@article{DBLP:journals/imwut/TuLLWWHSJ18,
author = {Zhen Tu and
Runtong Li and
Yong Li and
Gang Wang and
Di Wu and
Pan Hui and
Li Su and
Depeng Jin},
title = {Your Apps Give You Away: Distinguishing Mobile Users by Their App
Usage Fingerprints},
journal = {{IMWUT}},
volume = {2},
number = {3},
pages = {138:1--138:23},
year = {2018},
url = {https://doi.org/10.1145/3264948},
doi = {10.1145/3264948},
timestamp = {Thu, 20 Dec 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/journals/imwut/TuLLWWHSJ18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangWWNZZ18,
author = {Gang Wang and
Bolun Wang and
Tianyi Wang and
Ana Nika and
Haitao Zheng and
Ben Y. Zhao},
title = {Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services},
journal = {{IEEE/ACM} Trans. Netw.},
volume = {26},
number = {3},
pages = {1123--1136},
year = {2018},
url = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2818073},
doi = {10.1109/TNET.2018.2818073},
timestamp = {Tue, 10 Jul 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/ton/WangWWNZZ18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuoMXSWX18,
author = {Wenbo Guo and
Dongliang Mu and
Jun Xu and
Purui Su and
Gang Wang and
Xinyu Xing},
title = {{LEMNA:} Explaining Deep Learning based Security Applications},
booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
pages = {364--379},
year = {2018},
crossref = {DBLP:conf/ccs/2018},
url = {https://doi.org/10.1145/3243734.3243792},
doi = {10.1145/3243734.3243792},
timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/GuoMXSWX18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangPWW18,
author = {Xiangwen Wang and
Peng Peng and
Chun Wang and
Gang Wang},
title = {You Are Your Photographs: Detecting Multiple Identities of Vendors
in the Darknet Marketplaces},
booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications
Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
pages = {431--442},
year = {2018},
crossref = {DBLP:conf/ccs/2018asia},
url = {https://doi.org/10.1145/3196494.3196529},
doi = {10.1145/3196494.3196529},
timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/WangPWW18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/WangJHBW18,
author = {Chun Wang and
Steve T. K. Jan and
Hang Hu and
Douglas Bossart and
Gang Wang},
title = {The Next Domino to Fall: Empirical Analysis of User Passwords across
Online Services},
booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application
Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
2018},
pages = {196--203},
year = {2018},
crossref = {DBLP:conf/codaspy/2018},
url = {https://doi.org/10.1145/3176258.3176332},
doi = {10.1145/3176258.3176332},
timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/codaspy/WangJHBW18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/group/JanWZW18,
author = {Steve T. K. Jan and
Chun Wang and
Qing Zhang and
Gang Wang},
title = {Pay-per-Question: Towards Targeted Q{\&}A with Payments},
booktitle = {Proceedings of the 2018 {ACM} Conference on Supporting Groupwork,
{GROUP} 2018, Sanibel Island, FL, USA, January 07 - 10, 2018},
pages = {1--11},
year = {2018},
crossref = {DBLP:conf/group/2018},
url = {https://doi.org/10.1145/3148330.3148332},
doi = {10.1145/3148330.3148332},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/group/JanWZW18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/TianJ0Y018,
author = {Ke Tian and
Steve T. K. Jan and
Hang Hu and
Danfeng Yao and
Gang Wang},
title = {Needle in a Haystack: Tracking Down Elite Phishing Domains in the
Wild},
booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
Boston, MA, USA, October 31 - November 02, 2018},
pages = {429--442},
year = {2018},
crossref = {DBLP:conf/imc/2018},
url = {https://dl.acm.org/citation.cfm?id=3278569},
timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/imc/TianJ0Y018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangG0WJS18,
author = {Huandong Wang and
Chen Gao and
Yong Li and
Gang Wang and
Depeng Jin and
Jingbo Sun},
title = {De-anonymization of Mobility Trajectories: Dissecting the Gaps between
Theory and Practice},
booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
2018, San Diego, California, USA, February 18-21, 2018},
year = {2018},
crossref = {DBLP:conf/ndss/2018},
url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_06B-3\_Wang\_paper.pdf},
timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/ndss/WangG0WJS18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/WangLWJ18,
author = {Huandong Wang and
Yong Li and
Gang Wang and
Depeng Jin},
title = {You Are How You Move: Linking Multiple User Identities From Massive
Mobility Traces},
booktitle = {Proceedings of the 2018 {SIAM} International Conference on Data Mining,
{SDM} 2018, May 3-5, 2018, San Diego Marriott Mission Valley, San
Diego, CA, {USA.}},
pages = {189--197},
year = {2018},
crossref = {DBLP:conf/sdm/2018},
url = {https://doi.org/10.1137/1.9781611975321.22},
doi = {10.1137/1.9781611975321.22},
timestamp = {Wed, 07 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/sdm/WangLWJ18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/0002PW18,
author = {Hang Hu and
Peng Peng and
Gang Wang},
title = {Towards Understanding the Adoption of Anti-Spoofing Protocols in Email
Systems},
booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
USA, September 30 - October 2, 2018},
pages = {94--101},
year = {2018},
crossref = {DBLP:conf/secdev/2018},
url = {https://doi.org/10.1109/SecDev.2018.00020},
doi = {10.1109/SecDev.2018.00020},
timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/secdev/0002PW18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MuCYHXMW18,
author = {Dongliang Mu and
Alejandro Cuevas and
Limin Yang and
Hang Hu and
Xinyu Xing and
Bing Mao and
