USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 18 results:
Filters: Author is Gang Wang [Clear All Filters]
How does Endpoint Detection use the MITRE ATT&CK Framework? 33rd USENIX Security Symposium (USENIX Security 24). :3891--3908.
.
2024. It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors. 33rd USENIX Security Symposium (USENIX Security 24). :3027--3044.
.
2024. True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center 33rd USENIX Security Symposium (USENIX Security 24). :1525--1542.
.
2024. AIRS: Explanation for Deep Reinforcement Learning based Security Applications. 32nd USENIX Security Symposium (USENIX Security 23). :7375--7392.
.
2023. How to Cover up Anomalous Accesses to Electronic Health Records. 32nd USENIX Security Symposium (USENIX Security 23). :229--246.
.
2023. DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks. 31st USENIX Security Symposium (USENIX Security 22). :1669--1686.
.
2022. Assessing Browser-level Defense against IDN-based Phishing. 30th USENIX Security Symposium (USENIX Security 21). :3739--3756.
.
2021. CADE: Detecting and Explaining Concept Drift Samples for Security Applications. 30th USENIX Security Symposium (USENIX Security 21). :2327--2344.
.
2021. Double-Cross Attacks: Subverting Active Learning Systems. 30th USENIX Security Symposium (USENIX Security 21). :1593--1610.
.
2021. Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset. 30th USENIX Security Symposium (USENIX Security 21). :3935--3952.
.
2021. Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. 29th USENIX Security Symposium (USENIX Security 20). :2361--2378.
.
2020. Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. 28th USENIX Security Symposium (USENIX Security 19). :869--885.
.
2019. All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems. 27th USENIX Security Symposium (USENIX Security 18). :1527--1544.
.
2018. End-to-End Measurements of Email Spoofing Attacks. 27th USENIX Security Symposium (USENIX Security 18). :1095--1112.
.
2018. Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. 27th USENIX Security Symposium (USENIX Security 18). :919--936.
.
2018. Measuring the Insecurity of Mobile Deep Links of Android. 26th USENIX Security Symposium (USENIX Security 17). :953--969.
.
2017. Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 23rd USENIX Security Symposium (USENIX Security 14). :239--254.
.
2014. You Are How You Click: Clickstream Analysis for Sybil Detection. 22nd USENIX Security Symposium (USENIX Security 13). :241--256.
.
2013.