default search action
Haining Wang 0001
Person information
- affiliation: Virginia Tech, Department of Electrical and Computer Engineering, Arlington, VA, USA
- affiliation: Virginia Tech, Department of Electrical and Computer Engineering, Blacksburg, VA, USA
- affiliation (2014 - 2019): University of Delaware, Department of Electrical and Computer Engineering, Newark, DE, USA
- affiliation (2003 - 2014): College of William and Mary, Department of Computer Science, Williamsburg, VA, USA
- affiliation (PhD 2003): University of Michigan, Ann Arbor, MI, USA
Other persons with the same name
- Haining Wang (aka: Hai-Ning Wang) — disambiguation page
- Haining Wang 0002 — University of California, Department of Electrical and Computer Engineering, Davis, CA, USA
- Haining Wang 0003 — Hunan University, College of Electrical and Information Engineering, Changsha, China
- Haining Wang 0004 — Hunan University, School of Design, Changsha, China (and 1 more)
- Haining Wang 0005 — Indiana University Bloomington, Department of Information and Library Science, Bloomington, IN, USA
- Haining Wang 0006 — Yunnan University, National Pilot School of Software, Kunming, China
- Haining Wang 0007 — Beihang University, Institute of Artificial Intelligence, Beijing, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j73]Mahsa Foruhandeh, Hanchao Yang, Xiang Cheng, Angelos Stavrou, Haining Wang, Yaling Yang:
All in one: Improving GPS accuracy and security via crowdsourcing. Comput. Networks 254: 110775 (2024) - [j72]Kai Yang, Qiang Li, Haining Wang, Limin Sun, Jiqiang Liu:
Fingerprinting Industrial IoT devices based on multi-branch neural network. Expert Syst. Appl. 238(Part F): 122371 (2024) - [j71]Ke Li, Haining Wang, Ming Zhou, Hongsong Zhu, Limin Sun:
Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms. IEEE Internet Things J. 11(7): 12240-12251 (2024) - [j70]Yubao Zhang, Haining Wang, Angelos Stavrou:
A multiview clustering framework for detecting deceptive reviews. J. Comput. Secur. 32(1): 31-52 (2024) - [j69]Jiongyu Dai, Qiang Li, Haining Wang, Lingjia Liu:
Understanding images of surveillance devices in the wild. Knowl. Based Syst. 284: 111226 (2024) - [j68]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Jerry Park:
OPTILOD: Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones. Sensors 24(6): 1865 (2024) - [j67]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Jerry Park, Ryan M. Gerdes:
Securing Your Airspace: Detection of Drones Trespassing Protected Areas. Sensors 24(7): 2028 (2024) - [j66]Jinke Song, Qiang Li, Haining Wang, Jiqiang Liu:
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports. IEEE Trans. Dependable Secur. Comput. 21(4): 3785-3800 (2024) - [c158]Sudip Maitra, Tolga O. Atalay, Angelos Stavrou, Haining Wang:
Towards Shielding 5G Control Plane Functions. DSN 2024: 302-315 - [c157]Ming Zhou, Haining Wang, Ke Li, Hongsong Zhu, Limin Sun:
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs. EuroSys 2024: 1192-1207 - [c156]Rui Bian, Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Silent Observers Make a Difference: A Large-scale Analysis of Transparent Proxies on the Internet. INFOCOM 2024: 1671-1680 - [c155]Pragya Sharma, Tolga O. Atalay, Hans-Andrew Gibbs, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang:
5G-WAVE: A Core Network Framework with Decentralized Authorization for Network Slices. INFOCOM 2024: 2308-2317 - [c154]Shihua Sun, Pragya Sharma, Kenechukwu Nwodo, Angelos Stavrou, Haining Wang:
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method. ISC (2) 2024: 286-306 - [c153]Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun:
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator. SP 2024: 2775-2793 - [i17]Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
OSS Malicious Package Analysis in the Wild. CoRR abs/2404.04991 (2024) - [i16]Xiaoyan Zhou, Feiran Liang, Zhaojie Xie, Yang Lan, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems. CoRR abs/2404.11467 (2024) - [i15]Pragya Sharma, Tolga O. Atalay, Hans-Andrew Gibbs, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang:
5G-WAVE: A Core Network Framework with Decentralized Authorization for Network Slices. CoRR abs/2404.13242 (2024) - [i14]Ziyang Wang, Jianzhou You, Haining Wang, Tianwei Yuan, Shichao Lv, Yang Wang, Limin Sun:
HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model. CoRR abs/2406.01882 (2024) - [i13]Yongle Chen, Feng Ma, Ying Zhang, YongZhong He, Haining Wang, Qiang Li:
AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale. CoRR abs/2406.12947 (2024) - [i12]Xiaoqin Liang, Guannan Liu, Lin Jin, Shuai Hao, Haining Wang:
Pathfinder: Exploring Path Diversity for Assessing Internet Censorship Inconsistency. CoRR abs/2407.04213 (2024) - [i11]Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, Limin Sun:
TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves. CoRR abs/2407.06853 (2024) - [i10]Ying Zhang, Xiaoyan Zhou, Hui Wen, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models. CoRR abs/2407.08532 (2024) - [i9]Shihua Sun, Shridatt Sugrim, Angelos Stavrou, Haining Wang:
Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning. CoRR abs/2407.09958 (2024) - [i8]Shihua Sun, Pragya Sharma, Kenechukwu Nwodo, Angelos Stavrou, Haining Wang:
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method. CoRR abs/2408.07152 (2024) - [i7]Shihua Sun, Kenechukwu Nwodo, Shridatt Sugrim, Angelos Stavrou, Haining Wang:
ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer. CoRR abs/2409.13828 (2024) - 2023
- [j65]Shangfeng Wan, Qiang Li, Haining Wang, Hong Li, Limin Sun:
DevTag: A Benchmark for Fingerprinting IoT Devices. IEEE Internet Things J. 10(7): 6388-6399 (2023) - [j64]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Park:
iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement. IEEE Internet Things J. 10(16): 14226-14238 (2023) - [j63]Alireza Famili, Tolga O. Atalay, Angelos Stavrou, Haining Wang, Jung-Min Park:
OFDRA: Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs. IEEE J. Sel. Areas Commun. 41(12): 3783-3798 (2023) - [j62]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Park:
PILOT: High-Precision Indoor Localization for Autonomous Drones. IEEE Trans. Veh. Technol. 72(5): 6445-6459 (2023) - [c152]Shariful Alam, Le Guan, Zeyu Chen, Haining Wang, Jidong Xiao:
CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution. ICDCS 2023: 84-95 - [c151]Guannan Liu, Lin Jin, Shuai Hao, Yubao Zhang, Daiping Liu, Angelos Stavrou, Haining Wang:
Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains. IMC 2023: 198-212 - [c150]Tolga O. Atalay, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang:
Securing 5G OpenRAN with a Scalable Authorization Framework for xApps. INFOCOM 2023: 1-10 - [c149]Alireza Famili, Tolga O. Atalay, Angelos Stavrou, Haining Wang:
Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks. MetaCom 2023: 17-24 - [c148]Zeyu Chen, Daiping Liu, Jidong Xiao, Haining Wang:
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability. RAID 2023: 623-638 - [c147]Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li:
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. SP 2023: 2409-2426 - [c146]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Jerry Park:
EGO-6: Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs. SVCC 2023: 1-8 - [c145]Alireza Famili, Tolga O. Atalay, Angelos Stavrou, Haining Wang:
Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation. VTC2023-Spring 2023: 1-7 - [i6]Xuan Feng, Shuo Chen, Haining Wang:
An Internet-wide Penetration Study on NAT Boxes via TCP/IP Side Channel. CoRR abs/2311.17392 (2023) - [i5]Tolga O. Atalay, Dragoslav Stojadinovic, Alireza Famili, Angelos Stavrou, Haining Wang:
A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes. CoRR abs/2312.04833 (2023) - 2022
- [j61]Kai Yang, Haining Wang, Hongsong Zhu, Limin Sun:
An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. Comput. Ind. 138: 103613 (2022) - [j60]Rui Bian, Shuai Hao, Haining Wang, Chase Cotton:
Shining a light on dark places: A comprehensive analysis of open proxy ecosystem. Comput. Networks 208: 108893 (2022) - [j59]Xing Gao, Jidong Xiao, Haining Wang, Angelos Stavrou:
Understanding the Security Implication of Aborting Virtual Machine Live Migration. IEEE Trans. Cloud Comput. 10(2): 1275-1286 (2022) - [j58]Xing Gao, Guannan Liu, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:
Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy. IEEE Trans. Dependable Secur. Comput. 19(1): 208-226 (2022) - [j57]Yue Li, Zeyu Chen, Haining Wang, Kun Sun, Sushil Jajodia:
Understanding Account Recovery in the Wild and its Security Implications. IEEE Trans. Dependable Secur. Comput. 19(1): 620-634 (2022) - [j56]Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. IEEE Trans. Dependable Secur. Comput. 19(6): 4099-4112 (2022) - [c144]Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang:
Ready Raider One: Exploring the Misuse of Cloud Gaming Services. CCS 2022: 1993-2007 - [c143]Rebekah Houser, Shuai Hao, Chase Cotton, Haining Wang:
A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale. DSN 2022: 193-204 - [c142]Kenton McDonough, Xing Gao, Shuai Wang, Haining Wang:
Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads. DSN 2022: 402-414 - [c141]Tolga O. Atalay, Dragoslav Stojadinovic, Alireza Famili, Angelos Stavrou, Haining Wang:
Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End 5G Testbed. GLOBECOM 2022: 2056-2061 - [c140]Alireza Famili, Mahsa Foruhandeh, Tolga O. Atalay, Angelos Stavrou, Haining Wang:
