Seguir
Gang Wang
Título
Citado por
Citado por
Año
You are how you click: Clickstream analysis for sybil detection
G Wang, T Konolige, C Wilson, X Wang, H Zheng, BY Zhao
22nd USENIX security symposium (USENIX Security 13), 241-256, 2013
3972013
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3812018
Serf and turf: crowdturfing for fun and profit
G Wang, C Wilson, X Zhao, Y Zhu, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 21st international conference on World Wide Web, 679-688, 2012
3162012
Wisdom in the social crowd: an analysis of quora
G Wang, K Gill, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 22nd international conference on World Wide Web, 1341-1352, 2013
3062013
Unsupervised clickstream clustering for user behavior analysis
G Wang, X Zhang, S Tang, H Zheng, BY Zhao
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
3052016
Social Turing Tests: Crowdsourcing Sybil Detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, B Zhao
Proceedings of The 20th Annual Network & Distributed System Security …, 2013
2822013
Follow the green: growth and dynamics in twitter follower markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013
2452013
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers
G Wang, T Wang, H Zheng, BY Zhao
23rd USENIX Security Symposium, USENIX Association, 2014
2412014
All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems
KC Zeng, S Liu, Y Shu, D Wang, H Li, Y Dou, G Wang, Y Yang
27th USENIX security symposium (USENIX security 18), 1527-1544, 2018
2172018
I am the antenna: Accurate outdoor ap location using smartphones
Z Zhang, X Zhou, W Zhang, Y Zhang, G Wang, BY Zhao, H Zheng
Proceedings of the 17th annual international conference on Mobile computing …, 2011
2112011
Crowdsourcing cybersecurity: Cyber attack detection using social media
RP Khandpur, T Ji, S Jan, G Wang, CT Lu, N Ramakrishnan
Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017
1962017
{CADE}: Detecting and explaining concept drift samples for security applications
L Yang, W Guo, Q Hao, A Ciptadi, A Ahmadzadeh, X Xing, G Wang
30th USENIX Security Symposium (USENIX Security 21), 2327-2344, 2021
1842021
Measuring and modeling the label dynamics of online {Anti-Malware} engines
S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song, G Wang
29th USENIX Security Symposium (USENIX Security 20), 2361-2378, 2020
1742020
Towards the detection of inconsistencies in public security vulnerability reports
Y Dong, W Guo, Y Chen, X Xing, Y Zhang, G Wang
28th USENIX security symposium (USENIX Security 19), 869-885, 2019
1702019
Collusive data leak and more: Large-scale threat analysis of inter-app communications
A Bosu, F Liu, D Yao, G Wang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
1602017
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
1592018
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th annual international conference on mobile systems …, 2016
1512016
Opening the blackbox of virustotal: Analyzing online phishing scan engines
P Peng, L Yang, L Song, G Wang
Proceedings of the Internet Measurement Conference, 478-485, 2019
1502019
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference (IMC), 2014
1432014
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
1272018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20