BibTeX records: Haining Wang

download as .bib file

@article{DBLP:journals/eswa/YangLWSL24,
  author       = {Kai Yang and
                  Qiang Li and
                  Haining Wang and
                  Limin Sun and
                  Jiqiang Liu},
  title        = {Fingerprinting Industrial IoT devices based on multi-branch neural
                  network},
  journal      = {Expert Syst. Appl.},
  volume       = {238},
  number       = {Part {F}},
  pages        = {122371},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.122371},
  doi          = {10.1016/J.ESWA.2023.122371},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/YangLWSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhangWS24,
  author       = {Yubao Zhang and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {A multiview clustering framework for detecting deceptive reviews},
  journal      = {J. Comput. Secur.},
  volume       = {32},
  number       = {1},
  pages        = {31--52},
  year         = {2024},
  url          = {https://doi.org/10.3233/JCS-220001},
  doi          = {10.3233/JCS-220001},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhangWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/TangLCWYMT24,
  author       = {Zhong Tang and
                  Yuyan Liu and
                  Pengpeng Chen and
                  Haining Wang and
                  Xiaopeng Yu and
                  Kofi A. A. Makinwa and
                  Nianxiong Nick Tan},
  title        = {3.4 {A} 14b 98Hz-to-5.9kHz 1.7-to-50.8 {\(\mu\)} {W} BW/Power Scalable
                  Sensor Interface with a Dynamic Bandgap Reference and an Untrimmed
                  Gain Error of {\(\pm\)} 0.26 {\%} from -40{\textdegree}C to 125{\textdegree}C},
  booktitle    = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2024,
                  San Francisco, CA, USA, February 18-22, 2024},
  pages        = {60--62},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ISSCC49657.2024.10454378},
  doi          = {10.1109/ISSCC49657.2024.10454378},
  timestamp    = {Tue, 19 Mar 2024 09:04:31 +0100},
  biburl       = {https://dblp.org/rec/conf/isscc/TangLCWYMT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-03642,
  author       = {Haining Wang},
  title        = {A Content-Based Novelty Measure for Scholarly Publications: {A} Proof
                  of Concept},
  journal      = {CoRR},
  volume       = {abs/2401.03642},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.03642},
  doi          = {10.48550/ARXIV.2401.03642},
  eprinttype    = {arXiv},
  eprint       = {2401.03642},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-03642.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/LiuKLWY23,
  author       = {Jiansong Liu and
                  Yan Kang and
                  Hao Li and
                  Haining Wang and
                  Xuekun Yang},
  title        = {{STGHTN:} Spatial-temporal gated hybrid transformer network for traffic
                  flow forecasting},
  journal      = {Appl. Intell.},
  volume       = {53},
  number       = {10},
  pages        = {12472--12488},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10489-022-04122-x},
  doi          = {10.1007/S10489-022-04122-X},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/LiuKLWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/GuZZZWLLH23,
  author       = {Xianfan Gu and
                  Yu Zhang and
                  Wen Zeng and
                  Sihua Zhong and
                  Haining Wang and
                  Dong Liang and
                  Zhenlin Li and
                  Zhanli Hu},
  title        = {Cross-modality image translation: {CT} image synthesis of {MR} brain
                  images using multi generative network with perceptual supervision},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {237},
  pages        = {107571},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cmpb.2023.107571},
  doi          = {10.1016/J.CMPB.2023.107571},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cmpb/GuZZZWLLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/KangXWWWL23,
  author       = {Yan Kang and
                  Wentao Xie and
                  Xiaopeng Wang and
                  Haining Wang and
                  Xinchao Wang and
                  Jinyuan Li},
  title        = {{MOPISDE:} {A} collaborative multi-objective information-sharing {DE}
                  algorithm for software clustering},
  journal      = {Expert Syst. Appl.},
  volume       = {226},
  pages        = {120207},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.120207},
  doi          = {10.1016/J.ESWA.2023.120207},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/KangXWWWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/finr/NiLWLLL23,
  author       = {Shuyan Ni and
                  Cunbao Lin and
                  Haining Wang and
                  Yang Li and
                  Yurong Liao and
                  Na Li},
  title        = {Learning geometric Jensen-Shannon divergence for tiny object detection
                  in remote sensing images},
  journal      = {Frontiers Neurorobotics},
  volume       = {17},
  year         = {2023},
  url          = {https://doi.org/10.3389/fnbot.2023.1273251},
  doi          = {10.3389/FNBOT.2023.1273251},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/finr/NiLWLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WanLWLS23,
  author       = {Shangfeng Wan and
                  Qiang Li and
                  Haining Wang and
                  Hong Li and
                  Limin Sun},
  title        = {DevTag: {A} Benchmark for Fingerprinting IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {7},
  pages        = {6388--6399},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3225580},
  doi          = {10.1109/JIOT.2022.3225580},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WanLWLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/FamiliSWP23,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Park},
  title        = {iDROP: Robust Localization for Indoor Navigation of Drones With Optimized
                  Beacon Placement},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {16},
  pages        = {14226--14238},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3280084},
  doi          = {10.1109/JIOT.2023.3280084},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/FamiliSWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/FamiliASWP23,
  author       = {Alireza Famili and
                  Tolga O. Atalay and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Park},
  title        = {{OFDRA:} Optimal Femtocell Deployment for Accurate Indoor Positioning
                  of RIS-Mounted AVs},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {41},
  number       = {12},
  pages        = {3783--3798},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSAC.2023.3322821},
  doi          = {10.1109/JSAC.2023.3322821},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/FamiliASWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/KangWPLLYT23,
  author       = {Yan Kang and
                  Haining Wang and
                  Bin Pu and
                  Jiansong Liu and
                  Shin{-}Jye Lee and
                  Xuekun Yang and
                  Liu Tao},
  title        = {{TMHSCA:} a novel hybrid two-stage mutation with a sine cosine algorithm
                  for discounted \{0-1\} knapsack problems},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {17},
  pages        = {12691--12713},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08367-6},
  doi          = {10.1007/S00521-023-08367-6},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/KangWPLLYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/KangWPLLYT23a,
  author       = {Yan Kang and
                  Haining Wang and
                  Bin Pu and
                  Jiansong Liu and
                  Shin{-}Jye Lee and
                  Xuekun Yang and
                  Liu Tao},
  title        = {Correction to: {TMHSCA:} a novel hybrid two-stage mutation with a
                  sine cosine algorithm for discounted \{0-1\} knapsack problems},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {17},
  pages        = {12715},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-08595-w},
  doi          = {10.1007/S00521-023-08595-W},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/KangWPLLYT23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/KangWPTCY23,
  author       = {Yan Kang and
                  Haining Wang and
                  Bin Pu and
                  Liu Tao and
                  Jianguo Chen and
                  Philip S. Yu},
  title        = {A Hybrid Two-Stage Teaching-Learning-Based Optimization Algorithm
                  for Feature Selection in Bioinformatics},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {20},
  number       = {3},
  pages        = {1746--1760},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCBB.2022.3215129},
  doi          = {10.1109/TCBB.2022.3215129},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcbb/KangWPTCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/WangLLFNLJ23,
  author       = {Haining Wang and
                  Yurong Liao and
                  Yang Li and
                  Yuqiang Fang and
                  Shuyan Ni and
                  Yalun Luo and
                  Bitao Jiang},
  title        = {BDR-Net: Bhattacharyya Distance-Based Distribution Metric Modeling
                  for Rotating Object Detection in Remote Sensing},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {72},
  pages        = {1--12},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIM.2022.3221101},
  doi          = {10.1109/TIM.2022.3221101},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tim/WangLLFNLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/FuWWZYWZSWZLH23,
  author       = {Minghan Fu and
                  Meiyun Wang and
                  Yaping Wu and
                  Na Zhang and
                  Yongfeng Yang and
                  Haining Wang and
                  Yun Zhou and
                  Yue Shang and
                  Fang{-}Xiang Wu and
                  Hairong Zheng and
                  Dong Liang and
                  Zhanli Hu},
  title        = {A Two-Branch Neural Network for Short-Axis {PET} Image Quality Enhancement},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {27},
  number       = {6},
  pages        = {2864--2875},
  year         = {2023},
  url          = {https://doi.org/10.1109/JBHI.2023.3260180},
  doi          = {10.1109/JBHI.2023.3260180},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/FuWWZYWZSWZLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/FamiliSWP23,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Park},
  title        = {{PILOT:} High-Precision Indoor Localization for Autonomous Drones},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {5},
  pages        = {6445--6459},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3229628},
  doi          = {10.1109/TVT.2022.3229628},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/FamiliSWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ChangQW23,
  author       = {Le Chang and
                  Tao Qin and
                  Haining Wang},
  editor       = {Aaron Marcus and
                  Elizabeth Rosenzweig and
                  Marcelo M. Soares},
  title        = {Vibration Strength Comfort of Smartwatch in Notification Scene},
  booktitle    = {Design, User Experience, and Usability - 12th International Conference,
                  {DUXU} 2023, Held as Part of the 25th {HCI} International Conference,
                  {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14032},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35702-2\_9},
  doi          = {10.1007/978-3-031-35702-2\_9},
  timestamp    = {Thu, 13 Jul 2023 13:25:11 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ChangQW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/LiuYW23,
  author       = {Yuxuan Liu and
                  Qijuan Yu and
                  Haining Wang},
  editor       = {Jessie Y. C. Chen and
                  Gino Fragomeni and
                  Xiaowen Fang},
  title        = {Grip Comfort Study of Virtual Reality Handles},
  booktitle    = {{HCI} International 2023 - Late Breaking Papers - 25th International
                  Conference on Human-Computer Interaction, {HCII} 2023, Copenhagen,
                  Denmark, July 23-28, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14058},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48050-8\_10},
  doi          = {10.1007/978-3-031-48050-8\_10},
  timestamp    = {Sat, 09 Dec 2023 09:49:51 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/LiuYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/QinCW23,
  author       = {Tao Qin and
                  Le Chang and
                  Haining Wang},
  editor       = {Aaron Marcus and
                  Elizabeth Rosenzweig and
                  Marcelo M. Soares},
  title        = {Perception of the Vibration Intensity of Smartwatches in the Notification
                  Scene},
  booktitle    = {Design, User Experience, and Usability - 12th International Conference,
                  {DUXU} 2023, Held as Part of the 25th {HCI} International Conference,
                  {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14032},
  pages        = {270--283},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35702-2\_20},
  doi          = {10.1007/978-3-031-35702-2\_20},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/QinCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/YanLJW23,
  author       = {Yan Yan and
                  Kexiang Liu and
                  Rui Jiang and
                  Haining Wang},
  editor       = {Aaron Marcus and
                  Elizabeth Rosenzweig and
                  Marcelo M. Soares},
  title        = {The Effects of Primary Output Design of True Wireless Earbuds on the
                  Wearing Comfort},
  booktitle    = {Design, User Experience, and Usability - 12th International Conference,
                  {DUXU} 2023, Held as Part of the 25th {HCI} International Conference,
                  {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14032},
  pages        = {421--435},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35702-2\_30},
  doi          = {10.1007/978-3-031-35702-2\_30},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/YanLJW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ZengDW23,
  author       = {Ke Zeng and
                  Qiannan Deng and
                  Haining Wang},
  editor       = {Aaron Marcus and
                  Elizabeth Rosenzweig and
                  Marcelo M. Soares},
  title        = {Effects of Image Size and Position on Text Legibility of Foldable
                  Smartphones},
  booktitle    = {Design, User Experience, and Usability - 12th International Conference,
                  {DUXU} 2023, Held as Part of the 25th {HCI} International Conference,
                  {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14032},
  pages        = {436--446},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35702-2\_31},
  doi          = {10.1007/978-3-031-35702-2\_31},
  timestamp    = {Thu, 13 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ZengDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/AlamGCWX23,
  author       = {Shariful Alam and
                  Le Guan and
                  Zeyu Chen and
                  Haining Wang and
                  Jidong Xiao},
  title        = {{CAUSEC:} Cache-Based Secure Key Computation with (Mostly) Deprivileged
                  Execution},
  booktitle    = {43rd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2023, Hong Kong, July 18-21, 2023},
  pages        = {84--95},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDCS57875.2023.00059},
  doi          = {10.1109/ICDCS57875.2023.00059},
  timestamp    = {Tue, 24 Oct 2023 14:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/AlamGCWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LiuJ0ZLSW23,
  author       = {Guannan Liu and
                  Lin Jin and
                  Shuai Hao and
                  Yubao Zhang and
                  Daiping Liu and
                  Angelos Stavrou and
                  Haining Wang},
  editor       = {Marie{-}Jos{\'{e}} Montpetit and
                  Aris Leivadeas and
                  Steve Uhlig and
                  Mobin Javed},
  title        = {Dial "N" for NXDomain: The Scale, Origin, and Security Implications
                  of {DNS} Queries to Non-Existent Domains},
  booktitle    = {Proceedings of the 2023 {ACM} on Internet Measurement Conference,
                  {IMC} 2023, Montreal, QC, Canada, October 24-26, 2023},
  pages        = {198--212},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3618257.3624805},
  doi          = {10.1145/3618257.3624805},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/LiuJ0ZLSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AtalayMSSW23,
  author       = {Tolga O. Atalay and
                  Sudip Maitra and
                  Dragoslav Stojadinovic and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps},
  booktitle    = {{IEEE} {INFOCOM} 2023 - {IEEE} Conference on Computer Communications,
                  New York City, NY, USA, May 17-20, 2023},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/INFOCOM53939.2023.10228961},
  doi          = {10.1109/INFOCOM53939.2023.10228961},
  timestamp    = {Tue, 05 Sep 2023 20:33:21 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/AtalayMSSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metacom/FamiliASW23,
  author       = {Alireza Famili and
                  Tolga O. Atalay and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router
                  Deployment in 6G Networks},
  booktitle    = {{IEEE} International Conference on Metaverse Computing, Networking
                  and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023},
  pages        = {17--24},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MetaCom57706.2023.00019},
  doi          = {10.1109/METACOM57706.2023.00019},
  timestamp    = {Thu, 21 Mar 2024 17:12:49 +0100},
  biburl       = {https://dblp.org/rec/conf/metacom/FamiliASW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenLXW23,
  author       = {Zeyu Chen and
                  Daiping Liu and
                  Jidong Xiao and
                  Haining Wang},
  title        = {All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical
                  Study on Their Characteristics and Detectability},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {623--638},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607229},
  doi          = {10.1145/3607199.3607229},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChenLXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangWSJWL23,
  author       = {Shu Wang and
                  Xinda Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Haining Wang and
                  Qi Li},
  title        = {GraphSPD: Graph-Based Security Patch Detection with Enriched Code
                  Semantics},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2409--2426},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179479},
  doi          = {10.1109/SP46215.2023.10179479},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WangWSJWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/svcc/FamiliSWP23,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  title        = {{EGO-6:} Enhancing Geofencing Security Systems with Optimal Deployment
                  of 6G TRPs},
  booktitle    = {Silicon Valley Cybersecurity Conference, {SVCC} 2023, San Jose, CA,
                  USA, May 17-19, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SVCC56964.2023.10165032},
  doi          = {10.1109/SVCC56964.2023.10165032},
  timestamp    = {Mon, 10 Jul 2023 15:09:49 +0200},
  biburl       = {https://dblp.org/rec/conf/svcc/FamiliSWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/FamiliASW23,
  author       = {Alireza Famili and
                  Tolga O. Atalay and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor
                  Drone Navigation},
  booktitle    = {97th {IEEE} Vehicular Technology Conference, {VTC} Spring 2023, Florence,
                  Italy, June 20-23, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTC2023-Spring57618.2023.10201144},
  doi          = {10.1109/VTC2023-SPRING57618.2023.10201144},
  timestamp    = {Fri, 25 Aug 2023 08:20:01 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/FamiliASW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-00436,
  author       = {Haining Wang},
  title        = {Enhancing Representation Generalization in Authorship Identification},
  journal      = {CoRR},
  volume       = {abs/2310.00436},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.00436},
  doi          = {10.48550/ARXIV.2310.00436},
  eprinttype    = {arXiv},
  eprint       = {2310.00436},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-00436.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-01440,
  author       = {Xin Xie and
                  Jiangqiong Li and
                  Haining Wang},
  title        = {The Many Voices of Duying: Revisiting the Disputed Essays Between
                  Lu Xun and Zhou Zuoren},
  journal      = {CoRR},
  volume       = {abs/2310.01440},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.01440},
  doi          = {10.48550/ARXIV.2310.01440},
  eprinttype    = {arXiv},
  eprint       = {2310.01440},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-01440.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-01568,
  author       = {Haining Wang},
  title        = {Defending Against Authorship Identification Attacks},
  journal      = {CoRR},
  volume       = {abs/2310.01568},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.01568},
  doi          = {10.48550/ARXIV.2310.01568},
  eprinttype    = {arXiv},
  eprint       = {2310.01568},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-01568.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-17392,
  author       = {Xuan Feng and
                  Shuo Chen and
                  Haining Wang},
  title        = {An Internet-wide Penetration Study on {NAT} Boxes via {TCP/IP} Side
                  Channel},
  journal      = {CoRR},
  volume       = {abs/2311.17392},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.17392},
  doi          = {10.48550/ARXIV.2311.17392},
  eprinttype    = {arXiv},
  eprint       = {2311.17392},
  timestamp    = {Tue, 05 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-17392.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-04833,
  author       = {Tolga O. Atalay and
                  Dragoslav Stojadinovic and
                  Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation
                  of Control and User Planes},
  journal      = {CoRR},
  volume       = {abs/2312.04833},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.04833},
  doi          = {10.48550/ARXIV.2312.04833},
  eprinttype    = {arXiv},
  eprint       = {2312.04833},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-04833.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/HuangTCWSZWFLHH22,
  author       = {Zhengyong Huang and
