BibTeX records: Gang Wang 0011

download as .bib file

@article{DBLP:journals/imwut/TuLLWWHSJ18,
  author    = {Zhen Tu and
               Runtong Li and
               Yong Li and
               Gang Wang and
               Di Wu and
               Pan Hui and
               Li Su and
               Depeng Jin},
  title     = {Your Apps Give You Away: Distinguishing Mobile Users by Their App
               Usage Fingerprints},
  journal   = {{IMWUT}},
  volume    = {2},
  number    = {3},
  pages     = {138:1--138:23},
  year      = {2018},
  url       = {https://doi.org/10.1145/3264948},
  doi       = {10.1145/3264948},
  timestamp = {Thu, 20 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/imwut/TuLLWWHSJ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangWWNZZ18,
  author    = {Gang Wang and
               Bolun Wang and
               Tianyi Wang and
               Ana Nika and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {26},
  number    = {3},
  pages     = {1123--1136},
  year      = {2018},
  url       = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2818073},
  doi       = {10.1109/TNET.2018.2818073},
  timestamp = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/WangWWNZZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuoMXSWX18,
  author    = {Wenbo Guo and
               Dongliang Mu and
               Jun Xu and
               Purui Su and
               Gang Wang and
               Xinyu Xing},
  title     = {{LEMNA:} Explaining Deep Learning based Security Applications},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {364--379},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018},
  url       = {https://doi.org/10.1145/3243734.3243792},
  doi       = {10.1145/3243734.3243792},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/GuoMXSWX18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangPWW18,
  author    = {Xiangwen Wang and
               Peng Peng and
               Chun Wang and
               Gang Wang},
  title     = {You Are Your Photographs: Detecting Multiple Identities of Vendors
               in the Darknet Marketplaces},
  booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications
               Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages     = {431--442},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018asia},
  url       = {https://doi.org/10.1145/3196494.3196529},
  doi       = {10.1145/3196494.3196529},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/WangPWW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/WangJHBW18,
  author    = {Chun Wang and
               Steve T. K. Jan and
               Hang Hu and
               Douglas Bossart and
               Gang Wang},
  title     = {The Next Domino to Fall: Empirical Analysis of User Passwords across
               Online Services},
  booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application
               Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
               2018},
  pages     = {196--203},
  year      = {2018},
  crossref  = {DBLP:conf/codaspy/2018},
  url       = {https://doi.org/10.1145/3176258.3176332},
  doi       = {10.1145/3176258.3176332},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/WangJHBW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/group/JanWZW18,
  author    = {Steve T. K. Jan and
               Chun Wang and
               Qing Zhang and
               Gang Wang},
  title     = {Pay-per-Question: Towards Targeted Q{\&}A with Payments},
  booktitle = {Proceedings of the 2018 {ACM} Conference on Supporting Groupwork,
               {GROUP} 2018, Sanibel Island, FL, USA, January 07 - 10, 2018},
  pages     = {1--11},
  year      = {2018},
  crossref  = {DBLP:conf/group/2018},
  url       = {https://doi.org/10.1145/3148330.3148332},
  doi       = {10.1145/3148330.3148332},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/group/JanWZW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/TianJ0Y018,
  author    = {Ke Tian and
               Steve T. K. Jan and
               Hang Hu and
               Danfeng Yao and
               Gang Wang},
  title     = {Needle in a Haystack: Tracking Down Elite Phishing Domains in the
               Wild},
  booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
               Boston, MA, USA, October 31 - November 02, 2018},
  pages     = {429--442},
  year      = {2018},
  crossref  = {DBLP:conf/imc/2018},
  url       = {https://dl.acm.org/citation.cfm?id=3278569},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/TianJ0Y018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangG0WJS18,
  author    = {Huandong Wang and
               Chen Gao and
               Yong Li and
               Gang Wang and
               Depeng Jin and
               Jingbo Sun},
  title     = {De-anonymization of Mobility Trajectories: Dissecting the Gaps between
               Theory and Practice},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  year      = {2018},
  crossref  = {DBLP:conf/ndss/2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_06B-3\_Wang\_paper.pdf},
  timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/WangG0WJS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/WangLWJ18,
  author    = {Huandong Wang and
               Yong Li and
               Gang Wang and
               Depeng Jin},
  title     = {You Are How You Move: Linking Multiple User Identities From Massive
               Mobility Traces},
  booktitle = {Proceedings of the 2018 {SIAM} International Conference on Data Mining,
               {SDM} 2018, May 3-5, 2018, San Diego Marriott Mission Valley, San
               Diego, CA, {USA.}},
  pages     = {189--197},
  year      = {2018},
  crossref  = {DBLP:conf/sdm/2018},
  url       = {https://doi.org/10.1137/1.9781611975321.22},
  doi       = {10.1137/1.9781611975321.22},
  timestamp = {Wed, 07 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sdm/WangLWJ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/0002PW18,
  author    = {Hang Hu and
               Peng Peng and
               Gang Wang},
  title     = {Towards Understanding the Adoption of Anti-Spoofing Protocols in Email
               Systems},
  booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
               USA, September 30 - October 2, 2018},
  pages     = {94--101},