GPS Spoofing Detection by Leveraging 5G Positioning Capabilities. LATINCOM 2022: 1-6 - [c139]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Jerry Park:
SPIN: Sensor Placement for Indoor Navigation of Drones. LATINCOM 2022: 1-6 - [c138]Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun:
BinProv: Binary Code Provenance Identification without Disassembly. RAID 2022: 350-363 - [c137]Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements. SIGMETRICS (Abstracts) 2022: 17-18 - [c136]Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton:
Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints. SP 2022: 1002-1017 - [c135]Yuan Liang, Xing Gao, Kun Sun, Wenjie Xiong, Haining Wang:
An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels. SRDS 2022: 46-57 - [c134]Guannan Liu, Xing Gao, Haining Wang, Kun Sun:
Exploring the Unchartered Space of Container Registry Typosquatting. USENIX Security Symposium 2022: 35-51 - [c133]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Jerry Park:
RAIL: Robust Acoustic Indoor Localization for Drones. VTC Spring 2022: 1-6 - [c132]Tolga O. Atalay, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang:
Scaling Network Slices with a 5G Testbed: A Resource Consumption Study. WCNC 2022: 2649-2654 - [i4]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Jerry Park:
PILOT: High-Precision Indoor Localization for Autonomous Drones. CoRR abs/2201.10488 (2022) - [i3]Alireza Famili, Angelos Stavrou, Haining Wang, Jung-Min Park:
OPTILOD: Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones. CoRR abs/2201.10691 (2022) - [i2]Tolga O. Atalay, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang:
Securing 5G OpenRAN with a Scalable Authorization Framework for xApps. CoRR abs/2212.11465 (2022) - 2021
- [j55]Yutao Tang, Yue Li, Qun Li, Kun Sun, Haining Wang, Zhengrui Qin:
User input enrichment via sensing devices. Comput. Networks 196: 108262 (2021) - [j54]Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements. Proc. ACM Meas. Anal. Comput. Syst. 5(3): 43:1-43:25 (2021) - [j53]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds. IEEE Trans. Cloud Comput. 9(1): 401-413 (2021) - [j52]Xing Gao, Benjamin Steenkamer, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:
A Study on the Security Implications of Information Leakages in Container Clouds. IEEE Trans. Dependable Secur. Comput. 18(1): 174-191 (2021) - [j51]Qiang Li, Zhihao Wang, Dawei Tan, Jinke Song, Haining Wang, Limin Sun, Jiqiang Liu:
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE/ACM Trans. Netw. 29(4): 1798-1812 (2021) - [c131]Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton:
An Exploration of ARM System-Level Cache and GPU Side Channels. ACSAC 2021: 784-795 - [c130]Yue Li, Zhenyu Wu, Haining Wang, Kun Sun, Zhichun Li, Kangkook Jee, Junghwan Rhee, Haifeng Chen:
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs. CODASPY 2021: 161-172 - [c129]Qiang Li, Jinke Song, Dawei Tan, Haining Wang, Jiqiang Liu:
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities. DSN 2021: 161-173 - [c128]Joseph Connelly, Taylor Roberts, Xing Gao, Jidong Xiao, Haining Wang, Angelos Stavrou:
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection. DSN 2021: 350-362 - [c127]Hao Yang, Kun Du, Yubao Zhang, Shuai Hao, Haining Wang, Jia Zhang, Haixin Duan:
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO. ESORICS (1) 2021: 263-284 - [c126]Lin Jin, Shuai Hao, Yan Huang, Haining Wang, Chase Cotton:
DNSonChain: Delegating Privacy-Preserved DNS Resolution to Blockchain. ICNP 2021: 1-11 - [c125]Rebekah Houser, Shuai Hao, Zhou Li, Daiping Liu, Chase Cotton, Haining Wang:
A Comprehensive Measurement-based Investigation of DNS Hijacking. SRDS 2021: 210-221 - [c124]Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang:
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage. USENIX Security Symposium 2021: 681-698 - [c123]Guannan Liu, Xing Gao, Haining Wang:
An Investigation of Identity-Account Inconsistency in Single Sign-On. WWW 2021: 105-117 - [c122]Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Understanding the Impact of Encrypted DNS on Internet Censorship. WWW 2021: 484-495 - 2020
- [j50]Jinke Song, Qiang Li, Haining Wang, Limin Sun:
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 05:1-05:25 (2020) - [j49]Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, Sushil Jajodia:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [c121]Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang:
Understanding Promotion-as-a-Service on GitHub. ACSAC 2020: 597-610 - [c120]Yubao Zhang, Shuai Hao, Haining Wang:
Review Trade: Everything Is Free in Incentivized Review Groups. SecureComm (1) 2020: 339-359 - [c119]Jinke Song, Qiang Li, Haining Wang, Limin Sun:
