mobility Traces
Huandong Wang, Yong Li, Gang Wang, Depeng Jin
Proceedings of The SIAM International Conference on Data Mining (SDM)
San Diego, CA, May 2018.
C
PDF
Code
The Next Domino To Fall: Empirical Analysis of User Passwords across Online Services
Chun Wang, Steve T.K. Jan, Hang Hu, Douglas Bossart, Gang Wang.
Proceedings of The ACM Conference on Data and Applications Security and Privacy (CODASPY)
Tempe, AZ, March 2018 (short paper).
C
PDF
Website
De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
Proceedings of The 25th Annual Network And Distributed System Security Symposium (NDSS)
San Diego, CA, February 2018.
C
PDF
Slides
Code
Pay-per-Question: Towards Targeted Q&A with Payments
Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang
Proceedings of The ACM International Conference on Supporting Group Work (GROUP)
Sanibel Island, FL, January 2018.
C
PDF
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
ACM/IEEE Transactions on Networking (TON), 2018.
J
PDF
Analyzing Payment-driven Targeted Q&A Systems.
Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang
ACM Transactions on Social Computing (TSC), 2018.
J
PDF
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Rupinder Paul Khandpur, Taoran Ji, Steve Jan, Gang Wang, Chang-Tien Lu, Naren Ramakrishnan
Proceedings of The 26th ACM International Conference on Information and Knowledge Management (CIKM)
Singapore, November 2017.
C
PDF
On Migratory Behavior in Video Consumption
Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
Proceedings of The 26th ACM International Conference on Information and Knowledge Management (CIKM)
Singapore, November 2017.
C
PDF
A First Look: Using Linux Containers for Deceptive Honeypots
Alexander Kedrowitsch, Danfeng Yao, Gang Wang, Kirk Cameron
Proceedings of Applying the Scientific Method to Active Cyber Defense Research (SafeConfig),
in conjunction with the ACM Conference on Computer and Communications Security (CCS)
Dallas, USA, October 2017.
W
PDF
Measuring the Insecurity of Mobile Deep Links of Android
Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
Proceedings of The 26th USENIX Security Symposium (USENIX Security)
Vancouver, Canada, August 2017.
C
PDF
Slides
Talk
Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System
Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
Montreal, Canada, May 2017.
C
PDF
A First Look at User Switching Behaviors Over Multiple Video Content Providers
Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
Montreal, Canada, May 2017 (short paper).
C
PDF
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks
Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder
Proceedings of Mobile Security Technologies (MoST)
in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)
San Jose, CA, May 2017.
W
PDF
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
Amiangshu Bosu, Fang Liu, Danfeng Yao, Gang Wang
Proceedings of ACM Asia Conference on Computer and Communications Security (ASIACCS)
Abu Dhabi, UAE, April 2017.
C
PDF
Clickstream User Behavior Models
Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, Ben Y. Zhao
ACM Transactions on the Web (TWEB), 2017.
J
PDF
Value and Misinformation in Collaborative Investing Platforms
Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao
ACM Transactions on the Web (TWEB), 2017.
J
PDF
Anatomy of a Personalized Livestreaming System
Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC)
Santa Monica, CA, November 2016.
C
PDF
Dataset
Defending against Sybil Devices in Crowdsourced Mapping Services
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
Singapore, June 2016.
C
PDF
Video
"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-based Social Networks
Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
Cologne, Germany, May 2016.
C
PDF
Slides
Unsupervised Clickstream Clustering For User Behavior Analysis
Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao
Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI)
San Jose, CA, May 2016.
C
PDF
Slides
Video
Website
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
Vancouver, BC, Canada, March 2015.
C
PDF
Slides
The Power of Comments: Fostering Social Interactions in Microblog Networks
Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao
Springer Frontiers of Computer Science (FCS), 2015.
