What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shuang Hao
Google Scholar
33
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Tong Zhu
Chaofan Shou
Zhen Huang
Guoxing Chen
Xiaokuan Zhang
Yan Meng
Shuang Hao
Haojin Zhu
2024
conf/uss
Double Face: Leveraging User Intelligence to Characterize and Recognize AI-synthesized Faces.
Matthew Joslin
Xian Wang
Shuang Hao
2024
conf/ndss
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
Hongsheng Hu
Shuo Wang
Jiamin Chang
Haonan Zhong
Ruoxi Sun
Shuang Hao
Haojin Zhu
Minhui Xue
2022
conf/ccs
Don't Kick Over the Beehive: Attacks and Security Analysis on Zigbee.
Xian Wang
Shuang Hao
2021
conf/ccs
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Suibin Sun
Le Yu
Xiaokuan Zhang
Minhui Xue
Ren Zhou
Haojin Zhu
Shuang Hao
Xiaodong Lin
2021
conf/uss
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Kaiwen Shen
Chuhan Wang
Minglei Guo
Xiaofeng Zheng
Chaoyi Lu
Baojun Liu
Yuxuan Zhao
Shuang Hao
Haixin Duan
Qingfeng Pan
Min Yang
2021
conf/ndss
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Chaoyi Lu
Baojun Liu
Yiming Zhang
Zhou Li
Fenglu Zhang
Haixin Duan
Ying Liu
Joann Qiongna Chen
Jinjin Liang
Zaifeng Zhang
Shuang Hao
Min Yang
2020
conf/ccs
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Mingming Zhang
Xiaofeng Zheng
Kaiwen Shen
Ziqiao Kong
Chaoyi Lu
Yu Wang
Haixin Duan
Shuang Hao
Baojun Liu
Min Yang
2020
conf/ccs
Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
Yiming Zhang
Baojun Liu
Chaoyi Lu
Zhou Li
Haixin Duan
Shuang Hao
Mingxuan Liu
Ying Liu
Dong Wang
Qiang Li
2020
conf/uss
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Xiaofeng Zheng
Chaoyi Lu
Jian Peng
Qiushi Yang
Dongjie Zhou
Baojun Liu
Keyu Man
Shuang Hao
Haixin Duan
Zhiyun Qian
2020
conf/sp
Attributing and Detecting Fake Images Generated by Known GANs.
Matthew Joslin
Shuang Hao
2020
conf/ndss
CDN Judo: Breaking the CDN DoS Protection with Itself.
Run Guo
Weizhong Li
Baojun Liu
Shuang Hao
Jia Zhang
Haixin Duan
Kaiwen Sheng
Jianjun Chen
Ying Liu
2020
conf/dsn
CDN Backfired: Amplification Attacks Based on HTTP Range Requests.
Weizhong Li
Kaiwen Shen
Run Guo
Baojun Liu
Jia Zhang
Haixin Duan
Shuang Hao
Xiarun Chen
Yao Wang
2020
conf/acsac
Understanding Promotion-as-a-Service on GitHub.
Kun Du
Hao Yang
Yubao Zhang
Haixin Duan
Haining Wang
Shuang Hao
Zhou Li
Min Yang
2019
conf/sp
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.
Matthew Joslin
Neng Li
Shuang Hao
Minhui Xue
Haojin Zhu
2019
conf/eurosp
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Baojun Liu
Zhou Li
Peiyuan Zong
Chaoyi Lu
Hai-Xin Duan
Ying Liu
Sumayah A. Alrwais
XiaoFeng Wang
Shuang Hao
Yaoqi Jia
Yiming Zhang
Kai Chen
Zaifeng Zhang
2019
conf/acsac
Casino royale: a deep exploration of illegal online gambling.
Hao Yang
Kun Du
Yubao Zhang
Shuang Hao
Zhou Li
Mingxuan Liu
Haining Wang
Hai-Xin Duan
Yazhou Shi
XiaoDong Su
Guang Liu
Zhifeng Geng
Jianping Wu
2018
journals/compsec
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Sen Chen
Minhui Xue
Lingling Fan
Shuang Hao
Lihua Xu
Haojin Zhu
Bo Li
2018
conf/uss
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.
Wei Meng
Chenxiong Qian
Shuang Hao
Kevin Borgolte
Giovanni Vigna
Christopher Kruegel
Wenke Lee
2018
conf/uss
Measuring Privacy Threats in China-Wide Mobile Networks.
Mingming Zhang
Baojun Liu
Chaoyi Lu
Jia Zhang
Shuang Hao
Hai-Xin Duan
2018
conf/uss
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Baojun Liu
Chaoyi Lu
Hai-Xin Duan
Ying Liu
Zhou Li
Shuang Hao
Min Yang
2018
conf/sp
Enumerating Active IPv6 Hosts for Large-Scale Security Scans via DNSSEC-Signed Reverse Zones.
Kevin Borgolte
Shuang Hao
Tobias Fiebig
Giovanni Vigna
2018
conf/esorics
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks.
Wenhao Wang
Benjamin Ferrell
Xiaoyang Xu
Kevin W. Hamlen
Shuang Hao
2018
conf/ndss
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Haizhong Zheng
Minhui Xue
Hao Lu
Shuang Hao
Haojin Zhu
Xiaohui Liang
Keith W. Ross
2018
conf/ndss
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Kevin Borgolte
Tobias Fiebig
Shuang Hao
Christopher Kruegel
Giovanni Vigna
2018
conf/dsn
A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
Baojun Liu
Chaoyi Lu
Zhou Li
Ying Liu
Hai-Xin Duan
Shuang Hao
Zaifeng Zhang
2017
journals/popets
On the Privacy and Security of the Ultrasound Ecosystem.
Vasilios Mavroudis
Shuang Hao
Yanick Fratantonio
Federico Maggi
Christopher Kruegel
Giovanni Vigna
2017
conf/ccs
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Cheng Huang
Shuang Hao
Luca Invernizzi
Jiayong Liu
Yong Fang
Christopher Kruegel
Giovanni Vigna
2017
conf/ccs
DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Jake Corina
Aravind Machiry
Christopher Salls
Yan Shoshitaishvili
Shuang Hao
Christopher Kruegel
Giovanni Vigna
2016
conf/ccs
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Shuang Hao
Alex Kantchelian
Brad Miller
Vern Paxson
Nick Feamster
2016
conf/ccs
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Xiaojing Liao
Sumayah A. Alrwais
Kan Yuan
Luyi Xing
XiaoFeng Wang
Shuang Hao
Raheem A. Beyah
2015
conf/ccs
Drops for Stuff: An Analysis of Reshipping Mule Scams.
Shuang Hao
Kevin Borgolte
Nick Nikiforakis
Gianluca Stringhini
Manuel Egele
Michael Eubanks
Brian Krebs
Giovanni Vigna
2009
conf/uss
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine.
Shuang Hao
Nadeem Ahmed Syed
Nick Feamster
Alexander G. Gray
Sven Krasser
Coauthors
Alex Kantchelian
(1)
Alexander G. Gray
(1)
Aravind Machiry
(1)
Baojun Liu
(11)
Benjamin Ferrell
(1)
Bo Li
(1)
Brad Miller
(1)
Brian Krebs
(1)
Chaofan Shou
(1)
Chaoyi Lu
(9)
Cheng Huang
(1)
Chenxiong Qian
(1)
Christopher Kruegel
(5)
Christopher Salls
(1)
Chuhan Wang
(1)
Dong Wang
(1)
Dongjie Zhou
(1)
Federico Maggi
(1)
Fenglu Zhang
(1)
Gianluca Stringhini
(1)
Giovanni Vigna
(7)
Guang Liu
(1)
Guoxing Chen
(1)
Hai-Xin Duan
(5)
Haining Wang
(2)
Haixin Duan
(8)
Haizhong Zheng
(1)
Hao Lu
(1)
Hao Yang
(2)
Haojin Zhu
(6)
Haonan Zhong
(1)
Hongsheng Hu
(1)
Jake Corina
(1)
Jia Zhang
(3)
Jiamin Chang
(1)
Jian Peng
(1)
Jianjun Chen
(1)
Jianping Wu
(1)
Jiayong Liu
(1)
Jinjin Liang
(1)
Joann Qiongna Chen
(1)
Kai Chen
(1)
Kaiwen Shen
(3)
Kaiwen Sheng
(1)
Kan Yuan
(1)
Keith W. Ross
(1)
Kevin Borgolte
(4)
Kevin W. Hamlen
(1)
Keyu Man
(1)
Kun Du
(2)
Le Yu
(1)
Lihua Xu
(1)
Lingling Fan
(1)
Luca Invernizzi
(1)
Luyi Xing
(1)
Manuel Egele
(1)
Matthew Joslin
(3)
Michael Eubanks
(1)
Min Yang
(5)
Minglei Guo
(1)
Mingming Zhang
(2)
Mingxuan Liu
(2)
Minhui Xue
(5)
Nadeem Ahmed Syed
(1)
Neng Li
(1)
Nick Feamster
(2)
Nick Nikiforakis
(1)
Peiyuan Zong
(1)
Qiang Li
(1)
Qingfeng Pan
(1)
Qiushi Yang
(1)
Raheem A. Beyah
(1)
Ren Zhou
(1)
Run Guo
(2)
Ruoxi Sun
(1)
Sen Chen
(1)
Shuang Hao
(33)
Shuo Wang
(1)
Suibin Sun
(1)
Sumayah A. Alrwais
(2)
Sven Krasser
(1)
Tobias Fiebig
(2)
Tong Zhu
(1)
Vasilios Mavroudis
(1)
Vern Paxson
(1)
Wei Meng
(1)
Weizhong Li
(2)
Wenhao Wang
(1)
Wenke Lee
(1)
Xian Wang
(2)
Xiaodong Lin
(1)
XiaoDong Su
(1)
XiaoFeng Wang
(2)
Xiaofeng Zheng
(3)
Xiaohui Liang
(1)
Xiaojing Liao
(1)
Xiaokuan Zhang
(2)
Xiaoyang Xu
(1)
Xiarun Chen
(1)
Yan Meng
(1)
Yan Shoshitaishvili
(1)
Yanick Fratantonio
(1)
Yao Wang
(1)
Yaoqi Jia
(1)
Yazhou Shi
(1)
Yiming Zhang
(3)
Ying Liu
(6)
Yong Fang
(1)
Yu Wang
(1)
Yubao Zhang
(2)
Yuxuan Zhao
(1)
Zaifeng Zhang
(3)
Zhen Huang
(1)
Zhifeng Geng
(1)
Zhiyun Qian
(1)
Zhou Li
(7)
Ziqiao Kong
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to