Shuang Hao

Orcid: 0000-0003-2756-6015

According to our database1, Shuang Hao authored at least 83 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Synthetic Data in AI: Challenges, Applications, and Ethical Implications.
CoRR, 2024

2023
HOFD: An Outdated Fact Detector for Knowledge Bases.
IEEE Trans. Knowl. Data Eng., October, 2023

BOHA: A High Performance VSLAM Backend Optimization Hardware Accelerator Using Recursive Fine-Grain H-Matrix Decomposition and Early-Computing With Approximate Linear Solver.
IEEE Trans. Circuits Syst. II Express Briefs, October, 2023

Development of a Lightweight Underwater Manipulator for Delicate Structural Repair Operations.
IEEE Robotics Autom. Lett., October, 2023

Popularity sensitive and domain-aware summarization for web tables.
Inf. Sci., April, 2023

Detecting and Measuring Security Risks of Hosting-Based Dangling Domains.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

NVP: A Flexible and Efficient Processor Architecture for Accelerating Diverse Computer Vision Tasks including DNN.
IEEE Trans. Circuits Syst. II Express Briefs, 2023

Semantic stereo visual SLAM toward outdoor dynamic environments based on ORB-SLAM2.
Ind. Robot, 2023

A fully actuated aerial manipulator system for industrial contact inspection applications.
Ind. Robot, 2023

A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
CoRR, 2023

A Gaze-based Bilateral Teleoperation Framework for a Team of Mobile Robots <sup>*</sup>.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2023

Vision-based Autonomous Detecting and Grasping Framework for the Fully-actuated Aerial Manipulator.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2023

Imputation of Missing Values in Training Data using Variational Autoencoder.
Proceedings of the 39th IEEE International Conference on Data Engineering, ICDE 2023, 2023

2022
Iteratively sampling scheme for stochastic optimization with variable number sample path.
Oper. Res. Lett., 2022

Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks.
KSII Trans. Internet Inf. Syst., 2022

Automatic index selection with learned cost estimator.
Inf. Sci., 2022

Analysis of the Evolution of the Relationship between the Urban Pattern and Economic Development in Guangdong Province Based on Coupled Multisource Data.
ISPRS Int. J. Geo Inf., 2022

Common Postzygotic Mutational Signatures in Healthy Adult Tissues Related to Embryonic Hypoxia.
Genom. Proteom. Bioinform., 2022

A Model-Agnostic Approach for Learning with Noisy Labels of Arbitrary Distributions.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

SmartIndex: An Index Advisor with Learned Cost Estimator.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Mis-categorized entities detection.
VLDB J., 2021

Segmentation Scale Effect Analysis in the Object-Oriented Method of High-Spatial-Resolution Image Classification.
Sensors, 2021

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Proceedings of the 29th USENIX Security Symposium, 2020

Attributing and Detecting Fake Images Generated by Known GANs.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

CDN Judo: Breaking the CDN DoS Protection with Itself.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

PocketView: A Concise and Informative Data Summarizer.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Outdated Fact Detection in Knowledge Bases.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

CDN Backfired: Amplification Attacks Based on HTTP Range Requests.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Understanding Promotion-as-a-Service on GitHub.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

A Deep Neural Network Model of Particle Thermal Radiation in Packed Bed.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Sliding Mode Control for a Surgical Teleoperation System via a Disturbance Observer.
IEEE Access, 2019

Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams.
Proceedings of the Security and Privacy in Communication Networks, 2019

An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
Proceedings of the Internet Measurement Conference, 2019

TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Casino royale: a deep exploration of illegal online gambling.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Distilling relations using knowledge bases.
VLDB J., 2018

Higher Order Support Vector Random Fields for Hyperspectral Image Classification.
ISPRS Int. J. Geo Inf., 2018

Cloud repository as a malicious service: challenge, identification and implication.
Cybersecur., 2018

AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps.
CoRR, 2018

Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Comput. Secur., 2018

Measuring Privacy Threats in China-Wide Mobile Networks.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018

Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

In rDNS We Trust: Revisiting a Common Data-Source's Reliability.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Semantic Segmentation of Aerial Image Using Fully Convolutional Network.
Proceedings of the Image and Graphics Technologies and Applications, 2018

Cleaning Your Wrong Google Scholar Entries.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Discovering Mis-Categorized Entities.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks.
Proceedings of the Computer Security, 2018

A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Signature-Based Trajectory Similarity Join.
IEEE Trans. Knowl. Data Eng., 2017

A Novel Cost-Based Model for Data Repairing.
IEEE Trans. Knowl. Data Eng., 2017

On the Privacy and Security of the Ultrasound Ecosystem.
Proc. Priv. Enhancing Technol., 2017

Analysis of mobile learning as an innovation in higher education: a comparative study of three countries.
Int. J. Mob. Learn. Organisation, 2017

Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.
CoRR, 2017

Something from Nothing (There): Collecting Global IPv6 Datasets from DNS.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017

Cleaning Relations Using Knowledge Bases.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Probabilistic logical approach for testing diagnosability of stochastic discrete event systems.
Eng. Appl. Artif. Intell., 2016

Characterizing Long-tail SEO Spam on Cloud Web Hosting Services.
Proceedings of the 25th International Conference on World Wide Web, 2016

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Drops for Stuff: An Analysis of Reshipping Mule Scams.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Highly survivable software defined synergistic IP+Optical Transport networks.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014

MassJoin: A mapreduce-based method for scalable string similarity joins.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

2013
Understanding the domain registration behavior of spammers.
Proceedings of the 2013 Internet Measurement Conference, 2013

2011
Monitoring the initial DNS behavior of malicious domains.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2009
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
Proceedings of the 18th USENIX Security Symposium, 2009

2006
Sensor Networks Routing via Bayesian Exploration.
Proceedings of the LCN 2006, 2006

Efficient and Density-Aware Routing for Wireless Sensor Networks.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

2005
Using Trust for Restricted Delegation in Grid Environments.
Proceedings of the Information Security Practice and Experience, 2005

A queue model to detect DDos attacks.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005


  Loading...