Biblio

Export 15 results:
Filters: Author is Gang Wang  [Clear All Filters]
2023
Yu J, Guo W, Qin Q, Wang G, Wang T, Xing X.  2023.  AIRS: Explanation for Deep Reinforcement Learning based Security Applications. 32nd USENIX Security Symposium (USENIX Security 23). :7375--7392.
Xu X, Hao Q, Yang Z, Li B, Liebovitz D, Wang G, Gunter CA.  2023.  How to Cover up Anomalous Accesses to Electronic Health Records. 32nd USENIX Security Symposium (USENIX Security 23). :229--246.
2021
Hu H, Jan STK, Wang Y, Wang G.  2021.  Assessing Browser-level Defense against IDN-based Phishing. 30th USENIX Security Symposium (USENIX Security 21). :3739--3756.
Yang L, Guo W, Hao Q, Ciptadi A, Ahmadzadeh A, Xing X, Wang G.  2021.  CADE: Detecting and Explaining Concept Drift Samples for Security Applications. 30th USENIX Security Symposium (USENIX Security 21). :2327--2344.
Vicarte JRodrigo Sa, Wang G, Fletcher CW.  2021.  Double-Cross Attacks: Subverting Active Learning Systems. 30th USENIX Security Symposium (USENIX Security 21). :1593--1610.
Liu S, Cheng X, Yang H, Shu Y, Weng X, Guo P, Zeng K, Wang G, Yang Y.  2021.  Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks using Off-the-shelf Chipset. 30th USENIX Security Symposium (USENIX Security 21). :3935--3952.
2020
Zhu S, Shi J, Yang L, Qin B, Zhang Z, Song L, Wang G.  2020.  Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. 29th USENIX Security Symposium (USENIX Security 20). :2361--2378.
2019
Dong Y, Guo W, Chen Y, Xing X, Zhang Y, Wang G.  2019.  Towards the Detection of Inconsistencies in Public Security Vulnerability Reports. 28th USENIX Security Symposium (USENIX Security 19). :869--885.
2018
Zeng K, Liu S, Shu Y, Wang D, Li H, Dou Y, Wang G, Yang Y.  2018.  All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems. 27th USENIX Security Symposium (USENIX Security 18). :1527--1544.
Hu H, Wang G.  2018.  End-to-End Measurements of Email Spoofing Attacks. 27th USENIX Security Symposium (USENIX Security 18). :1095--1112.
Mu D, Cuevas A, Yang L, Hu H, Xing X, Mao B, Wang G.  2018.  Understanding the Reproducibility of Crowd-reported Security Vulnerabilities. 27th USENIX Security Symposium (USENIX Security 18). :919--936.
2017
Liu F, Wang C, Pico A, Yao D, Wang G.  2017.  Measuring the Insecurity of Mobile Deep Links of Android. 26th USENIX Security Symposium (USENIX Security 17). :953--969.
2014
Wang G, Wang T, Zheng H, Zhao BY.  2014.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers. 23rd USENIX Security Symposium (USENIX Security 14). :239--254.
2013
Wang G, Konolige T, Wilson C, Wang X, Zheng H, Zhao BY.  2013.  You Are How You Click: Clickstream Analysis for Sybil Detection. 22nd USENIX Security Symposium (USENIX Security 13). :241--256.