The documents listed below have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Refereed Papers

C Conference Proceeding | J Journal Article | W Workshop Proceeding

2025
  • A Study of Training Strategies on Enhancing Human Detection of Deepfake Images
    Aiping Xiong, Haeseung Seo, Ester C. Chen, Margie Ruffin, Gang Wang, Dongwon Lee
    Proceedings of The International AAAI Conference on Web and Social Media (ICWSM)
    Copenhagen, Denmark, June 2025. C

  • You Can’t Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries using Pseudo Labels
    Hadjer Benkraouda, Nirav Diwan, Gang Wang
    Proceedings of the 46th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2025. C PDF

2024
  • Self-Supervised Probability Imputation to Estimate the External-Natural Cause of Injury Matrix
    Pirouz Naghavi, Erica Naghavi, Gang Wang, Liane Ong
    Proceedings of Machine Learning for Health Symposium (ML4H)
    Vancouver, Canada, December 2024. C PDF

  • How do Endpoint Detection Products use the MITRE ATT&CK Framework?
    Apurva Virkud, Muhammad Adil Inam, Andy Riddle, Jason Liu, Gang Wang, Adam Bates
    Proceedings of The 33rd USENIX Security Symposium (USENIX Security)
    Philadelphia, PA, August 2024. C PDF Artifacts Available, Artifacts Functional, Results Reproduced

  • It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors
    Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang
    Proceedings of The 33rd USENIX Security Symposium (USENIX Security)
    Philadelphia, PA, August 2024. C PDF

  • True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center
    Limin Yang, Zhi Chen, Chenkai Wang, Zhenning Zhang, Sushruth Booma, Phuong Cao, Constantin Adam, Alex Withers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Gang Wang
    Proceedings of The 33rd USENIX Security Symposium (USENIX Security)
    Philadelphia, PA, August 2024. C PDF

  • RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation
    Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing
    Proceedings of the 41st International Conference on Machine Learning (ICML)
    Vienna, Austria, July 2024 C PDF Spotlight

  • Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles On User Perception Towards Disinformation
    Margie Ruffin, Haeseung Seo, Aiping Xiong, Gang Wang
    Proceedings of The International AAAI Conference on Web and Social Media (ICWSM)
    Buffalo, NY, June 2024. C PDF

  • Practical Region-level Attack against Segment Anything Models
    Yifan Shen, Zhengyuan Li, and Gang Wang
    Proceedings of The IEEE CVPR Workshop on Fair, Data-efficient, and Trusted Computer Vision (TCV)
    in conjunction with IEEE/CVF Computer Vision and Pattern Recognition Conference (CVPR)
    Seattle, WA, June 2024. W PDF

  • It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias
    Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang
    Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI)
    Honolulu, HI, May 2024. C PDF

  • VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks
    Chenkai Wang, Zhuofan Jia, Hadjer Benkraouda, Cody Zevnik, Nicholas Heuermann, Roopa Foulger, Jonathan A. Handler, Gang Wang
    Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI)
    Honolulu, HI, May 2024. C PDF

  • Are Adversarial Phishing Webpages a Threat in Reality? Understanding the Users’ Perception of Adversarial Webpages
    Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, and Gang Wang
    Proceedings of The ACM Web Conference (WWW)
    Singapore, May 2024. C Oral PDF

  • R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection
    Akul Goyal, Gang Wang, Adam Bates
    Proceedings of The 45th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2024. C PDF

  • FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation
    Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, Yonghwi Kwon
    Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
    CA, March 2024. C PDF

2023
  • On a Foundation Model for Operating Systems
    Divyanshu Saxena, Nihal Sharma, Donghyun Kim, Rohit Dwivedula, Jiayi Chen, Chenxi Yang, Sriram Ravula, Zichao Hu, Aditya Akella, Sebastian Angel, Joydeep Biswas, Swarat Chaudhuri, Isil Dillig, Alex Dimakis, Daehyeok Kim, Christopher Rossbach, Gang Wang
    Proceedings of Machine Learning for Systems Workshop (MLSys)
    in conjunction with Conference on Neural Information Processing Systems (NeurIPS)
    New Orleans, LA, December 2023. W PDF