                  Si Tang and
                  Zixiang Chen and
                  Guoshuai Wang and
                  Hao Shen and
                  Yun Zhou and
                  Haining Wang and
                  Wei Fan and
                  Dong Liang and
                  Yingying Hu and
                  Zhanli Hu},
  title        = {TG-Net: Combining transformer and {GAN} for nasopharyngeal carcinoma
                  tumor segmentation based on total-body uEXPLORER {PET/CT} scanner},
  journal      = {Comput. Biol. Medicine},
  volume       = {148},
  pages        = {105869},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compbiomed.2022.105869},
  doi          = {10.1016/J.COMPBIOMED.2022.105869},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/HuangTCWSZWFLHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/YangWWS22,
  author       = {Kai Yang and
                  Haining Wang and
                  Hongsong Zhu and
                  Limin Sun},
  title        = {An effective intrusion-resilient mechanism for programmable logic
                  controllers against data tampering attacks},
  journal      = {Comput. Ind.},
  volume       = {138},
  pages        = {103613},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compind.2022.103613},
  doi          = {10.1016/J.COMPIND.2022.103613},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/YangWWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/HuangZWCSWZZYWL22,
  author       = {Zhengyong Huang and
                  Sijuan Zou and
                  Guoshuai Wang and
                  Zixiang Chen and
                  Hao Shen and
                  Haiyan Wang and
                  Na Zhang and
                  Lu Zhang and
                  Fan Yang and
                  Haining Wang and
                  Dong Liang and
                  Tianye Niu and
                  Xiaohua Zhu and
                  Zhanli Hu},
  title        = {ISA-Net: Improved spatial attention network for {PET-CT} tumor segmentation},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {226},
  pages        = {107129},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cmpb.2022.107129},
  doi          = {10.1016/J.CMPB.2022.107129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cmpb/HuangZWCSWZZYWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BianHWC22,
  author       = {Rui Bian and
                  Shuai Hao and
                  Haining Wang and
                  Chase Cotton},
  title        = {Shining a light on dark places: {A} comprehensive analysis of open
                  proxy ecosystem},
  journal      = {Comput. Networks},
  volume       = {208},
  pages        = {108893},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.108893},
  doi          = {10.1016/J.COMNET.2022.108893},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BianHWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/connection/YuLSLW22,
  author       = {Zaiyang Yu and
                  Shuang Li and
                  Linjun Sun and
                  Liang Liu and
                  Haining Wang},
  title        = {Multi-distribution noise quantisation: an extreme compression scheme
                  for transformer according to parameter distribution},
  journal      = {Connect. Sci.},
  volume       = {34},
  number       = {1},
  pages        = {990--1004},
  year         = {2022},
  url          = {https://doi.org/10.1080/09540091.2021.2024510},
  doi          = {10.1080/09540091.2021.2024510},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/connection/YuLSLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/GaoXWS22,
  author       = {Xing Gao and
                  Jidong Xiao and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {Understanding the Security Implication of Aborting Virtual Machine
                  Live Migration},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {2},
  pages        = {1275--1286},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.2982900},
  doi          = {10.1109/TCC.2020.2982900},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/GaoXWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoLXWLW22,
  author       = {Xing Gao and
                  Guannan Liu and
                  Zhang Xu and
                  Haining Wang and
                  Li Li and
                  Xiaorui Wang},
  title        = {Investigating Security Vulnerabilities in a Hot Data Center with Reduced
                  Cooling Redundancy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {208--226},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2977292},
  doi          = {10.1109/TDSC.2020.2977292},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GaoLXWLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCWSJ22,
  author       = {Yue Li and
                  Zeyu Chen and
                  Haining Wang and
                  Kun Sun and
                  Sushil Jajodia},
  title        = {Understanding Account Recovery in the Wild and its Security Implications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {620--634},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2975789},
  doi          = {10.1109/TDSC.2020.2975789},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCWSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiTGWLL22,
  author       = {Qiang Li and
                  Dawei Tan and
                  Xin Ge and
                  Haining Wang and
                  Zhi Li and
                  Jiqiang Liu},
  title        = {Understanding Security Risks of Embedded Devices Through Fine-Grained
                  Firmware Fingerprinting},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {4099--4112},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3119970},
  doi          = {10.1109/TDSC.2021.3119970},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiTGWLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WangCLXWLWC22,
  author       = {Zili Wang and
                  Yandong Chen and
                  Xueping Li and
                  Yuancan Xu and
                  Wenhua Wu and
                  Shuhan Liao and
                  Haining Wang and
                  Shixiang Cao},
  title        = {Adaptive Harmonic Impedance Reshaping Control Strategy Based on a
                  Consensus Algorithm for Harmonic Sharing and Power Quality Improvement
                  in Microgrids With Complex Feeder Networks},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {13},
  number       = {1},
  pages        = {47--57},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSG.2021.3112692},
  doi          = {10.1109/TSG.2021.3112692},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/WangCLXWLWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WangCLLXWWC22,
  author       = {Zili Wang and
                  Yandong Chen and
                  Xueping Li and
                  Shuhan Liao and
                  Yuancan Xu and
                  Wenhua Wu and
                  Haining Wang and
                  Shixiang Cao},
  title        = {Impedance-Based Adaptively Reshaping Method for Enhancing Nonlinear
                  Load Sharing and Voltage Quality in Islanded Microgrids With Virtual
                  Synchronous Generator},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {13},
  number       = {4},
  pages        = {2568--2578},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSG.2022.3159726},
  doi          = {10.1109/TSG.2022.3159726},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/WangCLLXWWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/KangYPWWXW22,
  author       = {Yan Kang and
                  Xuekun Yang and
                  Bin Pu and
                  Xiaokang Wang and
                  Haining Wang and
                  Yulong Xu and
                  Puming Wang},
  title        = {{HWOA:} an intelligent hybrid whale optimization algorithm for multi-objective
                  task selection strategy in edge cloud computing system},
  journal      = {World Wide Web},
  volume       = {25},
  number       = {5},
  pages        = {2265--2295},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11280-022-01082-7},
  doi          = {10.1007/S11280-022-01082-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/KangYPWWXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccoms/LuoLLZW22,
  author       = {Yalun Luo and
                  Yurong Liao and
                  Zhaoming Li and
                  Ke Zhang and
                  Haining Wang},
  title        = {Radar Target Tracking Based on Interactive Multi-model Cubature Kalman
                  Filter},
  booktitle    = {7th International Conference on Computer and Communication Systems,
                  {ICCCS} 2022, Wuhan, China, April 22-25, 2022},
  pages        = {452--457},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCCS55155.2022.9845870},
  doi          = {10.1109/ICCCS55155.2022.9845870},
  timestamp    = {Mon, 06 Nov 2023 12:57:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccoms/LuoLLZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuL000W22,
  author       = {Guannan Liu and
                  Daiping Liu and
                  Shuai Hao and
                  Xing Gao and
                  Kun Sun and
                  Haining Wang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Ready Raider One: Exploring the Misuse of Cloud Gaming Services},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {1993--2007},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560647},
  doi          = {10.1145/3548606.3560647},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuL000W22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HouserHCW22,
  author       = {Rebekah Houser and
                  Shuai Hao and
                  Chase Cotton and
                  Haining Wang},
  title        = {A Comprehensive, Longitudinal Study of Government {DNS} Deployment
                  at Global Scale},
  booktitle    = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022},
  pages        = {193--204},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSN53405.2022.00030},
  doi          = {10.1109/DSN53405.2022.00030},
  timestamp    = {Fri, 29 Jul 2022 16:33:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/HouserHCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/McDonoughGWW22,
  author       = {Kenton McDonough and
                  Xing Gao and
                  Shuai Wang and
                  Haining Wang},
  title        = {Torpedo: {A} Fuzzing Framework for Discovering Adversarial Container
                  Workloads},
  booktitle    = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022},
  pages        = {402--414},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSN53405.2022.00048},
  doi          = {10.1109/DSN53405.2022.00048},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/McDonoughGWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AtalaySFSW22,
  author       = {Tolga O. Atalay and
                  Dragoslav Stojadinovic and
                  Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End
                  5G Testbed},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {2056--2061},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10001579},
  doi          = {10.1109/GLOBECOM48099.2022.10001579},
  timestamp    = {Tue, 17 Jan 2023 08:56:31 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/AtalaySFSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/LiuWLC22,
  author       = {Kexiang Liu and
                  Haining Wang and
                  Qianling Liu and
                  Qi Chen},
  editor       = {Marcelo M. Soares and
                  Elizabeth Rosenzweig and
                  Aaron Marcus},
  title        = {A Web-Based Application for {TWS} Earphone Design and Fit Evaluation},
  booktitle    = {Design, User Experience, and Usability: Design Thinking and Practice
                  in Contemporary and Emerging Technologies - 11th International Conference,
                  {DUXU} 2022, Held as Part of the 24th {HCI} International Conference,
                  {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13323},
  pages        = {157--167},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05906-3\_12},
  doi          = {10.1007/978-3-031-05906-3\_12},
  timestamp    = {Tue, 21 Jun 2022 15:24:33 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/LiuWLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ChenW22,
  author       = {Wanyu Chen and
                  Haining Wang},
  editor       = {Marcelo M. Soares and
                  Elizabeth Rosenzweig and
                  Aaron Marcus},
  title        = {Combining Virtual Reality and Eye Tracking to Recognize Users' Aesthetic
                  Preference for Product Modeling},
  booktitle    = {Design, User Experience, and Usability: {UX} Research, Design, and
                  Assessment - 11th International Conference, {DUXU} 2022, Held as Part
                  of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event,
                  June 26 - July 1, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13321},
  pages        = {173--181},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05897-4\_13},
  doi          = {10.1007/978-3-031-05897-4\_13},
  timestamp    = {Tue, 21 Jun 2022 15:24:32 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ChenW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/DuWQJ22,
  author       = {Yujia Du and
                  Haining Wang and
                  Meng Qiu and
                  Yuxin Ju},
  editor       = {Marcelo M. Soares and
                  Elizabeth Rosenzweig and
                  Aaron Marcus},
  title        = {Fit Improvement of Facial Interface for Steam Massage Glasses Based
                  on Principal Component Analysis Panel},
  booktitle    = {Design, User Experience, and Usability: Design Thinking and Practice
                  in Contemporary and Emerging Technologies - 11th International Conference,
                  {DUXU} 2022, Held as Part of the 24th {HCI} International Conference,
                  {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13323},
  pages        = {300--310},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05906-3\_23},
  doi          = {10.1007/978-3-031-05906-3\_23},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/DuWQJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/YuNWL22,
  author       = {Qijuan Yu and
                  Xinmiao Nie and
                  Haining Wang and
                  Zilong Li},
  editor       = {Marcelo M. Soares and
                  Elizabeth Rosenzweig and
                  Aaron Marcus},
  title        = {Comparison of Usability and Immersion Between Touch-Based and Mouse-Based
                  Interaction: {A} Study of Online Exhibitions},
  booktitle    = {Design, User Experience, and Usability: {UX} Research, Design, and
                  Assessment - 11th International Conference, {DUXU} 2022, Held as Part
                  of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event,
                  June 26 - July 1, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13321},
  pages        = {325--338},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05897-4\_23},
  doi          = {10.1007/978-3-031-05897-4\_23},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/YuNWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/ChenWL22,
  author       = {Qi Chen and
                  Haining Wang and
                  Kexiang Liu},
  editor       = {Marcelo M. Soares and
                  Elizabeth Rosenzweig and
                  Aaron Marcus},
  title        = {Anthropometric Hand Dimensions of Chinese Adults Using Three-Dimensional
                  Scanning Technique},
  booktitle    = {Design, User Experience, and Usability: Design for Emotion, Well-being
                  and Health, Learning, and Culture - 11th International Conference,
                  {DUXU} 2022, Held as Part of the 24th {HCI} International Conference,
                  {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13322},
  pages        = {377--387},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05900-1\_26},
  doi          = {10.1007/978-3-031-05900-1\_26},
  timestamp    = {Tue, 21 Jun 2022 15:24:32 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/ChenWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/JuWDQ22,
  author       = {Yuxin Ju and
                  Haining Wang and
                  Yujia Du and
                  Meng Qiu},
  editor       = {Marcelo M. Soares and
                  Elizabeth Rosenzweig and
                  Aaron Marcus},
  title        = {Pressure Sensitivity Mapping of the Head Region for Chinese Adults
                  for {AR} Glasses Design},
  booktitle    = {Design, User Experience, and Usability: Design for Emotion, Well-being
                  and Health, Learning, and Culture - 11th International Conference,
                  {DUXU} 2022, Held as Part of the 24th {HCI} International Conference,
                  {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13322},
  pages        = {415--429},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05900-1\_29},
  doi          = {10.1007/978-3-031-05900-1\_29},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/JuWDQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/QiuWDJ22,
  author       = {Meng Qiu and
                  Haining Wang and
                  Yujia Du and
                  Yuxin Ju},
  editor       = {Marcelo M. Soares and
                  Elizabeth Rosenzweig and
                  Aaron Marcus},
  title        = {Online Virtual Simulation Course Design for {VR} Glasses Fit Analysis},
  booktitle    = {Design, User Experience, and Usability: {UX} Research, Design, and
                  Assessment - 11th International Conference, {DUXU} 2022, Held as Part
                  of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event,
                  June 26 - July 1, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13321},
  pages        = {473--483},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05897-4\_33},
  doi          = {10.1007/978-3-031-05897-4\_33},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/QiuWDJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interspeech/TianDGWL22,
  author       = {Zuoyu Tian and
                  Xiao Dong and
                  Feier Gao and
                  Haining Wang and
                  Chien{-}Jer Charles Lin},
  editor       = {Hanseok Ko and
                  John H. L. Hansen},
  title        = {Mandarin Tone Sandhi Realization: Evidence from Large Speech Corpora},
  booktitle    = {Interspeech 2022, 23rd Annual Conference of the International Speech
                  Communication Association, Incheon, Korea, 18-22 September 2022},
  pages        = {5273--5277},
  publisher    = {{ISCA}},
  year         = {2022},
  url          = {https://doi.org/10.21437/Interspeech.2022-10897},
  doi          = {10.21437/INTERSPEECH.2022-10897},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/interspeech/TianDGWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscit/PeiLOW22,
  author       = {Feng Pei and
                  Yongqi Liu and
                  Shifeng Ou and
                  Haining Wang},
  title        = {A Noise Type Classifier for Speech Enhancement in {DCT} Domain},
  booktitle    = {21st International Symposium on Communications and Information Technologies,
                  {ISCIT} 2022, Xi'an, China, September 27-30, 2022},
  pages        = {312--316},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISCIT55906.2022.9931292},
  doi          = {10.1109/ISCIT55906.2022.9931292},
  timestamp    = {Fri, 18 Nov 2022 20:51:15 +0100},
  biburl       = {https://dblp.org/rec/conf/iscit/PeiLOW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincom/FamiliFASW22,
  author       = {Alireza Famili and
                  Mahsa Foruhandeh and
                  Tolga O. Atalay and
                  Angelos Stavrou and
                  Haining Wang},
  editor       = {Igor M. Moraes and
                  Miguel Elias M. Campista and
                  Yacine Ghamri{-}Doudane and
                  Lu{\'{\i}}s Henrique M. K. Costa and
                  Marcelo G. Rubinstein},
  title        = {{GPS} Spoofing Detection by Leveraging 5G Positioning Capabilities},
  booktitle    = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022,
                  Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/LATINCOM56090.2022.10000569},
  doi          = {10.1109/LATINCOM56090.2022.10000569},
  timestamp    = {Mon, 09 Jan 2023 17:07:16 +0100},
  biburl       = {https://dblp.org/rec/conf/latincom/FamiliFASW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincom/FamiliSWP22,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  editor       = {Igor M. Moraes and
                  Miguel Elias M. Campista and
                  Yacine Ghamri{-}Doudane and
                  Lu{\'{\i}}s Henrique M. K. Costa and
                  Marcelo G. Rubinstein},
  title        = {{SPIN:} Sensor Placement for Indoor Navigation of Drones},
  booktitle    = {{IEEE} Latin-American Conference on Communications, {LATINCOM} 2022,
                  Rio de Janeiro, Brazil, November 30 - Dec. 2, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/LATINCOM56090.2022.10000583},
  doi          = {10.1109/LATINCOM56090.2022.10000583},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincom/FamiliSWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lrec/WangR22,
  author       = {Haining Wang and
                  Allen Riddell},
  editor       = {Nicoletta Calzolari and
                  Fr{\'{e}}d{\'{e}}ric B{\'{e}}chet and
                  Philippe Blache and
                  Khalid Choukri and
                  Christopher Cieri and
                  Thierry Declerck and
                  Sara Goggi and
                  Hitoshi Isahara and
                  Bente Maegaard and
                  Joseph Mariani and
                  H{\'{e}}l{\`{e}}ne Mazo and
                  Jan Odijk and
                  Stelios Piperidis},
  title        = {{CCTAA:} {A} Reproducible Corpus for Chinese Authorship Attribution
                  Research},
  booktitle    = {Proceedings of the Thirteenth Language Resources and Evaluation Conference,
                  {LREC} 2022, Marseille, France, 20-25 June 2022},
  pages        = {5889--5893},
  publisher    = {European Language Resources Association},
  year         = {2022},
  url          = {https://aclanthology.org/2022.lrec-1.633},
  timestamp    = {Mon, 10 Oct 2022 16:57:52 +0200},
  biburl       = {https://dblp.org/rec/conf/lrec/WangR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HeWXFWLC022,
  author       = {Xu He and
                  Shu Wang and
                  Yunlong Xing and
                  Pengbin Feng and
                  Haining Wang and
                  Qi Li and
                  Songqing Chen and
                  Kun Sun},
  title        = {BinProv: Binary Code Provenance Identification without Disassembly},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {350--363},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545956},
  doi          = {10.1145/3545948.3545956},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HeWXFWLC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/Jin0WC22,
  author       = {Lin Jin and
                  Shuai Hao and
                  Haining Wang and
                  Chase Cotton},
  editor       = {D. Manjunath and
                  Jayakrishnan Nair and
                  Niklas Carlsson and
                  Edith Cohen and
                  Philippe Robert},
  title        = {Understanding the Practices of Global Censorship through Accurate,
                  End-to-End Measurements},
  booktitle    = {{SIGMETRICS/PERFORMANCE} '22: {ACM} {SIGMETRICS/IFIP} {PERFORMANCE}
                  Joint International Conference on Measurement and Modeling of Computer
                  Systems, Mumbai, India, June 6 - 10, 2022},
  pages        = {17--18},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3489048.3522640},
  doi          = {10.1145/3489048.3522640},
  timestamp    = {Wed, 01 Mar 2023 21:16:34 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/Jin0WC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Cronin0WC22,
  author       = {Patrick Cronin and
                  Xing Gao and
                  Haining Wang and
                  Chase Cotton},
  title        = {Time-Print: Authenticating {USB} Flash Drives with Novel Timing Fingerprints},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {1002--1017},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833595},
  doi          = {10.1109/SP46214.2022.9833595},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Cronin0WC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/LiangGSXW22,
  author       = {Yuan Liang and
                  Xing Gao and
                  Kun Sun and
                  Wenjie Xiong and
                  Haining Wang},
  title        = {An Investigation on Data Center Cooling Systems Using FPGA-based Temperature
                  Side Channels},
  booktitle    = {41st International Symposium on Reliable Distributed Systems, {SRDS}
                  2022, Vienna, Austria, September 19-22, 2022},
  pages        = {46--57},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SRDS55811.2022.00015},
  doi          = {10.1109/SRDS55811.2022.00015},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/LiangGSXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Liu0W022,
  author       = {Guannan Liu and
                  Xing Gao and
                  Haining Wang and
                  Kun Sun},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Exploring the Unchartered Space of Container Registry Typosquatting},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {35--51},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/liu-guannan},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Liu0W022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/FamiliSWP22,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  title        = {{RAIL:} Robust Acoustic Indoor Localization for Drones},
  booktitle    = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki,
                  Finland, June 19-22, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860933},
  doi          = {10.1109/VTC2022-SPRING54318.2022.9860933},
  timestamp    = {Wed, 25 Jan 2023 10:28:23 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/FamiliSWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/AtalaySSW22,
  author       = {Tolga O. Atalay and
                  Dragoslav Stojadinovic and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Scaling Network Slices with a 5G Testbed: {A} Resource Consumption
                  Study},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2022,
                  Austin, TX, USA, April 10-13, 2022},
  pages        = {2649--2654},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WCNC51071.2022.9771860},
  doi          = {10.1109/WCNC51071.2022.9771860},
  timestamp    = {Tue, 24 May 2022 15:39:22 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/AtalaySSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-10488,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Jerry Park},
  title        = {{PILOT:} High-Precision Indoor Localization for Autonomous Drones},
  journal      = {CoRR},
  volume       = {abs/2201.10488},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.10488},
  eprinttype    = {arXiv},
  eprint       = {2201.10488},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-10488.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-10691,
  author       = {Alireza Famili and
                  Angelos Stavrou and
                  Haining Wang and
                  Jung{-}Min Park},
  title        = {{OPTILOD:} Optimal Beacon Placement for High-Accuracy Indoor Localization
                  of Drones},
  journal      = {CoRR},
  volume       = {abs/2201.10691},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.10691},
  eprinttype    = {arXiv},
  eprint       = {2201.10691},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-10691.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-04138,
  author       = {Tongyue Shi and
                  Siyu Tao and
                  Haining Wang},
  title        = {Water Goes Where? {A} Water Resource Allocation Method Based on Multi-Objective
                  Decision-Making},
  journal      = {CoRR},
  volume       = {abs/2208.04138},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.04138},
  doi          = {10.48550/ARXIV.2208.04138},
  eprinttype    = {arXiv},
  eprint       = {2208.04138},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-04138.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-07395,
  author       = {Haining Wang and
                  Patrick Juola and
                  Allen Riddell},
  title        = {Reproduction and Replication of an Adversarial Stylometry Experiment},
  journal      = {CoRR},
  volume       = {abs/2208.07395},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.07395},
  doi          = {10.48550/ARXIV.2208.07395},
  eprinttype    = {arXiv},
  eprint       = {2208.07395},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-07395.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-02256,
  author       = {Zhengyong Huang and
                  Sijuan Zou and
                  Guoshuai Wang and
                  Zixiang Chen and
                  Hao Shen and
                  Haiyan Wang and
                  Na Zhang and
                  Lu Zhang and
                  Fan Yang and
                  Haining Wang and
                  Dong Liang and
                  Tianye Niu and
                  Xiaohua Zhu and
                  Zhanli Hu},
  title        = {ISA-Net: Improved spatial attention network for {PET-CT} tumor segmentation},
  journal      = {CoRR},
  volume       = {abs/2211.02256},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.02256},
  doi          = {10.48550/ARXIV.2211.02256},
  eprinttype    = {arXiv},
  eprint       = {2211.02256},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-02256.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-11465,
  author       = {Tolga O. Atalay and
                  Sudip Maitra and
                  Dragoslav Stojadinovic and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Securing 5G OpenRAN with a Scalable Authorization Framework for xApps},
  journal      = {CoRR},
  volume       = {abs/2212.11465},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.11465},
  doi          = {10.48550/ARXIV.2212.11465},
  eprinttype    = {arXiv},
  eprint       = {2212.11465},
  timestamp    = {Wed, 04 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-11465.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WuHWYLLYL21,
  author       = {Jiajia Wu and
                  Guangliang Han and
                  Haining Wang and
                  Hang Yang and
                  Qingqing Li and
                  Dongxu Liu and
                  Fangjian Ye and
                  Peixun Liu},
  title        = {Progressive Guided Fusion Network With Multi-Modal and Multi-Scale
                  Attention for {RGB-D} Salient Object Detection},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {150608--150622},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3126338},
  doi          = {10.1109/ACCESS.2021.3126338},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WuHWYLLYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/TangLLSWQ21,
  author       = {Yutao Tang and
                  Yue Li and
                  Qun Li and
                  Kun Sun and
                  Haining Wang and
                  Zhengrui Qin},
  title        = {User input enrichment via sensing devices},
  journal      = {Comput. Networks},
  volume       = {196},
  pages        = {108262},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108262},
  doi          = {10.1016/J.COMNET.2021.108262},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/TangLLSWQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/LuHW21,
  author       = {Baoli Lu and
                  Yu He and
                  Haining Wang},
  title        = {Stereo disparity optimization with depth change constraint based on
                  a continuous video},
  journal      = {Displays},
  volume       = {69},
  pages        = {102073},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.displa.2021.102073},
  doi          = {10.1016/J.DISPLA.2021.102073},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/displays/LuHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/WangWLW21,
  author       = {Changshuo Wang and
                  Chen Wang and
                  Weijun Li and
                  Haining Wang},
  title        = {A brief survey on {RGB-D} semantic segmentation using deep learning},
  journal      = {Displays},
  volume       = {70},
  pages        = {102080},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.displa.2021.102080},
  doi          = {10.1016/J.DISPLA.2021.102080},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/displays/WangWLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/JinHWC21,
  author       = {Lin Jin and
                  Shuai Hao and
                  Haining Wang and
                  Chase Cotton},
  title        = {Understanding the Practices of Global Censorship through Accurate,
                  End-to-End Measurements},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {43:1--43:25},
  year         = {2021},
  url          = {https://doi.org/10.1145/3491055},
  doi          = {10.1145/3491055},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pomacs/JinHWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/XiaoLHW21,
  author       = {Jidong Xiao and
                  Lei Lu and
                  Hai Huang and
                  Haining Wang},
  title        = {Virtual Machine Extrospection: {A} Reverse Information Retrieval in
                  Clouds},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {1},
  pages        = {401--413},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2018.2855143},
  doi          = {10.1109/TCC.2018.2855143},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/XiaoLHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoSGKPW21,
  author       = {Xing Gao and
                  Benjamin Steenkamer and
                  Zhongshu Gu and
                  Mehmet Kayaalp and
                  Dimitrios Pendarakis and
                  Haining Wang},
  title        = {A Study on the Security Implications of Information Leakages in Container
                  Clouds},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {174--191},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2879605},
  doi          = {10.1109/TDSC.2018.2879605},
  timestamp    = {Fri, 25 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GaoSGKPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LiWTSWSL21,
  author       = {Qiang Li and
                  Zhihao Wang and
                  Dawei Tan and
                  Jinke Song and
                  Haining Wang and
                  Limin Sun and
                  Jiqiang Liu},
  title        = {GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable
                  Webcam Landmarks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {29},
  number       = {4},
  pages        = {1798--1812},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNET.2021.3073926},
  doi          = {10.1109/TNET.2021.3073926},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/LiWTSWSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Cronin0WC21,
  author       = {Patrick Cronin and
                  Xing Gao and
                  Haining Wang and
                  Chase Cotton},
  title        = {An Exploration of {ARM} System-Level Cache and {GPU} Side Channels},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {784--795},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485902},
  doi          = {10.1145/3485832.3485902},
  timestamp    = {Tue, 07 Dec 2021 18:41:40 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Cronin0WC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ahfe/YuCLWH21,
  author       = {Ruyang Yu and
                  Yuan Cao and
                  Xinyi Li and
                  Haining Wang and
                  Renke He},
  editor       = {Francisco Rebelo},
  title        = {The Stability of Headphones},
  booktitle    = {Advances in Ergonomics in Design - Proceedings of the {AHFE} 2021
                  Virtual Conference on Ergonomics in Design, July 25-29, 2021, {USA}},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {261},
  pages        = {249--257},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-79760-7\_30},
  doi          = {10.1007/978-3-030-79760-7\_30},
  timestamp    = {Tue, 24 Aug 2021 14:31:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ahfe/YuCLWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ahfe/LiWYCH21,
  author       = {Xinyi Li and
                  Haining Wang and
                  Ruyang Yu and
                  Yuan Cao and
                  Renke He},
  editor       = {Francisco Rebelo},
  title        = {Naturalistic Data Collection of Head Movements During Headphone Use},
  booktitle    = {Advances in Ergonomics in Design - Proceedings of the {AHFE} 2021
                  Virtual Conference on Ergonomics in Design, July 25-29, 2021, {USA}},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {261},
  pages        = {331--338},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-79760-7\_40},
  doi          = {10.1007/978-3-030-79760-7\_40},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ahfe/LiWYCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chr/WangXR21,
  author       = {Haining Wang and
                  Xin Xie and
                  Allen Riddell},
  editor       = {Maud Ehrmann and
                  Folgert Karsdorp and
                  Melvin Wevers and
                  Tara Lee Andrews and
                  Manuel Burghardt and
                  Mike Kestemont and
                  Enrique Manjavacas and
                  Michael Piotrowski and
                  Joris van Zundert},
  title        = {The Challenge of Vernacular and Classical Chinese Cross-Register Authorship
                  Attribution},
  booktitle    = {Proceedings of the Conference on Computational Humanities Research,
                  CHR2021, Amsterdam, The Netherlands, November 17-19, 2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2989},
  pages        = {299--309},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2989/long\_paper41.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:31 +0100},
  biburl       = {https://dblp.org/rec/conf/chr/WangXR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiWW0LJRC21,
  author       = {Yue Li and
                  Zhenyu Wu and
                  Haining Wang and
                  Kun Sun and
                  Zhichun Li and
                  Kangkook Jee and
                  Junghwan Rhee and
                  Haifeng Chen},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {UTrack: Enterprise User Tracking Based on OS-Level Audit Logs},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3447831},
  doi          = {10.1145/3422337.3447831},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiWW0LJRC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiSTWL21,
  author       = {Qiang Li and
                  Jinke Song and
                  Dawei Tan and
                  Haining Wang and
                  Jiqiang Liu},
  title        = {PDGraph: {A} Large-Scale Empirical Study on Project Dependency of
                  Security Vulnerabilities},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {161--173},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00031},
  doi          = {10.1109/DSN48987.2021.00031},
  timestamp    = {Mon, 09 Aug 2021 14:50:25 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/LiSTWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ConnellyR0XWS21,
  author       = {Joseph Connelly and
                  Taylor Roberts and
                  Xing Gao and
                  Jidong Xiao and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {CloudSkulk: {A} Nested Virtual Machine Based Rootkit and Its Detection},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {350--362},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00047},
  doi          = {10.1109/DSN48987.2021.00047},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/ConnellyR0XWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eacl/WangRJ21,
  author       = {Haining Wang and
                  Allen Riddell and
                  Patrick Juola},
  editor       = {Paola Merlo and
                  J{\"{o}}rg Tiedemann and
                  Reut Tsarfaty},
  title        = {Mode Effects' Challenge to Authorship Attribution},
  booktitle    = {Proceedings of the 16th Conference of the European Chapter of the
                  Association for Computational Linguistics: Main Volume, {EACL} 2021,
                  Online, April 19 - 23, 2021},
  pages        = {1146--1155},
  publisher    = {Association for Computational Linguistics},
  year         = {2021},
  url          = {https://doi.org/10.18653/v1/2021.eacl-main.97},
  doi          = {10.18653/V1/2021.EACL-MAIN.97},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eacl/WangRJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangDZHWZD21,
  author       = {Hao Yang and
                  Kun Du and
                  Yubao Zhang and
                  Shuai Hao and
                  Haining Wang and
                  Jia Zhang and
                  Haixin Duan},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Mingling of Clear and Muddy Water: Understanding and Detecting Semantic
                  Confusion in Blackhat {SEO}},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {263--284},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_13},
  doi          = {10.1007/978-3-030-88418-5\_13},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YangDZHWZD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/JinHHWC21,
  author       = {Lin Jin and
                  Shuai Hao and
                  Yan Huang and
                  Haining Wang and
                  Chase Cotton},
  title        = {DNSonChain: Delegating Privacy-Preserved {DNS} Resolution to Blockchain},
  booktitle    = {29th {IEEE} International Conference on Network Protocols, {ICNP}
                  2021, Dallas, TX, USA, November 1-5, 2021},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICNP52444.2021.9651951},
  doi          = {10.1109/ICNP52444.2021.9651951},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnp/JinHHWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ranlp/RiddellWJ21,
  author       = {Allen Riddell and
                  Haining Wang and
                  Patrick Juola},
  editor       = {Galia Angelova and
                  Maria Kunilovskaya and
                  Ruslan Mitkov and
                  Ivelina Nikolova{-}Koleva},
  title        = {A Call for Clarity in Contemporary Authorship Attribution Evaluation},
  booktitle    = {Proceedings of the International Conference on Recent Advances in
                  Natural Language Processing {(RANLP} 2021), Held Online, 1-3 September,
                  2021},
  pages        = {1174--1179},
  publisher    = {{INCOMA} Ltd.},
  year         = {2021},
  url          = {https://aclanthology.org/2021.ranlp-1.132},
  timestamp    = {Mon, 13 Nov 2023 12:27:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ranlp/RiddellWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/HouserH0LCW21,
  author       = {Rebekah Houser and
                  Shuai Hao and
                  Zhou Li and
                  Daiping Liu and
                  Chase Cotton and
                  Haining Wang},
  title        = {A Comprehensive Measurement-based Investigation of {DNS} Hijacking},
  booktitle    = {40th International Symposium on Reliable Distributed Systems, {SRDS}
                  2021, Chicago, IL, USA, September 20-23, 2021},
  pages        = {210--221},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SRDS53918.2021.00029},
  doi          = {10.1109/SRDS53918.2021.00029},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/HouserH0LCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Cronin0YW21,
  author       = {Patrick Cronin and
                  Xing Gao and
                  Chengmo Yang and
                  Haining Wang},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone
                  Information Leakage},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {681--698},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/cronin},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Cronin0YW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/Liu0W21,
  author       = {Guannan Liu and
                  Xing Gao and
                  Haining Wang},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {An Investigation of Identity-Account Inconsistency in Single Sign-On},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {105--117},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3450085},
  doi          = {10.1145/3442381.3450085},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/Liu0W21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/JinHWC21,
  author       = {Lin Jin and
                  Shuai Hao and
                  Haining Wang and
                  Chase Cotton},
  editor       = {Jure Leskovec and
                  Marko Grobelnik and
                  Marc Najork and
                  Jie Tang and
                  Leila Zia},
  title        = {Understanding the Impact of Encrypted {DNS} on Internet Censorship},
  booktitle    = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
                  April 19-23, 2021},
  pages        = {484--495},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442381.3450084},
  doi          = {10.1145/3442381.3450084},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/JinHWC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XieCWXWGL20,
  author       = {Zhiwei Xie and
                  Yandong Chen and
                  Wenhua Wu and
                  Yuancan Xu and
                  Haining Wang and
                  Jian Guo and
                  An Luo},
  title        = {Modeling and Control Parameters Design for Grid-Connected Inverter
                  System Considering the Effect of {PLL} and Grid Impedance},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {40474--40484},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2950933},
