The documents listed below have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Refereed Papers

C Conference Proceeding | J Journal Article | W Workshop Proceeding

2019
  • Errors, Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of Ad-blocking Systems
    Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang
    Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
    Amsterdam, Netherlands, October 2019. C

  • Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
    Peng Peng, Limin Yang, Linhai Song, Gang Wang
    Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
    Amsterdam, Netherlands, October 2019. C

  • What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites
    Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang
    Proceedings of The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS)
    Auckland, New Zeland, July 2019. C PDF

  • Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
    Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    Proceedings of The 28th USENIX Security Symposium (USENIX Security)
    Santa Clara, CA, August 2019. C PDF

  • Modeling Spatio-Temporal App Usage for a Large User Population
    Huandong Wang, Yong Li, Sihan Zeng, Gang Wang, Pengyu Zhang, Pan Hui, Depeng Jin.
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
    London, UK, September 2019. C PDF

  • Characterizing Pixel Tracking through the Lens of Disposable Email Services
    Hang Hu, Peng Peng, Gang Wang
    Proceedings of The 40th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2019. C PDF

  • Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks
    Steve T.K. Jan, Joseph Messou, Yen-Chen Lin, Jia-Bin Huang, Gang Wang
    Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)
    Honolulu, HI, January 2019. C PDF Website Spotlight

  • Towards Understanding the Adoption and Social Experience of Digital Wallet Systems
    Shiliang Tang, Ziming Wu, Xinyi Zhang, Gang Wang, Xiaojuan Ma, Haitao Zheng, Ben Y. Zhao
    Proceedings of Hawaii International Conference on System Sciences (HICSS)
    Maui HI, January 2019. C PDF
2018
  • Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild
    Ke Tian, Steve T.K. Jan, Hang Hu, Danfeng Yao, Gang Wang
    Proceedings of ACM Internet Measurement Conference (IMC)
    Boston, MA, October 2018. C PDF

  • LEMNA: Explaining Deep Learning based Security Applications
    Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing
    Proceedings of The 25th ACM Conference on Computer and Communications Security (CCS)
    Toronto, Canada, October 2018. C PDF Outstanding Paper Award

  • Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints
    Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, Depeng Jin
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
    Singapore, October 2018. C PDF

  • Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems
    Hang Hu, Peng Peng, Gang Wang
    Proceedings of The IEEE Cybersecurity Development Conference (SecDev)
    Cambridge, MA, October 2018. C PDF

  • End-to-End Measurements of Email Spoofing Attacks
    Hang Hu, Gang Wang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. C PDF

  • Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
    Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. C PDF Data

  • All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
    Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. C PDF

  • You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
    Xiangwen Wang, Peng Peng, Chun Wang, Gang Wang
    Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)
    Songdo, Incheon, Korea, June 2018. C PDF

  • You Are How You Move: Linking Multiple User Identities From Massive Mobility Traces
    Huandong Wang, Yong Li, Gang Wang, Depeng Jin
    Proceedings of The SIAM International Conference on Data Mining (SDM)
    San Diego, CA, May 2018. C PDF Code

  • The Next Domino To Fall: Empirical Analysis of User Passwords across Online Services
    Chun Wang, Steve T.K. Jan, Hang Hu, Douglas Bossart, Gang Wang.
    Proceedings of The ACM Conference on Data and Applications Security and Privacy (CODASPY)
    Tempe, AZ, March 2018 (short paper). C PDF Website

  • De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
    Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
    Proceedings of The 25th Annual Network And Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2018. C PDF Slides Code

  • Pay-per-Question: Towards Targeted Q&A with Payments
    Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang
    Proceedings of The ACM International Conference on Supporting Group Work (GROUP)
    Sanibel Island, FL, January 2018. C PDF

  • Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
    ACM/IEEE Transactions on Networking (TON), 2018. J PDF

  • Analyzing Payment-driven Targeted Q&A Systems.
    Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang
    ACM Transactions on Social Computing (TSC), 2018. J PDF

2017
  • Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
    Rupinder Paul Khandpur, Taoran Ji, Steve Jan, Gang Wang, Chang-Tien Lu, Naren Ramakrishnan
    Proceedings of The 26th ACM International Conference on Information and Knowledge Management (CIKM)
    Singapore, November 2017. C PDF

  • On Migratory Behavior in Video Consumption
    Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
    Proceedings of The 26th ACM International Conference on Information and Knowledge Management (CIKM)
    Singapore, November 2017. C PDF

  • A First Look: Using Linux Containers for Deceptive Honeypots
    Alexander Kedrowitsch, Danfeng Yao, Gang Wang, Kirk Cameron
    Proceedings of Applying the Scientific Method to Active Cyber Defense Research (SafeConfig),
    in conjunction with the ACM Conference on Computer and Communications Security (CCS)

    Dallas, USA, October 2017. C PDF

  • Measuring the Insecurity of Mobile Deep Links of Android
    Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
    Proceedings of The 26th USENIX Security Symposium (USENIX Security)
    Vancouver, Canada, August 2017. C PDF Slides Talk

  • Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System
    Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Montreal, Canada, May 2017. C PDF

  • A First Look at User Switching Behaviors Over Multiple Video Content Providers
    Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Montreal, Canada, May 2017 (short paper). C PDF

  • MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks
    Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder
    Proceedings of Mobile Security Technologies (MoST)
    in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)