Gang Wang},
title = {Understanding the Reproducibility of Crowd-reported Security Vulnerabilities},
booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
MD, USA, August 15-17, 2018.},
pages = {919--936},
year = {2018},
crossref = {DBLP:conf/uss/2018},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/mu},
timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/MuCYHXMW18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Hu018,
author = {Hang Hu and
Gang Wang},
title = {End-to-End Measurements of Email Spoofing Attacks},
booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
MD, USA, August 15-17, 2018.},
pages = {1095--1112},
year = {2018},
crossref = {DBLP:conf/uss/2018},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/hu},
timestamp = {Tue, 21 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/Hu018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZengLSWLDWY18,
author = {Kexiong (Curtis) Zeng and
Shinan Liu and
Yuanchao Shu and
Dong Wang and
Haoyu Li and
Yanzhi Dou and
Gang Wang and
Yaling Yang},
title = {All Your {GPS} Are Belong To Us: Towards Stealthy Manipulation of
Road Navigation Systems},
booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
MD, USA, August 15-17, 2018.},
pages = {1527--1544},
year = {2018},
crossref = {DBLP:conf/uss/2018},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/zeng},
timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/ZengLSWLDWY18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/WangWWSZLZZ17,
author = {Tianyi Wang and
Gang Wang and
Bolun Wang and
Divya Sambasivan and
Zengbin Zhang and
Xing Li and
Haitao Zheng and
Ben Y. Zhao},
title = {Value and Misinformation in Collaborative Investing Platforms},
journal = {{TWEB}},
volume = {11},
number = {2},
pages = {8:1--8:32},
year = {2017},
url = {https://doi.org/10.1145/3027487},
doi = {10.1145/3027487},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/journals/tweb/WangWWSZLZZ17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/WangZTWZZ17,
author = {Gang Wang and
Xinyi Zhang and
Shiliang Tang and
Christo Wilson and
Haitao Zheng and
Ben Y. Zhao},
title = {Clickstream User Behavior Models},
journal = {{TWEB}},
volume = {11},
number = {4},
pages = {21:1--21:37},
year = {2017},
url = {https://doi.org/10.1145/3068332},
doi = {10.1145/3068332},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/journals/tweb/WangZTWZZ17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BosuLYW17,
author = {Amiangshu Bosu and
Fang Liu and
Danfeng (Daphne) Yao and
Gang Wang},
title = {Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app
Communications},
booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
2017},
pages = {71--85},
year = {2017},
crossref = {DBLP:conf/ccs/2017asia},
url = {https://doi.org/10.1145/3052973.3053004},
doi = {10.1145/3052973.3053004},
timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/BosuLYW17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/KhandpurJJ0LR17,
author = {Rupinder Paul Khandpur and
Taoran Ji and
Steve T. K. Jan and
Gang Wang and
Chang{-}Tien Lu and
Naren Ramakrishnan},
title = {Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media},
booktitle = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge
Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},
pages = {1049--1057},
year = {2017},
crossref = {DBLP:conf/cikm/2017},
url = {https://doi.org/10.1145/3132847.3132866},
doi = {10.1145/3132847.3132866},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/cikm/KhandpurJJ0LR17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/YanLWLZJZ17,
author = {Huan Yan and
Tzu{-}Heng Lin and
Gang Wang and
Yong Li and
Haitao Zheng and
Depeng Jin and
Ben Y. Zhao},
title = {On Migratory Behavior in Video Consumption},
booktitle = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge
Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},
pages = {1109--1118},
year = {2017},
crossref = {DBLP:conf/cikm/2017},
url = {https://doi.org/10.1145/3132847.3132884},
doi = {10.1145/3132847.3132884},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/cikm/YanLWLZJZ17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiuCWYER17,
author = {Fang Liu and
Haipeng Cai and
Gang Wang and
Danfeng (Daphne) Yao and
Karim O. Elish and
Barbara G. Ryder},
title = {Prioritized Analysis of Inter-App Communication Risks},
booktitle = {Proceedings of the Seventh {ACM} on Conference on Data and Application
Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
2017},
pages = {159--161},
year = {2017},
crossref = {DBLP:conf/codaspy/2017},
url = {https://doi.org/10.1145/3029806.3029843},
doi = {10.1145/3029806.3029843},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/codaspy/LiuCWYER17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/ZhangTZWZZ17,
author = {Xinyi Zhang and
Shiliang Tang and
Yun Zhao and
Gang Wang and
Haitao Zheng and
Ben Y. Zhao},
title = {Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments
System},
booktitle = {Proceedings of the Eleventh International Conference on Web and Social
Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada,
May 15-18, 2017.},
pages = {387--396},
year = {2017},
crossref = {DBLP:conf/icwsm/2017},
url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15589},
timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/icwsm/ZhangTZWZZ17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/YanLW0ZJZ17,
author = {Huan Yan and
Tzu{-}Heng Lin and
Gang Wang and
Yong Li and
Haitao Zheng and
Depeng Jin and
Ben Y. Zhao},
title = {A First Look at User Switching Behaviors Over Multiple Video Content
Providers},
booktitle = {Proceedings of the Eleventh International Conference on Web and Social
Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada,
May 15-18, 2017.},