  year      = {2018},
  crossref  = {DBLP:conf/secdev/2018},
  url       = {https://doi.org/10.1109/SecDev.2018.00020},
  doi       = {10.1109/SecDev.2018.00020},
  timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secdev/0002PW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MuCYHXMW18,
  author    = {Dongliang Mu and
               Alejandro Cuevas and
               Limin Yang and
               Hang Hu and
               Xinyu Xing and
               Bing Mao and
               Gang Wang},
  title     = {Understanding the Reproducibility of Crowd-reported Security Vulnerabilities},
  booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018.},
  pages     = {919--936},
  year      = {2018},
  crossref  = {DBLP:conf/uss/2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18/presentation/mu},
  timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/MuCYHXMW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Hu018,
  author    = {Hang Hu and
               Gang Wang},
  title     = {End-to-End Measurements of Email Spoofing Attacks},
  booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018.},
  pages     = {1095--1112},
  year      = {2018},
  crossref  = {DBLP:conf/uss/2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18/presentation/hu},
  timestamp = {Tue, 21 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/Hu018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZengLSWLDWY18,
  author    = {Kexiong (Curtis) Zeng and
               Shinan Liu and
               Yuanchao Shu and
               Dong Wang and
               Haoyu Li and
               Yanzhi Dou and
               Gang Wang and
               Yaling Yang},
  title     = {All Your {GPS} Are Belong To Us: Towards Stealthy Manipulation of
               Road Navigation Systems},
  booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018.},
  pages     = {1527--1544},
  year      = {2018},
  crossref  = {DBLP:conf/uss/2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18/presentation/zeng},
  timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/ZengLSWLDWY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/WangWWSZLZZ17,
  author    = {Tianyi Wang and
               Gang Wang and
               Bolun Wang and
               Divya Sambasivan and
               Zengbin Zhang and
               Xing Li and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Value and Misinformation in Collaborative Investing Platforms},
  journal   = {{TWEB}},
  volume    = {11},
  number    = {2},
  pages     = {8:1--8:32},
  year      = {2017},
  url       = {https://doi.org/10.1145/3027487},
  doi       = {10.1145/3027487},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tweb/WangWWSZLZZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/WangZTWZZ17,
  author    = {Gang Wang and
               Xinyi Zhang and
               Shiliang Tang and
               Christo Wilson and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Clickstream User Behavior Models},
  journal   = {{TWEB}},
  volume    = {11},
  number    = {4},
  pages     = {21:1--21:37},
  year      = {2017},
  url       = {https://doi.org/10.1145/3068332},
  doi       = {10.1145/3068332},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tweb/WangZTWZZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BosuLYW17,
  author    = {Amiangshu Bosu and
               Fang Liu and
               Danfeng (Daphne) Yao and
               Gang Wang},
  title     = {Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app
               Communications},
  booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  pages     = {71--85},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017asia},
  url       = {https://doi.org/10.1145/3052973.3053004},
  doi       = {10.1145/3052973.3053004},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/BosuLYW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/KhandpurJJ0LR17,
  author    = {Rupinder Paul Khandpur and
               Taoran Ji and
               Steve T. K. Jan and
               Gang Wang and
               Chang{-}Tien Lu and
               Naren Ramakrishnan},
  title     = {Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media},
  booktitle = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge
               Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},
  pages     = {1049--1057},
  year      = {2017},
  crossref  = {DBLP:conf/cikm/2017},
  url       = {https://doi.org/10.1145/3132847.3132866},
  doi       = {10.1145/3132847.3132866},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cikm/KhandpurJJ0LR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/YanLWLZJZ17,
  author    = {Huan Yan and
               Tzu{-}Heng Lin and
               Gang Wang and
               Yong Li and
               Haitao Zheng and
               Depeng Jin and
               Ben Y. Zhao},
  title     = {On Migratory Behavior in Video Consumption},
  booktitle = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge
               Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},
  pages     = {1109--1118},
  year      = {2017},
  crossref  = {DBLP:conf/cikm/2017},
  url       = {https://doi.org/10.1145/3132847.3132884},
  doi       = {10.1145/3132847.3132884},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cikm/YanLWLZJZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiuCWYER17,
  author    = {Fang Liu and
               Haipeng Cai and
               Gang Wang and
               Danfeng (Daphne) Yao and
               Karim O. Elish and
               Barbara G. Ryder},
  title     = {Prioritized Analysis of Inter-App Communication Risks},
  booktitle = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  pages     = {159--161},
  year      = {2017},
  crossref  = {DBLP:conf/codaspy/2017},
  url       = {https://doi.org/10.1145/3029806.3029843},
  doi       = {10.1145/3029806.3029843},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/LiuCWYER17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/ZhangTZWZZ17,
  author    = {Xinyi Zhang and
               Shiliang Tang and
               Yun Zhao and
               Gang Wang and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments
               System},
  booktitle = {Proceedings of the Eleventh International Conference on Web and Social
               Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada,
               May 15-18, 2017.},
  pages     = {387--396},
  year      = {2017},
  crossref  = {DBLP:conf/icwsm/2017},
  url       = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15589},
  timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icwsm/ZhangTZWZZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/YanLW0ZJZ17,
  author    = {Huan Yan and
               Tzu{-}Heng Lin and
               Gang Wang and
               Yong Li and
               Haitao Zheng and
               Depeng Jin and
               Ben Y. Zhao},
  title     = {A First Look at User Switching Behaviors Over Multiple Video Content
               Providers},
  booktitle = {Proceedings of the Eleventh International Conference on Web and Social
               Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada,
               May 15-18, 2017.},
  pages     = {700--703},
  year      = {2017},
  crossref  = {DBLP:conf/icwsm/2017},
  url       = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15646},
  timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icwsm/YanLW0ZJZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/KedrowitschYWC17,
  author    = {Alexander Kedrowitsch and
               Danfeng (Daphne) Yao and
               Gang Wang and
               Kirk Cameron},
  title     = {A First Look: Using Linux Containers for Deceptive Honeypots},
  booktitle = {Proceedings of the 2017 Workshop on Automated Decision Making for
               Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October
               30 - November 03, 2017},
  pages     = {15--22},
  year      = {2017},
  crossref  = {DBLP:conf/safeconfig/2017},
  url       = {https://doi.org/10.1145/3140368.3140371},
  doi       = {10.1145/3140368.3140371},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/safeconfig/KedrowitschYWC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuCWYER17,
  author    = {Fang Liu and
               Haipeng Cai and
               Gang Wang and
               Danfeng Yao and
               Karim O. Elish and
               Barbara G. Ryder},
  title     = {MR-Droid: {A} Scalable and Prioritized Analysis of Inter-App Communication
               Risks},
  booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
               Jose, CA, USA, May 25, 2017},
  pages     = {189--198},
  year      = {2017},
  crossref  = {DBLP:conf/sp/2017w},
  url       = {https://doi.org/10.1109/SPW.2017.12},
  doi       = {10.1109/SPW.2017.12},
  timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/LiuCWYER17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuWPYW17,
  author    = {Fang Liu and
               Chun Wang and
               Andres Pico and
               Danfeng Yao and
               Gang Wang},
  title     = {Measuring the Insecurity of Mobile Deep Links of Android},
  booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017.},
  pages     = {953--969},
  year      = {2017},
  crossref  = {DBLP:conf/uss/2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/liu},
  timestamp = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/LiuWPYW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KhandpurJJWLR17,
  author    = {Rupinder Paul Khandpur and
               Taoran Ji and
               Steve T. K. Jan and
               Gang Wang and
               Chang{-}Tien Lu and
               Naren Ramakrishnan},
  title     = {Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media},
  journal   = {CoRR},
  volume    = {abs/1702.07745},
  year      = {2017},
  url       = {http://arxiv.org/abs/1702.07745},
  archivePrefix = {arXiv},
  eprint    = {1702.07745},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/KhandpurJJWLR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JanWZW17,
  author    = {Steve T. K. Jan and
               Chun Wang and
               Qing Zhang and
               Gang Wang},
  title     = {Analyzing Payment Based Question and Answering Service},
  journal   = {CoRR},
  volume    = {abs/1703.01333},
  year      = {2017},
  url       = {http://arxiv.org/abs/1703.01333},
  archivePrefix = {arXiv},
  eprint    = {1703.01333},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/JanWZW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangJHW17,
  author    = {Chun Wang and
               Steve T. K. Jan and
               Hang Hu and
               Gang Wang},
  title     = {Empirical Analysis of Password Reuse and Modification across Online
               Service},
  journal   = {CoRR},
  volume    = {abs/1706.01939},
  year      = {2017},
  url       = {http://arxiv.org/abs/1706.01939},
  archivePrefix = {arXiv},
  eprint    = {1706.01939},
  timestamp = {Tue, 21 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/WangJHW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangCWWWLZZ16,
  author    = {Tianyi Wang and
               Yang Chen and
               Yi Wang and
               Bolun Wang and
               Gang Wang and
               Xing Li and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {The power of comments: fostering social interactions in microblog
               networks},
  journal   = {Frontiers Comput. Sci.},
  volume    = {10},
  number    = {5},
  pages     = {889--907},
  year      = {2016},
  url       = {https://doi.org/10.1007/s11704-016-5198-y},
  doi       = {10.1007/s11704-016-5198-y},
  timestamp = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/fcsc/WangCWWWLZZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/WangZTZZ16,
  author    = {Gang Wang and
               Xinyi Zhang and
               Shiliang Tang and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Unsupervised Clickstream Clustering for User Behavior Analysis},
  booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
               Systems, San Jose, CA, USA, May 7-12, 2016},
  pages     = {225--236},
  year      = {2016},
  crossref  = {DBLP:conf/chi/2016},
  url       = {https://doi.org/10.1145/2858036.2858107},
  doi       = {10.1145/2858036.2858107},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/chi/WangZTZZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/WangSZZ16,
  author    = {Gang Wang and
               Sarita Yardi Schoenebeck and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {"Will Check-in for Badges": Understanding Bias and Misbehavior
               on Location-Based Social Networks},
  booktitle = {Proceedings of the Tenth International Conference on Web and Social
               Media, Cologne, Germany, May 17-20, 2016.},
  pages     = {417--426},
  year      = {2016},
  crossref  = {DBLP:conf/icwsm/2016},
  url       = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13027},
  timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icwsm/WangSZZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WangZWZZ16,
  author    = {Bolun Wang and
               Xinyi Zhang and
               Gang Wang and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Anatomy of a Personalized Livestreaming System},
  booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
               {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages     = {485--498},
  year      = {2016},
  crossref  = {DBLP:conf/imc/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2987453},
  timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/WangZWZZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/WangWWNZZ16a,
  author    = {Gang Wang and
               Bolun Wang and
               Tianyi Wang and
               Ana Nika and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Poster: Defending against Sybil Devices in Crowdsourced Mapping Services},
  booktitle = {Proceedings of the 14th Annual International Conference on Mobile
               Systems, Applications, and Services Companion, Singapore, Singapore,
               June 25-30, 2016},
  pages     = {146},
  year      = {2016},
  crossref  = {DBLP:conf/mobisys/2016c},
  url       = {https://doi.org/10.1145/2938559.2938610},
  doi       = {10.1145/2938559.2938610},
  timestamp = {Tue, 06 Nov 2018 16:59:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/WangWWNZZ16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/WangWWNZZ16,
  author    = {Gang Wang and
               Bolun Wang and
               Tianyi Wang and
               Ana Nika and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Defending against Sybil Devices in Crowdsourced Mapping Services},
  booktitle = {Proceedings of the 14th Annual International Conference on Mobile
               Systems, Applications, and Services, MobiSys 2016, Singapore, June
               26-30, 2016},
  pages     = {179--191},
  year      = {2016},
  crossref  = {DBLP:conf/mobisys/2016},
  url       = {https://doi.org/10.1145/2906388.2906420},
  doi       = {10.1145/2906388.2906420},
  timestamp = {Tue, 06 Nov 2018 16:59:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/WangWWNZZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ZhouZWYZZ15,
  author    = {Xia Zhou and
               Zengbin Zhang and
               Gang Wang and
               Xiaoxiao Yu and
               Ben Y. Zhao and
               Haitao Zheng},
  title     = {Practical Conflict Graphs in the Wild},
  journal   = {{IEEE/ACM} Trans. Netw.},
  volume    = {23},
  number    = {3},
  pages     = {824--835},
  year      = {2015},
  url       = {https://doi.org/10.1109/TNET.2014.2306416},
  doi       = {10.1109/TNET.2014.2306416},
  timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ton/ZhouZWYZZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscw/WangWWSZZZ15,
  author    = {Gang Wang and
               Tianyi Wang and
               Bolun Wang and
               Divya Sambasivan and
               Zengbin Zhang and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Crowds on Wall Street: Extracting Value from Collaborative Investing
               Platforms},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer Supported Cooperative
               Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada,
               March 14 - 18, 2015},
  pages     = {17--30},
  year      = {2015},
  crossref  = {DBLP:conf/cscw/2015},
  url       = {https://doi.org/10.1145/2675133.2675144},
  doi       = {10.1145/2675133.2675144},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cscw/WangWWSZZZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangWWNLZZ15,
  author    = {Gang Wang and
               Bolun Wang and
               Tianyi Wang and
               Ana Nika and
               Bingzhe Liu and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Attacks and Defenses in Crowdsourced Mapping Services},
  journal   = {CoRR},
  volume    = {abs/1508.00837},
  year      = {2015},
  url       = {http://arxiv.org/abs/1508.00837},
  archivePrefix = {arXiv},
  eprint    = {1508.00837},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/WangWWNLZZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WangWWNZZ14,
  author    = {Gang Wang and
               Bolun Wang and
               Tianyi Wang and
               Ana Nika and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Whispers in the dark: analysis of an anonymous social network},
  booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
               Vancouver, BC, Canada, November 5-7, 2014},
  pages     = {137--150},
  year      = {2014},
  crossref  = {DBLP:conf/imc/2014},
  url       = {https://doi.org/10.1145/2663716.2663728},
  doi       = {10.1145/2663716.2663728},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/WangWWNZZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangWZZ14,
  author    = {Gang Wang and
               Tianyi Wang and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing
               Workers},
  booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014.},
  pages     = {239--254},
  year      = {2014},
  crossref  = {DBLP:conf/uss/2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wang},
  timestamp = {Tue, 22 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/WangWZZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangWWSZZZ14,
  author    = {Gang Wang and
               Tianyi Wang and
               Bolun Wang and
               Divya Sambasivan and
               Zengbin Zhang and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Crowds on Wall Street: Extracting Value from Social Investing Platforms},
  journal   = {CoRR},
  volume    = {abs/1406.1137},
  year      = {2014},
  url       = {http://arxiv.org/abs/1406.1137},
  archivePrefix = {arXiv},
  eprint    = {1406.1137},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/WangWWSZZZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WangSHF13,
