Gang Wang
Title
Cited by
Cited by
Year
You are how you click: Clickstream analysis for sybil detection
G Wang, T Konolige, C Wilson, X Wang, H Zheng, BY Zhao
22nd {USENIX} Security Symposium ({USENIX} Security 13), 241-256, 2013
2712013
Serf and turf: crowdturfing for fun and profit
G Wang, C Wilson, X Zhao, Y Zhu, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 21st international conference on World Wide Web, 679-688, 2012
2442012
Wisdom in the social crowd: an analysis of quora
G Wang, K Gill, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 22nd international conference on World Wide Web, 1341-1352, 2013
1982013
I am the antenna: accurate outdoor AP location using smartphones
Z Zhang, X Zhou, W Zhang, Y Zhang, G Wang, BY Zhao, H Zheng
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1732011
Follow the green: growth and dynamics in twitter follower markets
G Stringhini, G Wang, M Egele, C Kruegel, G Vigna, H Zheng, BY Zhao
Proceedings of the 2013 conference on Internet measurement conference, 163-176, 2013
1702013
Social Turing Tests: Crowdsourcing Sybil Detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, B Zhao
Proceedings of The 20th Annual Network & Distributed System Security …, 2013
1662013
Social turing tests: Crowdsourcing sybil detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, BY Zhao
arXiv preprint arXiv:1205.3856, 2012
1662012
Unsupervised clickstream clustering for user behavior analysis
G Wang, X Zhang, S Tang, H Zheng, BY Zhao
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1522016
Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers
G Wang, T Wang, H Zheng, BY Zhao
23rd USENIX Security Symposium, USENIX Association, 2014
1372014
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference (IMC), 2014
912014
Defending against sybil devices in crowdsourced mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
792016
Collusive data leak and more: Large-scale threat analysis of inter-app communications
A Bosu, F Liu, D Yao, G Wang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
732017
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
662018
Anatomy of a personalized livestreaming system
B Wang, X Zhang, G Wang, H Zheng, BY Zhao
Proceedings of the 2016 Internet Measurement Conference, 485-498, 2016
602016
Practical conflict graphs for dynamic spectrum distribution
X Zhou, Z Zhang, G Wang, X Yu, BY Zhao, H Zheng
Proceedings of the ACM SIGMETRICS/international conference on Measurement …, 2013
602013
Opinion search engine
JT Sun, X Ni, P Xu, G Wang, K Tang, Z Chen
US Patent 9,443,245, 2016
592016
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of The 18th ACM conference on Computer-Supported Cooperative …, 2015
432015
On the validity of geosocial mobility traces
Z Zhang, L Zhou, X Zhao, G Wang, Y Su, M Metzger, H Zheng, BY Zhao
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 1-7, 2013
432013
All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems
KC Zeng, S Liu, Y Shu, D Wang, H Li, Y Dou, G Wang, Y Yang
27th {USENIX} Security Symposium ({USENIX} Security 18), 1527-1544, 2018
392018
A knowledge adoption model based framework for finding helpful user-generated contents in online communities
G Wang, X Liu, W Fan
372011
The system can't perform the operation now. Try again later.
Articles 1–20