  doi          = {10.1109/ACCESS.2019.2950933},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/XieCWXWGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/WangFESGWLPYC20,
  author       = {Yue Wang and
                  Ray Forbes and
                  Uri Elzur and
                  John Strassner and
                  Antonio Gamelas and
                  Haining Wang and
                  Shucheng Liu and
                  Luca Pesando and
                  Xiangfeng Yuan and
                  Shengming Cai},
  title        = {From Design to Practice: {ETSI} {ENI} Reference Architecture and Instantiation
                  for Network Management and Orchestration Using Artificial Intelligence},
  journal      = {{IEEE} Commun. Stand. Mag.},
  volume       = {4},
  number       = {3},
  pages        = {38--45},
  year         = {2020},
  url          = {https://doi.org/10.1109/MCOMSTD.001.1900039},
  doi          = {10.1109/MCOMSTD.001.1900039},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csm/WangFESGWLPYC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/SongLWS20,
  author       = {Jinke Song and
                  Qiang Li and
                  Haining Wang and
                  Limin Sun},
  title        = {Under the Concealing Surface: Detecting and Understanding Live Webcams
                  in the Wild},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {4},
  number       = {1},
  pages        = {05:1--05:25},
  year         = {2020},
  url          = {https://doi.org/10.1145/3379471},
  doi          = {10.1145/3379471},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pomacs/SongLWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXHWZJ20,
  author       = {Yubao Zhang and
                  Jidong Xiao and
                  Shuai Hao and
                  Haining Wang and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {Understanding the Manipulation on Recommender Systems through Web
                  Injection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3807--3818},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2954737},
  doi          = {10.1109/TIFS.2019.2954737},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LiCLW20,
  author       = {Gaoxiang Li and
                  Yandong Chen and
                  An Luo and
                  Haining Wang},
  title        = {An Enhancing Grid Stiffness Control Strategy of {STATCOM/BESS} for
                  Damping Sub-Synchronous Resonance in Wind Farm Connected to Weak Grid},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {9},
  pages        = {5835--5845},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2960863},
  doi          = {10.1109/TII.2019.2960863},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LiCLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DuYZDWH0020,
  author       = {Kun Du and
                  Hao Yang and
                  Yubao Zhang and
                  Haixin Duan and
                  Haining Wang and
                  Shuang Hao and
                  Zhou Li and
                  Min Yang},
  title        = {Understanding Promotion-as-a-Service on GitHub},
  booktitle    = {{ACSAC} '20: Annual Computer Security Applications Conference, Virtual
                  Event / Austin, TX, USA, 7-11 December, 2020},
  pages        = {597--610},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427228.3427258},
  doi          = {10.1145/3427228.3427258},
  timestamp    = {Tue, 15 Dec 2020 12:22:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DuYZDWH0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhangHW20,
  author       = {Yubao Zhang and
                  Shuai Hao and
                  Haining Wang},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {Review Trade: Everything Is Free in Incentivized Review Groups},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {339--359},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_19},
  doi          = {10.1007/978-3-030-63086-7\_19},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhangHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/SongLWS20,
  author       = {Jinke Song and
                  Qiang Li and
                  Haining Wang and
                  Limin Sun},
  editor       = {Edmund Yeh and
                  Athina Markopoulou and
                  Y. C. Tay},
  title        = {Under the Concealing Surface: Detecting and Understanding Live Webcams
                  in the Wild},
  booktitle    = {Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference
                  on Measurement and Modeling of Computer Systems, Boston, MA, USA,
                  June, 8-12, 2020},
  pages        = {77--78},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3393691.3394220},
  doi          = {10.1145/3393691.3394220},
  timestamp    = {Mon, 02 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/SongLWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WangLSWS20,
  author       = {Zhihao Wang and
                  Qiang Li and
                  Jinke Song and
                  Haining Wang and
                  Limin Sun},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {1422--1432},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380216},
  doi          = {10.1145/3366423.3380216},
  timestamp    = {Fri, 25 Dec 2020 01:14:58 +0100},
  biburl       = {https://dblp.org/rec/conf/www/WangLSWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaDWXJSW19,
  author       = {Zhanyu Ma and
                  Yifeng Ding and
                  Shaoguo Wen and
                  Jiyang Xie and
                  Yifeng Jin and
                  Zhongwei Si and
                  Haining Wang},
  title        = {Shoe-Print Image Retrieval With Multi-Part Weighted {CNN}},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {59728--59736},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2914455},
  doi          = {10.1109/ACCESS.2019.2914455},
  timestamp    = {Tue, 14 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MaDWXJSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/BianHWDDC19,
  author       = {Rui Bian and
                  Shuai Hao and
                  Haining Wang and
                  Amogh Dhamdhere and
                  Alberto Dainotti and
                  Chase Cotton},
  title        = {Towards passive analysis of anycast in global routing: unintended
                  impact of remote peering},
  journal      = {Comput. Commun. Rev.},
  volume       = {49},
  number       = {3},
  pages        = {18--25},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371927.3371930},
  doi          = {10.1145/3371927.3371930},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/BianHWDDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiWS19,
  author       = {Yue Li and
                  Haining Wang and
                  Kun Sun},
  title        = {BluePass: {A} Mobile Device Assisted Password Manager},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e3},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156244},
  doi          = {10.4108/EAI.10-1-2019.156244},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LiWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SongWZW19,
  author       = {Yang Song and
                  Chen Wu and
                  Sencun Zhu and
                  Haining Wang},
  title        = {A Machine Learning Based Approach for Mobile App Rating Manipulation
                  Detection},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e3},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157415},
  doi          = {10.4108/EAI.8-4-2019.157415},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/SongWZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangDZH0LWDSSLG19,
  author       = {Hao Yang and
                  Kun Du and
                  Yubao Zhang and
                  Shuang Hao and
                  Zhou Li and
                  Mingxuan Liu and
                  Haining Wang and
                  Hai{-}Xin Duan and
                  Yazhou Shi and
                  XiaoDong Su and
                  Guang Liu and
                  Zhifeng Geng and
                  Jianping Wu},
  editor       = {David Balenson},
  title        = {Casino royale: a deep exploration of illegal online gambling},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {500--513},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359817},
  doi          = {10.1145/3359789.3359817},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/YangDZH0LWDSSLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/Houser0CW19,
  author       = {Rebekah Houser and
                  Zhou Li and
                  Chase Cotton and
                  Haining Wang},
  editor       = {Aziz Mohaisen and
                  Zhi{-}Li Zhang},
  title        = {An investigation on information leakage of {DNS} over {TLS}},
  booktitle    = {Proceedings of the 15th International Conference on Emerging Networking
                  Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December
                  09-12, 2019},
  pages        = {123--137},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359989.3365429},
  doi          = {10.1145/3359989.3365429},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/Houser0CW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/WangHZ19,
  author       = {Haining Wang and
                  Jimmy Huang and
                  Zhewei Zhang},
  editor       = {Helmut Krcmar and
                  Jane Fedorowicz and
                  Wai Fong Boh and
                  Jan Marco Leimeister and
                  Sunil Wattal},
  title        = {The Impact of Deep Learning on Organizational Agility},
  booktitle    = {Proceedings of the 40th International Conference on Information Systems,
                  {ICIS} 2019, Munich, Germany, December 15-18, 2019},
  publisher    = {Association for Information Systems},
  year         = {2019},
  url          = {https://aisel.aisnet.org/icis2019/governance\_is/governance\_is/26},
  timestamp    = {Tue, 10 Dec 2019 12:03:30 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/WangHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/JinHWC19,
  author       = {Lin Jin and
                  Shuai Hao and
                  Haining Wang and
                  Chase Cotton},
  title        = {Unveil the Hidden Presence: Characterizing the Backend Interface of
                  Content Delivery Networks},
  booktitle    = {27th {IEEE} International Conference on Network Protocols, {ICNP}
                  2019, Chicago, IL, USA, October 8-10, 2019},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICNP.2019.8888058},
  doi          = {10.1109/ICNP.2019.8888058},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnp/JinHWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FengL0W0YZS19,
  author       = {Xuan Feng and
                  Xiaojing Liao and
                  XiaoFeng Wang and
                  Haining Wang and
                  Qiang Li and
                  Kai Yang and
                  Hongsong Zhu and
                  Limin Sun},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {Understanding and Securing Device Vulnerabilities through Automated
                  Bug Report Analysis},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {887--903},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/feng},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FengL0W0YZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csm/WangFCWGWSCL18,
  author       = {Yue Wang and
                  Ray Forbes and
                  Chris Cavigioli and
                  Haining Wang and
                  Antonio Gamelas and
                  Archie Wade and
                  John Strassner and
                  Shengming Cai and
                  Shucheng Liu},
  title        = {Network Management and Orchestration Using Artificial Intelligence:
                  Overview of {ETSI} {ENI}},
  journal      = {{IEEE} Commun. Stand. Mag.},
  volume       = {2},
  number       = {4},
  pages        = {58--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOMSTD.2018.1800033},
  doi          = {10.1109/MCOMSTD.2018.1800033},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csm/WangFCWGWSCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiFWS18,
  author       = {Qiang Li and
                  Xuan Feng and
                  Haining Wang and
                  Limin Sun},
  title        = {Understanding the Usage of Industrial Control System Devices on the
                  Internet},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {3},
  pages        = {2178--2189},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2018.2826558},
  doi          = {10.1109/JIOT.2018.2826558},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiFWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangLSW18,
  author       = {Fengwei Zhang and
                  Kevin Leach and
                  Angelos Stavrou and
                  Haining Wang},
  title        = {Towards Transparent Debugging},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {321--335},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2545671},
  doi          = {10.1109/TDSC.2016.2545671},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangLSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ChuGW18,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Haining Wang},
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Bot or Human? {A} Behavior-Based Online Bot Detection System},
  booktitle    = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  pages        = {432--449},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1\_21},
  doi          = {10.1007/978-3-030-04834-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ChuGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuZW18,
  author       = {Daiping Liu and
                  Mingwei Zhang and
                  Haining Wang},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {A Robust and Efficient Defense against Use-after-Free Exploits via
                  Concurrent Pointer Sweeping},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1635--1648},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243826},
  doi          = {10.1145/3243734.3243826},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/JinHWC18,
  author       = {Lin Jin and
                  Shuai Hao and
                  Haining Wang and
                  Chase Cotton},
  title        = {Your Remnant Tells Secret: Residual Resolution in DDoS Protection
                  Services},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2018, Luxembourg City, Luxembourg, June 25-28,
                  2018},
  pages        = {362--373},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSN.2018.00046},
  doi          = {10.1109/DSN.2018.00046},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/JinHWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuLCCYLWS18,
  author       = {Haitao Xu and
                  Zhao Li and
                  Chen Chu and
                  Yuanmi Chen and
                  Yifan Yang and
                  Haifeng Lu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Detecting and Characterizing Web Bot Traffic in a Large E-commerce
                  Marketplace},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_8},
  doi          = {10.1007/978-3-319-98989-1\_8},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/XuLCCYLWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/WangCLYYB18,
  author       = {Haining Wang and
                  Wanrong Chen and
                  Yi Li and
                  Yang Yu and
                  Wenxiu Yang and
                  Roger Ball},
  editor       = {Pei{-}Luen Patrick Rau},
  title        = {A 3D Head Model Fitting Method Using Chinese Head Anthropometric Data},
  booktitle    = {Cross-Cultural Design. Methods, Tools, and Users - 10th International
                  Conference, {CCD} 2018, Held as Part of {HCI} International 2018,
                  Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10911},
  pages        = {203--215},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92141-9\_16},
  doi          = {10.1007/978-3-319-92141-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/WangCLYYB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/WangYCYB18,
  author       = {Haining Wang and
                  Yang Yu and
                  Wanrong Chen and
                  Wenxiu Yang and
                  Roger Ball},
  editor       = {Pei{-}Luen Patrick Rau},
  title        = {Responsive Web Design for Chinese Head and Facial Database},
  booktitle    = {Cross-Cultural Design. Methods, Tools, and Users - 10th International
                  Conference, {CCD} 2018, Held as Part of {HCI} International 2018,
                  Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10911},
  pages        = {216--231},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92141-9\_17},
  doi          = {10.1007/978-3-319-92141-9\_17},
  timestamp    = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/WangYCYB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiFWS18,
  author       = {Qiang Li and
                  Xuan Feng and
                  Haining Wang and
                  Limin Sun},
  title        = {Discovery of Internet of Thing devices based on rules},
  booktitle    = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19,
                  2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFCOMW.2018.8406843},
  doi          = {10.1109/INFCOMW.2018.8406843},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiFWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/0002WS18,
  author       = {Yue Li and
                  Haining Wang and
                  Kun Sun},
  title        = {Email as a Master Key: Analyzing Account Recovery in the Wild},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {1646--1654},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486017},
  doi          = {10.1109/INFOCOM.2018.8486017},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/0002WS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XuHSW18,
  author       = {Haitao Xu and
                  Shuai Hao and
                  Alparslan Sari and
                  Haining Wang},
  title        = {Privacy Risk Assessment on Email Tracking},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {2519--2527},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486432},
  doi          = {10.1109/INFOCOM.2018.8486432},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/XuHSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiFW0S18,
  author       = {Qiang Li and
                  Xuan Feng and
                  Haining Wang and
                  Zhi Li and
                  Limin Sun},
  title        = {Towards Fine-grained Fingerprinting of Firmware in Online Embedded
                  Devices},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {2537--2545},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486326},
  doi          = {10.1109/INFOCOM.2018.8486326},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiFW0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GaoXWLW18,
  author       = {Xing Gao and
                  Zhang Xu and
                  Haining Wang and
                  Li Li and
                  Xiaorui Wang},
  title        = {Reduced Cooling Redundancy: {A} New Security Vulnerability in a Hot
                  Data Center},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_06A-1\_Gao\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/GaoXWLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Feng0WS18,
  author       = {Xuan Feng and
                  Qiang Li and
                  Haining Wang and
                  Limin Sun},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Acquisitional Rule-based Engine for Discovering Internet-of-Thing
                  Devices},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {327--341},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/feng},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Feng0WS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HaoZWS18,
  author       = {Shuai Hao and
                  Yubao Zhang and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking
                  in Content Delivery Networks},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1129--1145},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/hao},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HaoZWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/HaoW17,
  author       = {Shuai Hao and
                  Haining Wang},
  title        = {Exploring Domain Name Based Features on the Effectiveness of {DNS}
                  Caching},
  journal      = {Comput. Commun. Rev.},
  volume       = {47},
  number       = {1},
  pages        = {36--42},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041027.3041032},
  doi          = {10.1145/3041027.3041032},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/HaoW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BalenBW17,
  author       = {Nicolas Van Balen and
                  Christopher T. Ball and
                  Haining Wang},
  title        = {Analysis of Targeted Mouse Movements for Gender Classification},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e3},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153395},
  doi          = {10.4108/EAI.7-12-2017.153395},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/BalenBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangRWWH17,
  author       = {Yubao Zhang and
                  Xin Ruan and
                  Haining Wang and
                  Hui Wang and
                  Su He},
  title        = {Twitter Trends Manipulation: {A} First Look Inside the Security of
                  Twitter Trending},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {1},
  pages        = {144--156},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2604226},
  doi          = {10.1109/TIFS.2016.2604226},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangRWWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWS17,
  author       = {Yue Li and
                  Haining Wang and
                  Kun Sun},
  title        = {Personal Information in Passwords and Its Security Implications},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {10},
  pages        = {2320--2333},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2705627},
  doi          = {10.1109/TIFS.2017.2705627},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/XuLWS17,
  author       = {Haitao Xu and
                  Daiping Liu and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service},
  journal      = {{ACM} Trans. Web},
  volume       = {11},
  number       = {2},
  pages        = {13:1--13:35},
  year         = {2017},
  url          = {https://doi.org/10.1145/2983646},
  doi          = {10.1145/2983646},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tweb/XuLWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuLDWLD17,
  author       = {Daiping Liu and
                  Zhou Li and
                  Kun Du and
                  Haining Wang and
                  Baojun Liu and
                  Hai{-}Xin Duan},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated
                  Detection of Shadowed Domains},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {537--552},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134049},
  doi          = {10.1145/3133956.3134049},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuLDWLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/GaoGKPW17,
  author       = {Xing Gao and
                  Zhongshu Gu and
                  Mehmet Kayaalp and
                  Dimitrios Pendarakis and
                  Haining Wang},
  title        = {ContainerLeaks: Emerging Security Threats of Information Leakages
                  in Container Clouds},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {237--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.49},
  doi          = {10.1109/DSN.2017.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/GaoGKPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiuGZWS17,
  author       = {Daiping Liu and
                  Xing Gao and
                  Mingwei Zhang and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {Detecting Passive Cheats in Online Games via Performance-Skillfulness
                  Inconsistency},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {615--626},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.20},
  doi          = {10.1109/DSN.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiuGZWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangSD17,
  author       = {Haining Wang and
                  Priyesh Shetty and
                  Zhi Ding},
  title        = {Low Complexity Node Clustering in Cloud-RAN for Service Provisioning
                  and Resource Allocation},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254979},
  doi          = {10.1109/GLOCOM.2017.8254979},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangSD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiZWSF17,
  author       = {Yue Li and
                  Nan Zheng and
                  Haining Wang and
                  Kun Sun and
                  Hui Fang},
  title        = {A measurement study on Amazon wishlist and its privacy exposure},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996684},
  doi          = {10.1109/ICC.2017.7996684},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LiZWSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GaoLLWS17,
  author       = {Xing Gao and
                  Dachuan Liu and
                  Daiping Liu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {E-Android: {A} New Energy Profiling Tool for Smartphones},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {492--502},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.218},
  doi          = {10.1109/ICDCS.2017.218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/GaoLLWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiuGW17,
  author       = {Dachuan Liu and
                  Xing Gao and
                  Haining Wang},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Location Privacy Breach: Apps Are Watching You in Background},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2423--2429},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.227},
  doi          = {10.1109/ICDCS.2017.227},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/LiuGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsys/LiFWS17,
  author       = {Qiang Li and
                  Xuan Feng and
                  Haining Wang and
                  Limin Sun},
  title        = {Automatically Discovering Surveillance Devices in the Cyberspace},
  booktitle    = {Proceedings of the 8th {ACM} on Multimedia Systems Conference, MMSys
                  2017, Taipei, Taiwan, June 20-23, 2017},
  pages        = {331--342},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3083187.3084020},
  doi          = {10.1145/3083187.3084020},
  timestamp    = {Tue, 06 Nov 2018 11:07:10 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsys/LiFWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/0002WS17,
  author       = {Yue Li and
                  Haining Wang and
                  Kun Sun},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {BluePass: {A} Secure Hand-Free Password Manager},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {185--205},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_10},
  doi          = {10.1007/978-3-319-78813-5\_10},
  timestamp    = {Wed, 22 Dec 2021 13:40:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/0002WS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/GaoXWLW17,
  author       = {Xing Gao and
                  Zhang Xu and
                  Haining Wang and
                  Li Li and
                  Xiaorui Wang},
  editor       = {Bruce E. Hajek and
                  Sewoong Oh and
                  Augustin Chaintreau and
                  Leana Golubchik and
                  Zhi{-}Li Zhang},
  title        = {Why "Some" Like It Hot Too: Thermal Attack on Data Centers},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGMETRICS} / International Conference
                  on Measurement and Modeling of Computer Systems, Urbana-Champaign,
                  IL, USA, June 05 - 09, 2017},
  pages        = {23--24},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078505.3078545},
  doi          = {10.1145/3078505.3078545},
  timestamp    = {Fri, 30 Jul 2021 16:13:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/GaoXWLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RuanWWJ16,
  author       = {Xin Ruan and
                  Zhenyu Wu and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Profiling Online Social Behaviors for Compromised Account Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {176--187},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2482465},
  doi          = {10.1109/TIFS.2015.2482465},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RuanWWJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhengPW16,
  author       = {Nan Zheng and
                  Aaron Paloski and
                  Haining Wang},
  title        = {An Efficient User Verification System Using Angle-Based Mouse Movement
                  Biometrics},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {3},
  pages        = {11:1--11:27},
  year         = {2016},
  url          = {https://doi.org/10.1145/2893185},
  doi          = {10.1145/2893185},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhengPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/RenQZWN16,
  author       = {Zhen Ren and
                  Xin Qi and
                  Gang Zhou and
                  Haining Wang and
                  David T. Nguyen},
  title        = {Throughput Assurance for Multiple Body Sensor Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {27},
  number       = {2},
  pages        = {546--557},
  year         = {2016},
  url          = {https://doi.org/10.1109/TPDS.2015.2408611},
  doi          = {10.1109/TPDS.2015.2408611},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/RenQZWN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangZD16,
  author       = {Haining Wang and
                  Chenxi Zhu and
                  Zhi Ding},
  title        = {Femtocell Power Control for Interference Management Based on Macrolayer
                  Feedback},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {65},
  number       = {7},
  pages        = {5222--5236},
  year         = {2016},
  url          = {https://doi.org/10.1109/TVT.2015.2463718},
  doi          = {10.1109/TVT.2015.2463718},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WangZD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/LiuWZML16,
  author       = {Dachuan Liu and
                  Haining Wang and
                  Gang Zhou and
                  Weizhen Mao and
                  Boyang Li},
  title        = {Arbitrating Traffic Contention for Power Saving with Multiple {PSM}
                  Clients},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {15},
  number       = {10},
  pages        = {7030--7043},
  year         = {2016},
  url          = {https://doi.org/10.1109/TWC.2016.2595558},
  doi          = {10.1109/TWC.2016.2595558},
  timestamp    = {Sun, 27 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/LiuWZML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuWLJRXXWJ16,
  author       = {Zhang Xu and
                  Zhenyu Wu and
                  Zhichun Li and
                  Kangkook Jee and
                  Junghwan Rhee and
                  Xusheng Xiao and
                  Fengyuan Xu and
                  Haining Wang and
                  Guofei Jiang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {High Fidelity Data Reduction for Big Data Security Dependency Analyses},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {504--516},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978378},
  doi          = {10.1145/2976749.2978378},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuWLJRXXWJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuHW16,
  author       = {Daiping Liu and
                  Shuai Hao and
                  Haining Wang},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {All Your {DNS} Records Point to Us: Understanding the Security Threats
                  of Dangling {DNS} Records},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1414--1425},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978387},
  doi          = {10.1145/2976749.2978387},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GaoLLW16,
  author       = {Xing Gao and
                  Dachuan Liu and
                  Daiping Liu and
                  Haining Wang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {On Energy Security of Smartphones},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {148--150},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857738},
  doi          = {10.1145/2857705.2857738},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GaoLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icac/XiaoLWZ16,
  author       = {Jidong Xiao and
                  Lei Lu and
                  Haining Wang and
                  Xiaoyun Zhu},
  editor       = {Samuel Kounev and
                  Holger Giese and
                  Jie Liu},
  title        = {HyperLink: Virtual Machine Introspection and Memory Forensic Analysis
                  without Kernel Source Code},
  booktitle    = {2016 {IEEE} International Conference on Autonomic Computing, {ICAC}
                  2016, Wuerzburg, Germany, July 17-22, 2016},
  pages        = {127--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICAC.2016.46},
  doi          = {10.1109/ICAC.2016.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icac/XiaoLWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangD16,
  author       = {Haining Wang and
                  Zhi Ding},
  title        = {Joint power and rate optimization for co-channel small cells using
                  Frank-Wolfe algorithm},
  booktitle    = {2016 {IEEE} International Conference on Communications, {ICC} 2016,
                  Kuala Lumpur, Malaysia, May 22-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICC.2016.7511345},
  doi          = {10.1109/ICC.2016.7511345},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/FengLWS16,
  author       = {Xuan Feng and
                  Qiang Li and
                  Haining Wang and
                  Limin Sun},
  title        = {Characterizing industrial control system devices on the Internet},
  booktitle    = {24th {IEEE} International Conference on Network Protocols, {ICNP}
                  2016, Singapore, November 8-11, 2016},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNP.2016.7784407},
  doi          = {10.1109/ICNP.2016.7784407},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/FengLWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/FengLWS16a,
  author       = {Xuan Feng and
                  Qiang Li and
                  Haining Wang and
                  Limin Sun},
  title        = {{ASCEND:} {A} search engine for online industrial control devices},
  booktitle    = {24th {IEEE} International Conference on Network Protocols, {ICNP}
                  2016, Singapore, November 8-11, 2016},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNP.2016.7784467},
  doi          = {10.1109/ICNP.2016.7784467},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/FengLWS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/LiF0WS16,
  author       = {Qiang Li and
                  Xuan Feng and
                  Zhi Li and
                  Haining Wang and
                  Limin Sun},
  title        = {{GUIDE:} Graphical user interface fingerprints physical devices},
  booktitle    = {24th {IEEE} International Conference on Network Protocols, {ICNP}
                  2016, Singapore, November 8-11, 2016},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNP.2016.7784468},
  doi          = {10.1109/ICNP.2016.7784468},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/LiF0WS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiWS16,
  author       = {Yue Li and
                  Haining Wang and
                  Kun Sun},
  title        = {A study of personal information in human-chosen passwords and its
                  security implications},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524583},
  doi          = {10.1109/INFOCOM.2016.7524583},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsys/KoehlW16,
  author       = {Aaron Koehl and
                  Haining Wang},
  editor       = {Christian Timmerer},
  title        = {{SERF:} optimization of socially sourced images using psychovisual
                  enhancements},
  booktitle    = {Proceedings of the 7th International Conference on Multimedia Systems,
                  MMSys 2016, Klagenfurt, Austria, May 10-13, 2016},
  pages        = {16:1--16:12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2910017.2910609},
  doi          = {10.1145/2910017.2910609},
  timestamp    = {Tue, 06 Nov 2018 11:07:10 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsys/KoehlW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BalenBW16,
  author       = {Nicolas Van Balen and
                  Christopher T. Ball and
                  Haining Wang},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {A Behavioral Biometrics Based Approach to Online Gender Classification},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {475--495},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_27},
  doi          = {10.1007/978-3-319-59608-2\_27},
  timestamp    = {Tue, 12 May 2020 10:32:53 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/BalenBW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/LiuGZW16,
  author       = {Daiping Liu and
                  Xing Gao and
                  Mingwei Zhang and
                  Haining Wang},
  editor       = {Sara Alouf and
                  Alain Jean{-}Marie and
                  Nidhi Hegde and
                  Alexandre Prouti{\`{e}}re},
  title        = {Shoot for the Moon and You Will Never Miss: Characterizing and Detecting
                  Aimbots in Online Games},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGMETRICS} International Conference
                  on Measurement and Modeling of Computer Science, Antibes Juan-Les-Pins,
                  France, June 14-18, 2016},
  pages        = {401--402},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2896377.2901503},
  doi          = {10.1145/2896377.2901503},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/LiuGZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/XiaoLHW16,
  author       = {Jidong Xiao and
                  Lei Lu and
                  Hai Huang and
                  Haining Wang},
  editor       = {Ajay Gulati and
                  Hakim Weatherspoon},
  title        = {Hyperprobe: Towards Virtual Machine Extrospection},
  booktitle    = {2016 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2016, Denver,
                  CO, USA, June 22-24, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/atc16/technical-sessions/presentation/xiao},
  timestamp    = {Mon, 01 Feb 2021 17:03:06 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/XiaoLHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LuZWYGWQ15,
  author       = {Gang Lu and
                  Jianfeng Zhan and
                  Haining Wang and
                  Lin Yuan and
                  Yunwei Gao and
                  Chuliang Weng and
                  Yong Qi},
  title        = {PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy
                  Inefficiency},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {5},
  pages        = {1389--1401},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2014.2315625},
  doi          = {10.1109/TC.2014.2315625},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LuZWYGWQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WuXW15,
  author       = {Zhenyu Wu and
                  Zhang Xu and
                  Haining Wang},
  title        = {Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel
                  Attacks Inside the Cloud},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {23},
  number       = {2},
  pages        = {603--615},
  year         = {2015},
  url          = {https://doi.org/10.1109/TNET.2014.2304439},
  doi          = {10.1109/TNET.2014.2304439},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WuXW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WangD15,
  author       = {Haining Wang and
                  Zhi Ding},
  title        = {Power Control and Resource Allocation for Outage Balancing in Femtocell
                  Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {14},
  number       = {4},
  pages        = {2043--2057},
  year         = {2015},
  url          = {https://doi.org/10.1109/TWC.2014.2379282},
  doi          = {10.1109/TWC.2014.2379282},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WangD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WangWD15,
  author       = {Haining Wang and
                  Jiaheng Wang and
                  Zhi Ding},
  title        = {Distributed Power Control in a Two-Tier Heterogeneous Network},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {14},
  number       = {12},
  pages        = {6509--6523},
  year         = {2015},
  url          = {https://doi.org/10.1109/TWC.2015.2456055},
  doi          = {10.1109/TWC.2015.2456055},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WangWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuDGW15,
  author       = {Dachuan Liu and
                  Bo Dong and
                  Xing Gao and
                  Haining Wang},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Exploiting Eye Tracking for Smartphone Authentication},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {457--477},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_22},
  doi          = {10.1007/978-3-319-28166-7\_22},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuDGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangLWS15,
  author       = {Fengwei Zhang and
                  Kevin Leach and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {TrustLogin: Securing Password-Login on Commodity Operating Systems},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {333--344},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714614},
  doi          = {10.1145/2714576.2714614},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangLWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SunSWJW15,
  author       = {He Sun and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing and
                  Haining Wang},
  title        = {TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile
                  Devices},
  booktitle    = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages        = {367--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/DSN.2015.11},
  doi          = {10.1109/DSN.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SunSWJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/HaoWSS15,
  author       = {Shuai Hao and
                  Haining Wang and
                  Angelos Stavrou and
                  Evgenia Smirni},
  title        = {On the {DNS} Deployment of Modern Web Services},
  booktitle    = {23rd {IEEE} International Conference on Network Protocols, {ICNP}
                  2015, San Francisco, CA, USA, November 10-13, 2015},
  pages        = {100--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICNP.2015.37},
  doi          = {10.1109/ICNP.2015.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/HaoWSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/XiaoLHW15,
  author       = {Jidong Xiao and
                  Lei Lu and
                  Hai Huang and
                  Haining Wang},
  title        = {Hyperprobe: Towards Virtual Machine Extrospection},
  booktitle    = {29th Large Installation System Administration Conference, {LISA} 2015,
                  Washington, D.C., USA, November 8-13, 2015},
  pages        = {1--12},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/lisa15/conference-program/presentation/xiao},
  timestamp    = {Tue, 02 Feb 2021 08:06:07 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/XiaoLHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuWS15,
  author       = {Haitao Xu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Privacy Risk Assessment on Online Photos},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {427--447},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_20},
  doi          = {10.1007/978-3-319-26362-5\_20},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/XuWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XiaoHW15,
  author       = {Jidong Xiao and
                  Hai Huang and
                  Haining Wang},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Defeating Kernel Driver Purifier},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {116--134},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_7},
  doi          = {10.1007/978-3-319-28865-9\_7},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/XiaoHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XiaoHW15a,
  author       = {Jidong Xiao and
                  Hai Huang and
                  Haining Wang},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Kernel Data Attack Is a Realistic Security Threat},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {135--154},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_8},
  doi          = {10.1007/978-3-319-28865-9\_8},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/XiaoHW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangLSWS15,
  author       = {Fengwei Zhang and
                  Kevin Leach and
                  Angelos Stavrou and
                  Haining Wang and
                  Kun Sun},
  title        = {Using Hardware Features for Increased Debugging Transparency},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {55--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.11},
  doi          = {10.1109/SP.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangLSWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/GaoLWS15,
  author       = {Xing Gao and
                  Dachuan Liu and
                  Haining Wang and
                  Kun Sun},
  title        = {PmDroid: Permission Supervision for Android Advertising},