  author    = {Gang Wang and
               Jack W. Stokes and
               Cormac Herley and
               David Felstead},
  title     = {Detecting malicious landing pages in Malware Distribution Networks},
  booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages     = {1--11},
  year      = {2013},
  crossref  = {DBLP:conf/dsn/2013},
  url       = {https://doi.org/10.1109/DSN.2013.6575316},
  doi       = {10.1109/DSN.2013.6575316},
  timestamp = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/WangSHF13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/ZhangZZWSMZZ13,
  author    = {Zengbin Zhang and
               Lin Zhou and
               Xiaohan Zhao and
               Gang Wang and
               Yu Su and
               Miriam J. Metzger and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {On the validity of geosocial mobility traces},
  booktitle = {Twelfth {ACM} Workshop on Hot Topics in Networks, HotNets-XII, College
               Park, MD, USA, November 21-22, 2013},
  pages     = {11:1--11:7},
  year      = {2013},
  crossref  = {DBLP:conf/hotnets/2013},
  url       = {https://doi.org/10.1145/2535771.2535786},
  doi       = {10.1145/2535771.2535786},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/ZhangZZWSMZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/StringhiniWEKVZZ13,
  author    = {Gianluca Stringhini and
               Gang Wang and
               Manuel Egele and
               Christopher Kruegel and
               Giovanni Vigna and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Follow the green: growth and dynamics in twitter follower markets},
  booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
               Barcelona, Spain, October 23-25, 2013},
  pages     = {163--176},
  year      = {2013},
  crossref  = {DBLP:conf/imc/2013},
  url       = {https://doi.org/10.1145/2504730.2504731},
  doi       = {10.1145/2504730.2504731},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/StringhiniWEKVZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangMWWMZZ13,
  author    = {Gang Wang and
               Manish Mohanlal and
               Christo Wilson and
               Xiao Wang and
               Miriam J. Metzger and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Social Turing Tests: Crowdsourcing Sybil Detection},
  booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  year      = {2013},
  crossref  = {DBLP:conf/ndss/2013},
  url       = {https://www.ndss-symposium.org/ndss2013/social-turing-tests-crowdsourcing-sybil-detection},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/WangMWWMZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WangWLZZ13,
  author    = {Tianyi Wang and
               Gang Wang and
               Xing Li and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Characterizing and detecting malicious crowdsourcing},
  booktitle = {{ACM} {SIGCOMM} 2013 Conference, SIGCOMM'13, Hong Kong, China, August
               12-16, 2013},
  pages     = {537--538},
  year      = {2013},
  crossref  = {DBLP:conf/sigcomm/2013},
  url       = {https://doi.org/10.1145/2486001.2491719},
  doi       = {10.1145/2486001.2491719},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/WangWLZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/ZhouZWYZZ13,
  author    = {Xia Zhou and
               Zengbin Zhang and
               Gang Wang and
               Xiaoxiao Yu and
               Ben Y. Zhao and
               Haitao Zheng},
  title     = {Practical conflict graphs for dynamic spectrum distribution},
  booktitle = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling
               of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21,
               2013},
  pages     = {5--16},
  year      = {2013},
  crossref  = {DBLP:conf/sigmetrics/2013},
  url       = {https://doi.org/10.1145/2465529.2465545},
  doi       = {10.1145/2465529.2465545},
  timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/ZhouZWYZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangKWWZZ13,
  author    = {Gang Wang and
               Tristan Konolige and
               Christo Wilson and
               Xiao Wang and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {You Are How You Click: Clickstream Analysis for Sybil Detection},
  booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
               USA, August 14-16, 2013},
  pages     = {241--256},
  year      = {2013},
  crossref  = {DBLP:conf/uss/2013},
  url       = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/WangKWWZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WangGMZZ13,
  author    = {Gang Wang and
               Konark Gill and
               Manish Mohanlal and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Wisdom in the social crowd: an analysis of quora},
  booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
               Brazil, May 13-17, 2013},
  pages     = {1341--1352},
  year      = {2013},
  crossref  = {DBLP:conf/www/2013},
  url       = {https://doi.org/10.1145/2488388.2488506},
  doi       = {10.1145/2488388.2488506},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/www/WangGMZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dyspan/ZhouZWYZZ12,
  author    = {Xia Zhou and
               Zengbin Zhang and
               Gang Wang and
               Xiaoxiao Yu and
               Ben Y. Zhao and
               Haitao Zheng},
  title     = {Measurement-calibrated conflict graphs for dynamic spectrum distribution},
  booktitle = {{IEEE} International Symposium on Dynamic Spectrum Access Networks,
               DySPAN 2012, Bellevue, WA, USA, October 16-19, 2012},
  pages     = {287},
  year      = {2012},
  crossref  = {DBLP:conf/dyspan/2012},
  url       = {https://doi.org/10.1109/DYSPAN.2012.6478150},
  doi       = {10.1109/DYSPAN.2012.6478150},
  timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dyspan/ZhouZWYZZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WangWZZMZZ12,
  author    = {Gang Wang and
               Christo Wilson and
               Xiaohan Zhao and
               Yibo Zhu and
               Manish Mohanlal and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Serf and turf: crowdturfing for fun and profit},
  booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
