Gang Wang

Orcid: 0000-0002-8910-8979

Affiliations:
  • University of Illinois at Urbana-Champaign, IL, USA
  • Virginia Tech, Blacksburg, Department of Computer Science, VA, USA (former)
  • University of California, Santa Barbara, CA, USA (former)


According to our database1, Gang Wang authored at least 119 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs.
CoRR, 2024

"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages.
Proceedings of the ACM on Web Conference 2024, 2024

True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Proceedings of the 33rd USENIX Security Symposium, 2024

How does Endpoint Detection use the MITRE ATT&CK Framework?
Proceedings of the 33rd USENIX Security Symposium, 2024

It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors.
Proceedings of the 33rd USENIX Security Symposium, 2024

R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles on User Perception towards Disinformation.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
SenRev: Measurement of Personal Information Disclosure in Online Health Communities.
Proc. Priv. Enhancing Technol., July, 2023

Explaining Why Fake Photos are Fake: Does It Work?
Proc. ACM Hum. Comput. Interact., 2023

AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

How to Cover up Anomalous Accesses to Electronic Health Records.
Proceedings of the 32nd USENIX Security Symposium, 2023

Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
Beyond Bot Detection: Combating Fraudulent Online Survey Takers✱.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Casing the Vault: Security Analysis of Vault Applications.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Research on Electromagnetic Spectrum Management and Control System of Launch Site Based on Big Data.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022

2021
On Migratory Behavior in Video Consumption.
IEEE Trans. Netw. Serv. Manag., 2021

Anonymization and De-Anonymization of Mobility Trajectories: Dissecting the Gaps Between Theory and Practice.
IEEE Trans. Mob. Comput., 2021

Linking Multiple User Identities of Multiple Services from Massive Mobility Traces.
ACM Trans. Intell. Syst. Technol., 2021

Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

CADE: Detecting and Explaining Concept Drift Samples for Security Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Double-Cross Attacks: Subverting Active Learning Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset.
Proceedings of the 30th USENIX Security Symposium, 2021

Assessing Browser-level Defense against IDN-based Phishing.
Proceedings of the 30th USENIX Security Symposium, 2021

BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware.
Proceedings of the IEEE Security and Privacy Workshops, 2021

FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

MLHat: Deployable Machine Learning for Security Defense.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Measuring DNS-over-HTTPS performance around the world.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
VerHealth: Vetting Medical Voice Applications through Policy Enforcement.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies.
CoRR, 2020

Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.
Proceedings of the 29th USENIX Security Symposium, 2020

Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A Case Study of the Security Vetting Process of Smart-home Assistant Applications.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Benchmarking Label Dynamics of VirusTotal Engines.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Modeling Spatio-Temporal App Usage for a Large User Population.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Proceedings of the 28th USENIX Security Symposium, 2019

Characterizing Pixel Tracking through the Lens of Disposable Email Services.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines.
Proceedings of the Internet Measurement Conference, 2019

Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
Proceedings of the Internet Measurement Conference, 2019

Towards Understanding the Adoption and Social Experience of Digital Wallet Systems.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Analyzing Payment-Driven Targeted Q8A Systems.
ACM Trans. Soc. Comput., 2018

Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services.
IEEE/ACM Trans. Netw., 2018

Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Revisiting Email Spoofing Attacks.
CoRR, 2018

All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems.
Proceedings of the 27th USENIX Security Symposium, 2018

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

End-to-End Measurements of Email Spoofing Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

You Are How You Move: Linking Multiple User Identities From Massive Mobility Traces.
Proceedings of the 2018 SIAM International Conference on Data Mining, 2018

De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild.
Proceedings of the Internet Measurement Conference 2018, 2018

Pay-per-Question: Towards Targeted Q&A with Payments.
Proceedings of the 2018 ACM Conference on Supporting Groupwork, 2018

The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

LEMNA: Explaining Deep Learning based Security Applications.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Clickstream User Behavior Models.
ACM Trans. Web, 2017

Value and Misinformation in Collaborative Investing Platforms.
ACM Trans. Web, 2017

Towards the Adoption of Anti-spoofing Protocols for Email Systems.
CoRR, 2017

Empirical Analysis of Password Reuse and Modification across Online Service.
CoRR, 2017

Analyzing Payment Based Question and Answering Service.
CoRR, 2017

Measuring the Insecurity of Mobile Deep Links of Android.
Proceedings of the 26th USENIX Security Symposium, 2017

MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

A First Look: Using Linux Containers for Deceptive Honeypots.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017

Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

A First Look at User Switching Behaviors Over Multiple Video Content Providers.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Inferring Venue Visits from GPS Trajectories.
Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2017

Prioritized Analysis of Inter-App Communication Risks.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

On Migratory Behavior in Video Consumption.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Combating Attacks and Abuse in Large Online Communities.
PhD thesis, 2016

The power of comments: fostering social interactions in microblog networks.
Frontiers Comput. Sci., 2016

Poster: Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Anatomy of a Personalized Livestreaming System.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Unsupervised Clickstream Clustering for User Behavior Analysis.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Practical Conflict Graphs in the Wild.
IEEE/ACM Trans. Netw., 2015

Attacks and Defenses in Crowdsourced Mapping Services.
CoRR, 2015

Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Crowds on Wall Street: Extracting Value from Social Investing Platforms.
CoRR, 2014

Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Whispers in the dark: analysis of an anonymous social network.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Wisdom in the social crowd: an analysis of quora.
Proceedings of the 22nd International World Wide Web Conference, 2013

You Are How You Click: Clickstream Analysis for Sybil Detection.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Practical conflict graphs for dynamic spectrum distribution.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Characterizing and detecting malicious crowdsourcing.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Social Turing Tests: Crowdsourcing Sybil Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Follow the green: growth and dynamics in twitter follower markets.
Proceedings of the 2013 Internet Measurement Conference, 2013

On the validity of geosocial mobility traces.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

Detecting malicious landing pages in Malware Distribution Networks.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Serf and turf: crowdturfing for fun and profit.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Measurement-calibrated conflict graphs for dynamic spectrum distribution.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2011
Privacy, availability and economics in the Polaris mobile social network.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

I am the antenna: accurate outdoor AP location using smartphones.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

2009
Experimental study on neighbor selection policy for Phoenix Network Coordinate system.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2006
Identity Matching Based on Probabilistic Relational Models.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2004
Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort).
J. Assoc. Inf. Sci. Technol., 2004

Crime Data Mining: A General Framework and Some Examples.
Computer, 2004

Automatically detecting deceptive criminal identities.
Commun. ACM, 2004

2003
CMedPort: A Cross-Regional Chinese Medical Portal.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003

Crime Data Mining: An Overview and Case Studies.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003


  Loading...