The documents listed below have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
C Conference Proceeding | J Journal Article | W Workshop Proceeding
Errors, Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of Ad-blocking Systems
Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang
Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
Amsterdam, Netherlands, October 2019.
C
Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
Peng Peng, Limin Yang, Linhai Song, Gang Wang
Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
Amsterdam, Netherlands, October 2019.
C
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites
Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang
Proceedings of The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS)
Auckland, New Zeland, July 2019.
C
PDF
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
Proceedings of The 28th USENIX Security Symposium (USENIX Security)
Santa Clara, CA, August 2019.
C
PDF
Modeling Spatio-Temporal App Usage for a Large User Population
Huandong Wang, Yong Li, Sihan Zeng, Gang Wang, Pengyu Zhang, Pan Hui, Depeng Jin.
Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
London, UK, September 2019.
C
PDF
Characterizing Pixel Tracking through the Lens of Disposable Email Services
Hang Hu, Peng Peng, Gang Wang
Proceedings of The 40th IEEE Symposium on Security and Privacy (IEEE SP)
San Francisco, CA, May 2019.
C
PDF
Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks
Steve T.K. Jan, Joseph Messou, Yen-Chen Lin, Jia-Bin Huang, Gang Wang
Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)
Honolulu, HI, January 2019.
C
PDF
Website
Spotlight
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild
Ke Tian, Steve T.K. Jan, Hang Hu, Danfeng Yao, Gang Wang
Proceedings of ACM Internet Measurement Conference (IMC)
Boston, MA, October 2018.
C PDF
LEMNA: Explaining Deep Learning based Security Applications
Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing
Proceedings of The 25th ACM Conference on Computer and Communications Security (CCS)
Toronto, Canada, October 2018.
C
PDF
Outstanding Paper Award
Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints
Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, Depeng Jin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
Singapore, October 2018.
C
PDF
Towards Understanding the Adoption of Anti-Spoofing Protocols in Email Systems
Hang Hu, Peng Peng, Gang Wang
Proceedings of The IEEE Cybersecurity Development Conference (SecDev)
Cambridge, MA, October 2018.
C
PDF
End-to-End Measurements of Email Spoofing Attacks
Hang Hu, Gang Wang
Proceedings of The 27th USENIX Security Symposium (USENIX Security)
Baltimore, MD, August 2018.
C
PDF
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
Proceedings of The 27th USENIX Security Symposium (USENIX Security)
Baltimore, MD, August 2018.
C
PDF
Data
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
Proceedings of The 27th USENIX Security Symposium (USENIX Security)
Baltimore, MD, August 2018.
C
PDF
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces
Xiangwen Wang, Peng Peng, Chun Wang, Gang Wang
Proceedings of The ACM Asia Conference on Computer and Communications Security (ASIACCS)
Songdo, Incheon, Korea, June 2018.
C
PDF
You Are How You Move: Linking Multiple User Identities From Massive Mobility Traces
Huandong Wang, Yong Li, Gang Wang, Depeng Jin
Proceedings of The SIAM International Conference on Data Mining (SDM)
San Diego, CA, May 2018.
C
PDF
Code
The Next Domino To Fall: Empirical Analysis of User Passwords across Online Services
Chun Wang, Steve T.K. Jan, Hang Hu, Douglas Bossart, Gang Wang.
Proceedings of The ACM Conference on Data and Applications Security and Privacy (CODASPY)
Tempe, AZ, March 2018 (short paper).
C
PDF
Website
De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
Proceedings of The 25th Annual Network And Distributed System Security Symposium (NDSS)
San Diego, CA, February 2018.
C
PDF
Slides
Code
Pay-per-Question: Towards Targeted Q&A with Payments
Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang
Proceedings of The ACM International Conference on Supporting Group Work (GROUP)
Sanibel Island, FL, January 2018.
C
PDF
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
ACM/IEEE Transactions on Networking (TON), 2018.
J
PDF
Analyzing Payment-driven Targeted Q&A Systems.
Steve T. K. Jan, Chun Wang, Qing Zhang, Gang Wang
ACM Transactions on Social Computing (TSC), 2018.
J
PDF
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media
Rupinder Paul Khandpur, Taoran Ji, Steve Jan, Gang Wang, Chang-Tien Lu, Naren Ramakrishnan
Proceedings of The 26th ACM International Conference on Information and Knowledge Management (CIKM)
Singapore, November 2017.
C
PDF
On Migratory Behavior in Video Consumption
Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
Proceedings of The 26th ACM International Conference on Information and Knowledge Management (CIKM)
Singapore, November 2017.
C
PDF
A First Look: Using Linux Containers for Deceptive Honeypots
Alexander Kedrowitsch, Danfeng Yao, Gang Wang, Kirk Cameron
Proceedings of Applying the Scientific Method to Active Cyber Defense Research (SafeConfig),
in conjunction with the ACM Conference on Computer and Communications Security (CCS)
Dallas, USA, October 2017.
C
PDF
Measuring the Insecurity of Mobile Deep Links of Android
Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
Proceedings of The 26th USENIX Security Symposium (USENIX Security)
Vancouver, Canada, August 2017.
C
PDF
Slides
Talk
Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System
Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
Montreal, Canada, May 2017.
C
PDF
A First Look at User Switching Behaviors Over Multiple Video Content Providers
Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
Montreal, Canada, May 2017 (short paper).
C
PDF
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks
Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder
Proceedings of Mobile Security Technologies (MoST)
in conjunction with IEEE Symposium on Security and Privacy (IEEE SP)
San Jose, CA, May 2017.
W
PDF
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
Amiangshu Bosu, Fang Liu, Danfeng Yao, Gang Wang
Proceedings of ACM Asia Conference on Computer and Communications Security (ASIACCS)
Abu Dhabi, UAE, April 2017.
C
PDF
Clickstream User Behavior Models
Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, Ben Y. Zhao
ACM Transactions on the Web (TWEB), 2017.
J
PDF
Value and Misinformation in Collaborative Investing Platforms
Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao
ACM Transactions on the Web (TWEB), 2017.
J
PDF
Anatomy of a Personalized Livestreaming System
Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC)
Santa Monica, CA, November 2016.
C
PDF
Dataset
Defending against Sybil Devices in Crowdsourced Mapping Services
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
Singapore, June 2016.
C
PDF
Video
"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-based Social Networks
Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
Cologne, Germany, May 2016.
C
PDF
Slides
Unsupervised Clickstream Clustering For User Behavior Analysis
Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao
Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI)
San Jose, CA, May 2016.
C
PDF
Slides
Video
Website
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
Vancouver, BC, Canada, March 2015.
C
PDF
Slides
The Power of Comments: Fostering Social Interactions in Microblog Networks
Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao
Springer Frontiers of Computer Science (FCS), 2015.
J
PDF
Whispers in the Dark: Analysis of an Anonymous Social Network
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
Proceedings of Internet Measurement Conference (IMC)
Vancouver, BC, Canada, November 2014.
C
PDF
Slides
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao
Proceedings of USENIX Security Symposium (USENIX Security)
San Diego, CA, August 2014.
C
PDF
Slides
Video
Practical Conflict Graphs in the Wild
Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng
ACM Transactions on Networking (TON), 2014.
J
PDF
On the Validity of Geosocial Mobility Traces
Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-XII)
College Park, MD, November, 2013.
W
PDF
Follow the Green: Growth and Dynamics in Twitter Follower Markets
Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao
Proceedings of Internet Measurement Conference (IMC)
Barcelona, Spain, October 2013.
C
PDF
You are How You Click: Clickstream Analysis for Sybil Detection
Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao
Proceedings of USENIX Security Symposium (USENIX Security)
Washington, DC, August 2013.
C
PDF
Slides
Detecting Malicious Landing Pages in Malware Distribution Networks
Gang Wang, Jack Stokes, Cormac Herley, David Felstead
Proceedings of Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Budapest, Hungary, June 2013.
C
PDF
Practical Conflict Graphs for Dynamic Spectrum Distribution
Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng
Proceedings ofACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS)
Pittsburgh, PA, June 2013.
C
PDF
Best Practical Paper Award
Wisdom in the Social Crowd: an Analysis of Quora
Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
Proceedings of International World Wide Web Conference (WWW)
Rio de Janeiro, Brazil, May 2013.
C
PDF
Slides
Social Turing Tests: Crowdsourcing Sybil Detection
Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
Proceedings of Annual Network Distributed System Security Symposium (NDSS)
San Diego, CA, February 2013.
C
PDF
Slides
Serf and Turf: Crowdturfing for Fun and Profit
Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
Proceedings of International World Wide Web Conference (WWW)
Lyon, France, April 2012.
C
PDF
Slides
I am the Antenna: Accurate Outdoor AP Location using Smartphone
Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng
Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom)
Las Vegas, NV, September 2011.
C
PDF
Privacy, Availability and Economics in the Polaris Mobile Social Network
Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM Workshop on Mobile Computing Systems and Applications (HotMobile)
Phoenix, AZ, March 2011.
W
PDF
Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System
Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li
Proceedings of International Workshop on Peer-To-Peer Networking (P2PNet)
St.-Petersburg, Russia, 2009.
W
PDF
Identifying Web Pages In Malware Distribution Networks
Gang Wang, Jack Stokes, Cormac Herley, David Felstead
Filed by Microsoft Corporation; Published on 07/03/2014; Pattern# US 2014/0189864 A1.
PDF
Inferring Venue Visits from GPS Trajectories
ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (SIGSPATIAL),
Redondo Beach, CA, November 2017.
PDF
Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset
IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, April, 2017.
PDF
Prioritized Analysis of Inter-App Communication Risks
ACM Conference on Data and Applications Security (CODASPY), Scottsdale, AZ, March, 2017.
PDF
Understanding and Defending Against Malicious Crowdsourcing
SaTC PI Meeting, Washington, WA, January, 2015.
PDF
Characterizing and Detecting Malicious Crowdsourcing
Workshop of ACM SIGCOMM, Hong Kong, China, August, 2013.
PDF
I am the Antenna: Accurate Outdoor AP Location using Smartphone
Future of Mobile Workshop at Google, Mountain View, CA, May, 2012.
PDF
Measurement-calibrated Conflict Graphs for Dynamic Spectrum Distribution
2012 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Bellevue, WA, October, 2012.
Polaris, A Distributed Online Social Network
Engineering Insights Conference, UCSB, April, 2011.
PDF
Empirical Analysis of User Passwords across Online Services
MS Thesis, Chun Wang, Virginia Tech, May 2018.
PDF
Photo-based Vendor Re-identification on Darknet Marketplaces using Deep Neural Networks
MS Thesis, Xiangwen Wang, Virginia Tech, May 2018.
PDF
Combating Attacks and Abuse in Large Online Communities
PhD Thesis, Gang Wang, UC Santa Barbara, September 2016.
PDF