pages = {700--703},
year = {2017},
crossref = {DBLP:conf/icwsm/2017},
url = {https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15646},
timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/icwsm/YanLW0ZJZ17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/KedrowitschYWC17,
author = {Alexander Kedrowitsch and
Danfeng (Daphne) Yao and
Gang Wang and
Kirk Cameron},
title = {A First Look: Using Linux Containers for Deceptive Honeypots},
booktitle = {Proceedings of the 2017 Workshop on Automated Decision Making for
Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October
30 - November 03, 2017},
pages = {15--22},
year = {2017},
crossref = {DBLP:conf/safeconfig/2017},
url = {https://doi.org/10.1145/3140368.3140371},
doi = {10.1145/3140368.3140371},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/safeconfig/KedrowitschYWC17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuCWYER17,
author = {Fang Liu and
Haipeng Cai and
Gang Wang and
Danfeng Yao and
Karim O. Elish and
Barbara G. Ryder},
title = {MR-Droid: {A} Scalable and Prioritized Analysis of Inter-App Communication
Risks},
booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
Jose, CA, USA, May 25, 2017},
pages = {189--198},
year = {2017},
crossref = {DBLP:conf/sp/2017w},
url = {https://doi.org/10.1109/SPW.2017.12},
doi = {10.1109/SPW.2017.12},
timestamp = {Wed, 29 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/sp/LiuCWYER17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuWPYW17,
author = {Fang Liu and
Chun Wang and
Andres Pico and
Danfeng Yao and
Gang Wang},
title = {Measuring the Insecurity of Mobile Deep Links of Android},
booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
BC, Canada, August 16-18, 2017.},
pages = {953--969},
year = {2017},
crossref = {DBLP:conf/uss/2017},
url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/liu},
timestamp = {Thu, 14 Sep 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/LiuWPYW17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KhandpurJJWLR17,
author = {Rupinder Paul Khandpur and
Taoran Ji and
Steve T. K. Jan and
Gang Wang and
Chang{-}Tien Lu and
Naren Ramakrishnan},
title = {Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media},
journal = {CoRR},
volume = {abs/1702.07745},
year = {2017},
url = {http://arxiv.org/abs/1702.07745},
archivePrefix = {arXiv},
eprint = {1702.07745},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/KhandpurJJWLR17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JanWZW17,
author = {Steve T. K. Jan and
Chun Wang and
Qing Zhang and
Gang Wang},
title = {Analyzing Payment Based Question and Answering Service},
journal = {CoRR},
volume = {abs/1703.01333},
year = {2017},
url = {http://arxiv.org/abs/1703.01333},
archivePrefix = {arXiv},
eprint = {1703.01333},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/JanWZW17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangJHW17,
author = {Chun Wang and
Steve T. K. Jan and
Hang Hu and
Gang Wang},
title = {Empirical Analysis of Password Reuse and Modification across Online
Service},
journal = {CoRR},
volume = {abs/1706.01939},
year = {2017},
url = {http://arxiv.org/abs/1706.01939},
archivePrefix = {arXiv},
eprint = {1706.01939},
timestamp = {Tue, 21 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/WangJHW17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/WangCWWWLZZ16,
author = {Tianyi Wang and
Yang Chen and
Yi Wang and
Bolun Wang and
Gang Wang and
Xing Li and
Haitao Zheng and
Ben Y. Zhao},
title = {The power of comments: fostering social interactions in microblog
networks},
journal = {Frontiers Comput. Sci.},
volume = {10},
number = {5},
pages = {889--907},
year = {2016},
url = {https://doi.org/10.1007/s11704-016-5198-y},
doi = {10.1007/s11704-016-5198-y},
timestamp = {Mon, 19 Feb 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/journals/fcsc/WangCWWWLZZ16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/WangZTZZ16,
author = {Gang Wang and
Xinyi Zhang and
Shiliang Tang and
Haitao Zheng and
Ben Y. Zhao},
title = {Unsupervised Clickstream Clustering for User Behavior Analysis},
booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
Systems, San Jose, CA, USA, May 7-12, 2016},
pages = {225--236},
year = {2016},
crossref = {DBLP:conf/chi/2016},
url = {https://doi.org/10.1145/2858036.2858107},
doi = {10.1145/2858036.2858107},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/chi/WangZTZZ16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwsm/WangSZZ16,
author = {Gang Wang and
Sarita Yardi Schoenebeck and
Haitao Zheng and
Ben Y. Zhao},
title = {"Will Check-in for Badges": Understanding Bias and Misbehavior
on Location-Based Social Networks},
booktitle = {Proceedings of the Tenth International Conference on Web and Social
Media, Cologne, Germany, May 17-20, 2016.},
pages = {417--426},
year = {2016},
crossref = {DBLP:conf/icwsm/2016},
url = {http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13027},
timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/icwsm/WangSZZ16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WangZWZZ16,
author = {Bolun Wang and
Xinyi Zhang and
Gang Wang and
Haitao Zheng and
Ben Y. Zhao},
title = {Anatomy of a Personalized Livestreaming System},
booktitle = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
{IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
pages = {485--498},
year = {2016},
crossref = {DBLP:conf/imc/2016},
url = {http://dl.acm.org/citation.cfm?id=2987453},
timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
biburl = {https://dblp.org/rec/bib/conf/imc/WangZWZZ16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/WangWWNZZ16a,
author = {Gang Wang and
Bolun Wang and
Tianyi Wang and
Ana Nika and
Haitao Zheng and
Ben Y. Zhao},
