Office: Thomas M. Siebel Center
201 North Goodwin Avenue
MC 258, Room 4316
Urbana, IL 61801-2302
Phone: 217-244-1008
Email: gangw@illinois.edu

Google Scholar DBLP Twitter

CLASS

Spring 2024: CS463
Fall 2023: CS562
Spring 2023: CS463
Fall 2022: CS463
Fall 2021: CS463
Spring 2021: CS463
Fall 2020: CS598
Spring 2020: CS463
Fall 2019: CS598
Spring 2019: CS4264
Fall 2018: CS4984
Spring 2018: CS4264
Fall 2017: CS6604
Fall 2016: CS4264

NEWS

(Archived news)

14 May 2024:
Congrats to Qingying, Nirav, and Ying on their USENIX Security paper on adv attacks against phishing detectors.

1 May 2024:
First ICML paper!

29 Apr. 2024:
Congrats to Limin, Zhi, Nicholas, Zhenning, and Sushruth on their new USENIX Security paper on network alert analysis!

20 March. 2024:
Jaron is joining Arizona State University as an Assistant Professor! Congrats!

23 Jan. 2024:
Congrats to Ying and Qingying on their new WWW paper!

21 Jan. 2024:
Two papers (VeriSMS, Deepfake Moderation) accepted to CHI 2024!

27 Nov. 2023:
IMC 2024: TPC

16 Nov. 2023:
Congrats to Margie and Haeseung on their new ICWSM paper on deepfake profiles.

5 Nov. 2023:
A recent interview with The Washington Post on deepfake abuse.

23 Oct. 2023:
IEEE S&P 2024: Workshops Co-Chair.

18 Oct. 2023:
Recent interviews: with Bloomberg on deepfake ( article); with Rappler on review bombing (article).

26 Aug. 2023:
The Web Conf 2024: TPC

24 Aug. 2023:
A Spectrum News article covering our paper on survey bots (paper).

16 Aug. 2023:
Nicholas received $1000 from Mozilla Bug Bounty for the discovery of the vulnerability in Firefox Relay. Related paper here.

14 Aug. 2023:
EuroS&P 2024 TPC

8 May. 2023:
ACTION AI Institute is funded by NSF. Very excited about the upcoming research on AI-enabled cyber-defense.

30 Apr. 2023:
We worked with colleagues from Futurum to develop an article about our deepfake and phishing research as well as an activity sheet for K-12.

17 Apr. 2023:
USENIX Security 2024: TPC

29 Mar. 2023:
Another paper accepted to IEEE SP this year (ML and XAI for security operations)! Congrats to Jaron and Hadjer!

29 Mar. 2023:
Congrats to Zhi, Zhenning, and Limin on their feature-space drift paper (DLSP 2023)!

24 Mar. 2023:
TPC NDSS 2024.

12 Mar. 2023:
Jigsaw Puzzle is finally accepted to IEEE SP this year! Congrats to Limin, Zhi, Tu and all our collaborators.

4 Mar. 2023:
ACSAC 2023 TPC.

28 Feb. 2023:
IEEE SP 2024 TPC.

25 Feb. 2023:
New USENIX paper on adversarial attacks against Electronic Health Records (EHR) systems. Congrats everyone!

1 Feb. 2023:
Our paper on "privacy leakage in online health communities" was accepted. First time publishing at PoPETs/PETS. Congrats everyone!

9 Jan. 2023:
Recent interview with Scholarly Communication on discussing security/ML research and academic writing.

21 Dec. 2022:
Akul's mimicry attack paper accepted to NDSS 2023. Congrats!

12 Dec. 2022:
TPC CCS 2023.

05 Dec. 2022:
TPC of EthiCS 2023: co-located with NDSS.

22 Nov. 2022:
New paper on explanation methods for deep reinforcement learning accepted to USENIX Sec 2023. Congrats everyone!

9 Nov. 2022:
New paper on phishing indicators for people w/ visual impairments accepted to IEEE SP 2023. Congrats to Yaman, Divya, Smirity!

6 Oct. 2022:
MobiSys TPC 2023.

12 Sep. 2022:
Congrats to Margie on her new GROUP paper on disinformation explanation and a new WPES paper on vault app analysis (PDF)!