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. SIGMETRICS (Abstracts) 2020: 77-78 - [c118]Zhihao Wang, Qiang Li, Jinke Song, Haining Wang, Limin Sun:
Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks. WWW 2020: 1422-1432
2010 – 2019
- 2019
- [j48]Rui Bian, Shuai Hao, Haining Wang, Amogh Dhamdhere, Alberto Dainotti, Chase Cotton:
Towards passive analysis of anycast in global routing: unintended impact of remote peering. Comput. Commun. Rev. 49(3): 18-25 (2019) - [j47]Yue Li, Haining Wang, Kun Sun:
BluePass: A Mobile Device Assisted Password Manager. EAI Endorsed Trans. Security Safety 5(17): e3 (2019) - [j46]Yang Song, Chen Wu, Sencun Zhu, Haining Wang:
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection. EAI Endorsed Trans. Security Safety 5(18): e3 (2019) - [c117]Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
Casino royale: a deep exploration of illegal online gambling. ACSAC 2019: 500-513 - [c116]Rebekah Houser, Zhou Li, Chase Cotton, Haining Wang:
An investigation on information leakage of DNS over TLS. CoNEXT 2019: 123-137 - [c115]Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks. ICNP 2019: 1-11 - [c114]Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. USENIX Security Symposium 2019: 887-903 - 2018
- [j45]Qiang Li, Xuan Feng, Haining Wang, Limin Sun:
Understanding the Usage of Industrial Control System Devices on the Internet. IEEE Internet Things J. 5(3): 2178-2189 (2018) - [j44]Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang:
Towards Transparent Debugging. IEEE Trans. Dependable Secur. Comput. 15(2): 321-335 (2018) - [c113]Zi Chu, Steven Gianvecchio, Haining Wang:
Bot or Human? A Behavior-Based Online Bot Detection System. From Database to Cyber Security 2018: 432-449 - [c112]Daiping Liu, Mingwei Zhang, Haining Wang:
A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. CCS 2018: 1635-1648 - [c111]Lin Jin, Shuai Hao, Haining Wang, Chase Cotton:
Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services. DSN 2018: 362-373 - [c110]Haitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang, Angelos Stavrou:
Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace. ESORICS (2) 2018: 143-163 - [c109]Qiang Li, Xuan Feng, Haining Wang, Limin Sun:
Discovery of Internet of Thing devices based on rules. INFOCOM Workshops 2018: 1-2 - [c108]Yue Li, Haining Wang, Kun Sun:
Email as a Master Key: Analyzing Account Recovery in the Wild. INFOCOM 2018: 1646-1654 - [c107]Haitao Xu, Shuai Hao, Alparslan Sari, Haining Wang:
Privacy Risk Assessment on Email Tracking. INFOCOM 2018: 2519-2527 - [c106]Qiang Li, Xuan Feng, Haining Wang, Zhi Li, Limin Sun:
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. INFOCOM 2018: 2537-2545 - [c105]Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:
Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center. NDSS 2018 - [c104]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices. USENIX Security Symposium 2018: 327-341 - [c103]Shuai Hao, Yubao Zhang, Haining Wang, Angelos Stavrou:
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks. USENIX Security Symposium 2018: 1129-1145 - 2017
- [j43]Shuai Hao, Haining Wang:
Exploring Domain Name Based Features on the Effectiveness of DNS Caching. Comput. Commun. Rev. 47(1): 36-42 (2017) - [j42]Nicolas Van Balen, Christopher T. Ball, Haining Wang:
Analysis of Targeted Mouse Movements for Gender Classification. EAI Endorsed Trans. Security Safety 4(11): e3 (2017) - [j41]Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang, Su He:
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending. IEEE Trans. Inf. Forensics Secur. 12(1): 144-156 (2017) - [j40]Yue Li, Haining Wang, Kun Sun:
Personal Information in Passwords and Its Security Implications. IEEE Trans. Inf. Forensics Secur. 12(10): 2320-2333 (2017) - [j39]Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou:
An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service. ACM Trans. Web 11(2): 13:1-13:35 (2017) - [c102]Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Hai-Xin Duan:
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains. CCS 2017: 537-552 - [c101]Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. DSN 2017: 237-248 - [c100]Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou:
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. DSN 2017: 615-626 - [c99]Yue Li, Nan Zheng, Haining Wang, Kun Sun, Hui Fang:
A measurement study on Amazon wishlist and its privacy exposure. ICC 2017: 1-7 - [c98]Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou:
E-Android: A New Energy Profiling Tool for Smartphones. ICDCS 2017: 492-502 - [c97]Dachuan Liu, Xing Gao, Haining Wang:
Location Privacy Breach: Apps Are Watching You in Background. ICDCS 2017: 2423-2429 - [c96]Qiang Li, Xuan Feng, Haining Wang, Limin Sun:
Automatically Discovering Surveillance Devices in the Cyberspace. MMSys 2017: 331-342 - [c95]Yue Li, Haining Wang, Kun Sun:
BluePass: A Secure Hand-Free Password Manager. SecureComm 2017: 185-205 - [c94]Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:
Why "Some" Like It Hot Too: Thermal Attack on Data Centers. SIGMETRICS (Abstracts) 2017: 23-24 - 2016
- [j38]Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia:
Profiling Online Social Behaviors for Compromised Account Detection. IEEE Trans. Inf. Forensics Secur. 11(1): 176-187 (2016) - [j37]Nan Zheng, Aaron Paloski, Haining Wang:
An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics. ACM Trans. Inf. Syst. Secur. 18(3): 11:1-11:27 (2016) - [j36]Zhen Ren, Xin Qi, Gang Zhou, Haining Wang, David T. Nguyen:
Throughput Assurance for Multiple Body Sensor Networks. IEEE Trans. Parallel Distributed Syst. 27(2): 546-557 (2016) - [j35]Dachuan Liu, Haining Wang, Gang Zhou, Weizhen Mao, Boyang Li:
Arbitrating Traffic Contention for Power Saving with Multiple PSM Clients. IEEE Trans. Wirel. Commun. 15(10): 7030-7043 (2016) - [c93]Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang:
High Fidelity Data Reduction for Big Data Security Dependency Analyses. CCS 2016: 504-516 - [c92]Daiping Liu, Shuai Hao, Haining Wang:
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records. CCS 2016: 1414-1425 - [c91]Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang:
On Energy Security of Smartphones. CODASPY 2016: 148-150 - [c90]Jidong Xiao, Lei Lu, Haining Wang, Xiaoyun Zhu:
HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code. ICAC 2016: 127-136 - [c89]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
Characterizing industrial control system devices on the Internet. ICNP 2016: 1-10 - [c88]Xuan Feng, Qiang Li, Haining Wang, Limin Sun:
ASCEND: A search engine for online industrial control devices. ICNP 2016: 1-2 - [c87]Qiang Li, Xuan Feng, Zhi Li, Haining Wang, Limin Sun:
GUIDE: Graphical user interface fingerprints physical devices. ICNP 2016: 1-2 - [c86]Yue Li, Haining Wang, Kun Sun:
A study of personal information in human-chosen passwords and its security implications. INFOCOM 2016: 1-9 - [c85]Aaron Koehl, Haining Wang:
SERF: optimization of socially sourced images using psychovisual enhancements. MMSys 2016: 16:1-16:12 - [c84]Nicolas Van Balen, Christopher T. Ball, Haining Wang:
A Behavioral Biometrics Based Approach to Online Gender Classification. SecureComm 2016: 475-495 - [c83]Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang:
Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games. SIGMETRICS 2016: 401-402 - [c82]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. USENIX ATC 2016 - 2015
- [j34]Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Yunwei Gao, Chuliang Weng, Yong Qi:
PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency. IEEE Trans. Computers 64(5): 1389-1401 (2015) - [j33]Zhenyu Wu, Zhang Xu, Haining Wang:
Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud. IEEE/ACM Trans. Netw. 23(2): 603-615 (2015) - [c81]Dachuan Liu, Bo Dong, Xing Gao, Haining Wang:
Exploiting Eye Tracking for Smartphone Authentication. ACNS 2015: 457-477 - [c80]Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou:
TrustLogin: Securing Password-Login on Commodity Operating Systems. AsiaCCS 2015: 333-344 - [c79]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Haining Wang:
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices. DSN 2015: 367-378 - [c78]Shuai Hao, Haining Wang, Angelos Stavrou, Evgenia Smirni:
On the DNS Deployment of Modern Web Services. ICNP 2015: 100-110 - [c77]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. LISA 2015: 1-12 - [c76]Haitao Xu, Haining Wang, Angelos Stavrou:
Privacy Risk Assessment on Online Photos. RAID 2015: 427-447 - [c75]Jidong Xiao, Hai Huang, Haining Wang:
Defeating Kernel Driver Purifier. SecureComm 2015: 116-134 - [c74]Jidong Xiao, Hai Huang, Haining Wang:
Kernel Data Attack Is a Realistic Security Threat. SecureComm 2015: 135-154 - [c73]Fengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun:
Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 - [c72]Xing Gao, Dachuan Liu, Haining Wang, Kun Sun:
PmDroid: Permission Supervision for Android Advertising. SRDS 2015: 120-129 - [c71]Zhang Xu, Haining Wang, Zhenyu Wu:
A Measurement Study on Co-residence Threat inside the Cloud. USENIX Security Symposium 2015: 929-944 - [c70]Haitao Xu, Daiping Liu, Haining Wang, Angelos Stavrou:
E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service. WWW 2015: 1296-1306 - 2014
- [j32]Zhen Ren, Xin Qi, Gang Zhou, Haining Wang:
Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing EEG Sensing. IEEE Internet Things J. 1(3): 243-254 (2014) - [c69]Brett Cooley, Haining Wang, Angelos Stavrou:
Activity Spoofing and Its Defense in Android Smartphones. ACNS 2014: 494-512 - [c68]Duy Le, Jidong Xiao, Hai Huang, Haining Wang:
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment. CNSM 2014: 169-174 - [c67]Hemant Sengar, Haining Wang, Seyed Amir Iranmanesh:
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear. CODASPY 2014: 345-356 - [c66]Daiping Liu, Haining Wang, Angelos Stavrou:
Detecting Malicious Javascript in PDF through Document Instrumentation. DSN 2014: 100-111 - [c65]Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou:
A Framework to Secure Peripherals at Runtime. ESORICS (1) 2014: 219-238 - [c64]Haitao Xu, Daiping Liu, Aaron Koehl, Haining Wang, Angelos Stavrou:
Click Fraud Detection on the Advertiser Side. ESORICS (2) 2014: 419-438 - [c63]Nan Zheng, Kun Bai, Hai Huang, Haining Wang:
You Are How You Touch: User Verification on Smartphones via Tapping Behaviors. ICNP 2014: 221-232 - [c62]Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang:
What scale of audience a campaign can reach in what price on Twitter? INFOCOM 2014: 1168-1176 - [c61]Zhang Xu, Haining Wang, Zichen Xu, Xiaorui Wang:
Power Attack: An Increasing Threat to Data Centers. NDSS 2014 - [c60]Nicolas Van Balen, Haining Wang:
GridMap: Enhanced Security in Cued-Recall Graphical Passwords. SecureComm (1) 2014: 75-94 - [c59]Zhang Xu, Haining Wang, Sushil Jajodia:
Gemini: An Emergency Line of Defense against Phishing Attacks. SRDS 2014: 11-20 - 2013
- [j31]Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia:
Blog or block: Detecting blog bots through behavioral biometrics. Comput. Networks 57(3): 634-646 (2013) - [j30]Zhenyu Wu, Yueping Zhang, Vishal K. Singh, Guofei Jiang, Haining Wang:
Automating Cloud Network Optimization and Evolution. IEEE J. Sel. Areas Commun. 31(12): 2620-2631 (2013) - [j29]Chuan Yue, Haining Wang:
A measurement study of insecure javascript practices on the web. ACM Trans. Web 7(2): 7:1-7:39 (2013) - [c58]Jing Jin, Jeff Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang:
Evasive bots masquerading as human beings on the web. DSN 2013: 1-12 - [c57]Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
Security implications of memory deduplication in a virtualized environment. DSN 2013: 1-12 - [c56]Xin Ruan, Chuan Yue, Haining Wang:
Unveiling Privacy Setting Breaches in Online Social Networks. SecureComm 2013: 323-341 - 2012
- [j28]Mengjun Xie, Zhenyu Wu, Haining Wang:
Secure instant messaging in enterprise-like networks. Comput. Networks 56(1): 448-461 (2012) - [j27]Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia:
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE Trans. Dependable Secur. Comput. 9(6): 811-824 (2012) - [j26]Zhenyu Wu, Mengjun Xie, Haining Wang:
On Energy Security of Server Systems. IEEE Trans. Dependable Secur. Comput. 9(6): 865-876 (2012) - [j25]Bo Sang, Jianfeng Zhan, Gang Lu, Haining Wang, Dongyan Xu, Lei Wang, Zhihong Zhang, Zhen Jia:
Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes. IEEE Trans. Parallel Distributed Syst. 23(6): 1159-1167 (2012) - [c55]Zi Chu, Indra Widjaja, Haining Wang:
Detecting Social Spam Campaigns on Twitter. ACNS 2012: 455-472 - [c54]Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
A covert channel construction in a virtualized environment. CCS 2012: 1040-1042 - [c53]Duy Le, Hai Huang, Haining Wang:
Understanding performance implications of nested file systems in a virtualized environment. FAST 2012: 8 - [c52]Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Chuliang Weng:
PowerTracer: tracing requests in multi-tier services to diagnose energy inefficiency. ICAC 2012: 97-102 - [c51]Mengjun Xie, Indra Widjaja, Haining Wang:
Enhancing cache robustness for content-centric networking. INFOCOM 2012: 2426-2434 - [c50]Zhenyu Wu, Yueping Zhang, Vishal K. Singh, Guofei Jiang, Haining Wang:
NetDEO: Automating network design, evolution, and optimization. IWQoS 2012: 1-9 - [c49]Aaron Koehl, Haining Wang:
m.Site: Efficient Content Adaptation for Mobile Devices. Middleware 2012: 41-60 - [c48]Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang:
A Voice Spam Filter to Clean Subscribers' Mailbox. SecureComm 2012: 349-367 - [c47]Zhenyu Wu, Zhang Xu, Haining Wang:
Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. USENIX Security Symposium 2012: 159-173 - [c46]Aaron Koehl, Haining Wang:
Surviving a search engine overload. WWW 2012: 171-180 - [e2]Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2 [contents] - 2011
- [j24]Zi Chu, Haining Wang:
An investigation of hotlinking and its countermeasures. Comput. Commun. 34(4): 577-590 (2011) - [j23]Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Special Issue: Securing Distributed Networks and Systems. Concurr. Comput. Pract. Exp. 23(12): 1311-1312 (2011) - [j22]Steven Gianvecchio, Haining Wang:
An Entropy-Based Approach to Detecting Covert Timing Channels. IEEE Trans. Dependable Secur. Comput. 8(6): 785-797 (2011) - [j21]Zhenyu Wu, Mengjun Xie, Haining Wang:
Design and Implementation of a Fast Dynamic Packet Filter. IEEE/ACM Trans. Netw. 19(5): 1405-1419 (2011) - [j20]Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, Haining Wang:
Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification. IEEE/ACM Trans. Netw. 19(5): 1557-1571 (2011) - [j19]Duy Le, Haining Wang:
An Effective Memory Optimization for Virtual Machine-Based Systems. IEEE Trans. Parallel Distributed Syst. 22(10): 1705-1713 (2011) - [c45]Nan Zheng, Aaron Paloski, Haining Wang:
An efficient user verification system via mouse movements. CCS 2011: 139-150 - [c44]Zhen Ren, Gang Zhou, Andrew J. Pyles, Matthew Keally, Weizhen Mao, Haining Wang:
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs. INFOCOM 2011: 2750-2758 - [c43]Zhenyu Wu, Mengjun Xie, Haining Wang:
Energy Attack on Server Systems. WOOT 2011: 62-70 - 2010
- [j18]Chuan Yue, Mengjun Xie, Haining Wang:
An automatic HTTP cookie management system. Comput. Networks 54(13): 2182-2198 (2010) - [j17]Heng Yin, Bo Sheng, Haining Wang, Jianping Pan:
Keychain-Based Signatures for Securing BGP. IEEE J. Sel. Areas Commun. 28(8): 1308-1318 (2010) - [j16]Yang Xiang, Wanlei Zhou, Haining Wang:
Security in next generation wireless networks. Secur. Commun. Networks 3(1): 1-3 (2010) - [j15]Chuan Yue, Haining Wang:
BogusBiter: A transparent protection against phishing attacks. ACM Trans. Internet Techn. 10(2): 6:1-6:31 (2010) - [c42]Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia:
Who is tweeting on Twitter: human, bot, or cyborg? ACSAC 2010: 21-30 - [c41]Zhenyu Wu, Steven Gianvecchio, Mengjun Xie, Haining Wang:
Mimimorphism: a new approach to binary code obfuscation. CCS 2010: 536-546 - [c40]Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Tracking Skype VoIP Calls Over The Internet. INFOCOM 2010: 96-100 - [c39]Mengjun Xie, Haining Wang:
A Collaboration-based Autonomous Reputation System for Email Services. INFOCOM 2010: 992-1000 - [c38]Duy Le, Haining Wang:
An effective feedback-driven approach for energy saving in battery powered systems. IWQoS 2010: 1-9 - [i1]Lin Yuan, Jianfeng Zhan, Bo Sang, Lei Wang, Haining Wang:
PowerTracer: Tracing requests in multi-tier services to save cluster power consumption. CoRR abs/1007.4890 (2010)
2000 – 2009
- 2009
- [j14]Chuan Yue, Haining Wang:
Profit-aware overload protection in E-commerce Web sites. J. Netw. Comput. Appl. 32(2): 347-356 (2009) - [c37]Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, Haining Wang:
Battle of Botcraft: fighting bots in online games with human observational proofs. CCS 2009: 256-268 - [c36]Eli Courtwright, Chuan Yue, Haining Wang:
Efficient resource management on template-based web servers. DSN 2009: 249-258 - [c35]Chuan Yue, Haining Wang:
SessionMagnifier: a simple approach to secure and convenient kiosk browsing. UbiComp 2009: 125-134 - [c34]Hemant Sengar, Xinyuan Wang, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Online detection of network traffic anomalies using behavioral distance. IWQoS 2009: 1-9 - [c33]Benjamin Strahs, Chuan Yue, Haining Wang:
Secure Passwords Through Enhanced Hashing. LISA 2009: 93-106 - [c32]Chuan Yue, Zi Chu, Haining Wang:
RCB: A Simple and Practical Framework for Real-time Collaborative Browsing. USENIX ATC 2009 - [c31]Chuan Yue, Haining Wang:
Characterizing insecure javascript practices on the web. WWW 2009: 961-970 - [e1]Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3838-9 [contents] - 2008
- [j13]Mengjun Xie, Heng Yin, Haining Wang:
Thwarting E-mail Spam Laundering. ACM Trans. Inf. Syst. Secur. 12(2): 13:1-13:32 (2008) - [j12]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distributed Syst. 19(6): 794-805 (2008) - [c30]Chuan Yue, Haining Wang:
Anti-Phishing in Offense and Defense. ACSAC 2008: 345-354 - [c29]Zhenyu Wu, Mengjun Xie, Haining Wang:
Swift: A Fast Dynamic Packet Filter. NSDI 2008: 279-292 - [c28]Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 - [c27]Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang:
Measurement and Classification of Humans and Bots in Internet Chat. USENIX Security Symposium 2008: 155-170 - 2007
- [j11]Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Songqing Chen, Xiaodong Zhang:
Cooperative Relay Service in a Wireless LAN. IEEE J. Sel. Areas Commun. 25(2): 355-368 (2007) - [j10]Xin Chen, Haining Wang, Shansi Ren, Xiaodong Zhang:
Maintaining Strong Cache Consistency for the Domain Name System. IEEE Trans. Knowl. Data Eng. 19(8): 1057-1071 (2007) - [j9]Haining Wang, Cheng Jin, Kang G. Shin:
Defense against spoofed IP traffic using hop-count filtering. IEEE/ACM Trans. Netw. 15(1): 40-53 (2007) - [j8]Heng Yin, Haining Wang:
Building an application-aware IPsec policy system. IEEE/ACM Trans. Netw. 15(6): 1502-1513 (2007) - [j7]Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang:
Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 18(3): 334-350 (2007) - [c26]Mengjun Xie, Zhenyu Wu, Haining Wang:
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. ACSAC 2007: 64-73 - [c25]Steven Gianvecchio, Haining Wang:
Detecting covert timing channels: an entropy-based approach. CCS 2007: 307-316 - [c24]Chuan Yue, Mengjun Xie, Haining Wang:
Automatic Cookie Usage Setting with CookiePicker. DSN 2007: 460-470 - [c23]Heng Yin, Bo Sheng, Haining Wang, Jianping Pan:
Securing BGP through Keychain-based Signatures. IWQoS 2007: 154-163 - [c22]Chuan Yue, Haining Wang:
Profit-aware Admission Control for Overload Protection in E-commerce Web Sites. IWQoS 2007: 188-193 - 2006
- [c21]Wyatt Chaffee, Bin Wang, Haining Wang:
Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks. BROADNETS 2006 - [c20]Mengjun Xie, Heng Yin, Haining Wang:
An effective defense against email spam laundering. CCS 2006: 179-190 - [c19]Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia:
VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402 - [c18]Xin Chen, Haining Wang, Shansi Ren:
DNScup: Strong Cache Consistency Protocol for DNS. ICDCS 2006: 40 - [c17]Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Songqing Chen, Xiaodong Zhang:
Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency. INFOCOM 2006 - [c16]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208 - [c15]Mengjun Xie, Keywan Tabatabai, Haining Wang:
Identifying Low-ProfileWeb Server's IP Fingerprint. QEST 2006: 365-374 - 2005
- [j6]Songqing Chen, Haining Wang, Xiaodong Zhang, Bo Shen, Susie J. Wee:
Segment-Based Proxy Caching for Internet Streaming Media Delivery. IEEE Multim. 12(3): 59-67 (2005) - [j5]Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang:
A study on object tracking quality under probabilistic coverage in sensor networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(1): 73-76 (2005) - [j4]Haining Wang, Abhijit Bose, Mohamed A. El-Gendy, Kang G. Shin:
IP Easy-pass: a light-weight network-edge resource access control. IEEE/ACM Trans. Netw. 13(6): 1247-1260 (2005) - [c14]Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang:
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications. DCOSS 2005: 228-243 - [c13]Xin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang:
SCOPE: scalable consistency maintenance in structured P2P systems. INFOCOM 2005: 1502-1513 - [c12]Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang:
Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks. IWQoS 2005: 107-122 - [c11]Heng Yin, Haining Wang:
Building an Application-aware IPsec Policy System. USENIX Security Symposium 2005 - 2004
- [j3]Haining Wang, Kang G. Shin:
Robust TCP congestion recovery. J. High Speed Networks 13(2): 103-121 (2004) - [j2]Haining Wang, Danlu Zhang, Kang G. Shin:
Change-Point Monitoring for the Detection of DoS Attacks. IEEE Trans. Dependable Secur. Comput. 1(4): 193-208 (2004) - [c10]Haining Wang, Abhijit Bose, Mohamed A. El-Gendy, Kang G. Shin:
IP Easy-pass: Edge Resource Access Control. INFOCOM 2004: 2583-2593 - 2003
- [b1]Haining Wang:
Countering distributed denial of service attacks. University of Michigan, USA, 2003 - [j1]Haining Wang, Kang G. Shin:
Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. IEEE Trans. Parallel Distributed Syst. 14(9): 873-884 (2003) - [c9]Cheng Jin, Haining Wang, Kang G. Shin:
Hop-count filtering: an effective defense against spoofed DDoS traffic. CCS 2003: 30-41 - [c8]Mohamed A. El-Gendy, Abhijit Bose, Haining Wang, Kang G. Shin:
Statistical Characterization for Per-hop QoS. IWQoS 2003: 21-40 - 2002
- [c7]Haining Wang, Danlu Zhang, Kang G. Shin:
SYN-dog: Sniffing SYN Flooding Sources. ICDCS 2002: 421-428 - [c6]Haining Wang, Danlu Zhang, Kang G. Shin:
Detecting SYN Flooding Attacks. INFOCOM 2002: 1530-1539 - [c5]Haining Wang, Kang G. Shin:
Layer-4 Service Differentiation and Resource Isolation. IEEE Real Time Technology and Applications Symposium 2002: 67-78 - 2001
- [c4]Haining Wang, Chia Shen, Kang G. Shin:
Adaptive-weighted packet scheduling for premium service. ICC 2001: 1846-1850 - [c3]Haining Wang, Kang G. Shin:
Robust TCP Congestion Recovery. ICDCS 2001: 199-206 - 2000
- [c2]Haining Wang, Kang G. Shin, Hongjie Xin, Douglas S. Reeves:
A Simple Refinement of Slow-Start of TCP Congestion Control. ISCC 2000: 98-105
1990 – 1999
- 1999
- [c1]Indra Widjaja, Haining Wang, Steven Wright, Amalendu Chatterjee:
Scalability Evaluation of Multi-Protocol Over ATM (MPOA). INFOCOM 1999: 1505-1512
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint