Gang Wang
Titre
Citée par
Citée par
Année
You are how you click: Clickstream analysis for sybil detection
G Wang, T Konolige, C Wilson, X Wang, H Zheng, BY Zhao
22nd {USENIX} Security Symposium ({USENIX} Security 13), 241-256, 2013
3232013
Serf and turf: crowdturfing for fun and profit
G Wang, C Wilson, X Zhao, Y Zhu, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 21st international conference on World Wide Web, 679-688, 2012
2682012
Wisdom in the social crowd: an analysis of quora
G Wang, K Gill, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 22nd international conference on World Wide Web, 1341-1352, 2013
2322013
Social Turing Tests: Crowdsourcing Sybil Detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, B Zhao
Proceedings of The 20th Annual Network & Distributed System Security …, 2013
2062013
Social turing tests: Crowdsourcing sybil detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, BY Zhao
arXiv preprint arXiv:1205.3856, 2012
2062012
Unsupervised clickstream clustering for user behavior analysis
G Wang, X Zhang, S Tang, H Zheng, BY Zhao
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
2002016
Follow the green: growth and dynamics in twitter follower markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013
2002013
I am the antenna: Accurate outdoor ap location using smartphones
Z Zhang, X Zhou, W Zhang, Y Zhang, G Wang, BY Zhao, H Zheng
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1942011
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers
G Wang, T Wang, H Zheng, BY Zhao
23rd USENIX Security Symposium, USENIX Association, 2014
1742014
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1252018
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference (IMC), 2014
1072014
Collusive data leak and more: Large-scale threat analysis of inter-app communications
A Bosu, F Liu, D Yao, G Wang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
1052017
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th annual international conference on mobile systems …, 2016
1052016
All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems
KC Zeng, S Liu, Y Shu, D Wang, H Li, Y Dou, G Wang, Y Yang
27th {USENIX} security symposium ({USENIX} security 18), 1527-1544, 2018
752018
Anatomy of a personalized livestreaming system
B Wang, X Zhang, G Wang, H Zheng, BY Zhao
Proceedings of the 2016 Internet Measurement Conference, 485-498, 2016
742016
Crowdsourcing cybersecurity: Cyber attack detection using social media
RP Khandpur, T Ji, S Jan, G Wang, CT Lu, N Ramakrishnan
Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017
662017
Practical conflict graphs for dynamic spectrum distribution
X Zhou, Z Zhang, G Wang, X Yu, BY Zhao, H Zheng
Proceedings of the ACM SIGMETRICS/international conference on Measurement …, 2013
652013
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
622018
Opinion search engine
JT Sun, X Ni, P Xu, G Wang, K Tang, Z Chen
US Patent 9,443,245, 2016
622016
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of The 18th ACM conference on Computer-Supported Cooperative …, 2015
552015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20