J
PDF
Whispers in the Dark: Analysis of an Anonymous Social Network
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
Proceedings of Internet Measurement Conference (IMC)
Vancouver, BC, Canada, November 2014.
C
PDF
Slides
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao
Proceedings of USENIX Security Symposium (USENIX Security)
San Diego, CA, August 2014.
C
PDF
Slides
Video
Practical Conflict Graphs in the Wild
Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng
ACM Transactions on Networking (TON), 2014.
J
PDF
On the Validity of Geosocial Mobility Traces
Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-XII)
College Park, MD, November, 2013.
W
PDF
Follow the Green: Growth and Dynamics in Twitter Follower Markets
Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao
Proceedings of Internet Measurement Conference (IMC)
Barcelona, Spain, October 2013.
C
PDF
You are How You Click: Clickstream Analysis for Sybil Detection
Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao
Proceedings of USENIX Security Symposium (USENIX Security)
Washington, DC, August 2013.
C
PDF
Slides
Detecting Malicious Landing Pages in Malware Distribution Networks
Gang Wang, Jack Stokes, Cormac Herley, David Felstead
Proceedings of Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Budapest, Hungary, June 2013.
C
PDF
Practical Conflict Graphs for Dynamic Spectrum Distribution
Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng
Proceedings ofACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS)
Pittsburgh, PA, June 2013.
C
PDF
Best Practical Paper Award
Wisdom in the Social Crowd: an Analysis of Quora
Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
Proceedings of International World Wide Web Conference (WWW)
Rio de Janeiro, Brazil, May 2013.
C
PDF
Slides
Social Turing Tests: Crowdsourcing Sybil Detection
Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
Proceedings of Annual Network Distributed System Security Symposium (NDSS)
San Diego, CA, February 2013.
C
PDF
Slides
Serf and Turf: Crowdturfing for Fun and Profit
Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
Proceedings of International World Wide Web Conference (WWW)
Lyon, France, April 2012.
C
PDF
Slides
I am the Antenna: Accurate Outdoor AP Location using Smartphone
Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng
Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom)
Las Vegas, NV, September 2011.
C
PDF
Privacy, Availability and Economics in the Polaris Mobile Social Network
Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM Workshop on Mobile Computing Systems and Applications (HotMobile)
Phoenix, AZ, March 2011.
W
PDF
Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System
Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li
Proceedings of International Workshop on Peer-To-Peer Networking (P2PNet)
St.-Petersburg, Russia, 2009.
W
PDF
Real-Time Detection of Network Threats Using a Graph-Based Model
Akul Goyal, Adam Bates, Gang Wang
Filed by UIUC (UIUC2023-220-01, 24-0156-US-PRO), IP Disclosure: 03/21/2024.
A Method to Detect Web Bots with Limited Data Using Neural Networks
Bimal Viswanath, Arik Hadass, Sonal Oswal, Jiameng Pu, Tianrui Hu, Gang Wang, Steve Jan, Qingying Hao
Filed by VTIP. IP Disclosure: 02/04/2020. # VTIP 20-061.
A Low-Cost GPS Spoofing Detector and Spoofer Localizer
Yaling Yang, Shinan Liu, Gang Wang
Filed by VTIP. IP Disclosure: 03/03/2020. # VTIP 20-070. U.S. Patent Application No. 63/047,085.
GPS Spoofing Tool to Road Navigation System
Yaling Yang, Yuancao Shu, Shinan Liu, Gang Wang, Kexiong Zeng
Filed by VTIP. IP Disclosure: 09/12/2018. # VTIP 19-026.
Identifying Web Pages In Malware Distribution Networks
Gang Wang, Jack Stokes, Cormac Herley, David Felstead
Filed by Microsoft Corporation; Published on 07/03/2014; US 2014/0189864 A1.
PDF
Explaining Deep Learning Based Security Applications
Wenbo Guo, Jun Xu, Gang Wang, Xinyu Xing
In: Wang, C., Iyengar, S., Sun, K. (eds) Embedded Assurance for Cyber Systems, 2023. Springer, Cham.
