Geng Hong

Orcid: 0000-0003-1811-9432

According to our database1, Geng Hong authored at least 8 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets.
Proceedings of the ACM on Web Conference 2024, 2024

2023
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Understanding and Detecting Abused Image Hosting Modules as Malicious Services.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Analyzing Ground-Truth Data of Mobile Gambling Scams.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2020
How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2018
Invetter: Locating Insecure Input Validations in Android Services.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018


  Loading...