               Lyon, France, April 16-20, 2012},
  pages     = {679--688},
  year      = {2012},
  crossref  = {DBLP:conf/www/2012},
  url       = {https://doi.org/10.1145/2187836.2187928},
  doi       = {10.1145/2187836.2187928},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/www/WangWZZMZZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-3856,
  author    = {Gang Wang and
               Manish Mohanlal and
               Christo Wilson and
               Xiao Wang and
               Miriam J. Metzger and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Social Turing Tests: Crowdsourcing Sybil Detection},
  journal   = {CoRR},
  volume    = {abs/1205.3856},
  year      = {2012},
  url       = {http://arxiv.org/abs/1205.3856},
  archivePrefix = {arXiv},
  eprint    = {1205.3856},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1205-3856},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/ZhangZZZWZZ11,
  author    = {Zengbin Zhang and
               Xia Zhou and
               Weile Zhang and
               Yuanyang Zhang and
               Gang Wang and
               Ben Y. Zhao and
               Haitao Zheng},
  title     = {I am the antenna: accurate outdoor {AP} location using smartphones},
  booktitle = {Proceedings of the 17th Annual International Conference on Mobile
               Computing and Networking, {MOBICOM} 2011, Las Vegas, Nevada, USA,
               September 19-23, 2011},
  pages     = {109--120},
  year      = {2011},
  crossref  = {DBLP:conf/mobicom/2011},
  url       = {https://doi.org/10.1145/2030613.2030626},
  doi       = {10.1145/2030613.2030626},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobicom/ZhangZZZWZZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/WilsonSWSZZ11,
  author    = {Christo Wilson and
               Troy Steinbauer and
               Gang Wang and
               Alessandra Sala and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Privacy, availability and economics in the Polaris mobile social network},
  booktitle = {12th Workshop on Mobile Computing Systems and Applications, HotMobile
               '11, Phoenix, AZ, USA, March 1-3, 2011},
  pages     = {42--47},
  year      = {2011},
  crossref  = {DBLP:conf/wmcsa/2011},
  url       = {https://doi.org/10.1145/2184489.2184499},
  doi       = {10.1145/2184489.2184499},
  timestamp = {Tue, 06 Nov 2018 16:59:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wmcsa/WilsonSWSZZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-5654,
  author    = {Gang Wang and
               Christo Wilson and
               Xiaohan Zhao and
               Yibo Zhu and
               Manish Mohanlal and
               Haitao Zheng and
               Ben Y. Zhao},
  title     = {Serf and Turf: Crowdturfing for Fun and Profit},
  journal   = {CoRR},
  volume    = {abs/1111.5654},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.5654},
  archivePrefix = {arXiv},
  eprint    = {1111.5654},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1111-5654},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3243734},
  isbn      = {978-1-4503-5693-0},
  timestamp = {Wed, 31 Oct 2018 17:23:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asia,
  editor    = {Jong Kim and
               Gail{-}Joon Ahn and
               Seungjoo Kim and
               Yongdae Kim and
               Javier L{\'{o}}pez and
               Taesoo Kim},
  title     = {Proceedings of the 2018 on Asia Conference on Computer and Communications
               Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3196494},
  doi       = {10.1145/3196494},
  timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2018,
  editor    = {Ziming Zhao and
               Gail{-}Joon Ahn and
               Ram Krishnan and
               Gabriel Ghinita},
  title     = {Proceedings of the Eighth {ACM} Conference on Data and Application
               Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
               2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3176258},
  timestamp = {Wed, 08 Aug 2018 06:19:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/group/2018,
  editor    = {Andrea Forte and
               Michael Prilla and
               Adriana S. Vivacqua and
               Claudia M{\"{u}}ller and
               Lionel P. Robert Jr.},
  title     = {Proceedings of the 2018 {ACM} Conference on Supporting Groupwork,
               {GROUP} 2018, Sanibel Island, FL, USA, January 07 - 10, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3148330},
  isbn      = {978-1-4503-5562-9},
  timestamp = {Fri, 22 Dec 2017 14:28:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/group/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2018,
  title     = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
               Boston, MA, USA, October 31 - November 02, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3278532},
  isbn      = {978-1-4503-5619-0},
  timestamp = {Sat, 03 Nov 2018 18:25:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2018,
  title     = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  publisher = {The Internet Society},
  year      = {2018},
  url       = {https://www.ndss-symposium.org/ndss2018/},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdm/2018,
  editor    = {Martin Ester and
               Dino Pedreschi},
  title     = {Proceedings of the 2018 {SIAM} International Conference on Data Mining,
               {SDM} 2018, May 3-5, 2018, San Diego Marriott Mission Valley, San
               Diego, CA, {USA}},
  publisher = {{SIAM}},
  year      = {2018},
  url       = {https://doi.org/10.1137/1.9781611975321},
  doi       = {10.1137/1.9781611975321},
  isbn      = {978-1-61197-532-1},
  timestamp = {Sun, 13 May 2018 11:47:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sdm/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2018,
  title     = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
               USA, September 30 - October 2, 2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8526271},
  isbn      = {978-1-5386-7662-2},
  timestamp = {Thu, 29 Nov 2018 11:14:13 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secdev/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2018,
  editor    = {William Enck and
               Adrienne Porter Felt},