  booktitle    = {34th {IEEE} Symposium on Reliable Distributed Systems, {SRDS} 2015,
                  Montreal, QC, Canada, September 28 - October 1, 2015},
  pages        = {120--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SRDS.2015.41},
  doi          = {10.1109/SRDS.2015.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/GaoLWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/XuWW15,
  author       = {Zhang Xu and
                  Haining Wang and
                  Zhenyu Wu},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {A Measurement Study on Co-residence Threat inside the Cloud},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {929--944},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/xu},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/XuWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/XuLWS15,
  author       = {Haitao Xu and
                  Daiping Liu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Aldo Gangemi and
                  Stefano Leonardi and
                  Alessandro Panconesi},
  title        = {E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service},
  booktitle    = {Proceedings of the 24th International Conference on World Wide Web,
                  {WWW} 2015, Florence, Italy, May 18-22, 2015},
  pages        = {1296--1306},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2736277.2741650},
  doi          = {10.1145/2736277.2741650},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/XuLWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RenQZW14,
  author       = {Zhen Ren and
                  Xin Qi and
                  Gang Zhou and
                  Haining Wang},
  title        = {Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing
                  {EEG} Sensing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {1},
  number       = {3},
  pages        = {243--254},
  year         = {2014},
  url          = {https://doi.org/10.1109/JIOT.2014.2322331},
  doi          = {10.1109/JIOT.2014.2322331},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/RenQZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WangD14,
  author       = {Haining Wang and
                  Zhi Ding},
  title        = {Macrocell-Queue-Stabilization-Based Power Control of Femtocell Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {13},
  number       = {9},
  pages        = {5223--5236},
  year         = {2014},
  url          = {https://doi.org/10.1109/TWC.2014.2329852},
  doi          = {10.1109/TWC.2014.2329852},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WangD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CooleyWS14,
  author       = {Brett Cooley and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Activity Spoofing and Its Defense in Android Smartphones},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {494--512},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_29},
  doi          = {10.1007/978-3-319-07536-5\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CooleyWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/LeXHW14,
  author       = {Duy Le and
                  Jidong Xiao and
                  Hai Huang and
                  Haining Wang},
  editor       = {Danny Raz and
                  Michele Nogueira and
                  Edmundo Roberto Mauro Madeira and
                  Brendan Jennings and
                  Lisandro Zambenedetti Granville and
                  Luciano Paschoal Gaspary},
  title        = {Shadow patching: Minimizing maintenance windows in a virtualized enterprise
                  environment},
  booktitle    = {10th International Conference on Network and Service Management, {CNSM}
                  2014 and Workshop, Rio de Janeiro, Brazil, November 17-21, 2014},
  pages        = {169--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNSM.2014.7014154},
  doi          = {10.1109/CNSM.2014.7014154},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/LeXHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SengarWI14,
  author       = {Hemant Sengar and
                  Haining Wang and
                  Seyed Amir Iranmanesh},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Wiretap-proof: what they hear is not what you speak, and what you
                  speak they do not hear},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {345--356},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557567},
  doi          = {10.1145/2557547.2557567},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/SengarWI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiuWS14,
  author       = {Daiping Liu and
                  Haining Wang and
                  Angelos Stavrou},
  title        = {Detecting Malicious Javascript in {PDF} through Document Instrumentation},
  booktitle    = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014},
  pages        = {100--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DSN.2014.92},
  doi          = {10.1109/DSN.2014.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiuWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangWLS14,
  author       = {Fengwei Zhang and
                  Haining Wang and
                  Kevin Leach and
                  Angelos Stavrou},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {A Framework to Secure Peripherals at Runtime},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_13},
  doi          = {10.1007/978-3-319-11203-9\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangWLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuLKWS14,
  author       = {Haitao Xu and
                  Daiping Liu and
                  Aaron Koehl and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Click Fraud Detection on the Advertiser Side},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {419--438},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_24},
  doi          = {10.1007/978-3-319-11212-1\_24},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/XuLKWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangD14,
  author       = {Haining Wang and
                  Zhi Ding},
  title        = {Power control and rate allocation for outage balancing in femtocell
                  networks},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin,
                  TX, USA, December 8-12, 2014},
  pages        = {4257--4262},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7037476},
  doi          = {10.1109/GLOCOM.2014.7037476},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ZhengBHW14,
  author       = {Nan Zheng and
                  Kun Bai and
                  Hai Huang and
                  Haining Wang},
  title        = {You Are How You Touch: User Verification on Smartphones via Tapping
                  Behaviors},
  booktitle    = {22nd {IEEE} International Conference on Network Protocols, {ICNP}
                  2014, Raleigh, NC, USA, October 21-24, 2014},
  pages        = {221--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICNP.2014.43},
  doi          = {10.1109/ICNP.2014.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/ZhengBHW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangRWW14,
  author       = {Yubao Zhang and
                  Xin Ruan and
                  Haining Wang and
                  Hui Wang},
  title        = {What scale of audience a campaign can reach in what price on Twitter?},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {1168--1176},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6848048},
  doi          = {10.1109/INFOCOM.2014.6848048},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangRWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/JiangWDF14,
  author       = {Yi Jiang and
                  Haining Wang and
                  Babak Daneshrad and
                  Bruce Fette},
  title        = {{PHY} and {MAC} Design for Distributed Tx-Rx beamforming in Mobile
                  Ad Hoc Networks},
  booktitle    = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore,
                  MD, USA, October 6-8, 2014},
  pages        = {885--890},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MILCOM.2014.152},
  doi          = {10.1109/MILCOM.2014.152},
  timestamp    = {Fri, 16 Sep 2022 20:28:33 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/JiangWDF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/WangJDF14,
  author       = {Haining Wang and
                  Yi Jiang and
                  Babak Daneshrad and
                  Bruce Fette},
  title        = {Improving Spectral Efficiency of {MIMO} Ad Hoc Network via Greedy
                  {MCS} Packing},
  booktitle    = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore,
                  MD, USA, October 6-8, 2014},
  pages        = {904--909},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MILCOM.2014.155},
  doi          = {10.1109/MILCOM.2014.155},
  timestamp    = {Fri, 16 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/WangJDF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/XuWXW14,
  author       = {Zhang Xu and
                  Haining Wang and
                  Zichen Xu and
                  Xiaorui Wang},
  title        = {Power Attack: An Increasing Threat to Data Centers},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/power-attack-increasing-threat-data-centers},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/XuWXW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BalenW14,
  author       = {Nicolas Van Balen and
                  Haining Wang},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {GridMap: Enhanced Security in Cued-Recall Graphical Passwords},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {75--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_6},
  doi          = {10.1007/978-3-319-23829-6\_6},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/BalenW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/XuWJ14,
  author       = {Zhang Xu and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Gemini: An Emergency Line of Defense against Phishing Attacks},
  booktitle    = {33rd {IEEE} International Symposium on Reliable Distributed Systems,
                  {SRDS} 2014, Nara, Japan, October 6-9, 2014},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SRDS.2014.26},
  doi          = {10.1109/SRDS.2014.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/XuWJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChuGKWJ13,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Aaron Koehl and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Blog or block: Detecting blog bots through behavioral biometrics},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {3},
  pages        = {634--646},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.10.005},
  doi          = {10.1016/J.COMNET.2012.10.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChuGKWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/WuZSJW13,
  author       = {Zhenyu Wu and
                  Yueping Zhang and
                  Vishal K. Singh and
                  Guofei Jiang and
                  Haining Wang},
  title        = {Automating Cloud Network Optimization and Evolution},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {31},
  number       = {12},
  pages        = {2620--2631},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSAC.2013.131204},
  doi          = {10.1109/JSAC.2013.131204},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/WuZSJW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/CiernyWWDW13,
  author       = {Michal Cierny and
                  Haining Wang and
                  Risto Wichman and
                  Zhi Ding and
                  Carl Wijting},
  title        = {On Number of Almost Blank Subframes in Heterogeneous Cellular Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {12},
  number       = {10},
  pages        = {5061--5073},
  year         = {2013},
  url          = {https://doi.org/10.1109/TWC.2013.090513.121756},
  doi          = {10.1109/TWC.2013.090513.121756},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/CiernyWWDW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/YueW13,
  author       = {Chuan Yue and
                  Haining Wang},
  title        = {A measurement study of insecure javascript practices on the web},
  journal      = {{ACM} Trans. Web},
  volume       = {7},
  number       = {2},
  pages        = {7:1--7:39},
  year         = {2013},
  url          = {https://doi.org/10.1145/2460383.2460386},
  doi          = {10.1145/2460383.2460386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/YueW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/JinOZMKW13,
  author       = {Jing Jin and
                  Jeff Offutt and
                  Nan Zheng and
                  Feng Mao and
                  Aaron Koehl and
                  Haining Wang},
  title        = {Evasive bots masquerading as human beings on the web},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575366},
  doi          = {10.1109/DSN.2013.6575366},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/JinOZMKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/XiaoXHW13,
  author       = {Jidong Xiao and
                  Zhang Xu and
                  Hai Huang and
                  Haining Wang},
  title        = {Security implications of memory deduplication in a virtualized environment},
  booktitle    = {2013 43rd Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSN.2013.6575349},
  doi          = {10.1109/DSN.2013.6575349},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/XiaoXHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangDCW13,
  author       = {Haining Wang and
                  Zhi Ding and
                  Michal Cierny and
                  Risto Wichman},
  title        = {Time domain bi-level downlink power control for cross-tier interference
                  mitigation in HetNet},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {5183--5187},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6655407},
  doi          = {10.1109/ICC.2013.6655407},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangDCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RuanYW13,
  author       = {Xin Ruan and
                  Chuan Yue and
                  Haining Wang},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Unveiling Privacy Setting Breaches in Online Social Networks},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {323--341},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_20},
  doi          = {10.1007/978-3-319-04283-1\_20},
  timestamp    = {Mon, 05 Jun 2017 12:43:35 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RuanYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/WangWDC13,
  author       = {Kun{-}Yu Wang and
                  Haining Wang and
                  Zhi Ding and
                  Chong{-}Yung Chi},
  title        = {A Low-Complexity Algorithm for Worst-Case Utility Maximization in
                  Multiuser {MISO} Downlink},
  booktitle    = {Proceedings of the 78th {IEEE} Vehicular Technology Conference, {VTC}
                  Fall 2013, Las Vegas, NV, USA, September 2-5, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/VTCFall.2013.6692040},
  doi          = {10.1109/VTCFALL.2013.6692040},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/WangWDC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1302-5975,
  author       = {Kun{-}Yu Wang and
                  Haining Wang and
                  Zhi Ding and
                  Chong{-}Yung Chi},
  title        = {Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser
                  {MISO} Downlink},
  journal      = {CoRR},
  volume       = {abs/1302.5975},
  year         = {2013},
  url          = {http://arxiv.org/abs/1302.5975},
  eprinttype    = {arXiv},
  eprint       = {1302.5975},
  timestamp    = {Tue, 25 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1302-5975.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-2269,
  author       = {Michal Cierny and
                  Haining Wang and
                  Risto Wichman and
                  Zhi Ding and
                  Carl Wijting},
  title        = {On Number of Almost Blank Subframes in Heterogeneous Cellular Networks},
  journal      = {CoRR},
  volume       = {abs/1304.2269},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.2269},
  eprinttype    = {arXiv},
  eprint       = {1304.2269},
  timestamp    = {Fri, 14 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-2269.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/XieWW12,
  author       = {Mengjun Xie and
                  Zhenyu Wu and
                  Haining Wang},
  title        = {Secure instant messaging in enterprise-like networks},
  journal      = {Comput. Networks},
  volume       = {56},
  number       = {1},
  pages        = {448--461},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.comnet.2011.09.006},
  doi          = {10.1016/J.COMNET.2011.09.006},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/XieWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChuGWJ12,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
                  Cyborg?},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {811--824},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.75},
  doi          = {10.1109/TDSC.2012.75},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChuGWJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuXW12,
  author       = {Zhenyu Wu and
                  Mengjun Xie and
                  Haining Wang},
  title        = {On Energy Security of Server Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {865--876},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.70},
  doi          = {10.1109/TDSC.2012.70},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuXW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SangZLWXWZJ12,
  author       = {Bo Sang and
                  Jianfeng Zhan and
                  Gang Lu and
                  Haining Wang and
                  Dongyan Xu and
                  Lei Wang and
                  Zhihong Zhang and
                  Zhen Jia},
  title        = {Precise, Scalable, and Online Request Tracing for Multitier Services
                  of Black Boxes},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {23},
  number       = {6},
  pages        = {1159--1167},
  year         = {2012},
  url          = {https://doi.org/10.1109/TPDS.2011.257},
  doi          = {10.1109/TPDS.2011.257},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/SangZLWXWZJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChuWW12,
  author       = {Zi Chu and
                  Indra Widjaja and
                  Haining Wang},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Detecting Social Spam Campaigns on Twitter},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {455--472},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_27},
  doi          = {10.1007/978-3-642-31284-7\_27},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChuWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiaoXHW12,
  author       = {Jidong Xiao and
                  Zhang Xu and
                  Hai Huang and
                  Haining Wang},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {A covert channel construction in a virtualized environment},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1040--1042},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382318},
  doi          = {10.1145/2382196.2382318},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XiaoXHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/LeHW12,
  author       = {Duy Le and
                  Hai Huang and
                  Haining Wang},
  editor       = {William J. Bolosky and
                  Jason Flinn},
  title        = {Understanding performance implications of nested file systems in a
                  virtualized environment},
  booktitle    = {Proceedings of the 10th {USENIX} conference on File and Storage Technologies,
                  {FAST} 2012, San Jose, CA, USA, February 14-17, 2012},
  pages        = {8},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/fast12/understanding-performance-implications-nested-file-systems-virtualized-environment},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/LeHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icac/LuZWYW12,
  author       = {Gang Lu and
                  Jianfeng Zhan and
                  Haining Wang and
                  Lin Yuan and
                  Chuliang Weng},
  editor       = {Dejan S. Milojicic and
                  Dongyan Xu and
                  Vanish Talwar},
  title        = {PowerTracer: tracing requests in multi-tier services to diagnose energy
                  inefficiency},
  booktitle    = {9th International Conference on Autonomic Computing, ICAC'12, San
                  Jose, CA, USA, September 16 - 20, 2012},
  pages        = {97--102},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2371536.2371553},
  doi          = {10.1145/2371536.2371553},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icac/LuZWYW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XieWW12,
  author       = {Mengjun Xie and
                  Indra Widjaja and
                  Haining Wang},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Enhancing cache robustness for content-centric networking},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2426--2434},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195632},
  doi          = {10.1109/INFCOM.2012.6195632},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/XieWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/WuZSJW12,
  author       = {Zhenyu Wu and
                  Yueping Zhang and
                  Vishal K. Singh and
                  Guofei Jiang and
                  Haining Wang},
  title        = {NetDEO: Automating network design, evolution, and optimization},
  booktitle    = {20th {IEEE} International Workshop on Quality of Service, IWQoS 2012,
                  Coimbra, Portugal, June 4-5, 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/IWQoS.2012.6245996},
  doi          = {10.1109/IWQOS.2012.6245996},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/WuZSJW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/KoehlW12,
  author       = {Aaron Koehl and
                  Haining Wang},
  editor       = {Priya Narasimhan and
                  Peter Triantafillou},
  title        = {m.Site: Efficient Content Adaptation for Mobile Devices},
  booktitle    = {Middleware 2012 - {ACM/IFIP/USENIX} 13th International Middleware
                  Conference, Montreal, QC, Canada, December 3-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7662},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35170-9\_3},
  doi          = {10.1007/978-3-642-35170-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/KoehlW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/IranmaneshSW12,
  author       = {Seyed Amir Iranmanesh and
                  Hemant Sengar and
                  Haining Wang},
  editor       = {Angelos D. Keromytis and
                  Roberto Di Pietro},
  title        = {A Voice Spam Filter to Clean Subscribers' Mailbox},
  booktitle    = {Security and Privacy in Communication Networks - 8th International
                  {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012.