title = {Poster: Defending against Sybil Devices in Crowdsourced Mapping Services},
booktitle = {Proceedings of the 14th Annual International Conference on Mobile
Systems, Applications, and Services Companion, Singapore, Singapore,
June 25-30, 2016},
pages = {146},
year = {2016},
crossref = {DBLP:conf/mobisys/2016c},
url = {https://doi.org/10.1145/2938559.2938610},
doi = {10.1145/2938559.2938610},
timestamp = {Tue, 06 Nov 2018 16:59:04 +0100},
biburl = {https://dblp.org/rec/bib/conf/mobisys/WangWWNZZ16a},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/WangWWNZZ16,
author = {Gang Wang and
Bolun Wang and
Tianyi Wang and
Ana Nika and
Haitao Zheng and
Ben Y. Zhao},
title = {Defending against Sybil Devices in Crowdsourced Mapping Services},
booktitle = {Proceedings of the 14th Annual International Conference on Mobile
Systems, Applications, and Services, MobiSys 2016, Singapore, June
26-30, 2016},
pages = {179--191},
year = {2016},
crossref = {DBLP:conf/mobisys/2016},
url = {https://doi.org/10.1145/2906388.2906420},
doi = {10.1145/2906388.2906420},
timestamp = {Tue, 06 Nov 2018 16:59:04 +0100},
biburl = {https://dblp.org/rec/bib/conf/mobisys/WangWWNZZ16},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ZhouZWYZZ15,
author = {Xia Zhou and
Zengbin Zhang and
Gang Wang and
Xiaoxiao Yu and
Ben Y. Zhao and
Haitao Zheng},
title = {Practical Conflict Graphs in the Wild},
journal = {{IEEE/ACM} Trans. Netw.},
volume = {23},
number = {3},
pages = {824--835},
year = {2015},
url = {https://doi.org/10.1109/TNET.2014.2306416},
doi = {10.1109/TNET.2014.2306416},
timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/ton/ZhouZWYZZ15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscw/WangWWSZZZ15,
author = {Gang Wang and
Tianyi Wang and
Bolun Wang and
Divya Sambasivan and
Zengbin Zhang and
Haitao Zheng and
Ben Y. Zhao},
title = {Crowds on Wall Street: Extracting Value from Collaborative Investing
Platforms},
booktitle = {Proceedings of the 18th {ACM} Conference on Computer Supported Cooperative
Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada,
March 14 - 18, 2015},
pages = {17--30},
year = {2015},
crossref = {DBLP:conf/cscw/2015},
url = {https://doi.org/10.1145/2675133.2675144},
doi = {10.1145/2675133.2675144},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/cscw/WangWWSZZZ15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangWWNLZZ15,
author = {Gang Wang and
Bolun Wang and
Tianyi Wang and
Ana Nika and
Bingzhe Liu and
Haitao Zheng and
Ben Y. Zhao},
title = {Attacks and Defenses in Crowdsourced Mapping Services},
journal = {CoRR},
volume = {abs/1508.00837},
year = {2015},
url = {http://arxiv.org/abs/1508.00837},
archivePrefix = {arXiv},
eprint = {1508.00837},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/WangWWNLZZ15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/WangWWNZZ14,
author = {Gang Wang and
Bolun Wang and
Tianyi Wang and
Ana Nika and
Haitao Zheng and
Ben Y. Zhao},
title = {Whispers in the dark: analysis of an anonymous social network},
booktitle = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
Vancouver, BC, Canada, November 5-7, 2014},
pages = {137--150},
year = {2014},
crossref = {DBLP:conf/imc/2014},
url = {https://doi.org/10.1145/2663716.2663728},
doi = {10.1145/2663716.2663728},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/imc/WangWWNZZ14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangWZZ14,
author = {Gang Wang and
Tianyi Wang and
Haitao Zheng and
Ben Y. Zhao},
title = {Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing
Workers},
booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
USA, August 20-22, 2014.},
pages = {239--254},
year = {2014},
crossref = {DBLP:conf/uss/2014},
url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wang},
timestamp = {Tue, 22 Aug 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/WangWZZ14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangWWSZZZ14,
author = {Gang Wang and
Tianyi Wang and
Bolun Wang and
Divya Sambasivan and
Zengbin Zhang and
Haitao Zheng and
Ben Y. Zhao},
title = {Crowds on Wall Street: Extracting Value from Social Investing Platforms},
journal = {CoRR},
volume = {abs/1406.1137},
year = {2014},
url = {http://arxiv.org/abs/1406.1137},
archivePrefix = {arXiv},
eprint = {1406.1137},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/WangWWSZZZ14},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WangSHF13,
author = {Gang Wang and
Jack W. Stokes and
Cormac Herley and
David Felstead},
title = {Detecting malicious landing pages in Malware Distribution Networks},
booktitle = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
pages = {1--11},
year = {2013},
crossref = {DBLP:conf/dsn/2013},
url = {https://doi.org/10.1109/DSN.2013.6575316},
doi = {10.1109/DSN.2013.6575316},
timestamp = {Thu, 14 Sep 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/dsn/WangSHF13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/ZhangZZWSMZZ13,
author = {Zengbin Zhang and
Lin Zhou and
Xiaohan Zhao and
Gang Wang and
Yu Su and
Miriam J. Metzger and
Haitao Zheng and
Ben Y. Zhao},
title = {On the validity of geosocial mobility traces},
booktitle = {Twelfth {ACM} Workshop on Hot Topics in Networks, HotNets-XII, College
Park, MD, USA, November 21-22, 2013},
pages = {11:1--11:7},
year = {2013},
crossref = {DBLP:conf/hotnets/2013},
url = {https://doi.org/10.1145/2535771.2535786},
doi = {10.1145/2535771.2535786},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/hotnets/ZhangZZWSMZZ13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/StringhiniWEKVZZ13,
author = {Gianluca Stringhini and
Gang Wang and
Manuel Egele and
Christopher Kruegel and
Giovanni Vigna and
Haitao Zheng and
Ben Y. Zhao},
title = {Follow the green: growth and dynamics in twitter follower markets},