2 Jun. 2022:
I am co-organizing a Breakout Session at NSF SaTC meeting on AI for Security with Sagar, Anita, and Saptarshi. Please join us.

30 May 2022:
Giving a keynote at WORMA 2022

27 May 2022:
PhD Career day panel at The University of Chicago

26 May 2022:
Security panel at DLS 2022

13 Apr. 2022:
TPC of NDSS 2023

10 Apr. 2022:
Received extra funding from Jump ARCHES to support Undergraduate Summer Internship.

5 Apr. 2022:
Margie received the prestigious award from 2022 NSF Graduate Research Fellowship Program (GRFP). Congratulations!

(Archived News)

PRESS

2 Apr. 2020:
Interview with Vox on coronavirus scam and email phishing: article; video.

Recent press coverage on our GPS spoofing project
Forbes, The Wall Street Journal ACM TechNews, The Cyberwire podcast, The Register, Naked Security, BleepingComputer, Hackster, and more.

Recent press coverage on our spear phishing project
ACM TechNews, Science Daily, VT News, Digital Journal, The Cyberwire, The University Network, and more.

Press coverage on our joint project with Dashlane
Daily Express, The Sun, Daily Mail, Mirror, Security Magazine, Yahoo!, Darkreading, and more.

My recent interview with The Washington Times on Internet scam.

Press coverage on our password project:
New Scientist, Daily Express, The Sun, DailyMail

Interviewed by The New York Times on IoT and Smart devices.

Press coverage on our app collusioin project
ACM TechNews, phys.org, NewScientist, The Sun, Business Insider, Independent, Daily Mail, IBT, VT News and more.

Interview with WVTF Radio NPR on scam, fake content and more

Press coverage on our Waze/Sybil device project
Fusion (1, 2), CBS News, Recode/CNBC, The Telegraph, Times of Israel, i24 News, TechCrunch, PC Magazine, and many more.

Press coverage on Crowdturfing
MIT Tech Review, Boston Globe, SlashDot, MIT Technology Review, Consumerist, InfoWorld

LINKS

MyCS, Compass2g, CS Wiki
Gradudate Application
Clickstream Project
CACM, CRA, Computeroxy

SPONSORS







I am an Associate Professor in the Department of Computer Science at University of Illinois at Urbana-Champaign (UIUC). I am also affiliated with the Department of Electrical and Computer Engineering (by courtesy), Security and Privacy Research at Illinois (SPRAI), Informatics Programs of School of Information Sciences, and Coordinated Science Laboratory (CSL). My research aims to make it easier to build explainable and robust data-driven solutions to safeguard Internet systems and augment human’s ability to perform security-related tasks. I am interested in a range of topics in Security and Privacy, Internet Measurement, and Data Mining. My recent projects are focused on the security of social computing systems, cybercrime, adversarial machine learning, and machine learning explanation. I actively publish in conferences such as Usenix Security/CCS/NDSS/Oakland, IMC/WWW, and IMWUT/CHI. I am a recipient of the NSF CAREER Award (2018), Amazon Research Award (2021), Google Faculty Research Award (2017), IMWUT Distinguished Paper Award (2019), ACM CCS Outstanding Paper Award (2018), and SIGMETRICS Best Practical Paper Award (2013).

Before joining UIUC, I worked as an Assistant Professor at Virginia Tech from 2016 to 2019. I obtained my Ph.D. from UC Santa Barbara in 2016 under the supervision of Ben Y. Zhao and Heather Zheng. I received my bachelor's degree from Tsinghua University in 2010. I spent two summers at Microsoft Research Redmond in 2011 and 2014.

Selected Publications (Full List)


  • It Doesn't Look Like Anything to Me: Using Diffusion Model to Subvert Visual Phishing Detectors
    Qingying Hao, Nirav Diwan, Ying Yuan, Giovanni Apruzzese, Mauro Conti, Gang Wang
    Proceedings of The 33rd USENIX Security Symposium (USENIX Security)
    Philadelphia, PA, August 2024.

  • True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center
    Limin Yang, Zhi Chen, Chenkai Wang, Zhenning Zhang, Sushruth Booma, Phuong Cao, Constantin Adam, Alex Withers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Gang Wang
    Proceedings of The 33rd USENIX Security Symposium (USENIX Security)
    Philadelphia, PA, August 2024.

  • RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation
    Zelei Cheng, Xian Wu, Jiahao Yu, Sabrina Yang, Gang Wang, Xinyu Xing
    Proceedings of the 41st International Conference on Machine Learning (ICML)
    Vienna, Austria, July 2024

  • Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles On User Perception Towards Disinformation
    Margie Ruffin, Haeseung Seo, Aiping Xiong, Gang Wang
    Proceedings of The International AAAI Conference on Web and Social Media (ICWSM)
    Buffalo, NY, June 2024. PDF

  • It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias
    Jaron Mink, Miranda Wei, Collins W. Munyendo, Kurt Hugenberg, Tadayoshi Kohno, Elissa M. Redmiles, Gang Wang
    Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI)
    Honolulu, HI, May 2024. PDF

  • VeriSMS: A Message Verification System for Inclusive Patient Outreach against Phishing Attacks
    Chenkai Wang, Zhuofan Jia, Hadjer Benkraouda, Cody Zevnik, Nicholas Heuermann, Roopa Foulger, Jonathan A. Handler, Gang Wang
    Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI)
    Honolulu, HI, May 2024. PDF

  • Are Adversarial Phishing Webpages a Threat in Reality? Understanding the Users’ Perception of Adversarial Webpages
    Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, and Gang Wang
    Proceedings of The ACM Web Conference (WWW)
    Singapore, May 2024. Oral PDF

  • R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection
    Akul Goyal, Gang Wang, Adam Bates
    Proceedings of The 45th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2024. PDF

  • How to Cover up Anomalous Accesses to Electronic Health Records
    Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl Gunter
    Proceedings of The 32nd USENIX Security Symposium (USENIX Security)
    Anaheim, CA, August 2023. PDF

  • AIRS: Explanation for Deep Reinforcement Learning based Security Applications
    Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing
    Proceedings of The 32nd USENIX Security Symposium (USENIX Security)
    Anaheim, CA, August 2023. PDF

  • SenRev: Measurement of Personal Information Disclosure in Online Health Communities
    Faysal Hossain Shezan, Minjun Long, David Hasani, Gang Wang, Yuan Tian
    Proceedings of Privacy Enhancing Technologies Symposium (PoPETs/PETS)
    Lausanne, Switzerland, July 2023. PDF

  • Everybody’s Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations
    Jaron Mink, Hadjer Benkraouda, Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Daniel Votipka, Gang Wang
    Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2023. PDF

  • Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers
    Limin Yang, Zhi Chen, Jacopo Cortellazzi, Feargus Pendlebury, Kevin Tu, Fabio Pierazzi, Lorenzo Cavallaro, Gang Wang.
    Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2023. PDF

  • Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments
    Yaman Yu, Saidivya Ashok, Smirity Kaushik, Yang Wang, Gang Wang
    Proceedings of The 44th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2023. PDF

  • Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
    Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates
    Proceedings of The Network and Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2023. PDF

  • DeepPhish: Understanding User Trust Towards Artificially Generated Profiles in Online Social Networks
    Jaron Mink, Licheng Luo, Natã M. Barbosa, Olivia Figueira, Yang Wang, Gang Wang
    Proceedings of The 31st USENIX Security Symposium (USENIX Security)
    Boston, MA, August 2022. PDF Website Artifacts Available, Artifacts Functional, Results Reproduced

  • Revisiting Email Forwarding Security under the Authenticated Received Chain Protocol
    Chenkai Wang, Gang Wang
    Proceedings of The ACM Web Conference (WWW)
    Lyon, France. April 2022. PDF Mozilla Bug Bounty $1,000

  • Beyond Bot Detection: Combating Fraudulent Online Survey Takers
    Ziyi Zhang, Shuofei Zhu, Jaron Mink, Aiping Xiong, Linhai Song, Gang Wang
    Proceedings of The ACM Web Conference (WWW)
    Lyon, France. April 2022. PDF

  • An In-depth Analysis of Duplicated Linux Kernel Bug Reports
    Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang
    Proceedings of The Network and Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2022. PDF

  • Measuring DNS-over-HTTPS Performance Around the World
    Rishabh Chhabra, Paul Murley, Deepak Kumar, Michael Bailey, Gang Wang
    Proceedings of The ACM Internet Measurement Conference (IMC)
    Virtual Event, November 2021. PDF

  • It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications
    Qingying Hao, Licheng Luo, Steve TK Jan, Gang Wang
    Proceedings of The ACM Conference on Computer and Communications Security (CCS)
    Seoul, South Korea, November 2021. PDF Video

  • Who Am I? A Design Probe Exploring Real-Time Transparency About Online and Offline User Profiling Underlying Targeted Ads
    Natã Miccael Barbosa, Gang Wang, Blase Ur, Yang Wang
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT/UbiComp)
    September 2021. PDF

  • Double-Cross Attacks: Subverting Active Learning Systems
    Jose Rodrigo Sanchez Vicarte, Gang Wang, Christopher Fletcher
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. PDF

  • CADE: Detecting and Explaining Concept Drift Samples for Security Applications
    Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. PDF Code Supplementary Artifact Evaluated

  • Assessing Browser-level Defense against IDN-based Phishing
    Hang Hu, Steve T.K. Jan, Yang Wang, Gang Wang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. PDF

  • Stars Can Tell: A Robust Method to Defend against GPS Spoofing using Off-the-shelf Chipset
    Shinan Liu, Xiang Cheng, Hanchao Yang, Yuanchao Shu, Xiaoran Weng, Ping Guo, Kexiong (Curtis) Zeng, Gang Wang, Yaling Yang
    Proceedings of The 30th USENIX Security Symposium (USENIX Security)
    Vancouver, BC, Canada, August 2021. PDF Website Code Data Artifact Evaluated

  • FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
    Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant Honavar, Gang Wang, Xinyu Xing
    Proceedings of The Network and Distributed System Security Symposium (NDSS)
    Virtual Conference, February 2021. PDF

  • VerHealth: Vetting Medical Voice Applications through Policy Enforcement
    Faysal Hossain Shezan, Hang Hu, Gang Wang, Yuan Tian
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp)
    December 2020. PDF

  • Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
    Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
    Proceedings of The 29th USENIX Security Symposium (USENIX Security)
    Boston, MA, August 2020. PDF Data Artifact Evaluated

  • Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation
    Steve T.K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang, Bimal Viswanath
    Proceedings of The 41st IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2020. PDF Video

  • Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
    Faysal Hossain Shezan, Hang Hu, Jiamin Wang, Gang Wang, Yuan Tian
    Proceedings of The Web Conference (WWW)
    Taipei, April 2020. PDF Data

  • Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations
    Sazzadur Rahaman, Gang Wang, Danfeng Yao
    Proceedings of The 26th ACM Conference on Computer and Communications Security (CCS)
    London, UK, November 2019. PDF Code CSAW ’20 Applied Research Competition Finalist

  • Errors, Misunderstandings, and Vulnerabilities: Analyzing the Crowdsourcing Process of Ad-blocking Systems
    Mshabab Alrizah, Sencun Zhu, Xinyu Xing, Gang Wang
    Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
    Amsterdam, Netherlands, October 2019. PDF

  • Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
    Peng Peng, Limin Yang, Linhai Song, Gang Wang
    Proceedings of The ACM SIGCOMM Internet Measurement Conference (IMC)
    Amsterdam, Netherlands, October 2019. PDF

  • Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
    Ying Dong, Wenbo Guo, Yueqi Chen, Xinyu Xing, Yuqing Zhang, Gang Wang
    Proceedings of The 28th USENIX Security Symposium (USENIX Security)
    Santa Clara, CA, August 2019. PDF Data

  • Characterizing Pixel Tracking through the Lens of Disposable Email Services
    Hang Hu, Peng Peng, Gang Wang
    Proceedings of The 40th IEEE Symposium on Security and Privacy (IEEE SP)
    San Francisco, CA, May 2019. PDF Video

  • Modeling Spatio-Temporal App Usage for a Large User Population
    Huandong Wang, Yong Li, Sihan Zeng, Gang Wang, Pengyu Zhang, Pan Hui, Depeng Jin
    Proceedings of The ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp)
    March 2019. PDF

  • Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks
    Steve T.K. Jan, Joseph Messou, Yen-Chen Lin, Jia-Bin Huang, Gang Wang
    Proceedings of The Thirty-Third AAAI Conference on Artificial Intelligence (AAAI)
    Honolulu, HI, January 2019. PDF Website Spotlight

  • Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild
    Ke Tian, Steve T.K. Jan, Hang Hu, Danfeng Yao, Gang Wang
    Proceedings of ACM Internet Measurement Conference (IMC)
    Boston, MA, October 2018. PDF Code

  • LEMNA: Explaining Deep Learning based Security Applications
    Wenbo Guo, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing
    Proceedings of The 25th ACM Conference on Computer and Communications Security (CCS)
    Toronto, Canada, October 2018. PDF Code Outstanding Paper Award

  • Your Apps Give You Away: Distinguishing Mobile Users by Their App Usage Fingerprints
    Zhen Tu, Runtong Li, Yong Li, Gang Wang, Di Wu, Pan Hui, Li Su, Depeng Jin
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp)
    September 2018. PDF IMWUT Distinguished Paper Award

  • End-to-End Measurements of Email Spoofing Attacks
    Hang Hu, Gang Wang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. PDF

  • Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
    Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. PDF Data

  • All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
    Kexiong (Curtis) Zeng, Shinan Liu, Yuanchao Shu, Dong Wang, Haoyu Li, Yanzhi Dou, Gang Wang, Yaling Yang
    Proceedings of The 27th USENIX Security Symposium (USENIX Security)
    Baltimore, MD, August 2018. PDF

  • De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
    Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
    Proceedings of The 25th Annual Network And Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2018. PDF Slides Code

  • Measuring the Insecurity of Mobile Deep Links of Android
    Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang
    Proceedings of The 26th USENIX Security Symposium (USENIX Security)
    Vancouver, Canada, August 2017. PDF Slides Talk

  • Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System
    Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Montreal, Canada, May 2017. PDF

  • Anatomy of a Personalized Livestreaming System
    Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC)
    Santa Monica, CA, November 2016. PDF Dataset

  • Defending against Sybil Devices in Crowdsourced Mapping Services
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
    Singapore, June 2016. PDF Video

  • "Will Check-in for Badges": Understanding Bias and Misbehavior on Location-based Social Networks
    Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao
    Proceedings of International AAAI Conference on Web and Social Media (ICWSM)
    Cologne, Germany, May 2016. PDF Slides

  • Unsupervised Clickstream Clustering For User Behavior Analysis
    Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao
    Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI)
    San Jose, CA, May 2016. PDF Slides Video Website

  • Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
    Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao
    Proceedings of ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
    Vancouver, BC, Canada, March 2015. PDF Slides

  • Whispers in the Dark: Analysis of an Anonymous Social Network 
    Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao 
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC) 
    Vancouver, BC, Canada, November 2014. PDF Slides

  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
    Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    San Diego, CA, August 2014. PDF Slides Video

  • Follow the Green: Growth and Dynamics in Twitter Follower Markets 
    Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao 
    Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC) 
    Barcelona, Spain, October 2013. PDF

  • You are How You Click: Clickstream Analysis for Sybil Detection 
    Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao 
    Proceedings of USENIX Security Symposium (USENIX Security)
    Washington, DC, August 2013. PDF Slides

  • Practical Conflict Graphs for Dynamic Spectrum Distribution
    Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng 
    Proceedings ofACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS)
    Pittsburgh, PA, June 2013. PDF Best Practical Paper Award

  • Wisdom in the Social Crowd: an Analysis of Quora 
    Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao 
    Proceedings of International World Wide Web Conference (WWW) 
    Rio de Janeiro, Brazil, May 2013. PDF Slides

  • Social Turing Tests: Crowdsourcing Sybil Detection
    Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
    Proceedings of Annual Network Distributed System Security Symposium (NDSS)
    San Diego, CA, February 2013. PDF Slides

  • Serf and Turf: Crowdturfing for Fun and Profit
    Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng, Ben Y. Zhao
    Proceedings of International World Wide Web Conference (WWW)
    Lyon, France, April 2012. PDF Slides

  • I am the Antenna: Accurate Outdoor AP Location using Smartphone
    Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, Haitao Zheng
    Proceedings of Annual International Conference on Mobile Computing and Networking (MobiCom)
    Las Vegas, NV, September 2011. PDF