Shuang Hao
Orcid: 0000-0003-2756-6015
According to our database1,
Shuang Hao
authored at least 83 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
IEEE Trans. Knowl. Data Eng., October, 2023
BOHA: A High Performance VSLAM Backend Optimization Hardware Accelerator Using Recursive Fine-Grain H-Matrix Decomposition and Early-Computing With Approximate Linear Solver.
IEEE Trans. Circuits Syst. II Express Briefs, October, 2023
Development of a Lightweight Underwater Manipulator for Delicate Structural Repair Operations.
IEEE Robotics Autom. Lett., October, 2023
Inf. Sci., April, 2023
Proc. ACM Meas. Anal. Comput. Syst., March, 2023
NVP: A Flexible and Efficient Processor Architecture for Accelerating Diverse Computer Vision Tasks including DNN.
IEEE Trans. Circuits Syst. II Express Briefs, 2023
Ind. Robot, 2023
A fully actuated aerial manipulator system for industrial contact inspection applications.
Ind. Robot, 2023
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
CoRR, 2023
A Gaze-based Bilateral Teleoperation Framework for a Team of Mobile Robots <sup>*</sup>.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2023
Vision-based Autonomous Detecting and Grasping Framework for the Fully-actuated Aerial Manipulator.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, ICDE 2023, 2023
2022
Iteratively sampling scheme for stochastic optimization with variable number sample path.
Oper. Res. Lett., 2022
Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks.
KSII Trans. Internet Inf. Syst., 2022
Analysis of the Evolution of the Relationship between the Urban Pattern and Economic Development in Guangdong Province Based on Coupled Multisource Data.
ISPRS Int. J. Geo Inf., 2022
Common Postzygotic Mutational Signatures in Healthy Adult Tissues Related to Embryonic Hypoxia.
Genom. Proteom. Bioinform., 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Segmentation Scale Effect Analysis in the Object-Oriented Method of High-Spatial-Resolution Image Classification.
Sensors, 2021
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Internet Measurement Conference, 2019
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
ISPRS Int. J. Geo Inf., 2018
Cybersecur., 2018
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps.
CoRR, 2018
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Comput. Secur., 2018
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Image and Graphics Technologies and Applications, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Analysis of mobile learning as an innovation in higher education: a comparative study of three countries.
Int. J. Mob. Learn. Organisation, 2017
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.
CoRR, 2017
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Probabilistic logical approach for testing diagnosability of stochastic discrete event systems.
Eng. Appl. Artif. Intell., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
2013
Proceedings of the 2013 Internet Measurement Conference, 2013
2011
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
2009
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
Proceedings of the 18th USENIX Security Symposium, 2009
2006
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006
2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005