Haining Wang
Orcid: 0000-0002-4174-3009Affiliations:
- Virginia Tech, Department of Electrical and Computer Engineering, Arlington, VA, USA
- Virginia Tech, Department of Electrical and Computer Engineering, Blacksburg, VA, USA
- University of Delaware, Department of Electrical and Computer Engineering, Newark, DE, USA (2014 - 2019)
- College of William and Mary, Department of Computer Science, Williamsburg, VA, USA (2003 - 2014)
- University of Michigan, Ann Arbor, MI, USA (PhD 2003)
According to our database1,
Haining Wang
authored at least 242 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on ece.vt.edu
On csauthors.net:
Bibliography
2024
Sensors, April, 2024
IEEE Internet Things J., April, 2024
Sensors, March, 2024
Expert Syst. Appl., March, 2024
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports.
IEEE Trans. Dependable Secur. Comput., 2024
J. Comput. Secur., 2024
ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer.
CoRR, 2024
CoRR, 2024
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models.
CoRR, 2024
CoRR, 2024
Pathfinder: Exploring Path Diversity for Assessing Internet Censorship Inconsistency.
CoRR, 2024
AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Comput. Networks, 2024
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method.
Proceedings of the Information Security - 27th International Conference, 2024
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
5G-WAVE: A Core Network Framework with Decentralized Authorization for Network Slices.
Proceedings of the IEEE INFOCOM 2024, 2024
Silent Observers Make a Difference: A Large-scale Analysis of Transparent Proxies on the Internet.
Proceedings of the IEEE INFOCOM 2024, 2024
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
OFDRA: Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs.
IEEE J. Sel. Areas Commun., December, 2023
iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement.
IEEE Internet Things J., August, 2023
IEEE Trans. Veh. Technol., May, 2023
IEEE Internet Things J., April, 2023
A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes.
CoRR, 2023
Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Proceedings of the Silicon Valley Cybersecurity Conference, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
2022
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Comput. Networks, 2022
An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.
Comput. Ind., 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the IEEE Latin-American Conference on Communications, 2022
Proceedings of the IEEE Latin-American Conference on Communications, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks.
IEEE/ACM Trans. Netw., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Cloud Comput., 2021
Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements.
Proc. ACM Meas. Anal. Comput. Syst., 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
EAI Endorsed Trans. Security Safety, 2019
Towards passive analysis of anycast in global routing: unintended impact of remote peering.
Comput. Commun. Rev., 2019
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019
Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IEEE Internet Things J., 2018
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
ACM Trans. Web, 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
EAI Endorsed Trans. Security Safety, 2017
Comput. Commun. Rev., 2017
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Wirel. Commun., 2016
IEEE Trans. Parallel Distributed Syst., 2016
ACM Trans. Inf. Syst. Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 7th International Conference on Multimedia Systems, 2016
A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016
HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud.
IEEE/ACM Trans. Netw., 2015
IEEE Trans. Computers, 2015
E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service.
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 29th Large Installation System Administration Conference, 2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IEEE Internet Things J., 2014
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment.
Proceedings of the 10th International Conference on Network and Service Management, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
ACM Trans. Web, 2013
IEEE J. Sel. Areas Commun., 2013
Comput. Networks, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the Middleware 2012, 2012
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
PowerTracer: tracing requests in multi-tier services to diagnose energy inefficiency.
Proceedings of the 9th International Conference on Autonomic Computing, 2012
Understanding performance implications of nested file systems in a virtualized environment.
Proceedings of the 10th USENIX conference on File and Storage Technologies, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
IEEE/ACM Trans. Netw., 2011
Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification.
IEEE/ACM Trans. Netw., 2011
IEEE Trans. Dependable Secur. Comput., 2011
Concurr. Comput. Pract. Exp., 2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
ACM Trans. Internet Techn., 2010
PowerTracer: Tracing requests in multi-tier services to save cluster power consumption
CoRR, 2010
Proceedings of the 18th International Workshop on Quality of Service, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
J. Netw. Comput. Appl., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Proceedings of the 23rd Large Installation System Administration Conference, 2009
Proceedings of the 17th International Workshop on Quality of Service, 2009
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IEEE Trans. Parallel Distributed Syst., 2008
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007
IEEE/ACM Trans. Netw., 2007
IEEE Trans. Knowl. Data Eng., 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006
Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006
2005
IEEE/ACM Trans. Netw., 2005
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005
IEEE Multim., 2005
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications.
Proceedings of the Distributed Computing in Sensor Systems, 2005
2004
IEEE Trans. Dependable Secur. Comput., 2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
2003
IEEE Trans. Parallel Distributed Syst., 2003
Proceedings of the Quality of Service, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2002), 2002
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
2001
Proceedings of the IEEE International Conference on Communications, 2001
2000
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000
1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999