  title     = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
               MD, USA, August 15-17, 2018},
  publisher = {{USENIX} Association},
  year      = {2018},
  url       = {https://www.usenix.org/conference/usenixsecurity18},
  timestamp = {Mon, 20 Aug 2018 15:16:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asia,
  editor    = {Ramesh Karri and
               Ozgur Sinanoglu and
               Ahmad{-}Reza Sadeghi and
               Xun Yi},
  title     = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
               Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3052973},
  doi       = {10.1145/3052973},
  isbn      = {978-1-4503-4944-4},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cikm/2017,
  editor    = {Ee{-}Peng Lim and
               Marianne Winslett and
               Mark Sanderson and
               Ada Wai{-}Chee Fu and
               Jimeng Sun and
               J. Shane Culpepper and
               Eric Lo and
               Joyce C. Ho and
               Debora Donato and
               Rakesh Agrawal and
               Yu Zheng and
               Carlos Castillo and
               Aixin Sun and
               Vincent S. Tseng and
               Chenliang Li},
  title     = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge
               Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3132847},
  isbn      = {978-1-4503-4918-5},
  timestamp = {Tue, 07 Nov 2017 16:24:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cikm/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
  editor    = {Gail{-}Joon Ahn and
               Alexander Pretschner and
               Gabriel Ghinita},
  title     = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3029806},
  isbn      = {978-1-4503-4523-1},
  timestamp = {Sat, 18 Mar 2017 19:19:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icwsm/2017,
  title     = {Proceedings of the Eleventh International Conference on Web and Social
               Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada,
               May 15-18, 2017},
  publisher = {{AAAI} Press},
  year      = {2017},
  url       = {http://www.aaai.org/Library/ICWSM/icwsm17contents.php},
  isbn      = {978-1-57735-788-9},
  timestamp = {Fri, 19 May 2017 12:45:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icwsm/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2017,
  editor    = {Nicholas J. Multari and
               Anoop Singhal and
               Erin Miller},
  title     = {Proceedings of the 2017 Workshop on Automated Decision Making for
               Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October
               30 - November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3140368},
  isbn      = {978-1-4503-5203-1},
  timestamp = {Tue, 27 Feb 2018 18:32:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/safeconfig/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2017w,
  title     = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
               Jose, CA, USA, May 25, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8226722},
  isbn      = {978-1-5386-1968-1},
  timestamp = {Mon, 01 Jan 2018 14:41:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2017w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2017,
  editor    = {Engin Kirda and
               Thomas Ristenpart},
  title     = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
               BC, Canada, August 16-18, 2017},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/usenixsecurity17},
  timestamp = {Fri, 01 Sep 2017 12:24:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2016,
  editor    = {Jofish Kaye and
               Allison Druin and
               Cliff Lampe and
               Dan Morris and
               Juan Pablo Hourcade},
  title     = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
               Systems, San Jose, CA, USA, May 7-12, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2858036},
  isbn      = {978-1-4503-3362-7},
  timestamp = {Sun, 08 May 2016 11:21:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chi/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icwsm/2016,
  title     = {Proceedings of the Tenth International Conference on Web and Social
               Media, Cologne, Germany, May 17-20, 2016},
  publisher = {{AAAI} Press},
  year      = {2016},
  url       = {http://www.aaai.org/Library/ICWSM/icwsm16contents.php},
  isbn      = {978-1-57735-758-2},
  timestamp = {Sun, 22 May 2016 11:02:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icwsm/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2016,
  editor    = {Phillipa Gill and
               John S. Heidemann and
               John W. Byers and
               Ramesh Govindan},
  title     = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
               {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2987443},
  doi       = {10.1145/2987443},
  isbn      = {978-1-4503-4526-2},
  timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisys/2016c,
  editor    = {Rajesh Krishna Balan and
               Archan Misra and
               Landon P. Cox and
               Yutaka Arakawa and
               Xia Zhou and
               Robert LiKamWa},
  title     = {Proceedings of the 14th Annual International Conference on Mobile
               Systems, Applications, and Services Companion, Singapore, Singapore,
               June 25-30, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2938559},
  doi       = {10.1145/2938559},
  isbn      = {978-1-4503-4416-6},
  timestamp = {Tue, 06 Nov 2018 16:59:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/2016c},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisys/2016,
  editor    = {Rajesh Krishna Balan and
               Archan Misra and
               Sharad Agarwal and
               Cecilia Mascolo},
  title     = {Proceedings of the 14th Annual International Conference on Mobile
               Systems, Applications, and Services, MobiSys 2016, Singapore, June
               26-30, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2906388},
  doi       = {10.1145/2906388},
  isbn      = {978-1-4503-4269-8},
  timestamp = {Tue, 06 Nov 2018 16:59:04 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobisys/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cscw/2015,
  editor    = {Dan Cosley and
               Andrea Forte and
               Luigina Ciolfi and
               David McDonald},
  title     = {Proceedings of the 18th {ACM} Conference on Computer Supported Cooperative
               Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada,
               March 14 - 18, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2675133},
  isbn      = {978-1-4503-2922-4},
  timestamp = {Wed, 29 Mar 2017 16:45:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cscw/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2014,
  editor    = {Carey Williamson and
               Aditya Akella and
               Nina Taft},
  title     = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
               Vancouver, BC, Canada, November 5-7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2663716},
  isbn      = {978-1-4503-3213-2},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2014,
  editor    = {Kevin Fu and
               Jaeyeon Jung},
  title     = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014},
  publisher = {{USENIX} Association},
  year      = {2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2013,
  title     = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
               Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6569391},
  isbn      = {978-1-4673-6471-3},
  timestamp = {Thu, 31 Mar 2016 11:12:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2013,
  editor    = {Dave Levine and
               Sachin Katti and
               Dave Oran},
  title     = {Twelfth {ACM} Workshop on Hot Topics in Networks, HotNets-XII, College
               Park, MD, USA, November 21-22, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2535771},
  isbn      = {978-1-4503-2596-7},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2013,
  editor    = {Konstantina Papagiannaki and
               P. Krishna Gummadi and
               Craig Partridge},
  title     = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
               Barcelona, Spain, October 23-25, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2504730},
  isbn      = {978-1-4503-1953-9},
  timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/imc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2013,
  title     = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  publisher = {The Internet Society},
  year      = {2013},
  url       = {https://www.ndss-symposium.org/ndss2013/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2013,
  editor    = {Dah Ming Chiu and
               Jia Wang and
               Paul Barford and
               Srinivasan Seshan},
  title     = {{ACM} {SIGCOMM} 2013 Conference, SIGCOMM'13, Hong Kong, China, August
               12-16, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2486001},
  isbn      = {978-1-4503-2056-6},
  timestamp = {Wed, 20 Jun 2018 15:57:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmetrics/2013,
  editor    = {Mor Harchol{-}Balter and
               John R. Douceur and
               Jun Xu},
  title     = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling
               of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21,
               2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2465529},
  doi       = {10.1145/2465529},
  isbn      = {978-1-4503-1900-3},
  timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigmetrics/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2013,
  editor    = {Samuel T. King},
  title     = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
               USA, August 14-16, 2013},
  publisher = {{USENIX} Association},
  year      = {2013},
  url       = {https://www.usenix.org/conference/usenixsecurity13},
  isbn      = {978-1-931971-03-4},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2013,
  editor    = {Daniel Schwabe and
               Virg{\'{\i}}lio A. F. Almeida and
               Hartmut Glaser and
               Ricardo A. Baeza{-}Yates and
               Sue B. Moon},
  title     = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
               Brazil, May 13-17, 2013},
  publisher = {International World Wide Web Conferences Steering Committee / {ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2488388},
  isbn      = {978-1-4503-2035-1},
  timestamp = {Sat, 24 Aug 2013 18:12:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dyspan/2012,
  title     = {{IEEE} International Symposium on Dynamic Spectrum Access Networks,
               DySPAN 2012, Bellevue, WA, USA, October 16-19, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6472867},
  isbn      = {978-1-4673-4447-0},
  timestamp = {Sun, 04 Oct 2015 12:34:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dyspan/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2012,
  editor    = {Alain Mille and
               Fabien L. Gandon and
               Jacques Misselis and
               Michael Rabinovich and
               Steffen Staab},
  title     = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
               Lyon, France, April 16-20, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2187836},
  isbn      = {978-1-4503-1229-5},
  timestamp = {Thu, 19 Apr 2012 14:34:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/www/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2011,
  editor    = {Parmesh Ramanathan and
               Thyaga Nandagopal and
               Brian Neil Levine},
  title     = {Proceedings of the 17th Annual International Conference on Mobile
               Computing and Networking, {MOBICOM} 2011, Las Vegas, Nevada, USA,
               September 19-23, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0492-4},
  timestamp = {Thu, 18 Aug 2016 11:19:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobicom/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wmcsa/2011,
  editor    = {Anthony LaMarca and
               Landon P. Cox},
  title     = {12th Workshop on Mobile Computing Systems and Applications, HotMobile
               '11, Phoenix, AZ, USA, March 1-3, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2184489},
  doi       = {10.1145/2184489},
  isbn      = {978-1-4503-0649-2},
  timestamp = {Tue, 06 Nov 2018 16:59:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wmcsa/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier