You are how you click: Clickstream analysis for sybil detection G Wang, T Konolige, C Wilson, X Wang, H Zheng, BY Zhao 22nd USENIX security symposium (USENIX Security 13), 241-256, 2013 | 390 | 2013 |
Lemna: Explaining deep learning based security applications W Guo, D Mu, J Xu, P Su, G Wang, X Xing proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 343 | 2018 |
Serf and turf: crowdturfing for fun and profit G Wang, C Wilson, X Zhao, Y Zhu, M Mohanlal, H Zheng, BY Zhao Proceedings of the 21st international conference on World Wide Web, 679-688, 2012 | 309 | 2012 |
Wisdom in the social crowd: an analysis of quora G Wang, K Gill, M Mohanlal, H Zheng, BY Zhao Proceedings of the 22nd international conference on World Wide Web, 1341-1352, 2013 | 301 | 2013 |
Unsupervised clickstream clustering for user behavior analysis G Wang, X Zhang, S Tang, H Zheng, BY Zhao Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016 | 300 | 2016 |
Social Turing Tests: Crowdsourcing Sybil Detection G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, B Zhao Proceedings of The 20th Annual Network & Distributed System Security …, 2013 | 279 | 2013 |
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers G Wang, T Wang, H Zheng, BY Zhao 23rd USENIX Security Symposium, USENIX Association, 2014 | 239 | 2014 |
Follow the green: growth and dynamics in twitter follower markets G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013 | 238 | 2013 |
I am the antenna: Accurate outdoor ap location using smartphones Z Zhang, X Zhou, W Zhang, Y Zhang, G Wang, BY Zhao, H Zheng Proceedings of the 17th annual international conference on Mobile computing …, 2011 | 212 | 2011 |
All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems KC Zeng, S Liu, Y Shu, D Wang, H Li, Y Dou, G Wang, Y Yang 27th USENIX security symposium (USENIX security 18), 1527-1544, 2018 | 193 | 2018 |
Crowdsourcing cybersecurity: Cyber attack detection using social media RP Khandpur, T Ji, S Jan, G Wang, CT Lu, N Ramakrishnan Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017 | 179 | 2017 |
Collusive data leak and more: Large-scale threat analysis of inter-app communications A Bosu, F Liu, D Yao, G Wang Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 153 | 2017 |
Measuring and modeling the label dynamics of online {Anti-Malware} engines S Zhu, J Shi, L Yang, B Qin, Z Zhang, L Song, G Wang 29th USENIX Security Symposium (USENIX Security 20), 2361-2378, 2020 | 148 | 2020 |
Defending against sybil devices in crowdsourced mapping services G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao Proceedings of the 14th annual international conference on mobile systems …, 2016 | 148 | 2016 |
Needle in a haystack: Tracking down elite phishing domains in the wild K Tian, STK Jan, H Hu, D Yao, G Wang Proceedings of the Internet Measurement Conference 2018, 429-442, 2018 | 146 | 2018 |
Towards the detection of inconsistencies in public security vulnerability reports Y Dong, W Guo, Y Chen, X Xing, Y Zhang, G Wang 28th USENIX security symposium (USENIX Security 19), 869-885, 2019 | 143 | 2019 |
Whispers in the dark: analysis of an anonymous social network G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao Proceedings of the 2014 Conference on Internet Measurement Conference (IMC), 2014 | 138 | 2014 |
{CADE}: Detecting and explaining concept drift samples for security applications L Yang, W Guo, Q Hao, A Ciptadi, A Ahmadzadeh, X Xing, G Wang 30th USENIX Security Symposium (USENIX Security 21), 2327-2344, 2021 | 134 | 2021 |
Opening the blackbox of virustotal: Analyzing online phishing scan engines P Peng, L Yang, L Song, G Wang Proceedings of the Internet Measurement Conference, 478-485, 2019 | 131 | 2019 |
Understanding the reproducibility of crowd-reported security vulnerabilities D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang 27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018 | 118 | 2018 |