    San Jose, CA, May 2017. W PDF

  • Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
    Amiangshu Bosu, Fang Liu, Danfeng Yao, Gang Wang
    Proceedings of ACM Asia Conference on Computer and Communications Security (ASIACCS)
    Abu Dhabi, UAE, April 2017. C PDF

  • Clickstream User Behavior Models
    Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, Ben Y. Zhao
    ACM Transactions on the Web (TWEB), 2017. J PDF

  • Value and Misinformation in Collaborative Investing Platforms
    Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao
    ACM Transactions on the Web (TWEB), 2017. J PDF

2016
  • Anatomy of a Personalized Livestreaming System
    Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC)
    Santa Monica, CA, November 2016. C PDF Dataset

  • Defending against Sybil Devices in Crowdsourced Mapping Services
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
    Singapore, June 2016. C PDF Video

  • "Will Check-in for Badges": Understanding Bias and Misbehavior on Location-based Social Networks
    Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Cologne, Germany, May 2016. C PDF Slides

  • Unsupervised Clickstream Clustering For User Behavior Analysis
    Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao
    Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI)
    San Jose, CA, May 2016. C PDF Slides Video Website

2015
  • Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
    Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
    Vancouver, BC, Canada, March 2015. C PDF Slides

  • The Power of Comments: Fostering Social Interactions in Microblog Networks
    Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao
    Springer Frontiers of Computer Science (FCS), 2015. J PDF

2014
  • Whispers in the Dark: Analysis of an Anonymous Social Network 
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao 
    Proceedings of Internet Measurement Conference (IMC) 
    Vancouver, BC, Canada, November 2014. C PDF Slides

  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
    Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    San Diego, CA, August 2014. C PDF Slides Video

  • Practical Conflict Graphs in the Wild
    Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng 
    ACM Transactions on Networking (TON), 2014. J PDF

2013
  • On the Validity of Geosocial Mobility Traces
    Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam Metzger, Haitao Zheng, Ben Y. Zhao 
    Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-XII)
    College Park, MD, November, 2013. W PDF

  • Follow the Green: Growth and Dynamics in Twitter Follower Markets 
    Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao 
    Proceedings of Internet Measurement Conference (IMC) 
    Barcelona, Spain, October 2013. C PDF

  • You are How You Click: Clickstream Analysis for Sybil Detection 
    Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    Washington, DC, August 2013. C PDF Slides

  • Detecting Malicious Landing Pages in Malware Distribution Networks 
    Gang Wang, Jack Stokes, Cormac Herley, David Felstead 
    Proceedings of Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
    Budapest, Hungary, June 2013. C PDF

  • Practical Conflict Graphs for Dynamic Spectrum Distribution
    Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng 
    Proceedings ofACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS)
    Pittsburgh, PA, June 2013. C PDF Best Practical Paper Award

  • Wisdom in the Social Crowd: an Analysis of Quora 
    Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao 
    Proceedings of International World Wide Web Conference (WWW) 
    Rio de Janeiro, Brazil, May 2013. C PDF Slides

  • Social Turing Tests: Crowdsourcing Sybil Detection
    Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
    Proceedings of Annual Network Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2013. C PDF Slides

2012
  • Serf and Turf: Crowdturfing for Fun and Profit
    Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
    Proceedings of International World Wide Web Conference (WWW)
    Lyon, France, April 2012. C PDF Slides

2011
  • I am the Antenna: Accurate Outdoor AP Location using Smartphone
    Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng
    Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom)
    Las Vegas, NV, September 2011. C PDF

  • Privacy, Availability and Economics in the Polaris Mobile Social Network
    Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM Workshop on Mobile Computing Systems and Applications (HotMobile)
    Phoenix, AZ, March 2011. W PDF

2009
  • Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System
    Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li
    Proceedings of International Workshop on Peer-To-Peer Networking (P2PNet)
    St.-Petersburg, Russia, 2009. W PDF

  • Identifying Web Pages In Malware Distribution Networks
    Gang Wang, Jack Stokes, Cormac Herley, David Felstead
    Filed by Microsoft Corporation; Published on 07/03/2014; Pattern# US 2014/0189864 A1. PDF

  • Inferring Venue Visits from GPS Trajectories
    ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (SIGSPATIAL), Redondo Beach, CA, November 2017. PDF

  • Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset
    IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, April, 2017. PDF

  • Prioritized Analysis of Inter-App Communication Risks
    ACM Conference on Data and Applications Security (CODASPY), Scottsdale, AZ, March, 2017. PDF

  • Understanding and Defending Against Malicious Crowdsourcing
    SaTC PI Meeting, Washington, WA, January, 2015. PDF

  • Characterizing and Detecting Malicious Crowdsourcing
    Workshop of ACM SIGCOMM, Hong Kong, China, August, 2013. PDF

  • I am the Antenna: Accurate Outdoor AP Location using Smartphone
    Future of Mobile Workshop at Google, Mountain View, CA, May, 2012. PDF

  • Measurement-calibrated Conflict Graphs for Dynamic Spectrum Distribution
    2012 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Bellevue, WA, October, 2012.

  • Polaris, A Distributed Online Social Network
    Engineering Insights Conference, UCSB, April, 2011. PDF

  • Empirical Analysis of User Passwords across Online Services
    MS Thesis, Chun Wang, Virginia Tech, May 2018. PDF

  • Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks
    MS Thesis, Xiangwen Wang, Virginia Tech, May 2018. PDF

  • Combating Attacks and Abuse in Large Online Communities
    PhD Thesis, Gang Wang, UC Santa Barbara, September 2016. PDF