Gang Wang

Google Scholar
47 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/soups
Can You Walk Me Through It? Explainable SMS Phishing Detection using LLM-based Agents.
2025
conf/uss
SoK: Towards Effective Automated Vulnerability Repair.
2025
conf/uss
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability.
2024
conf/uss
How does Endpoint Detection use the MITRE ATT&CK Framework?
2024
conf/uss
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors.
2024
conf/uss
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
2023
conf/uss
AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
2023
conf/uss
How to Cover up Anomalous Accesses to Electronic Health Records.
2023
conf/ndss
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
2022
conf/uss
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.
2022
conf/ndss
An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
2021
conf/uss
CADE: Detecting and Explaining Concept Drift Samples for Security Applications.
2021
conf/uss
Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset.
2021
conf/uss
Assessing Browser-level Defense against IDN-based Phishing.
2021
conf/uss
Double-Cross Attacks: Subverting Active Learning Systems.
2021
conf/ndss
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
2020
conf/uss
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.
2019
conf/uss
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
2018
conf/uss
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems.
2018
conf/uss
End-to-End Measurements of Email Spoofing Attacks.
Hang Hu Gang Wang
2018
conf/uss
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
2018
conf/ndss
De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice.
2017
conf/uss
Measuring the Insecurity of Mobile Deep Links of Android.
2014
conf/uss
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers.
2013
conf/uss
You Are How You Click: Clickstream Analysis for Sybil Detection.
2013
conf/ndss
Social Turing Tests: Crowdsourcing Sybil Detection.

Coauthors

Adam Bates (3)
Akul Goyal (2)
Alejandro Cuevas (1)
Alexander Withers (1)
Ali Ahmadzadeh (3)
Amiangshu Bosu (1)
Andres Pico (1)
Andy Riddle (1)
Apurva Virkud (1)
Arridhana Ciptadi (3)
Barbara G. Ryder (1)
Ben Y. Zhao (3)
Bimal Viswanath (2)
Bing Mao (1)
Bo Li (1)
Bomin Wei (1)
Boqin Qin (1)
Carl A. Gunter (1)
Chao Xu (1)
Chen Gao (1)
Chenkai Wang (2)
Chenkai Wang (1)
Chensheng Yu (1)
Christo Wilson (2)
Christopher W. Fletcher (1)
Chuhan Wang (1)
Chun Wang (2)
Constantin Adam (1)
Cormac Herley (1)
Danfeng (Daphne) Yao (1)
Danfeng Daphne Yao (1)
Danfeng Yao (2)
Daniel Votipka (1)
David Felstead (1)
David Hasani (1)
David M. Liebovitz (1)
Depeng Jin (1)
Dong Wang (1)
Dongliang Mu (3)
Duc Cuong Nguyen (1)
Fabio Pierazzi (2)
Fang Liu (3)
Faysal Hossain Shezan (2)
Feargus Pendlebury (2)
Gang Wang (47)
Giovanni Apruzzese (1)
Hadjer Benkraouda (2)
Haipeng Cai (1)
Haitao Zheng (3)
Haixin Duan (1)
Hanchao Yang (1)
Hang Hu (6)
Haoyu Li (1)
Haoyu Zhai (1)
Huandong Wang (1)
Ihar Laziuk (1)
Jack W. Stokes (1)
Jacopo Cortellazzi (2)
Jaron Mink (2)
Jason Liu (1)
Jiahao Yu (1)
Jiameng Pu (1)
Jianjun Chen (1)
Jianjun Shi (1)
Jingbo Sun (1)
Jonathan A. Handler (1)
Jose Rodrigo Sanchez Vicarte (1)
Jun Xu (1)
Junjie Liang (1)
Karim O. Elish (1)
Kevin Tu (1)
Kexiong Curtis Zeng (2)
Licheng Luo (2)
Limin Yang (10)
Linhai Song (2)
Lorenzo Cavallaro (2)
Luke Quinn (1)
Manish Mohanlal (1)
Mauro Conti (1)
Michael Backes (1)
Michael Schilling (1)
Minjun Long (1)
Miriam J. Metzger (1)
Muhammad Adil Inam (1)
Natã M. Barbosa (1)
Nick A. Cohen (1)
Nirav Diwan (2)
Olivia Figueira (1)
Peng Peng (3)
Phuong Cao (1)
Ping Guo (1)
Purui Su (1)
Qi Qin (1)
Qingying Hao (6)
Ravishankar K. Iyer (1)
Roopa Foulger (1)
Saidivya Ashok (1)
Sazzadur Rahaman (1)
Shihan Lin (1)
Shinan Liu (2)
Shuofei Zhu (2)
Smirity Kaushik (1)
Sonal Oswal (1)
Songyi Yang (1)
Sophia Liu (1)
Steve T. K. Jan (3)
Sushruth Booma (1)
Tianrui Hu (1)
Tianyi Wang (1)
Ting Wang (1)
Tongbo Luo (1)
Tristan Konolige (1)
Trung Tin Nguyen (1)
Vasant G. Honavar (1)
Wenbo Guo (5)
Xiang Cheng (1)
Xiangwen Wang (1)
Xiao Wang (2)
Xiaojun Xu (1)
Xiaoran Weng (1)
Xinyu Xing (7)
Xueyuan Han (1)
Yaling Yang (2)
Yaman Yu (1)
Yang Wang (3)
Yanzhi Dou (1)
Ying Dong (1)
Ying Li (1)
Ying Yuan (1)
Yizhu Wang (1)
Yong Li (1)
Yuan Tian (2)
Yuanchao Shu (2)
Yueqi Chen (2)
Yuhang Wu (1)
Yuqing Zhang (1)
Zbigniew Kalbarczyk (1)
Zeliang Kan (1)
Zhenning Zhang (2)
Zhenpeng Lin (1)
Zhi Chen (3)
Zhuolin Yang (1)
Ziyi Zhang (2)
Filters
Years:  to