DOI Link
How do Endpoint Detection Products Make Use of MITRE ATT&CK?
The 44th IEEE Symposium on Security and Privacy (IEEE SP),
San Francisco, CA, May 2023.
PDF
Demonstration: Benchmarking Label Dynamics of VirusTotal Engines
ACM Conference on Computer and Communications Security (CCS), Virtual Conference, November 2020.
PDF
Inferring Venue Visits from GPS Trajectories
ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (SIGSPATIAL),
Redondo Beach, CA, November 2017.
PDF
Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset
IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, April, 2017.
PDF
Prioritized Analysis of Inter-App Communication Risks
ACM Conference on Data and Applications Security (CODASPY), Scottsdale, AZ, March, 2017.
PDF
Understanding and Defending Against Malicious Crowdsourcing
SaTC PI Meeting, Washington, WA, January, 2015.
PDF
Characterizing and Detecting Malicious Crowdsourcing
Workshop of ACM SIGCOMM, Hong Kong, China, August, 2013.
PDF
I am the Antenna: Accurate Outdoor AP Location using Smartphone
Future of Mobile Workshop at Google, Mountain View, CA, May, 2012.
PDF
Measurement-calibrated Conflict Graphs for Dynamic Spectrum Distribution
2012 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Bellevue, WA, October, 2012.
PDF
Polaris, A Distributed Online Social Network
Engineering Insights Conference, UCSB, April, 2011.
PDF
Human Factors in Secure and Non-Abusive Machine Learning Systems
PhD Dissertation, Jaron Mink, UIUC, July 2024.
Beyond Rules: Leveraging Large Language Models for Code-Data Separation in Binary Disassembly
MS Thesis, Nirav Diwan, UIUC, May 2024.
Measuring Concept Drift in Malware and Network Intrusion Detection Models
MS Thesis, Zhenning Zhang, UIUC, May 2024.
Machine Learning for Security Applications Under Dynamic and Adversarial Environments
PhD Dissertation, Limin Yang, UIUC, July 2023.
VeriSMS: A Message Verification System for Inclusive and Trusted Patient Outreach
MS Thesis, Nicholas Wang, UIUC, May 2023.
Surveying Face Liveness Detection in the Deepfake Era
MS Thesis, Licheng Luo, UIUC, May 2022.
An Analysis of Screen Reader Users' Susceptibility to Phishing
Senior Thesis, Saidivya Ashok, UIUC, May 2021.
Empirically Understanding the Global Impact of Migration to DNS-over-HTTPS
MS Thesis, Rishabh Chhabra, UIUC, May 2021.
Robustifying Machine Learning based Security Applications
PhD Dissertation, Steve T.K. Jan, Virginia Tech, August 2020.
Characterizing and Detecting Online Deception via Data-Driven Methods
PhD Dissertation, Hang Hu, Virginia Tech, May 2020.
Detecting Bots using Stream-based System with Data Synthesis
MS Thesis, Tianrui Hu, Virginia Tech, May 2020.
Defending Against GPS Spoofing by Analyzing Visual Cues
MS Thesis, Chao Xu, Virginia Tech, May 2020.
Measuring the Functionality of Amazon Alexa and Google Home Applications
MS Thesis, Jiamin Wang, Virginia Tech, January 2020.
A Measurement Approach to Understanding the Data Flow of Phishing from Attacker and Defender Perspectives
MS Thesis, Peng Peng, Virginia Tech, December 2019.
Empirical Analysis of User Passwords across Online Services
MS Thesis, Chun Wang, Virginia Tech, May 2018.
Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks
MS Thesis, Xiangwen Wang, Virginia Tech, May 2018.
Combating Attacks and Abuse in Large Online Communities
PhD Dissertation, Gang Wang, UC Santa Barbara, September 2016.