What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Gang Wang
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
You Can't Judge a Binary by Its Header: Data-Code Separation for Non-Standard ARM Binaries Using Pseudo Labels.
Hadjer Benkraouda
Nirav Diwan
Gang Wang
2025
conf/soups
Can You Walk Me Through It? Explainable SMS Phishing Detection using LLM-based Agents.
Yizhu Wang
Haoyu Zhai
Chenkai Wang
Qingying Hao
Nick A. Cohen
Roopa Foulger
Jonathan A. Handler
Gang Wang
2025
conf/uss
SoK: Towards Effective Automated Vulnerability Repair.
Ying Li
Faysal Hossain Shezan
Bomin Wei
Gang Wang
Yuan Tian
2025
conf/uss
Email Spoofing with SMTP Smuggling: How the Shared Email Infrastructures Magnify this Vulnerability.
Chuhan Wang
Chenkai Wang
Songyi Yang
Sophia Liu
Jianjun Chen
Haixin Duan
Gang Wang
2024
conf/uss
How does Endpoint Detection use the MITRE ATT&CK Framework?
Apurva Virkud
Muhammad Adil Inam
Andy Riddle
Jason Liu
Gang Wang
Adam Bates
2024
conf/uss
It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors.
Qingying Hao
Nirav Diwan
Ying Yuan
Giovanni Apruzzese
Mauro Conti
Gang Wang
2024
conf/uss
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Limin Yang
Zhi Chen
Chenkai Wang
Zhenning Zhang
Sushruth Booma
Phuong Cao
Constantin Adam
Alexander Withers
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Gang Wang
2024
conf/sp
R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection.
Akul Goyal
Gang Wang
Adam Bates
2023
journals/popets
SenRev: Measurement of Personal Information Disclosure in Online Health Communities.
Faysal Hossain Shezan
Minjun Long
David Hasani
Gang Wang
Yuan Tian
2023
conf/uss
AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Jiahao Yu
Wenbo Guo
Qi Qin
Gang Wang
Ting Wang
Xinyu Xing
2023
conf/uss
How to Cover up Anomalous Accesses to Electronic Health Records.
Xiaojun Xu
Qingying Hao
Zhuolin Yang
Bo Li
David M. Liebovitz
Gang Wang
Carl A. Gunter
2023
conf/sp
Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers.
Limin Yang
Zhi Chen
Jacopo Cortellazzi
Feargus Pendlebury
Kevin Tu
Fabio Pierazzi
Lorenzo Cavallaro
Gang Wang
2023
conf/sp
Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.
Yaman Yu
Saidivya Ashok
Smirity Kaushik
Yang Wang
Gang Wang
2023
conf/sp
Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors.
Zhi Chen
Zhenning Zhang
Zeliang Kan
Limin Yang
Jacopo Cortellazzi
Feargus Pendlebury
Fabio Pierazzi
Lorenzo Cavallaro
Gang Wang
2023
conf/sp
Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.
Jaron Mink
Hadjer Benkraouda
Limin Yang
Arridhana Ciptadi
Ali Ahmadzadeh
Daniel Votipka
Gang Wang
2023
conf/ndss
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Akul Goyal
Xueyuan Han
Gang Wang
Adam Bates
2022
conf/uss
DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks.
Jaron Mink
Licheng Luo
Natã M. Barbosa
Olivia Figueira
Yang Wang
Gang Wang
2022
conf/ndss
An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
Dongliang Mu
Yuhang Wu
Yueqi Chen
Zhenpeng Lin
Chensheng Yu
Xinyu Xing
Gang Wang
2021
conf/ccs
It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications.
Qingying Hao
Licheng Luo
Steve T. K. Jan
Gang Wang
2021
conf/uss
CADE: Detecting and Explaining Concept Drift Samples for Security Applications.
Limin Yang
Wenbo Guo
Qingying Hao
Arridhana Ciptadi
Ali Ahmadzadeh
Xinyu Xing
Gang Wang
2021
conf/uss
Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset.
Shinan Liu
Xiang Cheng
Hanchao Yang
Yuanchao Shu
Xiaoran Weng
Ping Guo
Kexiong Curtis Zeng
Gang Wang
Yaling Yang
2021
conf/uss
Assessing Browser-level Defense against IDN-based Phishing.
Hang Hu
Steve T. K. Jan
Yang Wang
Gang Wang
2021
conf/uss
Double-Cross Attacks: Subverting Active Learning Systems.
Jose Rodrigo Sanchez Vicarte
Gang Wang
Christopher W. Fletcher
2021
conf/sp
BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware.
Limin Yang
Arridhana Ciptadi
Ihar Laziuk
Ali Ahmadzadeh
Gang Wang
2021
conf/asiaccs
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
Trung Tin Nguyen
Duc Cuong Nguyen
Michael Schilling
Gang Wang
Michael Backes
2021
conf/ndss
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Junjie Liang
Wenbo Guo
Tongbo Luo
Vasant G. Honavar
Gang Wang
Xinyu Xing
2020
conf/ccs
Benchmarking Label Dynamics of VirusTotal Engines.
Shuofei Zhu
Ziyi Zhang
Limin Yang
Linhai Song
Gang Wang
2020
conf/uss
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.
Shuofei Zhu
Jianjun Shi
Limin Yang
Boqin Qin
Ziyi Zhang
Linhai Song
Gang Wang
2020
conf/sp
A Case Study of the Security Vetting Process of Smart-home Assistant Applications.
Hang Hu
Limin Yang
Shihan Lin
Gang Wang
2020
conf/sp
Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation.
Steve T. K. Jan
Qingying Hao
Tianrui Hu
Jiameng Pu
Sonal Oswal
Gang Wang
Bimal Viswanath
2019
conf/ccs
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites.
Peng Peng
Chao Xu
Luke Quinn
Hang Hu
Bimal Viswanath
Gang Wang
2019
conf/ccs
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations.
Sazzadur Rahaman
Gang Wang
Danfeng Daphne Yao
2019
conf/uss
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Ying Dong
Wenbo Guo
Yueqi Chen
Xinyu Xing
Yuqing Zhang
Gang Wang
2019
conf/sp
Characterizing Pixel Tracking through the Lens of Disposable Email Services.
Hang Hu
Peng Peng
Gang Wang
2018
conf/ccs
LEMNA: Explaining Deep Learning based Security Applications.
Wenbo Guo
Dongliang Mu
Jun Xu
Purui Su
Gang Wang
Xinyu Xing
2018
conf/ccs
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces.
Xiangwen Wang
Peng Peng
Chun Wang
Gang Wang
2018
conf/uss
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems.
Kexiong Curtis Zeng
Shinan Liu
Yuanchao Shu
Dong Wang
Haoyu Li
Yanzhi Dou
Gang Wang
Yaling Yang
2018
conf/uss
End-to-End Measurements of Email Spoofing Attacks.
Hang Hu
Gang Wang
2018
conf/uss
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Dongliang Mu
Alejandro Cuevas
Limin Yang
Hang Hu
Xinyu Xing
Bing Mao
Gang Wang
2018
conf/ndss
De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice.
Huandong Wang
Chen Gao
Yong Li
Gang Wang
Depeng Jin
Jingbo Sun
2017
conf/ccs
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications.
Amiangshu Bosu
Fang Liu
Danfeng (Daphne) Yao
Gang Wang
2017
conf/uss
Measuring the Insecurity of Mobile Deep Links of Android.
Fang Liu
Chun Wang
Andres Pico
Danfeng Yao
Gang Wang
2017
conf/sp
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks.
Fang Liu
Haipeng Cai
Gang Wang
Danfeng Yao
Karim O. Elish
Barbara G. Ryder
2014
conf/uss
Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers.
Gang Wang
Tianyi Wang
Haitao Zheng
Ben Y. Zhao
2013
conf/uss
You Are How You Click: Clickstream Analysis for Sybil Detection.
Gang Wang
Tristan Konolige
Christo Wilson
Xiao Wang
Haitao Zheng
Ben Y. Zhao
2013
conf/ndss
Social Turing Tests: Crowdsourcing Sybil Detection.
Gang Wang
Manish Mohanlal
Christo Wilson
Xiao Wang
Miriam J. Metzger
Haitao Zheng
Ben Y. Zhao
2013
conf/dsn
Detecting malicious landing pages in Malware Distribution Networks.
Gang Wang
Jack W. Stokes
Cormac Herley
David Felstead
Coauthors
Adam Bates
(3)
Akul Goyal
(2)
Alejandro Cuevas
(1)
Alexander Withers
(1)
Ali Ahmadzadeh
(3)
Amiangshu Bosu
(1)
Andres Pico
(1)
Andy Riddle
(1)
Apurva Virkud
(1)
Arridhana Ciptadi
(3)
Barbara G. Ryder
(1)
Ben Y. Zhao
(3)
Bimal Viswanath
(2)
Bing Mao
(1)
Bo Li
(1)
Bomin Wei
(1)
Boqin Qin
(1)
Carl A. Gunter
(1)
Chao Xu
(1)
Chen Gao
(1)
Chenkai Wang
(2)
Chenkai Wang
(1)
Chensheng Yu
(1)
Christo Wilson
(2)
Christopher W. Fletcher
(1)
Chuhan Wang
(1)
Chun Wang
(2)
Constantin Adam
(1)
Cormac Herley
(1)
Danfeng (Daphne) Yao
(1)
Danfeng Daphne Yao
(1)
Danfeng Yao
(2)
Daniel Votipka
(1)
David Felstead
(1)
David Hasani
(1)
David M. Liebovitz
(1)
Depeng Jin
(1)
Dong Wang
(1)
Dongliang Mu
(3)
Duc Cuong Nguyen
(1)
Fabio Pierazzi
(2)
Fang Liu
(3)
Faysal Hossain Shezan
(2)
Feargus Pendlebury
(2)
Gang Wang
(47)
Giovanni Apruzzese
(1)
Hadjer Benkraouda
(2)
Haipeng Cai
(1)
Haitao Zheng
(3)
Haixin Duan
(1)
Hanchao Yang
(1)
Hang Hu
(6)
Haoyu Li
(1)
Haoyu Zhai
(1)
Huandong Wang
(1)
Ihar Laziuk
(1)
Jack W. Stokes
(1)
Jacopo Cortellazzi
(2)
Jaron Mink
(2)
Jason Liu
(1)
Jiahao Yu
(1)
Jiameng Pu
(1)
Jianjun Chen
(1)
Jianjun Shi
(1)
Jingbo Sun
(1)
Jonathan A. Handler
(1)
Jose Rodrigo Sanchez Vicarte
(1)
Jun Xu
(1)
Junjie Liang
(1)
Karim O. Elish
(1)
Kevin Tu
(1)
Kexiong Curtis Zeng
(2)
Licheng Luo
(2)
Limin Yang
(10)
Linhai Song
(2)
Lorenzo Cavallaro
(2)
Luke Quinn
(1)
Manish Mohanlal
(1)
Mauro Conti
(1)
Michael Backes
(1)
Michael Schilling
(1)
Minjun Long
(1)
Miriam J. Metzger
(1)
Muhammad Adil Inam
(1)
Natã M. Barbosa
(1)
Nick A. Cohen
(1)
Nirav Diwan
(2)
Olivia Figueira
(1)
Peng Peng
(3)
Phuong Cao
(1)
Ping Guo
(1)
Purui Su
(1)
Qi Qin
(1)
Qingying Hao
(6)
Ravishankar K. Iyer
(1)
Roopa Foulger
(1)
Saidivya Ashok
(1)
Sazzadur Rahaman
(1)
Shihan Lin
(1)
Shinan Liu
(2)
Shuofei Zhu
(2)
Smirity Kaushik
(1)
Sonal Oswal
(1)
Songyi Yang
(1)
Sophia Liu
(1)
Steve T. K. Jan
(3)
Sushruth Booma
(1)
Tianrui Hu
(1)
Tianyi Wang
(1)
Ting Wang
(1)
Tongbo Luo
(1)
Tristan Konolige
(1)
Trung Tin Nguyen
(1)
Vasant G. Honavar
(1)
Wenbo Guo
(5)
Xiang Cheng
(1)
Xiangwen Wang
(1)
Xiao Wang
(2)
Xiaojun Xu
(1)
Xiaoran Weng
(1)
Xinyu Xing
(7)
Xueyuan Han
(1)
Yaling Yang
(2)
Yaman Yu
(1)
Yang Wang
(3)
Yanzhi Dou
(1)
Ying Dong
(1)
Ying Li
(1)
Ying Yuan
(1)
Yizhu Wang
(1)
Yong Li
(1)
Yuan Tian
(2)
Yuanchao Shu
(2)
Yueqi Chen
(2)
Yuhang Wu
(1)
Yuqing Zhang
(1)
Zbigniew Kalbarczyk
(1)
Zeliang Kan
(1)
Zhenning Zhang
(2)
Zhenpeng Lin
(1)
Zhi Chen
(3)
Zhuolin Yang
(1)
Ziyi Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to