The documents listed below have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Refereed Papers

  • Measuring the Insecurity of Mobile Deep Links
    Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
    Proceedings of The 26th USENIX Security Symposium (USENIX Security)
    Vancouver, Canada, August 2017.

  • Clickstream User Behavior Models
    Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, Ben Y. Zhao
    ACM Transactions on the Web (TWEB), 2017. PDF

  • Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System
    Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Montreal, Canada, May 2017. PDF

  • A First Look at User Switching Behaviors Over Multiple Video Content Providers
    Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Montreal, Canada, May 2017. PDF

  • MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks
    Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder
    Proceedings of Mobile Security Technologies, in conjunction with IEEE Symposium on Security and Privacy (MoST)
    San Jose, CA, May 2017. PDF

  • Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
    Amiangshu Bosu, Fang Liu, Danfeng Yao, Gang Wang
    Proceedings of ACM Asia Conference on Computer and Communications Security (AsiaCCS)
    Abu Dhabi, UAE, April 2017. PDF

  • Value and Misinformation in Collaborative Investing Platforms
    Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao
    ACM Transactions on the Web (TWEB), 2017. PDF

  • Anatomy of a Personalized Livestreaming System
    Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC)
    Santa Monica, CA, November 2016. PDF Dataset

  • Defending against Sybil Devices in Crowdsourced Mapping Services
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
    Singapore, June 2016. PDF Video

  • "Will Check-in for Badges": Understanding Bias and Misbehavior on Location-based Social Networks
    Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Cologne, Germany, May 2016. PDF Slides

  • Unsupervised Clickstream Clustering For User Behavior Analysis
    Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao
    Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI)
    San Jose, CA, May 2016. PDF Slides Video Website

  • The Power of Comments: Fostering Social Interactions in Microblog Networks
    Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao
    Springer Frontiers of Computer Science (FCS), 2016. PDF

  • Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
    Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
    Vancouver, BC, Canada, March 2015. PDF Slides Website

  • Whispers in the Dark: Analysis of an Anonymous Social Network 
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao 
    Proceedings of Internet Measurement Conference (IMC) 
    Vancouver, BC, Canada, November 2014. PDF Slides

  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
    Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    San Diego, CA, August 2014. PDF Slides Video

  • Practical Conflict Graphs in the Wild
    Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng 
    ACM Transactions on Networking (TON), 2014. PDF

  • On the Validity of Geosocial Mobility Traces
    Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam Metzger, Haitao Zheng, Ben Y. Zhao 
    Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-XII)
    College Park, MD, November, 2013. PDF

  • Follow the Green: Growth and Dynamics in Twitter Follower Markets 
    Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao 
    Proceedings of Internet Measurement Conference (IMC) 
    Barcelona, Spain, October 2013. PDF

  • You are How You Click: Clickstream Analysis for Sybil Detection 
    Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    Washington, DC, August 2013. PDF Slides

  • Detecting Malicious Landing Pages in Malware Distribution Networks 
    Gang Wang, Jack Stokes, Cormac Herley, David Felstead 
    Proceedings of Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
    Budapest, Hungary, June 2013. PDF

  • Practical Conflict Graphs for Dynamic Spectrum Distribution
    Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng 
    Proceedings ofACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS)
    Pittsburgh, PA, June 2013. PDF  Best Practical Paper Award

  • Wisdom in the Social Crowd: an Analysis of Quora 
    Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao 
    Proceedings of International World Wide Web Conference (WWW) 
    Rio de Janeiro, Brazil, May 2013. PDF Slides

  • Social Turing Tests: Crowdsourcing Sybil Detection
    Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
    Proceedings of Annual Network Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2013. PDF Slides

  • Serf and Turf: Crowdturfing for Fun and Profit
    Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
    Proceedings of International World Wide Web Conference (WWW)
    Lyon, France, April 2012. PDF Slides

  • I am the Antenna: Accurate Outdoor AP Location using Smartphone
    Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng
    Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom)
    Las Vegas, NV, September 2011. PDF

  • Privacy, Availability and Economics in the Polaris Mobile Social Network
    Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM Workshop on Mobile Computing Systems and Applications (HotMobile)
    Phoenix, AZ, March 2011. PDF

  • Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System
    Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li
    Proceedings of International Workshop on Peer-To-Peer Networking (P2PNet)
    St.-Petersburg, Russia, 2009. PDF Slides

  • Identifying Web Pages In Malware Distribution Networks
    Gang Wang, Jack Stokes, Cormac Herley, David Felstead
    Filed by Microsoft Corporation; Published on 07/03/2014; Pattern# US 2014/0189864 A1. PDF

  • Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset
    IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, April, 2017. PDF

  • Prioritized Analysis of Inter-App Communication Risks
    ACM Conference on Data and Applications Security (CODASPY), Scottsdale, AZ, March, 2017. PDF

  • Understanding and Defending Against Malicious Crowdsourcing
    SaTCPI, Washington, WA, January, 2015. PDF

  • Characterizing and Detecting Malicious Crowdsourcing
    Workshop of ACM SIGCOMM, Hong Kong, China, August, 2013. PDF

  • I am the Antenna: Accurate Outdoor AP Location using Smartphone
    Future of Mobile Workshop at Google, Mountain View, CA, May, 2012. PDF

  • Polaris, A Distributed Online Social Network
    Engineering Insights Conference, UCSB, April, 2011. PDF

  • Combating Attacks and Abuse in Large Online Communities
    PhD Thesis, UC Santa Barbara, September, 2016. PDF