booktitle = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
Barcelona, Spain, October 23-25, 2013},
pages = {163--176},
year = {2013},
crossref = {DBLP:conf/imc/2013},
url = {https://doi.org/10.1145/2504730.2504731},
doi = {10.1145/2504730.2504731},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/imc/StringhiniWEKVZZ13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangMWWMZZ13,
author = {Gang Wang and
Manish Mohanlal and
Christo Wilson and
Xiao Wang and
Miriam J. Metzger and
Haitao Zheng and
Ben Y. Zhao},
title = {Social Turing Tests: Crowdsourcing Sybil Detection},
booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS}
2013, San Diego, California, USA, February 24-27, 2013},
year = {2013},
crossref = {DBLP:conf/ndss/2013},
url = {https://www.ndss-symposium.org/ndss2013/social-turing-tests-crowdsourcing-sybil-detection},
timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
biburl = {https://dblp.org/rec/bib/conf/ndss/WangMWWMZZ13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WangWLZZ13,
author = {Tianyi Wang and
Gang Wang and
Xing Li and
Haitao Zheng and
Ben Y. Zhao},
title = {Characterizing and detecting malicious crowdsourcing},
booktitle = {{ACM} {SIGCOMM} 2013 Conference, SIGCOMM'13, Hong Kong, China, August
12-16, 2013},
pages = {537--538},
year = {2013},
crossref = {DBLP:conf/sigcomm/2013},
url = {https://doi.org/10.1145/2486001.2491719},
doi = {10.1145/2486001.2491719},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/sigcomm/WangWLZZ13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/ZhouZWYZZ13,
author = {Xia Zhou and
Zengbin Zhang and
Gang Wang and
Xiaoxiao Yu and
Ben Y. Zhao and
Haitao Zheng},
title = {Practical conflict graphs for dynamic spectrum distribution},
booktitle = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling
of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21,
2013},
pages = {5--16},
year = {2013},
crossref = {DBLP:conf/sigmetrics/2013},
url = {https://doi.org/10.1145/2465529.2465545},
doi = {10.1145/2465529.2465545},
timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
biburl = {https://dblp.org/rec/bib/conf/sigmetrics/ZhouZWYZZ13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangKWWZZ13,
author = {Gang Wang and
Tristan Konolige and
Christo Wilson and
Xiao Wang and
Haitao Zheng and
Ben Y. Zhao},
title = {You Are How You Click: Clickstream Analysis for Sybil Detection},
booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
USA, August 14-16, 2013},
pages = {241--256},
year = {2013},
crossref = {DBLP:conf/uss/2013},
url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang},
timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/WangKWWZZ13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WangGMZZ13,
author = {Gang Wang and
Konark Gill and
Manish Mohanlal and
Haitao Zheng and
Ben Y. Zhao},
title = {Wisdom in the social crowd: an analysis of quora},
booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
Brazil, May 13-17, 2013},
pages = {1341--1352},
year = {2013},
crossref = {DBLP:conf/www/2013},
url = {https://doi.org/10.1145/2488388.2488506},
doi = {10.1145/2488388.2488506},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/www/WangGMZZ13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dyspan/ZhouZWYZZ12,
author = {Xia Zhou and
Zengbin Zhang and
Gang Wang and
Xiaoxiao Yu and
Ben Y. Zhao and
Haitao Zheng},
title = {Measurement-calibrated conflict graphs for dynamic spectrum distribution},
booktitle = {{IEEE} International Symposium on Dynamic Spectrum Access Networks,
DySPAN 2012, Bellevue, WA, USA, October 16-19, 2012},
pages = {287},
year = {2012},
crossref = {DBLP:conf/dyspan/2012},
url = {https://doi.org/10.1109/DYSPAN.2012.6478150},
doi = {10.1109/DYSPAN.2012.6478150},
timestamp = {Wed, 23 Aug 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/conf/dyspan/ZhouZWYZZ12},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WangWZZMZZ12,
author = {Gang Wang and
Christo Wilson and
Xiaohan Zhao and
Yibo Zhu and
Manish Mohanlal and
Haitao Zheng and
Ben Y. Zhao},
title = {Serf and turf: crowdturfing for fun and profit},
booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
Lyon, France, April 16-20, 2012},
pages = {679--688},
year = {2012},
crossref = {DBLP:conf/www/2012},
url = {https://doi.org/10.1145/2187836.2187928},
doi = {10.1145/2187836.2187928},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/www/WangWZZMZZ12},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-3856,
author = {Gang Wang and
Manish Mohanlal and
Christo Wilson and
Xiao Wang and
Miriam J. Metzger and
Haitao Zheng and
Ben Y. Zhao},
title = {Social Turing Tests: Crowdsourcing Sybil Detection},
journal = {CoRR},
volume = {abs/1205.3856},
year = {2012},
url = {http://arxiv.org/abs/1205.3856},
archivePrefix = {arXiv},
eprint = {1205.3856},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/abs-1205-3856},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/ZhangZZZWZZ11,
author = {Zengbin Zhang and
Xia Zhou and
Weile Zhang and
Yuanyang Zhang and
Gang Wang and
Ben Y. Zhao and
Haitao Zheng},
title = {I am the antenna: accurate outdoor {AP} location using smartphones},
booktitle = {Proceedings of the 17th Annual International Conference on Mobile
Computing and Networking, {MOBICOM} 2011, Las Vegas, Nevada, USA,
September 19-23, 2011},
pages = {109--120},
year = {2011},
crossref = {DBLP:conf/mobicom/2011},
url = {https://doi.org/10.1145/2030613.2030626},
doi = {10.1145/2030613.2030626},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/bib/conf/mobicom/ZhangZZZWZZ11},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/WilsonSWSZZ11,
author = {Christo Wilson and
Troy Steinbauer and
Gang Wang and
Alessandra Sala and
