Gang Wang
University of Illinois at Urbana-Champaign
H-index: 40
North America-United States
Top articles of Gang Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Practical Region-level Attack against Segment Anything Models | arXiv preprint arXiv:2404.08255 | Yifan Shen Zhengyuan Li Gang Wang | 2024/4/12 |
" Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages | arXiv preprint arXiv:2404.02832 | Ying Yuan Qingying Hao Giovanni Apruzzese Mauro Conti Gang Wang | 2024/4/3 |
It’s Trying Too Hard to Look Real: Deepfake Moderation Mistakes and Identity-Based Bias | Jaron Mink Miranda Wei Collins W Munyendo Kurt Hugenberg Tadayoshi Kohno | 2024 | |
Sometimes, you aren’t what you do: Mimicry attacks against provenance graph host intrusion detection systems | 30th Network and Distributed System Security Symposium | Akul Goyal Xueyuan Han Gang Wang Adam Bates | 2023/2 |
Is it overkill? analyzing feature-space concept drift in malware detectors | Zhi Chen Zhenning Zhang Zeliang Kan Limin Yang Jacopo Cortellazzi | 2023/5/25 | |
{AIRS}: Explanation for Deep Reinforcement Learning based Security Applications | Jiahao Yu Wenbo Guo Qi Qin Gang Wang Ting Wang | 2023 | |
Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of ML-Based Security Tools and Explanations | Jaron Mink Hadjer Benkraouda Limin Yang Arridhana Ciptadi Ali Ahmadzadeh | 2023/5/21 | |
SenRev: Measurement of Personal Information Disclosure in Online Health Communities | Proceedings on Privacy Enhancing Technologies | Faysal Hossain Shezan Minjun Long David Hasani Gang Wang Yuan Tian | 2023 |
Design and evaluation of inclusive email security indicators for people with visual impairments | Y. Yu S. Ashok S. Kaushik Y. Wang G. Wang | 2023 | |
How to cover up anomalous accesses to electronic health records | Xiaojun Xu Qingying Hao Zhuolin Yang Bo Li David Liebovitz | 2023 | |
Jigsaw puzzle: Selective backdoor attack to subvert malware classifiers | Limin Yang Zhi Chen Jacopo Cortellazzi Feargus Pendlebury Kevin Tu | 2023/5/21 | |
Explaining Why Fake Photos are Fake: Does It Work? | Proceedings of the ACM on Human-Computer Interaction | Margie Ruffin Gang Wang Kirill Levchenko | 2023/1/1 |
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation | Ali Ahad Gang Wang Chung Hwan Kim Suman Jana Zhiqiang Lin | 2023/3/25 | |
Explaining Deep Learning Based Security Applications | Wenbo Guo Jun Xu Gang Wang Xinyu Xing | 2023/8/11 | |
Casing the Vault: Security Analysis of Vault Applications | Margie Ruffin Israel Lopez-Toldeo Kirill Levchenko Gang Wang | 2022/11/7 | |
{DeepPhish}: Understanding user trust towards artificially generated profiles in online social networks | Jaron Mink Licheng Luo Natã M Barbosa Olivia Figueira Yang Wang | 2022 | |
ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense | Sagar Samtani Gang Wang Ali Ahmadzadeh Arridhana Ciptadi Shanchieh Yang | 2022/8/14 | |
Open Challenges of Malware Detection under Concept Drift | Gang Wang | 2022/5/30 | |
Beyond bot detection: combating fraudulent online survey takers✱ | Ziyi Zhang Shuofei Zhu Jaron Mink Aiping Xiong Linhai Song | 2022/4/25 | |
Revisiting email forwarding security under the authenticated received chain protocol | Chenkai Wang Gang Wang | 2022/4/25 |