  • How to Cover up Anomalous Accesses to Electronic Health Records
    Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl Gunter
    Proceedings of The 32nd USENIX Security Symposium (USENIX Security)
    Anaheim, CA, August 2023. C PDF

  • AIRS: Explanation for Deep Reinforcement Learning based Security Applications
    Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing
    Proceedings of The 32nd USENIX Security Symposium (USENIX Security)
    Anaheim, CA, August 2023. C PDF

  • SenRev: Measurement of Personal Information Disclosure in Online Health Communities
    Faysal Hossain Shezan, Minjun Long, David Hasani, Gang Wang, Yuan Tian
    Proceedings of Privacy Enhancing Technologies Symposium (PoPETs/PETS)
    Lausanne, Switzerland, July 2023. C PDF

  • Everybody’s Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations
    Jaron Mink, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang
    Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2023. C PDF

  • Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
    Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang.
    Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2023. C PDF

  • Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments
    Yaman Yu, Saidivya Ashok, Smirity Kaushik, Yang Wang, Gang Wang
    Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2023. C PDF

  • Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors
    Zhi Chen, Zhenning Zhang, Zeliang Kan, Limin Yang, Jacopo Cortellazzi, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang
    Proceedings of Deep Learning Security and Privacy Workshop (DLSP),
    in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2023. W PDF

  • Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
    Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates
    Proceedings of The Network and Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2023. C PDF

  • Explaining Why Fake Photos are Fake: Does It Work?
    Margie Ruffin, Gang Wang, Kirill Levchenko
    Proceedings of ACM International Conference on Supporting Group Work (GROUP)
    Sanibel Island, FL, January 2023. C PDF

2022
  • Casing the Vault: Security Analysis of Vault Applications
    Margie Ruffin, Israel Lopez-Toledo, Kirill Levchenko, Gang Wang
    Proceedings of Workshop on Privacy in the Electronic Society (WPES),
    in conjunction with ACM Conference on Computer and Communications Security (CCS)
    Los Angeles, CA, November 2022. W PDF

  • DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks
    Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang
    Proceedings of The 31st USENIX Security Symposium (USENIX Security)
    Boston, MA, August 2022. C PDF Website Artifacts Available, Artifacts Functional, Results Reproduced

  • Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol
    Chenkai Wang, Gang Wang
    Proceedings of The ACM Web Conference (WWW)
    Lyon, France. April 2022. C PDF Mozilla Bug Bounty $1,000

  • Beyond Bot Detection: Combating Fraudulent Online Survey Takers
    Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang
    Proceedings of The ACM Web Conference (WWW)
    Lyon, France. April 2022. C PDF

  • An In-depth Analysis of Duplicated Linux Kernel Bug Reports
    Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang
    Proceedings of The Network and Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2022. C PDF

2021
  • Measuring DNS-over-HTTPS Performance Around the World
    Rishabh Chhabra, Paul Murley, Deepak Kumar, Michael Bailey, Gang Wang
    Proceedings of The ACM Internet Measurement Conference (IMC)
    Virtual Event, November 2021. C PDF

  • It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications
    Qingying Hao, Licheng Luo, Steve TK Jan, Gang Wang
    Proceedings of The ACM Conference on Computer and Communications Security (CCS)
    Seoul, South Korea, November 2021. C PDF Video

  • Who Am I? A Design Probe Exploring Real-Time Transparency About Online and Offline User Profiling Underlying Targeted Ads
    Natã Miccael Barbosa, Gang Wang, Blase Ur, Yang Wang
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
    September 2021. C PDF

  • Double-Cross Attacks: Subverting Active Learning Systems
    Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher Fletcher
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. C PDF

  • CADE: Detecting and Explaining Concept Drift Samples for Security Applications
    Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. C PDF Code Supplementary Artifact Evaluated

  • Assessing Browser-level Defense against IDN-based Phishing
    Hang Hu*, Steve T.K. Jan*, Yang Wang, Gang Wang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. C PDF
    (*Co-first authors with equal contribution)

  • Stars Can Tell: A Robust Method to Defend against GPS Spoofing using Off-the-shelf Chipset
    Shinan Liu*, Xiang Cheng*, Hanchao Yang, Yuanchao Shu, Xiaoran Weng, Ping Guo, Kexiong (Curtis) Zeng, Gang Wang, Yaling Yang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. C PDF Website Code Data Artifact Evaluated
    (*Co-first authors with equal contribution)

  • Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps
    Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes
    Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)
    Hong Kong, June 2021. C PDF

  • BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware
    Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Gang Wang
    Proceedings of Deep Learning and Security Workshop (DLS),
    in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)
    May 2021. W PDF Data

  • FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
    Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant Honavar, Gang Wang, Xinyu Xing
    Proceedings of The Network and Distributed System Security Symposium (NDSS)
    Virtual Conference, February 2021. C PDF

2020
  • VerHealth: Vetting Medical Voice Applications through Policy Enforcement
    Faysal Hossain Shezan, Hang Hu, Gang Wang, Yuan Tian
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
    December 2020. C PDF

  • Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
    Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
    Proceedings of The 29th USENIX Security Symposium (USENIX Security)
    Boston, MA, August 2020. C PDF Data Artifact Evaluated

  • Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation
    Steve T.K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang, Bimal Viswanath
    Proceedings of The 41st IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2020. C PDF Video

  • A Case Study of the Security Vetting Process of Smart-home Assistant Applications
    Hang Hu, Limin Yang, Shihan Lin, Gang Wang
    Proceedings of IEEE Workshop on the Internet of Safe Things (SafeThings),
    in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2020. W PDF

  • Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
    Faysal Hossain Shezan, Hang Hu, Jiamin Wang, Gang Wang, Yuan Tian
    Proceedings of The Web Conference (WWW)
    Taipei, April 2020. C PDF Data

  • Linking Multiple User Identities of Multiple Services from Massive Mobility Traces
    Huandong Wang, Yong Li, Gang Wang, Depeng Jin
    ACM Transactions on Intelligent Systems and Technology (TIST), 2020. J PDF

  • On Migratory Behavior in Video Consumption
    Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
    IEEE Transactions on Network and Service Management (TNSM), 2020. J PDF

2019
  • Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations
    Sazzadur Rahaman, Gang Wang, Danfeng Yao
    Proceedings of The 26th ACM Conference on Computer and Communications Security (CCS)
    London, UK, November 2019. C PDF Code CSAW ’20 Applied Research Competition Finalist

  • Errors, Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of Ad-blocking Systems
    Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang
    Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
    Amsterdam, Netherlands, October 2019. C PDF

  • Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
    Peng Peng, Limin Yang, Linhai Song, Gang Wang
    Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
    Amsterdam, Netherlands, October 2019. C PDF

  • What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites
    Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang
    Proceedings of The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS)
    Auckland, New Zeland, July 2019. C PDF

  • Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
    Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    Proceedings of The 28th USENIX Security Symposium (USENIX Security)
    Santa Clara, CA, August 2019. C PDF Data

  • Characterizing Pixel Tracking through the Lens of Disposable Email Services
    Hang Hu, Peng Peng, Gang Wang
    Proceedings of The 40th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2019. C PDF Video

  • Modeling Spatio-Temporal App Usage for a Large User Population
    Huandong Wang, Yong Li, Sihan Zeng, Gang Wang, Pengyu Zhang, Pan Hui, Depeng Jin
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
    March 2019. C PDF

  • Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks
    Steve T.K. Jan, Joseph Messou, Yen-Chen Lin, Jia-Bin Huang, Gang Wang
    Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)
    Honolulu, HI, January 2019. C PDF Website Spotlight

  • Towards Understanding the Adoption and Social Experience of Digital Wallet Systems
    Shiliang Tang, Ziming Wu, Xinyi Zhang, Gang Wang, Xiaojuan Ma, Haitao Zheng, Ben Y. Zhao
    Proceedings of Hawaii International Conference on System Sciences (HICSS)
    Maui HI, January 2019. C PDF

  • Anonymization and De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
    Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
    IEEE Transactions on Mobile Computing (TMC), 2019. J PDF Code

2018
  • Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild
    Ke Tian, Steve T.K. Jan, Hang Hu, Danfeng Yao, Gang Wang
    Proceedings of ACM Internet Measurement Conference (IMC)
    Boston, MA, October 2018. C PDF Code

  • LEMNA: Explaining Deep Learning based Security Applications
    Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing
    Proceedings of The 25th ACM Conference on Computer and Communications Security (CCS)
    Toronto, Canada, October 2018. C PDF Code Outstanding Paper Award

  • Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems
    Hang Hu, Peng Peng, Gang Wang
    Proceedings of The IEEE Cybersecurity Development Conference (SecDev)
    Cambridge, MA, October 2018. C PDF

  • Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints
    Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, Depeng Jin
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
    September 2018. C PDF IMWUT Distinguished Paper Award

  • End-to-End Measurements of Email Spoofing Attacks
    Hang Hu, Gang Wang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. C PDF

  • Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
    Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. C PDF Data

  • All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
    Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. C PDF

  • You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
    Xiangwen Wang, Peng Peng, Chun Wang, Gang Wang
    Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)
    Songdo, Incheon, Korea, June 2018. C PDF

  • You Are How You Move: Linking Multiple User Identities From Massive Mobility Traces
    Huandong Wang, Yong Li, Gang Wang, Depeng Jin
    Proceedings of The SIAM International Conference on Data Mining (SDM)
    San Diego, CA, May 2018. C PDF Code

  • The Next Domino To Fall: Empirical Analysis of User Passwords across Online Services
    Chun Wang, Steve T.K. Jan, Hang Hu, Douglas Bossart, Gang Wang.
    Proceedings of The ACM Conference on Data and Applications Security and Privacy (CODASPY)
    Tempe, AZ, March 2018 (short paper). C PDF Website

  • De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
    Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
    Proceedings of The 25th Annual Network And Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2018. C PDF Slides Code

  • Pay-per-Question: Towards Targeted Q&A with Payments
    Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang
    Proceedings of The ACM International Conference on Supporting Group Work (GROUP)
    Sanibel Island, FL, January 2018. C PDF

  • Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
    ACM/IEEE Transactions on Networking (TON), 2018. J PDF

  • Analyzing Payment-driven Targeted Q&A Systems.
    Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang
    ACM Transactions on Social Computing (TSC), 2018. J PDF

2017
  • Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
    Rupinder Paul Khandpur, Taoran Ji, Steve Jan, Gang Wang, Chang-Tien Lu, Naren Ramakrishnan
    Proceedings of The 26th ACM International Conference on Information and Knowledge Management (CIKM)
    Singapore, November 2017. C PDF

  • On Migratory Behavior in Video Consumption
    Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
    Proceedings of The 26th ACM International Conference on Information and Knowledge Management (CIKM)
    Singapore, November 2017. C PDF

  • A First Look: Using Linux Containers for Deceptive Honeypots
    Alexander Kedrowitsch, Danfeng Yao, Gang Wang, Kirk Cameron
    Proceedings of Applying the Scientific Method to Active Cyber Defense Research (SafeConfig),
    in conjunction with the ACM Conference on Computer and Communications Security (CCS)

    Dallas, USA, October 2017. W PDF

  • Measuring the Insecurity of Mobile Deep Links of Android
    Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
    Proceedings of The 26th USENIX Security Symposium (USENIX Security)
    Vancouver, Canada, August 2017. C PDF Slides Talk

  • Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System
    Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Montreal, Canada, May 2017. C PDF

  • A First Look at User Switching Behaviors Over Multiple Video Content Providers
    Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Montreal, Canada, May 2017 (short paper). C PDF

  • MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks
    Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder
    Proceedings of Mobile Security Technologies (MoST)
    in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)

    San Jose, CA, May 2017. W PDF

  • Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
    Amiangshu Bosu, Fang Liu, Danfeng Yao, Gang Wang
    Proceedings of ACM Asia Conference on Computer and Communications Security (ASIACCS)
    Abu Dhabi, UAE, April 2017. C PDF

  • Clickstream User Behavior Models
    Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, Ben Y. Zhao
    ACM Transactions on the Web (TWEB), 2017. J PDF

  • Value and Misinformation in Collaborative Investing Platforms
    Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao
    ACM Transactions on the Web (TWEB), 2017. J PDF

2016
  • Anatomy of a Personalized Livestreaming System
    Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC)
    Santa Monica, CA, November 2016. C PDF Dataset

  • Defending against Sybil Devices in Crowdsourced Mapping Services
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
    Singapore, June 2016. C PDF Video

  • "Will Check-in for Badges": Understanding Bias and Misbehavior on Location-based Social Networks
    Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Cologne, Germany, May 2016. C PDF Slides

  • Unsupervised Clickstream Clustering For User Behavior Analysis
    Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao
    Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI)
    San Jose, CA, May 2016. C PDF Slides Video Website

2015
  • Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
    Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
    Vancouver, BC, Canada, March 2015. C PDF Slides

  • The Power of Comments: Fostering Social Interactions in Microblog Networks
    Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao
    Springer Frontiers of Computer Science (FCS), 2015. J PDF

2014
  • Whispers in the Dark: Analysis of an Anonymous Social Network 
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao 
    Proceedings of Internet Measurement Conference (IMC) 
    Vancouver, BC, Canada, November 2014. C PDF Slides

  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
    Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    San Diego, CA, August 2014. C PDF Slides Video

  • Practical Conflict Graphs in the Wild
    Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng 
    ACM Transactions on Networking (TON), 2014. J PDF

2013
  • On the Validity of Geosocial Mobility Traces
    Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam Metzger, Haitao Zheng, Ben Y. Zhao 
    Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-XII)
    College Park, MD, November, 2013. W PDF

  • Follow the Green: Growth and Dynamics in Twitter Follower Markets 
    Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao 
    Proceedings of Internet Measurement Conference (IMC) 
    Barcelona, Spain, October 2013. C PDF

  • You are How You Click: Clickstream Analysis for Sybil Detection 
    Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    Washington, DC, August 2013. C PDF Slides

  • Detecting Malicious Landing Pages in Malware Distribution Networks 
    Gang Wang, Jack Stokes, Cormac Herley, David Felstead 
    Proceedings of Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
    Budapest, Hungary, June 2013. C PDF

  • Practical Conflict Graphs for Dynamic Spectrum Distribution
    Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng 
    Proceedings ofACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS)
    Pittsburgh, PA, June 2013. C PDF Best Practical Paper Award

  • Wisdom in the Social Crowd: an Analysis of Quora 
    Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao 
    Proceedings of International World Wide Web Conference (WWW) 
    Rio de Janeiro, Brazil, May 2013. C PDF Slides

  • Social Turing Tests: Crowdsourcing Sybil Detection
    Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
    Proceedings of Annual Network Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2013. C PDF Slides

2012
  • Serf and Turf: Crowdturfing for Fun and Profit
    Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
    Proceedings of International World Wide Web Conference (WWW)
    Lyon, France, April 2012. C PDF Slides

2011
  • I am the Antenna: Accurate Outdoor AP Location using Smartphone
    Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng
    Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom)
    Las Vegas, NV, September 2011. C PDF

  • Privacy, Availability and Economics in the Polaris Mobile Social Network
    Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM Workshop on Mobile Computing Systems and Applications (HotMobile)
    Phoenix, AZ, March 2011. W PDF

2009
  • Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System
    Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li
    Proceedings of International Workshop on Peer-To-Peer Networking (P2PNet)
    St.-Petersburg, Russia, 2009. W PDF

  • Real-Time Detection of Network Threats Using a Graph-Based Model
    Akul Goyal, Adam Bates, Gang Wang
    Filed by UIUC (UIUC2023-220-01, 24-0156-US-PRO), IP Disclosure: 03/21/2024.

  • A Method to Detect Web Bots with Limited Data Using Neural Networks
    Bimal Viswanath, Arik Hadass, Sonal Oswal, Jiameng Pu, Tianrui Hu, Gang Wang, Steve Jan, Qingying Hao
    Filed by VTIP. IP Disclosure: 02/04/2020. # VTIP 20-061.

  • A Low-Cost GPS Spoofing Detector and Spoofer Localizer
    Yaling Yang, Shinan Liu, Gang Wang
    Filed by VTIP. IP Disclosure: 03/03/2020. # VTIP 20-070. U.S. Patent Application No. 63/047,085.

  • GPS Spoofing Tool to Road Navigation System
    Yaling Yang, Yuancao Shu, Shinan Liu, Gang Wang, Kexiong Zeng
    Filed by VTIP. IP Disclosure: 09/12/2018. # VTIP 19-026.

  • Identifying Web Pages In Malware Distribution Networks
    Gang Wang, Jack Stokes, Cormac Herley, David Felstead
    Filed by Microsoft Corporation; Published on 07/03/2014; US 2014/0189864 A1. PDF

  • Explaining Deep Learning Based Security Applications
    Wenbo Guo, Jun Xu, Gang Wang, Xinyu Xing
    In: Wang, C., Iyengar, S., Sun, K. (eds) Embedded Assurance for Cyber Systems, 2023. Springer, Cham. DOI Link

  • How do Endpoint Detection Products Make Use of MITRE ATT&CK?
    The 44th IEEE Symposium on Security and Privacy (IEEE SP), San Francisco, CA, May 2023. PDF

  • Demonstration: Benchmarking Label Dynamics of VirusTotal Engines
    ACM Conference on Computer and Communications Security (CCS), Virtual Conference, November 2020. PDF

  • Inferring Venue Visits from GPS Trajectories
    ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (SIGSPATIAL), Redondo Beach, CA, November 2017. PDF

  • Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset
    IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, April, 2017. PDF

  • Prioritized Analysis of Inter-App Communication Risks
    ACM Conference on Data and Applications Security (CODASPY), Scottsdale, AZ, March, 2017. PDF

  • Understanding and Defending Against Malicious Crowdsourcing
    SaTC PI Meeting, Washington, WA, January, 2015. PDF

  • Characterizing and Detecting Malicious Crowdsourcing
    Workshop of ACM SIGCOMM, Hong Kong, China, August, 2013. PDF

  • I am the Antenna: Accurate Outdoor AP Location using Smartphone
    Future of Mobile Workshop at Google, Mountain View, CA, May, 2012. PDF

  • Measurement-calibrated Conflict Graphs for Dynamic Spectrum Distribution
    2012 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Bellevue, WA, October, 2012. PDF

  • Polaris, A Distributed Online Social Network
    Engineering Insights Conference, UCSB, April, 2011. PDF

  • Human Factors in Secure and Non-Abusive Machine Learning Systems
    PhD Dissertation, Jaron Mink, UIUC, July 2024.

  • Beyond Rules: Leveraging Large Language Models for Code-Data Separation in Binary Disassembly
    MS Thesis, Nirav Diwan, UIUC, May 2024.

  • Measuring Concept Drift in Malware and Network Intrusion Detection Models
    MS Thesis, Zhenning Zhang, UIUC, May 2024.

  • Machine Learning for Security Applications Under Dynamic and Adversarial Environments
    PhD Dissertation, Limin Yang, UIUC, July 2023.

  • VeriSMS: A Message Verification System for Inclusive and Trusted Patient Outreach
    MS Thesis, Nicholas Wang, UIUC, May 2023.

  • Surveying Face Liveness Detection in the Deepfake Era
    MS Thesis, Licheng Luo, UIUC, May 2022.

  • An Analysis of Screen Reader Users' Susceptibility to Phishing
    Senior Thesis, Saidivya Ashok, UIUC, May 2021.

  • Empirically Understanding the Global Impact of Migration to DNS-over-HTTPS
    MS Thesis, Rishabh Chhabra, UIUC, May 2021.

  • Robustifying Machine Learning based Security Applications
    PhD Dissertation, Steve T.K. Jan, Virginia Tech, August 2020.

  • Characterizing and Detecting Online Deception via Data-Driven Methods
    PhD Dissertation, Hang Hu, Virginia Tech, May 2020.

  • Detecting Bots using Stream-based System with Data Synthesis
    MS Thesis, Tianrui Hu, Virginia Tech, May 2020.

  • Defending Against GPS Spoofing by Analyzing Visual Cues
    MS Thesis, Chao Xu, Virginia Tech, May 2020.

  • Measuring the Functionality of Amazon Alexa and Google Home Applications
    MS Thesis, Jiamin Wang, Virginia Tech, January 2020.

  • A Measurement Approach to Understanding the Data Flow of Phishing from Attacker and Defender Perspectives
    MS Thesis, Peng Peng, Virginia Tech, December 2019.

  • Empirical Analysis of User Passwords across Online Services
    MS Thesis, Chun Wang, Virginia Tech, May 2018.

  • Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks
    MS Thesis, Xiangwen Wang, Virginia Tech, May 2018.

  • Combating Attacks and Abuse in Large Online Communities
    PhD Dissertation, Gang Wang, UC Santa Barbara, September 2016.