Haitao Zheng and
Ben Y. Zhao},
title = {Privacy, availability and economics in the Polaris mobile social network},
booktitle = {12th Workshop on Mobile Computing Systems and Applications, HotMobile
'11, Phoenix, AZ, USA, March 1-3, 2011},
pages = {42--47},
year = {2011},
crossref = {DBLP:conf/wmcsa/2011},
url = {https://doi.org/10.1145/2184489.2184499},
doi = {10.1145/2184489.2184499},
timestamp = {Tue, 06 Nov 2018 16:59:22 +0100},
biburl = {https://dblp.org/rec/bib/conf/wmcsa/WilsonSWSZZ11},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-5654,
author = {Gang Wang and
Christo Wilson and
Xiaohan Zhao and
Yibo Zhu and
Manish Mohanlal and
Haitao Zheng and
Ben Y. Zhao},
title = {Serf and Turf: Crowdturfing for Fun and Profit},
journal = {CoRR},
volume = {abs/1111.5654},
year = {2011},
url = {http://arxiv.org/abs/1111.5654},
archivePrefix = {arXiv},
eprint = {1111.5654},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/corr/abs-1111-5654},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
editor = {David Lie and
Mohammad Mannan and
Michael Backes and
XiaoFeng Wang},
title = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2018, Toronto, ON, Canada, October
15-19, 2018},
publisher = {{ACM}},
year = {2018},
url = {http://dl.acm.org/citation.cfm?id=3243734},
isbn = {978-1-4503-5693-0},
timestamp = {Wed, 31 Oct 2018 17:23:34 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asia,
editor = {Jong Kim and
Gail{-}Joon Ahn and
Seungjoo Kim and
Yongdae Kim and
Javier L{\'{o}}pez and
Taesoo Kim},
title = {Proceedings of the 2018 on Asia Conference on Computer and Communications
Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
publisher = {{ACM}},
year = {2018},
url = {https://doi.org/10.1145/3196494},
doi = {10.1145/3196494},
timestamp = {Wed, 21 Nov 2018 12:44:06 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/2018asia},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2018,
editor = {Ziming Zhao and
Gail{-}Joon Ahn and
Ram Krishnan and
Gabriel Ghinita},
title = {Proceedings of the Eighth {ACM} Conference on Data and Application
Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
2018},
publisher = {{ACM}},
year = {2018},
url = {http://dl.acm.org/citation.cfm?id=3176258},
timestamp = {Wed, 08 Aug 2018 06:19:54 +0200},
biburl = {https://dblp.org/rec/bib/conf/codaspy/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/group/2018,
editor = {Andrea Forte and
Michael Prilla and
Adriana S. Vivacqua and
Claudia M{\"{u}}ller and
Lionel P. Robert Jr.},
title = {Proceedings of the 2018 {ACM} Conference on Supporting Groupwork,
{GROUP} 2018, Sanibel Island, FL, USA, January 07 - 10, 2018},
publisher = {{ACM}},
year = {2018},
url = {http://dl.acm.org/citation.cfm?id=3148330},
isbn = {978-1-4503-5562-9},
timestamp = {Fri, 22 Dec 2017 14:28:22 +0100},
biburl = {https://dblp.org/rec/bib/conf/group/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2018,
title = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
Boston, MA, USA, October 31 - November 02, 2018},
publisher = {{ACM}},
year = {2018},
url = {http://dl.acm.org/citation.cfm?id=3278532},
isbn = {978-1-4503-5619-0},
timestamp = {Sat, 03 Nov 2018 18:25:41 +0100},
biburl = {https://dblp.org/rec/bib/conf/imc/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2018,
title = {25th Annual Network and Distributed System Security Symposium, {NDSS}
2018, San Diego, California, USA, February 18-21, 2018},
publisher = {The Internet Society},
year = {2018},
url = {https://www.ndss-symposium.org/ndss2018/},
timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
biburl = {https://dblp.org/rec/bib/conf/ndss/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdm/2018,
editor = {Martin Ester and
Dino Pedreschi},
title = {Proceedings of the 2018 {SIAM} International Conference on Data Mining,
{SDM} 2018, May 3-5, 2018, San Diego Marriott Mission Valley, San
Diego, CA, {USA}},
publisher = {{SIAM}},
year = {2018},
url = {https://doi.org/10.1137/1.9781611975321},
doi = {10.1137/1.9781611975321},
isbn = {978-1-61197-532-1},
timestamp = {Sun, 13 May 2018 11:47:13 +0200},
biburl = {https://dblp.org/rec/bib/conf/sdm/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secdev/2018,
title = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
USA, September 30 - October 2, 2018},
publisher = {{IEEE} Computer Society},
year = {2018},
url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8526271},
isbn = {978-1-5386-7662-2},
timestamp = {Thu, 29 Nov 2018 11:14:13 +0100},
biburl = {https://dblp.org/rec/bib/conf/secdev/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2018,
editor = {William Enck and
Adrienne Porter Felt},
title = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
MD, USA, August 15-17, 2018},
publisher = {{USENIX} Association},
year = {2018},
url = {https://www.usenix.org/conference/usenixsecurity18},
timestamp = {Mon, 20 Aug 2018 15:16:35 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017asia,
editor = {Ramesh Karri and
Ozgur Sinanoglu and
Ahmad{-}Reza Sadeghi and
Xun Yi},
title = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
2017},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3052973},
doi = {10.1145/3052973},
isbn = {978-1-4503-4944-4},
timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/2017asia},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cikm/2017,
editor = {Ee{-}Peng Lim and
Marianne Winslett and
Mark Sanderson and
Ada Wai{-}Chee Fu and
Jimeng Sun and
J. Shane Culpepper and
Eric Lo and
Joyce C. Ho and
Debora Donato and
Rakesh Agrawal and
Yu Zheng and
Carlos Castillo and
Aixin Sun and
Vincent S. Tseng and
Chenliang Li},
title = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge
Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},
publisher = {{ACM}},
year = {2017},
url = {http://dl.acm.org/citation.cfm?id=3132847},
isbn = {978-1-4503-4918-5},
timestamp = {Tue, 07 Nov 2017 16:24:37 +0100},
biburl = {https://dblp.org/rec/bib/conf/cikm/2017},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
editor = {Gail{-}Joon Ahn and
Alexander Pretschner and
Gabriel Ghinita},
title = {Proceedings of the Seventh {ACM} on Conference on Data and Application
Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
2017},
publisher = {{ACM}},
year = {2017},
url = {http://dl.acm.org/citation.cfm?id=3029806},
isbn = {978-1-4503-4523-1},
timestamp = {Sat, 18 Mar 2017 19:19:49 +0100},
biburl = {https://dblp.org/rec/bib/conf/codaspy/2017},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icwsm/2017,
title = {Proceedings of the Eleventh International Conference on Web and Social
Media, {ICWSM} 2017, Montr{\'{e}}al, Qu{\'{e}}bec, Canada,
May 15-18, 2017},
publisher = {{AAAI} Press},
year = {2017},
url = {http://www.aaai.org/Library/ICWSM/icwsm17contents.php},
isbn = {978-1-57735-788-9},
timestamp = {Fri, 19 May 2017 12:45:06 +0200},
biburl = {https://dblp.org/rec/bib/conf/icwsm/2017},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2017,
editor = {Nicholas J. Multari and
Anoop Singhal and
Erin Miller},
title = {Proceedings of the 2017 Workshop on Automated Decision Making for
Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October
30 - November 03, 2017},
publisher = {{ACM}},
year = {2017},
url = {http://dl.acm.org/citation.cfm?id=3140368},
isbn = {978-1-4503-5203-1},
timestamp = {Tue, 27 Feb 2018 18:32:45 +0100},
biburl = {https://dblp.org/rec/bib/conf/safeconfig/2017},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2017w,
title = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
Jose, CA, USA, May 25, 2017},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8226722},
isbn = {978-1-5386-1968-1},
timestamp = {Mon, 01 Jan 2018 14:41:28 +0100},
biburl = {https://dblp.org/rec/bib/conf/sp/2017w},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2017,
editor = {Engin Kirda and
Thomas Ristenpart},
title = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
BC, Canada, August 16-18, 2017},
publisher = {{USENIX} Association},
year = {2017},
url = {https://www.usenix.org/conference/usenixsecurity17},
timestamp = {Fri, 01 Sep 2017 12:24:05 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/2017},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2016,
editor = {Jofish Kaye and
Allison Druin and
Cliff Lampe and
Dan Morris and
Juan Pablo Hourcade},
title = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing
Systems, San Jose, CA, USA, May 7-12, 2016},
publisher = {{ACM}},
year = {2016},
url = {http://dl.acm.org/citation.cfm?id=2858036},
isbn = {978-1-4503-3362-7},
timestamp = {Sun, 08 May 2016 11:21:03 +0200},
biburl = {https://dblp.org/rec/bib/conf/chi/2016},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icwsm/2016,
title = {Proceedings of the Tenth International Conference on Web and Social
Media, Cologne, Germany, May 17-20, 2016},
publisher = {{AAAI} Press},
year = {2016},
url = {http://www.aaai.org/Library/ICWSM/icwsm16contents.php},
isbn = {978-1-57735-758-2},
timestamp = {Sun, 22 May 2016 11:02:56 +0200},
biburl = {https://dblp.org/rec/bib/conf/icwsm/2016},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2016,
editor = {Phillipa Gill and
John S. Heidemann and
John W. Byers and
Ramesh Govindan},
title = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
{IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2987443},
doi = {10.1145/2987443},
isbn = {978-1-4503-4526-2},
timestamp = {Tue, 06 Nov 2018 11:07:19 +0100},
biburl = {https://dblp.org/rec/bib/conf/imc/2016},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisys/2016c,
editor = {Rajesh Krishna Balan and
Archan Misra and
Landon P. Cox and
Yutaka Arakawa and
Xia Zhou and
Robert LiKamWa},
title = {Proceedings of the 14th Annual International Conference on Mobile
Systems, Applications, and Services Companion, Singapore, Singapore,
June 25-30, 2016},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2938559},
doi = {10.1145/2938559},
isbn = {978-1-4503-4416-6},
timestamp = {Tue, 06 Nov 2018 16:59:04 +0100},
biburl = {https://dblp.org/rec/bib/conf/mobisys/2016c},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisys/2016,
editor = {Rajesh Krishna Balan and
Archan Misra and
Sharad Agarwal and
Cecilia Mascolo},
title = {Proceedings of the 14th Annual International Conference on Mobile
Systems, Applications, and Services, MobiSys 2016, Singapore, June
26-30, 2016},
publisher = {{ACM}},
year = {2016},
url = {https://doi.org/10.1145/2906388},
doi = {10.1145/2906388},
isbn = {978-1-4503-4269-8},
timestamp = {Tue, 06 Nov 2018 16:59:04 +0100},
biburl = {https://dblp.org/rec/bib/conf/mobisys/2016},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cscw/2015,
editor = {Dan Cosley and
Andrea Forte and
Luigina Ciolfi and
David McDonald},
title = {Proceedings of the 18th {ACM} Conference on Computer Supported Cooperative
Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada,
March 14 - 18, 2015},
publisher = {{ACM}},
year = {2015},
url = {http://dl.acm.org/citation.cfm?id=2675133},
isbn = {978-1-4503-2922-4},
timestamp = {Wed, 29 Mar 2017 16:45:22 +0200},
biburl = {https://dblp.org/rec/bib/conf/cscw/2015},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2014,
editor = {Carey Williamson and
Aditya Akella and
Nina Taft},
title = {Proceedings of the 2014 Internet Measurement Conference, {IMC} 2014,
Vancouver, BC, Canada, November 5-7, 2014},
publisher = {{ACM}},
year = {2014},
url = {http://dl.acm.org/citation.cfm?id=2663716},
isbn = {978-1-4503-3213-2},
timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
