Gang Wang
Title
Cited by
Cited by
Year
You are how you click: Clickstream analysis for sybil detection
G Wang, T Konolige, C Wilson, X Wang, H Zheng, BY Zhao
22nd {USENIX} Security Symposium ({USENIX} Security 13), 241-256, 2013
2842013
Serf and turf: crowdturfing for fun and profit
G Wang, C Wilson, X Zhao, Y Zhu, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 21st international conference on World Wide Web, 679-688, 2012
2482012
Wisdom in the social crowd: an analysis of quora
G Wang, K Gill, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 22nd international conference on World Wide Web, 1341-1352, 2013
2072013
Social Turing Tests: Crowdsourcing Sybil Detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, B Zhao
Proceedings of The 20th Annual Network & Distributed System Security …, 2013
1782013
Social turing tests: Crowdsourcing sybil detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, BY Zhao
arXiv preprint arXiv:1205.3856, 2012
1782012
Follow the green: growth and dynamics in twitter follower markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013
1772013
I am the antenna: accurate outdoor AP location using smartphones
Z Zhang, X Zhou, W Zhang, Y Zhang, G Wang, BY Zhao, H Zheng
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1742011
Unsupervised clickstream clustering for user behavior analysis
G Wang, X Zhang, S Tang, H Zheng, BY Zhao
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1652016
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers
G Wang, T Wang, H Zheng, BY Zhao
23rd USENIX Security Symposium, USENIX Association, 2014
1472014
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference (IMC), 2014
972014
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
912016
Collusive data leak and more: Large-scale threat analysis of inter-app communications
A Bosu, F Liu, D Yao, G Wang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
872017
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
842018
Anatomy of a personalized livestreaming system
B Wang, X Zhang, G Wang, H Zheng, BY Zhao
Proceedings of the 2016 Internet Measurement Conference, 485-498, 2016
672016
Practical conflict graphs for dynamic spectrum distribution
X Zhou, Z Zhang, G Wang, X Yu, BY Zhao, H Zheng
Proceedings of the ACM SIGMETRICS/international conference on Measurement …, 2013
632013
Opinion search engine
JT Sun, X Ni, P Xu, G Wang, K Tang, Z Chen
US Patent 9,443,245, 2016
592016
All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems
KC Zeng, S Liu, Y Shu, D Wang, H Li, Y Dou, G Wang, Y Yang
27th {USENIX} Security Symposium ({USENIX} Security 18), 1527-1544, 2018
512018
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
452018
Crowdsourcing cybersecurity: Cyber attack detection using social media
RP Khandpur, T Ji, S Jan, G Wang, CT Lu, N Ramakrishnan
Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017
452017
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of The 18th ACM conference on Computer-Supported Cooperative …, 2015
452015
The system can't perform the operation now. Try again later.
Articles 1–20