Gang Wang
Orcid: 0000-0002-8910-8979Affiliations:
- University of Illinois at Urbana-Champaign, IL, USA
- Virginia Tech, Blacksburg, Department of Computer Science, VA, USA (former)
- University of California, Santa Barbara, CA, USA (former)
According to our database1,
Gang Wang
authored at least 119 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
"Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages.
Proceedings of the ACM on Web Conference 2024, 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles on User Perception towards Disinformation.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. Priv. Enhancing Technol., July, 2023
Proc. ACM Hum. Comput. Interact., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Research on Electromagnetic Spectrum Management and Control System of Launch Site Based on Big Data.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022
2021
Anonymization and De-Anonymization of Mobility Trajectories: Dissecting the Gaps Between Theory and Practice.
IEEE Trans. Mob. Comput., 2021
ACM Trans. Intell. Syst. Technol., 2021
Who Am I?: A Design Probe Exploring Real-Time Transparency about Online and Offline User Profiling Underlying Targeted Ads.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies.
CoRR, 2020
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Internet Measurement Conference, 2019
Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems.
Proceedings of the Internet Measurement Conference, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
IEEE/ACM Trans. Netw., 2018
Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
Proceedings of the 2018 SIAM International Conference on Data Mining, 2018
De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 2018 ACM Conference on Supporting Groupwork, 2018
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Frontiers Comput. Sci., 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks.
Proceedings of the Tenth International Conference on Web and Social Media, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012
2011
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011
2009
Experimental study on neighbor selection policy for Phoenix Network Coordinate system.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009
2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2004
Internet searching and browsing in a multilingual world: An experiment on the Chinese Business Intelligence Portal (CBizPort).
J. Assoc. Inf. Sci. Technol., 2004
2003
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003