biburl = {https://dblp.org/rec/bib/conf/imc/2014},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2014,
editor = {Kevin Fu and
Jaeyeon Jung},
title = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
USA, August 20-22, 2014},
publisher = {{USENIX} Association},
year = {2014},
url = {https://www.usenix.org/conference/usenixsecurity14},
timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/2014},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2013,
title = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6569391},
isbn = {978-1-4673-6471-3},
timestamp = {Thu, 31 Mar 2016 11:12:40 +0200},
biburl = {https://dblp.org/rec/bib/conf/dsn/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2013,
editor = {Dave Levine and
Sachin Katti and
Dave Oran},
title = {Twelfth {ACM} Workshop on Hot Topics in Networks, HotNets-XII, College
Park, MD, USA, November 21-22, 2013},
publisher = {{ACM}},
year = {2013},
url = {http://dl.acm.org/citation.cfm?id=2535771},
isbn = {978-1-4503-2596-7},
timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
biburl = {https://dblp.org/rec/bib/conf/hotnets/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/imc/2013,
editor = {Konstantina Papagiannaki and
P. Krishna Gummadi and
Craig Partridge},
title = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
Barcelona, Spain, October 23-25, 2013},
publisher = {{ACM}},
year = {2013},
url = {http://dl.acm.org/citation.cfm?id=2504730},
isbn = {978-1-4503-1953-9},
timestamp = {Sat, 19 Aug 2017 20:08:45 +0200},
biburl = {https://dblp.org/rec/bib/conf/imc/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2013,
title = {20th Annual Network and Distributed System Security Symposium, {NDSS}
2013, San Diego, California, USA, February 24-27, 2013},
publisher = {The Internet Society},
year = {2013},
url = {https://www.ndss-symposium.org/ndss2013/},
timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
biburl = {https://dblp.org/rec/bib/conf/ndss/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2013,
editor = {Dah Ming Chiu and
Jia Wang and
Paul Barford and
Srinivasan Seshan},
title = {{ACM} {SIGCOMM} 2013 Conference, SIGCOMM'13, Hong Kong, China, August
12-16, 2013},
publisher = {{ACM}},
year = {2013},
url = {http://dl.acm.org/citation.cfm?id=2486001},
isbn = {978-1-4503-2056-6},
timestamp = {Wed, 20 Jun 2018 15:57:49 +0200},
biburl = {https://dblp.org/rec/bib/conf/sigcomm/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmetrics/2013,
editor = {Mor Harchol{-}Balter and
John R. Douceur and
Jun Xu},
title = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling
of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21,
2013},
publisher = {{ACM}},
year = {2013},
url = {https://doi.org/10.1145/2465529},
doi = {10.1145/2465529},
isbn = {978-1-4503-1900-3},
timestamp = {Tue, 06 Nov 2018 11:07:17 +0100},
biburl = {https://dblp.org/rec/bib/conf/sigmetrics/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2013,
editor = {Samuel T. King},
title = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
USA, August 14-16, 2013},
publisher = {{USENIX} Association},
year = {2013},
url = {https://www.usenix.org/conference/usenixsecurity13},
isbn = {978-1-931971-03-4},
timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
biburl = {https://dblp.org/rec/bib/conf/uss/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2013,
editor = {Daniel Schwabe and
Virg{\'{\i}}lio A. F. Almeida and
Hartmut Glaser and
Ricardo A. Baeza{-}Yates and
Sue B. Moon},
title = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro,
Brazil, May 13-17, 2013},
publisher = {International World Wide Web Conferences Steering Committee / {ACM}},
year = {2013},
url = {http://dl.acm.org/citation.cfm?id=2488388},
isbn = {978-1-4503-2035-1},
timestamp = {Sat, 24 Aug 2013 18:12:36 +0200},
biburl = {https://dblp.org/rec/bib/conf/www/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dyspan/2012,
title = {{IEEE} International Symposium on Dynamic Spectrum Access Networks,
DySPAN 2012, Bellevue, WA, USA, October 16-19, 2012},
publisher = {{IEEE}},
year = {2012},
url = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6472867},
isbn = {978-1-4673-4447-0},
timestamp = {Sun, 04 Oct 2015 12:34:51 +0200},
biburl = {https://dblp.org/rec/bib/conf/dyspan/2012},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/www/2012,
editor = {Alain Mille and
Fabien L. Gandon and
Jacques Misselis and
Michael Rabinovich and
Steffen Staab},
title = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
Lyon, France, April 16-20, 2012},
publisher = {{ACM}},
year = {2012},
url = {http://dl.acm.org/citation.cfm?id=2187836},
isbn = {978-1-4503-1229-5},
timestamp = {Thu, 19 Apr 2012 14:34:44 +0200},
biburl = {https://dblp.org/rec/bib/conf/www/2012},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2011,
editor = {Parmesh Ramanathan and
Thyaga Nandagopal and
Brian Neil Levine},
title = {Proceedings of the 17th Annual International Conference on Mobile
Computing and Networking, {MOBICOM} 2011, Las Vegas, Nevada, USA,
September 19-23, 2011},
publisher = {{ACM}},
year = {2011},
isbn = {978-1-4503-0492-4},
timestamp = {Thu, 18 Aug 2016 11:19:41 +0200},
biburl = {https://dblp.org/rec/bib/conf/mobicom/2011},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wmcsa/2011,
editor = {Anthony LaMarca and
Landon P. Cox},
title = {12th Workshop on Mobile Computing Systems and Applications, HotMobile
'11, Phoenix, AZ, USA, March 1-3, 2011},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/2184489},
doi = {10.1145/2184489},
isbn = {978-1-4503-0649-2},
timestamp = {Tue, 06 Nov 2018 16:59:22 +0100},
biburl = {https://dblp.org/rec/bib/conf/wmcsa/2011},
bibsource = {dblp computer science bibliography, https://dblp.org}
}