Gang Wang

About Gang Wang

Gang Wang, With an exceptional h-index of 40 and a recent h-index of 34 (since 2020), a distinguished researcher at University of Illinois at Urbana-Champaign, specializes in the field of Security and Privacy, Data Mining, Internet Measurements, Mobile Networks.

His recent articles reflect a diverse array of research interests and contributions to the field:

Practical Region-level Attack against Segment Anything Models

" Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages

It’s Trying Too Hard to Look Real: Deepfake Moderation Mistakes and Identity-Based Bias

Explaining Deep Learning Based Security Applications

Is it overkill? analyzing feature-space concept drift in malware detectors

Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of ML-Based Security Tools and Explanations

Design and evaluation of inclusive email security indicators for people with visual impairments

Jigsaw puzzle: Selective backdoor attack to subvert malware classifiers

Gang Wang Information

University

Position

Assistant Professor

Citations(all)

6225

Citations(since 2020)

4284

Cited By

3534

hIndex(all)

40

hIndex(since 2020)

34

i10Index(all)

80

i10Index(since 2020)

74

Email

University Profile Page

Google Scholar

Gang Wang Skills & Research Interests

Security and Privacy

Data Mining

Internet Measurements

Mobile Networks

Top articles of Gang Wang

Practical Region-level Attack against Segment Anything Models

arXiv preprint arXiv:2404.08255

2024/4/12

Yifan Shen
Yifan Shen

H-Index: 5

Gang Wang
Gang Wang

H-Index: 28

" Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages

arXiv preprint arXiv:2404.02832

2024/4/3

It’s Trying Too Hard to Look Real: Deepfake Moderation Mistakes and Identity-Based Bias

2024

Explaining Deep Learning Based Security Applications

2023/8/11

Is it overkill? analyzing feature-space concept drift in malware detectors

2023/5/25

Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of ML-Based Security Tools and Explanations

2023/5/21

Design and evaluation of inclusive email security indicators for people with visual impairments

2023

Jigsaw puzzle: Selective backdoor attack to subvert malware classifiers

2023/5/21

FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation

2023/3/25

Sometimes, you aren’t what you do: Mimicry attacks against provenance graph host intrusion detection systems

30th Network and Distributed System Security Symposium

2023/2

{AIRS}: Explanation for Deep Reinforcement Learning based Security Applications

2023

SenRev: Measurement of Personal Information Disclosure in Online Health Communities

Proceedings on Privacy Enhancing Technologies

2023

How to cover up anomalous accesses to electronic health records

2023

Explaining Why Fake Photos are Fake: Does It Work?

Proceedings of the ACM on Human-Computer Interaction

2023/1/1

Gang Wang
Gang Wang

H-Index: 28

Kirill Levchenko
Kirill Levchenko

H-Index: 24

Casing the Vault: Security Analysis of Vault Applications

2022/11/7

Kirill Levchenko
Kirill Levchenko

H-Index: 24

Gang Wang
Gang Wang

H-Index: 28

ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense

2022/8/14

Sagar Samtani
Sagar Samtani

H-Index: 12

Gang Wang
Gang Wang

H-Index: 28

Open Challenges of Malware Detection under Concept Drift

2022/5/30

Gang Wang
Gang Wang

H-Index: 28

Beyond bot detection: combating fraudulent online survey takers✱

2022/4/25

Revisiting email forwarding security under the authenticated received chain protocol

2022/4/25

Gang Wang
Gang Wang

H-Index: 28

An In-depth Analysis of Duplicated Linux Kernel Bug Reports.

2022

See List of Professors in Gang Wang University(University of Illinois at Urbana-Champaign)

Co-Authors

academic-engine