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {106},
  pages        = {349--367},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36883-7\_21},
  doi          = {10.1007/978-3-642-36883-7\_21},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/IranmaneshSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuXW12,
  author       = {Zhenyu Wu and
                  Zhang Xu and
                  Haining Wang},
  editor       = {Tadayoshi Kohno},
  title        = {Whispers in the Hyper-space: High-speed Covert Channel Attacks in
                  the Cloud},
  booktitle    = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
                  USA, August 8-10, 2012},
  pages        = {159--173},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/wu},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WuXW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/KoehlW12,
  author       = {Aaron Koehl and
                  Haining Wang},
  editor       = {Alain Mille and
                  Fabien Gandon and
                  Jacques Misselis and
                  Michael Rabinovich and
                  Steffen Staab},
  title        = {Surviving a search engine overload},
  booktitle    = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
                  Lyon, France, April 16-20, 2012},
  pages        = {171--180},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2187836.2187860},
  doi          = {10.1145/2187836.2187860},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/KoehlW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2011,
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31909-9},
  doi          = {10.1007/978-3-642-31909-9},
  isbn         = {978-3-642-31908-2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChuW11,
  author       = {Zi Chu and
                  Haining Wang},
  title        = {An investigation of hotlinking and its countermeasures},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {4},
  pages        = {577--590},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.05.007},
  doi          = {10.1016/J.COMCOM.2010.05.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/XiangLWZ11,
  author       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {Special Issue: Securing Distributed Networks and Systems},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {23},
  number       = {12},
  pages        = {1311--1312},
  year         = {2011},
  url          = {https://doi.org/10.1002/cpe.1703},
  doi          = {10.1002/CPE.1703},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/XiangLWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GianvecchioW11,
  author       = {Steven Gianvecchio and
                  Haining Wang},
  title        = {An Entropy-Based Approach to Detecting Covert Timing Channels},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {6},
  pages        = {785--797},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2010.46},
  doi          = {10.1109/TDSC.2010.46},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GianvecchioW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WuXW11,
  author       = {Zhenyu Wu and
                  Mengjun Xie and
                  Haining Wang},
  title        = {Design and Implementation of a Fast Dynamic Packet Filter},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {19},
  number       = {5},
  pages        = {1405--1419},
  year         = {2011},
  url          = {https://doi.org/10.1109/TNET.2011.2111381},
  doi          = {10.1109/TNET.2011.2111381},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WuXW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/GianvecchioXWW11,
  author       = {Steven Gianvecchio and
                  Mengjun Xie and
                  Zhenyu Wu and
                  Haining Wang},
  title        = {Humans and Bots in Internet Chat: Measurement, Analysis, and Automated
                  Classification},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {19},
  number       = {5},
  pages        = {1557--1571},
  year         = {2011},
  url          = {https://doi.org/10.1109/TNET.2011.2126591},
  doi          = {10.1109/TNET.2011.2126591},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/GianvecchioXWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LeW11,
  author       = {Duy Le and
                  Haining Wang},
  title        = {An Effective Memory Optimization for Virtual Machine-Based Systems},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {22},
  number       = {10},
  pages        = {1705--1713},
  year         = {2011},
  url          = {https://doi.org/10.1109/TPDS.2011.37},
  doi          = {10.1109/TPDS.2011.37},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/LeW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhengPW11,
  author       = {Nan Zheng and
                  Aaron Paloski and
                  Haining Wang},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {An efficient user verification system via mouse movements},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {139--150},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046725},
  doi          = {10.1145/2046707.2046725},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhengPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RenZPKMW11,
  author       = {Zhen Ren and
                  Gang Zhou and
                  Andrew J. Pyles and
                  Matthew Keally and
                  Weizhen Mao and
                  Haining Wang},
  title        = {BodyT2: Throughput and time delay performance assurance for heterogeneous
                  BSNs},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {2750--2758},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935107},
  doi          = {10.1109/INFCOM.2011.5935107},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/RenZPKMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuXW11a,
  author       = {Zhenyu Wu and
                  Mengjun Xie and
                  Haining Wang},
  editor       = {David Brumley and
                  Michal Zalewski},
  title        = {Energy Attack on Server Systems},
  booktitle    = {5th {USENIX} Workshop on Offensive Technologies, WOOT'11, August 8,
                  2011, San Francisco, CA, USA, Proceedings},
  pages        = {62--70},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/event/woot11/tech/final\_files/Wu.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WuXW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YueXW10,
  author       = {Chuan Yue and
                  Mengjun Xie and
                  Haining Wang},
  title        = {An automatic {HTTP} cookie management system},
  journal      = {Comput. Networks},
  volume       = {54},
  number       = {13},
  pages        = {2182--2198},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comnet.2010.03.006},
  doi          = {10.1016/J.COMNET.2010.03.006},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/YueXW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/YinSWP10,
  author       = {Heng Yin and
                  Bo Sheng and
                  Haining Wang and
                  Jianping Pan},
  title        = {Keychain-Based Signatures for Securing {BGP}},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {28},
  number       = {8},
  pages        = {1308--1318},
  year         = {2010},
  url          = {https://doi.org/10.1109/JSAC.2010.101008},
  doi          = {10.1109/JSAC.2010.101008},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/YinSWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiangZW10,
  author       = {Yang Xiang and
                  Wanlei Zhou and
                  Haining Wang},
  title        = {Security in next generation wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {1--3},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.151},
  doi          = {10.1002/SEC.151},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiangZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/YueW10,
  author       = {Chuan Yue and
                  Haining Wang},
  title        = {BogusBiter: {A} transparent protection against phishing attacks},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {10},
  number       = {2},
  pages        = {6:1--6:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1754393.1754395},
  doi          = {10.1145/1754393.1754395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/YueW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChuGWJ10,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Haining Wang and
                  Sushil Jajodia},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Who is tweeting on Twitter: human, bot, or cyborg?},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920265},
  doi          = {10.1145/1920261.1920265},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChuGWJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuGXW10,
  author       = {Zhenyu Wu and
                  Steven Gianvecchio and
                  Mengjun Xie and
                  Haining Wang},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Mimimorphism: a new approach to binary code obfuscation},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {536--546},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866368},
  doi          = {10.1145/1866307.1866368},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WuGXW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SengarRWWJ10,
  author       = {Hemant Sengar and
                  Zhen Ren and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Tracking Skype VoIP Calls Over The Internet},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {96--100},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462266},
  doi          = {10.1109/INFCOM.2010.5462266},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SengarRWWJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XieW10,
  author       = {Mengjun Xie and
                  Haining Wang},
  title        = {A Collaboration-based Autonomous Reputation System for Email Services},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {992--1000},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5461948},
  doi          = {10.1109/INFCOM.2010.5461948},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/XieW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/LeW10,
  author       = {Duy Le and
                  Haining Wang},
  title        = {An effective feedback-driven approach for energy saving in battery
                  powered systems},
  booktitle    = {18th International Workshop on Quality of Service, IWQoS 2010, Beijing,
                  China, 16-18 June 2010},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/IWQoS.2010.5542738},
  doi          = {10.1109/IWQOS.2010.5542738},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/LeW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1007-4890,
  author       = {Lin Yuan and
                  Jianfeng Zhan and
                  Bo Sang and
                  Lei Wang and
                  Haining Wang},
  title        = {PowerTracer: Tracing requests in multi-tier services to save cluster
                  power consumption},
  journal      = {CoRR},
  volume       = {abs/1007.4890},
  year         = {2010},
  url          = {http://arxiv.org/abs/1007.4890},
  eprinttype    = {arXiv},
  eprint       = {1007.4890},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1007-4890.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YueW09,
  author       = {Chuan Yue and
                  Haining Wang},
  title        = {Profit-aware overload protection in E-commerce Web sites},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {32},
  number       = {2},
  pages        = {347--356},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jnca.2008.02.020},
  doi          = {10.1016/J.JNCA.2008.02.020},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YueW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GianvecchioWXW09,
  author       = {Steven Gianvecchio and
                  Zhenyu Wu and
                  Mengjun Xie and
                  Haining Wang},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Battle of Botcraft: fighting bots in online games with human observational
                  proofs},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {256--268},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653694},
  doi          = {10.1145/1653662.1653694},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GianvecchioWXW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/CourtwrightYW09,
  author       = {Eli Courtwright and
                  Chuan Yue and
                  Haining Wang},
  title        = {Efficient resource management on template-based web servers},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {249--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270329},
  doi          = {10.1109/DSN.2009.5270329},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/CourtwrightYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/YueW09,
  author       = {Chuan Yue and
                  Haining Wang},
  editor       = {Sumi Helal and
                  Hans Gellersen and
                  Sunny Consolvo},
  title        = {SessionMagnifier: a simple approach to secure and convenient kiosk
                  browsing},
  booktitle    = {UbiComp 2009: Ubiquitous Computing, 11th International Conference,
                  UbiComp 2009, Orlando, Florida, USA, September 30 - October 3, 2009,
                  Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {125--134},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1620545.1620566},
  doi          = {10.1145/1620545.1620566},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/YueW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/SengarWWWJ09,
  author       = {Hemant Sengar and
                  Xinyuan Wang and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Online detection of network traffic anomalies using behavioral distance},
  booktitle    = {17th International Workshop on Quality of Service, IWQoS 2009, Charleston,
                  South Carolina, USA, 13-15 July 2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IWQoS.2009.5201415},
  doi          = {10.1109/IWQOS.2009.5201415},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/SengarWWWJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/StrahsYW09,
  author       = {Benjamin Strahs and
                  Chuan Yue and
                  Haining Wang},
  editor       = {Adam Moskowitz},
  title        = {Secure Passwords Through Enhanced Hashing},
  booktitle    = {Proceedings of the 23rd Large Installation System Administration Conference,
                  November 1-6, 2009, Baltimore, MD, {USA}},
  pages        = {93--106},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/lisa09/tech/full\_papers/strahs.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/StrahsYW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/YueCW09,
  author       = {Chuan Yue and
                  Zi Chu and
                  Haining Wang},
  editor       = {Geoffrey M. Voelker and
                  Alec Wolman},
  title        = {{RCB:} {A} Simple and Practical Framework for Real-time Collaborative
                  Browsing},
  booktitle    = {2009 {USENIX} Annual Technical Conference, San Diego, CA, USA, June
                  14-19, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/usenix-09/rcb-simple-and-practical-framework-real-time-collaborative-browsing},
  timestamp    = {Mon, 01 Feb 2021 08:43:29 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/YueCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/YueW09,
  author       = {Chuan Yue and
                  Haining Wang},
  editor       = {Juan Quemada and
                  Gonzalo Le{\'{o}}n and
                  Yo{\"{e}}lle S. Maarek and
                  Wolfgang Nejdl},
  title        = {Characterizing insecure javascript practices on the web},
  booktitle    = {Proceedings of the 18th International Conference on World Wide Web,
                  {WWW} 2009, Madrid, Spain, April 20-24, 2009},
  pages        = {961--970},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1526709.1526838},
  doi          = {10.1145/1526709.1526838},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/YueW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2009,
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {Third International Conference on Network and System Security, {NSS}
                  2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5328291/proceeding},
  isbn         = {978-0-7695-3838-9},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/XieYW08,
  author       = {Mengjun Xie and
                  Heng Yin and
                  Haining Wang},
  title        = {Thwarting E-mail Spam Laundering},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {13:1--13:32},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455525},
  doi          = {10.1145/1455518.1455525},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/XieYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SengarWWJ08,
  author       = {Hemant Sengar and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Detecting VoIP Floods Using the Hellinger Distance},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {19},
  number       = {6},
  pages        = {794--805},
  year         = {2008},
  url          = {https://doi.org/10.1109/TPDS.2007.70786},
  doi          = {10.1109/TPDS.2007.70786},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/SengarWWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YueW08,
  author       = {Chuan Yue and
                  Haining Wang},
  title        = {Anti-Phishing in Offense and Defense},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {345--354},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.32},
  doi          = {10.1109/ACSAC.2008.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YueW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/HainingHM08,
  author       = {Haining Wang and
                  Huifeng Xue and
                  Mengmeng Ge},
  title        = {Application and Practice of System Integration Approach in Intelligent
                  Human Motion Recognition},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 1: Artificial Intelligence, December 12-14, 2008,
                  Wuhan, China},
  pages        = {156--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.642},
  doi          = {10.1109/CSSE.2008.642},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/HainingHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/WuXW08,
  author       = {Zhenyu Wu and
                  Mengjun Xie and
                  Haining Wang},
  editor       = {Jon Crowcroft and
                  Michael Dahlin},
  title        = {Swift: {A} Fast Dynamic Packet Filter},
  booktitle    = {5th {USENIX} Symposium on Networked Systems Design {\&} Implementation,
                  {NSDI} 2008, April 16-18, 2008, San Francisco, CA, USA, Proceedings},
  pages        = {279--292},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/nsdi08/tech/full\_papers/wu/wu.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/WuXW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GianvecchioWWJ08,
  author       = {Steven Gianvecchio and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Model-Based Covert Timing Channels: Automated Modeling and Evasion},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {211--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_12},
  doi          = {10.1007/978-3-540-87403-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GianvecchioWWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GianvecchioXWW08,
  author       = {Steven Gianvecchio and
                  Mengjun Xie and
                  Zhengyu Wu and
                  Haining Wang},
  editor       = {Paul C. van Oorschot},
  title        = {Measurement and Classification of Humans and Bots in Internet Chat},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {155--170},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/sec08/tech/full\_papers/gianvecchio/gianvecchio.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GianvecchioXWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/GuoDWLCZ07,
  author       = {Lei Guo and
                  Xiaoning Ding and
                  Haining Wang and
                  Qun Li and
                  Songqing Chen and
                  Xiaodong Zhang},
  title        = {Cooperative Relay Service in a Wireless {LAN}},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {25},
  number       = {2},
  pages        = {355--368},
  year         = {2007},
  url          = {https://doi.org/10.1109/JSAC.2007.070211},
  doi          = {10.1109/JSAC.2007.070211},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/GuoDWLCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ChenWRZ07,
  author       = {Xin Chen and
                  Haining Wang and
                  Shansi Ren and
                  Xiaodong Zhang},
  title        = {Maintaining Strong Cache Consistency for the Domain Name System},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {19},
  number       = {8},
  pages        = {1057--1071},
  year         = {2007},
  url          = {https://doi.org/10.1109/TKDE.2007.1049},
  doi          = {10.1109/TKDE.2007.1049},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ChenWRZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangJS07,
  author       = {Haining Wang and
                  Cheng Jin and
                  Kang G. Shin},
  title        = {Defense against spoofed {IP} traffic using hop-count filtering},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {15},
  number       = {1},
  pages        = {40--53},
  year         = {2007},
  url          = {http://doi.acm.org/10.1145/1241832.1241836},
  doi          = {10.1145/1241832.1241836},
  timestamp    = {Tue, 23 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WangJS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YinW07,
  author       = {Heng Yin and
                  Haining Wang},
  title        = {Building an application-aware IPsec policy system},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {15},
  number       = {6},
  pages        = {1502--1513},
  year         = {2007},
  url          = {http://doi.acm.org/10.1145/1373476.1373499},
  doi          = {10.1145/1373476.1373499},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/YinW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/RenLWCZ07,
  author       = {Shansi Ren and
                  Qun Li and
                  Haining Wang and
                  Xin Chen and
                  Xiaodong Zhang},
  title        = {Design and Analysis of Sensing Scheduling Algorithms under Partial
                  Coverage for Object Detection in Sensor Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {18},
  number       = {3},
  pages        = {334--350},
  year         = {2007},
  url          = {https://doi.org/10.1109/TPDS.2007.41},
  doi          = {10.1109/TPDS.2007.41},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/RenLWCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/XieWW07,
  author       = {Mengjun Xie and
                  Zhenyu Wu and
                  Haining Wang},
  title        = {HoneyIM: Fast Detection and Suppression of Instant Messaging Malware
                  in Enterprise-Like Networks},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {64--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.24},
  doi          = {10.1109/ACSAC.2007.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/XieWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GianvecchioW07,
  author       = {Steven Gianvecchio and
                  Haining Wang},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Detecting covert timing channels: an entropy-based approach},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {307--316},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315284},
  doi          = {10.1145/1315245.1315284},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GianvecchioW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/YueXW07,
  author       = {Chuan Yue and
                  Mengjun Xie and
                  Haining Wang},
  title        = {Automatic Cookie Usage Setting with CookiePicker},
  booktitle    = {The 37th Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2007, 25-28 June 2007, Edinburgh, UK,
                  Proceedings},
  pages        = {460--470},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/DSN.2007.21},
  doi          = {10.1109/DSN.2007.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/YueXW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/YinSWP07,
  author       = {Heng Yin and
                  Bo Sheng and
                  Haining Wang and
                  Jianping Pan},
  title        = {Securing {BGP} through Keychain-based Signatures},
  booktitle    = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS
                  2007, Evanston, Illinois, USA, June 21-22, 2007},
  pages        = {154--163},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IWQOS.2007.376562},
  doi          = {10.1109/IWQOS.2007.376562},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/YinSWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/YueW07,
  author       = {Chuan Yue and
                  Haining Wang},
  title        = {Profit-aware Admission Control for Overload Protection in E-commerce
                  Web Sites},
  booktitle    = {Fifteenth {IEEE} International Workshop on Quality of Service, IWQoS
                  2007, Evanston, Illinois, USA, June 21-22, 2007},
  pages        = {188--193},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IWQOS.2007.376566},
  doi          = {10.1109/IWQOS.2007.376566},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/YueW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadnets/ChaffeeWW06,
  author       = {Wyatt Chaffee and
                  Bin Wang and
                  Haining Wang},
  title        = {Modeling and Analysis of a Shared Channel Architecture for Performance
                  Improvement in Optical Burst Switched Networks},
  booktitle    = {3rd International Conference on Broadband Communications, Networks,
                  and Systems {(BROADNETS} 2006), 1-5 October 2006, San Jos{\'{e}},
                  California, {USA}},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/BROADNETS.2006.4374323},
  doi          = {10.1109/BROADNETS.2006.4374323},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/broadnets/ChaffeeWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XieYW06,
  author       = {Mengjun Xie and
                  Heng Yin and
                  Haining Wang},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {An effective defense against email spam laundering},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {179--190},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180428},
  doi          = {10.1145/1180405.1180428},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XieYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SengarWWJ06,
  author       = {Hemant Sengar and
                  Duminda Wijesekera and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {VoIP Intrusion Detection Through Interacting Protocol State Machines},
  booktitle    = {2006 International Conference on Dependable Systems and Networks {(DSN}
                  2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings},
  pages        = {393--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/DSN.2006.73},
  doi          = {10.1109/DSN.2006.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SengarWWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ChenWR06,
  author       = {Xin Chen and
                  Haining Wang and
                  Shansi Ren},
  title        = {DNScup: Strong Cache Consistency Protocol for {DNS}},
  booktitle    = {26th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  pages        = {40},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDCS.2006.31},
  doi          = {10.1109/ICDCS.2006.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ChenWR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/GuoDWLCZ06,
  author       = {Lei Guo and
                  Xiaoning Ding and
                  Haining Wang and
                  Qun Li and
                  Songqing Chen and
                  Xiaodong Zhang},
  title        = {Exploiting Idle Communication Power to Improve Wireless Network Performance
                  and Energy Efficiency},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.274},
  doi          = {10.1109/INFOCOM.2006.274},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/GuoDWLCZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/SengarWWJ06,
  author       = {Hemant Sengar and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Fast Detection of Denial-of-Service Attacks on {IP} Telephony},
  booktitle    = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS
                  2006, New Haven, CT, USA, 19-21 June 2006, Proceedings},
  pages        = {199--208},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWQOS.2006.250469},
  doi          = {10.1109/IWQOS.2006.250469},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/SengarWWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qest/XieTW06,
  author       = {Mengjun Xie and
                  Keywan Tabatabai and
                  Haining Wang},
  title        = {Identifying Low-ProfileWeb Server's {IP} Fingerprint},
  booktitle    = {Third International Conference on the Quantitative Evaluation of Systems
                  {(QEST} 2006), 11-14 September 2006, Riverside, California, {USA}},
  pages        = {365--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/QEST.2006.20},
  doi          = {10.1109/QEST.2006.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qest/XieTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/ChenWZSW05,
  author       = {Songqing Chen and
                  Haining Wang and
                  Xiaodong Zhang and
                  Bo Shen and
                  Susie J. Wee},
  title        = {Segment-Based Proxy Caching for Internet Streaming Media Delivery},
  journal      = {{IEEE} Multim.},
  volume       = {12},
  number       = {3},
  pages        = {59--67},
  year         = {2005},
  url          = {https://doi.org/10.1109/MMUL.2005.56},
  doi          = {10.1109/MMUL.2005.56},
  timestamp    = {Wed, 29 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeemm/ChenWZSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/RenLWCZ05,
  author       = {Shansi Ren and
                  Qun Li and
                  Haining Wang and
                  Xin Chen and
                  Xiaodong Zhang},
  title        = {A study on object tracking quality under probabilistic coverage in
                  sensor networks},
  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},
  volume       = {9},
  number       = {1},
  pages        = {73--76},
  year         = {2005},
  url          = {https://doi.org/10.1145/1055959.1055971},
  doi          = {10.1145/1055959.1055971},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/RenLWCZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangBES05,
  author       = {Haining Wang and
                  Abhijit Bose and
                  Mohamed A. El{-}Gendy and
                  Kang G. Shin},
  title        = {{IP} Easy-pass: a light-weight network-edge resource access control},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {13},
  number       = {6},
  pages        = {1247--1260},
  year         = {2005},
  url          = {https://doi.org/10.1109/TNET.2005.860113},
  doi          = {10.1109/TNET.2005.860113},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WangBES05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/RenLWZ05,
  author       = {Shansi Ren and
                  Qun Li and
                  Haining Wang and
                  Xiaodong Zhang},
  editor       = {Viktor K. Prasanna and
                  S. Sitharama Iyengar and
                  Paul G. Spirakis and
                  Matt Welsh},
  title        = {Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking
                  Applications},
  booktitle    = {Distributed Computing in Sensor Systems, First {IEEE} International
                  Conference, {DCOSS} 2005, Marina del Rey, CA, USA, June 30 - July
                  1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3560},
  pages        = {228--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502593\_19},
  doi          = {10.1007/11502593\_19},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dcoss/RenLWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChenRWZ05,
  author       = {Xin Chen and
                  Shansi Ren and
                  Haining Wang and
                  Xiaodong Zhang},
  title        = {{SCOPE:} scalable consistency maintenance in structured {P2P} systems},
  booktitle    = {{INFOCOM} 2005. 24th Annual Joint Conference of the {IEEE} Computer
                  and Communications Societies, 13-17 March 2005, Miami, FL, {USA}},
  pages        = {1502--1513},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/INFCOM.2005.1498434},
  doi          = {10.1109/INFCOM.2005.1498434},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ChenRWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/RenLWCZ05,
  author       = {Shansi Ren and
                  Qun Li and
                  Haining Wang and
                  Xin Chen and
                  Xiaodong Zhang},
  editor       = {Hermann de Meer and
                  Nina T. Bhatti},
  title        = {Analyzing Object Detection Quality Under Probabilistic Coverage in
                  Sensor Networks},
  booktitle    = {Quality of Service - IWQoS 2005: 13th International Workshop, IWQoS
                  2005, Passau, Germany, June 21-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3552},
  pages        = {107--122},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11499169\_10},
  doi          = {10.1007/11499169\_10},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/RenLWCZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YinW05,
  author       = {Heng Yin and
                  Haining Wang},
  editor       = {Patrick D. McDaniel},
  title        = {Building an Application-aware IPsec Policy System},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/building-application-aware-ipsec-policy-system},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/YinW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/WangS04,
  author       = {Haining Wang and
                  Kang G. Shin},
  title        = {Robust {TCP} congestion recovery},
  journal      = {J. High Speed Networks},
  volume       = {13},
  number       = {2},
  pages        = {103--121},
  year         = {2004},
  url          = {http://content.iospress.com/articles/journal-of-high-speed-networks/jhs238},
  timestamp    = {Mon, 18 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/WangS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangZS04,
  author       = {Haining Wang and
                  Danlu Zhang and
                  Kang G. Shin},
  title        = {Change-Point Monitoring for the Detection of DoS Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {1},
  number       = {4},
  pages        = {193--208},
  year         = {2004},
  url          = {https://doi.org/10.1109/TDSC.2004.34},
  doi          = {10.1109/TDSC.2004.34},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangZS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangBES04,
  author       = {Haining Wang and
                  Abhijit Bose and
                  Mohamed A. El{-}Gendy and
                  Kang G. Shin},
  title        = {{IP} Easy-pass: Edge Resource Access Control},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, Hong Kong, China,
                  March 7-11, 2004},
  pages        = {2583--2593},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/INFCOM.2004.1354678},
  doi          = {10.1109/INFCOM.2004.1354678},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangBES04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Wang03,
  author       = {Haining Wang},
  title        = {Countering distributed denial of service attacks},
  school       = {University of Michigan, {USA}},
  year         = {2003},
  url          = {https://hdl.handle.net/2027.42/123973},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Wang03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WangS03,
  author       = {Haining Wang and
                  Kang G. Shin},
  title        = {Transport-Aware {IP} Routers: {A} Built-In Protection Mechanism to
                  Counter DDoS Attacks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {14},
  number       = {9},
  pages        = {873--884},
  year         = {2003},
  url          = {https://doi.org/10.1109/TPDS.2003.1233710},
  doi          = {10.1109/TPDS.2003.1233710},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/WangS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JinWS03,
  author       = {Cheng Jin and
                  Haining Wang and
                  Kang G. Shin},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Hop-count filtering: an effective defense against spoofed DDoS traffic},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {30--41},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948116},
  doi          = {10.1145/948109.948116},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JinWS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/El-GendyBWS03,
  author       = {Mohamed A. El{-}Gendy and
                  Abhijit Bose and
                  Haining Wang and
                  Kang G. Shin},
  editor       = {Kevin Jeffay and
                  Ion Stoica and
                  Klaus Wehrle},
  title        = {Statistical Characterization for Per-hop QoS},
  booktitle    = {Quality of Service - IWQoS 2003, 11th International Workshop, Berkeley,
                  CA, USA, June 2-4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2707},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44884-5\_2},
  doi          = {10.1007/3-540-44884-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/El-GendyBWS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangZS02,
  author       = {Haining Wang and
                  Danlu Zhang and
                  Kang G. Shin},
  title        = {SYN-dog: Sniffing {SYN} Flooding Sources},
  booktitle    = {Proceedings of the 22nd International Conference on Distributed Computing
                  Systems (ICDCS'02), Vienna, Austria, July 2-5, 2002},
  pages        = {421--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICDCS.2002.1022280},
  doi          = {10.1109/ICDCS.2002.1022280},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangZS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangZS02,
  author       = {Haining Wang and
                  Danlu Zhang and
                  Kang G. Shin},
  title        = {Detecting {SYN} Flooding Attacks},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, New York, USA,
                  June 23-27, 2002},
  pages        = {1530--1539},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/INFCOM.2002.1019404},
  doi          = {10.1109/INFCOM.2002.1019404},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/WangZS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtas/WangS02,
  author       = {Haining Wang and
                  Kang G. Shin},
  title        = {Layer-4 Service Differentiation and Resource Isolation},
  booktitle    = {Proceedings of the 8th {IEEE} Real-Time and Embedded Technology and
                  Applications Symposium {(RTAS} 2002), 24-27 September 2002, San Jose,
                  CA, {USA}},
  pages        = {67--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/RTTAS.2002.1137382},
  doi          = {10.1109/RTTAS.2002.1137382},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rtas/WangS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangSS01,
  author       = {Haining Wang and
                  Chia Shen and
                  Kang G. Shin},
  title        = {Adaptive-weighted packet scheduling for premium service},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2001, June
                  11-14, Helsinki, Finland},
  pages        = {1846--1850},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICC.2001.937110},
  doi          = {10.1109/ICC.2001.937110},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangS01,
  author       = {Haining Wang and
                  Kang G. Shin},
  title        = {Robust {TCP} Congestion Recovery},
  booktitle    = {Proceedings of the 21st International Conference on Distributed Computing
                  Systems {(ICDCS} 2001), Phoenix, Arizona, USA, April 16-19, 2001},
  pages        = {199--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICDSC.2001.918949},
  doi          = {10.1109/ICDSC.2001.918949},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/WangSXR00,
  author       = {Haining Wang and
                  Kang G. Shin and
                  Hongjie Xin and
                  Douglas S. Reeves},
  title        = {A Simple Refinement of Slow-Start of {TCP} Congestion Control},
  booktitle    = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2000), 4-6 July 2000, Antibes, France},
  pages        = {98--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ISCC.2000.860615},
  doi          = {10.1109/ISCC.2000.860615},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/WangSXR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WidjajaWWC99,
  author       = {Indra Widjaja and
                  Haining Wang and
                  Steven Wright and
                  Amalendu Chatterjee},
  title        = {Scalability Evaluation of Multi-Protocol Over {ATM} {(MPOA)}},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications,
                  Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999},
  pages        = {1505--1512},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/INFCOM.1999.752172},
  doi          = {10.1109/INFCOM.1999.752172},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/WidjajaWWC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/WangW98,
  author       = {Haining Wang and
                  Carey L. Williamson},
  title        = {A New Scheme for {TCP} Congestion Control: Smooth-Start and Dynamic
                  Recovery},
  booktitle    = {{MASCOTS} 1998, Proceedings of the Sixth International Symposium on
                  Modeling, Analysis and Simulation of Computer and Telecommunication
                  Systems, 19-24 July, 1998, Montreal, Canada},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/MASCOT.1998.693677},
  doi          = {10.1109/MASCOT.1998.693677},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/WangW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics